Pierre-Marc Bureau
@pmbureau
Followers
1K
Following
1K
Media
7
Statuses
801
Joined August 2008
New joint TAG/Mandiant research on a hybrid Russian espionage/influence campaign (UNC5812) targeting potential Ukrainian military recruits with malware and spreading anti-mobilization narratives
cloud.google.com
A suspected Russian hybrid espionage and influence operation, delivering Windows and Android malware.
1
40
88
🆕🚨 New analysis from @Google TAG on suspected APT29 waterholes against 🇲🇳 gov. n-day exploits targeting iOS and Android we first observed in use from commercial surveillance vendors🫢 more details in the blog! awesome work from @_clem1 and team🤝 https://t.co/mxodD8gk4d
blog.google
We’re sharing an update on suspected state-backed attacker APT29 and the use of exploits identical to those used by Intellexa and NSO.
2
88
157
"Where it is not possible to prevent the theft of credentials and cookies by malware, the next best thing is making the attack more observable by antivirus, endpoint detection agents, or enterprise administrators with basic log analysis tools" https://t.co/5Y1MnovKGY
security.googleblog.com
Posted by Will Harris, Chrome Security Team Chromium's sandboxed process model defends well from malicious web content, but...
1
9
39
Honoured to be presenting the keynote for @NorthSec_io this year. If you are in the neighbourhood May 16-17 come say hi, tickets are still available😺 Unpack all malware with a single breakpoint? Maybe? And I promise I won't mention anything about LLMs! https://t.co/iLkaAa9Y1J
nsec.io
0
9
51
So impressed by @j00ru's Project Zero journey looking for security issues in the important and complex Windows registry. Great writeup outlining his thought-process... good lessons for us all! https://t.co/qTJO4z2pfv
0
10
47
🪲And the 2023 Year in Review of Zero-Days Exploited In-the-Wild is out! This year I teamed up with @JaredSemrau & James from Mandiant to write a joint report combining our expertise and providing a more holistic view on in-the-wild 0-days in 2023 🔥🧐 https://t.co/6INizgzKwg
1
124
262
A review of zero-day in-the-wild exploits in 2023 @google
blog.google
Today, Google released its report “We’re All in this Together: A Year in Review of Zero-Days Exploited In-the-Wild in 2023.”
0
4
28
Launching today our new report "Tool of First Resort: Israel-Hamas War in Cyber" https://t.co/BPJZHa0uUB Cyber provides a lower-cost, lower-risk way for rivals to engage in conflict, gather information, disrupt daily life, and shape public perceptions. 🧵
blog.google
An analysis of cyber operations in the Israel-Hamas War.
10
28
67
Buying Spying: How the commercial surveillance industry works and what can be done about it @google
blog.google
0
6
12
Spyware is used against high-risk users: journalists, human rights defenders, dissidents and political opponents. I'm particularly proud of our latest work, shedding light on Commercial Surveillance Vendors who make $$$ exploiting vulnerable systems and users. 🧵
Announcing the latest report from Threat Analysis Group documents the rise of commercial surveillance vendors and the industry that threatens free speech, the free press and the open internet https://t.co/6y7gkrwS6A Some highlights below. 🧵
0
4
10
We're announcing new support for Quebec's cybersecurity ecosystem by providing a $1.3M grant to the Multidisciplinary Institute for Cybersecurity and Cyber Resilience, a project by @polymtl, to support research that addresses the rising global cyber risks.
5
10
16
New malware from 🇷🇺 with ❤️, COLDRIVER deploying a custom tool, SPICA, in small number of targeted campaigns. Great write up from @wxs @auroracath and @Google TAG. actor to keep an 👁️ on moving into 2024! https://t.co/0rzO3EYRGF
blog.google
Threat Analysis Group sheds light on Russian threat COLDRIVER’s use of malware.
3
49
93
💪🏼 Yesterday @_clem1 and @vladhiewsha discovered and reported a new ITW 0-day to the Chrome team. TODAY, 1 day later, Chrome has a fix out to protect users!!! Thank you, Chrome! CVE-2023-7024 https://t.co/2tkx0Zc9pf
chromereleases.googleblog.com
The Stable channel has been updated to 120.0.6099.129 for Mac,Linux and 120.0.6099.129/130 to Windows which will roll out over the coming d...
5
49
220
🪲 New blog from me, @_clem1, and Kristen on the Zimbra in-the-wild 0-day, CVE-2023-37580, discovered by TAG in the summer. We discovered 4 different campaigns using the bug against organizations in Greece, Moldova, Tunisia, Vietnam, and Pakistan. https://t.co/m1vxz51QMC
blog.google
TAG’s discovery of a 0-day exploit used to steal email data from international government organizations.
4
68
190
Government-backed actors exploiting WinRAR vulnerability @google
blog.google
Google's Threat Analysis Group analyzes recent state-sponsored campaigns exploiting the WinRAR vulnerability, CVE-2023-38831.
0
2
4
Félicitations à toute l’équipe de l’Institut Multidisciplinaire en Cybersécurité et Cyberrésience (ou IMC2 - vive les acronymes!) @polymtl @HEC_Montreal @UMontreal. Le Québec est un véritable hub Cyber 🌐 qui mérite de rayonner et votre travail y contribuera grandement.
1
1
2
In the spirit of "this talk could've been a tweet", I just pushed a button: #BinDiff is now open source. - Snapshot release, no major new functionality - Release binaries later today or tomorrow - This is my 20% and I won't we able to act on PRs until end of Q4 (OOO traveling)
8
340
1K
NEW @citizenlab report: Egyptian 🇪🇬 Presidential candidate hacked with #Predator spyware Working w/ @Google TAG, we discovered three #Apple zero days (hence emergency patches last night) Details 👇 https://t.co/ZyAluqT1Nm
citizenlab.ca
Between May and September 2023, former Egyptian MP Ahmed Eltantawy was targeted with Cytrox's Predator spyware via links sent on SMS and WhatsApp after Eltantawy publicly stated his plans to run for...
6
127
234
Great post by @maddiestone, patch now! 0-days exploited by commercial surveillance vendor in Egypt @google
https://t.co/7RyHhyRPXk.
blog.google
0
0
6
Active North Korean campaign targeting security researchers @google
blog.google
Threat Analysis Group shares findings on a new campaign by North Korean actors targeting security researchers.
0
0
3