Daniel Gordon
@validhorizon.bsky.social
3.2K followers 200 following 600 posts
Thought Trailer, Cyber Threat Intel, DFIR. He/Him. Bucketing, sharing, and bacon-saving as a service. https://validhorizon.medium.com/
Posts Media Videos Starter Packs
Reposted by Daniel Gordon
cyberwarcon.bsky.social
Announcing this year's CYBERWARCON speaker lineup and agenda! We've got some fantastic talks this year, and more will be announced soon.

Don't miss your chance to register now! Thank you everyone who submitted to the CFP. The selection was a truly grueling process!
Reposted by Daniel Gordon
Reposted by Daniel Gordon
cyberoverdrive.bsky.social
A thread of great questions from @greg-l.bsky.social and fantastic answers (and nuance) by @invisig0th.bsky.social, about the legendary APT1 report and way more.
greg-l.bsky.social
HI @invisig0th.bsky.social been enjoying your recent media appearances with KZ and TBP!

Was wondering two things

1. You’re obviously the lead singer of the APT1 report “band” - Without burning names, can you talk about the make up of the team (skills, backgrounds, etc) +
& what made it special?
Reposted by Daniel Gordon
esetresearch.bsky.social
#ESETresearch has identified two campaigns targeting Android users in the 🇦🇪. The campaigns, which are still ongoing, distribute previously undocumented spyware impersonating #Signal and #ToTok via deceptive websites. www.welivesecurity.com/en/eset-rese... 1/6
New spyware campaigns target privacy-conscious Android users in the UAE
ESET researchers have discovered campaigns distributing spyware disguised as Android Signal and ToTok apps, targeting users in the United Arab Emirates.
www.welivesecurity.com
Reposted by Daniel Gordon
validhorizon.bsky.social
They said it’s a custom build of YARA-X
Reposted by Daniel Gordon
cyberwarcon.bsky.social
CFP closes this Friday, September 26th at 11:59pm EST!

If you'd like to speak at CYBERWARCON this year, get your talk submission in ASAP to be considered!

Submit your talk here >> www.cyberwarcon.com/cfp2025

#CYBERWARCON #CFP
Reposted by Daniel Gordon
esetresearch.bsky.social
#ESETresearch has observed #Gamaredon exploiting CVE-2025-8088 (#WinRAR path traversal) in an ongoing spearphishing campaign. This vulnerability allows arbitrary file write via crafted RAR archives. 1/6
Reposted by Daniel Gordon
esetresearch.bsky.social
#ESETresearch has uncovered the North Korea-aligned threat actor, DeceptiveDevelopment, targeting freelance developers with trojanized coding challenges and fake job interviews.
www.welivesecurity.com/en/eset-rese... 1/6
www.welivesecurity.com
validhorizon.bsky.social
Hopefully nobody is using vSphere or ESXi for anything important.
hultquist.bsky.social
We are releasing details on BRICKSTORM malware activity, a China-based threat hitting US tech to potentially target downstream customers and hunt for data on vulnerabilities in products. This actor is stealthy, and we've provided a tool to hunt for them. cloud.google.com/blog/topics/...
Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors | Google Cloud Blog
BRICKSTORM is a stealthy backdoor used by suspected China-nexus actors for long-term espionage.
cloud.google.com
validhorizon.bsky.social
Great thread on the SIM farm bust in NYC. Only note is that there are lots of incompetent spies and spy-adjacent folks out there but I don’t think any are incompetent in this specific way so completely agree with @tprophet.org analysis.
tprophet.org
1/ Hi, I'm TProphet. I write the Telecom Informer for @2600.com. A lot of people have been asking me about www.nbcnews.com/politics/nat... given that I'm somewhat knowledgeable in the area.

Here's my take: I'm kind of astonished that this is public, and it isn't normal that it would ever be.
Secret Service agents dismantle network that could shut down New York cellphone system
Agents discovered electronic devices in five locations in and around the city that could be used to disable cellphone towers. The system could also be used for criminal activities.
www.nbcnews.com
Reposted by Daniel Gordon
campuscodi.risky.biz
GitHub will require a FIDO-based two-factor authentication method to publish updates to npm packages.

The company will also deprecate legacy long-lived npm tokens and roll out new ones that last only seven days.

github.blog/security/sup...
Our plan for a more secure npm supply chain
GitHub is strengthening npm's security with stricter authentication, granular tokens, and enhanced trusted publishing.
github.blog
Reposted by Daniel Gordon
campuscodi.risky.biz
North Korean espionage group Kimsuky used "sex offender notices" to lure victims into running its malware

logpresso.com/ko/blog/2025...
validhorizon.bsky.social
It’s conference season and this is also kind of hilarious
dprkcert.bsky.social
We will be carefully reviewing submissions. Submit soon, space is filling up.

We welcome all researchers, state secret enjoyers, APTs, and more to submit to #BSidesPyongyang2025 🇰🇵

Submit your CFP now:
https://forms.gle/y6QRMeYuJPYXZi1k9
picture
validhorizon.bsky.social
Ian is a secret operative of big Availability.
Picture of the CIA triad: Confidentiality Integrity and Availability
Reposted by Daniel Gordon
volatilityfoundation.org
#FTSCon Speaker Spotlight: Wesley Shields (@wxs.bsky.social) is presenting “COLDRIVER: NOROBOT/YESROBOT/MAYBEROBOT” in the HUNTER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...
Reposted by Daniel Gordon
volatilityfoundation.org
#FTSCon Speaker Spotlight: Michael Horka is presenting “Lilac Typhoon aboard the Indigo Train - The Current State of Chinese Obfuscation Networks” in the HUNTER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...
Reposted by Daniel Gordon
volatilityfoundation.org
#FTSCon Speaker Spotlight: Tom Lancaster (@tlansec.bsky.social) & Josh Duke are presenting “Mission Auth Possible: Passwordless Phishing” in the HUNTER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...
Reposted by Daniel Gordon
brody-n77.bsky.social
As far as I can tell, Whittaker is the only tech executive in the entire world taking a principled and honest stand against the pervasive enshittification of technology by AI agents.

I hope Signal can be a North Star for other software vendors.

english.elpais.com/technology/2...
Signal president Meredith Whittaker: ‘In technology, it’s way too easy for marketing to replace substance. That’s what’s happened with Telegram’
The app best known for respecting privacy looks to grow, despite anti-privacy efforts
english.elpais.com
validhorizon.bsky.social
Hey I know that guy!
volatilityfoundation.org
#FTSCon Speaker Spotlight: Daniel Gordon (@validhorizon.bsky.social) is presenting “When the AppleJeus GitHub is Worth the Squeeze: Citrine Sleet Investigation” in the HUNTER track.

See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...