If you’re wondering why, when JD Vance was asked if he’d certify the 2024 election, he (weirdly) pivoted to allege “Kamala Harris is engaged in censorship at an industrial scale,” I gotchu. 1/
US seizes 41 Cold River APT domains blogs.microsoft.com/on-the-issue...
Russian authorities have arrested 96 individuals linked to 35 money laundering services used by cybercrime operations. One of the detained suspects is Sergey Ivanov, the administrator of Cryptex and UAPS—sanctioned by the US last week. t.me/sledcom_pres...
It’s been very fun to see a lot of APT researchers suddenly and recently realize cybercrime is important actually
TL/DR - 14 critical vulnerabilities in DrayTek products (inc. RCE and full system compromise). - 704,000+ DrayTek routers exposed to the internet. - Vulnerabilities impact 24 models. The report has a full list of affected models and fixed versions. www.forescout.com/blog/researc...
Forescout uncovers new vulnerabilities in DrayTek products. These routers are potential targets for 0-day attacks, DDoS and ransomware.
More than a dozen blockchain companies have inadvertently hired undercover North Korean IT workers. According to CoinDesk, this includes well-established blockchain projects such as Injective, ZeroLend, Fantom, SushiSwap, Yearn Finance, and Cosmos Hub. www.coindesk.com/tech/2024/10...
More than a dozen blockchain firms inadvertently hired undercover IT workers from the rogue state, incurring cybersecurity and legal risks, a CoinDesk investigation found.
Australia's Federal Police claims it deciphered the seed phrase of a cryptocurrency wallet and seized $9.3 million worth of crypto assets owned by the administrator of Ghost, an encrypted phone platform used by criminal organizations www.afp.gov.au/news-centre/...
The AFP-led Criminal Assets Confiscation Taskforce (CACT) has successfully restrained $9.3 million in cryptocurrency as part of an investigation into the alleged mastermind behind Ghost, the dedicated...
Further Evil Corp cyber criminals exposed, one unmasked as LockBit affiliate www.nationalcrimeagency.gov.uk/news/further... More to come from US and Australian officials later today
BlueTeamOps has published a new project named LOLESXi (Living Off The Land ESXi). The project lists binaries and scripts that are natively available in VMware ESXi that have been used by threat actors in their attacks in the past. lolesxi-project.github.io/LOLESXi/
〝In short, the SDA did not keep running campaigns and receiving funding despite being repeatedly exposed. It was able to keep running campaigns precisely because its work was exposed by its adversaries.〞 #Russia#Doppelganger#disinformation#strategy#infops
JUST OUT — September was a wild month for scholars of modern covert influence operations. No longer do we have to rely on a campaign's digital footprints alone. My first analysis of ~3K leaked internal files and fresh FBI evidence on "Doppelganger." www.foreignaffairs.com/russia/lies-...
The country’s propagandists target the West—but mislead the kremlin, too.