/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Greg Linares

@laughing_mantis
12 posts
2024-05-01
Omfg If you're gonna make a piece of expensive hardware and hide that it's just an android app, please hire a product security team to help prevent your product from being dumped in less than a week. Product security is as important as innovation.
2024-05-01 View on X
Android Authority

An APK review suggests Rabbit's R1 runs Android, and its entire UI is powered by a single Android app; founder Jesse Lyu says “rabbit r1 is not an Android app”

The Rabbit R1 is probably running Android and is certainly powered by an Android app under the hood.  —  •  —  TL;DR

2023-05-09
Huge win for Corellium and everyone else in Infosec. Apple's abuse of copyright laws here is similar to the ones it used to prevent Hackintosh and is one of the biggest reasons I am against them to this day. https://twitter.com/...
2023-05-09 View on X
Bloomberg Law

A US appeals court upholds a lower court's 2019 ruling rejecting Apple's claims that Corellium's CORSEC security tool for simulating iOS violated copyright law

2022-11-02
Legit really awesome tool but man do I want to abuse it for insider threat or data loss scenarios https://www.youtube.com/...
2022-11-02 View on X
TechCrunch

Rewind, whose Mac app creates a searchable recording to help users find what they've seen, said, or heard, raised a $10M seed led by a16z at a $75M valuation

Natasha Mascarenhas / TechCrunch :

2021-12-18
Shout out to so the awesome research done by @citizenlab in their latest report A few years ago mobile device remote exploitation was rare, but in 2021 we have seen several incidents. These attacks are not going away unfortunately and capabilities are getting better. https://twitter.com/...
2021-12-18 View on X
TechCrunch

Meta bans seven surveillance-for-hire groups, including Cytrox, removing over 1,500 Facebook and Instagram accounts and alerting 50K users who were targeted

Cytrox is one of seven surveillance companies now banned from Meta's platforms  —  While NSO Group was taking flak for hacking …

Shout out to so the awesome research done by @citizenlab in their latest report A few years ago mobile device remote exploitation was rare, but in 2021 we have seen several incidents. These attacks are not going away unfortunately and capabilities are getting better. https://twitter.com/...
2021-12-18 View on X
The Citizen Lab

Two Egyptians living in exile had their iPhones compromised in June 2021 using Predator spyware built by North Macedonian developer Cytrox

2021-12-17
Shout out to so the awesome research done by @citizenlab in their latest report A few years ago mobile device remote exploitation was rare, but in 2021 we have seen several incidents. These attacks are not going away unfortunately and capabilities are getting better. https://twitter.com/...
2021-12-17 View on X
The Citizen Lab

Two Egyptians living in exile had their iPhones compromised in June 2021 using Predator spyware built by North Macedonian developer Cytrox

Key Findings  — Two Egyptians—exiled politician Ayman Nour and the host of a popular news program (who wishes to remain anonymous) …

2021-12-13
PSA: attackers aren't just using #log4j attacks on internet facing devices. Groups I'm monitoring are going back to compromised networks and using it on subnets and on internal devices *very* successfully Insider threat is also an viable avenue of exploitation
2021-12-13 View on X
BleepingComputer

Researchers spot waves of attacks targeting unpatched Apache servers with the Log4j bug, exfiltrating data, spreading botnets, installing crypto miners, more

Threat actors and researchers are scanning for and exploiting the Log4j Log4Shell vulnerability to deploy malware or find vulnerable servers.

PSA: attackers aren't just using #log4j attacks on internet facing devices. Groups I'm monitoring are going back to compromised networks and using it on subnets and on internal devices *very* successfully Insider threat is also an viable avenue of exploitation
2021-12-13 View on X
Filippo.io

How the role of open-source maintainers could be professionalized, as the maintainer who fixed the Log4j zero-day says he works on the project in his spare time

Open Source software runs the Internet, and by extension the economy.  This is an undisputed fact about reality in 2021.

2021-11-25
@juanandres_gs How about blue teams who manage large amounts of assets with high levels of risk from state-sponsored and similar attacks? Would be absolutely great to get a direct line from Apple for threats similar to what Microsoft has had for years
2021-11-25 View on X
New York Times

Apple sues NSO Group in US federal court, seeking to ban NSO from using Apple products and alleging NSO illegally targeted Apple users with surveillance tools

2021-11-24
@juanandres_gs How about blue teams who manage large amounts of assets with high levels of risk from state-sponsored and similar attacks? Would be absolutely great to get a direct line from Apple for threats similar to what Microsoft has had for years
2021-11-24 View on X
New York Times

Apple sues NSO Group in US federal court, seeking to ban NSO from using Apple products and alleging NSO illegally targeted Apple users with surveillance tools

Apple accused NSO Group, the Israeli surveillance company, of “flagrant” violations of its software, as well as federal and state laws.

@juanandres_gs How about blue teams who manage large amounts of assets with high levels of risk from state-sponsored and similar attacks? Would be absolutely great to get a direct line from Apple for threats similar to what Microsoft has had for years
2021-11-24 View on X
Apple

Apple plans to notify targets of state-sponsored spyware attacks like NSO's ForcedEntry and commits $10M to cybersurveillance researchers and advocates

this is a good day to celebrate the formidable impact of @RonDeibert @jsrailton & the @citizenlab research team, systematically exposing human rights abuses and holding the industr...

2020-11-06
The fact that most tech outlets are discussing the 100 new emoji installed into iOS 14.2 update and not the fact that it patches an in the wild full blown kernel level exploit tool chain really tells you all you really need to know about current Apple security & iOS users.
2020-11-06 View on X
9to5Mac

Apple releases iOS 14.2 and iPadOS 14.2 with 100+ new emoji, optimized battery charging for AirPods, intercom support with HomePod and HomePod mini, and more

so hit that update button Chris Barylick / O'Grady's PowerPage : Apple releases iOS 14.2, iPadOS 14.2 updates, logs hefty number of new features and bug fixes Bogdan Popa / Softped...