Dan Black (@danwblack) 's Twitter Profile
Dan Black

@danwblack

🇨🇦 Manager, Cyber Espionage Analysis @Mandiant @GoogleCloud. Former @NATO @cybercentre_ca. Views personal.

ID: 2887210967

calendar_today21-11-2014 19:11:43

2,2K Tweet

3,3K Followers

1,1K Following

Andy Greenberg (@agreenberg at the other places) (@a_greenberg) 's Twitter Profile Photo

Russia-linked hackers have been phishing Ukrainian military with Signal QR codes that look like group invites but instead add a linked device that eavesdrops on messages. Update Signal now to get its fix for a tactic that’s likely to spread beyond Ukraine. wired.com/story/russia-s…

Thomas Brewster (@iblametom) 's Twitter Profile Photo

NEW - Google researchers detail the various ways in which Russia is targeting Ukrainian military Signal accounts. Includes attacks via QR code (Qishing) and some sneaky phishing mimicking an artillery software used by Ukraine. Signal updates to address. forbes.com/sites/thomasbr…

Sean Lyngaas (@snlyngaas) 's Twitter Profile Photo

It's also unclear to me why this NSA doc would refer to a "vulnerability" in Signal in describing the Mandiant research. The Mandiant research describes the tradecraft as abuse of a legitimate Signal feature, not a new vuln in Signal. x.com/JimLaPorta/sta…

Signal (@signalapp) 's Twitter Profile Photo

Right now there are a lot of new eyes on Signal, and not all of them are familiar with secure messaging and its nuances. Which means there’s misinfo flying around that might drive people away from Signal and private communications. One piece of misinfo we need to address is the

Ramin Nafisi (@malwarere) 's Twitter Profile Photo

Today, Microsoft Threat Intelligence Center (MSTIC) is excited to announce the release of RIFT, a tool designed to assist malware analysts automate the identification of attacker-written code within Rust binaries. Blog: microsoft.com/en-us/security… Tool: github.com/microsoft/RIFT

CISA Cyber (@cisacyber) 's Twitter Profile Photo

🛡️We added Citrix NetScaler ADC and Gateway out-of-bounds read vulnerability CVE-2025-5777 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec

🛡️We added Citrix NetScaler ADC and Gateway out-of-bounds read vulnerability CVE-2025-5777 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks.  #Cybersecurity #InfoSec