Beyond the kill chain: What cybercriminals do with their money (Part 2)
In the second of our five-part series, Sophos X-Ops investigates the so-called ‘white’ (legitimate) business interests of threat actors
In the second of our five-part series, Sophos X-Ops investigates the so-called ‘white’ (legitimate) business interests of threat actors
It’s nearly impossible not to be watched these days. It can start right at home with your neighbors and their Ring cameras—a company that sold fear to the American public and is now integrating AI to turn entire neighborhoods into networked, automated surveillance systems. Head out a bit further and you’ll likely be confronted by…
What a long, strange trip it’s been Categories: Security Operations Tags: Active Adversary
Welcome back to the Abstract! Here are the studies that caught my eye this week. First up, a bummer! NASA is facing devastating cuts to Earth science, and science in general, which is pretty important for an agency tasked with understanding the universe. I try to keep this newsletter relatively downer-free, but current events are…
Analysis of the tradecraft evolution across 6 months and 11 incidents
Several Reddit communities dedicated to sharing news and media from conflicts around the world now require users in the UK to submit a photo ID or selfie in order to prove they are old enough to view “mature” content. The new age verification system is a result of the recently enacted Online Safety Act in…
404 Media is making a print zine about the surveillance tactics used by ICE, and the ways people are resisting this technology. It will be 16 pages and printed on a risograph printer by a printshop in Los Angeles. It contains both reworked versions of our best reporting on ICE and some new articles for…
A group of more than a dozen Democratic lawmakers have demanded the Department of Homeland Security (DHS) provide its definition of “domestic terrorist,” after the agency labelled U.S. citizens Renée Good and Alex Pretti, which DHS officers killed, as such. The move also comes as DHS and its various components purchase and deploy a wide…
/PRNewswire/ — Fenix24, an industry-leading cyber disaster recovery firm that is transforming the post-breach restoration process and impact, today announced…
Chicagoans have turned to a novel piece of tech that marries the old-school with the new to warn their communities about the presence of ICE officials: 3D-printed whistles. The goal is to “prevent as many people from being kidnapped as possible,” Aaron Tsui, an activist with Chicago-based organization Cycling Solidarity, and who has been printing…