Company Details
wired
526
1,741,803
513
wired.com
285
WIR_1305423
Completed


WIRED Company CyberSecurity Posture
wired.comWIRED is where tomorrow is realized. The WIRED conversation illuminates how technology is changing every aspect of our lives--from culture to business, science to design. The breakthroughs and innovations that we cover lead to new ways of thinking, new connections, and new industries. We introduce you to the people, companies, and ideas that matter.
Company Details
wired
526
1,741,803
513
wired.com
285
WIR_1305423
Completed
Between 650 and 699

WIRED Global Score (TPRM)XXXX

Description: Cybersecurity Alert: Hacker Leaks Data of 2.3 Million Wired.com Users, Claims Larger Condé Nast Breach On December 20, 2025, a hacker operating under the alias "Lovely" leaked what they claim is the personal data of over 2.3 million *Wired.com* users on the newly launched hacking forum *Breach Stars*. The leaked dataset includes full names, email addresses, user IDs, display names, account creation timestamps, and in some cases, last session dates though no passwords or payment information were exposed. The data spans accounts created between 2011 and 2022, with some records showing recent activity, suggesting a breach of a live or archived user database. The hacker accused Condé Nast, *Wired*’s parent company, of neglecting security warnings, stating they had spent a month attempting to alert the company before resorting to the leak. In a provocative message, they threatened to release data from over 40 million additional accounts across Condé Nast’s portfolio in the coming weeks. The leaked breakdown includes records from brands such as *GQ* (994K), *Vogue* (1.9M), *The New Yorker* (6.8M), and *Bon Appétit* (2M), among others. An entry labeled "NIL" with 9.5 million accounts remains unidentified, while smaller segments suggest the breach may involve centralized account infrastructure. Prior to the leak, the hacker had contacted journalists, including *DataBreaches.net*, posing as a security researcher before shifting to threats of public exposure. The method of the breach remains undisclosed, though analysis by *Hackread.com* confirms the legitimacy of the leaked *Wired* data. Condé Nast has yet to issue a public statement confirming or denying the incident. Until an official response is provided, the claims and leaked data remain unverified.
Description: During the Democratic National Convention, a WIRED investigation searched for cell site simulators, potentially used against protesters. No simulators were found, but massive data collection occurred, with signals from nearly 300,000 devices gathered, exposing vulnerabilities. Devices associated with law enforcement and consumer electronics painted a picture of location patterns and posed privacy concerns. The findings underscore the tracking risks inherent in a highly networked society, affecting both law enforcement and civilians during sensitive events.
Description: During the 2024 Democratic National Convention, a device was detected that raised concerns of potential unauthorized surveillance of convention attendees and protesters. Analysis by the EFF indicated that a cell-site simulator was likely used to intercept phone signals. This led to suspicions of privacy invasion and the collection of sensitive data, including call metadata and location information. The legitimacy of the deployment and adherence to warrant requirements remain unclear, casting a shadow on the privacy and security practices surrounding politically charged events.


No incidents recorded for WIRED in 2026.
No incidents recorded for WIRED in 2026.
No incidents recorded for WIRED in 2026.
WIRED cyber incidents detection timeline including parent company and subsidiaries

WIRED is where tomorrow is realized. The WIRED conversation illuminates how technology is changing every aspect of our lives--from culture to business, science to design. The breakthroughs and innovations that we cover lead to new ways of thinking, new connections, and new industries. We introduce you to the people, companies, and ideas that matter.


We're a global technology group focused on innovation and collaboration to create a better future for all. Since 1976, we've been pioneering new technologies and expanding our reach to more people and places. Today, we provide services to over 163 million customers across 16 countries in the Middle

At Mercado Libre, we are transforming the way people buy, sell, advertise, pay, finance, and ship across Latin America. We are the leading e-commerce and fintech company in the region, with a presence in 18 countries and a team of more than 120,000 people. We are one of the best places to work in L
Launched in May 2003, Taobao Marketplace (www.taobao.com) is the online shopping destination of choice for Chinese consumers looking for wide selection, value and convenience. Shoppers choose from a wide range of products and services on Taobao Marketplace, which features hundreds of millions of pro
IndiaMART is India's largest online B2B marketplace, connecting buyers with suppliers across a wide array of industries. IndiaMART provides a platform for Small & Medium Enterprises (SMEs), large enterprises, and individual buyers, helping them access diverse portfolios of quality products. Since 1
OYO is a global platform that aims to empower entrepreneurs and small businesses with hotels and homes by providing full-stack technology products and services that aims to increase revenue and ease operations; bringing easy-to-book, affordable, and trusted accommodation to customers around the worl

