All this would be a serious threat to national security. Except for this, oddly, Apple reflects that it happened. “We disagree with the claims of a target attack on our users,” Ivan Krstić, Apple Security Engineering, wrote in a statement in Wired. Apple has raised the problem that Iverify stood out in his report, which caused the iphones to fall in certain cases when a sender of messages changed his own nickname and avatar. But he calls the result of a “conventional software error”, not evidence of a directed farm. (This denial of blanket is certainly not Apple’s usual response to piracy confirmed by the iPhone. The company has requested, for example, the NSO Group piracy firm for its orientation to Apple clients.)
The result is that what could have been a fire of four alarms in the world of counterintelligence is reduced – because of a very worrying riddle.
A former 22 -year -old inner from the Heritage Foundation without national security experience has been designated for a key role of national security department, which oversees an important program designed to combat domestic terrorism.
According to Propembling, Thomas Fugate last month assumed the leadership of the Program and Partnership Center (CP3), a DHS office in charge of financing efforts nationally to prevent politically motivated violence, including school features and other forms of domestic terrorism.
Fugate, a 2024 graduate from the University of Texas to San Antonio, replaced the former director of CP3, Bill Braniff, a 20 -year -old army veteran who resigned in March after the cuts of staff ordained by the Trump administration.
According to CP3’s most recent report to Congress, the office has funded more than 1,100 initiatives to interrupt violent extremism. In recent months, the United States has seen a number of attacks aimed at a high profile level, including a cars bombing in California and the shot of two Israeli aids in Washington, DC. Its $ 18 million grant program, designed to support local prevention efforts, is now under Fugate supervision.
The names of the Pirates Group have been for a long time Unavoidable absurdity In the cybersecurity industry. Every threat intelligence company, in a scientifically defensible attempt to not suppose that the same pirates are followed as another company, comes with their own code name for any group they observe. The result is a slightly silly profusion of overlapping name systems based on elements, climate and zoology: “The luxury bear” is “Blizzard Forest” is “Apt28” is “Stronci”. Now, several main threat intelligence players, including Google, Microsoft, Crowdstrike and Palo Alto Networks, have finally shared their internal research to accept a glossary that confirms that they are referring to the same entities. The companies did no, However, it agrees to consolidate its name systems in a single taxonomy. So this agreement does not mean the end of security judgments such as “The Hacker Group Sandworm, also known as Telebots, Voodoo Bear, Hades, Iron Viking, Electrum or Seasell Blizzard”. It just means that cybersecurity journalists can write this phrase with a little more trusted.
Chris Wade, the founder and CTO of the Corellium mobile engineering company, has had the last wild decades: in 2005, he was convicted of criminal accusations for enabling spammers by providing them with proxy servers and agreed to work coverts to enforce the law while avoiding prison. In 2020, he mysteriously received a forgiveness from President Donald Trump. He also resolved a significant demand for APPLE copyright. Now his company, which creates virtual images of Android and iOS devices so that clients can find ways to intervene, is acquired by the firm of telephone piracy Cellebrite, a significant contractor of the law, for $ 200 million, an important day for a computer pirate that has been found on both sides of the law.