Category: Security & Privacy

  • Aflac Discloses Major Data Breach Affecting 22.6 Million Individuals

    This article was generated by AI and cites original sources.

    U.S. insurance giant Aflac has confirmed a significant data breach, where hackers accessed the personal information of approximately 22.65 million individuals. The stolen data includes sensitive details such as Social Security numbers, identity documents, health information, and more. This incident underscores the ongoing challenges companies face in safeguarding customer data against sophisticated cyber threats.

    Aflac stated that the stolen data comprises a range of personal information, including names, dates of birth, addresses, government-issued ID numbers, driver’s license numbers, and medical details. The company also mentioned that the cybercriminals responsible for the breach could be linked to a known cyber-criminal organization, with indications that the insurance industry was a specific target.

    With the rise of cybercrime and data breaches, organizations across sectors, including insurance companies, must continuously enhance their cybersecurity measures to protect customer data and maintain trust. The incident serves as a reminder of the critical importance of robust cybersecurity practices and proactive threat detection strategies in today’s digital landscape.

    Source: TechCrunch

  • Exposed Flock AI Camera Feeds Raise Serious Security Concerns

    This article was generated by AI and cites original sources.

    Recent findings by tech YouTuber Benn Jordan and 404 Media have revealed a concerning security vulnerability involving Flock’s AI-powered surveillance cameras. Livestreams from over 60 of Flock’s cameras were accessible online without requiring any login credentials, potentially allowing unauthorized individuals to view real-time feeds from various locations.

    Flock, a technology company known for deploying AI cameras in collaboration with law enforcement agencies and businesses, offers advanced features such as automated tracking of people and vehicles. Partnering with Ring has expanded Flock’s reach, enabling customers to request footage from Ring’s Neighbors app.

    Jordan’s investigations exposed the extent of the security lapse, showcasing scenarios where the AI-powered cameras automatically zoomed in on individuals in different settings, from a New York resident leaving home to a lone jogger in Georgia. The exposed feeds, originating from Flock’s Condor cameras capable of panning, tilting, and zooming, were discovered through Shodan, a search engine indexing internet-connected devices.

    Collaborating with security expert Jon “GainSec” Gaines, Jordan and his team not only accessed live camera feeds but also gained control over administrator panels, allowing them to download video archives, modify settings, delete footage, and perform diagnostics. This breach raises significant privacy and security concerns, emphasizing the need for robust cybersecurity measures in AI surveillance systems.

    Source: The Verge

  • ServiceNow Expands Cybersecurity Offerings with Armis Acquisition

    This article was generated by AI and cites original sources.

    ServiceNow, the enterprise software company, has agreed to acquire cybersecurity startup Armis for $7.75 billion in cash. This acquisition marks a significant increase in valuation for Armis, which had recently raised $435 million in pre-IPO funding, valuing the company at $6.1 billion.

    Armis, led by co-founder and CEO Yevgeny Dibrov, focuses on providing security solutions for critical infrastructure to top-tier clients, including Fortune 500 companies and governments. The company has an impressive $340 million in annual recurring revenue and a growth rate exceeding 50%. This strategic acquisition will enable ServiceNow to bolster its cybersecurity portfolio and enhance its offerings in this crucial domain.

    The deal underscores the ongoing trend of consolidation in the tech industry, where established players like ServiceNow are seeking to broaden their capabilities through acquiring innovative startups like Armis. The acquisition is poised to have a significant impact on ServiceNow’s cybersecurity strategy, positioning the company for further growth and expansion in the competitive cybersecurity market.

    Source: TechCrunch

  • U.S. Bans Foreign-Made Drones, Impacting DJI and the Drone Market

    This article was generated by AI and cites original sources.

    The U.S. government has implemented a ban on new foreign-made drone models, citing national security concerns. The Federal Communications Commission (FCC) has added all foreign-produced Unmanned Aircraft Systems (UAS) and critical components to the Covered List, citing potential risks posed by drones in the hands of criminals and hostile actors.

