/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Hakan

@hatr
74 posts
2025-11-27
“I saw your email, unfortunately I don't think my dad would respond to this because they think its some ‘scam email,’” said Saif, who told me he turns 16 years old next month.  “So I decided to talk to you directly.”  —  krebsonsecurity.com/2025/11/ meet...
2025-11-27 View on X
Krebs on Security

A profile of “Rey”, the admin of cybercriminal group Scattered LAPSUS$ Hunters, a 15-year-old from Amman, Jordan who cooperated with European police since June

A prolific cybercriminal group that calls itself “Scattered LAPSUS$ Hunters” has dominated headlines this year …

2025-11-25
“This has created a system where it makes financial sense for people from the entire world to specifically target Americans with highly engaging, divisive content.  It pays more. ”  —  www.404media.co/americas-pol...
2025-11-25 View on X
404 Media

X's location tool shows revenue sharing incentivizes US political content from international sock puppet and bot accounts, making polarization a side hustle

www.404media.co/americas-pol... @casuallylucid : “The only thing revealed by this transparency is that social media companies do not give a f*ck about this.”  —  Our attention is t...

“This has created a system where it makes financial sense for people from the entire world to specifically target Americans with highly engaging, divisive content.  It pays more. ”  —  www.404media.co/americas-pol...
2025-11-25 View on X
Techdirt

X exposing political accounts' location shows why trust and safety teams mattered: to combat coordinated inauthentic behavior, not “censorship” of viewpoints

from the it's-almost-as-if-there-are-some-bad- actors-online dept  —  For the last few years, Matt Taibbi …

2025-10-20
In Sirotin's case, the fatal mistake came in the form of two online purchases — a knife, bought with the same email address used to rent the suspicious servers discovered by investigators, and a pair of plane tickets he had bought for his parents  —  on.ft.com/4hhtmGd
2025-10-20 View on X
Financial Times

A look at the Crylock ransomware scheme, orchestrated by a Russian couple who targeted as many as 400,000 victims and earned €64M+ in bitcoin over eight years

a knife, bought with the same email address used to rent the suspicious servers discovered by investigators, and a pair of plane tickets he had bought for his parents  —  on.ft.com...

2025-09-09
“AP found a Chinese defense contractor, Huadi, worked with IBM to design the main policing system known as the “Golden Shield” for Beijing to censor the internet ... according to thousands of pages of classified government blueprints taken out of China by a whistleblower”  —  apnews.com/article/chin...
2025-09-09 View on X
Associated Press

Investigation: IBM, Dell, HP, Cisco, Oracle, Microsoft, Intel, Nvidia, and other US tech companies helped design and build China's digital surveillance state

BEIJING (AP) — The body camera hung from the top of the IV drip, recording the slightest twitch made by Yang Guoliang as he lay bloody …

2025-08-31
“So while the price of a unit of AI, known as a token, continues to drop, the number of tokens needed to accomplish many tasks is skyrocketing.”  —  www.wsj.com/tech/ai/ai-c...
2025-08-31 View on X
Wall Street Journal

The price per token for AI models has fallen, but costs for developers are rising as newer reasoning models require more tokens to complete tasks

With models doing more ‘thinking,’ the small companies that buy AI from the giants to create apps and services are feeling the pinch X: @ericjhonsa , @emollick , @mims , @mims , @m...

2025-05-28
„The workers had their company laptops sent to her address.  She'd unpack them, install remote access software and power them on for the North Koreans to log on.  She made sure connections ran smoothly and helped troubleshoot any issues.  www.wsj.com/business/nor...
2025-05-28 View on X
Wall Street Journal

Inside a “laptop farm” run by a 50-year-old US woman that let DPRK IT workers pose as US tech staff and illegally earn $17.1M from more than 300 US companies

A LinkedIn message drew a former waitress in Minnesota into a type of intricate scam involving illegal paychecks and stolen data Bluesky: @hatr and @martijnrasser . Forums: Slashdo...

2025-04-11
Will be interesting to see if/how this plays out in terms of any (non U.S.) gov-related business these now silent companies might have [embedded post]
2025-04-11 View on X
Reuters

The cybersecurity industry is quiet after Trump canceled SentinelOne's security clearances on April 9 for hiring Chris Krebs; SentinelOne says it will cooperate

The cybersecurity industry has gone mostly quiet after President Donald Trump took action against one of its prominent members.

This is an extraordinary story/admission  —  „The Chinese delegation linked years of intrusions into computer networks at U.S. ports, water utilities, airports and other targets, to increasing U.S. policy support for Taiwan"  —  www.wsj.com/politics/nat...
2025-04-11 View on X
Wall Street Journal

Sources: Chinese officials acknowledged in a secret December 2024 meeting that China was behind the Volt Typhoon hacks, tying them to the US' support for Taiwan

„The Chinese delegation linked years of intrusions into computer networks at U.S. ports, water utilities, airports and other targets, to increasing U.S. policy support for Taiwan" ...

2024-08-13
“the questions surrounding the origins of the documents and how they came to our attention were more newsworthy than the material that was in those documents” https://apnews.com/...
2024-08-13 View on X
Washington Post

The FBI is investigating an alleged Trump campaign hack; sources say the agency is probing suspected hacking attempts by Iran targeting Trump, Biden, and Harris

Is Harris pulling ahead of Trump? Martin Matishak / The Record : FBI says it is investigating purported Trump campaign hack Victor Nava / New York Post : FBI investigating alleged ...

