Interesting links of the week:
Strategy:
* https://assets.anthropic.com/m/ec212e6566a0d47/original/Disrupting-the-first-reported-AI-orchestrated-cyber-espionage-campaign.pdf - Anthropic's large language model is now able to do a passable job of being a technical marketing editor
* https://www.whatdotheyknow.com/request/details_of_vpn_monitoring_platfo - interesting FOI request on VPN monitoring
* https://www.gov.uk/government/collections/cyber-security-and-resilience-bill - more on HMG's plans to protect the cybers
Threats:
* https://www.greynoise.io/blog/stark-industries-shell-game - how Stark Industries play hide and seek
* https://www-cdn.anthropic.com/b2a76c6f6992465c09a6f2fce282f6c0cea8c200.pdf - this vibeintel from Anthropic was good enough that folks were at least willing to put their names on it
* https://cloud.google.com/blog/topics/threat-intelligence/threat-actor-usage-of-ai-tools - GOOG talk AI tooling
* https://www.volexity.com/blog/2025/10/08/apt-meets-gpt-targeted-operations-with-untamed-llms/ - @volexity chime in with offensive LLM analysis of their own
* https://www.rapid7.com/blog/post/tr-building-construction-sector-threat-landscape-initial-access-supply-chain-iot/ - @rapid7 take a look at the construction sector
* https://securelist.com/mysterious-elephant-apt-ttps-and-tools/117596/ - Kaspersky discuss the elephant in the room
* https://www.nviso.eu/blog/nviso-analyzes-tls-n-day-backdoors-sparkcockpit-sparktar - mmm, backdoors
Detection:
* https://www.ic3.gov/CSA/2025/251119.pdf - blocking bullet proof hosters
* https://herman.bearblog.dev/messing-with-bots/ - bashing bots
* https://intel.gayint.org/ - @gayint's TI platform
* https://spoofer.caida.org/as_stats.php - the spoofed routing table
Bugs:
* https://labs.watchtowr.com/when-the-impersonation-function-gets-used-to-impersonate-users-fortinet-fortiweb-auth-bypass/ - read all about Fortinet's latest release
Exploitation:
* https://devansh.bearblog.dev/ai-pentest-scoping/ - scoping testing AI
* https://specterops.io/blog/2025/11/13/taming-the-attack-graph-a-many-subgraphs-approach-to-attack-path-analysis/ - you can never have too much graph!
Hard hacks:
* https://quentinkaiser.be/security/2025/07/25/rooting-tapo-c200/ - hacking cameras
Hardening:
* https://security.googleblog.com/2025/11/rust-in-android-move-fast-fix-things.html - help, my Android's rusty
Data:
* https://www.slideshare.net/slideshow/reality-mining-nathan-eagle/259141 - mapping humanity and our relationships