The WIRED Guide to Digital Opsec for Teens | WIRED

Protecting your digital privacy isn’t a blanket prescription. Some people are more private by nature, and others prioritize putting themselves out there. But even if you’re a 24/7 streamer, you can still think about your operations security, commonly known as opsec. What can viewers see in your room while you’re streaming? Which people from your life have appeared onscreen? Could viewers figure out where you live from what they can see out your window?

US emergency alert systems down after cyberattack • The Register

Various municipalities have issued near-identical advisories about the attack on the OnSolve CodeRED platform, now owned by Crisis24, which enables residents to receive real-time alerts for emergencies such as weather warnings, missing children, terror threats, and more.

Study concludes cybersecurity training doesn’t work | KPBS Public Media

Some people with training were slightly less likely to click on a phishing lure than the untrained. But some trained people were more likely to click.

Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data | WIRED

With just $800 in basic equipment, researchers found a stunning variety of data—including thousands of T-Mobile users’ calls and texts and even US military communications—sent by satellites unencrypted.

High-performance mice can be used as a microphone to spy on users thanks to AI — Mic-E-Mouse technique harnesses mouse sensors, converts acoustic vibrations into speech | Tom’s Hardware

The processing works like this: the raw audio data is run through digital signal processing using a Wiener Filter, where you can start to hear some information. This is then further cleared up through a neural model, giving the researchers clear audio.

Cyber criminals pull off $1.5 million heist, exploiting Baltimore’s outdated defenses

A cyber heist has cost the city more than $1.5 million after thieves manipulated the city’s electronic Workday system, according to a report released this week by Inspector General Isabel Cumming. The breach allowed cybercriminals to access a vendor’s account, alter bank account information, and redirect payments intended for city work.

Hackers Leverage Google Classroom in Phishing Attack Targeting Over 13,500 Organizations

The operation demonstrated significant scale and coordination, delivering a high volume of emails in just one week. The use of a widely used collaboration tool like Google Classroom allowed the attackers to reach a broad, multi-sector audience with minimal initial effort.

Hackers are looking to steal Microsoft logins using some devious new tricks – here’s how to stay safe | TechRadar

instead of sending victims directly to the site, which would probably get flagged by security solutions and quickly blocked, they used a Microsoft feature called Active Directory Federation Services (ADFS). Companies normally use it to connect their internal systems to Microsoft services.

6 Networking Uses for the Linux nc Command

The netcat tool is quite popular among network administrators. However, it can also serve different purposes for you as a casual Linux user in your day-to-day life. While doing some research, I’ve found some great use cases to play with the nc command.

Pentests once a year? Nope. It’s time to build an offensive SOC

In the real world, adversaries don’t operate in bursts. Their recon is continuous, their tools and tactics are always evolving, and new vulnerabilities are often reverse-engineered into working exploits within hours of a patch release.

So, if your offensive validation isn’t just as dynamic, you’re not just lagging, you’re exposed.