/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Richard Bejtlich

@taosecurity
14 posts
2022-06-25
As a follow-up to the last Tweet, more evidence cryptocurrency is currently a total failure. Once you accept the risk that you're in a Ponzi scheme, you then risk being cleaned out by another set of criminals. https://twitter.com/...
2022-06-25 View on X
Cointelegraph

Harmony stops its Horizon bridge between Ethereum, Binance Chain, and Bitcoin after a theft of ~$100M in altcoins; Harmony says its BTC bridge was not impacted

The layer-1 blockchain's main bridge between Ethereum, Binance Chain, and Bitcoin has been exploited for nine figures, but says its BTC bridge has not been affected.

2021-08-31
💯This is the argument I made for China in 2017 and it applies equally well to all US strategic competitors. https://taosecurity.blogspot.com/ ... https://twitter.com/...
2021-08-31 View on X
The Moscow Times

Russia has made steady progress toward its goal of weaning Russians off US tech, including by mandating Russian-made software in government offices and schools

Andrei Soldatov / The Moscow Times : Tweets: @imposecost , @michaelbkelley , @alubacap , @taosecurity , and @mcfaul Tweets: Andrew Thompson / @imposecost : It seems they will not ...

2021-06-03
Wow, the FireEye acquisition of Mandiant is unwinding. https://twitter.com/...
2021-06-03 View on X
TechCrunch

FireEye says it is selling its products business to PE firm Symphony Technology Group for $1.2B in cash; deal splits FireEye from digital forensics arm Mandiant

Cybersecurity giant FireEye has agreed to sell its products business to a consortium led by private equity firm Symphony Technology Group for $1.2 billion.

2020-12-21
How about that! I mentioned this idea earlier today. I concur with the anonymous official who expects it to go through, but with a delayed implementation date, say 1 Oct 2021, for the next fiscal year. I hope my recommendation for a civilian DirNSA develops too. HT @DAlperovitch https://twitter.com/...
2020-12-21 View on X
Defense One

WH officials propose ending the “dual-hat” leadership arrangement of NSA and Cyber Command, renewing debate over splitting up the agencies amid recent attacks

though “when” is a tricky question. But the idea that this is going to happen in the final 32 days of an administration, under an acting SefDef, without congressional support (and ...

2020-12-20
How about that! I mentioned this idea earlier today. I concur with the anonymous official who expects it to go through, but with a delayed implementation date, say 1 Oct 2021, for the next fiscal year. I hope my recommendation for a civilian DirNSA develops too. HT @DAlperovitch https://twitter.com/...
2020-12-20 View on X
Defense One

WH officials propose ending the “dual-hat” leadership arrangement of NSA and Cyber Command, renewing debate over splitting up the agencies amid recent attacks

An end to the “dual hat” arrangement has been debated for years — but the timing raises questions.

2020-08-21
CSOs and CISOs — this is an example of how NOT to handle an intrusion investigation, and now DoJ is imposing consequences. https://twitter.com/...
2020-08-21 View on X
New York Times

Former Uber CSO Joe Sullivan charged with obstruction of justice for trying to conceal the 2016 data breach of millions of users and drivers from FTC officials

Joe Sullivan, who led Uber's security team through the company's most tumultuous period, was fired by the company's newly installed chief executive in 2017.

2020-06-16
“Innocent until proven guilty” of course, but I'd like to emphasize that none of the activity alleged in this document has ANYTHING to do with security, “intelligence” or “threat intelligence” work. It's pure criminality and utterly disgusting. https://twitter.com/...
2020-06-16 View on X
Protocol

Brightside, a financial health service offering expert assistance, says it closed a $35M Series A at the end of last year, led by Andreessen Horowitz

A pandemic in which thousands of businesses are struggling to pay bills seems like an odd time to voluntarily take on debt, especially for a startup.

