hackingSecurityGoogle's Authenticator App Just Got a Handy New 2FA ToolBy Matt BurgessSecurityHacker Group Names Are Now Absurdly Out of ControlBy Andy GreenbergSecurityThe Huge 3CX Breach Was Actually 2 Linked Supply Chain AttacksBy Andy GreenbergSecurityApple’s Macs Have Long Escaped Ransomware. That May Be ChangingBy Lily Hay NewmanSecurityLeak of Top-Secret US Intel Risks a New Wave of Mass SurveillanceBy Dhruv Mehrotra and Andrew CoutsSecurityThe Hacking of ChatGPT Is Just Getting StartedBy Matt BurgessSecurityPopular Chinese Shopping App Pinduoduo Is Laced With MalwareBy Lily Hay NewmanSecurityThe Dangerous Weak Link in the US Food ChainBy Eric GellerIdeasBrace Yourself for a Tidal Wave of ChatGPT Email ScamsBy WIRED IdeasSecurityThe Massive 3CX Supply-Chain Hack Targeted Cryptocurrency FirmsBy Andy GreenbergSecurity‘Vulkan’ Leak Offers a Peek at Russia’s Cyberwar PlaybookBy Andrew Couts and Andy GreenbergSecurityNorth Korea Is Now Mining Crypto to Launder Its Stolen LootBy Andy GreenbergSecurityIndia Shut Down Cell Service for 27 Million During a ManhuntBy Lily Hay NewmanSecurityThe Scorched-Earth Tactics of Iran’s Cyber ArmyBy Arian KhamenehSecurityRing Is in a Standoff With HackersBy Matt Burgess and Andy GreenbergSecurityThis Is the New Leader of Russia's Infamous Sandworm Hacking UnitBy Andy GreenbergSecurityAI-Generated Voice Deepfakes Aren’t Scary Good—YetBy Lily Hay NewmanSecurityA Spy Wants to Connect With You on LinkedInBy Jennifer Conrad and Matt BurgessSecurityChina Is Relentlessly Hacking Its NeighborsBy Matt BurgessSecurityApple Users Need to Update iOS Now to Patch Serious FlawsBy Kate O'FlahertySecuritySecurity News This Week: Sensitive US Military Emails ExposedBy Dhruv Mehrotra and Andrew CoutsBusinessUkraine’s Startups Kept Innovating Through 1 Year of WarBy Lauren GoodeSecurityA New Kind of Bug Spells Trouble for iOS and macOS SecurityBy Matt BurgessSecurityHow to Protect Yourself From Twitter’s 2FA CrackdownBy Matt BurgessMore Stories