13 Principles of Threat Intelligence Communication
I have written at length about bad threat intelligence. However, I think it is time that I spend the effort communicating my key principles to making great threat intelligence. One aspect of great threat intelligence is great communication. As I have said before, you may be the greatest analyst... Read more
Schools Now Monitoring kids with Insecure Impero Software, PR Issues Abound
One of the most widely used tools for Schools monitoring kids and restricting pupils’ internet use in UK schools has a serious security flaw which could leave hundreds of thousands of children’s personal information exposed to hackers, a researcher has warned. Impero Education Pro, a product that restricts and... Read more
Jake Davis – Hacker
Jake Davis Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary,... Read more
Palantir 101: InfoSec Gov Deployed Malware Explained
War   For those who are completely new to the Palantir Platform or could simply use a refresher, this talk will start from scratch and provide a broad overview of Palantir’s origins and mission. A live demonstration of the product will help to familiarize newcomers with Palantir’s intuitive graphical... Read more
#InfoSec: If it walks like th3j35t3r and talks like th3j35t3r, its probably TomRyanBlog
UPDATE: Our hero Jake Davis provided some interesting commentary on this subject recently: I remember seeing IRC logs of you and LulzSec dissing The Jester and saying his tool “XerXeS” is just SlowLoris with Tor… but how did you guys come to this conclusion? How can this be mitigated... Read more
Thomas Ryan: The Guy Who Snitched on Occupy Wall Street to the FBI and NYPD
The Occupy Wall Street protests have been going on for a month. And it seems the FBI and NYPD have had help tracking protesters’ moves thanks to a conservative computer security expert who gained access to one of the group’s internal mailing lists,and then handed over information on the... Read more