Sources: the Trump admin dismissed the members of the CSRB, which investigates major cybersecurity incidents, likely disrupting the Salt Typhoon hacks probe
This includes several cyber committees, like CISA's advisory panel and the Cyber Safety Review Board, which was investigating Salt Typhoon. — That review is “dead,” person familiar says. — www.doc...
The US sanctions a China-based cybersecurity company involved in the Salt Typhoon hacks and a Shanghai-based hacker involved in the recent US Treasury breach
Treasury's OFAC is sanctioning Yin Kecheng, a Shanghai-based cyber actor who was involved with the recent Department of the Treasury network compromise. … X: Nicole Perlroth / @nicoleperlroth : BIG: T...
Elon Musk fanboy Adrian Dittmann's X activity and alleged 4chan posts suggest he might be Musk's fake online persona; source: the viral 4chan screenshot is fake
www.theverge.com/2025/1/3/243... [embedded post] Justin Baragona / @justinbaragona : According to The Verge, that screenshot that seems to tie the Adrian Dittmann account directly to Elon Musk is alm...
A look at Musk-backed America PAC's “Register to Vote” online campaign, which collects users' personal data in swing states, but does not help them register
https://www.cnbc.com/... (NYTimes had reported in July, “The group has taken pains to be secretive. Joe Lonsdale...played a key role in the group, recruiting many of his friends — including the Jimmy...
Elon Musk amplifies false claims that the FBI “paid Twitter millions” to “censor info from the public”; law enforcement reimburses companies for data requests
telecoms, banks, whatever—request reimbursement from the FBI and other agencies for time spent processing law enforcement's legal requests. This email is saying that Twitter had not collected that rei...
Twitter Trust and Safety VP Ella Irwin says she took the screenshots of internal systems that Bari Weiss shared and that “reporters were not accessing user DMs”
do Weiss and Taibbi have access to users' DMs? It would be good to get clear explanation about this screen and yes/no answer to this straightforward question. https://twitter.com/... Bari Weiss / @bar...
DDoS attacks disrupt several Ukrainian government sites; ESET researchers discover new data wiper malware installed on hundreds of Ukrainian machines
here's what you need to know NetBlocks : Internet disruptions registered as Russia moves in on Ukraine Andy Greenberg / Wired : Russia's Sandworm Hackers Have Built a Botnet of Firewalls Yadullah Abid...
An investigation into the rise of NSO's Pegasus shows its widespread use by the CIA, UAE, Mexico, Saudi Arabia, and others; the FBI bought but didn't use it
Firstly, welcome to my new blog! (Or is it a “newsletter”?) Tweets: Eva / @evacide : Here I am, having taken to my fainting couch, wearing my finest clutching pearls, because NSO Group has been caugh...
CISA Director Jen Easterly says the Log4j flaw likely affects hundreds of millions of devices and may be the most serious bug she has seen in her career
A vulnerability in a widely used Apache library … Ncsc-Nl / GitHub : Log4j overview related software Kyle Alspach / VentureBeat : Log4j exploits attempted on 44% of corporate networks; ransomware payl...
Researcher discloses three iOS zero-days, says they were reported to Apple before May 4 and are still exploitable in iOS 15 after Apple failed to fix them
what you need to know Mahit Huilgol / iPhone Hacks : Apple Reportedly Fails to Patch Multiple iOS 15 Zero-Day Vulnerabilities First Reported in March Pierluigi Paganini / Security Affairs : Researcher...