Cyberespionage in East and Southeast Asia, for both intelligence collection and domestic security, Spyware tools tracked. Shifting cyber targets in Russia’s hybrid war. Securing the Super Bowl.

Cyberespionage in East and Southeast Asia, fo...

Up next

Caught in the funnel. [Research Saturday]

Today we have Andrew Northern, Principal Security Researcher at Censys, discussing "From Evasion to Evidence: Exploiting the Funneling Behavior of Injects". This research explains how modern web malware campaigns use multi-stage JavaScript injections, redirects, and fake CAPTCHAs ...  Show more

TikTok lives to scroll another day.

At long last, a TikTok deal. Officials urge lawmakers to keep an eye on the quantum ball. Fortinet confirms active exploitation of a critical authentication bypass flaw. Ireland plans to authorize spyware for law enforcement. Okta warns customers of sophisticated vishing kits. Un ...  Show more

Recommended Episodes

Russie : un malware inédit contre l’Ukraine ?
Choses à Savoir TECH

Si le conflit entre l’Ukraine et la Russie est un drame absolu pour les citoyens, force est de constater que le monde de la tech y joue un rôle de premier plan. Ces derniers jours, nous vous avons présenté différentes actions mises en place par les occidentaux pour tenter d’af ...

  Show more

NSO Employee Abused Phone Hacking Tech to Target a Love Interest
CYBER

Back in 2013, between the many revelations on mass surveillance abuses by the NSA coming from the trove of Snowden leaks, Americans also learned agents at the signals intelligence agency were snooping on their love interests. Dubbed LOVEINT (a play on ‘Love-Intelligence,’ apparen ...  Show more

Nicole Perlroth, "This Is How They Tell Me the World Ends: The Cyberweapons Arms Race" (Bloomsbury, 2021)
New Books in Technology

For years, cybersecurity experts have debated whether cyber-weapons represent a destabilizing new military technology or merely the newest tool in the spies’ arsenal. In This Is How They Tell Me the World Ends (Bloomsbury, 2021), Nicole Perlroth makes a compelling case that cyber ...  Show more