Here’s What It’s Like to Accidentally Expose the Data of 230M People

The owner of Exactis, a 10-person firm that exposed a database including nearly every American, tells…

Machine Learning Can Use Tweets to Automatically Spot Critical Security Flaws

Researchers built an AI engine that uses tweets to predict the severity of software vulnerabilities with…

Google Reveals “BuggyCow,” a Rare MacOS Zero-Day Vulnerability

Google's Project Zero researchers find a potentially powerful privilege escalation trick in how Macs manage memory.

US Hackers’ Strike on Russian Trolls Sends a Message—but What Kind?

US Cyber Command's takedown of the Internet Research Agency's network may be more about signaling than…

Hackers Can Slip Invisible Malware into ‘Bare Metal’ Cloud Computers

Researchers point a tough-to-fix in some cloud computing setups: hackable firmware.

The Russian Sleuth Who Outs Moscow’s Elite Hackers and Assassins

Roman Dobrokhotov has been playing a dangerous game for a Russian reporter: identifying agents of the…

Russian Hackers Go From Foothold to Full-On Breach in 19 Minutes

A new ranking of nation-state hacker speed puts Russia on top by a span of hours.

US Air Force Defector Allegedly Helped Iran Hack Americans

In an astonishing indictment, the DOJ details how Monica Witt allegedly turned on her former counterintelligence…

Twitter Still Can’t Keep Up With Its Flood of Junk Accounts, Study Finds

Iowa researchers built an AI engine they say can spot abusive apps on Twitter months before…

Hackers Are Passing Around a Megaleak of 2.2 Billion Records

The so-called Collections #1-5 represent a gargantuan, patched-together Frankenstein of rotting personal data.