USANEWSBEST

Business & Finance

Medical Records Stolen As 1 Million Patients Hit By Healthcare Hack

Community Health Center discloses massive patient data breach. getty Update, Feb. 2, 2025: This story, originally published Jan. 31, now includes further expert comments on the cybersecurity challenges facing healthcare providers following this latest medical records breach and a ransomware attack against a major blood donor group in New York. With ransomware attacks reaching record […]

Business & Finance

Kamala Harris’ Campaign Suspected Its iPhones Had Been Hacked. Apple Declined To Help.

The Wiretap is your weekly digest of cybersecurity, internet privacy and surveillance news. To get it in your inbox, subscribe here. (Photo by Kenny Holston-Pool/Getty Images) Getty Images In late October, a week before the presidential election, Kamala Harris’ cybersecurity team called Apple looking for help. A spyware detection tool had flagged anomalies on two […]

Technology

Report: AT&T, Verizon aren’t notifying most victims of Chinese call-records hack

Telecom companies aren’t required to notify customers about every breach. A Federal Communications Commission order in December 2023 adopted a “harm-based notification trigger” in which “notification of a breach to consumers is not required in cases where a carrier can reasonably determine that no harm to customers is reasonably likely to occur as a result […]

Technology

Russia takes unusual route to hack Starlink-connected devices in Ukraine

“Microsoft assesses that Secret Blizzard either used the Amadey malware as a service (MaaS) or accessed the Amadey command-and-control (C2) panels surreptitiously to download a PowerShell dropper on target devices,” Microsoft said. “The PowerShell dropper contained a Base64-encoded Amadey payload appended by code that invoked a request to Secret Blizzard C2 infrastructure.” The ultimate objective […]

Technology

Spies hack Wi-Fi networks in far-off land to launch attack on target next door

While stalking its target, GruesomeLarch performed credential-stuffing attacks that compromised the passwords of several accounts on a web service platform used by the organization’s employees. Two-factor authentication enforced on the platform, however, prevented the attackers from compromising the accounts. So GruesomeLarch found devices in physically adjacent locations, compromised them, and used them to probe the […]