Internet

WhatsApp identifies dozens of users hacked by Paragon spyware company

Cybersecurity

WhatsApp, used by millions of people around the world, says its users were hacked by the Paragon Solutions spyware company. The World’s Host Marco Werman speaks with John Scott-Railton, a senior researcher at Citizen Lab, about the continuing threat of sophisticated spyware.

Kremlin’s internet crackdown is taking on YouTube

Cybersecurity

This club in the Netherlands offers a much-needed break from technology

Internet

Meet the guy who single-handedly took down North Korea’s internet

Hacking

The company man: US glacial response to Nigeria’s detention of former IRS crypto investigator rankles federal agents

Cybersecurity
Illustration by Megan J. Goff

Inside the i-Soon papers and China’s secret world of hackers-for-hire

Hacking

Newly leaked files from a private Chinese hackers-for-hire company provide a fresh look into China’s “cyber industrial complex” — and it appears to be bigger and more mature than observers had previously imagined. Dina Temple-Raston, host and managing editor of the Recorded Future News podcast “Click Here,” has the story.

Inside of a computer

Countries fear state-sponsored cyberwar

Cybersecurity

Nation-state actors are changing their cyber tactics: China’s Volt Typhoon and Russia’s GRU are engaged in espionage operations, often infiltrating a company’s routers, but the countries are also prepositioning for a conflict later.

Illustration by Megan J. Goff

Threat-hunter says Iran is stepping up the sophistication of its cyberattacks

Cybersecurity

In the months since the Oct. 7 attacks on Israel, Iran has increased its cyber-hacking operations, according to Gil Messing, the chief of staff at Tel Aviv-based Check Point Software. The “Click Here” podcast talks to Messing about the latest.

Blue, gray and white illustration of flys in cage

China’s dominant role in producing hacking bugs

Global Security

The art of hacking has become stealthier and smarter over the years. Chinese hackers can hide the code they use to infiltrate systems worldwide. These include vulnerabilities that attackers can use to sneak into a computer network. Exploits allow them to start stealing data once they are inside. “Click Here’s” Dina Temple-Raston reports on how they can do this.

illustration

Exclusive: Inside an American hunt forward operation in Ukraine

Ukraine

In an interview with Recorded Future News’ podcast “Click Here,” Hartman says the cooperation between the US and foreign partners like Ukraine has become important in the effort to deter Russia’s cyber operations.