Advertisement · 728 × 90

Posts by Digital Monet

One of us can hire him

3 months ago 1 0 0 0
Preview
Crypto Crime: How Cyber Criminals Target Cryptocurrency | Proofpoint US Discover the increasing importance of cryptocurrency cybersecurity and how to protect yourself and your assets against cyber criminals with Proofpoint.

Thinking of my friend @cryptokippers Kip Goldencoin today. Wherever you are buddy, I hope you slayed those demons and found exit liquidity so you could accept that administration job

www.proofpoint.com/us/blog/thre...

10 months ago 1 0 0 0
Video

Obligatory #infosecgarden update. Early summer peak

10 months ago 3 0 0 0

Balancing attrib w/ detection engineering will always be a challenge of security programs. Even tho it’s technology we work on it’s a human discipline eod. humans make Security purchasing decisions with quality impact stories& data. If UNCs are enough, good deal, save capital A for marketing and gov

11 months ago 4 1 0 0
Preview
INVESTIGATION: Uncovering Chinese Academic Espionage at Stanford This summer, a CCP agent impersonated a Stanford student. Under the alias Charles Chen, he approached several students through social media. Anna*, a Stanford student conducting sensitive research on ...

Stanford review published a great piece of journalism on the CCP's on-campus activities.

stanfordreview.org/investigatio...

11 months ago 3 1 0 0

I am def not an aviation expert but just a word of caution about stacking 4.5 gen planes against other air capabilities and drawing a comparison 1:1. This is an indicator of the capable nature of CN combat avionics. However not a transitive property that can stack up against any airforce globally

11 months ago 1 0 0 0
Preview
Chinese jets used by Pakistan against India's Western aircraft unnerve defense sector A shocking victory by Pakistani Chinese-made jet fighters in a dogfight with Western-made Indian aircraft has caused alarm in the global defense industry.

Alot being made today about CN aviation technology & its practical capabilities against NATO manufactured jet technology. The analog conflict of PK & IN are both 4.5 generation aircraft. CN has 5th gen capability and is developing a 6th. also true of US
www.washingtonexaminer.com/policy/defen...

11 months ago 1 0 1 0

You love to see it! Talented super friends beating up on the bad guys

1 year ago 3 1 0 0
Advertisement
Preview
a man says we 're making progress in a dark room ALT: a man says we 're making progress in a dark room
1 year ago 0 0 0 0

Do you know what happened 10 days after 2016 inauguration? The Muslim travel ban. That was a disaster. what happened 10 days after the 2024 inauguration? The OMB memo rescinding funding that was a disaster. Less outrage More legal organizing. Sue these fuckers & makeem prove they have power they say

1 year ago 0 0 1 0
Post image

Treasury today sanctioned the Chinese company that U.S. officials say provided technical support to Beijing's Flax Typhoon hacking campaign against critical infrastructure: https://bit.ly/4a2dC6A

1 year ago 14 1 0 0
Post image
1 year ago 170 36 0 0
UN General Assembly adopts landmark convention on cybercrime <p>The UN Convention against Cybercrime aims to prevent and combat cybercrime more efficiently and effectively, including by strengthening international cooperation and by providing technical as...

News you wouldn't expect to break on Xmas Eve: UN Adopted the Convention Against "Cybercrime" (proposed by Russia): unis.unvienna.org/unis/pressre...
Here's why you should be concerned if you are a fan of privacy and freedom of expression

1 year ago 48 21 7 4
Preview
Lookout Discovers New Chinese Surveillance Tool Used by Public Security | Threat Intel Lookout researchers have discovered a new Chinese surveillance family used by Chinese law enforcement to collect extensive information from mobile devices.

www.lookout.com/threat-intel...

1 year ago 1 1 0 0
Preview
Treasury sanctions Chinese cyber company, employee for 2020 global firewall attack The department’s Office of Foreign Assets Control said Guan Tianfeng used a zero-day exploit to deploy malware on 81,000 firewalls.

#Treasury sanctions #Chinese #cyber company, employee for 2020 #global #firewall attack. The department’s Office of Foreign Assets Control said Guan Tianfeng used a zero-day exploit to deploy #malware on 81,000 firewalls. via @mattbracken.bsky.social cyberscoop.com/treasury-san...

1 year ago 3 1 1 0
Preview
Widespread exploitation of Cleo file transfer software (CVE-2024-50623) | Rapid7 Blog

Never a dull moment. Rapid7 is also observing exploitation of CVE-2024-50623 in the wild. www.rapid7.com/blog/post/20...

1 year ago 1 3 0 0
Preview
Unveiling Dark Internet Service Providers: Bulletproof Hosting Author: Knownsec 404 team Date: Dec 9, 2024

Chinese security firm Knownsec 404 has published a profile on ELITETEAM, an infamous bulletproof hosting provider for cybercrime operations

medium.com/@knownsec404...

1 year ago 24 7 2 0
Advertisement


“We are not lovers
because of the love
we make
but the love
we have
We are not friends
becauseof the laughs
we spend
but the tears
we save
I don't want to be near you
for the thoughts we share
but the words we never have
to speak
I will never miss you
because of what we do
but what we are
together”

1 year ago 2 0 0 0

Vaccination works.

1 year ago 58 10 0 0
Preview
Another teenage hacker charged as feds continue Scattered Spider crackdown Remington Ogletree, a 19-year-old resident of Texas and Florida, is at least the sixth alleged member of the Scattered Spider hacking collective to have federal charges filed against them in recent mo...

Look, Scattered Spider was good at one thing: initial access/ransomware.

But they weren’t some super talented group of hackers - they are stupid teenagers. Hence the reason law enforcement has been able to nab so many.

1 year ago 54 15 5 0
Preview
Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage | Microsoft Security Blog Microsoft has observed Secret Blizzard compromising the infrastructure and backdoors of the Pakistan-based threat actor we track as Storm-0156 for espionage against the Afghanistan government and Indi...

This blog is wild. “Secret Blizzard (Turla) has used the tools and infrastructure of at least 6 other threat actors during the past 7 years.”

www.microsoft.com/en-us/securi...

1 year ago 23 6 1 0

190 present, 190 voted to DEMAND END TO MARTIAL LAW DECLARATION

1 year ago 2536 523 1 92
Post image Post image

The antimatter’s effect on the van was immediately apparent.
www.nature.com/articles/d41...

1 year ago 2 0 0 0
Video

Notre Dame Cathedral unveils its new interior 5 years after devastating fire abcnews.go.com/Internationa...

1 year ago 16729 2298 419 316
Preview
Hay’at Tahrir al-Sham (HTS) | Terrorism Backgrounders | CSIS TNT Terrorism Backgrounder

For those interested in the Syrian rebel group that has captured Aleppo. “Today, HTS can be thought of as a relatively localized Syrian terrorist organization, which retains a Salafi-jihadist ideology despite its public split from al-Qaeda in 2017” www.csis.org/programs/for...

1 year ago 291 123 10 22
Post image

#PIVOTcon25 #CfP is open and you can submit your proposals till 7 FEB 2025
Remember
- one track,30m
- no recording/streaming/tweeting. U should feel comfy to share more
- No TLP:WHITE
- Original content only
Let us guide u through with a little meme-thread
#CTI #ThreatIntel 1/10

1 year ago 31 18 1 4
Post image

www.semafor.com/article/11/2...

1 year ago 274 99 13 27
Advertisement
Post image

@milenkowski.bsky.social and I are looking forward to presenting together at #CyberThreat2024 in London next month. We‘ll be discussing China-nexus APTs engaging in cybercriminal activities like ransomware.

1 year ago 8 4 0 0