Rob is a Staff Threat Researcher at SecurityScorecard. He supports the public sector team with intelligence collections and analysis. Rob received his doctorate from Harvard's Department of Near Eastern Languages and Civilizations in 2018 and has served in a series of increasingly cyber-focused threat intelligence roles since then; prior to joining SecurityScorecard, he served as an intelligence analyst at Flashpoint and BlueVoyant.
The Uber breach shows that third-party vendors are an easy target for cybercriminals to exploit to gain access to high-value data.
Keyboard warriors are claiming to contribute to the Gaza war with OT attacks. You should be skeptical.
A recent operation disrupted a Volt Typhoon botnet, but the group has had persistent access to critical infrastructure for years.
While little information is publicly available regarding the threat actor group responsible for the Electoral Commission breach or the tactics, techniques, and procedures (TTPs) involved in the attack, taken alongside Microsoft’s report, the incident may serve as further evidence that government bodies’ email systems are targets of particular interest to nation-state threat actors, should such an actor have been responsible for the breach, which some of the few publicly-available details may suggest.