BogeyBackdoor
bogeybackdoor.bsky.social
BogeyBackdoor
@bogeybackdoor.bsky.social
I break into banks, spy on threats, drive a golf cart and play Lorcana

VGhlIEFuYWx5c3QgZm9ybWVybHkga25vd24gYXMgWW9zaGk=
Reposted by BogeyBackdoor
Mohammad wanted to get back at his enemies in the regime, by leaking their secrets to me. And he wanted to rekindle his relationship with the CIA, which had not ended on good terms. He was angry. He was determined. And he was desperate. www.theatlantic.com/magazine/202...
A Double Agent in Tehran
Mohammad Tajik claimed to be an Iranian intelligence officer and promised to reveal his country’s secrets. But first he had a game to play.
www.theatlantic.com
December 8, 2025 at 5:23 PM
Reposted by BogeyBackdoor
A study in the evolution of SVR cyberespionage tradecraft
December 6, 2025 at 7:07 PM
#ChangeMyMind #ElfOnTheShelf is a capitalist ploy to normalize a surveillance state to children.
December 1, 2025 at 5:18 PM
New Iran banger from @saffronsec.bsky.social / @threatinsight.proofpoint.com just dropped. Full of good analytic tradecraft, Indicators and interesting lures showing how self aware Iranian cyber actors are...
www.proofpoint.com/us/blog/thre...
Crossed wires: a case study of Iranian espionage and attribution | Proofpoint US
Proofpoint would like to thank Josh Miller for his initial research on UNK_SmudgedSerpent and contribution to this report.  Key findings  Between June and August 2025,
www.proofpoint.com
November 5, 2025 at 1:24 PM
Ninja editing all references in $newjob's documentation from ProofPoint to Proofpoint.
a rainbow colored shooting star with the words the mo you know above it
ALT: a rainbow colored shooting star with the words the mo you know above it
media.tenor.com
November 3, 2025 at 10:44 PM
Trying to decide if I should establish a threat actor naming schema based on flavors of Trader Joe's popcorn flavors
November 3, 2025 at 3:01 PM
Reposted by BogeyBackdoor
true analytic rigor comes from only opening your mouth when you have to and qualifying basically everything you say.
October 28, 2025 at 11:33 PM
Reposted by BogeyBackdoor
The tool has been released in the Proofpoint Emerging Threats public #GitHub for other defenders to leverage.

Learn more about it here: brnw.ch/21wWSH0

#PDF #threatdetection #cyberthreat
Proofpoint releases innovative detections for threat hunting: PDF Object Hashing | Proofpoint US
Key findings Proofpoint created a new open-source tool for creating threat detection rules based on unique characteristics in PDFs called “PDF Object Hashing”.  This technique can
brnw.ch
October 23, 2025 at 6:05 PM
Reposted by BogeyBackdoor
If your protest privacy/security advice does not start with a discussion of threat models, it is probably not good advice.
October 17, 2025 at 6:44 PM
Reposted by BogeyBackdoor
October 14, 2025 at 10:48 AM
If you consider yourself a "Threat Intelligence Platform", don't email a spreadsheet of malicious indicators daily.

That helps no one.
September 9, 2025 at 8:50 PM
Reposted by BogeyBackdoor
In addition to being one of history's most successful musicians, Taylor Swift has also successfully used a fire extinguisher.
August 26, 2025 at 5:58 PM
Reposted by BogeyBackdoor
Here’s what the Taylor swift and Travis kelce engagement taught me about B2B sales:
August 26, 2025 at 5:24 PM
Suspected attribution...
August 25, 2025 at 10:11 PM
Phish & Chips.
July 16, 2025 at 9:37 PM
Reposted by BogeyBackdoor
New: A handful of Chinese-linked cyber espionage groups are stepping up targeting of Taiwanese semiconductor companies, per new analysis from @proofpoint.com. Campaigns include targeting of financial analysts focused on the sector as well: www.reuters.com/sustainabili...
Exclusive: China-linked hackers target Taiwan's chip industry with increasing attacks, researchers say
Chinese-linked hackers are targeting the Taiwanese semiconductor industry and investment analysts as part of a string of cyber espionage campaigns, researchers said on Wednesday.
www.reuters.com
July 16, 2025 at 9:16 PM
Reposted by BogeyBackdoor
June 30, 2025 at 10:24 AM
RIP my thrunting notifications.
June 24, 2025 at 7:02 PM
Reposted by BogeyBackdoor
Technically isn’t each and every one of us “years away from a nuclear weapon” when you really think about it?
June 17, 2025 at 5:11 PM
Reposted by BogeyBackdoor
Thrunting for Thractors
June 10, 2025 at 4:15 PM
Reposted by BogeyBackdoor
Dropping some joint research today with Threatray on TA397/Bitter 🔍

We dive into the confluence of signals that led us to our attribution of the threat actor 🎯

Shoutout to @konstantinklinger.bsky.social and Threatray for collaborating on this research.

www.proofpoint.com/us/blog/thre...
The Bitter End: Unraveling Eight Years of Espionage Antics—Part One | Proofpoint US
This is a two-part blog series, detailing research undertaken in collaboration with Threatray. Part two of this blog series can be found on their website here.  Analyst note: Throughout
www.proofpoint.com
June 4, 2025 at 11:13 AM
Reposted by BogeyBackdoor
ELECTRONIC ESPIONAGE and ELECTRONIC CRIME ftw
May 29, 2025 at 7:09 PM
May 29, 2025 at 4:06 PM
Reposted by BogeyBackdoor
May 15, 2025 at 3:54 PM