Science and Technology

The hacker world’s most pressing news

08.11.24
Hackers have invaded Las Vegas! But don’t fret—they were invited. OK, maybe fret a little.

For tens of thousands of people in the cybersecurity world, the beginning of August means Black Hat and Defcon, two of the world’s biggest security conferences, which take place back-to-back in Vegas each year. That includes those of us on WIRED’s Security desk, where we’ve sifted through hundreds of talks to bring you the biggest news from this week of vulnerability disclosures, clever hardware hacks, and tales of the internet’s underworlds.

WIRED’s Andy Greenberg is on the ground in Vegas, navigating the hallucinatory casino carpets to attend talks and meet (and drink) with the hacker world in person, while fellow senior reporters Lily Hay Newman and Matt Burgess have been chained to their phones and laptop (not literally, HR!) to get to the bottom of the avalanche of security news that comes out of Black Hat and Defcon.

That is to say, the past week has been a lot. (I doubt most of us have seen sunshine in days.) Which is why I wanted to send you this special-edition newsletter highlighting some of the most pressing stories to emerge from this year’s hacker pilgrimage to the desert. If you want to check out our full coverage of Black Hat and Defcon, just click those links for the full list of stories. Otherwise, check out the major news from this year’s conferences below. And stay safe out there.

Andrew Couts,

Senior Editor, Security & Investigations

USPS Text Scammers Duped His Wife, So He Hacked Their Operation

BY MATT BURGESS | 4-MINUTE READ

The Smishing Triad network sends up to 100,000 scam texts per day globally. One of those messages went to Grant Smith, who infiltrated their systems and exposed them to US authorities.
 

‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections

BY ANDY GREENBERG | 4-MINUTE READ

Researchers warn that a bug in AMD’s chips would allow attackers to root into some of the most privileged portions of a computer—and that it has persisted in the company’s processors for decades.
A Flaw in Windows Update Opens the Door to Zombie Exploits

BY LILY HAY NEWMAN | 3-MINUTE READ

A researcher found a vulnerability that would let hackers strategically downgrade a target’s Windows version to reexpose patched vulnerabilities. Microsoft is working on fixes for the issue.
Watch How a Hacker’s Infrared Laser Can Spy on Your Laptop’s Keystrokes

BY ANDY GREENBERG | 6-MINUTE READ

Hacker Samy Kamkar is debuting his own open source version of a laser microphone—a spy tool that can invisibly pick up the sounds inside your home through a window, and even the text you’re typing.
Flaws in Ubiquitous ATM Software Could Have Let Attackers Take Over Cash Machines

BY LILY HAY NEWMAN | 3-MINUTE READ

Six vulnerabilities in ATM-maker Diebold Nixdorf’s popular Vynamic Security Suite could have been exploited to control ATMs using “relatively simplistic attacks.”
How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards

BY ANDY GREENBERG | 6-MINUTE READ

A team of researchers have developed a method for extracting authentication keys out of HID encoders, which could allow hackers to clone the types of keycards used to secure offices and other areas worldwide.
Inside the Dark World of Doxing for Profit

BY MATT BURGESS | 5-MINUTE READ

From tricking companies into handing over victims’ personal data to offering violence as a service, the online doxing ecosystem is not just still a problem—it’s getting more extreme.

 

ADVERTISEMENT

 

Thanks for reading.

 

Browse more newsletters from WIRED.

Leave a Reply