    This decision is set to disrupt the dominance of Chinese drone manufacturer DJI in the American market. As DJI is a popular choice among U.S. consumers, the ban will have significant implications for the company and the drone industry as a whole. While existing owners of foreign drone models are not affected, the restriction on new models will reshape the competitive landscape.

    In response, DJI expressed disappointment over the FCC’s action and emphasized its commitment to the U.S. market amidst the evolving regulatory environment. As the ban takes effect, the U.S. drone market is poised for transformation, potentially paving the way for domestic drone manufacturers to enhance their presence. The clash between Chinese and American consumer tech products underscores the ongoing tensions in the global tech industry.

    Source: TechCrunch

  • Crypto Thefts Reach Record $2.7B in 2025, Highlighting Ongoing Security Challenges

    This article was generated by AI and cites original sources.

    In 2025, cybercriminals stole a record $2.7 billion in cryptocurrency through various hacks and heists, marking the third consecutive year of escalating crypto thefts, as reported by blockchain-monitoring firms. Major incidents included a breach at Dubai-based exchange Bybit, where hackers made off with approximately $1.4 billion in crypto. The FBI and blockchain analysis firms implicated North Korean government hackers in this high-profile theft, underscoring the ongoing threat posed by state-sponsored cybercrime in the crypto space.

    This staggering sum of stolen crypto in 2025 surpassed previous records, with notable breaches in 2022 against the Ronin Network and the Poly Network. Chainalysis and TRM Labs estimated the total stolen amount, with Chainalysis also tracing an additional $700,000 taken from individual crypto wallets. The security firm De.Fi, behind the REKT database, echoed these findings, further emphasizing the scale of illicit activities within the crypto ecosystem.

    Throughout the year, North Korean hackers remained prominent, amassing over $2 billion in stolen crypto according to industry experts. Their activities, allegedly aimed at funding the country’s nuclear weapons program, demonstrate the complex intersection of cybersecurity, geopolitics, and financial crime in the digital age.

    Additional breaches targeted platforms like Cetus, Balancer, and Phemex, highlighting the vulnerabilities present in decentralized exchanges and protocols. As the crypto landscape continues to evolve, these incidents underscore the critical need for robust security measures and heightened vigilance to safeguard digital assets.

    Source: TechCrunch

  • Massive Data Breach at Aflac Exposes Personal Details of 22.6 Million Customers

    This article was generated by AI and cites original sources.

    Aflac, a major U.S. insurance company, has confirmed a significant data breach where hackers accessed sensitive personal data of approximately 22.65 million individuals. The stolen information includes Social Security numbers, identity documents, health data, and other personal details. Aflac revealed that the cybercriminals responsible for the breach may have connections to a known cyber-criminal organization targeting the insurance industry.

    The stolen data encompasses a range of sensitive information such as customer names, dates of birth, addresses, government-issued ID numbers, driver’s license numbers, and medical and health insurance details. This breach raises concerns about the vulnerability of personal data and the potential risks customers face when such information falls into the wrong hands.

    With approximately 50 million customers, Aflac is taking steps to notify those affected by the breach. The company’s acknowledgment of the cyberattack underscores the importance of robust cybersecurity measures for organizations, especially those handling sensitive personal and health information.

    Source: TechCrunch

  • NYPD Faces Lawsuit Over Alleged Surveillance of Muslim Communities

    This article was generated by AI and cites original sources.

    The New York Police Department (NYPD) is facing a lawsuit over its alleged surveillance program that targeted Muslim communities in New York City. The program, known as ‘mosque-raking,’ came under scrutiny during the Michael Bloomberg administration for its extensive monitoring activities.

    The lawsuit, filed by a New Jersey man, aims to uncover potential records related to the NYPD’s surveillance of Muslims. This legal action follows previous attempts to reveal information about the Intelligence Division’s activities within Muslim communities.

    The legal challenge poses a significant test for the newly elected mayor of New York City, Zohran Mamdani, who campaigned against the NYPD’s past surveillance practices. His stance on law enforcement policies, particularly concerning the Muslim community, will be closely watched as this lawsuit unfolds.