At Peraton, we're at the forefront of delivering the next big thing every day. We're the partner of choice to help solve some of the world's most daunting challenges, delivering bold, new solutions to keep people around the world safer and more secure. How do we do it? By thinking differently. We'r
Sohu.com Inc. (NASDAQ: SOHU) is China's premier online brand and indispensable to the daily life of millions of Chinese, providing a network of web properties and community based/web 2.0 products which offer the vast Sohu user community a broad array of choices regarding information, entertainment a

Arrow Electronics (NYSE:ARW) guides innovation forward for thousands of leading technology manufacturers and service providers. With 2024 sales of $27.9 billion, Arrow develops technology solutions that help improve business and daily life. Our broad portfolio that spans the entire technology lands

At Lenskart, we believe that clear vision is fundamental to the personal development and well-being of an individual, and our aim is to build tech-enabled solutions that improve access to affordable and quality ‘Eyewear for All’. We commenced our operations in India as an online business in 2010 and
.png)
Vlad Ionescu and Ariel Herbert-Voss, cofounders of the cybersecurity startup RunSybil, were momentarily confused when their AI tool, Sybil,...
A hacker using the alias “Lovely” is selling nearly 40 million (39,970,158) Condé Nast user records that allegedly belong to the company's...
Law enforcement has more tools than ever to track your movements and access your communications. Here's how to protect your privacy if you...
Fears Mount That US Federal Cybersecurity Is Stagnating—or Worse. Government staffing cuts and instability, including this year's prolonged...
Cybersecurity Insider Newsletter from December 30, 2025.
From university breaches to cyberattacks that shut down whole supply chains, these were the worst cybersecurity incidents of the year.
A hacker has leaked millions of records from Wired and is threatening to release an additional 40 million records stolen from Condé Nast.
Widely known U.S. tech and culture magazine Wired had data from more than 2.3 million website users allegedly exposed on the new Breach...
Hackers have leaked a database containing over 2.3 million WIRED subscriber records, marking a major breach at Condé Nast,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of WIRED is https://www.wired.com/.
According to Rankiteo, WIRED’s AI-generated cybersecurity score is 661, reflecting their Weak security posture.
According to Rankiteo, WIRED currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, WIRED has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, WIRED is not certified under SOC 2 Type 1.
According to Rankiteo, WIRED does not hold a SOC 2 Type 2 certification.
According to Rankiteo, WIRED is not listed as GDPR compliant.
According to Rankiteo, WIRED does not currently maintain PCI DSS compliance.
According to Rankiteo, WIRED is not compliant with HIPAA regulations.
According to Rankiteo,WIRED is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
WIRED operates primarily in the Technology, Information and Internet industry.
WIRED employs approximately 526 people worldwide.
WIRED presently has no subsidiaries across any sectors.
WIRED’s official LinkedIn profile has approximately 1,741,803 followers.
WIRED is classified under the NAICS code 513, which corresponds to Others.
No, WIRED does not have a profile on Crunchbase.
Yes, WIRED maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/wired.
As of January 22, 2026, Rankiteo reports that WIRED has experienced 3 cybersecurity incidents.
WIRED has an estimated 13,457 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach and Vulnerability.
Title: Massive Data Collection During Democratic National Convention
Description: During the Democratic National Convention, a WIRED investigation searched for cell site simulators, potentially used against protesters. No simulators were found, but massive data collection occurred, with signals from nearly 300,000 devices gathered, exposing vulnerabilities. Devices associated with law enforcement and consumer electronics painted a picture of location patterns and posed privacy concerns. The findings underscore the tracking risks inherent in a highly networked society, affecting both law enforcement and civilians during sensitive events.
Type: Data Collection Incident
Attack Vector: Massive data collection
Vulnerability Exploited: Location tracking vulnerabilities
Motivation: Surveillance and data collection
Title: Unauthorized Surveillance at 2024 Democratic National Convention
Description: During the 2024 Democratic National Convention, a device was detected that raised concerns of potential unauthorized surveillance of convention attendees and protesters. Analysis by the EFF indicated that a cell-site simulator was likely used to intercept phone signals. This led to suspicions of privacy invasion and the collection of sensitive data, including call metadata and location information. The legitimacy of the deployment and adherence to warrant requirements remain unclear, casting a shadow on the privacy and security practices surrounding politically charged events.
Type: Surveillance
Attack Vector: Cell-site simulator
Vulnerability Exploited: Phone signal interception
Motivation: Unauthorized surveillance
Title: Wired.com User Data Leak by Hacker 'Lovely'
Description: A hacker using the alias 'Lovely' leaked personal data of over 2.3 million Wired.com users, accusing Condé Nast of ignoring security warnings. The data includes full names, email addresses, user IDs, display names, and account timestamps but no passwords or payment information. The hacker claims access to over 40 million accounts across Condé Nast properties.
Date Publicly Disclosed: 2025-12-20
Type: Data Breach
Threat Actor: Lovely
Motivation: Retaliation for ignored security warnings, potential financial gain (data sold on dark web)
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Location patterns, Device signals

