Profile avatar
mattkapko.com
Reporter @cyberscoop.bsky.social • Grateful lifelong Californian • matt.49 on Signal • [email protected] • mattkapko.com
12 posts 184 followers 486 following
Regular Contributor

A 21-year-old U.S. Army soldier linked to last year's Snowflake attack spree allegedly tried to sell stolen data to a foreign intelligence service after searching for information about how to defect to Russia. Hat tip to @nixonnixoff.bsky.social @austinlarsen.me cyberscoop.com/army-soldier...

Check out this deep dive on the ORIGINAL version of "CISA."

#Crypto analysts stunned by Lazarus Group’s capabilities in $1.46B Bybit #theft. The amount stolen last week surpasses what the group was able to steal in all of 2024. via @mattkapko.com cyberscoop.com/bybit-lazaru...

Palo Alto Networks’ threat intelligence firm said nearly 9 in 10 #cyberattacks it responded to last year involved disrupted business operations. via @mattkapko.com cyberscoop.com/cyberattacks...

Black Basta’s internal chat logs, which were leaked earlier this month, are providing defenders with actionable intelligence on the #ransomware group’s operations, cybercrime experts told CyberScoop. via @mattkapko.com cyberscoop.com/black-basta-...

The CyberScoop editorial team is closely monitoring the federal government's activities and developments in cybersecurity. If you're interested in discussing what's happening across these areas, we have several reporters actively covering these topics who you can reach out to via Signal:

#SaltTyphoon gained initial access to Cisco devices as part of the Chinese nation-state threat group’s sweeping attacks on U.S. telecom networks, the company confirmed Thursday in a #threat intelligence report. via @mattkapko.com cyberscoop.com/cisco-talos-...

Russia-aligned threat groups dupe Ukrainian targets via #Signal. Google researchers say multiple #Russian state threat groups have conducted remote #phishing operations to target and compromise Signal accounts. via @mattkapko.com cyberscoop.com/russia-threa...

Edge devices harboring zero-day and n-day vulnerabilities were linked to the most consequential attack campaigns last year, Darktrace said in an annual threat report released Wednesday. via @mattkapko.com cyberscoop.com/edge-device-...

Suspected Russian nation-state threat groups have duped multiple victims into granting potentially persistent access to networks via authentication requests and valid tokens. via @mattkapko.com cyberscoop.com/russia-threa...

Salt Typhoon remains active, hits more telecom networks via Cisco routers cyberscoop.com/salt-typhoon...

#Russian state #threat group shifts focus to US, UK targets. A subgroup of Seashell Blizzard exploited public #vulnerabilities in internet-facing systems, Microsoft researchers said. via @mattkapko.com cyberscoop.com/russian-stat...

President Trump has selected Sean Cairncross — a former White House and Republican National Committee official and the former CEO of the Millennium Challenge Corporation, a federal foreign aid agency — to be his national cyber director. via @timstarks.bsky.social cyberscoop.com/sean-cairncr...

Microsoft fixes 63 vulnerabilities, including 2 zero-days. The company’s monthly Patch Tuesday update comes with more than two-thirds of the patches closing high-severity flaws. via @mattkapko.com cyberscoop.com/microsoft-pa...

I joined CyberScoop as a reporter today. My beats include cybercrime, ransomware, software defects and vulnerability (mis)management. It is an honor to join this talented team. I am ready to get to work. Let's talk. I’m at [email protected] and matt.49 on Signal.

Today marks my last day at Cybersecurity Dive. I am proud of the work I did during my time here — it was the best of my nearly 25-year career as a journalist. My instincts about what I’d gain professionally from this job were spot-on. I close this chapter of my career as a better journalist.

Firewalls, VPNs and routers are a common and persistent intrusion point for cyberattacks. When malicious hackers exploit vulnerabilities in these network security tools, it’s not the vendors that get hit — it’s their customers. www.cybersecuritydive.com/news/network...

Lax security controls played a significant role in allowing a China-government sponsored threat group to gain broad and full access to U.S. telecom networks, a senior White House official said. A ninth telecom company was among those hit by Salt Typhoon. www.cybersecuritydive.com/news/salt-ty...