Toggle navigation
TWunroll
TWunroll
faq
Contact US
Kim Zetter
KimZetter
Interesting piece. John Sullivan (aka Jaydenx) posted one of most compelling videos of insurrection that showed him alternating between being part of mob and telling police he was media covering
Read more
Former security technician for home security company ADT admitted he secretly accessed customers' home security cameras more than 9,600 times over 4+ yrs, particularly in homes of attractive women to
Read more
Per briefing today on SolarWinds hack, @RonWyden says IRS was not compromised or taxpayer data affected. However, hack of Treasury Department "appears to be significant." Treasury breach began in July,
Read more
New: SolarWinds hackers did test-run of spy operation in Oct 2019, when malicious SolarWinds files were first downloaded by customers. That version didn't have backdoor in it, however. Indicates hackers
Read more
Someone asked me to provide a simple description of what this SolarWinds hack is all about. So for anyone who is confused by the technical details, here's a thread with
Read more
"While updating the SolarWinds application, the embedded backdoor code loads before the legitimate code runs. Organizations are misled into believing that no malicious activity has occurred and that the program
Read more
I have report from Microsoft about SolarWinds hack, including IoCs. Excerpts in this thread: "Microsoft security researchers recently discovered a sophisticated attack where an adversary inserted malicious code into a
Read more
Here's another piece about the Georgia audit that notes what I explained earlier: that Georgia’s recount rules don't allow for a full hand recount and that the audit GA is
Read more
NOTe: This is a risk-limiting audit. It’s NOT a recount being done to appease Trump. It was always planned that Georgia would do a risk-limiting audit of one statewide race
Read more
Please stop saying that because voting machines aren't connected to internet they're unhackable. First, some voting machines *are* connected to internet. Second, any computer is hackable whether connected or not.
Read more
By continuing to use the site, you are consenting to the use of cookies as explained in our
Cookie Policy
to improve your experience.
I agree