/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

@wylienewmark

@wylienewmark
18 posts
2025-08-18
I'm sorry to do this with a quote-skeet of a reporter I actually respect, but: USING LLMS IS NOT THE SAME THING AS “HACKING WITH AI”.  LLM usage to support basic software development is now utterly ubiquitous but the fear we've seen of “AI-enabled intrusions” still has not come to pass. …
2025-08-18 View on X
NBC News

Cybercriminals, spies, researchers, and corporate defenders are increasingly using AI, feeding into an escalating cat-and-mouse game of finding software flaws

good and bad actors leveraging AI in cybersecurity arms race Stephen E. Arnold / Beyond Search : News Flash from the Past: Bad Actors Use New Technology and Adapt Quickly Bluesky: ...

2025-07-23
back in the day, attribution of widespread exploitation of a vulnerability in a ubiquitous piece of software used *kinda* up in the air.  now, a guess of “China” has roughly a 60% chance of being correct.
2025-07-23 View on X
BleepingComputer

Microsoft says it “has observed two named Chinese nation-state actors, Linen Typhoon and Violet Typhoon exploiting” the SharePoint zero-day vulnerabilities

He said not as vulnerable as on-prem SharePoint right now.  —  #nerdromancewithpits @wylienewmark : back in the day, attribution of widespread exploitation of a vulnerability in a ...

back in the day, attribution of widespread exploitation of a vulnerability in a ubiquitous piece of software used *kinda* up in the air.  now, a guess of “China” has roughly a 60% chance of being correct.
2025-07-23 View on X
Bloomberg

Source: the US National Nuclear Security Administration was among those breached by a hack of SharePoint; no sensitive information is known to be compromised

The US agency responsible for maintaining and designing the nation's cache of nuclear weapons was among those breached by a hack …

2022-04-08
[cackles in Iranian ops getting burned] https://twitter.com/...
2022-04-08 View on X
Washington Post

Meta disrupts covert influence operations by Belarus- and Russia-linked actors targeting Ukrainians, like hacking Ukrainian military staff's Facebook accounts

combining computer network exploitation with influence operations, CNE & active measures, in classic terminology (to be expected historically). Meta does an exceptionally good job ...

2022-04-01
It's truly galaxy-brain to say “We shouldn't sanction this entity with operational ties to the FSB, because then the entity's product might be used to conduct offensive cyber operations.” Dude, you just summed up a major reason that entity needs to be sanctioned. https://twitter.com/...
2022-04-01 View on X
Wall Street Journal

Sources: The White House is split over Kaspersky sanctions, which could spur Russian cyberattacks and make enforcement hard due to the company's large clientele

but the idea has split the administration due to concerns over the size and scope of such a move. w/ @vmsalama https://www.wsj.com/... Jan Lemnitzer / @janlemnitzer : Like the EU, ...

2021-09-22
Balancing offense and defense in counter-ransomware is a grey area, not black and white: “The previously unreported episode highlights the trade-offs law enforcement officials face between trying to damage cyber criminal networks and promptly helping the victims of ransomware...” https://twitter.com/...
2021-09-22 View on X
Washington Post

Sources: FBI refrained from sharing a ransomware decryptor with businesses for almost three weeks, as it carried out an operation to disrupt the REvil gang

The FBI refrained for almost three weeks from helping to unlock the computers of hundreds of businesses and institutions hobbled …

2021-07-14
I'm not quite sure how this is a significant story? It was clear that Trickbot operations began to bounce back quickly after last year's disruption efforts (https://www.crowdstrike.com/ ...) and efforts like those are about degrading—not neutralizing—anyway. Of course they built back. https://twitter.com/...
2021-07-14 View on X
The Daily Beast

Bitdefender says hackers behind TrickBot botnet, which was disrupted by US Cyber Command and Microsoft last year, have quietly rebuilt much of their operations

2021-06-06
Waiting for someone with a galaxy-brain to explain how offensive cyber operations — rather than than the cyber 🥦 of good security hygiene — would've prevented this initial access tactic. https://twitter.com/...
2021-06-06 View on X
Bloomberg

Investigator says hackers breached Colonial Pipeline through a VPN account whose password has since been discovered inside a batch of leaks on the dark web

🍿 Gangster Coworking CNN : Ransomware attackers used compromised password to access Colonial Pipeline network Kim Lyons / The Verge : Hackers reportedly used a compromised password...

2021-04-17
I can't recall a previous set of cyber-related sanctions against Russia that goes quite so deep into the public-private overlaps in how Russian intelligence engages in cyber operations. https://home.treasury.gov/...
2021-04-17 View on X
Associated Press

Microsoft removes Positive Technologies from a list of vendors it gives early access to vulnerability info; IBM also lists Positive as a security partner

MAPP Lily Hay Newman / Wired : Security News This Week: How the FBI Finally Got Into the San Bernardino Shooter's iPhone Dan Goodin / Ars Technica : US government strikes back at K...

