/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Rob Joyce

@rgb_lights
10 posts
2025-06-18
Predatory Sparrow strikes again. This time they drained funds from an Iran-based crypto exchange. Beyond theft, they targeted trust, undermining a key tool Iran uses to evade sanctions. Nobody with options will keep crypto assets there now.
2025-06-18 View on X
CyberScoop

A cyberattack claimed by pro-Israel hacktivist group Predatory Sparrow has reportedly disrupted services at Iran's state-owned Bank Sepah, including its website

The attack introduces a clear cyber element with immediate consequences for the country's critical infrastructure amid a growing conflict between Israel and Iran.

Predatory Sparrow's past cyber attacks on Iranian steel plants and gas stations have demonstrated tangible effects in Iran. Disrupting the availability of this bank's funds, or triggering a broader collapse of trust in Iranian banks, could have major impacts there.
2025-06-18 View on X
CyberScoop

A cyberattack claimed by pro-Israel hacktivist group Predatory Sparrow has reportedly disrupted services at Iran's state-owned Bank Sepah, including its website

The attack introduces a clear cyber element with immediate consequences for the country's critical infrastructure amid a growing conflict between Israel and Iran.

2024-09-24
This is why handing root-level access to Kaspersky was a huge risk. Users were “migrated” - software uninstalled and a totally different product was installed automagically. They had total control of your machine. #itsabouttrust
2024-09-24 View on X
TechCrunch

US customers of Kaspersky antivirus find that UltraAV was installed remotely to replace Kaspersky on their PCs, after a Kaspersky deal with UltraAV owner Pango

switchover caught many users by surprise Ernestas Naprys / Cybernews.com : Kaspersky users shocked by automatic antivirus replacement without explicit permission Sofia Elizabella W...

2024-06-27
Patch or take your moveit appliance offline. The regret factor will be high.
2024-06-27 View on X
Ars Technica

Progress Software discloses a critical vulnerability in MOVEit's SFTP module; hackers exploited a similar flaw in MOVEit in 2023 to breach almost 1,800 networks

A similar flaw last year left 1,800 networks breached.  Will the latest one be as potent?  —  A critical vulnerability …

2024-06-04
I actually take the existence of this database as a good sign. Google is systemically tracking where they have problems and need to address. It's a demonstration of a culture looking to do things right and improve. The leaking of the database is another issue, however.
2024-06-04 View on X
Insider Gaming

Sources and leaked documents detail YouTube's gaming leak culture, as some staff watch non-public videos and leak info; YouTube has investigated multiple staff

According to a report from 404 Media, which has allegedly obtained an internal Google database tracking six years of potential privacy …

I actually take the existence of this database as a good sign. Google is systemically tracking where they have problems and need to address. It's a demonstration of a culture looking to do things right and improve. The leaking of the database is another issue, however.
2024-06-04 View on X
404 Media

A leaked internal Google database tracking thousands of privacy and security issues from 2013 to 2018 details a myriad of data management mistakes Google made

2024-05-31
Kudos to everyone involved in Operation Engame. It's a serious pushback against criminal capabilities that cause massive harm. Yes, there will be reconstitution in the future, but you can never stop challenging the bad actors in this space.
2024-05-31 View on X
Associated Press

Europol says police in Germany, the UK, the US, and others took down botnets spreading ransomware via infected emails, arrested four, and seized 2,000+ domains

International law enforcement and partners have joined forces. Europol : Largest ever operation against botnets hits dropper malware ecosystem Bill Toulas / BleepingComputer : Poli...

2024-05-30
Kudos to everyone involved in Operation Engame. It's a serious pushback against criminal capabilities that cause massive harm. Yes, there will be reconstitution in the future, but you can never stop challenging the bad actors in this space.
2024-05-30 View on X
Associated Press

Europol says police in Germany, the UK, the US, and others took down botnets spreading ransomware via infected emails, arrested four, and seized 2,000+ domains

Police coordinated by the European Union's justice and police agencies have taken down computer networks responsible …

2020-12-03
Wow. An iOS exploit that doesn't involve chaining multiple vulnerabilities together is quite an accomplishment. https://twitter.com/...
2020-12-03 View on X
The Verge

Researcher details a zero-click iOS device exploit using Apple's AWDL protocol, now patched, which could have granted access to device hardware and data

A Google Project Zero researcher found a stunning vulnerability  —  Ever watch that movie, or play that video game …

2020-12-02
Wow. An iOS exploit that doesn't involve chaining multiple vulnerabilities together is quite an accomplishment. https://twitter.com/...
2020-12-02 View on X
The Verge

Researcher details a now patched zero-click iOS device exploit using Apple's AWDL protocol which would grant attackers access to device hardware and data

A Google Project Zero researcher found a stunning vulnerability  —  Ever watch that movie, or play that video game …