#radio-attacks

[ follow ]
#cybersecurity
fromFortune
3 days ago
Privacy professionals

First they went after medtech, then Kash Patel. Iranian hackers' next target is likely 'low-hanging fruit' in water, energy, and tourism, experts say | Fortune

Information security
fromZDNET
3 days ago

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

FBI and NSA warn of Russian hackers targeting vulnerable routers, urging users to update firmware and strengthen passwords.
Information security
fromNextgov.com
3 days ago

US push to counter hackers draws industry deeper into offensive cyber debate

The U.S. government seeks private sector involvement in cyber defense, but clarity on offensive roles remains uncertain.
Information security
fromThe Hacker News
6 hours ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Silicon Valley
fromWIRED
9 hours ago

The Dumbest Hack of the Year Exposed a Very Real Problem

A cyberattack in Silicon Valley exploited weak passwords to spoof crosswalk button recordings with voices of tech CEOs, raising security concerns.
Privacy technologies
fromYahoo Tech
3 days ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Privacy professionals
fromFortune
3 days ago

First they went after medtech, then Kash Patel. Iranian hackers' next target is likely 'low-hanging fruit' in water, energy, and tourism, experts say | Fortune

Iran-linked hackers are targeting high-profile figures and critical infrastructure in the U.S. and Israel to sow disruption.
Information security
fromZDNET
3 days ago

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

FBI and NSA warn of Russian hackers targeting vulnerable routers, urging users to update firmware and strengthen passwords.
Information security
fromNextgov.com
3 days ago

US push to counter hackers draws industry deeper into offensive cyber debate

The U.S. government seeks private sector involvement in cyber defense, but clarity on offensive roles remains uncertain.
Roam Research
fromwww.businessinsider.com
6 hours ago

The US Army surged its largest counter-drone training deployment to the Middle East during the Iran war

The US Army has launched its largest counter-drone training mission in the Middle East amid the Iran war, utilizing the Merops system.
SF politics
fromFast Company
1 day ago

The Pentagon is doubling down on laser weapons research

The U.S. military plans to invest over $2 billion in directed energy weapons research for fiscal year 2027.
UK news
fromTheregister
3 days ago

UK seeks fresh perspectives to shape radio-jamming laws

The UK government is preparing legislation to ban radiofrequency jammers due to their use in various criminal activities and threats to public safety.
#iran
World news
fromwww.aljazeera.com
3 weeks ago

War spirals as information control tightens

The war on Iran has escalated with increased leadership assassinations, a blockade of the Strait of Hormuz, and strikes on energy infrastructure.
Information security
fromWIRED
6 days ago

Iran-Linked Hackers Are Sabotaging US Energy and Water Infrastructure

Iran has launched a hacking campaign targeting US industrial control systems, causing disruptions in critical infrastructure.
World news
fromwww.aljazeera.com
3 weeks ago

War spirals as information control tightens

The war on Iran has escalated with increased leadership assassinations, a blockade of the Strait of Hormuz, and strikes on energy infrastructure.
Information security
fromWIRED
6 days ago

Iran-Linked Hackers Are Sabotaging US Energy and Water Infrastructure

Iran has launched a hacking campaign targeting US industrial control systems, causing disruptions in critical infrastructure.
OMG science
fromwww.scientificamerican.com
4 days ago

What is the quantum Ghost Murmur' purportedly used in Iran? Scientists question CIA's claim of long-range heartbeat detection

Ghost Murmur technology for locating heartbeats is unsupported by physics, despite claims of its effectiveness in rescue missions.
#malware
Information security
fromThe Hacker News
2 weeks ago

ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories

A sophisticated malware campaign targets Web3 support teams using deceptive links to deliver malicious executables and establish persistent communication with threat actors.
Information security
fromThe Hacker News
2 weeks ago

ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories

A sophisticated malware campaign targets Web3 support teams using deceptive links to deliver malicious executables and establish persistent communication with threat actors.
Privacy professionals
fromWIRED
5 days ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
Artificial intelligence
fromNextgov.com
1 week ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
Privacy professionals
fromTechCrunch
5 days ago

Hack-for-hire group caught targeting Android devices and iCloud backups | TechCrunch

