/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Katie Moussouris

@k8em0
85 posts
2026-01-23
AI was the accelerant on a perverse incentive fire sparked by bug bounty platforms that reward spray & pray.  Both open source & orgs without dedicated vuln response teams get overloaded when they offer cash there. cURL is right to leave AI shark-infested waters to start fresh.  [embedded post]
2026-01-23 View on X
BleepingComputer

The curl project plans to end its HackerOne bug bounty program at the end of January, citing a surge in low-quality AI-generated vulnerability reports

The developer of the popular curl command-line utility and library announced that the project will end its HackerOne security bug bounty program …

2026-01-22
AI was the accelerant on a perverse incentive fire sparked by bug bounty platforms that reward spray & pray.  Both open source & orgs without dedicated vuln response teams get overloaded when they offer cash there. cURL is right to leave AI shark-infested waters to start fresh.  [embedded post]
2026-01-22 View on X
BleepingComputer

The curl project plans to end its HackerOne bug bounty program at the end of January, citing a surge in low-quality AI-generated vulnerability reports

The developer of the popular curl command-line utility and library announced that the project will end its HackerOne security bug bounty program …

2025-12-29
I remember pen testing an online game & learning almost immediately that they were far more interested in game cheats than security or privacy violations. They would more easily recover from those versus cheats that rendered a game unplayable or deprived them of add on revenue
2025-12-29 View on X
BleepingComputer

Ubisoft reopens Rainbow Six Siege after shutting down the servers amid a breach exploiting the game's internal systems, and says the Marketplace remains closed

Ubisoft's Rainbow Six Siege (R6) suffered a breach that allowed hackers to abuse internal systems to ban and unban players …

2025-04-16
We have 11 months to figure out how to make sure this doesn't happen again.  —  www.bleepingcomputer.com/news/ securit...  [embedded post]
2025-04-16 View on X
BleepingComputer

CISA says it will extend funding to Mitre, which runs the CVE Program, and “there will be no lapse in critical CVE services”, after Mitre said funding expired

CISA says the U.S. government has extended MITRE's funding to ensure no continuity issues with the critical Common Vulnerabilities and Exposures (CVE) program.

2024-07-29
Microsoft once again with deeper technical analysis plus actionable guidance around the CrowdStrike outage. In this post you can find: - detailed crash analysis - kernel vs user space tradeoffs - tools for driver devs - best practices for security & reliability Best post so far
2024-07-29 View on X
Microsoft Security Blog

Microsoft shares a technical overview of the CrowdStrike incident, explains why security products use Windows kernel drivers, and outlines planned improvements

Windows is an open and flexible platform used by many of the world's top businesses for high availability use cases where security and availability are non-negotiable.

2024-07-22
On the CrowdStrike outage: Most organizations of a certain size test software updates before deployment. They do not test “content updates” from OS or security software, but set them to automatically update because they are viewed as safe. IT departments just got a new daily task
2024-07-22 View on X
CrowdStrike

CrowdStrike says a Falcon sensor configuration update on Windows triggered a logic error that resulted in a system crash and BSOD, remediated after 78 minutes

Thankfully, Macs weren't affected by last week's catastrophic … Anthony Ha / TechCrunch : TechCrunch Minute: What caused last week's major tech outage? CrowdStrike : Likely eCrime ...

On the CrowdStrike outage: Most organizations of a certain size test software updates before deployment. They do not test “content updates” from OS or security software, but set them to automatically update because they are viewed as safe. IT departments just got a new daily task
2024-07-22 View on X
Reuters

Reeling from CrowdStrike-related outages, Delta has canceled 5,000+ flights, including 1,384 on Sunday and 700+ for Monday so far, according to FlightAware

Delta Air Lines (DAL.N) struggled to restore normal operations on Sunday after last week's crippling global cyber outage …

2024-07-21
On the CrowdStrike outage: Most organizations of a certain size test software updates before deployment. They do not test “content updates” from OS or security software, but set them to automatically update because they are viewed as safe. IT departments just got a new daily task
2024-07-21 View on X
The Official Microsoft Blog

Microsoft estimates that CrowdStrike's update affected 8.5M Windows devices, or less than 1% of all Windows machines

On July 18, CrowdStrike, an independent cybersecurity company, released a software update that began impacting IT systems globally.  Although this was not a Microsoft incident …

On the CrowdStrike outage: Most organizations of a certain size test software updates before deployment. They do not test “content updates” from OS or security software, but set them to automatically update because they are viewed as safe. IT departments just got a new daily task
2024-07-21 View on X
CrowdStrike

CrowdStrike says a sensor configuration update to Windows systems triggered a logic error that resulted in a system crash and BSOD on impacted systems

What Happened?  —  On July 19, 2024 at 04:09 UTC, as part of ongoing operations, CrowdStrike released a sensor configuration update to Windows systems.

