68 Followers
60 Following
477 Posts
Cybersecurity defender, Blue Team. Correlation, Networking, Forensics, National Security.
Assume worst case scenario, aim for best case scenario.

it just struck me, is there a list somewhere somebody maintains of "free" airport wifi networks that just plain don't work, block ssh out, appear to be blocked by the outside world in general? (one or more of, other criteria fine too)

Not asking for a friend (yes, using my phone as hotspot in TPE at the moment), and I have encountered a few more that should be added to such a list.

Please boost for reach.

Supply Chain Nightmare: TeamPCP Infects LiteLLM with Stealth Backdoor and Kubernetes Worm

A Silent Breach Escalates into a Full-Blown Supply Chain Crisis The cybersecurity landscape has taken a sharp and alarming turn as TeamPCP, the threat actor previously linked to high-profile compromises of Trivy and KICS, has now infiltrated the widely used Python package LiteLLM. This latest attack is not just another isolated breach—it represents a calculated escalation in a…

https://undercodenews.com/supply-chain-nightmare-teampcp-infects-litellm-with-stealth-backdoor-and-kubernetes-worm/

Supply Chain Nightmare: TeamPCP Infects LiteLLM with Stealth Backdoor and Kubernetes Worm - UNDERCODE NEWS

A Silent Breach Escalates into a Full-Blown Supply Chain Crisis

UNDERCODE NEWS
Time and again the coverage of the new war is being talked about in Economic terms. The goal of the war is unclear.
@_coenen on X shared his isometric New York pixel art map of NYC and its so impressive it deserves reposting https://cannoneyed.com/isometric-nyc/
Isometric NYC

The UK gov has today published the Joint Intelligence Committee report, presented at COBRA, called “Global biodiversity loss, ecosystem collapse and national security”.

Findings include “every critical ecosystem is on a pathway to collapse (confidence rating HIGH)”

The report is worth a read as it basically lays out how the next decade or two are going to play out.

https://assets.publishing.service.gov.uk/media/696e0eae719d837d69afc7de/National_security_assessment_-_global_biodiversity_loss__ecosystem_collapse_and_national_security.pdf

Since the decline of peer-to-peer botnets it's been difficult to track malware infections externally. But smart contract based C2 infrastructure provided us with unique insights into this campaign.

https://expel.com/blog/clearfake-new-lotl-techniques/

Jaguar Land Rover (JLR) published its financial results for July 1 to September 30, warning that the cost of a recent cyberattack totaled £196 million ($220 million) in the quarter.

https://www.bleepingcomputer.com/news/security/jaguar-land-rover-cyberattack-cost-the-company-over-220-million/

Jaguar Land Rover cyberattack cost the company over $220 million

Jaguar Land Rover (JLR) published its financial results for July 1 to September 30, warning that the cost of a recent cyberattack totaled £196 million ($220 million) in the quarter.

BleepingComputer
GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace | Koi Blog

Co-op Group CISO (and disclaimer, my former boss) is out.
Geedge & MESA Leak: Analyzing the Great Firewall’s Largest Document Leak

The Great Firewall of China (GFW) experienced the largest leak of internal documents in its history on Thursday September 11, 2025. Over 500 GB of source code, work logs, and internal communication records were leaked, revealing details of the GFW's research, development, and operations.

GFW Report