malwareSecurityAn Apple Malware-Flagging Tool Is ‘Trivially’ Easy to BypassBy Lily Hay NewmanSecurityPanasonic Warns That Internet-of-Things Malware Attack Cycles Are AcceleratingBy Lily Hay NewmanSecurityMicrosoft’s AI Red Team Has Already Made the Case for ItselfBy Lily Hay NewmanSecurityCriminals Have Created Their Own ChatGPT ClonesBy Matt BurgessSecurityCyberstalkers Win First Amendment Victory in the US Supreme CourtBy Lily Hay NewmanSecurityUpdate Your iPhone Right Now to Fix 2 Apple Zero DaysBy Dhruv Mehrotra and Andrew CoutsSecurityThe Bold Plan to Create Cyber 311 HotlinesBy Eric GellerSecurityAI Is Being Used to ‘Turbocharge’ ScamsBy Matt BurgessSecurityKaspersky Says New Zero-Day Malware Hit iPhones—Including Its OwnBy Lily Hay Newman and Andy GreenbergSecurityMillions of PC Motherboards Were Sold With a Firmware BackdoorBy Andy GreenbergBusinessPegasus Spyware Is Detected in a War Zone for the First TimeBy Vittoria ElliottSecurityThere’s Finally a Way to Secure a Crucial Piece of the CloudBy Lily Hay NewmanSecurityThe Real Risks in Google’s New .Zip and .Mov DomainsBy Lily Hay NewmanSecurityThe Underground History of Russia's Most Ingenious Hacker GroupBy Andy GreenbergSecurityA Mysterious Group Has Ties to 15 Years of Ukraine-Russia HacksBy Lily Hay NewmanSecurityChatGPT Scams Are Infiltrating the App Store and Google PlayBy Lily Hay NewmanSecurityA Mysterious New Hacker Group Is Lurking in Ukraine’s CyberspaceBy Lily Hay NewmanSecurityRussian ‘Ghost Ships’ Identified Near the Nord Stream BlastsBy Matt BurgessSecurityMeta Is Trying to Push Attackers to the BrinkBy Lily Hay NewmanSecurityNSA Cybersecurity Director Says ‘Buckle Up’ for Generative AIBy Lily Hay NewmanSecurityA Security Team Is Turning This Malware Gang’s Tricks Against ItBy Lily Hay NewmanSecurityHacker Group Names Are Now Absurdly Out of ControlBy Andy GreenbergSecurityThe Huge 3CX Breach Was Actually 2 Linked Supply Chain AttacksBy Andy GreenbergSecurityHow ChatGPT—and Bots Like It—Can Spread MalwareBy David NieldMore Stories