    The plaintiff, Samir Hashmi, a former member of the Rutgers Muslim Student Association, was among many individuals and organizations allegedly targeted by the NYPD’s surveillance efforts. Despite previous legal actions and settlements related to the NYPD’s activities, Hashmi continues to pursue transparency and accountability through the legal system.

    Hashmi’s latest requests under the New York Freedom of Information Law seek specific intelligence reports and data related to the surveillance operations conducted between 2006 and 2008. By narrowing down the scope of his requests, he aims to shed light on the extent of surveillance on community and religious organizations during that period.

    This ongoing legal battle underscores the importance of transparency and accountability in law enforcement practices, particularly in cases involving the alleged surveillance of specific communities. The outcome of this lawsuit could have implications for future policing strategies and the protection of civil liberties.

    Source: WIRED

  • Uzbekistan’s Nationwide License Plate Surveillance System Raises Privacy Concerns

    This article was generated by AI and cites original sources.

    Recent findings by security researcher Anurag Sen have shed light on Uzbekistan’s extensive national license plate scanning system, which was left exposed online without password protection, allowing unrestricted access to the collected data. The system, comprising a network of high-resolution roadside cameras scanning thousands of vehicles daily, aims to identify traffic violations such as running red lights, seatbelt non-usage, and unlicensed night driving.

    Sen’s discovery revealed that the surveillance system, operational since mid-2025, was publicly accessible, leading to concerns about privacy and security implications associated with mass vehicle monitoring. This incident parallels the growing trend of license plate surveillance globally, with the United States also expanding its use of such technology.

    This revelation underscores the need for robust security measures in surveillance systems to safeguard sensitive data and mitigate potential risks of unauthorized access. As countries continue to implement nationwide monitoring solutions, ensuring data protection and privacy safeguards is paramount.

    Source: TechCrunch

  • Suspected DDoS Attack Disrupts Critical Services in France

    This article was generated by AI and cites original sources.

    France’s national postal and banking services, La Poste, faced a significant disruption due to a suspected distributed denial-of-service (DDoS) attack. The incident temporarily knocked offline the organization’s information systems, rendering online mail, banking services, website, and mobile app inaccessible for customers. However, in-person banking and postal transactions remained possible during this outage.

    La Banque Postale, the banking arm of La Poste, also acknowledged the cyberattack, highlighting the temporary unavailability of customer access to the mobile app and online banking platform.

    Although a Russian hacktivist group claimed responsibility for the attack, the true perpetrators remain unidentified. This incident adds to a series of recent cybersecurity challenges faced by the French government, including the discovery of remote control software on a passenger ferry and a data breach involving stolen confidential documents from email accounts.

    As investigations continue, the connection between these incidents remains unclear, raising concerns about the resilience of critical infrastructure against cyber threats.

    Source: TechCrunch

  • Apple Fined $116 Million in Italy Over App Privacy Rules

    This article was generated by AI and cites original sources.

    Italy’s antitrust regulator has fined Apple more than €98 million (about $116 million) for its strict privacy rules imposed on third-party apps. The Italian Competition Authority (AGCM) found Apple guilty of abusing its dominant position in the app store market by enforcing terms on data collection that exceed privacy law requirements for developers compared to native iOS apps.

    The fine is a result of Apple’s App Tracking Transparency (ATT) policy, introduced in 2021, which mandates third-party developers to seek user consent twice to track data across apps and websites, while Apple’s own apps need only one tap for permission. AGCM noted that the dual consent process decreased user acceptance rates for personalized ads, impacting developers reliant on ad-generated revenue.

    According to AGCM, the ATT policy’s unilateral imposition harms Apple’s commercial partners, as the double consent procedure is deemed disproportionate, failing to provide the same privacy level for users by not allowing developers to obtain profiling consent in a single step.

    Apple, which faced a similar fine from France earlier this year over the ATT system, expressed strong disagreement with AGCM’s decision and plans to challenge it, reiterating its commitment to safeguarding user privacy.

