Search
04.12.2021 | 6'' read
Sandboxing and that Zoom zero-click exploit chain
My latest piece SecurityWeek piece on the economics (and narrow shelf life) of memory corruption mitigations has kickstarted an active discussion on the future of sandboxing to disrupt the economy of software exploitation. Plus, that Pwn2Own Zoom zero-click exploit chain should scare us all.
Read03.23.2021 | 5'' read
Dark holes and apex threat actors
Google published a remarkable report on a true apex APT actor that burned through 11 zero-days in less than a year, but the absence of basic information to help defenders leads to a dark hole of balkanized research output. Plus, Kim Zetter's new journalism project.
Read02.17.2021 | 2'' read
Leaving Intel to bet on journalism about defense
It's exciting to be reporting again, interviewing CISOs and hackers alike, filtering through the fluff to write the stories I've always wanted to read. Here are some quick notes on why I'm bullish on micro-journalism, podcasting and live streaming to cover the business of cybersecurity.
Read