
The mass compromise of the VoIP firm’s customers is the first confirmed incident where one software supply chain attack enabled another, researchers say.
The mass compromise of the VoIP firm’s customers is the first confirmed incident where one software supply chain attack enabled another, researchers say.
The breach of the right-wing provocateur was simply a way of “stirring up some drama,” the attacker tells WIRED. But the damage could have been much worse.
More than half of the enterprise routers researchers bought secondhand hadn’t been wiped, exposing sensitive info like login credentials and customer data.
The discovery of malicious encryptors for Apple computers could herald new risks for macOS users if the malware continues to evolve.
Plus: Hackers claim to have stolen 10 TB from Western Digital, a new spyware has emerged, and WhatsApp gets a fresh security feature.
Security researchers are jailbreaking large language models to get around safety rules. Things could get much worse.
To beat back fake accounts, the professional social network is rolling out new tools to prove you work where you say you do and are who you say you are.
Plus: 119 arrested during a sting on the Genesis dark-web market, the IRS aims to buy an online mass surveillance tool, and more.
Without an information sharing and analysis center, the country’s food and agriculture sector is uniquely vulnerable to hackers.
North Korean hackers appear to have used the corrupted VoIP software to go after just a handful of crypto firms with “surgical precision.”