Since the decline of peer-to-peer botnets it's been difficult to track malware infection externally. But smart contract based C2 infrastructure provided us with unique insights into this campaign.
expel.com/blog/clearfa...
Since the decline of peer-to-peer botnets it's been difficult to track malware infection externally. But smart contract based C2 infrastructure provided us with unique insights into this campaign.
expel.com/blog/clearfa...
This really is the article to read.
www.theatlantic.com/magazine/202...
My understanding is the vehicles are seized from the deported and the homes of the deported are used for staging. The article does not mention any of this.
This is the language of pedophiles.
As SBOMs slowly progress at the federal level and in enterprises, the rise of AI coding assistants is fueling optimisticβand, some experts argue, βkind of insaneββclaims about a future with vulnerability-free software.
Check out my latest CyberScoop piece. 1/2
cyberscoop.com/sbom-adoptio...
Why Signalβs post-quantum makeover is an amazing engineering achievement | Ars Technica
https://alecmuffett.com/article/117370
#EndToEndEncryption #PostQuantum #signal
Poster with a gradient blue background. Large text reads βthe web weβve built.β Smaller text says βCelebrating 1 trillion web pages archived.β Pixelated 3D icons of a floppy disk, magnifying glass, cursor arrow, computer window, and others radiate outward from a bright starburst in the center. On the right, text lists event details: βWednesday, October 22, 5β10PM PT. Live stream: 7β8PM PT. 300 Funston Avenue, San Francisco.β The Internet Archive logo appears in the bottom right corner.
π’ The #InternetArchive is celebrating an extraordinary milestone: 1 trillion web pages preserved by the #WaybackMachine. π
Join us!
π Weds, Oct 22
ποΈ IN-PERSON: 5β10 PM PT (SF) ‡οΈ
www.eventbrite.com/e/1626438133...
π» ONLINE: 7β8 PM PT ‡οΈ
www.eventbrite.com/e/1626431011...
#Wayback1T
Fascinating article by @kimzetter.bsky.social about the 2013 Mandiant APT 1 report that revealed the identities of the Chinese PLA threat actors behind the attacks. Q&A with the main report's architect reveals behind-the-scenes details. It's a great read! www.zetter-zeroday.com/how-the-infa...
What are Republicans afraid of that they closed the Peopleβs House instead of facing a public vote?
op: @ericswalwell.bsky.social (via IG)uhh
βNot vicious, or malicious, just de-lovely, and deliciousβ
New rules
How Syrian army officers in final days of war with opposition were duped into 1) disclosing info to fake website about their rank/location and corps/division/brigade and 2) installing phone app that was actually spyware that recorded keystrokes, stole files/photos/call log and spied thru camera/mic
Failures in cybersecurity practices at a software company that helps federal agencies manage investigations and FOIA requests allowed two employees who had previously been convicted of hacking to delete government databases
HEADS-UP! Professor Thomas Rid is a guest buddy on the pod this week. Currently cooking in the lab ππ₯ @ridt.bsky.social
Listen, watch, subscribe!
Apple: bit.ly/3budprob
YouTube: bit.ly/TBP-YT
Spotify: bit.ly/3DH5wEO
And no one in America doubts why he's doing this.
NEW POD ALERT! We cover the NSA director firing, Ivanti's latest 0day screw-up, risks from China's robotics dominance, Microsoft AI finding bootloader vulns. @jags.bsky.social @craiu.bsky.social
PLUS, rave reviews for Bunnie Huang's Black Hat Asia keynote!
securityconversations.com/episode/nsa-...
Thanks again for having me on the Three Buddy (& a Buddy) Problem podcast @ryanaraine.bsky.social @jags.bsky.social & @craiu.bsky.social !
It was great chatting with you about Chinese threat intel, CISA cuts, & spyware that dare not speak its name. Turning this into a musical episode was a fun bonus
Same exact thing for generative AI output.
Speaking at Frontiers of Innovation Day at #SXSW at 1pm - free registration here βοΈ lu.ma/v4a9d6ix?tk=...
this is treason, and should be treated as such
Unsealed documents indicating significant Russian interference in domestic U.S. affairs. The thematic propaganda themes are interesting. Modern technologies in use to spread content & analyze its reach, including psychological operations. www.justice.gov/archives/opa...
NEW POD ALERT: Revisiting the US/Russia cyber stand down order and the diplomatic optics. Plus, a dissection of βThe Lambertsβ and connections to US intelligence agencies, attribution around βOperation Triangulationβ, VMware 0days and i-Soon indictments securityconversations.com/episode/revi...
In a normal relationship with an enemy turned ally, we wouldnβt immediately stop contingency planning.
One of the best write ups I've found on the Russian propaganda model "Firehose of Falsehood" how it works and counter measures.
www.rand.org/pubs/perspec...
If you're having trouble tracking all of the executive orders, blog posts and other actions coming from the executive office, as well as policy changes and legislative developments, this site -- 47 Watch - is tracking them. It's bare bones, but useful
47-watch.com/index.html
I gave a day 1 closing keynote at DistrictCon yesterday. Surprisingly, it was a security talk about memory safety.
Slides are here:
docs.google.com/presentation...
I wonder if he mentioned this in his job interview for DOGE. I wonder if it helped him get the job.