Zero Day
Subscribe
Sign in
Home
Archive
About
New
Top
Discussion
Is the Secret Service’s Claim About Erased Text Messages Plausible? (Updated)
The Secret Service says data erased from the phones of some of its personnel — that may shed light on the agency's handling of the Jan. 6 insurrection …
Kim Zetter
Jul 20
10
14
Share this post
Is the Secret Service’s Claim About Erased Text Messages Plausible? (Updated)
zetter.substack.com
Copy link
Twitter
Facebook
Email
What It Means that the U.S. Is Conducting Offensive Cyber Operations Against Russia
Gen. Paul Nakasone's remarks this month about offensive operations against Russia caused a stir. But have people misinterpreted his words?
Kim Zetter
Jun 17
12
1
Share this post
What It Means that the U.S. Is Conducting Offensive Cyber Operations Against Russia
zetter.substack.com
Copy link
Twitter
Facebook
Email
Russia Began Setting Stage for Cyberattacks Against Ukraine a Year Ago
The Kremlin’s cyber warriors began working to gain a foothold in Ukrainian government and critical infrastructure networks a year before the invasion…
Kim Zetter
Apr 27
15
3
Share this post
Russia Began Setting Stage for Cyberattacks Against Ukraine a Year Ago
zetter.substack.com
Copy link
Twitter
Facebook
Email
Questions about Cyber Conflict Remain Unresolved, Panelists Note
Who is an enemy combatant in the cyber realm, and what are the rules of engagement for cyber conflict? These are enduring questions that remain…
Kim Zetter
Apr 25
2
Share this post
Questions about Cyber Conflict Remain Unresolved, Panelists Note
zetter.substack.com
Copy link
Twitter
Facebook
Email
Substack Rolls out Two-Factor Authentication for Users
More than four years after launching, Substack finally adopts what is considered a security best standard.
Kim Zetter
Apr 11
9
2
Share this post
Substack Rolls out Two-Factor Authentication for Users
zetter.substack.com
Copy link
Twitter
Facebook
Email
Unmasking China’s State Hackers
Intrusion Truth debuted in 2017, unmasking hackers working for the Chinese government. Five years later they’re still at it, while managing to keep…
Kim Zetter
Mar 29
6
5
Share this post
Unmasking China’s State Hackers
zetter.substack.com
Copy link
Twitter
Facebook
Email
Intrusion Truth - Five Years of Naming and Shaming China’s Spies
In 2017, a mysterious group called Intrusion Truth began exposing the real identities of hackers behind Chinese spy operations. In an interview, the…
Kim Zetter
Mar 29
13
4
Share this post
Intrusion Truth - Five Years of Naming and Shaming China’s Spies
zetter.substack.com
Copy link
Twitter
Facebook
Email
Second Wiper Attack Strikes Systems in Ukraine and Two Neighboring Countries
The wiper, dubbed HermeticWiper, struck a bank in Ukraine as well as machines in Latvia and Lithuania belonging to two contractors that work with the…
Kim Zetter
Feb 24
6
1
Share this post
Second Wiper Attack Strikes Systems in Ukraine and Two Neighboring Countries
zetter.substack.com
Copy link
Twitter
Facebook
Email
Mistake Post
Yes, that last email you received from me was a mistake. If the post seemed unfinished, it was. : ) I inadvertently scheduled it to automatically…
Kim Zetter
Feb 22
7
1
Share this post
Mistake Post
zetter.substack.com
Copy link
Twitter
Facebook
Email
Going Nuclear II
Jan. 2006 Just as Iran began to enrich its first batch of uranium hexafluoride gas in a small cascade with 50 centrifuges at Natanz, the centrifuges…
Kim Zetter
Feb 22
6
Share this post
Going Nuclear II
zetter.substack.com
Copy link
Twitter
Facebook
Email
Wiper in Ukraine Used Code Repurposed From WhiteBlackCrypt Ransomware
This month's wiper attack against government agencies in Ukraine has been tied to a 2021 ransomware campaign and a 2019 extortion plot against a Russian…
Kim Zetter
Jan 26
4
Share this post
Wiper in Ukraine Used Code Repurposed From WhiteBlackCrypt Ransomware
zetter.substack.com
Copy link
Twitter
Facebook
Email
Hackers Were in Ukraine Systems Months Before Deploying Wiper
According to researchers from Cisco, evidence shows the intruders were in a few government systems late last summer, but didn't deposit their malicious…
Kim Zetter
Jan 21
9
Share this post
Hackers Were in Ukraine Systems Months Before Deploying Wiper
zetter.substack.com
Copy link
Twitter
Facebook
Email
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts