Category: Security & Privacy

  • Former DOGE Employee Accused of Stealing Americans’ Social Security Data

    This article was generated by AI and cites original sources.

    A former employee of the Department of Government Efficiency (DOGE), a government agency overseen by Elon Musk, is facing accusations of stealing a significant amount of Americans’ personal data from the U.S. Social Security Administration (SSA). According to a whistleblower complaint reported by The Washington Post, the individual allegedly stored this data on a thumb drive with intentions to utilize it at a new job.

    The report states that the ex-DOGE software engineer informed colleagues at the new workplace about possessing two highly restricted databases containing U.S. citizens’ information. These databases, known as ‘Numident’ and the ‘Master Death File,’ potentially encompass records for over 500 million living and deceased Americans, including sensitive details like Social Security numbers, birth details, citizenship status, race, ethnicity, and parental information.

    Furthermore, the individual claimed to have previously held unrestricted ‘God-level’ access to the SSA’s systems, raising concerns about the potential scope of the breach and its implications.

    The Social Security Administration, still overseen by DOGE, has refuted the allegations of data theft, attributing them to sensationalism and misinformation. The inspector general’s office, an independent entity, is reportedly investigating the matter.

    Source: TechCrunch

  • DHS Reassigns CBP Privacy Officers Amid Concerns Over Surveillance Records

    This article was generated by AI and cites original sources.

    The U.S. Department of Homeland Security (DHS) has recently made significant changes within the Customs and Border Protection (CBP) agency, reassigning top officials amid concerns over record-handling practices related to surveillance technologies. This move comes after objections were raised regarding the mislabeling of government records to prevent their public release under the Freedom of Information Act (FOIA).

    According to WIRED, the DHS took action following disputes over the classification of records, particularly privacy assessments, as ‘drafts’ to avoid disclosure. These actions led to the removal of key individuals responsible for ensuring CBP technologies align with federal privacy regulations. The reshuffling of personnel within the CBP’s privacy and FOIA offices signals a broader conflict over transparency and privacy compliance.

    One notable incident that triggered these changes was the release of a redacted Privacy Threshold Analysis (PTA) related to the Mobile Fortify face recognition app. The PTA revealed details about the app’s data collection practices, including the capture of individuals’ faces and fingerprints without explicit consent.

    The repercussions of these reassignments and the handling of privacy assessments raise questions about the transparency and accountability of government surveillance initiatives. This development underscores the ongoing challenges in balancing security needs with individual privacy rights, especially in the realm of emerging surveillance technologies.

    Source: WIRED

  • GPS Attacks Disrupt Delivery and Mapping Apps: Understanding the Vulnerabilities of Satellite Navigation

    This article was generated by AI and cites original sources.

    Recent disruptions in delivery and navigation apps have left users puzzled as routes suddenly change and locations appear inaccurate. These anomalies are attributed to electronic warfare tactics, particularly in regions near Iran where GPS attacks have become prevalent. While such attacks are commonly used in military conflicts to hinder opponent guidance systems, the repercussions extend beyond the battlefield to civilian services.

    Electronic warfare techniques such as GPS jamming and GPS spoofing are the primary methods employed to disrupt satellite signals. GPS jamming involves overpowering GPS satellite signals with stronger noise signals, rendering navigation and timing systems ineffective. On the other hand, GPS spoofing deceives receivers by providing false location information, creating a different kind of disruption.

    GPS, despite being a vital technology for various sectors like aviation, shipping, and digital services, is susceptible to disruption due to its weak signal transmission from satellites. The ease with which GPS signals can be disrupted highlights the vulnerability of our reliance on satellite-based navigation systems.

    Understanding the intricacies of GPS attacks sheds light on the challenges faced by both military operations and civilian applications that heavily rely on precise location data. As technology continues to advance, securing satellite signals against such attacks becomes increasingly crucial for ensuring the seamless functioning of essential services.

    Source: WIRED

  • U.S. Military Contractor’s iPhone-Hacking Tools Exploited by Russian Spies and Chinese Cybercriminals

    This article was generated by AI and cites original sources.

