As a person who has followed Iranian cyberespionage operations for more than a decade, this story is crazypants and you should read it:
As a person who has followed Iranian cyberespionage operations for more than a decade, this story is crazypants and you should read it:
my workplace is hiring! if this sounds like it could fit you (or someone you know), please shoot your shot or pass it on!
key points:
- network engineer
- beginning to mid level
- US citizen or legal res
- shouldn’t hate women or diversity (this one’s mainly for twitter)
- you’d have to work with me. a lot
Best quote I've seen all day so far, from an Ars piece by @dangoodin on skepticism around OpenAI's breathless claim that a Chinese hacking group used Claude code to automate 90 percent of their attack:
“I continue to refuse to believe that attackers are somehow able to get these models to jump through hoops that nobody else can,” Dan Tentler, executive founder of Phobos Group and a researcher with expertise in complex security breaches, told Ars. “Why do the models give these attackers what they want 90% of the time but the rest of us have to deal with ass-kissing, stonewalling, and acid trips?”
NEW: Peter Williams, the former head of Western zero-day and spyware maker Trenchant, pleaded guilty to selling eight exploits to a Russian broker that resells to the Russian government.
The DOJ said Williams was promised millions of dollars in exchange for "national-security focused software."
Prosecutors confirmed Peter Williams, the former Trenchant boss, sold eight exploits to a Russian buyer. TechCrunch exclusively reported that the Trenchant division was investigating a leak of its hacking tools, after another employee was accused of involvement.