Data Compromised: Call metadata, Location information

Data Compromised: 2,366,576 Wired.com user records; over 40 million records across Condé Nast properties
Systems Affected: Wired.com user database or shared Condé Nast identity platform
Brand Reputation Impact: Potential damage to Condé Nast and Wired.com reputation
Legal Liabilities: Potential regulatory violations (e.g., GDPR, CCPA)
Identity Theft Risk: High (exposed PII like names and email addresses)
Payment Information Risk: None (no payment data exposed)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Location Patterns, Device Signals, , Call Metadata, Location Information, , Full Names, Email Addresses, User Ids, Display Names, Account Creation/Update Timestamps, Last Session Dates and .

Entity Name: Democratic National Convention
Entity Type: Event
Industry: Political

Entity Name: Democratic National Convention
Entity Type: Political Event
Industry: Politics

Entity Name: Wired.com
Entity Type: Online Magazine/Website
Industry: Media/Publishing
Location: United States
Size: Large (subsidiary of Condé Nast)
Customers Affected: 2,366,576

Entity Name: Condé Nast (Parent Company)
Entity Type: Media Conglomerate
Industry: Media/Publishing
Location: United States
Size: Enterprise
Customers Affected: Over 40 million (across multiple brands)

Type of Data Compromised: Location patterns, Device signals
Number of Records Exposed: Nearly 300,000 devices
Sensitivity of Data: Medium

Type of Data Compromised: Call metadata, Location information

Type of Data Compromised: Full names, Email addresses, User ids, Display names, Account creation/update timestamps, Last session dates
Number of Records Exposed: 2,366,576 (Wired.com); over 40 million (Condé Nast properties)
Sensitivity of Data: Moderate (PII exposed but no passwords or payment data)
Data Exfiltration: Yes (leaked on hacking forum)
Personally Identifiable Information: Full namesEmail addressesUser IDs

Regulations Violated: Potential GDPR, Potential CCPA,

Lessons Learned: The incident highlights the tracking risks inherent in a highly networked society, affecting both law enforcement and civilians during sensitive events.
Key Lessons Learned: The key lessons learned from past incidents are The incident highlights the tracking risks inherent in a highly networked society, affecting both law enforcement and civilians during sensitive events.

Source: WIRED

Source: EFF Analysis

Source: Hackread.com
Date Accessed: 2025-12-20

Source: DataBreaches.net
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: WIRED, and Source: EFF Analysis, and Source: Hackread.comDate Accessed: 2025-12-20, and Source: DataBreaches.net.

Investigation Status: Completed

Investigation Status: Ongoing (unverified by Condé Nast)

Reconnaissance Period: 1 month (claimed time to convince Condé Nast to fix vulnerabilities)