A hack-for-hire group is targeting journalists and officials in the Middle East and North Africa using phishing and spyware tactics.
US news
fromwww.mediaite.com
3 weeks ago

Alarming Number of Unauthorized Drones' Spotted Over US Air Base

Unidentified drones were spotted over Barksdale Air Force Base, prompting a shelter-in-place order and raising security concerns amid tensions with Iran.
Remote teams
fromwww.theguardian.com
1 month ago

Keyboard jamming: the sneaky way to make your boss think you're working from home

Employees use keyboard jamming techniques to appear active while working from home, but employers are deploying advanced monitoring tools that detect actual work rather than just keyboard activity, leading to numerous dismissals across organizations including police forces.
Privacy technologies
fromWIRED
1 month ago

This Jammer Wants to Block Always-Listening AI Wearables. It Probably Won't Work

Deveillance's Spectre device claims to detect microphones via RF emissions and NLJD technology, but experts dispute its effectiveness and question whether it can reliably identify all microphone types.
Science
fromLondon Business News | Londonlovesbusiness.com
1 month ago

US Navy Use Laser Weapons During Operation Epic Fury - London Business News | Londonlovesbusiness.com

The US military deployed advanced weapons including HELIOS laser systems, heat-tracking satellites, and cyber tools during Operation Epic Fury to intercept Iranian missiles and drones.
fromWIRED
1 month ago

How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers

The movements of a hard drive's components, keystrokes on a keyboard, even the electric charge in a semiconductor's wires produce radio waves, sound, and vibrations that transmit in all directions and can-when picked up by someone with sufficiently sensitive equipment and enough spycraft to decipher those signals-reveal your private data and activities.
Privacy technologies
Information security
fromSecurityWeek
6 days ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
Information security
fromSecuritymagazine
5 days ago

Ransomware Response: How Businesses Regain Control Under Pressure

Ransomware attacks create urgent pressure, forcing quick decisions and impacting operations, legal obligations, and overall enterprise strategy.
Information security
fromTechCrunch
6 days ago

Russian government hackers broke into thousands of home routers to steal passwords | TechCrunch

Russian hackers hijacked thousands of routers globally to redirect internet traffic and steal passwords and access tokens.
Information security
fromThe Hacker News
6 days ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
#phishing
Information security
fromTheregister
5 days ago

Hundreds compromised daily in Microsoft device code phishes

A Microsoft device-code phishing campaign is compromising hundreds of organizations daily, utilizing AI and automation to steal financial data.
Information security
fromThe Hacker News
3 weeks ago

FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks

Russian Intelligence Services are conducting phishing campaigns to compromise commercial messaging applications targeting individuals of high intelligence value.
Information security
fromTheregister
5 days ago

Hundreds compromised daily in Microsoft device code phishes

A Microsoft device-code phishing campaign is compromising hundreds of organizations daily, utilizing AI and automation to steal financial data.
Information security
fromThe Hacker News
2 weeks ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Information security
fromThe Hacker News
3 weeks ago

FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks

Russian Intelligence Services are conducting phishing campaigns to compromise commercial messaging applications targeting individuals of high intelligence value.
fromBusiness Insider
2 months ago

The US Army jammed its new command-and-control tech to see if electronic warfare would break it

Much like the war in Ukraine, future battlefields could be drowning in electronic interference, so the US Army stress-tested new command-and-control tech against that threat. The need to maintain connections between command and deployed weapons and crews, or reestablish those links when they're lost, is shaping how soldiers train on the service's Next Generation Command and Control, a new software-driven system that's being developed for the Army.
US news
Information security
fromThe Hacker News
1 week ago

Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps

Multi-OS attacks complicate SOC operations, leading to delays, fragmented evidence, and increased escalation volume, ultimately allowing attackers more time to operate.
Science
fromwww.aljazeera.com
1 month ago

Are lasers the future of anti-drone warfare?

