Profile avatar
cyberamulet.bsky.social
A one-stop shop for news on cybersecurity incidents and breaches. We also touch upon new vulnerabilities and emerging threats.
31 posts 139 followers 188 following
Prolific Poster
Conversation Starter

This is what oligarchy looks like.

Let's add a fun twist/new rule: If you have to file the SEC breach disclosure, some cyber agency equivalent to the USCSB is mandated to post-mortem the incident and it ends up on said agency's Youtube channel. www.youtube.com/watch?v=JplA...

Drowning in Cyber Threats: Water Systems Urged to Secure HMIs Against Hack Attacks Secure your water systems! Protect against cyberattacks by securing HMIs and following EPA and CISA guidelines. Don't let hacktivists control your water. https://buff.ly/3VKrNqR

Cybersecurity Leaders Cautiously Embrace GenAI: ROI Wins, But Trust Issues Linger GenAI integration is hot in cybersecurity, but leaders are cautious. 76% prefer tailored tools, yet only 6% have fully adopted GenAI, according to a CrowdStrike survey. https://buff.ly/3OXiMXR

Who here is inclined to agree?

The Texas Tech University Health Sciences Center has confirmed that hackers accessed the personal and sensitive health data of over 1.4 million individuals during a September cyberattack techcrunch.com/2024/12/17/t...

CISA Sounds the Alarm: Microsoft and Adobe Vulnerabilities Join the Exploit Hall of Fame CISA adds Windows and ColdFusion flaws to its Known Exploited Vulnerabilities catalog. Time to patch up before hackers RSVP to your network! https://buff.ly/4iC3NQH

Chinese hackers using the same methods as people trying to evade the GFW. I have come across big repositories of ShadowSocks keys and when running tests on the servers, quite a number were in the “malicious” category”. www.techradar.com/pro/vpn/chin...

From Joyce to feminist re-imaginings to a Stephen Fry retelling to an Uberto Pasolini film: Kate Maltby on why Homer's Odyssey continues to inspire. www.ft.com/content/63ee...

Not suspicious at all

Telecom Namibia has advised its clients to update their passwords to protect their personal information from further cyber attackers, following the cyber attack on customer’s data on 13 December.

If you are experiencing internet difficulties tonight - it’s a state sponsored 🇨🇳 cyber attack on U.S. Infrastructure. Every major network provider is experiencing disruptions this evening. downdetector.com

Steganography in Cyber Espionage —  Hidden Data in Multimedia Files as a Stealth Attack Vector

If Ukraine has been Russia’s cyber espionage/attack front line over several decades, the Tibetan community in exile has had that unfortunate distinction while on the receiving end of Chinese government attacks. Great to see @tibcert.bsky.social putting out this expansive report on the subject.

Hackers launch cyber attack on Showjumping Ireland – but send ransom demand to wrong organisation www.independent.ie/irish-news/h...

Steve Gibson & @leolaporte.me break down the 'Salt Typhoon' cyber attack on U.S. telecom providers, exploring the latest cybersecurity threats and implications in this week's #SecurityNow. Plus, insights into China's sophisticated hacking strategies revealed. twit.tv/shows/security-now/episodes/1004

New: The Salt Typhoon attacks have raised discussions of hacking back against China. In classified settings, lawmakers have often asked intel + national security officials why American cyber forces don’t go on the attack more often, one senator told me —> www.nextgov.com/cybersecurit...

Class-action lawsuit filed against RIBridges vendor Deloitte over cyber attack www.bostonglobe.com/2024/12/16/m...

Call President Biden 202-456-1414 Tuesday to Thursday 11am to 4 pm Proof already in Romania,cand Georgia Cyber Attack on their elections via eLon Starlink, and they get a do over election. Tell Uncle Joe jail Elon Musk, and disqualify tRump for cyber attack on Swing State votes! Make public#

Preach @meiselasb.bsky.social! Nailed it. Shame on ABC. They’re trash.

cybersecuritynews.com/weaponize-go...

How China’s massive surveillance system is also a leaky ship and gets exploited by corrupt members of the security services and telecom providers to make a buck on the side: www.theregister.com/2024/12/08/c...

Nice little online censorship bypass guide: 2305878273.7844380499.cfd/misc/contacts/

We followed down the rabbit hole that is China‘s „hacker for hire“ eco-system, where state security and cyber espionage tasks are outsourced to private operators : www.itv.com/news/2024-06...

Chinese man got arrested in Bangkok after driving around a van that he converted into an SMS blaster to conduct a mass sms fishing operation: www.youtube.com/watch?v=LELn...

“These hands-on keyboard operators would need to be supported by linguists, open source researchers, malware authors, industry experts who translate task requests from requestors to the operators,and people who then transmit stolen information to the requestors.” www.lawfaremedia.org/article/the-...

The growing popularity of Bluesky, which has a largely liberal base and harder-to-manipulate algorithm, has sparked “worried chatter within Chinese state media circles,” www.semafor.com/article/11/2...

A little anecdotal story about China’s data collection frenzy, effectiveness and how it is used. Let’s go…

The UK applies Beijing’s own playbook to deal with China: therecord.media/british-gove...