“Innocent until proven guilty” of course, but I'd like to emphasize that none of the activity alleged in this document has ANYTHING to do with security, “intelligence” or “threat intelligence” work. It's pure criminality and utterly disgusting. https://twitter.com/...
2020-06-16 View on X
CBS Boston

Six former employees of eBay charged with leading a cyberstalking campaign against a couple they believed was critical of eBay in an online ecommerce newsletter

6 eBay Executives And Employees Charged With Sending Threats, Bloody Pig Mask To Natick Couple https://boston.cbslocal.com/ ... @lilsarg : Can't lie. Nothing brings me joy like see...

2020-04-05
Looks like solid research by @citizenlab. If I'm reading it correctly, actors in China could have access to all the encryption keys needed to see calls. Keep this in mind when you chose to discuss sensitive info using #zoom. Obviously no mil/gov should talk classified on it. https://twitter.com/...
2020-04-05 View on X
Washington Post

Zoom is being banned over security concerns by some US school districts, including NYC, which is directing teachers to switch to Microsoft Teams

Some school districts around the country have started to ban the use of Zoom for online learning from home during the coronavirus crisis …

2020-04-04
Looks like solid research by @citizenlab. If I'm reading it correctly, actors in China could have access to all the encryption keys needed to see calls. Keep this in mind when you chose to discuss sensitive info using #zoom. Obviously no mil/gov should talk classified on it. https://twitter.com/...
2020-04-04 View on X
The Intercept

Researchers: Zoom sometimes uses encryption keys issued by servers in China, uses a flawed encryption method, and hence is not suited to communicate secrets

but it can be fixed Stephen Warwick / iMore : Today on Zoom: ‘Not suited for secrets’, encryption issues and more Mercury News : Zoombombing: FBI warns video calls are getting hija...

Looks like solid research by @citizenlab. If I'm reading it correctly, actors in China could have access to all the encryption keys needed to see calls. Keep this in mind when you chose to discuss sensitive info using #zoom. Obviously no mil/gov should talk classified on it. https://twitter.com/...
2020-04-04 View on X
TechCrunch

Zoom apologizes for routing some calls made in N. America through China, says it “mistakenly” allowed Chinese data centers to accept calls due to traffic spike

Hours after security researchers at Citizen Lab reported that some Zoom calls were routed through China …

2020-04-03
Looks like solid research by @citizenlab. If I'm reading it correctly, actors in China could have access to all the encryption keys needed to see calls. Keep this in mind when you chose to discuss sensitive info using #zoom. Obviously no mil/gov should talk classified on it. https://twitter.com/...
2020-04-03 View on X
The Intercept

Researchers: Zoom sometimes uses encryption keys issued by servers in China, uses a flawed encryption method, and hence is not suited to communicate secrets

Meetings on Zoom, the increasingly popular video conferencing service, are encrypted using an algorithm with serious …

2020-03-11
All that unencrypted traffic means #networksecuritymonitoring tools like @corelight_inc and @Zeekurity will be able to see what these devices are doing, and potentially what intruders are doing to them. https://twitter.com/...
2020-03-11 View on X
VentureBeat

Report: 83% of internet-connected medical imaging devices run on outdated operating systems, up 56% since 2018 due to the end of Windows 7 support in Jan.

Palo Alto Networks' Unit 42 security division said medical equipment is outdated and vulnerable to hacker attacks and health care organizations … Source: Unit42 .

2020-02-05
I think @corelight_inc powered by real @Zeekurity is ready to detect these sorts of shenanigans, as the Telnet parser does not care about ports due to Dynamic Protocol Detection (DPD). If you're doing your #networksecuritymonitoring correctly you already know if you're affected. https://twitter.com/...
2020-02-05 View on X
ZDNet

Researcher details a backdoor in Huawei-owned HiSilicon chips used in millions of smart devices, including security cameras, that has been active since 2013

Researcher said he did not notify HiSilicon due to a lack of trust in the hardware vendor to adequately fix the issue.