High-energy lasers are emerging as cost-effective defensive weapons to counter mass drone attacks, driving intense industry investment and new military contracts.
fromSecuritymagazine
2 months ago

The New Battleground of Cybersecurity

I've always had what I would consider a hacker mindset, a curiosity to take things apart, understand them, and use that knowledge to solve problems. That mindset took me on a circuitous route into the cybersecurity industry; after being kicked out of high school for hacking computer systems, I worked a range of jobs, managing office supply companies by day and cracking Wi-Fi networks by night until I started a Digital Forensics degree which led me to the world of security research.
Science
Information security
fromSecurityWeek
3 weeks ago

Aisuru and Kimwolf DDoS Botnets Disrupted in International Operation

The US Justice Department disrupted several IoT botnets used for DDoS attacks, targeting Aisuru, Kimwolf, JackSkid, and Mossad.
Information security
fromTechzine Global
3 weeks ago

Identity has become malleable for cyber attackers

Modern cyberattacks combine psychological manipulation, deepfakes, voice phishing, and stolen data to breach even well-defended organizations without exploiting software vulnerabilities.
Information security
fromSecurityWeek
4 weeks ago

Threat Actor Targeting VPN Users in New Credential Theft Campaign

Storm-2561 uses SEO poisoning and GitHub hosting to distribute trojans impersonating VPN software, stealing credentials through signed malware that evades detection.
Information security
fromSecurityWeek
1 month ago

Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War

Pro-Iranian hackers are expanding cyberattacks from the Middle East into the United States, targeting defense contractors, medical device companies, and critical infrastructure like power stations and water plants.
Information security
fromThe Hacker News
1 month ago

Attackers Don't Just Send Phishing Emails. They Weaponize Your SOC's Workload

Attackers deliberately overwhelm SOC analysts with high-volume phishing campaigns to delay investigations and create windows for successful breaches, making analyst capacity a critical vulnerability.
Information security
fromTheregister
1 month ago

Hackers: Democracy's last line of cyber defense

The hacker mindset—analytical curiosity combined with systemic thinking—can defend democracy by creating decentralized communication tools that resist censorship and empower oppressed communities.
fromTheregister
1 month ago

Crims hit EV charger firm ELECQ, steal customer contact data

In a notice sent to customers on Monday and seen by The Register, the EV charging outfit said that it detected "unusual activity" on its AWS cloud platform on March 7 and quickly discovered that attackers had launched a ransomware attack against parts of its infrastructure. According to the message, some databases were both encrypted and copied during the intrusion, meaning that the crooks likely walked off with user information before the company pulled the plug.
Information security
Information security
fromTheregister
1 month ago

Manage attack infrastructure? AI agents can now help

AI agents enable cybercriminals and nation-state hackers to automate reconnaissance, infrastructure management, and attack planning, significantly increasing the speed and scale of cyberattacks.
Information security
fromTheregister
1 month ago

Spyware disguised as emergency-alert app sent to Israelis

Hamas-linked attackers distributed spyware disguised as an emergency-alert app to Israeli smartphones via SMS phishing messages impersonating the official Oref Alert rocket warning service.
fromComputerworld
1 month ago

FBI wiretap system tapped by hackers

The FBI identified and addressed suspicious activities on FBI networks, and we have leveraged all technical capabilities to respond.
Information security
Information security
fromtechcrunch.com
1 month ago

FBI investigating hack on its wiretap and surveillance systems: report

Hackers breached FBI networks managing wiretaps and foreign intelligence surveillance warrants, marking another major U.S. government cybersecurity incident amid ongoing threats from Chinese and Russian threat actors.
#cyberwarfare
Information security
fromNextgov.com
1 month ago

Intelligence firms watch for uptick in Iran cyber activity after US, Israel strikes

Tehran-linked hackers are escalating digital reconnaissance and preparing potentially disruptive cyber operations following recent U.S. and Israeli strikes on Iran.
Information security
fromTheregister
1 month ago

Google and friends disrupt suspected Beijing espionage op

Google disrupted UNC2814, a China-linked group conducting widespread cyberattacks on telecommunications and government organizations across multiple continents using Google Sheets API for command-and-control operations.
Information security
fromThe Hacker News
2 months ago

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

Infy, an Iranian state-backed threat group, paused C2 operations during Iran's nationwide internet blackout and reestablished new C2 infrastructure immediately before connectivity was restored.
fromSecurityWeek
2 months ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
[ Load more ]