“the questions surrounding the origins of the documents and how they came to our attention were more newsworthy than the material that was in those documents” https://apnews.com/...
2024-08-13 View on X
Associated Press

Politico, the NYT, the WaPo, and others say they received hacked Trump campaign materials, but gave few details, a marked contrast to Clinton's emails in 2016

At least three news outlets were leaked confidential material from inside the Donald Trump campaign, including its report vetting JD Vance as a vice presidential candidate.

2023-05-10
The U.S. “has monitored FSB officers assigned to Turla conducting daily operations using Snake from a known FSB facility in Ryazan, Russia” https://www.justice.gov/... More on #Turla's Ryazan-connection can be found in our investigation https://interaktiv.br.de/... cc @FlorianFlade
2023-05-10 View on X
CyberScoop

The US says the FBI disrupted a long-running Russian cyberespionage operation by inspecting FSB's Snake malware and decrypting and decoding its communications

AJ Vicens / CyberScoop :

2023-04-15
“After Andrew White was granted access to GPT-4, the new artificial intelligence system that powers the popular ChatGPT chatbot, he used it to suggest an entirely new nerve agent.” https://www.ft.com/...
2023-04-15 View on X
Financial Times

A look at OpenAI's “red team” of 50 academics and experts, hired in 2022 to look for issues such as toxicity, prejudice, and biases in GPT-4 before its release

Microsoft-backed company asked an eclectic mix of people to ‘adversarially test’ GPT-4, its powerful new language model

2023-04-10
Read this NYT investigation not only for its conclusions but also for sentences like this one “A third company told investors that another natural disaster like Uri could be a significant business opportunity” https://www.nytimes.com/...
2023-04-10 View on X
New York Times

A look at the impact of 34 US bitcoin mines and their extreme demand for energy, as the cost of electricity for locals increases in Texas and other areas

Bitcoin mines cash in on electricity — by devouring it, selling it, even turning it off — and they cause immense pollution.

2023-03-31
There is one on-record quote that unfortunately didn't make it into our article @derspiegel (https://www.spiegel.de/...) dealing with the ICS-related systems. It's by Tim Conway, Technical Director of ICS and SCADA programs at SANS. He had this to say. https://twitter.com/... https://twitter.com/...
2023-03-31 View on X
The Guardian

Leaked documents from Moscow-based NTC Vulkan reveal the company helps the GRU, FSB, and SVR with hacking operations, national infrastructure attacks, and more

2023-02-16
“Mandiant observed more destructive cyberattacks in Ukraine during the first four months of 2022 than in the previous eight years with attacks peaking around the start of the invasion” https://blog.google/...
2023-02-16 View on X
The Keyword

Analysis of the cyber threat landscape one year after Russia invaded Ukraine shows Russia's aggressive multi-pronged plan across five phases with mixed success

One year after the Russian invasion of Ukraine, Google TAG, Mandiant, and Trust & Safety provide insights into changes in the cyber threat landscape triggered by the war.

2022-12-27
Outstanding feature by @maxzierer and @r_ciesielski on biometric databases and dangers of storing all this info (in 🇩🇪) https://www.ardaudiothek.de/ ... @kashhill and @CFSchuetze also report: Military Database of Fingerprints and Iris Scans available on eBay, https://www.nytimes.com/...
2022-12-27 View on X
New York Times

German researchers bought a US military device, last used in Afghanistan in 2012, with fingerprints, iris scans, and other data on 2,632 people, for $68 on eBay

German security researchers studying biometric capture devices popular with the U.S. military got more than they expected for $68 on eBay.

2022-12-07
Really curious to know how Russia would be able to do this in order to identify Proton VPN https://www.nytimes.com/... https://twitter.com/...
2022-12-07 View on X
New York Times

How Geneva-based VPN startup Proton's ~25 engineers are fighting Russian censorship, a back-and-forth battle since the government blocked Proton in March 2022

The cat-and-mouse experience of Proton, a Swiss company, shows what it's like to be targeted by Russian censors — and what it takes to fight back. Tweets: @satariano , @hatr , @pro...

2022-12-02
„The issues we reported allow any attacker to access all data, including private posts, private messages, shared media and even deleted direct messages" https://zerforschung.org/...
2022-12-02 View on X
TechCrunch

Twitter alternative Hive temporarily shuts down after researchers found vulnerabilities that would have let hackers access DMs and edit others' Hive posts

2022-10-16
„The Wire" releases an article providing technical documentation and proof - such as verifying DKIM signatures of a sent e-mail and internal URLs - and stands by its reporting that Facebook so vehemently denied https://thewire.in/... https://twitter.com/...
2022-10-16 View on X
The Wire

In response to Meta's rebuttal of its XCheck report, The Wire shares a video of a source using a subdomain, DKIM signatures, and more, but experts are skeptical

& many mainstream foreign journalists also questioned The Wire's work. Now, @thewire_in says it's verified the email via- its DKIM signature. https://thewire.in/... Matthew Green /...