2024-07-20
On the CrowdStrike outage: Most organizations of a certain size test software updates before deployment. They do not test “content updates” from OS or security software, but set them to automatically update because they are viewed as safe. IT departments just got a new daily task
2024-07-20 View on X
The Verge

The outage appears to have been caused by CrowdStrike pushing a faulty update to its Falcon software that causes Windows machines to get stuck in a boot loop

On the CrowdStrike outage: Most organizations of a certain size test software updates before deployment. They do not test “content updates” from OS or security software, but set them to automatically update because they are viewed as safe. IT departments just got a new daily task
2024-07-20 View on X
Wall Street Journal

A profile of CrowdStrike, founded in 2011 and used by 300 companies in the Fortune 500; Gartner: CrowdStrike has ~15% of the global security software market

The little-known company is very popular in Corporate America, contributing to the severity of the global IT outage

2024-05-29
One more reason we include Communication in the @LutaSecurity Maturity Model for Vulnerability Coordination. It's an important indicator of measurable security maturity, along side engineering & Organizational maturity. What good are patches that aren't known to affected users?
2024-05-29 View on X
Wired

How researchers recovered access to ~$2M worth of bitcoin stored in a software wallet, using a flaw in a decade-old version of the RoboForm password manager

Thanks to a flaw in a decade-old version of the RoboForm password manager and a bit of luck, researchers were able to unearth …

2023-08-30
The phenomenon of making a machine you don't own do something you want it to do is referred to as “hacking” or “pwning”. The FBI did this for defensive purposes to uninstall malware. In Wassenaar-defined export control, this exceeds the exemptions for defense. Can't pwn to re-own
2023-08-30 View on X
BleepingComputer

The FBI led an effort to dismantle the Qakbot botnet, which ransomware gangs used as an infection vector for years, on August 25 after infiltrating its network

It was live on 700k endpoints (!) which should give you an idea of the scale of cybersecurity woes at many orgs (it's still really, really bad out there). X: Nick Carr / @itsreally...

2023-08-05
If you've not heard of @window Snyder, you're missing a crucial part of Internet security history. More than a trailblazer, she's a genius who revolutionized security at top tech giants & pioneered user-centric security & privacy. There needs to be a movie. Until then, read this.
2023-08-05 View on X
TechCrunch

A profile of Window Snyder, who helped secure the early internet while at Microsoft and Mozilla, and pushed Apple to enable encryption by default in its devices

Snyder has made Windows, Mac computers, iPhones, and other technologies more secure for almost 25 years. Mastodon: @Weld@infosec.exchange and @kennwhite@mastodon.social . Bluesky: ...

2023-04-22
So long blue check. It was nice to have the ability to defend myself from harassment via impersonation. But who cares about Internet safety & verified authenticity. Buying a blue badge won't stop impersonation since anyone can do it. https://twitter.com/...
2023-04-22 View on X
Mashable

In a campaign called #BlockTheBlue, some Twitter users, including popular ones like @dril, are asking people to block anyone who subscribes to Twitter Blue

After Elon Musk removed legacy verified users' checkmarks, Twitter's biggest users are blocking everyone who pays.

So long blue check. It was nice to have the ability to defend myself from harassment via impersonation. But who cares about Internet safety & verified authenticity. Buying a blue badge won't stop impersonation since anyone can do it. https://twitter.com/...
2023-04-22 View on X
The Verge

Twitter begins removing blue checkmarks from legacy verified accounts, fulfilling one of Elon Musk's long-stated plans; Musk has called the system “corrupt”

Elon already took away the blue check from some publications like the The New York Times … Caroline Giegerich : The Twitter check shakedown has begun.  Twitter has officially begun...

2023-04-21
So long blue check. It was nice to have the ability to defend myself from harassment via impersonation. But who cares about Internet safety & verified authenticity. Buying a blue badge won't stop impersonation since anyone can do it. https://twitter.com/...
2023-04-21 View on X
The Verge

Twitter begins removing blue checkmarks from legacy verified accounts, fulfilling one of Elon Musk's long-stated plans; Musk has called the system “corrupt”

The change is apparent on Twitter accounts for several Verge writers and other journalists like LA Times reporter Matt Pearce …

2023-03-03
Today @WhiteHouse & @ONCD released the National CyberSecurity Strategy Important shifts: - Rebalancing responsibility to defend cyberspace to those most capable of defense (incl Software liability) - Realigning incentives to favor long term investments https://www.whitehouse.gov/...
2023-03-03 View on X
CyberScoop

The Biden administration issues a national cybersecurity strategy, seeking to impose minimum standards, shift responsibility to larger software makers, and more

CyberScoop :

2023-02-22
So tell me again that having a bug bounty or Vulnerability Disclosure Program is any indicator of security maturity & I'll show you a missing people/process/tech security program. https://twitter.com/...
2023-02-22 View on X
TechCrunch

A researcher found a now-secure US DOD Azure database without a password for two weeks that had years' worth of military emails with sensitive personnel info

2022-10-31
Who wants to hire a bunch of engineers this week? Corollary: Who wants to mint money on Twitter's #bugbounty program on horrible bugs in new features hastily coded in a week? https://twitter.com/...
2022-10-31 View on X
The Verge

Sources: Twitter could make Twitter Blue a $20/month subscription that verifies users; staff have until November 7 to build the feature or face being fired

Now that he owns Twitter, Elon Musk has given employees their first ultimatum: Meet his deadline to introduce paid verification on Twitter or pack up and leave.