    Source: The Verge

  • Telegram Becomes Hub for Chinese Crypto Scammers’ Darknet Market Operations

    This article was generated by AI and cites original sources.

    Online black markets have transitioned from the dark web’s hidden corners to public platforms like Telegram, resulting in unprecedented illicit gains. Initially reliant on cryptocurrency and Tor’s anonymity, today’s black-market dealings center around Chinese-speaking crypto scammers leveraging messaging services to facilitate transactions worth billions.

    A recent analysis by Elliptic reveals the surge in marketplaces catering to Chinese scammers on Telegram, notably Tudou Guarantee and Xinbi Guarantee. These platforms, despite facing intermittent bans, drive nearly $2 billion in monthly money-laundering activities, sale of illicit tools, and diverse black market services including deepfake AI tools and illegal services like pregnancy surrogacy and teen prostitution.

    The ‘pig butchering’ scams, involving romance and investment fraud, have evolved into the most profitable cybercrime, generating approximately $10 billion annually from US victims alone. By providing money-laundering services to these criminal networks, platforms like Tudou Guarantee and Xinbi Guarantee have expanded exponentially.

    Source: WIRED

  • FCC Bans Foreign Drones: Implications for Tech Giant DJI

    This article was generated by AI and cites original sources.

    The Federal Communications Commission (FCC) has recently implemented a ban on the import of new drones from foreign countries to the US, unless recommended by the Department of Defense or the Department of Homeland Security. This move has major implications for tech giant DJI, the world’s largest drone manufacturer.

    The FCC’s action has placed drones on its Covered List, designating foreign-made drones and drone parts, including those from DJI, as communication equipment posing ‘unacceptable risks to the national security of the United States and to the safety and security of U.S. persons.’

    In response, DJI’s head of global policy, Adam Welsh, expressed disappointment, stating that while DJI was not specifically targeted, no clear information has been provided regarding the basis for the decision. Welsh emphasized DJI’s commitment to the US market, assuring that existing products can still be used as usual.

    Other entities on the FCC’s list include Kaspersky anti-virus software and telecommunication equipment from Huawei and ZTE. The FCC’s move follows a National Security Determination received on December 21st, highlighting concerns that foreign-produced ‘uncrewed aircraft systems’ and critical components could enable surveillance, data breaches, and malicious activities over US territory.

    For current owners of foreign-made drones, the FCC assures that existing drones can continue to be used without interruption.

    Source: The Verge

  • Verifying Authenticity: Analyzing Misleading Video in DOJ Epstein Files

    This article was generated by AI and cites original sources.

    In a recent release of Jeffrey Epstein files by the Department of Justice (DOJ), an unlabeled video circulating on social media purportedly showing Epstein’s suicide in his prison cell has raised questions about its authenticity. The video, despite its claims, did not originate from the DOJ itself but was found on the dark web by an individual named Ali Kabbaj, who sent it to federal investigators for verification in 2021 without receiving a response.

    Referred to as ‘rendering 3D graphics’ by the uploader, the video’s link on the DOJ’s website is now broken, with the footage resembling one uploaded on YouTube in 2019. This incident underscores the challenges of verifying multimedia content in the digital age, especially when it comes to sensitive and controversial subjects.

    While the DOJ’s Office of the Inspector General previously confirmed the absence of a video camera in Epstein’s cell during his time in prison, the circulation of misleading videos like this highlights the importance of digital forensics and verification processes in ensuring the authenticity of visual evidence.

    Source: WIRED

  • Securing Sensitive Data: Lessons from the Epstein Files Release

    This article was generated by AI and cites original sources.

    The recent release by the Justice Department of additional data sets related to Jeffrey Epstein highlights the growing importance of data transparency and security measures in the digital age. The new materials, which include hundreds of photographs and court records, are part of the ongoing efforts to comply with the Epstein Files Transparency Act.

