via Paul Szoldra writing at Task And Purpose, comes a superlative piece on the United States Cyber Command's cible du jour: The Russian Power Grid. This news, arrives via outstanding reporting of two of the The New York Times' highly respected correspondents and authors, namely - David E. Sanger and Nicole Perlroth.
"In interviews over the past three months, the officials described the previously unreported deployment of American computer code inside Russia’s grid and other targets as a classified companion to more publicly discussed action directed at Moscow’s disinformation and hacking units around the 2018 midterm elections." - via correspondents David E. Sanger and Nicole Perlroth reporting for The New York Times'
"On Wednesday, Google is addressing this last drawback with a new method that brings Android keys to iPhone and iPad users. It relies on the Google Smart Lock app running on the iOS device that communicates over Bluetooth with the built-in key stored on the user’s Android phone or tablet. (The app, which is also used to make FIDO-based crypto keys work with iOS devices, has user ratings of just 2.2 out of 5.) Google has additional instructions here. Company representatives declined to provide interviews for this post." - via Dan Goodin, writing at Ars Technica
via Sean Gallagher, reporting for Ars Technica, details the discovery of a Fishwrapping influence effort (whence the Fishwrappers, as it were, execute the rerunning of old terror news on various social network outlets). The discovery (PDF) - made by Recorded Future's (a security intelligence organization) threat intelligence algorithms, and annouced via the company's blog.
"The Fishwrap campaign consisted of three clusters of accounts. The first wave was active from May to October of 2018, after which many of the accounts shut down; a second wave launched in November of 2018 and remained active through April 2019. And some accounts remained active for the entire period. All of the accounts used domain shorteners hosted on a total of 10 domains but using identical code." - via Sean Gallagher, reporting for Ars Technica