I can't recall a previous set of cyber-related sanctions against Russia that goes quite so deep into the public-private overlaps in how Russian intelligence engages in cyber operations. https://home.treasury.gov/...
2021-04-17 View on X
MIT Technology Review

A look at Positive Technologies, a Russian cybersecurity firm sanctioned by the US, which sources say provides hacking tools and ops support for Russian spies

Washington has sanctioned Russian cybersecurity firm Positive Technologies.  US intelligence reports claim it provides hacking tools and runs operations for the Kremlin.

2021-04-16
I can't recall a previous set of cyber-related sanctions against Russia that goes quite so deep into the public-private overlaps in how Russian intelligence engages in cyber operations. https://home.treasury.gov/...
2021-04-16 View on X
MIT Technology Review

A look at Positive Technologies, a Russian cybersecurity firm sanctioned by the US, which sources say provides hacking tools and ops support for Russian spies

Washington has sanctioned Russian cybersecurity firm Positive Technologies.  US intelligence reports claim it provides hacking tools and runs operations for the Kremlin.

2020-12-20
Notable to see a cabinet official assign country-level attribution (i.e., Russia) not only publicly, but in a media appearance as opposed to an press conference or similar official channel. https://twitter.com/...
2020-12-20 View on X
Axios

Trump downplayed the massive cyberattack on the US government, claiming that China may be responsible and the “Fake News Media” is exaggerating its extent

President Trump downplayed a massive cyberattack on U.S. government departments and agencies and private companies on Twitter Saturday …

Notable to see a cabinet official assign country-level attribution (i.e., Russia) not only publicly, but in a media appearance as opposed to an press conference or similar official channel. https://twitter.com/...
2020-12-20 View on X
Washington Post

Mike Pompeo says Russia is “pretty clearly” behind the SolarWinds hacking campaign, the first Trump administration official to publicly blame the country

and Chose Not to Fix Them Alicia Victoria Lozano / NBC News : Secretary of State Pompeo says hack was ‘pretty clearly’ Russian Oriana Gonzalez / Axios : Pompeo says Russia is “pret...

2020-12-09
WaPo (https://twitter.com/...) and WSJ (https://twitter.com/...) are linking (by degrees) the FEYE compromise to the SVR. While it's too early to speculate as to attribution, I will say the SVR has a history of successfully compromising hard targets - including security entities.
2020-12-09 View on X
Wall Street Journal

FireEye says some internal systems were hacked by nation state actors, compromising its Red Team tools, used to test the defenses of its thousands of customers

The cybersecurity company said the attack compromised its software tools used to test the defenses of its thousands of customers

2020-01-01
Human intelligence is not dead, dying, or going anywhere. However, the digital age - including cyber - is changing it in profound and fundamental ways. Cover is just the tip of a monumental iceberg when it comes to how tradecraft must evolve or obsolesce. https://news.yahoo.com/...
2020-01-01 View on X
Yahoo News

Overview of the ongoing efforts by the US to modernize its spy operations, to contain the damage from the 2014 OPM breach, be more resilient to tracking, more

likely based on differences in pay between diplomats, speedy promotions...” https://twitter.com/... Artyom Lukin / @artyomlukin : Fascinating longread on espionage tradecraft. Ment...

2019-12-31
Human intelligence is not dead, dying, or going anywhere. However, the digital age - including cyber - is changing it in profound and fundamental ways. Cover is just the tip of a monumental iceberg when it comes to how tradecraft must evolve or obsolesce. https://news.yahoo.com/...
2019-12-31 View on X
Yahoo News

Overview of the ongoing efforts by the US to modernize its spy operations, to contain the damage from the 2014 OPM breach, be more resilient to tracking, more

When hackers began slipping into computer systems at the Office of Personnel Management in the spring of 2014 … Tweets: @edwardlucas , @sanhotree , @zachsdorfman , @inteloperator ,...

2019-11-22
The talk on underreported/unreported Sandworm activity by @neelmehta and @billyleonard at #CYBERWARCON blew me away. An exemplar about what talks about adversary activity should be like. Coverage on their conclusions here https://www.wired.com/...
2019-11-22 View on X
Wired

Google reveals new details about Russia-linked “Sandworm” hacking group behind NotPetya, the attacks on Winter Olympics, French election, and more

and compromised — the Macron campaign: https://www.wired.com/... pic.twitter.com/P2SzFdBEqR

2019-10-24
“The memo doubled as a formal resignation letter by its author, Dimitrios Vastakis, who was the branch chief of the White House computer network defense.” https://twitter.com/...
2019-10-24 View on X
Axios

Memo from a departing chief of White House security lays out how an ongoing reorg under the Trump administration has left its networks more vulnerable to attack

An internal memo on cybersecurity, obtained by Axios, warns that “the White House is posturing itself to be electronically compromised once again.”