    Recent revelations by Google have unveiled the utilization of a sophisticated iPhone-hacking toolkit, named ‘Coruna,’ in cyberattacks targeting individuals in Ukraine and China. This toolkit, comprising 23 distinct components, was reportedly developed by U.S. military contractor L3Harris. Originally intended for Western intelligence operations, these tools were later obtained by Russian government operatives and Chinese cybercriminal factions.

    Google’s findings indicate that ‘Coruna’ was initially deployed in precise, covert operations by an undisclosed government client of a surveillance vendor, before falling into the possession of Russian spies who targeted Ukrainian individuals. Subsequently, Chinese hackers employed the toolkit in widespread campaigns aimed at financial theft and cryptocurrency acquisition.

    According to anonymous sources, former employees of L3Harris have confirmed that ‘Coruna’ was developed within the company’s hacking and surveillance technology division, Trenchant. These insiders, speaking under conditions of confidentiality, recognized ‘Coruna’ as an internal component name closely aligned with the company’s iPhone exploitation tools.

    Researchers at mobile cybersecurity firm iVerify, upon scrutinizing ‘Coruna,’ suggested its origin could be traced back to a vendor that supplied such technology to the U.S. government. The intricate technical facets of ‘Coruna’ resonated with these experts, strengthening the hypothesis of its ties to L3Harris.

    Source: TechCrunch

  • Widespread Telecom Hacking Exposes Critical Infrastructure Vulnerabilities

    This article was generated by AI and cites original sources.

    A prominent hacking group linked to China, known as Salt Typhoon, has orchestrated a widespread hacking campaign targeting major phone and internet companies worldwide, including top American telecom giants like AT&T and Verizon. The group’s activities have led to the theft of millions of phone records, particularly those of senior government officials, raising concerns about cybersecurity vulnerabilities in critical infrastructure.

    The hackers have primarily focused on breaching telecom infrastructure by exploiting weaknesses in Cisco routers and commandeering surveillance devices mandated by U.S. law for monitoring communications. These cyber intrusions have enabled China to access sensitive information such as call records, text messages, and voice data from high-profile U.S. targets, prompting cybersecurity experts to recommend the use of end-to-end encryption for secure communications.

    While Salt Typhoon concentrates on telecom espionage, other Chinese-affiliated hacker groups like Volt Typhoon and Flax Typhoon are preparing for potentially disruptive cyberattacks and leveraging botnets of compromised IoT devices for concealing malicious online activities.

    The extensive reach of Salt Typhoon’s hacks extends beyond the U.S., affecting over 200 companies globally and highlighting the persistent threat posed by cyber adversaries to international telecommunications networks.

    Source: TechCrunch

  • Russian Government Hackers Targeting Encrypted Messaging Apps, Dutch Intelligence Warns

    This article was generated by AI and cites original sources.

    Dutch intelligence agencies have raised alarms over a significant hacking campaign conducted by Russian government hackers targeting users of Signal and WhatsApp. The campaign is said to particularly focus on government officials, military personnel, and journalists worldwide.

    The Netherlands’ Defence Intelligence and Security Service (MIVD) and the General Intelligence and Security Service (AIVD) disclosed that ‘Russian state actors’ are employing phishing and social engineering tactics, rather than malware, to compromise accounts on the two messaging platforms.

    For Signal users, the hackers are posing as the app’s support team, engaging targets directly with messages about suspicious activities or potential data breaches. Once a target is deceived, the hackers request a verification code sent via SMS, ultimately allowing them to register a new device with a new number, impersonate the target, and potentially access their contacts. Despite victims being locked out of their accounts, they can regain access to chat history by re-registering, potentially overlooking the breach.

    This revelation underscores the persistent security challenges faced by users of encrypted messaging apps and the evolving tactics employed by state-sponsored threat actors to gain unauthorized access to sensitive user data.

    Source: TechCrunch

  • CBP’s Use of Online Ad Data for Phone Tracking Raises Privacy Concerns

    This article was generated by AI and cites original sources.

    Recent reports have revealed that the United States Customs and Border Protection (CBP) utilized online advertising data to track phone locations, raising significant privacy concerns. This practice highlights the evolving landscape of surveillance technology and its implications on individual privacy.

    While the use of online ad data for tracking purposes may have provided CBP with valuable insights, the potential privacy infringements and surveillance capabilities associated with this approach are concerning. The intersection of digital advertising and law enforcement activities underscores the need for robust data protection measures and transparency in surveillance practices.

