Russia's cyber warfare against Ukraine was initially extremely effective, yet it still failed to achieve any lasting advantage. Despite the massive…
7
2
Many people may not know this, but fifteen…twenty years ago I knew a thing or two about rootkit development. I wrote detection software for a few years…
5
Some “hacktivists” *cough* *cough* have trashed steel works in Iran. Their justification is ridiculous — “these plants are sanctioned” which they claim…
3
How the FSB got it wrong by getting it right
5
Detailed Mandiant report on attacker activity that is pretty cool, such as embedded devices and old conference video systems(!). Nice to see the use of…
This is fascinating insight into the psyche of the average Russian. - -The Info Op is a reader-supported publication. To receive new posts and support…
3
- How to exploit the confluence 0day. - If you want to have a simple private Tor-alike system, this seems like a good starting place. UPnProxyChain: a…
3
In theory, and in the lab at least, this is a cool little attack. Intel is super skeptical it’s a big deal for many ppl. Who knows? It’s a bit early to…
1
Event-level prediction of urban crime reveals a signature of enforcement bias in US cities. https://www.nature.com/articles/s41562-022-01372-0 - - …
2
If you read nothing else, read this. It is epic, brutal, and amazing…
4
This is interesting. The TV hacking has escalated in Ukraine, a channel was hacked to play Russian propaganda. The group responsible , XakNet, has been…
1
Amazing work, as we have come to expect, from Kim Zetter. - Excellent history video on the war experience of McBride, a WW1 machine gunner and sniper…
2