/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Heather Adkins

@argvee
13 posts
2025-02-10
Learn why those employee phishing tests are causing more embarrassment than education from @Google's @0xMatt who has seen their pitfalls firsthand. Here's the story from @WSJ @bobmcmillan: https://www.wsj.com/...
2025-02-10 View on X
Wall Street Journal

A study found that phishing tests and other training programs designed to educate employees about online dangers reduced phishing success rates by just 2%

Robert McMillan / Wall Street Journal : X: @argvee . LinkedIn: Matt Linton X: Heather Adkins / @argvee : Learn why those employee phishing tests are causing more embarrassment tha...

2024-10-17
A few words about @Google's approach to memory safety from the engineers on the front lines! It's important we not leave the same mess that the generations before us left us. https://security.googleblog.com/ ...
2024-10-17 View on X
Google Online Security Blog

Google projects the number of reported Android memory safety flaws to be 36 by the end of 2024, down from 220+ in 2019, after adopting memory safety in new code

https://security.googleblog.com/ ... Chandler Carruth / @chandlerc@hachyderm.io : Proud to start sharing Google's strategy for tackling our remaining memory safety challenges: http...

2023-12-22
This chapter for Lapsus$ has come to a close. Thanks @joetidy for citing the Cyber Safety Review Board's report. Shining a light on the need for helping teenage hackers take the right paths always felt very important. H/T @DHS_Policy @k8em0 @DAlperovitch @NSA_CSDirector et al.
2023-12-22 View on X
Bloomberg

A UK judge sentences Arion Kurtaj, the 18-year-old who leaked GTA VI code and hacked Nvidia, to a secure hospital until a mental health tribunal lets him leave

Katharine Gemmell / Bloomberg :

2023-08-11
The CSRB has released its second ever report on cyber safety, a study of a loosely affiliated hacker group that compromised dozens of well-defended companies with low-complexity attacks. https://www.cisa.gov/...
2023-08-11 View on X
The Verge

CISA releases a report detailing Lapsus$'s key techniques, calls for passwordless logins, and asks the FTC and the FCC for stricter SIM swapping protections

> Homeland Security report details how teen hackers exploited security weaknesses in some of the world's biggest companies. “We are seeing a rise in juvenile cybercrime,” @SecMayor...

2023-04-22
Multi-layered supply chain attack. To gently disagree with @riskybusiness and @Metlstorm, this 3CX situation is a super interesting example and a warning to us all about software development in small companies whose specialization and expertise is not software development. https://twitter.com/...
2023-04-22 View on X
Wired

Mandiant says the North Korea-linked hack of VoIP company 3CX's customers is the first confirmed incident of one software-supply-chain attack enabling another

perhaps the first confirmed case of one software supply chain attack causing another. https://www.wired.com/... Kim Zetter / @kimzetter : I've updated story about 3XC/X_Trader with...

2023-03-29
Who is APT43? Mandiant shining a light on some very interesting threat actors operating in North Korea. Happy graduation day! https://www.mandiant.com/...
2023-03-29 View on X
Wired

Researchers say North Korean hackers are likely laundering stolen crypto by renting cloud compute to mine fresh coins, avoiding more scrutinized crypto mixers

A spy group working for the Kim regime has been feeding stolen coins into crypto mining services in an effort to throw tracers off their trail.

2022-08-31
Over ~12 years @GoogleVRP has paid out >$38M in rewards for security vulnerabilities. Today we're upping our game by launching a new Google OSS VRP for major projects we contribute to like Golang, Angular and Fuchsia. https://security.googleblog.com/ ...
2022-08-31 View on X
The Record

Google launches a bug bounty program for its open-source projects, offering payouts up to $31,337, one of the first open source-specific vulnerability programs

2022-05-06
1 year later and we're getting closer to eliminating passwords! @Google is excited to announce @FIDOAlliance passwordless support across Android, Chrome & ChromeOS. https://blog.google/... #WorldPasswordDay https://twitter.com/...
2022-05-06 View on X
CNET

Apple, Google, and Microsoft plan to offer the FIDO Alliance's passwordless tech on websites and apps, using fingerprint readers, face scanners, and smartphones

a perfect time to think about passkeys. https://www.apple.com/... @can : some dreams come true https://twitter.com/... @k8em0 : This is a true game changer in security https://twit...

2022-02-04
Incredibly honored to be appointed to our nation's inaugural CSRB. There is no greater honor than to serve. Looking forward to working with the august panel on making the whole world a safer place! Thank you @AliMayorkas, @CISAJen and Rob Silvers for the opp. Let's get to work! https://twitter.com/...
2022-02-04 View on X
Wall Street Journal

White House forms the Cyber Safety Review Board, loosely modeled on NTSB, to investigate major national cybersecurity failures, starting with the Log4j bug

2022-01-10
A nice write up. TL;DR - out of necessity, web3 is already experiencing necessary platform centralization (and below-par privacy - eek), despite design goals to be decentralized; it's early days but likely has the momentum to continue. https://twitter.com/...
2022-01-10 View on X
r/ethereum on Reddit

Ethereum co-founder responds: “the properly authenticated decentralized blockchain world is coming”, but is slowed by “limited technical resources and funding”

I've been thinking about Matt Mullenweg's response to Brian Armstrong's response … Rick Webb / Webb Chatham Report : Good morning. Hello. How are you? #562 Cooper Midroni / Future ...

2022-01-09
A nice write up. TL;DR - out of necessity, web3 is already experiencing necessary platform centralization (and below-par privacy - eek), despite design goals to be decentralized; it's early days but likely has the momentum to continue. https://twitter.com/...
2022-01-09 View on X
r/ethereum on Reddit

Ethereum co-founder responds: “the properly authenticated decentralized blockchain world is coming”, but is slowed by “limited technical resources and funding”

The word “server” imo is not very useful in the blockchain context; it combines together a bundle of concepts that are best treated separately.

2022-01-08
A nice write up. TL;DR - out of necessity, web3 is already experiencing necessary platform centralization (and below-par privacy - eek), despite design goals to be decentralized; it's early days but likely has the momentum to continue. https://twitter.com/...
2022-01-08 View on X
Moxie Marlinspike

How Web3 apps and wallets inevitably depend on centralized services like OpenSea, Infura, and Alchemy, which don't even provide authenticated responses

Despite considering myself a cryptographer, I have not found myself particularly drawn to “crypto.”  I don't think I've ever actually said the words …

2021-05-07
Today is #WorldPasswordDay! Someday, we'll get to deprecate this holiday, but until then it's important we give people great tools. Here's a feature update from my @Google colleague @mrisher who is fighting the good fight on keeping Passwords safe. https://blog.google/...
2021-05-07 View on X
VICE

Google says it will start verifying users with 2FA enabled using a prompt on their phones, and will soon start automatically enabling 2FA for all users

The company is making some changes to encourage more people to adopt a key digital security mechanism.  —  Lorenzo Franceschi-Bicchierai