cloud.google.com/blog/topics/...
jobs.careers.microsoft.com/global/en/jo...
jobs.careers.microsoft.com/global/en/jo...
jobs.careers.microsoft.com/global/en/jo...
jobs.careers.microsoft.com/global/en/jo...
Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine
www.microsoft.com/en-us/securi...
Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine
www.microsoft.com/en-us/securi...
The Microsoft Threat Intelligence Center (MSTIC) is recruiting experienced nation-state threat hunters with highly honed threat intel analysis skills. MSTIC is responsible for delivering timely threat intelligence across our product & services teams.
The Microsoft Threat Intelligence Center (MSTIC) is recruiting experienced nation-state threat hunters with highly honed threat intel analysis skills. MSTIC is responsible for delivering timely threat intelligence across our product & services teams.
Another fascinating example of Secret Blizzard using “the tools/infrastructure of at least six other threat actors during the past seven years”
Based on both Microsoft Threat Intel findings and governments and other sec vendors, we assess that the Russian nation-state actor tracked as Secret Blizzard has used the tools and infrastructure of at least six other threat actors during the past seven years.
Another fascinating example of Secret Blizzard using “the tools/infrastructure of at least six other threat actors during the past seven years”
My dispatch from Cyberwarcon: techcrunch.com/2024/11/28/n...
My dispatch from Cyberwarcon: techcrunch.com/2024/11/28/n...
What features / tech should I prioritize this year?
What features / tech should I prioritize this year?
Activity is straightforward, attribution is tricky and intent is often opaque and relies on organizational politics and bureacracy inside organizations.
Activity is straightforward, attribution is tricky and intent is often opaque and relies on organizational politics and bureacracy inside organizations.
Regardless of healthy business competition, there’s a shared camaraderie being in the fight together.
Regardless of healthy business competition, there’s a shared camaraderie being in the fight together.
Join Ned Moran, Judy Ng, and Mark Parsons to explore their tactics, from app exploits to spear-phishing.
🔗 www.cyberwarcon.com/registration
www.microsoft.com/en-us/securi...
www.microsoft.com/en-us/securi...
🇰🇵 DPRK IT Workers | A Network of Active Front Companies and Their Links to China
Summary:
⚪ Newly Disrupted Front Companies by USG
⚪ Impersonating US based software and tech orgs
⚪ Links to still-active front orgs, CN association
Report:
www.sentinelone.com/labs/dprk-it...
www.tenable.com/blog/volt-ty...
www.tenable.com/blog/volt-ty...
CTI homecoming is here!
CTI homecoming is here!