74 Followers
57 Following
925 Posts
Corporate Healthcare Strikes Again

YouTube
@briankrebs im actively pitching a talk called 'claude is your insider threat now'

My favorite IT help desk people

- documents steps for others
- remembers that a rare situation has happened before and it's able to look up what was done last time if it's the same thing
- able to handle a new situation BY READING THE INSTRUCTIONS

worth their freaking weight in gold.

Would you run AdobeReader.exe from a days-old company called "TrustConnect Software PTY LTD" just because they managed to purchase an Extended Validation certificate?
It turns out this "vibe-coded" platform wasn't a legitimate RMM, it was Malware-as-a-Service sold to criminals for $300 per month.
From fake incorporation to disruption by partners in under a month. The full blog is out now with me, @selenalarson and the rest of the @proofpoint @threatinsight team.
https://www.proofpoint.com/us/blog/threat-insight/dont-trustconnect-its-a-rat

SF awards eligibility 2026:

My novel "A Conventional Boy" is eligible for the Hugo and other awards for the year 2025.

"The Laundry Files" is NOT eligible for the best series Hugo award at present (even after "The Regicide Report" it falls about 65K words short of accumulating enough new material—maybe it will at some future time, but efinitely not before 2028).

@da_667 have you read the Laundry Files series by @cstross? If not I would highly recommend taking a look at it, I’ve read about half the series and love it and think the content and humor would be up your wheelhouse.

Meta thinks now is a great time to launch facial recognition surveillance tech in their creepy glasses because EFF will be too distracted by fascism to notice.

We noticed.

https://www.eff.org/deeplinks/2026/02/seven-billion-reasons-facebook-abandon-its-face-recognition-plans

Seven Billion Reasons for Facebook to Abandon its Face Recognition Plans

Meta’s analysis that it can avoid scrutiny by releasing a privacy invasive product during a time of political crisis is craven and morally bankrupt. It is also dead wrong.

Electronic Frontier Foundation
I don't want to laugh at someone's real distress but this IS very funny ...

TA584 is one of the most prominent #cybercriminal threat actors tracked by Proofpoint threat researchers. In a new blog, the team shared a detailed analysis of the threat actor, its campaigns, attack chains, targeting, payloads, and shared defensive recommendations.

Blog: https://www.proofpoint.com/us/blog/threat-insight/cant-stop-wont-stop-ta584-innovates-initial-access

Our researchers have tracked #TA584 since 2020. In 2025, they observed shifts to TA584’s tactics, techniques and procedures (TTPs). Notably, it expanded global targeting; adopted ClickFix social engineering; and delivered new malware, Tsundere Bot.

⚠️ Such activity shows that static detections alone are not reliable against constantly evolving threat actors.

Explore the blog for more details along with protection tips, Emerging Threats Rules and IOCs.

Can’t stop, won’t stop: TA584 innovates initial access | Proofpoint US

Key findings  TA584 is one of the most prominent cybercriminal threat actors tracked by Proofpoint threat researchers.  In 2025, the actor demonstrated multiple

Proofpoint

Did you catch the latest livestream of Intercepted, the new #webinar series hosted by our threat research team? 👀 If you missed it, view the on-demand recording here: https://www.proofpoint.com/uk/resources/webinars/intercepted-january-2026

This session covered 𝙖 𝙡𝙤𝙩, including how threat actors are using #AI and how #cybercriminals are abusing legitimate services and techniques, such as device code phishing.

Mark your calendars and plan to join Selena and Sarah for the next livestream on February 25. https://www.proofpoint.com/us/resources/webinars/intercepted

🔍 Until then, explore the campaign below, which used the same sender and similar lure copy as seen in a large wave of emails that delivered LockBit Black in April 2024 (https://www.proofpoint.com/us/blog/threat-insight/security-brief-millions-messages-distribute-lockbit-black-ransomware).

• This campaign was observed in early January 2026.

• Messages contained compressed LNK files, which, if executed, will download and run what is expected to be Mamona Ransomware associated with GLOBAL GROUP.

• Observed samples encrypted files, renaming the encrypted files with one of two appended extensions: .Reco or .gzeqi.

• The attached screenshots show the email lure and ransom note.

It’s unusual to see #ransomware delivered as a first-stage payload in emails these days, so the campaign was notable.

Hear more about recent campaigns like this, TTPs, and what’s top of mind for our researchers live on February 25.