    While the focus of the release is on the content of the files, the underlying technology facilitating this disclosure is worth noting. The digital storage and dissemination of sensitive information, such as court records and images, require robust cybersecurity protocols to safeguard against unauthorized access or tampering.

    As WIRED continues to analyze the contents of the released files, the tech community is reminded of the critical role technology plays in ensuring transparency, accountability, and trust in handling such sensitive data. The ability to securely store, share, and analyze vast amounts of information is a pivotal aspect of modern governance and legal procedures.

    This development underscores the need for ongoing discussions on data privacy, encryption standards, and secure data management practices in both public and private sectors. The intersection of law, technology, and ethics in handling digital information remains a pressing issue that demands continuous attention and innovation.

    Source: WIRED

  • Cybercriminals Exploit PornHub Vulnerabilities, Exposing User Data

    This article was generated by AI and cites original sources.

    Recent security breaches have highlighted the vulnerability of online platforms, with hackers targeting millions of PornHub users’ data for extortion. The hacker collective known as the Com, specifically the subgroup ShinyHunters, managed to steal over 200 million records of PornHub premium users, including email addresses and site usage histories. This incident underscores the pressing need for enhanced cybersecurity measures to safeguard user information on popular websites.

    The sophistication of cybercriminal tactics, such as exploiting vulnerabilities in online platforms to access sensitive user information, demonstrates the ongoing arms race between hackers and cybersecurity professionals. This breach serves as a stark reminder of the importance of robust data protection and encryption protocols in the digital age, as individuals increasingly rely on online services for various activities.

    Companies must continuously assess and strengthen their cybersecurity frameworks to mitigate the risks posed by malicious actors and safeguard user privacy. For tech enthusiasts and industry professionals, this breach highlights the ongoing challenges in maintaining digital security and the critical role of effective cybersecurity measures.

    Source: WIRED

  • Chinese Hackers Exploit Cisco Vulnerability, Putting Hundreds of Customers at Risk

    This article was generated by AI and cites original sources.

    Cisco has disclosed that a group of hackers backed by the Chinese government is exploiting a vulnerability in some of its key products, putting its enterprise customers at risk. While the exact number of compromised customers remains undisclosed by Cisco, security researchers have identified potentially hundreds of vulnerable Cisco customers.

    Piotr Kijewski, CEO of the Shadowserver Foundation, a nonprofit that monitors hacking activities, stated that the exposure scale appears to be in the hundreds. The foundation’s ongoing monitoring indicates that the attacks are targeted rather than widespread.

    Shadowserver has been actively tracking the systems exposed to the disclosed vulnerability, officially known as CVE-2025-20393. This zero-day vulnerability, discovered before Cisco could release patches, has impacted numerous systems, with India, Thailand, and the United States showing dozens of affected systems.

    Cybersecurity firm Censys has also reported a limited number of affected Cisco customers, identifying 220 internet-exposed Cisco email gateways as vulnerable targets.

    This event underscores the critical importance of prompt patching and proactive cybersecurity measures for enterprises utilizing Cisco products to mitigate the risk of exploitation by threat actors.

    Source: TechCrunch

  • DOJ’s Epstein Files Release Highlights Tech’s Role in Transparency

    This article was generated by AI and cites original sources.

    The recent publication by the United States Department of Justice of documents related to Jeffrey Epstein has sparked discussion within the tech community about the transparency and technology implications of such disclosures. The release, consisting of nearly 4,000 files, features a mix of photos, handwritten notes, and various materials, but lacks substantial revelations about potential criminal involvement beyond Epstein.

    Divided into four volumes, this initial release has been criticized by Democratic lawmakers for falling short of fully meeting the requirements set by the Epstein Files Transparency Act. The included documents offer insights into Epstein’s associations, including images of him, Ghislaine Maxwell, and notable figures like former President Bill Clinton, albeit without significant new incriminating information.

    Of particular interest is the digital aspect of the release, with 3,158 images depicting the interiors of Epstein’s properties, providing a glimpse into his lifestyle and connections. The presence of a painting of Bill Clinton in unconventional attire has caught attention, highlighting the role of technology in disseminating and analyzing such visual data.

