Advertisement · 728 × 90

Posts by Mackenzie Kurzynski

Preview
Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels Threat actors abused Visual Studio Code and Microsoft Azure infrastructure to target large business-to-business IT service providers in Southern Europe.

🔥 NEW:
Operation Digital Eye 👁️ | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels
#apt #china #cyber
s1.ai/d-eye

1 year ago 8 3 0 0
Preview
GitHub - Censys-Research/censeye Contribute to Censys-Research/censeye development by creating an account on GitHub.

Censys has released Censeye, a tool to identify hosts with characteristics similar to a given target

github.com/Censys-Resea...

1 year ago 43 6 0 0
Preview
Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions

Interesting look at GhostEmperor. However, my hot take is we should wait until Microsoft releases some solid IOCs before stating GhostEmperor = Salt Typhoon

#cybersecurity #GhostEmperor #SaltTyphoon

www.trendmicro.com/en_us/resear...

1 year ago 2 1 0 0
Preview
Top senator calls Salt Typhoon ‘worst telecom hack in our nation’s history’ The severity of the Chinese breach highlights the need for more telecommunications regulation, lawmakers say.

Sen. Warner, chair of the intelligence committee + a former telecom VC, says the Salt Typhoon intrusions are "the “worst telecom hack in our nation’s history — by far."

Adds that it's possible millions of people's data could've been caught up in the breaches
www.washingtonpost.com/national-sec...

1 year ago 12 4 0 4
Preview
Emerging Details of Chinese Hack Leave U.S. Officials Increasingly Concerned Leaders of the big telecommunications companies were summoned to the White House to discuss strategies for overhauling the security of the nation’s telecommunications networks amid growing alarm at th...

The extent of Salt Typhoon: “The penetration almost certainly gave China a road map to discover which of China’s spies the United States has identified and which they have missed.”

1 year ago 31 13 0 1
Preview
Salt Typhoon: Churning Up a Storm of Consternation Public knowledge of the Salt Typhoon intrusions has been driven by the media, while the government and private-sector cybersecurity companies appear to have agreed on keeping mum

A fascinating theory about why Microsoft is so unwilling to release anything substantial about Salt Typhoon:

nattothoughts.substack.com/p/salt-typho...

#cybersecurity #salttyphoon

1 year ago 2 0 0 0

An excellent summary of CrowdStrike’s blog post re: LIMINAL PANDA

1 year ago 4 0 0 0
Preview
Unveiling LIMINAL PANDA - Threats to Telecom Sector | CrowdStrike Cyber threat LIMINAL PANDA has targeted telecommunication entities since at least 2020. Learn key traits, targets and tactics!

Fantastic blog from CrowdStrike debuting LIMINAL PANDA.

www.crowdstrike.com/en-us/blog/l...

1 year ago 3 0 0 0
Advertisement
Post image Post image Post image Post image

THREAD: How to verify online images

Social media is awash with false or misleading images, some of which get millions of engagements.

So here's a simple guide on ways you can quickly check the veracity of images you see on your social media feeds with major elections coming up this year.

2 years ago 1012 515 117 59