Ryan Kalember's Avatar

Ryan Kalember

@kalember.bsky.social

CSO @ Proofpoint. Infosec lifer. Charter member of nerd nation. MacKenzie appreciator. Forza Inter.

91 Followers  |  122 Following  |  4 Posts  |  Joined: 14.12.2023  |  1.6265

Latest posts by kalember.bsky.social on Bluesky

Preview
Crossed wires: a case study of Iranian espionage and attribution | Proofpoint US Proofpoint would like to thank Josh Miller for his initial research on UNK_SmudgedSerpent and contribution to this report.ย  Key findingsย  Between June and August 2025,

New Iran drop from me tracking an attribution nightmare - UNK_SmudgedSerpent! A little Charming, a little Muddy, and a lot C5. Targeting policy experts with benign conversation starters, health-themed infra, OnlyOffice spoofs, and RMMs. Check out the full story www.proofpoint.com/us/blog/thre...

05.11.2025 13:37 โ€” ๐Ÿ‘ 18    ๐Ÿ” 12    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0
Video thumbnail

Nike's ad for the Dodgers win featuring Kendrick Lamar

02.11.2025 04:29 โ€” ๐Ÿ‘ 1915    ๐Ÿ” 547    ๐Ÿ’ฌ 24    ๐Ÿ“Œ 152
Post image Post image

ladies and gentlemen...we got him

30.10.2025 19:10 โ€” ๐Ÿ‘ 18305    ๐Ÿ” 4064    ๐Ÿ’ฌ 178    ๐Ÿ“Œ 187
Video thumbnail

You have to be shitting me... Ohtani homered again

18.10.2025 02:47 โ€” ๐Ÿ‘ 726    ๐Ÿ” 89    ๐Ÿ’ฌ 21    ๐Ÿ“Œ 82
Preview
When the monster bytes: tracking TA585 and its arsenal | Proofpoint US Key findingsย  TA585 is a sophisticated cybercriminal threat actor recently named by Proofpoint. It operates its entire attack chain from infrastructure to email delivery to malware

TA585 is the identifier of the most recent threat actor named by Proofpoint.

The sophisticated cybercriminal, notably, appears to own its entire attack chain with multiple delivery techniques.

Learn about TA585 and one of its favored payloads, MonsterV2: brnw.ch/21wWAAU.

13.10.2025 20:35 โ€” ๐Ÿ‘ 0    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Going Underground: China-aligned TA415 Conducts U.S.-China Economic Relations Targeting Using VS Code Remote Tunnels | Proofpoint US What happenedย  Throughout July and August 2025, TA415 conducted spearphishing campaigns targeting United States government, think tank, and academic organizations utilizing U.S.-China

Proofpoint threat researchers have published new research identifying a new cyber-espionage campaign by #TA415 (#APT41), a China-aligned threat actor, exploiting growing uncertainty in U.S.-China economic relations.

Blog: www.proofpoint.com/us/blog/thre....

18.09.2025 17:10 โ€” ๐Ÿ‘ 7    ๐Ÿ” 4    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

Threat actors continue to abuse GitHub to deliver malware, this time: #LummaStealer. We identified GitHub notification emails that kick off the attack chain. Messages are sent when the threat actor, using an actor-controlled account, comments on existing GitHub issues. ๐Ÿงต

03.09.2025 18:23 โ€” ๐Ÿ‘ 0    ๐Ÿ” 2    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

NEW โ€ผ๏ธ Researchers at @Proofpoint revealed an increase in China-aligned cyber #espionage targeting Taiwanโ€™s #semiconductor industryโ€”a sector critical to the global tech #supplychain.

At least 3๏ธโƒฃ distinct China-aligned threat actors are behind the efforts. brnw.ch/21wUctY

16.07.2025 21:09 โ€” ๐Ÿ‘ 8    ๐Ÿ” 5    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 1
Preview
The Bitter End: Unraveling Eight Years of Espionage Anticsโ€”Part One | Proofpoint US This is a two-part blog series, detailing research undertaken in collaboration with Threatray. Part two of this blog series can be found on their website here.ย  Analyst note: Throughout

Just published:

A two-part blog series in collaboration with
@threatray.bsky.social, which aims to substantiate the claim that #TA397 (Bitter) is an espionage-focused, state-backed threat actor with interests aligned to the Indian state.

Part 1: brnw.ch/21wT9A5
Part 2: brnw.ch/21wT9Ad.

04.06.2025 14:56 โ€” ๐Ÿ‘ 3    ๐Ÿ” 2    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 1
Preview
Feds Charge 16 Russians Allegedly Tied to Botnets Used in Ransomware, Cyberattacks, and Spying A new US indictment against a group of Russian nationals offers a clear example of how, authorities say, a single malware operation can enable both criminal and state-sponsored hacking.

Feds have seized infrastructure and charged 16 members of a hacker group based in Russia that allegedly sold access to the DanaBot malware, used in everything from cybercrime like bank fraud and ransomware to espionage and DDOS attacks against Ukraine. www.wired.com/story/us-cha...

22.05.2025 19:59 โ€” ๐Ÿ‘ 56    ๐Ÿ” 13    ๐Ÿ’ฌ 6    ๐Ÿ“Œ 3
Preview
16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide A federal grand jury indictment and criminal complaint unsealed today charge 16 defendants who allegedly developed and deployed the DanaBot malware which a Russia-based cybercrime organization control...

