www.catonetworks.com/blog/cato-ct...
A fascinating read, some of the opsec errors are particularly eye opening.
@liammalcolm.com.bsky.social
Senior Cyber Threat Intel Analyst. Interest and experience in policing, intelligence, geopolitics and security. Former Special Constable. www.liammalcolm.com
www.catonetworks.com/blog/cato-ct...
A fascinating read, some of the opsec errors are particularly eye opening.
Iβll never tire of watching the hope fade from peopleβs eyes when they start trying to use Eurostar Wi-Fi.
16.07.2025 18:05 β π 0 π 0 π¬ 0 π 0Check out Vivaldi, the browser I'm using: vivaldi.com/invite
03.07.2025 19:06 β π 0 π 0 π¬ 0 π 0Amsterdam, Iβm a big fan.
19.06.2025 19:09 β π 0 π 0 π¬ 0 π 0Yeah, I never thought about it that way before. That article genuinely shocked me!
13.06.2025 16:30 β π 2 π 0 π¬ 0 π 0This is a terrifying read.
13.06.2025 15:41 β π 1 π 0 π¬ 1 π 0What are people using for SIEM/EDR/XDR/etc on home lab devices installed on separate networks?
09.06.2025 18:00 β π 0 π 0 π¬ 0 π 0Bucharest is exquisite in the sun.
18.05.2025 13:52 β π 0 π 0 π¬ 0 π 0Zendesk now has a dark mode and I am a bit too excited about it!
14.05.2025 14:21 β π 0 π 0 π¬ 0 π 0Watching an argument between a customer service worker and two travellers. Raised voices etc. The employee has said she wonβt assist if the travellers continue to raise their voice and walked away. A stark contrast to policing!
11.05.2025 14:55 β π 0 π 0 π¬ 0 π 0doublepulsar.com/dragonforce-...
Co-op data exfiltrated, including member database.
Shocking to read, feel for the IR team. Disappointed at the lack of communications. Customers are becoming more tech aware, they deserve to be kept updated. And treated like adults.
We need to be more open.
I agree, and this is where the NCSC should be using their contacts to run briefs for trusted contacts within retail operational security teams. That is not happening, so we're all sharing the same IOCs we've found on Twitter, or have been passed with no context.
02.05.2025 18:55 β π 1 π 0 π¬ 0 π 0As someone in the retail space, this week has been chaotic.
Although I'm in CTI, I can't share any intelligence as nobody is sharing any intelligence. It's all rumour (RUMINT).
The NCSC really need to take control here, and lead the sharing of intelligence with operational security teams.
www.bbc.co.uk/news/article...
Good luck Co-op!
www.bleepingcomputer.com/news/securit...
Looks like I may have been (kind of) right.
Scattered Spider are a very competent threat group, best wishes to anyone doing IR for M&S.
www.bbc.co.uk/news/article...
No ransomware group have uploaded data to leak sites, that in itself is telling. What threat actors don't routinely ransomware / post to leak sites?
Compare and contrast with the Ahold Delhaize breach which occurred last week.
It *feels* like it has due to the amount of posters I see across the network. Youβre correct with Met and busses however if a revenue op happens at a larger station then thatβll be BTP and Met, so much more likely to get involved in ticket irregularities.
22.04.2025 20:26 β π 1 π 0 π¬ 1 π 0Yeah, thatβs the Croydon bus incident. Pax refused to cooperate with an RPI which led to a Met PC arrest. PC charged with assault and convicted, I believe then overturned. The Met no longer do fare evasion ops, just TfL who have no powers. I think thatβs why evasion is endemic.
22.04.2025 19:53 β π 2 π 0 π¬ 1 π 0Was this the Croydon bus incident? I used to be a Special Constable with the British Transport Police so I regularly dealt with ticket irregularities (fare evasion). Itβs a tricky one to deal with.
22.04.2025 19:37 β π 0 π 0 π¬ 1 π 0This is fascinating - thank you for sharing.
22.04.2025 19:33 β π 0 π 0 π¬ 1 π 0Thanks @proton.me, loving your offerings! And your support has been excellent when I've had stupid questions.
21.04.2025 18:05 β π 1 π 0 π¬ 1 π 0Youβve been wonderful, Bristol
06.04.2025 09:58 β π 0 π 0 π¬ 0 π 0Confirmed - legacy system popped. No lateral movement. Potentially encrypted passwords.
Well, Oracle, after your hastily issued statement, Iβd be surprised if any of your customers trust you again.
Shows the importance of communications in dealing with any breach.
My gut says that a TA did breach a *part* of Oracle, now we wait and see if they do indeed have millions of credentials.
www.cloudsek.com/blog/the-big....
It's only an "ORB" if it is from the Cheltenham region of UK, otherwise it is just a sparkling botnet
18.11.2024 18:48 β π 41 π 5 π¬ 4 π 0