/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Crispin Burke

@crispinburke
13 posts
2024-09-05
The Tennessee-based [COMPANY-1] received nearly all of its $9.7 million in revenue from RT via shell companies.  [COMPANY-1] did not disclose to its viewers that it was operating on behalf of RT. Meanwhile...
2024-09-05 View on X
CNN

The US DOJ seizes 32 domains used in Russian influence campaigns, as part of efforts to tackle Russian efforts to influence the 2024 US presidential election

The Biden administration announced a sweeping set of actions to tackle a major Russian government-backed effort to influence …

2023-06-16
Microsoft identifies a new GRU-affiliated hacking group dubbed “Cadet Blizzard”. During the runup to the Ukraine war, the group deployed destructive malware posing as simple ransomware. Cadet Blizzard primarily targets government and law enforcement. https://cyberscoop.com/...
2023-06-16 View on X
BleepingComputer

Microsoft details Cadet Blizzard, a GRU hacking group behind the WhisperGate data-wiping attacks in Ukraine carried out a month before Russia's 2022 invasion

2023-04-24
The hacking organization run by Unit 74455 of Russia's GRU is referred to by the following names: - Voodoo Bear - Sandworm - Iridium - Seashell Blizzard (among others) https://www.wired.com/...
2023-04-24 View on X
Wired

Hacker group naming schemes, such as Microsoft's new system, are counterproductive for cybersecurity analysis; a government body should set a naming convention

Pumpkin Sandstorm.  Spandex Tempest.  Charming Kitten.  Is this really how we want to name the hackers wreaking havoc worldwide?

2022-01-17
Ukrainian authorities suspect a Belarus-based hacking group known as UNC1151, or “Ghostwriter”, defaced several Ukrainian government websites. Ukrainian intelligence also believes the campaign was a cover for more sophisticated cyber activity. https://www.reuters.com/...
2022-01-17 View on X
Microsoft Security Blog

Microsoft identifies a destructive malware operation targeting Ukrainian organizations; the malware looks like ransomware but lacks a ransom recovery mechanism

European Union simulated a cyber attack on a fictitious Finnish power company Vilius Petkauskas / cybernews.com : Belarus state hackers suspected behind Ukraine cyberattack Grugq /...

2021-10-25
In the two years leading up to the 2020 election, Facebook removed over five *billion* fake accounts. https://www.bloomberg.com/...
2021-10-25 View on X
Washington Post

Sources detail Zuckerberg's decisions putting growth over safety, like censoring “anti-state” posts in Vietnam and opposing a US voting info center in Spanish

Late last year, Mark Zuckerberg faced a choice: Comply with demands from Vietnam's ruling Communist Party …

In the two years leading up to the 2020 election, Facebook removed over five *billion* fake accounts. https://www.bloomberg.com/...
2021-10-25 View on X
New York Times

Internal docs detail Facebook's struggles with violence-inciting content in India, including failure to designate some politically-connected groups as dangerous

good and bad. This has risks (as these leaks show) but are the only honest way to tackle the problem. Would love to see the same from https://abc.xyz/ Thomas Baekdal / @baekdal : I...

2021-10-24
In the two years leading up to the 2020 election, Facebook removed over five *billion* fake accounts. https://www.bloomberg.com/...
2021-10-24 View on X
New York Times

Internal docs detail Facebook's struggles with violence-inciting content in India, including failure to designate some politically-connected groups as dangerous

Internal documents show a struggle with misinformation, hate speech and celebrations of violence in the country, the company's biggest market.

2021-06-06
There also appears to have been no Multi-Factor Authentication. https://twitter.com/...
2021-06-06 View on X
Bloomberg

Investigator says hackers breached Colonial Pipeline through a VPN account whose password has since been discovered inside a batch of leaks on the dark web

🍿 Gangster Coworking CNN : Ransomware attackers used compromised password to access Colonial Pipeline network Kim Lyons / The Verge : Hackers reportedly used a compromised password...

2021-06-05
There also appears to have been no Multi-Factor Authentication. https://twitter.com/...
2021-06-05 View on X
Bloomberg

Investigator says hackers breached Colonial Pipeline through a VPN account whose password has since been discovered inside a batch of leaks on the dark web

- Investigators suspect hackers got password from dark web leak  — Colonial CEO hopes U.S. goes after criminal hackers abroad

2020-12-27
The world's first microprocessor was installed on the F-14 Tomcat and was used to help automatically determine how far to sweep its wings. https://www.wired.com/... via @wired @sarahfallon
2020-12-27 View on X
Wired

Profile of Ray Holt, who in the 1960s jointly developed the F-14 Tomcat's Central Air Data Computer, considered by some to be the first microprocessor

and a reminder that “Indian Ocean, Present Day” was in fact a very long time ago https://twitter.com/... Clive Thompson / @pomeranian99 : Wonderful piece by @sarahfallon in @WIRED ...

2020-12-26
The world's first microprocessor was installed on the F-14 Tomcat and was used to help automatically determine how far to sweep its wings. https://www.wired.com/... via @wired @sarahfallon
2020-12-26 View on X
Wired

Profile of Ray Holt, who in the 1960s jointly developed the F-14 Tomcat's Central Air Data Computer, considered by some to be the first microprocessor

In a weird way, I've known Ray Holt all my life, but I never knew what he had accomplished—or how his inventions wove their way into my own family. Tweets: @airpir_southern , @sara...

2019-08-06
North Korea raised $2bn for its WMD program through cybercrime targeting financial institutions, cryptocurrency exchanges, and through ransomware attacks. https://www.reuters.com/...
2019-08-06 View on X
Reuters

Leaked UN report: North Korea has generated an estimated $2B using widespread and sophisticated cyberattacks to steal from banks and cryptocurrency exchanges

UNITED NATIONS (Reuters) - North Korea has generated an estimated $2 billion for its weapons of mass destruction programs using …

2018-01-10
“When governments do this stuff, they are our best marketing tool,” says maker or circumvention app for Telegram. http://www.wsj.com/...
2018-01-10 View on X
Wall Street Journal

Sources: Iran's attempts to block Telegram drive millions to censorship circumvention tools for PC and mobile like Lantern and Psiphon

Sam Schechner / Wall Street Journal :