attribution
Perfectl Malware
Perfectl in an impressive piece of malware: The malware has been circulating since at least 2021. It gets installed by exploiting more than 20,000 common misconfigurations, a capability that may make millions ...

Stopping Abuse in the Digital Age With The Anti-Human Trafficking Intelligence Initiative
At HYAS, we take pride in our effort to try to make a positive impact on the world whenever possible. Cybersecurity, of course, is a business, but stopping bad actors helps protect ...
More SolarWinds News
Microsoft analyzed details of the SolarWinds attack: Microsoft and FireEye only detected the Sunburst or Solorigate malware in December, but Crowdstrike reported this month that another related piece of malware, Sunspot, was ...

Postcards From The Rus
Reuters reporter Christopher Bing has reported a new 'probe' instantiated by the United States Federal Bureau of Investigation targeting a Rus-linked postcard (of-all-things) sent to FireEye, Inc. Chief Executive Officer Kevin Mandia ...

Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – From The Archive – ‘WEEK 111’
via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Haas at Little Bobby Comics! From the Little Bobby Archive’s and Originally Published March 12, ...

Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 104’ (From The Archive)
via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Haas at Little Bobby Comics. Permalink ...
New Reductor Nation-State Malware Compromises TLS
Kaspersky has a detailed blog post about a new piece of sophisticated malware that it's calling Reductor. The malware is able to compromise TLS traffic by infecting the computer with hacked TLS ...
Cell Networks Hacked by (Probable) Nation-State Attackers
A sophisticated attacker has successfuly infiltrated cell providers to collect information on specific users: The hackers have systematically broken in to more than 10 cell networks around the world to date over ...

The Nonattribution Approximation
via Jordan Drysdale, writing at the Black Hills Infosec blog, regales us with a well attributed post, detailing a fucntional non-attribution hardware and software package... Today's Must Read. Permalink ...
Russians Hacked the Olympics
Two weeks ago, I blogged about the myriad of hacking threats against the Olympics. Last week, the Washington Post reported that Russia hacked the Olympics network and tried to cast the blame ...