    Concerns regarding the misuse of personal data and the potential implications for civil liberties have come to the forefront. The utilization of such data highlights the complex relationship between technology, data privacy, and national security.

    As discussions surrounding data privacy and surveillance practices continue, it is essential for policymakers, tech companies, and regulatory bodies to address the ethical and legal implications of utilizing online ad data for tracking purposes.

    Source: WIRED

  • DJI Rewards Hacker for Discovering Security Flaw in 7,000 Robovacs

    This article was generated by AI and cites original sources.

    DJI, a prominent robotics company, has recently faced a security breach involving 7,000 Romo robovacs. The vulnerability was discovered by a man named Sammy Azdoufal, who unintentionally hacked into the robots while trying to control his DJI robot vacuum with a PlayStation gamepad. This incident raised concerns about potential privacy breaches as the hack allowed unauthorized access to video streams from these devices.

    Although DJI had already begun addressing some vulnerabilities prior to Azdoufal’s discovery, the company has now agreed to pay him $30,000 for exposing the security flaw. While the specific details of the payment are not disclosed, DJI has acknowledged rewarding an unnamed security researcher for their findings.

    In response to the breach, DJI has taken steps to address the identified vulnerabilities. The company confirmed that the security observation related to a PIN code loophole has been resolved by late February. Additionally, DJI is working on upgrading the entire system to implement a series of updates within the next month.

    This incident highlights the importance of robust cybersecurity measures in connected devices, especially those that collect sensitive data. As technology continues to advance, ensuring the security and privacy of users should remain a top priority for companies developing such products.

    Source: The Verge

  • Anthropic AI Uncovers 22 Vulnerabilities in Firefox, Highlighting Open Source Security Challenges

    This article was generated by AI and cites original sources.

    In a recent collaboration with Mozilla, Anthropic’s AI system, Claude Opus, identified 22 vulnerabilities in the Firefox browser, with 14 deemed as ‘high-severity.’ This discovery underscores the challenges in maintaining the security of open-source software.

    The findings, detailed in a TechCrunch report, were promptly addressed in the latest Firefox 148 release, highlighting the critical role of AI in enhancing software security.

    Anthropic’s team utilized Claude Opus 4.6 for a focused two-week effort, initially examining the JavaScript engine before expanding their review to other sections of the Firefox codebase. While the vulnerabilities were identified in a codebase known for its robust testing and security standards, the discovery emphasizes the ongoing need for vigilance in open-source projects.

    Interestingly, while Claude Opus excelled in pinpointing vulnerabilities, attempts to create proof-of-concept exploits were less successful, with only two successful outcomes after a $4,000 investment in API credits.

    This discovery underscores the growing significance of AI tools in fortifying open-source projects against potential threats, despite the inherent challenges they may introduce, such as an influx of erroneous merge requests.

    Source: TechCrunch

  • Healthcare Data Breach Exposes Personal Information of 3.4 Million Individuals

    This article was generated by AI and cites original sources.

    Healthcare technology provider TriZetto has confirmed a significant data breach where the personal and health information of over 3.4 million individuals was compromised in 2024. The breach, which went undetected for almost a year, has raised concerns about data security in the healthcare sector.

    TriZetto, a subsidiary of Cognizant, serves around 200 million people and 875,000 healthcare providers in the U.S. Its platform assists doctors and healthcare providers in processing patients’ insurance for medical services.

    The stolen data includes sensitive details such as patients’ names, dates of birth, addresses, Social Security numbers, as well as healthcare-specific information like provider details, demographic data, and insurance details. The breach was identified in October 2025, with unauthorized access traced back to November 2024.

    Cognizant stated that the threat to its systems has been neutralized, but the delay in detecting the breach remains unexplained. Several organizations, including OCHIN, a healthcare technology provider to hundreds of care facilities, have confirmed data compromises.

    Source: TechCrunch

  • Hacking Consumer Security Cameras: A New Frontier in Modern Warfare

    This article was generated by AI and cites original sources.

    In the realm of modern warfare, the traditional tools of surveillance have expanded to include an unexpected asset: consumer security cameras. Recent research highlighted by the Tel Aviv-based security firm Check Point has revealed a surge in hacking attempts targeting everyday security cameras across the Middle East, particularly during critical missile and drone strikes in the region.

