Cybercriminals, spies, researchers, and corporate defenders are increasingly using AI, feeding into an escalating cat-and-mouse game of finding software flaws
good and bad actors leveraging AI in cybersecurity arms race Stephen E. Arnold / Beyond Search : News Flash from the Past: Bad Actors Use New Technology and Adapt Quickly Bluesky: ...
Microsoft says it “has observed two named Chinese nation-state actors, Linen Typhoon and Violet Typhoon exploiting” the SharePoint zero-day vulnerabilities
He said not as vulnerable as on-prem SharePoint right now. — #nerdromancewithpits @wylienewmark : back in the day, attribution of widespread exploitation of a vulnerability in a ...
Source: the US National Nuclear Security Administration was among those breached by a hack of SharePoint; no sensitive information is known to be compromised
The US agency responsible for maintaining and designing the nation's cache of nuclear weapons was among those breached by a hack …
Meta disrupts covert influence operations by Belarus- and Russia-linked actors targeting Ukrainians, like hacking Ukrainian military staff's Facebook accounts
combining computer network exploitation with influence operations, CNE & active measures, in classic terminology (to be expected historically). Meta does an exceptionally good job ...
Sources: The White House is split over Kaspersky sanctions, which could spur Russian cyberattacks and make enforcement hard due to the company's large clientele
but the idea has split the administration due to concerns over the size and scope of such a move. w/ @vmsalama https://www.wsj.com/... Jan Lemnitzer / @janlemnitzer : Like the EU, ...
Sources: FBI refrained from sharing a ransomware decryptor with businesses for almost three weeks, as it carried out an operation to disrupt the REvil gang
The FBI refrained for almost three weeks from helping to unlock the computers of hundreds of businesses and institutions hobbled …
Bitdefender says hackers behind TrickBot botnet, which was disrupted by US Cyber Command and Microsoft last year, have quietly rebuilt much of their operations
Investigator says hackers breached Colonial Pipeline through a VPN account whose password has since been discovered inside a batch of leaks on the dark web
🍿 Gangster Coworking CNN : Ransomware attackers used compromised password to access Colonial Pipeline network Kim Lyons / The Verge : Hackers reportedly used a compromised password...
Microsoft removes Positive Technologies from a list of vendors it gives early access to vulnerability info; IBM also lists Positive as a security partner
MAPP Lily Hay Newman / Wired : Security News This Week: How the FBI Finally Got Into the San Bernardino Shooter's iPhone Dan Goodin / Ars Technica : US government strikes back at K...
A look at Positive Technologies, a Russian cybersecurity firm sanctioned by the US, which sources say provides hacking tools and ops support for Russian spies
Washington has sanctioned Russian cybersecurity firm Positive Technologies. US intelligence reports claim it provides hacking tools and runs operations for the Kremlin.
A look at Positive Technologies, a Russian cybersecurity firm sanctioned by the US, which sources say provides hacking tools and ops support for Russian spies
Washington has sanctioned Russian cybersecurity firm Positive Technologies. US intelligence reports claim it provides hacking tools and runs operations for the Kremlin.
Trump downplayed the massive cyberattack on the US government, claiming that China may be responsible and the “Fake News Media” is exaggerating its extent
President Trump downplayed a massive cyberattack on U.S. government departments and agencies and private companies on Twitter Saturday …
Mike Pompeo says Russia is “pretty clearly” behind the SolarWinds hacking campaign, the first Trump administration official to publicly blame the country
and Chose Not to Fix Them Alicia Victoria Lozano / NBC News : Secretary of State Pompeo says hack was ‘pretty clearly’ Russian Oriana Gonzalez / Axios : Pompeo says Russia is “pret...
FireEye says some internal systems were hacked by nation state actors, compromising its Red Team tools, used to test the defenses of its thousands of customers
The cybersecurity company said the attack compromised its software tools used to test the defenses of its thousands of customers
Overview of the ongoing efforts by the US to modernize its spy operations, to contain the damage from the 2014 OPM breach, be more resilient to tracking, more
likely based on differences in pay between diplomats, speedy promotions...” https://twitter.com/... Artyom Lukin / @artyomlukin : Fascinating longread on espionage tradecraft. Ment...
Overview of the ongoing efforts by the US to modernize its spy operations, to contain the damage from the 2014 OPM breach, be more resilient to tracking, more
When hackers began slipping into computer systems at the Office of Personnel Management in the spring of 2014 … Tweets: @edwardlucas , @sanhotree , @zachsdorfman , @inteloperator ,...
Google reveals new details about Russia-linked “Sandworm” hacking group behind NotPetya, the attacks on Winter Olympics, French election, and more
and compromised — the Macron campaign: https://www.wired.com/... pic.twitter.com/P2SzFdBEqR
Memo from a departing chief of White House security lays out how an ongoing reorg under the Trump administration has left its networks more vulnerable to attack
An internal memo on cybersecurity, obtained by Axios, warns that “the White House is posturing itself to be electronically compromised once again.”