In recent years, North Korea has deployed thousands of so -called IT workers to infiltrate Western businesses, get salaries and send money back to support government. Since these schemes have become more successful, they have rapidly widely widely widely widely and new tactics to avoid detection.
But this week, the United States Department of Justice revealed its biggest action to deal with IT workers. The DOJ says it has identified six Americans who allegedly helped to enable the schemes and arrested one of them. Law enforcement officials searched 29 “laptop forms” in 16 states and seized more than 200 computers as well as web domains and financial accounts.
Meanwhile, a group of young cybercriminals is causing chaos around the world, causing the grocery stores empty and temporarily droping some flights in the context of their Crapsing Cybertics. After a quiet period in 2024, scattered spider hackers have returned this year and are brutally targeting retailers, insurance and airlines.
Even this week, we have detailed how the LGBTI Q+ organizations in El Salvador are helping workers in chronic attacks against their community and how to protect themselves better than state supervision.
And more. Every week, we prepare for security and privacy news that we did not cover the depth. Click headlines to read full stories. And be safe there.
Cell site simulators, often known as a stingry or IMSI catcher, are some of the most stealthy and powerful monitoring tools to work today. They can submit to devices, which imitate cell towers and intercept communications, call metadata, location information and other traffic on their devices. They have been rapidly used by law enforcement and immigration officials.
However, according to reporting by the Android Authority and ARS Technica, Google has promoted its efforts to tackle potential snaping as a result of upcoming hardware progress. Starting in Android 16, synchronous devices will be able to indicate that when the network device or SIM ID requests device identifiers, and you will issue warnings when you are connected to a non -encrypted cell network. Examples of warnings show that warnings are shown that “calls, messages and data are at risk of intervention” when associated with unsafe networks. There will be notifications when you go back to a encrypted network. An option to activate these notifications appears on the 2G networks option as well as the mobile network security settings on the page, which can help some IMSI catcher connect your device. However, although these settings will be available in Android 16, it may take some time to use the desired hardware to Android devices.
Prior to the presidential election last November, Iran -affiliated hackers attacked Donald Trump’s presidential campaign and stole several emails in a clear bid to affect the election results. Some emails were divided into journalists and the Biden campaigns. This week, after US intervention with the Israeli-Iran conflict and “bunker buster” bombs, hackers behind an email agreement told Reuters that they could disclose or sell stolen emails.
Cyber criminals claimed that they had stolen 100 GB e -mails, including some of the White House Chief of Staff, Susi Willies. The emails allegedly included Lindsay Helgon, Trump’s lawyer, adviser Roger Stone, and adult film star Stormy Daniels. Hackers, who have used Robert’s name, told Reuters that they want to “broadcast the matter”. It is unclear whether they will pursue the risks or not.
In response, US officials claimed that the threat by hackers was a “calculation Sameer campaign” through foreign power. “An anti -foreign anti -foreign threat is threatening to engage, defame and distribute illegal stolen and unverified material,” said Marcy McCartrie, a spokesman for the CyberScure and Infrastructure Security Agency, in a statement.
In the past few years, the Chinese hacker group Salt Typhone has been on a hacking riot against US telecom networks, breaking at least nine firms successfully and accessing American writings and calls. Brett Leaderman, a recently appointed leader of the FBI’s cyber division, told Cyber Scope that Chinese hackers are now “widespread” and has “inactive” in networks. The litter said that these groups were not expelled from the networks, the leader said, because the longer the systems they have in the systems can find more ways to “create destinations”. “Right now, we are focusing on flexibility and obstruction and providing significant support to the victims,” said Leadman.
The Deep Fix Platform that allows people to create unlawful, often illegal, illegal, harmful images without any clothes that are on the rise in recent years. According to the German Publications Der Spiegel reporting, now a former whistleblower and one of the largest so -called “Nodev” apps claim that the service has a budget of a million euros and is planning an aggressive expansion where it will produce unprecedented photographs of celebrities and influencers. According to the report, the alleged extension is a marketing budget of € 150,000 (about $ 176,000)) to promote celebrities and influence images. It states that “more than three dozen people” work for the cloth off, and the post identifies some of the potential operators of the platform. Online exposed documents also revealed customer email addresses. A spokesman who claimed to represent the Cloth off denied that there were more than 30 people as part of the central team and told Der Spiegel that it did not have a budget of multi -million euros.


