Inside the story of the US defense contractor who leaked hacking tools to Russia

The former boss of a U.S. hacking tools maker was jailed for selling highly sensitive software exploits to a Russian broker. This is how we first learned of his arrest, reported the story, and some of the unanswered questions we still have.

VPN flaws allowed Chinese hackers to compromise dozens of Ivanti customers, says report

Chinese hackers allegedly broke into the network of an Ivanti subsidiary in 2021. The hackers exploited a backdoor in its VPN product, which allowed the hackers to gain access to 119 other unnamed organizations.

Cellebrite cut off Serbia citing abuse of its phone unlocking tools. Why not others?

Cellebrite, which makes phone unlocking and hacking tools, stopped sales to countries that allegedly abused its tools. But after new allegations in Jordan and Kenya, the company has changed its approach.

Hacking conference Def Con bans three people linked to Epstein

The Def Con hacking conference banned hackers Pablos Holman and Vincenzo Iozzo, as well as former MIT Media Lab director Joichi Ito, from attending the annual conference after their reported connections with Jeffrey Epstein.

Data breach at fintech giant Figure affects close to a million customers

The Figure data breach allowed hackers to steal customer names, dates of birth, physical addresses, phone numbers, and email addresses.

Fintech lending giant Figure confirms data breach

The company said hackers downloaded “a limited number of files” after breaking into an employee’s account. The hacking group ShinyHunters took responsibility for the breach.

Sex toys maker Tenga says hacker stole customer information

The Japanese sex toy maker said a hacker broke into an employee’s inbox and stole customer names, email addresses, and correspondence, including order details and customer service inquiries.

Hackers are using Gemini to target you, Google says

Google says hackers are abusing Gemini to speed up cyberattacks, from target research to post-breach troubleshooting. The risk is faster iteration and model extraction, not brand-new tactics, which can shrink defender response windows.
The post Hackers…

Hacker linked to Epstein removed from Black Hat cyber conference website

Emails published by the Justice Department revealed cybersecurity veteran Vincenzo Iozzo emailed, and arranged to meet, Jeffrey Epstein multiple times between 2014 and 2018.

Hacked, leaked, exposed: Why you should never use stalkerware apps

According to TechCrunch’s ongoing tally, including the most recent data spill involving uMobix, there have been at least 27 stalkerware companies since 2017 that are known to have been hacked, or leaked customer and victims’ data online.