Daniel Gordon

171 Followers
184 Following
316 Posts
Thought Trailer, Cyber Threat Intel, DFIR, influence operations. He/His
Blog and Public TalksHttps://validhorizon.medium.com
Dumbest person on the face of the planet.
Was really interesting watching this CCP propaganda trend in the US on both right and left wing media ecosystems. https://thediplomat.com/2023/05/how-a-ccp-propaganda-campaign-targeted-the-dalai-lama/
How a CCP Propaganda Campaign Targeted the Dalai Lama

The latest smear campaign succeeded beyond China’s wildest dreams by playing into Western ignorance about Tibetan culture – and self-righteous “cancel culture” on social media.

Coffee Talk with SURGe! | LinkedIn

Grab a cup of coffee and join Mick Baccio and Audra Streetman for another episode of Coffee Talk with SURGe. The team from Splunk will discuss the latest security news and Mick and Audra will compete in a 60 second charity challenge. You don't want to miss it!

Common Cyber Threat Intel Biases, by Matt Richard

https://medium.com/@mrichard91/common-cyber-threat-intel-biases-9d6f410f5829

And perhaps one that we can all too easily relate to:

“Threat narrative fallacy. This fallacy mirrors the traditional narrative fallacy — fitting threat activity into a clean story that fits our existing beliefs instead of objectively weighing the facts. Stories that fit broader geopolitical narratives about countries, political parties, and past objectives often absorb new data since it aligns with the existing story.“

#cti

Common Cyber Threat Intel Biases - Matt Richard - Medium

I’ve been working in and around cyber threat intelligence for about 25 years, and over that time, I’ve found myself saying some phrases repeatedly. I often try to convey biases, blind spots, and…

Medium
Push Bombing/Fatigue is a risk that needs to be considered in the context of a broader set of MFA bypass techniques. My view is that a CISO can address the most potential attacks by enforcing phishing resistant authentication flows. Why treat the risk of fatigue attacks but leave accounts exposed to other forms of social engineering?
Countering threats from North Korea

On February 10, Threat Analysis Group discovered two distinct North Korean government-backed attacker groups exploiting a remote code execution vulnerability in Chrome, CVE-2022-0609.

Google
Screenshot of Google TAG blog about Countering Threats from North Korea indicating that Trading Technologies website was compromised in February 2022.
Please don't clog up the Transgender Concerns Form with so many spurious reports that it becomes unusable, and the Missouri government gets Big Mad. Because that would be wrong. Here's a link to the form so you'll know exactly where not to do that: https://ago.mo.gov/file-a-complaint/transgender-center-concerns
Transgender Center Concerns

Default
3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible | Mandiant

Mandiant
Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the 3CX attack was carried out by Lazarus.