    These hacking efforts, believed to be orchestrated by Iranian state hackers, indicate a concerning trend where civilian surveillance devices are being leveraged by militaries to identify targets, strategize attacks, and evaluate the aftermath of military actions. Notably, Iran, Israel, Russia, and Ukraine have all been implicated in utilizing hacked security cameras for military surveillance purposes, signaling a shift towards a new form of reconnaissance in warfare.

    Iran’s adoption of this surveillance tactic echoes similar actions by other nations. Reports have surfaced of the Israeli military gaining access to Tehran’s traffic cameras to facilitate a targeted air strike, underscoring the evolving landscape of cyber-enabled military operations. Additionally, Ukraine has long raised alarms about Russia’s exploitation of civilian cameras for intelligence gathering, prompting reciprocal hacking efforts by Ukrainian hackers to monitor troop movements and potential threats.

    As armed forces worldwide capitalize on the vulnerabilities of networked consumer cameras, the act of hacking these devices has become a standard practice in military operations. This cost-effective strategy provides a remote vantage point for military planners, enabling them to surveil distant targets efficiently and discreetly.

    Source: WIRED

  • Spyware Scandal in Italy: Prosecutors Confirm Journalist Hacked with Paragon Software

    This article was generated by AI and cites original sources.

    Italian authorities have confirmed that a journalist, Francesco Cancellato, was hacked with Paragon spyware, shedding light on a wider spyware scandal in Italy. The spyware attack, which also targeted immigration activists Giuseppe Caccia and Luca Casarini, was identified through a technical report that revealed traces of infection on their phones. The report indicated a coordinated effort, suggesting a comprehensive infection campaign.

    This revelation marks the first independent verification of Cancellato’s hack, following alerts received in early 2025 regarding the use of Paragon spyware against journalists and civil society members. While Italian judicial authorities uncovered operations against Caccia and Casarini, no evidence of an operation against Cancellato was found previously.

    The source of the hack remains unknown, adding to the intrigue surrounding this spyware scandal. The involvement of Paragon Solutions, an Israeli-based company now under American ownership, underscores the international dimensions of cybersecurity threats faced today.

    As investigations continue, the case highlights the persistent challenges posed by sophisticated spyware technologies and the importance of robust cybersecurity measures in safeguarding sensitive information.

    Source: TechCrunch

  • FBI Investigates Breach in Wiretap and Surveillance Systems: Implications for National Security

    This article was generated by AI and cites original sources.

    Recent reports have surfaced regarding a breach in the FBI’s networks, specifically targeting a system used for managing wiretaps and foreign intelligence surveillance warrants. According to CNN, hackers successfully infiltrated these critical systems, prompting an ongoing investigation by the FBI.

    While details remain scarce due to the sensitive nature of the incident, a bureau spokesperson confirmed the detection of suspicious activities and assured the public of a comprehensive technical response. This breach adds to a series of cyber intrusions targeting U.S. government entities and corporations in recent times.

    Noteworthy breaches include Chinese hackers compromising the U.S. Treasury and the National Nuclear Security Administration, along with Russian hackers gaining access to sealed records from the U.S. Courts’ filing system. Additionally, the FBI has attributed a series of intrusions to the Chinese government hacking group Salt Typhoon, affecting over 200 U.S. companies, including major telecommunications providers.

    These incidents underscore the critical importance of fortifying cybersecurity measures within government agencies and private enterprises to safeguard sensitive information and uphold national security protocols.

    Source: TechCrunch

  • Surge in Zero-Day Attacks Targeting Enterprise Technologies in 2025, Google Reports

    This article was generated by AI and cites original sources.

    According to a recent report by Google, a significant portion of zero-day vulnerabilities identified in 2025 were aimed at exploiting enterprise technologies, particularly security and networking devices used by large corporations. These zero-day exploits, which are vulnerabilities unknown to software makers at the time of exploitation, targeted crucial devices like firewalls, VPNs, and virtualization platforms.

    Google’s findings indicate that 48% of the tracked zero-days focused on technologies utilized by businesses, with a notable emphasis on security and networking equipment. Leading vendors such as Cisco, Fortinet, Ivanti, and VMware were among the prime targets for malicious hackers seeking to breach corporate networks.