Root Causes: Massive data collection and location tracking vulnerabilities
Last Attacking Group: The attacking group in the last incident was an Lovely.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-12-20.
Most Significant Data Compromised: The most significant data compromised in an incident were Location patterns, Device signals, , Call metadata, Location information, , 2,366 and576 Wired.com user records; over 40 million records across Condé Nast properties.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Call metadata, 2,366,576 Wired.com user records; over 40 million records across Condé Nast properties, Location information, Location patterns and Device signals.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 42.7M.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was The incident highlights the tracking risks inherent in a highly networked society, affecting both law enforcement and civilians during sensitive events.
Most Recent Source: The most recent source of information about an incident are EFF Analysis, WIRED, DataBreaches.net and Hackread.com.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Completed.
Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was 1 month (claimed time to convince Condé Nast to fix vulnerabilities).
.png)
Backstage is an open framework for building developer portals, and @backstage/backend-defaults provides the default implementations and setup for a standard Backstage backend app. Prior to versions 0.12.2, 0.13.2, 0.14.1, and 0.15.0, the `FetchUrlReader` component, used by the catalog and other plugins to fetch content from URLs, followed HTTP redirects automatically. This allowed an attacker who controls a host listed in `backend.reading.allow` to redirect requests to internal or sensitive URLs that are not on the allowlist, bypassing the URL allowlist security control. This is a Server-Side Request Forgery (SSRF) vulnerability that could allow access to internal resources, but it does not allow attackers to include additional request headers. This vulnerability is fixed in `@backstage/backend-defaults` version 0.12.2, 0.13.2, 0.14.1, and 0.15.0. Users should upgrade to this version or later. Some workarounds are available. Restrict `backend.reading.allow` to only trusted hosts that you control and that do not issue redirects, ensure allowed hosts do not have open redirect vulnerabilities, and/or use network-level controls to block access from Backstage to sensitive internal endpoints.
Backstage is an open framework for building developer portals, and @backstage/cli-common provides config loading functionality used by the backend and command line interface of Backstage. Prior to version 0.1.17, the `resolveSafeChildPath` utility function in `@backstage/backend-plugin-api`, which is used to prevent path traversal attacks, failed to properly validate symlink chains and dangling symlinks. An attacker could bypass the path validation via symlink chains (creating `link1 → link2 → /outside` where intermediate symlinks eventually resolve outside the allowed directory) and dangling symlinks (creating symlinks pointing to non-existent paths outside the base directory, which would later be created during file operations). This function is used by Scaffolder actions and other backend components to ensure file operations stay within designated directories. This vulnerability is fixed in `@backstage/backend-plugin-api` version 0.1.17. Users should upgrade to this version or later. Some workarounds are available. Run Backstage in a containerized environment with limited filesystem access and/or restrict template creation to trusted users.
Backstage is an open framework for building developer portals. Multiple Scaffolder actions and archive extraction utilities were vulnerable to symlink-based path traversal attacks. An attacker with access to create and execute Scaffolder templates could exploit symlinks to read arbitrary files via the `debug:log` action by creating a symlink pointing to sensitive files (e.g., `/etc/passwd`, configuration files, secrets); delete arbitrary files via the `fs:delete` action by creating symlinks pointing outside the workspace, and write files outside the workspace via archive extraction (tar/zip) containing malicious symlinks. This affects any Backstage deployment where users can create or execute Scaffolder templates. This vulnerability is fixed in `@backstage/backend-defaults` versions 0.12.2, 0.13.2, 0.14.1, and 0.15.0; `@backstage/plugin-scaffolder-backend` versions 2.2.2, 3.0.2, and 3.1.1; and `@backstage/plugin-scaffolder-node` versions 0.11.2 and 0.12.3. Users should upgrade to these versions or later. Some workarounds are available. Follow the recommendation in the Backstage Threat Model to limit access to creating and updating templates, restrict who can create and execute Scaffolder templates using the permissions framework, audit existing templates for symlink usage, and/or run Backstage in a containerized environment with limited filesystem access.
FastAPI Api Key provides a backend-agnostic library that provides an API key system. Version 1.1.0 has a timing side-channel vulnerability in verify_key(). The method applied a random delay only on verification failures, allowing an attacker to statistically distinguish valid from invalid API keys by measuring response latencies. With enough repeated requests, an adversary could infer whether a key_id corresponds to a valid key, potentially accelerating brute-force or enumeration attacks. All users relying on verify_key() for API key authentication prior to the fix are affected. Users should upgrade to version 1.1.0 to receive a patch. The patch applies a uniform random delay (min_delay to max_delay) to all responses regardless of outcome, eliminating the timing correlation. Some workarounds are available. Add an application-level fixed delay or random jitter to all authentication responses (success and failure) before the fix is applied and/or use rate limiting to reduce the feasibility of statistical timing attacks.
The Flux Operator is a Kubernetes CRD controller that manages the lifecycle of CNCF Flux CD and the ControlPlane enterprise distribution. Starting in version 0.36.0 and prior to version 0.40.0, a privilege escalation vulnerability exists in the Flux Operator Web UI authentication code that allows an attacker to bypass Kubernetes RBAC impersonation and execute API requests with the operator's service account privileges. In order to be vulnerable, cluster admins must configure the Flux Operator with an OIDC provider that issues tokens lacking the expected claims (e.g., `email`, `groups`), or configure custom CEL expressions that can evaluate to empty values. After OIDC token claims are processed through CEL expressions, there is no validation that the resulting `username` and `groups` values are non-empty. When both values are empty, the Kubernetes client-go library does not add impersonation headers to API requests, causing them to be executed with the flux-operator service account's credentials instead of the authenticated user's limited permissions. This can result in privilege escalation, data exposure, and/or information disclosure. Version 0.40.0 patches the issue.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.