/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Ravi Nayyar

@ravirockks
7 posts
2024-05-07
And here is the strategy: https://www.state.gov/... That @SecBlinken himself launched the strategy _at RSA_ is a great statement.
2024-05-07 View on X
New York Times

US and Chinese diplomats plan to meet later in May to find common ground on AI usage and situations where AI should be banned, like controlling nuclear arsenals

It's becoming more advanced, intelligence officials say Michael Novinson / GovInfoSecurity.com : Boosting US Tech Leadership: Antony Blinken's Agenda at RSAC Karen Spiegelman / Dar...

2024-01-22
Fundamental points by @ciaranmartinoxf about the British Library incident and its aftermath. = Why resilience matters. https://ciaranmartin.substack.com/ ... [image]
2024-01-22 View on X
Ciaran's Crispy Cogitations

British Library hack lessons for the UK: ransomware is a national security issue, a national response is required, policy mitigations are available, and more

Introduction, apology, caveat, and then another apology  —  The introduction: For nearly three months, the British Library …

2023-11-16
So shocked and surprised and befuddled by this. https://blog.gitguardian.com/ ... [image]
2023-11-16 View on X
Ars Technica

GitGuardian: nearly 3K of the 450K projects submitted to PyPI exposed at least one credential in code, like API keys, including some from “very large companies”

Many transgressions come from “very large companies that have robust security teams.”

2023-11-09
'[Sandworm] first used OT-level living off the land (LotL) techniques to likely trip the victim's substation circuit breakers, causing an unplanned power outage that coincided [!!!] with mass missile strikes on critical infrastructure across Ukraine. https://www.mandiant.com/...
2023-11-09 View on X
Wired

Mandiant: Russia-tied Sandworm carried out a third successful attack on Ukraine's electric utility in October 2022, coinciding with a series of missile strikes

Russia's most notorious military hackers successfully sabotaged Ukraine's power grid for the third time last year.

2023-11-01
‘... progress the Iranian actors have undergone over the last few years. The techniques utilized in recent Scarred Manticore operations are notably more sophisticated compared to previous activities CPR has tied to Iran’. https://research.checkpoint.com/ ...
2023-11-01 View on X
New York Times

Check Point details Iran's monthslong hacking espionage campaign targeting the country's rivals, like Israel, underscoring Iran's improved hacking capabilities

A monthslong hacking campaign targeted the governments of regional rivals, including Israel, and marked a turn, a new report says …

2022-03-29
‘Sitel and Mandiant did not dispute the contents of the reports but declined to comment’. Well, well, well.
2022-03-29 View on X
Wired

Leaked Mandiant report: Okta's contractor Sitel first sent a Lapsus$ breach notification to Okta on January 25 and a detailed “Intrusion Timeline” on March 17

Documents shed some light on how Okta and its subprocessor Sitel reacted to a breach, but they don't explain the apparent lack of urgency.

2021-07-24
@nicoleperlroth The initial reporting on the targeting of, say, the Indians whose phones were not analysed by Amnesty was written in such a hedgy ‘potential’ fashion, it was as if the outlets' lawyers themselves deserved the byline.
2021-07-24 View on X
Zero Day

Uncertainty about the nature of the list of 50K potential Pegasus targets created confusion and controversy, but doesn't negate the investigation's key findings

A series of blockbuster stories published this week around a leaked list of 50,000 phone numbers have created confusion …