US Senators Secretly Work to Block Safeguards Against Surveillance Abusewww.wired.com Senator Mark Warner is trying to pass new limits on when the government can wiretap Americans. At least two senators are quietly trying to stop him.
Selena Larson
threat intelligence, dogs, and running. podcast host.
Israel-Gaza war live updates: Gantz to leave Israeli government in rebuke of Netanyahuwww.washingtonpost.com Benny Gantz’s resignation may not bring down the government, but it increases the pressure on Prime Minister Benjamin Netanyahu to accept a cease-fire proposal.
The curious case of the missing IcedID.thecyberwire.com Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about "The curious case of the missing IcedID."
Israel to close Al Jazeera news network in the country | CNNwww.cnn.com Israeli Prime Minister Benjamin Netanyahu posted on X that the operations of Qatar-based news channel Al Jazeera in Israel will be closed.
Latrodectus: This Spider Bytes Like Ice | Proofpoint USwww.proofpoint.com Proofpoint’s Threat Research team joined up with the Team Cymru S2 Threat Research team, in a collaborative effort to provide the information security community with a comprehensive view of the thr...
Victorian government department quits Elon Musk’s X, saying it’s no longer safe or productivewww.theguardian.com Department of Families, Fairness and Housing says ‘break up is overdue’ as more agencies expected to close accounts
US Lawmaker Cited NYC Protests in a Defense of Warrantless Spyingwww.wired.com A closed-door presentation for House lawmakers late last year portrayed American anti-war protesters as having possible ties to Hamas in an effort to kill privacy reforms to a major US spy program.
Character Limit by Kate Conger, Ryan Mac: 9780593656136 | PenguinRandomHouse.com: Bookswww.penguinrandomhouse.com Rising star New York Times technology reporters, Kate Conger and Ryan Mac, tell for the first time the full and shocking inside story of Elon Musk’s unprecedented hostile takeover of Twitter...
TA577’s Unusual Attack Chain Leads to NTLM Data Theft | Proofpoint USwww.proofpoint.com What happened Proofpoint identified notable cybercriminal threat actor TA577 using a new attack chain to demonstrate an uncommonly observed objective: stealing NT LAN Manager (NTLM) authentication...
A magician says a Democratic operative paid him to make the fake Biden New Hampshire robocall that is under investigationwww.nbcnews.com Dean Phillips’ presidential campaign denounced the alleged actions of one of its consultants and said it may take legal action against him.
Bumblebee Buzzes Back in Black | Proofpoint USwww.proofpoint.com What happened Proofpoint researchers identified the return of Bumblebee malware to the cybercriminal threat landscape on 8 February 2024
Tesla driver said if he did kill Mille Lacs doctor, he might have been on autopilot, distractedwww.startribune.com The suspect in the hit-and-run initially denied hitting the small-town doctor.
Secretive White House Surveillance Program Gives Cops Access to Trillions of US Phone Recordswww.wired.com A WIRED analysis of leaked police documents verifies that a secretive government program is allowing federal, state, and local law enforcement to access phone records of Americans who are not suspecte...