Catch the lastest episode of the Three Buddy Problem on Spotify 👇
open.spotify.com/episode/2M5w...
“Tal Dilian, founder of the surveillance technology company Intellexa, has made what observers describe as an indirect admission that the controversial Predator #spyware used in 🇬🇷Greece was operated by state authorities.”
www.dnews.gr/eidhseis/new...
Europäische Geheimdienst-Einschätzungen deuten ähnliches an. Darin hieß es vergangene Woche bereits: #Iran habe vermeintliche Enthauptungsschläge einkalkuliert, Befehlsebenen seien früh auf 3. u 4. Reihe des Militärs verlagert worden. Man richte sich auf lange Konfrontation ein.
Medical device maker Stryker reportedly hit with cyberattack from Iranian hacktivist group. So far only Irish news reporting, not here in US. "many employees have had their device data wiped and cannot access their accounts" Stryker makes surgical equipment, defibrillators, imaging equipment
-Gen. Joshua Rudd confirmed as next CyberCom and NSA head
-US to establish new inter-agency cyber cell
-UK to launch Online Crime Centre in April
-Coruna exploit kit traced back to L3Harris
-New Salesforce hacking campaign
Newsletter: news.risky.biz/risky-bullet...
Podcast: risky.biz/RBNEWS536/
Migrantenschreck-Betreiber Mario Rönsch ist zurück. Dieses Mal als Chefredakteur der Fake News-Seite Anonymous News in Moskau. Welche Verbindungen es zum FSB gibt, lest Ihr in der neuen @papertrailmedia.de Recherche für @spiegel.de, @derstandard.at & @tagesanzeiger.bsky.social: tinyurl.com/57wbfnbc
SCOOP: The iPhone mass hacking toolkit used by Russian spies was developed at U.S. military contractor L3Harris, former employees said.
The Coruna toolkit was used against Ukrainians and by Chinese cybercriminals, according to Google. But the toolkit was initially developed for Western governments.
Finland's intelligence service has released its yearly national security overview report. On the cyber side of things, SUPO warns startups that foreign espionage can rob them of their future.
supo.fi/en/espionage...
📣 #PIVOTcon26 Agenda is here 🤟 We are thrilled to announce the lineup for this year's edition!
2⃣ days and 19 talks from leading #ThreatResearch experts.
The agenda link is in the first comment👇, and the talks and speakers are in the thread.🧵
#CTI #ThreatIntel
1/15
Short newsletter item about one mistake from disinfo operations #Doppelgänger that makes it possible to tie together >100 domains
buttondown.com/readwrite/ar...
BREAKING: powerful iPhone hacking tools used by Chinese criminals originated from US defense giant L3 Harris.
Their zero-click exploits went to Russian spies too.
Unbelievable harm to our collective security.
Scoop: @lorenzofb.bsky.social, here's why it matters 1/
techcrunch.com/2026/03/09/a...
"A formerly legitimate Featured Chrome extension (ShotBird) was turned into a remote-controlled malware channel after an apparent ownership transfer"
Curious if this is another case of an extension being sold on ExtensionHub again? A place to watch...
monxresearch-sec.github.io/shotbird-ext...
What's with the bird names in a .gov iOS exploit framework? @craiu.bsky.social @jags.bsky.social www.youtube.com/watch?v=-QNf...
We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously. 1/7
𝗜𝗿𝗮𝗻 𝗮𝗻𝗱 𝘁𝗵𝗲 𝗰𝘆𝗯𝗲𝗿 𝗱𝗼𝗺𝗮𝗶𝗻: our selected analysis providing useful context on the different ways cyber tools have been used in and around #Iran. (1/5)
(5/5) Ransomware, espionage, & sabotage.
A. Milenkoski, J. Minier, @julianferdinand.bsky.social, M. Smeets, and @tgrossman.bsky.social examine state uses of ransomware, including Iran’s capacity for disruptive & politically motivated cyber operations.
🔗 Read article: bindinghook.com/state-backed...
-Mammoth trojan comes to MAX
-Phishing campaign targets Armenian civil society leaders ahead of elections
-Coruna technical analysis
-LuaJIT malware on GitHub
-Red Alert malware in Israel
-DPRK (ab)uses AI for everything
-New CL-UNK-1068 APT
-APT36 adopts vibeware
-Claude found 22 Firefox bugs
-White House releases new Cyber Strategy
-New Trump EO prioritizes fight against scams and cybercrime
-Chinese hackers breach FBI wiretap network
-Romania's largest meat exporter enters insolvency after ransomware attack
Podcast: risky.biz/RBNEWS535/
Newsletter: news.risky.biz/risky-bullet...
Along with our open call for talks, we have also opened registration for Hague TIX 2026!
The ticket link and everything practical you need to know about #HagueTIX2026 is right here: www.thehagueprogram.nl/the-hague-ti...
@thehagueprogram.bsky.social @fggaleiden.bsky.social @monicakello.bsky.social
New video footage shows a US Tomahawk missile hitting an IRGC facility in Minab, Iran, on Feb 28, showing for the first time that the US struck the area. The footage also shows smoke already rising from the vicinity of the girls’ school, where 175 people were reportedly killed, including children.
Huntress researchers Jamie Levy & Harlan Carvey have identified and detailed the full timeline of an intrusion in a customer environment that aligns with what others have identified as MuddyWater. www.huntress.com/blog/muddywa...
The #DefCon #Singapore March Chill Out will be happening March 27th at Georges in Tai Seng. Everyone is welcome!
Come meet the local InfoSec, Hacker, and Researcher communities working to make the DEF CON Singapore conference a reality at the end April […]
[Original post on defcon.social]
Russian state hackers are carrying out a global campaign to compromise Signal and WhatsApp accounts belonging to government officials and military personnel, Dutch intelligence warned Monday.
In this how-to for beginners, I explain how to get started with Burp and similar browser tools, we'll explore API basics, how to understand network requests, and getting started. I'll also walk you through some examples of how I found security bugs and data leaks, which I wrote up for TechCrunch.
🧨 🚨 NEW POD UP! (presented by @thinkstcanary.canary.tools) - The Coruna iOS exploit kit, the connection to the Peter Williams/Trenchant exploit sale to Russians, how it slipped from government hands into criminal use @craiu.bsky.social @jags.bsky.social
LISTEN everwhere 👇
pod.link/1414525622
Terrific data deep dive with animated maps, showing how US/Israeli targeting shows a shift over the course of the war’s first week: from targeting army and drone/missile sites to targeting police and regime security, to enable an uprising.
economist.com/interactive/...
My comment for Anadolu Agency (turkish press agency) on data centres as targets in the Iran war. The strikes on Amazon facilities in the UAE and Bahrain are the first time commercial cloud infrastructure has taken physical damage from a drone or missile attack. www.aa.com.tr/en/middle-ea...
Kaspersky recently produced a podcast on Operation Triangulation, basically a story of the investigation
Things that I haven't seen mentioned elsewhere:
— Triangulation malware existed for >10 years
— Some technical details similar to the Equation Group
www.youtube.com/watch?v=j4pC...
“The Florida-based cyber firm Defense Prime—which has also done business as Palm Beach Networks—& been staffed mostly by former employees of NSO Group, has dissolved its Florida operations. Its executives have moved their business operations to 🇪🇸Barcelona.”
www.intelligenceonline.com/americas/202...