via Sean Gallagher, reporting for Ars Technica, details the discovery of a Fishwrapping influence effort (whence the Fishwrappers, as it were, execute the rerunning of old terror news on various social network outlets). The discovery (PDF) - made by Recorded Future's (a security intelligence organization) threat intelligence algorithms, and annouced via the company's blog.
"The Fishwrap campaign consisted of three clusters of accounts. The first wave was active from May to October of 2018, after which many of the accounts shut down; a second wave launched in November of 2018 and remained active through April 2019. And some accounts remained active for the entire period. All of the accounts used domain shorteners hosted on a total of 10 domains but using identical code." - via Sean Gallagher, reporting for Ars Technica
Crispin Cowan of Leviathan Security, illuminates a vital component of both Information Security and Cyber Security with superb precision in his post The Calculus of Threat Modeling at the Leviathan Security Blog. Detailing both the Theory and Practice of Threat Modeling - his well-crafted thought processes are clearly presented and eminently defensible. If you read anything today on Threat Modeling, read Cripsin's work, you'll be glad you did! Certainement, il Faut Lire Aujourd Hui H/T