/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Andrew Thompson

@anthomsec
7 posts
2021-06-04
Let's get after it. Attribution matters. Consequences matter. https://www.reuters.com/...
2021-06-04 View on X
Reuters

US DOJ says it is elevating investigations of ransomware attacks to a similar priority as terrorism in the wake of the Colonial Pipeline hack

The U.S. Department of Justice is elevating investigations of ransomware attacks to a similar priority as terrorism in the wake of the Colonial Pipeline hack …

2021-04-16
I applaud the decision to give more time. Separate from that thought, this is an acknowledgment that the way things were being done before wasn't optimal, and that the security community is largely still making it up. That means don't act like this is all figured out. https://twitter.com/...
2021-04-16 View on X
The Record

Google's Project Zero updates its vulnerability disclosure policy to include a 30-day cushion before publishing bug details to give users time to apply patches

The Google Project Zero security team has updated its vulnerability disclosure guidelines today to add a cushion of 30 days …

2021-03-20
Swiss Hacker indicted for conspiracy, wire fraud, and aggravated identity theft | USAO-WDWA | Department of Justice https://www.justice.gov/...
2021-03-20 View on X
The Record

Verkada security camera hacker has been charged in the US for hacking into 100+ of the world's biggest companies since 2019 and leaking proprietary data online

U.S. Files Charges Over Data Theft Kelly Sheridan / Dark Reading : Verkada Attacker Charged With Wire Fraud, Conspiracy in US Sarah Coble / infosecurity-magazine.com : US Indicts S...

2021-03-19
Swiss Hacker indicted for conspiracy, wire fraud, and aggravated identity theft | USAO-WDWA | Department of Justice https://www.justice.gov/...
2021-03-19 View on X
The Record

Verkada security camera hacker has been charged in the US for hacking into 100+ of the world's biggest companies since 2019 and leaking proprietary data online

The US Department of Justice has charged today a Swiss national for hacking into more than 100 companies and leaking proprietary data online on their personal website.

2021-03-03
Patch, and look for intrusion activity. It's not enough to just patch. https://twitter.com/...
2021-03-03 View on X
TechCrunch

Microsoft warns users a new Chinese state-sponsored threat actor is exploiting four previously undisclosed zero days in Exchange Server; patches are available

Microsoft is warning customers that a new China state-sponsored threat actor is exploiting four previously undisclosed security flaws …

2020-08-14
Straight to the point. Impose cost. https://twitter.com/...
2020-08-14 View on X
CyberScoop

NSA and FBI say Russian state sponsored hacker group Fancy Bear is using a previously undisclosed Linux malware called Drovorub for cyber espionage operations

my favorite thing so far: NSA casually reveals that Drovorub is the codename used by GRU itself (!), and even offers a step-by-step translation https://www.nsa.gov/... https://twit...

2020-07-24
“There is an expectation of continued activity.” Advanced can be described as multifaceted orchestration of disparate resources in furtherance of unified objectives (My words). Persistent can be described as unrelenting-continued-enduring- forever. Threat = Capability and Intent. https://twitter.com/...
2020-07-24 View on X
Wired

From December 2018 to May of this year, Russia's GRU hacker group known as APT 28 or Fancy Bear has carried out a broad campaign against a range of US targets

A previously unreported Fancy Bear campaign persisted for well over a year—and indicates that the notorious group has broadened its focus. Tweets: @anthomsec , @wired , @dragosinc ...