Potential Sample of Malware from Ukrainian Cyber Attack Uncovered: https://ics.sans.org/blog/2016/01/01/potential-sample-of-malware-from-the-ukrainian-cyber-attack-uncovered …
-
-
Replying to @RobertMLee
@RobertMLee if the original exploitation vector isn't disclosed at some point, by SANS or the "3 major vendors", what good is our industry?1 reply 0 retweets 1 like -
Replying to @attritionorg
@attritionorg not SANS' place but I hope one of the three will. If they won't I'll try to.2 replies 0 retweets 0 likes -
Replying to @RobertMLee
@RobertMLee sorry, but you made it SANS place. or, are you writing checks our shit industry can't cash?1 reply 0 retweets 2 likes -
Replying to @attritionorg
@attritionorg hardly. Me saying "hey here's some info" doesn't commit anyone to anything. It's usually met with "thanks for sharing"3 replies 0 retweets 2 likes -
Replying to @RobertMLee
@RobertMLee promising more info forthcoming from 3 CYBER firms, as you voluntarily hold back, is a commitment of sorts.1 reply 0 retweets 0 likes -
Replying to @attritionorg
@attritionorg not of initial attack vector. Of the sample. And I'm aware of the reports being written. If they back out yes we will share it3 replies 0 retweets 2 likes
@RobertMLee if the 3 "CYBERSECURITY" firms back out of publishing a promised analysis, call them out. help make SANS more reputable.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.