/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Rik Ferguson

@rik_ferguson
12 posts
2024-06-29
If the TeamViewer breach is ultimately confirmed to have impacted beyond their “Corporate IT environment” it could potentially become the most damaging supply chain attack we have yet witnessed. by me over on LI https://www.linkedin.com/...
2024-06-29 View on X
BleepingComputer

TeamViewer warns that its corporate environment was breached on June 26 and attributes the cyberattack to the Russian hacking group APT29, aka Midnight Blizzard

but customer and company data is safe Alex Ivanovs / Stack Diary : TeamViewer confirms Russian spies hacked its corporate network The Hacker News : TeamViewer Detects Security Brea...

2024-06-28
If the TeamViewer breach is ultimately confirmed to have impacted beyond their “Corporate IT environment” it could potentially become the most damaging supply chain attack we have yet witnessed. by me over on LI https://www.linkedin.com/...
2024-06-28 View on X
BleepingComputer

TeamViewer warns that its corporate environment was breached on June 26, and attributes the cyberattack to the Russian hacking group APT29 aka Midnight Blizzard

The remote access software company TeamViewer is warning that its corporate environment was breached in a cyberattack yesterday …

2024-02-20
Patch now is too late for #LockBit The ransomware group claims that law enforcement compromised them by exploiting CVE-2023-3824 (PHP). LE have seized control of most of LockBit's web sites, inc. affiliate panel where they warned affiliates they'll “be in touch soon.” [image]
2024-02-20 View on X
BleepingComputer

Law enforcement agencies arrest two LockBit operators in Poland and Ukraine, issue three arrest warrants, offer a decryption tool, and seize 200+ crypto wallets

Law enforcement arrested two operators of the LockBit ransomware gang in Poland and Ukraine, created a decryption tool …

As a result of our work, <..>. The Agency has obtained over 1,000 decryption keys and will be contacting UK-based victims in the coming days and weeks to offer support and help them recover encrypted data. https://www.nationalcrimeagency.gov.uk/ ...
2024-02-20 View on X
BleepingComputer

Law enforcement agencies arrest two LockBit operators in Poland and Ukraine, issue three arrest warrants, offer a decryption tool, and seize 200+ crypto wallets

Law enforcement arrested two operators of the LockBit ransomware gang in Poland and Ukraine, created a decryption tool …

2023-11-28
Decryptors for LockerGoga and MegaCortex now available at https://nomoreransom.org/
2023-11-28 View on X
BleepingComputer

Europol, Norway, the US, Ukraine, and other countries arrest members of a ransomware group in Ukraine linked to attacks on organizations in 71 countries

In cooperation with Europol and Eurojust, law enforcement agencies from seven nations have arrested in Ukraine the core members …

2023-02-09
Our friends @CISAgov have released a recovery script for organisations affected by the ESXiArgs ransomware https://us-cert.cisa.gov/...
2023-02-09 View on X
The Record

The CISA publishes a recovery script for the ESXiArgs ransomware that encrypted files at 3,800+ organizations across the US, France, Italy, and other countries

The Cybersecurity and Infrastructure Security Agency has published a process for recovering files for organizations affected …

2022-09-17
Second time in a week that I have heard of hardcoded PAM secrets giving an opportunistic attacker *all the access* to a global corp. Technology is wholly dependent upon proper implementation and process. It's easy to point fingers at a product, but often wrong. https://twitter.com/...
2022-09-17 View on X
Washington Post

Uber's hacker, who claims to be 18 years old, says he hacked Uber for fun, using social engineering, might leak source code, and has access to its AWS account

Washington Post :

Second time in a week that I have heard of hardcoded PAM secrets giving an opportunistic attacker *all the access* to a global corp. Technology is wholly dependent upon proper implementation and process. It's easy to point fingers at a product, but often wrong. https://twitter.com/...
2022-09-17 View on X
The Verge

Uber says there is “no evidence” the hacker accessed sensitive user info, like trip histories, during the breach and that all its products are now “operational”

Uber says there is “no evidence” that any of its users' private information was compromised in a breach of its internal computer systems.

2022-09-16
Second time in a week that I have heard of hardcoded PAM secrets giving an opportunistic attacker *all the access* to a global corp. Technology is wholly dependent upon proper implementation and process. It's easy to point fingers at a product, but often wrong. https://twitter.com/...
2022-09-16 View on X
Washington Post

Uber hacker, who claims to be 18 years old, says he hacked Uber for fun, using social engineering, might leak source code, and has access to Uber's AWS account

The company said in a tweet it was “responding to a cybersecurity incident”  —  SAN FRANCISCO — Uber's computer systems …

Second time in a week that I have heard of hardcoded PAM secrets giving an opportunistic attacker *all the access* to a global corp. Technology is wholly dependent upon proper implementation and process. It's easy to point fingers at a product, but often wrong. https://twitter.com/...
2022-09-16 View on X
New York Times

Uber takes some internal systems offline to investigate a network breach; Yuga Labs' Sam Curry says it appears the hacker pretty much has “full access to Uber”

The company said on Thursday that it was looking into the scope of the apparent hack.

2021-11-05
... and in a flash, the GDPR “right to erasure” became meaningless. https://twitter.com/...
2021-11-05 View on X
Vox

Meta will retain some of its facial recognition systems, including its DeepFace model, and plans to incorporate biometrics into its metaverse products

Rebecca Heilweil / Vox :

2021-11-04
... and in a flash, the GDPR “right to erasure” became meaningless. https://twitter.com/...
2021-11-04 View on X
Vox

Meta will retain some of its facial recognition systems, including its DeepFace model, and plans to incorporate biometrics into its metaverse products

The social network is scaling back facial recognition, but similar technology could show up in the metaverse.