John Hultquist

@JohnHultquist

Over a decade tracking global cyber espionage at USG, iSIGHT, and FireEye. CYBERWARCON founder. Georgetown professor. Army vet. Opinions my own.

Vrijeme pridruživanja: svibanj 2011.

Tweetovi

Blokirali ste korisnika/cu @JohnHultquist

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @JohnHultquist

  1. Prikvačeni tweet
    5. sij

    Some coalescing thoughts on Iran's cyber capability. The first is that while cyberattack (disruption/destruction) is on the table, the most consequential capability may be cyber espionage. There will be cyber espionage against gov/mil targets as well as personnel of interest. 1/x

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    28. sij

    We've all received emails with no attachment and assume it's "safe" to open in a mail client (as long as we don't explicitly click on any URLs). Right? Not so much...

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet

    ADVISORY: Media Bootcamp on Navigating ’s Complex Political, Economic and Historic Landscape - Georgetown University

    Poništi
  4. 30. sij

    George Kayak is a great guy and this is slander.

    Poništi
  5. 30. sij
    Poništi
  6. proslijedio/la je Tweet
    29. sij

    So this just happened: First (real) blog at the new job.

    Poništi
  7. proslijedio/la je Tweet
    25. sij

    In 2008 explored the potential impact that the next pandemic could have on the industry. Very relevant paper in the context of Report available here:

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    25. sij

    Judge forces insurer to help small business to clean up after a crippling ransomware attack by

    Poništi
  9. proslijedio/la je Tweet
    24. sij

    Are you a media outlet looking for cybersecurity content my mom would really like? I'm still on the market. I've written infosec newsletters for three large publications, including building Codebook from scratch to a >35,000, readership. DC now, but will move for right job.

    Poništi
  10. proslijedio/la je Tweet
    24. sij

    spoke with about the American Herald Tribune and its ties to an operation run from Iran. via

    Poništi
  11. proslijedio/la je Tweet
    24. sij

    In our latest blog on threat actors exploiting CVE-2019-19781, , , & I delve into financially motivated threat actor who exploited CVE-2019-19781, scanned internally for EternalBlue & deploy ransomware (code family still under analysis)

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    24. sij

    Our Senior VP of Global Intelligence, Sandra Joyce was featured on last night. She discussed Iranian and how the U.S. needs to be on high alert for from foreign countries for the .

    Poništi
  13. proslijedio/la je Tweet
    24. sij

    NEW: An unsubstantiated story about Trump's father and the KKK that went hugely viral before the 2016 election was published by an "American" news site that tech investigators now say has Iranian links. The website is paying American writers.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    24. sij

    There are very few people I read and take seriously on cyber and one of them has just written a new book. ’s The Hacker and the State is out. I’m looking forward to reading it.

    Poništi
  15. proslijedio/la je Tweet
    23. sij

    The first copies of my book The Hacker and the State are hot off the presses! My thanks to , David Petraeus, Lisa Monaco, , and Richard Harknett for their kind blurbs. The book is out in February and available for preorder now:

    Poništi
  16. proslijedio/la je Tweet
    23. sij

    Pro tip: Security means you’re concerned about bad things happening to your data. Compliance means you’re concerned about auditors happening to your data.

    Poništi
  17. proslijedio/la je Tweet
    23. sij

    Heads up! We’re tracking a spike in and re-upping defensive guidance.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    22. sij

    Kimberly Goody spoke with at about the variety of techniques scammers use to impersonate people requesting fraudulent money transfers in relation to aimed at Democratic campaigns.

    Poništi
  19. proslijedio/la je Tweet
    22. sij

    BREAKING - To help organizations identify compromised systems with CVE-2019-19781, & have released a tool that searches for indicators of compromise associated with attacker activity observed by

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    22. sij

    Great work by and many others to get this out quickly!

    Poništi
  21. proslijedio/la je Tweet

    LATEST: CDC confirms the first case of Wuhan coronavirus in the U.S. is in Washington state

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·