    Hackers leveraged common vulnerabilities like input validation and incomplete authorization processes to bypass firewall and VPN defenses, highlighting the importance of prompt software updates to mitigate such risks. Additionally, the report highlighted specific incidents, such as the Clop extortion gang’s campaign against Oracle E-Business Suite customers, resulting in the compromise of sensitive human resources data from various organizations.

    The remaining 52% of zero-day vulnerabilities affected consumer and end-user products, with operating systems and mobile devices facing an increased number of exploits compared to previous years. This escalation in zero-day attacks underscores the critical need for robust cybersecurity measures across both enterprise and consumer technology landscapes.

    Source: TechCrunch

  • Meta Faces Lawsuit Over AI Smart Glasses Privacy Concerns

    This article was generated by AI and cites original sources.

    Meta, the tech company behind AI smart glasses, is facing a privacy lawsuit following revelations that subcontractors were reviewing footage containing sensitive content like nudity and intimate moments, raising significant privacy concerns.

    An investigation revealed that workers at a Kenya-based subcontractor were accessing footage from customers’ glasses, including instances of nudity, sexual activities, and private moments. Despite Meta’s claims of blurring faces in images, reports suggest that this feature did not consistently protect users’ privacy.

    The UK’s Information Commissioner’s Office has launched an investigation into the matter, and now Meta faces legal action in the US. The lawsuit alleges that Meta misled consumers by promising privacy and control over shared footage, while failing to disclose that overseas workers were reviewing potentially intimate content.

    Represented by the Clarkson Law Firm, plaintiffs Gina Bartone and Mateo Canu argue that Meta’s advertising, such as ‘designed for privacy, controlled by you,’ created false expectations regarding the protection of users’ privacy. The lawsuit accuses Meta and its manufacturing partner Luxottica of America of violating consumer protection laws.

    With over seven million people expected to own Meta’s smart glasses by 2025, concerns are raised about the scale of potential privacy violations as users’ footage is routinely reviewed without an opt-out option. Meta explained that contractors review shared content to enhance user experience, as outlined in its privacy policy.

    Source: TechCrunch

  • TikTok Opts Against End-to-End Encryption for User Safety

    This article was generated by AI and cites original sources.

    TikTok has announced that it will not be implementing end-to-end encryption for direct messages (DMs) on its platform, as reported by the BBC. The social media company cited concerns that such encryption could compromise user safety by hindering access for police and safety teams when necessary.

    By opting out of end-to-end encryption, TikTok aims to prioritize user protection, especially among younger demographics, to prevent potential harm. The company assured that DMs are still safeguarded with standard encryption protocols similar to those used by services like Gmail. Access to direct messages is restricted to authorized personnel and is subject to specific conditions, such as responding to legitimate law enforcement requests or user reports of harmful activities.

    While end-to-end encryption is commonly employed by popular apps such as Signal, WhatsApp, and Apple’s Messages, TikTok’s stance on this technology raises questions about the balance between user privacy and platform safety.

    Source: TechCrunch

  • Congress Investigates Vulnerability of Computers to Espionage Techniques

    This article was generated by AI and cites original sources.

    U.S. lawmakers are raising concerns about the susceptibility of computers to espionage techniques that exploit electromagnetic and acoustic leaks, known as side-channel attacks. The National Security Agency’s spying technique, codenamed TEMPEST, has resurfaced as a topic of interest for Senators Ron Wyden and Representative Shontel Brown.

    Side-channel attacks capitalize on the unintentional emanations from electronic devices, such as radio waves, sound, and vibrations, to intercept private data and activities. Despite being a longstanding issue in computer security, the potential risks posed by these attacks on public and classified information have prompted the call for a thorough investigation.

    Wyden and Brown have requested the Government Accountability Office to assess the vulnerability of modern computers to TEMPEST-style surveillance and evaluate the need for enhanced protective measures by device manufacturers. Their initiative aims to address the broader implications of side-channel attacks, emphasizing the importance of safeguarding critical technologies from potential exploitation by adversaries.

    Accompanying their inquiry is a Congressional Research Service report shedding light on the historical context of TEMPEST and its contemporary relevance in the realm of cybersecurity. The report underscores the significance of understanding and mitigating the risks associated with side-channel attacks to uphold national security interests.

