/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Katie Nickels

@likethecoins
13 posts
2023-03-31
As usual, @HuntressLabs is one of my go-tos in a compromise like this because of their visibility + smart people diving in + ability to clearly communicate key info https://www.huntress.com/...
2023-03-31 View on X
BleepingComputer

Researchers say hackers have compromised the VoIP desktop client of 3CX's Phone System, used by 600K+ companies and 12M+ DAUs, in an ongoing supply chain attack

https://www.3cx.com/...  Any vendor of software and services that pull in code from NPM, PIP, RubyGems etc … Eitan Erez : This supply chain attack started unfolding not long ago as...

2022-01-17
A simple threat modeling exercise. You/your leadership may be focused on the destructive attacks in Ukraine: https://www.microsoft.com/.... But if you're not in Ukraine, I'd argue threats against VMware Horizon should likely be a higher priority: https://www.huntress.com/....
2022-01-17 View on X
Microsoft Security Blog

Microsoft identifies a destructive malware operation targeting Ukrainian organizations; the malware looks like ransomware but lacks a ransom recovery mechanism

European Union simulated a cyber attack on a fictitious Finnish power company Vilius Petkauskas / cybernews.com : Belarus state hackers suspected behind Ukraine cyberattack Grugq /...

2022-01-15
Here's a report directly from the Ukrainian CERT about the website defacements and CMS involved: https://cert.gov.ua/... - this supports @KimZetter's reporting. However, note the language...this vuln is “not excluded” (per Google Translate). Thanks to the friend who shared this. https://twitter.com/...
2022-01-15 View on X
Bloomberg

Ukraine says a cyberattack brought down several government agency websites for hours, but their content was not changed and no sensitive data was stolen

Ukraine said a cyberattack brought down the websites of several government agencies for hours.  Authorities didn't immediately comment …

2021-12-15
It appears there is a *second* Log4J vulnerability that requires another patch. First CVE from last week: https://cve.mitre.org/... New CVE today: https://cve.mitre.org/... https://twitter.com/...
2021-12-15 View on X
Wall Street Journal

Microsoft and cybersecurity company Mandiant say hacking groups linked to China, Iran, North Korea, and Turkey are exploiting the Log4j flaw

Researchers call it one of the most dire cybersecurity threats to emerge in years and could enable devastating attacks

It appears there is a *second* Log4J vulnerability that requires another patch. First CVE from last week: https://cve.mitre.org/... New CVE today: https://cve.mitre.org/... https://twitter.com/...
2021-12-15 View on X
The Record

CISA orders US federal civilian agencies to patch systems affected by the Log4j vulnerability by December 24

The US Cybersecurity and Infrastructure Security Agency has told federal civilian agencies to patch systems affected by the Log4Shell vulnerability by Christmas Eve. Source: CISA .

2021-07-14
Lots of actionable details in this, thanks @MsftSecIntel! https://twitter.com/...
2021-07-14 View on X
The Record

Microsoft says the attacks targeting SolarWinds Serv-U software with a now-patched RCE exploit are the work of Chinese hacking group DEV-0322

Microsoft said today that the recent wave of attacks that have targeted SolarWinds file transfer servers are the work of a Chinese hacking group …

On the endpoint side - should MSHTA (pronounced MISH-ta 😉) be making external connections from your network? Should PowerShell be launching an unknown batch script? https://twitter.com/...
2021-07-14 View on X
The Record

Microsoft says the attacks targeting SolarWinds Serv-U software with a now-patched RCE exploit are the work of Chinese hacking group DEV-0322

Microsoft said today that the recent wave of attacks that have targeted SolarWinds file transfer servers are the work of a Chinese hacking group …

2021-04-30
I am proud that I was part of the #RansomwareTaskForce that released a report on combating ransomware today. My thoughts are here: https://medium.com/.... And the report is here: https://securityandtechnology.org/ ... https://twitter.com/...
2021-04-30 View on X
Washington Post

A task force of 60+ experts from industry, government, nonprofits, and academia calls on the US and allies to take steps to fight a surge in ransomware attacks

the Secret Weapon to Combatting Ransomware Danny Palmer / ZDNet : Ransomware is now a national security risk. This group thinks it knows how to defeat it Duncan Riley / SiliconANG...

2021-03-31
Unfortunately, “underfunded, overwhelmed, and struggling to keep up with evolving threats” describes far too many cyber defenders. To all the @CISAgov employees and defenders everywhere who are doing the best with what they have, thank you! ❤️ https://twitter.com/...
2021-03-31 View on X
Politico

Interviews with 15 people show CISA is underfunded, short on talent, outmatched by adversaries, and overwhelmed by the fallout from two massive cyberattacks

The agency that protects the U.S. from hackers is hobbled by funding woes, a talent shortage and growing pains that are jeopardizing … Tweets: @ericgeller , @gossithedog , @kevinco...

2021-03-03
The Microsoft and Volexity blog posts are full of detection opportunities and forensic artifacts. Even if you don't use MS products, you can translate these queries. https://www.microsoft.com/... https://www.volexity.com/... https://twitter.com/...
2021-03-03 View on X
TechCrunch

Microsoft warns users a new Chinese state-sponsored threat actor is exploiting four previously undisclosed zero days in Exchange Server; patches are available

Microsoft is warning customers that a new China state-sponsored threat actor is exploiting four previously undisclosed security flaws …

2020-01-28
Important phrasing: “acting in the interests of the Turkish government.” I appreciate that the reporters captured this, since it's different than saying it was the Turkish government. Also note the use of Diamond Model features: victim + infra. #FOR578 #CTI https://twitter.com/...
2020-01-28 View on X
Reuters

Sources: Turkey-backed hackers have used DNS hijacking to obtain login credentials, targeting ~30 EU and Middle East governments and organizations since 2018

2019-12-22
A great article about a great book! Cliff Stoll did #threatintel before it was cool. https://twitter.com/...
2019-12-22 View on X
Wired

Profile of Cliff Stoll, whose memoir The Cuckoo's Egg, which traces the first known case of state-sponsored hacking, inspired a generation of cybersecurity pros

and Stoll has become a cybersecurity icon. https://www.wired.com/... Dame Mlley / @damienmulley : I read this book when I was 18 I think. It was fascinating. If I re-read it now It...

2019-12-21
A great article about a great book! Cliff Stoll did #threatintel before it was cool. https://twitter.com/...
2019-12-21 View on X
Wired

Profile of Cliff Stoll, whose memoir The Cuckoo's Egg, which traces the first known case of state-sponsored hacking, inspired a generation of cybersecurity pros

Andy Greenberg / Wired : Tweets: @damienmulley , @wired , @instacyber , @stvemillertime , @likethecoins , and @ronindey Tweets: Dame Mlley / @damienmulley : I read this book when ...