Kim Zetter

Kim Zetter

Creator
0 followers

Kim Zetter is an investigative cybersecurity journalist and author (known for her book on Stuxnet) who provides incisive reporting on cybercrime, espionage, and election security.

Nordic‑Baltic Nations Deploy Offline Card Payments for Essentials
SocialApr 13, 2026

Nordic‑Baltic Nations Deploy Offline Card Payments for Essentials

Nordic/Baltic states are creating system to allow offline card payment purchases for essentials like gas/medicine/food to continue in case of internet/grid outage due to war/cyber/sabotage. Systems supposed to be in place this yr. Announcement last yr: https://t.co/KKJqG76TR9

By Kim Zetter
Lily H. Cuts Through Mythos Hype, Finds Kernels of Truth
SocialApr 11, 2026

Lily H. Cuts Through Mythos Hype, Finds Kernels of Truth

So much breathless hyperbole this week about Anthropic's Mythos, no doubt ignited by genius way the company marketed it with elite access and bold unproven claims. @lilyhnewman does good job examining the hype and where it might also prove to...

By Kim Zetter
Ex‑Trenchant Exec Sold Exploits Amid Depression, Money Woes
SocialApr 9, 2026

Ex‑Trenchant Exec Sold Exploits Amid Depression, Money Woes

Former Trenchant exec who stole exploits from his employer and sold them to Russian broker says he was suffering depression & money troubles when he decided to sell exploits. New info also reveals work he did for Australian intel agency...

By Kim Zetter
Adam Back Refutes Satoshi Claim, Cites Confirmation Bias Warning
SocialApr 8, 2026

Adam Back Refutes Satoshi Claim, Cites Confirmation Bias Warning

Adam Back denies he's Satoshi Nakamoto and also describes how he warned the NYT author against confirmation bias in his research and analysis before he published his story claiming Back is Nakamoto

By Kim Zetter
LinkedIn Silently Harvests Chrome Extension Data
SocialApr 6, 2026

LinkedIn Silently Harvests Chrome Extension Data

Every time you open LinkedIn in a Chrome or Chromium-based browser, covert code silently scans your browser for info about any extensions you've installed, then transmits the info back to LinkedIn and partners. From this, they can glean info about...

By Kim Zetter
US Proposes Runway Operation to Seize 1,000 Pounds Uranium
SocialApr 1, 2026

US Proposes Runway Operation to Seize 1,000 Pounds Uranium

“The U.S. military has given the president a plan to seize nearly 1,000 pounds of highly enriched uranium in Iran that would involve flying in excavation equipment and building a runway for cargo planes to take the radioactive material out”

By Kim Zetter
SIM Swaps Bypass 2FA, Exposing Unprotected Accounts
SocialMar 30, 2026

SIM Swaps Bypass 2FA, Exposing Unprotected Accounts

This hack often occurs 1) if accountholder fails to protect account with two-factor authentication and their credentials get leaked thru an infostealer or 2) account is protected with 2FA but hackers succeed to get accountholder's phone SIM swapped to their...

By Kim Zetter
Google Targets 2029 for Post‑quantum Authentication Rollout
SocialMar 27, 2026

Google Targets 2029 for Post‑quantum Authentication Rollout

Quantum cryptography now has a deadline. Google has announced that it has set 2029 as the year by which it will have migrated authentication services to post-quantum cryptography. Will it win the race to secure against quantum attacks before they...

By Kim Zetter
Apple Silently Patches iOS via Hidden Incremental Updates
SocialMar 27, 2026

Apple Silently Patches iOS via Hidden Incremental Updates

Apple has been installing silent fixes on your devices. These fixes don't require an entire OS update, and they get same version # as previous whole update, but with (a) appended to version #. These silent fixes then get incorporated...

By Kim Zetter
Attack Triggers only via Lithuanian‑registered iPhone Link
SocialMar 27, 2026

Attack Triggers only via Lithuanian‑registered iPhone Link

"the attack would be launched only if I would access the link using an iPhone registered in Lithuania"

By Kim Zetter
Modern Individualism: From Ancient Silence to Self‑Reflection
SocialMar 16, 2026

Modern Individualism: From Ancient Silence to Self‑Reflection

Andreessen: 400 years ago it never would have occurred to anybody to be introspective.... The great men of history didn't sit around doing any of this stuff.... Western civilization had to kind of invent the concept of the individual" Marcus Aurelius:...

By Kim Zetter
UAE's Defense Spend Dwarfs Iran's Attack Budget
SocialMar 13, 2026

UAE's Defense Spend Dwarfs Iran's Attack Budget

Context matters Iran spent: Ballistic missiles: ~$165–330M Drones: ~$11–27M Total: ~$177–360M UAE spent: Ballistic missile defense: ~$1.2–1.52B Drone defense: ~$253–759M Total: ~$1.45–2.28B "UAE spent 5-10x more defending than Iran spent attacking" https://t.co/36WBaQgePE

By Kim Zetter
AI Agents Autonomously Hack Simulated Network, Bypass Security
SocialMar 12, 2026

AI Agents Autonomously Hack Simulated Network, Bypass Security

AI agents told to conduct routine tasks on a simulated corporate network went rogue. "No adversarial prompting was involved. The agents independently discovered vulnerabilities, escalated privileges, disabled security tools, and exfiltrated data." https://t.co/jDjDgPb5rk

By Kim Zetter
Russian Spies Duped Ordinary Europeans Into Delivering Explosives
SocialMar 11, 2026

Russian Spies Duped Ordinary Europeans Into Delivering Explosives

Russian intel recruited ordinary citizens across Europe to post packages to the UK and Poland that turned out to contain explosives. I hadn't heard about this when the couriers were arrested. Now one has spoken about how he was tricked...

By Kim Zetter