Cybersecurity

Meet Antibot4Navalny: the mysterious researchers exposing Russia’s war on truth

Cybersecurity

An anonymous group of researchers known as Antibot4Navalny are striking a blow against Russian disinformation campaigns by finding and identifying them on Twitter, now known as X. And, as Dina Temple-Raston from the “Click Here” podcast reports, publicizing these Kremlin-backed operations has allowed the group to punch way above its weight.

Meet the guy who single-handedly took down North Korea’s internet

Hacking

A wrinkle in time: GPS jamming in Ukraine and its ripple effects

Cyber warfare

The company man: US glacial response to Nigeria’s detention of former IRS crypto investigator rankles federal agents

Cybersecurity
Illustration by Megan J. Goff

Inside the i-Soon papers and China’s secret world of hackers-for-hire

Hacking
Black blue and gray illustration of people coming out of phones

Spyware found on phones in Jordan

Hacking

According to a recent report, dozens of journalists, human rights workers and political activists in Jordan have been targeted with Pegasus spyware over the past few years. It’s one of the most widespread uses of spyware on civil society. Dina Temple-Raston, host and managing editor of the Recorded Future News podcast “Click Here,” has the story.

Inside of a computer

Countries fear state-sponsored cyberwar

Cybersecurity

Nation-state actors are changing their cyber tactics: China’s Volt Typhoon and Russia’s GRU are engaged in espionage operations, often infiltrating a company’s routers, but the countries are also prepositioning for a conflict later.

Illustration by Megan J. Goff

Threat-hunter says Iran is stepping up the sophistication of its cyberattacks

Cybersecurity

In the months since the Oct. 7 attacks on Israel, Iran has increased its cyber-hacking operations, according to Gil Messing, the chief of staff at Tel Aviv-based Check Point Software. The “Click Here” podcast talks to Messing about the latest.

Blue, gray and white illustration of flys in cage

China’s dominant role in producing hacking bugs

Global Security

The art of hacking has become stealthier and smarter over the years. Chinese hackers can hide the code they use to infiltrate systems worldwide. These include vulnerabilities that attackers can use to sneak into a computer network. Exploits allow them to start stealing data once they are inside. “Click Here’s” Dina Temple-Raston reports on how they can do this.

illustration

Exclusive: Inside an American hunt forward operation in Ukraine

Ukraine

In an interview with Recorded Future News’ podcast “Click Here,” Hartman says the cooperation between the US and foreign partners like Ukraine has become important in the effort to deter Russia’s cyber operations.