Eight years after a researcher warned WhatsApp that it was doable to extract person telephone numbers en masse from the Meta-owned app, one other crew of researchers discovered that they may nonetheless do precisely that utilizing an identical approach. The problem stems from WhatsApp’s discovery characteristic, which permits somebody to enter an individual’s telephone quantity to see in the event that they’re on the app. By doing this billions of instances—which WhatsApp didn’t forestall—researchers from the College of Vienna uncovered what they’re calling “probably the most intensive publicity of telephone numbers” ever.
Vaping is a serious downside in US excessive faculties. However is the answer to spy on college students within the toilet? An investigation by The 74, copublished with WIRED, discovered that faculties across the nation are turning to vape detectors in an effort to crack down on nicotine and hashish consumption on faculty grounds. A number of the vape detectors go far past detecting vapor by together with microphones which might be surprisingly correct and revealing. Whereas few defend habit and drug use, even non-vapers say the added surveillance and the punishments that outcome go too far.
Don’t look now, however that outdated networking gear your organization hasn’t thought of in years could leap out and chunk you. Tech big Cisco this week launched a brand new initiative, warning firms that AI instruments are making it more and more easy for attackers to search out vulnerabilities in outdated and unpatched networking infrastructure. The message: Improve or else.
When you’ve ever attended a convention, you most likely anxious about getting sick within the cesspools which might be a convention middle. However one hacker convention in New Zealand, Kawaiicon, invented a novel solution to maintain attendees slightly bit safer. By monitoring the CO2 ranges in every convention room, Kawaiicon’s organizers have been capable of create a real-time air-quality monitoring system, which might inform folks which rooms have been secure and which appeared … gross. The venture brings new that means to antivirus monitoring.
And that’s not all. Every week, we spherical up the safety and privateness information we didn’t cowl in depth ourselves. Click on the headlines to learn the total tales. And keep secure on the market.
The US Border Patrol is working a predictive-intelligence program that screens tens of millions of American drivers far past the border, in keeping with an in depth investigation by the Related Press. A community of covert license-plate readers—typically hidden inside site visitors cones, barrels, and roadside gear—feeds knowledge into an algorithm that flags “suspicious” routes, fast turnarounds, and journey to and from border areas. Native police are then alerted, leading to site visitors stops for minor infractions like window-tint violations, air fresheners, or marginal dashing. AP reviewed police data displaying that drivers have been questioned, searched, and typically arrested regardless of no contraband being discovered.
Inside group chats obtained by public-records requests present Border Patrol brokers and Texas deputies sharing lodge data, rental automobile standing, dwelling addresses, and social media particulars of US residents in actual time whereas coordinating what officers name “whisper stops” to obscure federal involvement. The AP recognized plate-reader websites greater than 120 miles from the Mexican border within the Phoenix space, in addition to places in metropolitan Detroit and close to the Michigan-Indiana line that seize site visitors headed towards Chicago and Gary. Border Patrol additionally faucets DEA plate-reader networks and has, at varied instances, accessed techniques run by Rekor, Vigilant Options, and Flock Security.
CBP says this system is ruled by “stringent” insurance policies and constitutional safeguards, however authorized consultants instructed AP that its scale raises new Fourth Modification considerations. A UC Regulation San Francisco official mentioned the system quantities to a “dragnet” monitoring People’ actions, associations, and every day routines.
Microsoft claims to have mitigated the biggest distributed denial-of-service (DDoS) assault ever recorded in a cloud setting—a 15.72 Tbps, 3.64-billion-pps barrage launched on October 24 in opposition to a single Azure endpoint in Australia. Microsoft says The assault “originated from the Aisuru botnet,” a Turbo-Mirai–class IoT community of compromised dwelling routers, cameras, and different shopper units. Greater than 500,000 IP addresses are mentioned to have participated, producing a large DDoS assault with little spoofing. Microsoft says its world Azure DDoS Safety community absorbed the site visitors with out service disruption. Microsoft described the assault because the “the biggest DDoS ever noticed within the cloud,” emphasizing the only endpoint; nonetheless, Cloudflare additionally lately reported a 22.2 Tbps flood, naming it the biggest DDoS assault ever seen.
Researchers be aware that Aisuru has lately launched a number of assaults exceeding 20 Tbps and is increasing its capabilities to incorporate credential stuffing, AI-driven scraping, and HTTPS floods through residential proxies.
The US Securities and Trade Fee has dropped its remaining claims in opposition to SolarWinds and its CISO, Tim Brown, ending a long-running case over the corporate’s 2020 supply-chain hack, during which Russian SVR operatives allegedly compromised SolarWinds’ Orion software program and triggered widespread breaches throughout authorities and trade. The company’s lawsuit—filed in 2023 and centered on alleged fraud and internal-control failures—had already been largely dismantled by a federal decide in 2024. SolarWinds known as the total dismissal a vindication of its argument that its disclosures and conduct have been acceptable and mentioned it hopes the end result eases considerations amongst CISOs concerning the case’s potential chilling impact.
Regulation enforcement data present that the FBI accessed messages from a personal Sign group utilized by New York immigration court-watch activists—a community that coordinates volunteers monitoring public hearings at three federal immigration courts. In accordance with a two-page FBI/NYPD “joint situational info report” dated August 28, 2025, brokers quoted chat messages, labeled the nonviolent courtroom watchers as “anarchist violent extremist actors,” and circulated the evaluation nationwide. The report didn’t clarify how the FBI penetrated an encrypted Sign group, however it claimed the data got here from a “delicate supply with glorious entry.”
The paperwork, first reported by the Guardian, have been unique obtained by the government-transparency group Property of the Individuals. They describe activists discussing how you can enter courtrooms, movie officers, and collect figuring out particulars of federal personnel, however present no proof to help the FBI’s allegation {that a} member beforehand advocated violence. A separate set of data—additionally obtained by the group—exhibits the bureau framed abnormal statement of public immigration hearings as a possible risk, whilst Immigration and Customs Enforcement has escalated courthouse arrests and set what advocates name “deportation traps.” Civil liberties consultants instructed the paper that the surveillance mirrors earlier FBI campaigns focusing on lawful dissent and dangers chilling protected political exercise.
