I know we're all supposed to be patient and wait for experts to analyze the evidence, but hear me out...
Maybe Putin launched cruise missiles at #ticketmaster because he was angry he couldn't get #taylorswift tickets, but missed and hit #poland.
This playbook, newly revised in 2022, provides practical considerations to address medical device cybersecurity incidents. Featuring tools, techniques, and resources, the playbook helps HDOs and others prepare for and respond to a cybersecurity incident involving medical devices.
Call For Papers: Workshop on SOC Operations and Construction (WOSOC) 2023 Security Operations Centers (SOC) are a field of growing interest for both researchers and SOC operators. SOC operators are increasingly recognized as a distinct class of security professionals who need tools and practices that address the distinct challenges and insights of their discipline. In parallel … Continued
My new book, TRACERS IN THE DARK, is out today. I've been writing it since 2020, but it draws on 11 years of reporting, since I published the first print magazine article on Bitcoin in 2011.
The book chronicles how the discovery that it was possible to trace cryptocurrency that was once considered untraceable upended an entire digital underworld. It's the most epic true crime/detective story I've ever come across as a reporter.
I hope you'll read it. https://www.amazon.com/Tracers-Dark-Global-Crime-Cryptocurrency/dp/0385548095/
This is something a little different from what @ESET has previously done: The release of our first publicly-shared #APT Activity Report, and covers May through August (aka second trimester) of 2022. ESET has been providing threat intelligence reports to organizations for a while, but always as a private service. Sharing this type of information publicly is a way of increasing awareness about the types of nation-state/state-sponsored attacks ESET is identifying through its telemetry.
This report covers attacks by the People's Republic of China, the Islamic Republic of Iran, the Democratic People's Republic of Korea, and the Russian Federation. Victims are located in Argentina, Germany, Hong Kong, Iran, Israel, Japan, Kyrgyzstan, the Netherlands, Poland, South Africa, Ukraine, the United States and Uzbekistan. In case you are wondering about Iran being both an attacker and a victim, consider that some APTs may be deployed domestically against a country's own citizenry.
blog: https://www.welivesecurity.com/2022/11/14/eset-apt-activity-report-t2-2022/
PDF: https://www.welivesecurity.com/wp-content/uploads/2022/11/eset_apt_activity_report_t22022.pdf