Contrary to initial reports that it resulted in a "really huge loss in communications in the very beginning of war," the hack did not have a huge impact…
12
The group, called Metador by the SentinelLabs researchers who discovered them, appears to be well-resourced and engaged in long-term espionage. But who…
54
There were plenty of warnings that Colonial Pipeline ignored. Here's an excerpt from my recent BlackHat keynote discussing what Colonial Pipeline should…
10
5
The Secret Service says data erased from the phones of some of its personnel — that may shed light on the agency's handling of the Jan. 6 insurrection …
11
15
Gen. Paul Nakasone's remarks this month about offensive operations against Russia caused a stir. But have people misinterpreted his words?
12
1
The Kremlin’s cyber warriors began working to gain a foothold in Ukrainian government and critical infrastructure networks a year before the invasion…
15
3
Who is an enemy combatant in the cyber realm, and what are the rules of engagement for cyber conflict? These are enduring questions that remain…
2
More than four years after launching, Substack finally adopts what is considered a security best standard.
10
2
Intrusion Truth debuted in 2017, unmasking hackers working for the Chinese government. Five years later they’re still at it, while managing to keep…
7
5
In 2017, a mysterious group called Intrusion Truth began exposing the real identities of hackers behind Chinese spy operations. In an interview, the…
13
4
The wiper, dubbed HermeticWiper, struck a bank in Ukraine as well as machines in Latvia and Lithuania belonging to two contractors that work with the…
6
1
Yes, that last email you received from me was a mistake. If the post seemed unfinished, it was. : ) I inadvertently scheduled it to automatically…
7
1