Worth Reading: A new way to attack WPA2 weakenesses On August 4, 2018, Jens “Atom” Steube, the lead developer of Hashcat, released a forum post disclosing a new technique that attempts to obtain and crack Wi-Fi Protected Access 2 (WPA2) passwords. —Ryan Morrow @Cisco Related ← Worth Reading: AI for security is a dangerous gambleWorth Reading: Five myths of Silicon Valley →