Hackers Tied to Russia’s GRU Targeted the US Grid for Years, Researchers Warn

Together, in other words, the groups Dragos call Kamacite and Electrum make up what other researchers and government agencies collectively call Sandworm. “One group gets in, the other group knows what to do when they get in,” says Caltagirone. “And when they operate separately, which we also watch them do, we clearly see that neither […]

‘2034,’ Part V: Sailing Into Darkness

She made a request to disable all of the avionics in one of her fighter squadrons, VMFA-323, the Death Rattlers, the only Marine squadron aboard the Enterprise and the only one that still used the antiquated F/A-18 Hornet airframe. She would be given two days to modify the aircraft in port, and then whatever extra […]

China Hijacked an NSA Hacking Tool in 2014—and Used It for Years

More than four years after a mysterious group of hackers known as the Shadow Brokers began wantonly leaking secret NSA hacking tools onto the internet, the question that debacle raised—whether any intelligence agency can prevent its “zero-day” stockpile from falling into the wrong hands—still haunts the security community. That wound has now been reopened, with […]

A Trippy Visualization Charts the Internet’s Growth Since 1997

In November 2003, security researcher Barrett Lyon was finishing college at California State University, Sacramento while working full time as a penetration tester—a hacker companies hire to find weaknesses in their own digital systems. At the beginning of each job, Lyon would do some basic reconnaissance of the customer’s infrastructure; “case the joint,” as he […]

Sites Have a Sneaky New Way to Track You Across the Web

This week saw the first known appearance of malware written specifically for Apple’s M1 processors, in inevitable but still somewhat concerning development, especially given how little time it took the bad guys to adjust to the new ARM-based architecture. Fortunately, this week Apple also put out its latest Platform Security Guide, which should help security […]

Apple Offers Its Closest Look Yet at iOS and MacOS Security

Apple is a notoriously secretive and insular organization, a tendency that has often put it at odds with the security research community. The company is often inscrutable about the technical details of how its products and security features really work. So the resource security researchers say they have come to rely on most for breadcrumbs […]

Feds Indict North Korean Hackers for Years of Heists and Scams

Most surprising, perhaps, is the extent of the hackers’ alleged schemes as cryptocurrency scammers and even would-be entrepreneurs. The indictment outlines how the North Koreans—specifically Kim Il—made plans to launch a cryptocurrency token scheme called Marine Chain, which would sell a blockchain-based stake in marine vessels including cargo ships. According to the British think tank […]

Parler Says It’s Back | WIRED

Parler.com is getting back online after being kicked off Amazon’s hosting service, with the controversial social network saying it no longer relies on “Big Tech” for its web infrastructure. A Parler announcement Monday said its relaunched website is “built on sustainable, independent technology and not reliant on so-called ‘Big Tech’ for its operations.” Amazon cut […]

Malware Is Now Targeting Apple’s New M1 Processor

Mac malware has always been less common than its Windows-targeting counterparts, but in recent years the threat to Apple computers has gone mainstream. There’s adware  and even ransomware tailored to Macs, and attackers are always looking to circumvent Apple’s latest defenses. Now hackers have debuted malware tailored to run on Apple’s new ARM-based M1 processors, […]