As a person who has followed Iranian cyberespionage operations for more than a decade, this story is crazypants and you should read it:
As a person who has followed Iranian cyberespionage operations for more than a decade, this story is crazypants and you should read it:
my workplace is hiring! if this sounds like it could fit you (or someone you know), please shoot your shot or pass it on!
key points:
- network engineer
- beginning to mid level
- US citizen or legal res
- shouldn’t hate women or diversity (this one’s mainly for twitter)
- you’d have to work with me. a lot
Best quote I've seen all day so far, from an Ars piece by @dangoodin on skepticism around OpenAI's breathless claim that a Chinese hacking group used Claude code to automate 90 percent of their attack:
“I continue to refuse to believe that attackers are somehow able to get these models to jump through hoops that nobody else can,” Dan Tentler, executive founder of Phobos Group and a researcher with expertise in complex security breaches, told Ars. “Why do the models give these attackers what they want 90% of the time but the rest of us have to deal with ass-kissing, stonewalling, and acid trips?”
NEW: Peter Williams, the former head of Western zero-day and spyware maker Trenchant, pleaded guilty to selling eight exploits to a Russian broker that resells to the Russian government.
The DOJ said Williams was promised millions of dollars in exchange for "national-security focused software."
Prosecutors confirmed Peter Williams, the former Trenchant boss, sold eight exploits to a Russian buyer. TechCrunch exclusively reported that the Trenchant division was investigating a leak of its hacking tools, after another employee was accused of involvement.
There’s a bunch of new Netscaler vulns being exploited as zero days. Patches just out now.
Preauth RCE being used to drop webshells to backdoor orgs. CVE-2025-7775 is the main problem.
Orgs will need to do IR afterwards as technical details emerge of backdoor.
There is a new short domain name for #PuTTY!
At present, this is just a "landing page": a nice short name to remember, which will redirect you to the full PuTTY website at the same longer URL where it's always been.
But unlike putty.org or other third-party landing pages, this one is run by us, the actual PuTTY team, and it doesn't have a weird separate agenda of its own.
I intend to move the main PuTTY site over to that domain in the future, and leave just a redirector at the old location. But first I want to get the word out, so that people know which site to trust.
If anyone is still linking to putty.org, here's a place to link to instead. Please spread the word!
People who’ve been to war say don’t go to war.
Personally I think Co-op did a really good job getting out of that situation and minimising impact.
I definitely think if you have a LAPSUS$ style advanced persistent teenagers situation, tilt towards open and honest comms as those kids will use secrecy against ya. It’s 2025, it’s okay to say you got hacked, people largely understand. Also, in IR, lawyers are usually stuck in 1980 advice - it’s just advice, they ain’t yo boss.