Like the compound scam In Southeast Southeast Asia continues to lead massive campaigns targeting victims around the world, Wired has examined more and more how Elon Musk Starlink’s internet service provider manages many of these online myanmar compounds. Meanwhile, the FTC complaints obtained by Wired allege that an “OpenAi” job scam used the telegram to recruit workers in Bangladesh for months before fraudsters suddenly disappear.
Wired has published the interior history of the executive of Russian technology Vladislav Klyushin, who – at the request of Vladimir Putin – was part of a notable American prisoners exchange last summer after being convicted and imprisoned in the United States for the initiate trade which brought him $ 93 million. Earlier this week, televisions at the headquarters of the Housing and Urban Development Department in Washington, DC, showed a video apparently generated by AI on Loop by Donald Trump kissing Elon Musk’s feet. The words “Live the Real King” were superimposed on video.
Wired conducted an investigation into telegram groups devoted to the doxing and harassment of women who joined “Are we going out with the same guy?” Facebook groups. And, as a female entrepreneurs in technology, the increasingly strong chances of gaining support for a company, a team of founders obtained seed funding and finished a series a round in a few months for the Edera Cloud container security company.
But wait, there is more! Each week, we bring together the news of security and confidentiality that we have not covered in depth ourselves. Click on the titles to read full stories. And stay safe there.
After years of Russian cyber-acting against the United States and its long-standing allies, including repeated elections, hack and leaks, disinformation campaigns, recent actions developed from the Trump administration have reflected the American position on threats of cybersecurity, threats of cybersecurity posed by the Kremlin, the drop in risks. The expression occurs while Donald Trump and Russian President Vladimir Putin have increasingly strengthened their ties. Coherent assessments of the American intelligence community of Russia’s activity in cyberspace and the threat it poses for the United States would, however, indicate that such a change in approach could endanger the United States.
This priority of the threat of Russia came in several different forms. Deputy Deputy Secretary of the American State Department for International Cybersecurity, Liesyl Franz, said in a speech in a United Nations working group last week that the United States was concerned about digital attacks in China and Iran, but did not mention Russia. A recent memo distributed to the cybersecurity and infrastructure safety agency has set up priorities for the agency, focusing on China and in defense of American systems, but has omitted any reference to Russia. And Friday, the cybersecurity media The reported file Last week, the Secretary of Defense, Pete Hegseth, ordered us to the Cyber Command to end any cyber operational planning against Russia, including offensive digital campaigns.
Eight days have passed since the cryptocurrency exchange exchange revealed that the pirates stole a value of $ 1.4 billion in assets based on Ethereum to the company, a breakage which is by certain measures the largest flight of crypto in history. Now, the race is underway to follow the stolen funds through blockchains, prevent its liquidation, or even recover it – and this race is propelled by 140 million dollars in bonuses offered by the appeal itself. Bybit earlier this week launched a website Where he invites Crypto detectives to submit advice on the destination of his stolen Ethereum funds and offering as a reward 5% of the value of all funds that these tracers can identify and help freeze or grasp. Bybit offered an additional 5% of value as a separate reward for any crypto exchange or other platform that obtains the funds.
On Friday, the website had a dozen bonus hunters currently registered as part of this crypto layout effort and put the counts paid to around $ 4.3 million. The site also includes a classification of tracers that have succeeded in identifying the funds by following them through blockchains or frozen funds – as well as a list of crypto exchanges which, on the other hand, liquidated the stolen funds for the name of the thieves. So far, only one exchange, known as ECH, has been reported as liquidating $ 94 million in stolen assets. Bybit notes that Exch refused to respond to his messages, and the exchange did not respond to a request for comment from the BBC.
Earlier this week, the FBI took on the unusual measure to publicly identify the pirates behind this massive bybet hack: Traderraitor, a group of cybercriminals sponsored by the state working on behalf of the North Korean government. The FBI has asked the cryptography industry not to whiten the funds of these hackers, part of the umbrella group wider widely known as Lazarus which has long tormented the world of cryptocurrency and stole billions of billions in crypto and non-crypto active. In its alert, the office has also published a list of Ethereum addresses associated with stolen funds in order to help cryptographic industry identify and grasp all of the $ 1.4 billion before being collected. The Crypto TRM Labs tracing company wrote in a job Thursday that around $ 400 million in funds have already been moved and may have been successfully liquidated.
In July, an entity called “Nullbulge” published a 1,1 TB data stolen in the Disney internal slack archives, making a frantic cleaning effort while Disney was rushed to understand the disclosed income numbers, employees information such as passport numbers and information with sensitive customers. The violation occurred after a Disney employee, Matthew Van Andel, inadvertently downloaded malware to his personal computer which has collected its connection identification information for a certain number of services, in particular, above all, the password of its 1 Password identification box. “It is impossible to transmit the feeling of violation,” he told Wall Street Journal. Van Andel also had his credit card and other stolen personal data numbers, then lost his job when a Disney audit of his work computer alleged that he had accessed porn from the device. Van Andel denies the accusation. The episode is only one in a series of violations where malware that infects the personal computer of a worker can have major ramifications for the institution that employs them.
Mattia Ferrari, an Italian priest who works with a migrant rescue group and has a close relationship with the Pope, revealed this week that he had received a Meta warning that his phone had been hacked with sophisticated spy software from the Israeli parangon. The news follows the revelations according to which Luca Casarini, the founder of the NGO Mediterranea saving humans, where Ferrari was chaplain, also made her phone compromise by spy software, just like the Italian investigation journalist Francesco Cancelato. The series of spy software infections targeting Italian activists and a journalist raise the question of who could carry out the hacking operations, the opposition leaders appealing to the administration of the Italian Prime Minister Giorgia Meloni to resolve the issue. The Meloni government denied being behind hacking incidents. Pope Francis, who is currently in critical condition with pneumonia, said in Ferrari on the phone during a television interview in January, which raised if the spies who hacked Ferrari’s phone listened to a conversation with the Pope himself.