    As the DOJ faces scrutiny over the transparency and completeness of these disclosures, questions arise about the timing and contents of potential future releases. Reports from CNN and Fox News shed light on internal challenges and redaction standards applied to sensitive material involving public figures.

    This development underscores the evolving landscape of transparency in the digital age and the role of technology in scrutinizing and interpreting released information.

    Source: WIRED

  • Cybersecurity Breaches Expose Vulnerabilities in 2025

    This article was generated by AI and cites original sources.

    In 2025, the cybersecurity landscape was marked by a series of high-profile data breaches and cyberattacks that highlighted the ongoing vulnerabilities in both government and corporate systems. This analysis from TechCrunch provides insights into the evolving cybersecurity threats and trends shaping the digital realm.

    Throughout the year, various security incidents unfolded, underscoring the need for stronger cybersecurity measures. Notable events included:

    • A cyberattack from Chinese hackers targeted the U.S. Treasury, exposing critical security gaps.
    • Multiple federal agencies, including the agency responsible for safeguarding U.S. nuclear weapons, fell victim to data breaches.
    • Russian hackers infiltrated the U.S. Courts’ filing system, raising concerns about data integrity and confidentiality.
    • The largest data breach in U.S. government history occurred due to the actions of DOGE, a department led by Elon Musk under the Trump administration, highlighting the risks associated with non-compliance and inadequate security measures.

    As cybersecurity threats continue to escalate in complexity and magnitude, organizations face mounting pressure to fortify their defenses and prioritize data protection. The events of 2025 serve as a stark reminder of the critical importance of robust cybersecurity practices in safeguarding digital assets and maintaining public trust.

    Source: TechCrunch

  • Cybersecurity Breach at DXS International Raises Concerns for Healthcare Technology Security

    This article was generated by AI and cites original sources.

    DXS International, a prominent U.K.-based healthcare technology provider for England’s National Health Service (NHS), recently disclosed a concerning cybersecurity incident. The company identified a data breach affecting its office servers on December 14, which was promptly contained with the assistance of NHS and cybersecurity experts. While the breach had minimal impact on the company’s services, the extent and nature of the incident are still under investigation.

    Notably, a ransomware group named DevMan claimed responsibility for the breach, boasting about stealing 300 gigabytes of data from DXS International. The company has taken the necessary steps to notify authorities, including the UK’s Information Commissioner’s Office (ICO), about the security breach.

    DXS International’s chief operating officer, Steven Bauer, refrained from providing further details, aligning with the company’s public statement. The ICO is actively evaluating the information shared by DXS, emphasizing the importance of understanding the implications of such data breaches on healthcare technology security.

    Source: TechCrunch

  • ICE Expands Cybersecurity Efforts to Monitor Employees and Collect Digital Data

    This article was generated by AI and cites original sources.

    Immigration and Customs Enforcement (ICE) is in the process of renewing a cybersecurity contract aimed at enhancing employee monitoring and digital data collection within the agency. The initiative, called Cyber Defense and Intelligence Support Services, emphasizes network monitoring, incident response, and security protocols.

    While ICE presents this effort as routine security enhancement, recent contract records reveal a deeper focus on expanding the collection of digital logs and device data for internal investigations and law enforcement purposes. The move comes as the Department of Homeland Security intensifies leak investigations and tightens scrutiny on employee system usage.

    The contract outlines comprehensive surveillance measures, including constant monitoring of ICE networks, automated alerts for suspicious activities, and in-depth analysis of digital logs from various devices. Importantly, the data collected is to be meticulously stored and organized to facilitate incident reconstruction for security reviews or investigations.

    Managed by ICE’s Office of the Chief Information Officer, the cybersecurity operation extends beyond mere security functions, aiming to integrate cyber findings with investigative units such as Homeland Security Investigations and ICE’s Office of Professional Responsibility. This integration streamlines the utilization of data in internal casework and oversight activities.

    Source: WIRED