Some good news! DanaBot takedown and charges revealed today! This is a massive win for defenders and the community. www.justice.gov/usao-cdca/pr...

Proofpoint also published a brief history of DanaBot today, including examples of the espionage overlap. www.proofpoint.com/us/blog/thre...

22.05.2025 20:14 โ€” ๐Ÿ‘ 23    ๐Ÿ” 3    ๐Ÿ’ฌ 3    ๐Ÿ“Œ 0
China conducted state-sponsored cyber attack says US Treasury | DW News
YouTube video by DW News China conducted state-sponsored cyber attack says US Treasury | DW News

Went on DW to discuss the breach at Treasury. Not sure what was more predictable - that the vector was a supply chain attack on a cybersecurity vendor or the pro-PRC bots in the comments m.youtube.com/watch?v=VjA7...

06.01.2025 19:41 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Cyber startup employee hacked to distribute malicious Chrome extension Cybersecurity startup Cyberhaven, which specializes in insider threats, said it is investigating a hack of a single administrative account that spread a malicious version of its Google Chrome browser extension.

Cybersecurity startup Cyberhaven, which specializes in insider threats, said it is investigating a hack of a single administrative account that spread a malicious version of its Google Chrome browser extension. https://therecord.media/cyberhaven-hack-google-chrome-extension

27.12.2024 14:39 โ€” ๐Ÿ‘ 8    ๐Ÿ” 4    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Hidden in Plain Sight: TA397โ€™s New Attack Chain Delivers Espionage RATs | Proofpoint US Key findingsย  Proofpoint observed advanced persistent threat (APT) TA397 targeting a Turkish defense sector organization with a lure about public infrastructure projects in Madagascar.ย ย  The attack...

Proofpoint has published a report detailing new activity from #TA397 (AKA Bitter), a prominent South Asian advanced persistent threat (APT) group.

The campaign, which took place in November 2024, targeted a defense sector organization in Turkey.

Read the blog: ow.ly/z81o50UshPt.

17.12.2024 18:00 โ€” ๐Ÿ‘ 8    ๐Ÿ” 5    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 1

We just launched our new website... please let us know if your RSS feeds or podcatchers are doing anything weird!

Meanwhile, check out the new risky.biz website. You can get everything there -- written content, podcasts/audio and video as well.

A nice website! And it only took me 18 years!

12.12.2024 04:29 โ€” ๐Ÿ‘ 59    ๐Ÿ” 14    ๐Ÿ’ฌ 16    ๐Ÿ“Œ 2

Tis' the season of telco and ISP attacks apparently. First Salt Typhoon and now this super interesting campaign: bsky.app/profile/did:...

12.12.2024 21:28 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Stanford alumni letter.pdf

Stanford alums have written the university president and provost to protest their handling of a student journalist, who is facing 3 felony accusations after covering a protest:

"It was wrongful for the University to direct his arrest and encourage his prosecution" drive.google.com/file/d/1jIx1...

10.12.2024 01:37 โ€” ๐Ÿ‘ 296    ๐Ÿ” 65    ๐Ÿ’ฌ 7    ๐Ÿ“Œ 6

The rabbit beat Oregon that day, 18-7. The Big Ten could never

09.12.2024 23:26 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail
09.12.2024 22:24 โ€” ๐Ÿ‘ 160    ๐Ÿ” 11    ๐Ÿ’ฌ 5    ๐Ÿ“Œ 2
Risky Business Weekly (773): Cybercriminals are dropping like flies in Russia
YouTube video by Risky Business Media Risky Business Weekly (773): Cybercriminals are dropping like flies in Russia

This weekโ€™s show is up! Go go go!

youtu.be/cstfm5FbRFI

04.12.2024 02:50 โ€” ๐Ÿ‘ 58    ๐Ÿ” 10    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
DISCARDED | Proofpoint | Proofpoint US

New episode of DISCARDED where we sit down with the ๐Ÿ Mark Kelly, our lead China analyst, to talk all things China APT! Tune in wherever you get your podcasts. ๐Ÿ”ฎ

Web: www.proofpoint.com/us/podcasts/...

Apple: podcasts.apple.com/us/podcast/d...

Spotify: open.spotify.com/episode/2AtJ...

04.12.2024 00:38 โ€” ๐Ÿ‘ 24    ๐Ÿ” 10    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0
Risky Business  Weekly (771): Palo Alto's firewall 0days are very, very stupid
YouTube video by Risky Business Media Risky Business Weekly (771): Palo Alto's firewall 0days are very, very stupid

This week's show is up! We cover Palo Alto Networks' very dumb 0days, big changes coming to Windows, Jen Easterly's imminent departure from CISA and why NSO being bad, in retrospect, might be... good?

Get it as audio from the usual places or from YouTube here:

www.youtube.com/watch?v=Rxye...

20.11.2024 03:57 โ€” ๐Ÿ‘ 29    ๐Ÿ” 10    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

The best answer to the Fullcast question is actually in SEC country - Cahokia. Largest city north of Mexico, obsessed with sports (chunkey), loved birdman icons (war damn eagle), and so unpleasant that when they collapsed, that part of the country stayed unhabitated for literally hundreds of years

04.01.2024 19:12 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

@kalember is following 20 prominent accounts