ArticWolf say they have observed Akira ransomware incidents gaining access via fully patched SonicWall SSL VPN boxes with accounts with MFA enabled, speculate they have another zero day [β¦]
02.08.2025 09:16 β π 31 π 23 π¬ 2 π 1@sudoinit0.bsky.social
Nat Sec | Info Sec | CTI Nerd
ArticWolf say they have observed Akira ransomware incidents gaining access via fully patched SonicWall SSL VPN boxes with accounts with MFA enabled, speculate they have another zero day [β¦]
02.08.2025 09:16 β π 31 π 23 π¬ 2 π 1While I give the ProPublica team accolades for their digital escorts article, this one lacks direct evidence/connections. Lack of substantive proof leads to analytical leaps, as seen here. Friendly reminder, correlation doesnβt equal causation.
www.propublica.org/article/micr...
www.linkedin.com/pulse/harder...
31.07.2025 18:39 β π 0 π 0 π¬ 0 π 0Given the number of government officials who have repeatedly stated the intentions of Volt for the last 2 years, either they were all wrong, or this one is not yet up to speed and may need to be briefedβ¦
cyberscoop.com/feds-still-t...
Lost in this strategy are the security implications this will have. Where threat actors may have had to gain access to multiple agencies and databases to develop insights on intelligence targets, now they will only need to gain access to the models.
www.defenseone.com/policy/2025/...
Similar to something I commented recently on regarding the use of cyber in Russia/Ukraine - that conflict, and underscored by Israel/Iran - showed how cyber is only a means to an end, or a βcombined armβ in military parlance, but not the end itself, and should not be viewed that way.
30.07.2025 18:59 β π 2 π 0 π¬ 0 π 0Sad to see the next generation of military leaders losing the opportunity to learn from the last generation of leaders because of the present generation of leaders.
30.07.2025 18:24 β π 0 π 0 π¬ 0 π 1Glad to see MN taking advantage of NG CPTs. I donβt think governors leverage their Title 32 authorities in this space as often as they could or should. (I think if we saw them employ DSCA it would definitely cause some concern from a βwhat arenβt they telling usβ aspect.) kstp.com/kstp-news/to...
29.07.2025 17:18 β π 0 π 0 π¬ 0 π 0Russia/Ukraine underscored the fact that cyber enables the means to an end but is not the end itself.
28.07.2025 17:34 β π 1 π 0 π¬ 0 π 0In short, it may not be about cybersecurity principles, but their real time application that is needed to defend against agentic AI. (Though, likely both.)
28.07.2025 17:10 β π 0 π 0 π¬ 0 π 0βCurrently, a lot of cybersecurity defenses rely on human operators and I am not sure how well that will scale up to machine-timescale defenses,β www.cybersecuritydive.com/news/researc...
28.07.2025 17:10 β π 0 π 0 π¬ 1 π 0UNC3886 continues to gather more attention since CSAβs public comments... www.trendmicro.com/en_us/resear...
28.07.2025 15:04 β π 0 π 0 π¬ 0 π 0Probably one of the more comprehensive detection blogs Iβve seen for the SharePoint activity. Also states what some forget: IIS modules can persist even after SharePoint patches are applied, so orgs need to go back and see if they were hit and didnβt know if.
www.splunk.com/en_us/blog/s...
The assumption that the US isnβt doing anything offensive in cyberspace and should be doing more is both inaccurate and not helpful to the βdeterrenceβ cause. Doing more and not saying anything about it due to sensitivities doesnβt achieve the intended outcome either. cyberscoop.com/us-offensive...
21.07.2025 14:48 β π 0 π 0 π¬ 0 π 02) Microsoft stated in their original blog that the attackers realized they could use a similar vulnerability as the ones previously known - CISA wasnβt the originator.
3) No idea why the ProPublica article is mentioned here. That paragraph could be removed and the article would hold the same value.
Officially a zero day - new CVE, no patch. msrc.microsoft.com/blog/2025/07...
20.07.2025 01:29 β π 3 π 1 π¬ 0 π 1For those of you with SharePoint exposed to the internet, you may want to go look at those logs: research.eye.security/sharepoint-u...
19.07.2025 20:45 β π 1 π 0 π¬ 0 π 1PRC targeting of law firms has been going on for over a decade. From IP theft to policy disputes and human rights cases - there are a myriad of reasons for them to be targeted.
12.07.2025 14:21 β π 0 π 0 π¬ 0 π 0For those unfamiliar, Ellen Nakashima is also one of the best natsec/intelligence/cyber reporters in the world, and has been for decades, in no small part because of course she cultivates high level sources instead of relying on official agency press offices.
03.07.2025 19:35 β π 402 π 94 π¬ 4 π 3nobody reverse this patch π€ͺ
doublepulsar.com/citrixbleed-...
Probably one of the more cogent pieces on why a US Cyber Force is needed, what it should focus on, and how it should be designed. Personally donβt know where I stand on the issue, but the authors do make a strong caseβ¦
defensescoop.com/2025/06/20/p...
The names of the malware are about as British as you getβ¦
20.06.2025 01:09 β π 0 π 0 π¬ 0 π 0Interesting read about a scope violation vulnerability discovered in Copilot. Sounds like an authorization bypass by a different name. Either way, interesting TTP for actors to abuse - assume more like it to follow. fortune.com/2025/06/11/m...
14.06.2025 14:05 β π 0 π 0 π¬ 0 π 0The SEC has withdrawn its proposed Biden-era cybersecurity regulations for investment advisers and securities market participants: www.sec.gov/rules-regula... www.sec.gov/rules-regula...
13.06.2025 21:00 β π 6 π 5 π¬ 0 π 0So much for cybersecurity being non-partisanβ¦ www.cybersecuritydive.com/news/trump-c...
07.06.2025 12:33 β π 4 π 1 π¬ 0 π 0