Hackers Broke Into Real News Sites to Plant Fake Stories

A disinfo operation broke into the content management systems of Eastern European media outlets in a…

Russia’s GRU Hackers Hit US Government and Energy Targets

A previously unreported Fancy Bear campaign persisted for well over a year—and indicates that the notorious…

Iranian Spies Accidentally Leaked Videos of Themselves Hacking

IBM’s X-Force security team obtained five hours of APT35 hacking operations, showing exactly how the group…

Microsoft Warns of a 17-Year-Old ‘Wormable’ Bug

The SigRed vulnerability exists in Windows DNS, used by practically every small and medium-sized organization in…

Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment

For companies that haven't patched their BIG-IP products, it may already be too late.

An Embattled Group of Leakers Picks Up the WikiLeaks Mantle

After releasing over a million hacked law enforcement files, DDoSecrets got banned from Twitter. But it…

Anonymous Stole and Leaked a Megatrove of Police Documents

The so-called BlueLeaks collection includes internal memos, financial records, and more from over 200 state, local,…

What Is a Side Channel Attack?

Computers constantly give off more information than you might realize—which hackers can use to pry out…

Ripple20 Bugs Put Hundreds of Millions of IoT Devices at Risk

The so-called Ripple20 vulnerabilities affect equipment found in data centers, power grids, and more.

Spies Can Eavesdrop by Watching a Light Bulb’s Vibrations

The so-called lamphone technique allows for real-time listening in on a room that's hundreds of feet…