Pierre-Marc Bureau Profile
Pierre-Marc Bureau

@pmbureau

Followers
1K
Following
1K
Media
7
Statuses
801

Joined August 2008
Don't wanna be here? Send us removal request.
@DanWBlack
Dan Black
1 year
New joint TAG/Mandiant research on a hybrid Russian espionage/influence campaign (UNC5812) targeting potential Ukrainian military recruits with malware and spreading anti-mobilization narratives
Tweet card summary image
cloud.google.com
A suspected Russian hybrid espionage and influence operation, delivering Windows and Android malware.
1
40
88
@billyleonard
billy leonard
2 years
🆕🚨 New analysis from @Google TAG on suspected APT29 waterholes against 🇲🇳 gov. n-day exploits targeting iOS and Android we first observed in use from commercial surveillance vendors🫢 more details in the blog! awesome work from @_clem1 and team🤝 https://t.co/mxodD8gk4d
Tweet card summary image
blog.google
We’re sharing an update on suspected state-backed attacker APT29 and the use of exploits identical to those used by Intellexa and NSO.
2
88
157
@royalhansen
Royal Hansen
2 years
"Where it is not possible to prevent the theft of credentials and cookies by malware, the next best thing is making the attack more observable by antivirus, endpoint detection agents, or enterprise administrators with basic log analysis tools" https://t.co/5Y1MnovKGY
security.googleblog.com
Posted by Will Harris, Chrome Security Team Chromium's sandboxed process model defends well from malicious web content, but...
1
9
39
@herrcore
herrcore
2 years
Honoured to be presenting the keynote for @NorthSec_io this year. If you are in the neighbourhood May 16-17 come say hi, tickets are still available😺 Unpack all malware with a single breakpoint? Maybe? And I promise I won't mention anything about LLMs! https://t.co/iLkaAa9Y1J
Tweet card summary image
nsec.io
0
9
51
@argvee
Heather Adkins - Ꜻ - Spes consilium non est
2 years
So impressed by @j00ru's Project Zero journey looking for security issues in the important and complex Windows registry. Great writeup outlining his thought-process... good lessons for us all! https://t.co/qTJO4z2pfv
0
10
47
@maddiestone
Maddie Stone
2 years
🪲And the 2023 Year in Review of Zero-Days Exploited In-the-Wild is out! This year I teamed up with @JaredSemrau & James from Mandiant to write a joint report combining our expertise and providing a more holistic view on in-the-wild 0-days in 2023 🔥🧐 https://t.co/6INizgzKwg
1
124
262
@ShaneHuntley
Shane Huntley
2 years
Launching today our new report "Tool of First Resort: Israel-Hamas War in Cyber" https://t.co/BPJZHa0uUB Cyber provides a lower-cost, lower-risk way for rivals to engage in conflict, gather information, disrupt daily life, and shape public perceptions. 🧵
Tweet card summary image
blog.google
An analysis of cyber operations in the Israel-Hamas War.
10
28
67
@pmbureau
Pierre-Marc Bureau
2 years
Buying Spying: How the commercial surveillance industry works and what can be done about it @google
Tweet card summary image
blog.google
0
6
12
@az_matazz
Azi Vaziri
2 years
Spyware is used against high-risk users: journalists, human rights defenders, dissidents and political opponents. I'm particularly proud of our latest work, shedding light on Commercial Surveillance Vendors who make $$$ exploiting vulnerable systems and users. 🧵
@ShaneHuntley
Shane Huntley
2 years
Announcing the latest report from Threat Analysis Group documents the rise of commercial surveillance vendors and the industry that threatens free speech, the free press and the open internet https://t.co/6y7gkrwS6A Some highlights below. 🧵
0
4
10
@googlecanada
Google Canada
2 years
We're announcing new support for Quebec's cybersecurity ecosystem by providing a $1.3M grant to the Multidisciplinary Institute for Cybersecurity and Cyber Resilience, a project by @polymtl, to support research that addresses the rising global cyber risks.
5
10
16
@billyleonard
billy leonard
2 years
New malware from 🇷🇺 with ❤️, COLDRIVER deploying a custom tool, SPICA, in small number of targeted campaigns. Great write up from @wxs @auroracath and @Google TAG. actor to keep an 👁️ on moving into 2024! https://t.co/0rzO3EYRGF
Tweet card summary image
blog.google
Threat Analysis Group sheds light on Russian threat COLDRIVER’s use of malware.
3
49
93
@maddiestone
Maddie Stone
2 years
💪🏼 Yesterday @_clem1 and @vladhiewsha discovered and reported a new ITW 0-day to the Chrome team. TODAY, 1 day later, Chrome has a fix out to protect users!!! Thank you, Chrome! CVE-2023-7024 https://t.co/2tkx0Zc9pf
Tweet card summary image
chromereleases.googleblog.com
The Stable channel has been updated to 120.0.6099.129 for Mac,Linux and 120.0.6099.129/130 to Windows which will roll out over the coming d...
5
49
220
@maddiestone
Maddie Stone
2 years
🪲 New blog from me, @_clem1, and Kristen on the Zimbra in-the-wild 0-day, CVE-2023-37580, discovered by TAG in the summer. We discovered 4 different campaigns using the bug against organizations in Greece, Moldova, Tunisia, Vietnam, and Pakistan. https://t.co/m1vxz51QMC
Tweet card summary image
blog.google
TAG’s discovery of a 0-day exploit used to steal email data from international government organizations.
4
68
190
@Lau_Therrien
Laurence Therrien
2 years
Félicitations à toute l’équipe de l’Institut Multidisciplinaire en Cybersécurité et Cyberrésience (ou IMC2 - vive les acronymes!) @polymtl @HEC_Montreal @UMontreal. Le Québec est un véritable hub Cyber 🌐 qui mérite de rayonner et votre travail y contribuera grandement.
1
1
2
@AdmVonSchneider
Christian Blichmann 🇺🇦 (on bksy and Mastodon)
2 years
In the spirit of "this talk could've been a tweet", I just pushed a button: #BinDiff is now open source. - Snapshot release, no major new functionality - Release binaries later today or tomorrow - This is my 20% and I won't we able to act on PRs until end of Q4 (OOO traveling)
8
340
1K
@RonDeibert
profdeibert
2 years
NEW @citizenlab report: Egyptian 🇪🇬 Presidential candidate hacked with #Predator spyware Working w/ @Google TAG, we discovered three #Apple zero days (hence emergency patches last night) Details 👇 https://t.co/ZyAluqT1Nm
Tweet card summary image
citizenlab.ca
Between May and September 2023, former Egyptian MP Ahmed Eltantawy was targeted with Cytrox's Predator spyware via links sent on SMS and WhatsApp after Eltantawy publicly stated his plans to run for...
6
127
234
@pmbureau
Pierre-Marc Bureau
2 years
Great post by @maddiestone, patch now! 0-days exploited by commercial surveillance vendor in Egypt @google https://t.co/7RyHhyRPXk.
Tweet card summary image
blog.google
0
0
6