/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

@sherrod_im

@sherrod_im
12 posts
2024-09-01
This is a very interesting attack chain. Especially from a Sleet actor. North Korean threat actor Citrine Sleet exploiting Chromium zero-day https://www.microsoft.com/...
2024-09-01 View on X
TechCrunch

Microsoft says a North Korean hacking group earlier in August exploited a now-patched zero-day in a Chromium core engine to steal crypto from organizations

Lorenzo Franceschi-Bicchierai / TechCrunch :

2024-08-31
This is a very interesting attack chain. Especially from a Sleet actor. North Korean threat actor Citrine Sleet exploiting Chromium zero-day https://www.microsoft.com/...
2024-08-31 View on X
TechCrunch

Microsoft says a North Korean hacking group earlier in August exploited a now-patched zero-day in a Chromium core engine to steal crypto from organizations

A North Korean hacking group earlier in August exploited a previously unknown bug in Chrome to target organizations with the goal …

2024-05-05
“If you're faced with the tradeoff between security and another priority, your answer is clear: Do security” — Satya Nadella, CEO Microsoft, May 3, 2024. https://www.microsoft.com/...
2024-05-05 View on X
The Verge

Microsoft outlines security principles and goals tied to executive compensation packages, following a scathing US Cyber Safety Review Board report in April 2024

expanding Microsoft's Secure Future Initiative Tom Krazit / Runtime : Microsoft wants to be judged on security Nick Heer / Pixel Envy : Microsoft Says It Is Prioritizing Security A...

2024-05-04
“If you're faced with the tradeoff between security and another priority, your answer is clear: Do security” — Satya Nadella, CEO Microsoft, May 3, 2024. https://www.microsoft.com/...
2024-05-04 View on X
The Verge

Microsoft outlines security principles and goals tied to executive compensation packages, following a scathing US Cyber Safety Review Board report in April 2024

expanding Microsoft's Secure Future Initiative Tom Warren / The Verge : Read Satya Nadella's Microsoft memo on putting security first Tom Krazit / Runtime : Microsoft wants to be j...

2024-04-17
Microsoft tracks this group as seashell blizzard, aka IRIDIUM. 🐚
2024-04-17 View on X
Wired

Mandiant links hacktivist group Cyber Army of Russia, which claimed to target utilities in France, the US, and Poland, to Russia-linked hacking group Sandworm

Cyber Army of Russia Reborn, a group with ties to the Kremlin's Sandworm unit, is crossing lines even that notorious cyberwarfare unit wouldn't dare to.

2023-07-21
We need a complete overhaul to bug bounties and bug reporting. This is crazy. Read the article before you @ Katie. https://techcrunch.com/...
2023-07-21 View on X
TechCrunch

A Google bug report says the company fixed a Chrome zero-day that an Apple employee found during a March 2023 hacking competition but did not report to Google

Someone else in the competition, who did not find the bug and wasn't even on the same team, reported it. … Twitter: @iancoldwater : This seems so mundane that I'm not sure why it w...

2023-05-03
Midnight Blizzard aka NOBELLIUM attack walkthrough. I'd like to see this done as an attack chain animation showing the spread and various timelines. Fantastic story. Nice work @KimZetter https://www.wired.com/...
2023-05-03 View on X
Wired

An in-depth look inside the US DOJ and Volexity's investigation into the SolarWinds hack, one of the most sophisticated cyberespionage campaigns of the decade

I'd like to highlight this bit.  Zero trust, my arse.  Lots of new details in this report. https://www.wired.com/... Tweets: Stephane Taillat / @staillat : A great work by @KimZett...

2022-03-11
🙇🏻‍♀ ️ There are a few things you just don't do. You don't roll your own encryption. You don't try to make your own in house splunk. And you don't create your own cert authority. https://www.bleepingcomputer.com/ ...
2022-03-11 View on X
BleepingComputer

Russia has created its own trusted TLS certificate authority as sanctions prevent Russian sites from renewing existing TLS certificates

Yeah, RIGHT TechRadar : Russia creates its own TLS certificate authority to bypass sanctions Leigh Mc Gowran / Silicon Republic : Russia issues its own TLS certificates to get past...

2021-04-26
I'm so sad about this. Dan did so many things for me early in my career. His kindness and patience and lighthearted approach kept me going many times. He treated me like a peer when he was a giant. I'm very sad 😔 https://twitter.com/...
2021-04-26 View on X
CircleID

Dan Kaminsky, the celebrated security researcher widely known for his work on discovering crucial DNS security flaws and Sony Rootkit infections, has died at 42

Saddened by news of the death of Dan Kaminsky, a member of the ICANN Trusted … Pierluigi Paganini / Security Affairs : The cybersecurity researcher Dan Kaminsky has died Tweets: Sa...

2021-04-25
I'm so sad about this. Dan did so many things for me early in my career. His kindness and patience and lighthearted approach kept me going many times. He treated me like a peer when he was a giant. I'm very sad 😔 https://twitter.com/...
2021-04-25 View on X
CircleID

Dan Kaminsky, the celebrated security researcher widely known for his work on discovering crucial DNS security flaws and Sony Rootkit infections, has died at 42

The celebrated security researcher, Dan Kaminsky, widely known for his work on discovering crucial DNS security flaws …

2021-04-17
This is shocking but I'm glad they found them. https://apnews.com/...
2021-04-17 View on X
MIT Technology Review

A look at Positive Technologies, a Russian cybersecurity firm sanctioned by the US, which sources say provides hacking tools and ops support for Russian spies

Washington has sanctioned Russian cybersecurity firm Positive Technologies.  US intelligence reports claim it provides hacking tools and runs operations for the Kremlin.

This is shocking but I'm glad they found them. https://apnews.com/...
2021-04-17 View on X
Associated Press

Microsoft removes Positive Technologies from a list of vendors it gives early access to vulnerability info; IBM also lists Positive as a security partner

MAPP Lily Hay Newman / Wired : Security News This Week: How the FBI Finally Got Into the San Bernardino Shooter's iPhone Dan Goodin / Ars Technica : US government strikes back at K...