Dan Cooper, Benjamin Haley, Deon Govender, Ahmed Mokdad, and Mosa Mkhize of Covington and Burling write: On April 7, 2025, South Africa’s Information Regulator announced a new requirement for organizations to report data breaches—referred to under local law as “security compromises”—via an online eServices Portal. The announcement marks a significant procedural shift in how companies must comply with…
BakerHostetler’s 2025 Data Security Incident Response Report Finds Less Malware Used in 2024
BakerHostetler has released its 2025 Data Security Incident Response Report. This year, their annual report is based on their involvement in 1,250 data security cases. Some of The Key Findings: Companies are starting to win the battle against ransomware. Successful attacks are fewer. Time to restore is faster. Payments are lower. Forensic investigation costs dropped dramatically, marking a…
4chan hacked, internal data leaked on rival image board
Mikael Thalen reports: The notorious imageboard 4chan is currently inaccessible after hackers appear to have leaked internal data from the website. In a post on Monday evening to the rival imageboard soyjack.party, an anonymous user claimed that a hacker was able to leak website code and the personal information of staff after being in 4chan’s…
The Most Dangerous Hackers You’ve Never Heard Of
Andy Greenberg, Matt Burgess, and Lily Hay Newman of WIRED report: Made possible through partnership with ThreatLocker Ransomware gangs, email scammers, state-sponsored spies: hacking groups come in all shapes and sizes. There are some we write about quite a bit here at WIRED, who through some combination of audacity, incompetence, or geopolitical importance—or some combination…
China accuses US of launching ‘advanced’ cyberattacks, names alleged NSA agents
Laurie Chen, Farah Master and Liz Lee report: China accused the United States National Security Agency (NSA) on Tuesday of launching “advanced” cyberattacks during the Asian Winter Games in February, targeting essential industries. Police in the northeastern city of Harbin said three alleged NSA agents to a wanted list and also accused the University of…
The art of restraint: why not every system should be owned
Jesse William McGraw writes: Greetings, reader! I want to talk about my former life as a blackhat hacker because it never makes any sense. Many of my rampant hacking campaigns focused on breaking into big servers across several industries but not on seizing the networks by the throat and forcing them to their knees. I…