    Source: WIRED

  • Law Enforcement Shuts Down LeakBase, a Major Cybercriminal Forum for Stolen Passwords and Hacking Tools

    This article was generated by AI and cites original sources.

    Law enforcement agencies in the U.S. and Europe have successfully taken down LeakBase, a prominent online platform used by cybercriminals to illicitly share stolen passwords and hacking tools. The site, which had over 142,000 members and 215,000 messages exchanged among users, had been in operation since 2021, amassing a vast collection of breached databases containing millions of compromised account credentials, credit card details, and banking information.

    This recent crackdown is part of a broader effort to combat platforms facilitating the trade of pilfered login details, which are frequently used in unauthorized access to individuals’ accounts for data and cryptocurrency theft. Europol confirmed global enforcement actions against approximately 100 entities, with specific measures taken against the top 37 active participants on the forum. The FBI, in a decisive move, assumed control over LeakBase’s domain, effectively halting its operations and leading to the preservation of the forum’s contents and user data.

    Source: TechCrunch

  • Endor Labs Unveils AURI: Enhancing AI Coding Security Amid Concerns

    This article was generated by AI and cites original sources.

    Endor Labs, a prominent application security startup, has launched AURI, a platform that integrates real-time security intelligence into AI coding tools to revolutionize software development. AURI is now freely accessible to individual developers and seamlessly integrates with popular AI coding assistants like Cursor, Claude, and Augment through the Model Context Protocol (MCP).

    The launch of AURI follows a recent study revealing that while AI coding assistants are increasingly utilized, only 10% of the generated code is both functional and secure. Endor Labs CEO Varun Badhwar emphasized the critical need for secure coding practices, highlighting the gap between functional and secure code as the market AURI aims to address.

    AURI’s key innovation lies in its ‘code context graph,’ offering a detailed map of application components, dependencies, and AI model interactions. This approach sets AURI apart from competitors by providing precise code usage insights down to individual lines, enhancing vulnerability detection and remediation.

    Through deterministic analysis and AI reasoning, AURI significantly reduces security findings for enterprise customers, streamlining vulnerability management and enhancing developer productivity. Endor Labs’ offering includes a free tier for individual developers and a premium enterprise version with advanced customization and policy features.

    Endor Labs emphasizes the importance of independence in security review, challenging the trend of AI model providers incorporating security features directly into coding tools. The company advocates for separate security tools to ensure consistent, evidence-backed findings and effective vulnerability remediation.

    Endor Labs’ AURI has already demonstrated remarkable capabilities, identifying zero-day vulnerabilities and actively detecting malware campaigns. With substantial financial backing and a growing customer base, Endor Labs is positioned to lead the charge in enhancing application security and compliance with industry standards.

    Source: VentureBeat

  • Cyber Warfare in Action: How Hacked Cameras and Hijacked Broadcasts Supported Military Operations Against Iran

    This article was generated by AI and cites original sources.

    Recent reports have shed light on the significant role that cyber operations played in supporting the military campaign against Iran. U.S. and Israeli forces engaged in a coordinated bombing campaign targeting key Iranian figures and locations, and cyber operations were instrumental in disrupting communications, facilitating surveillance, and conducting psychological operations during the conflict.

    General Dan Caine, chairman of the joint chiefs of staff, acknowledged the impact of coordinated cyber operations in disrupting Iran’s networks prior to the attacks, impairing the enemy’s ability to communicate effectively. This highlights the evolving nature of warfare, where cyber capabilities are increasingly integrated with traditional military actions.

    One notable instance involved Israel leveraging cyber tactics alongside kinetic strikes, targeting Iranian state-owned broadcasting channels. By hijacking broadcasts and airing speeches from political leaders, Israel aimed to influence Iranian sentiment and encourage opposition to the regime.

    Furthermore, Israeli intelligence reportedly utilized data from hacked traffic cameras in Tehran to aid in targeting Iran’s supreme leader. The infiltration of surveillance systems and mobile networks underscores the strategic importance of cyber capabilities in modern conflicts.

    These developments underscore the expanding role of cyber operations in military strategies, blurring the lines between physical and digital warfare. As nations continue to invest in cyber capabilities, the integration of technology in warfare is likely to become more pronounced.

    Source: TechCrunch