Friday Squid Blogging: Squid as Prey
There’s lots of video of squid as undersea predators. This is one of the few instances of squid as prey (from a deep submersible in the Pacific):
“We saw brittle stars capturing a squid from the water column while it was swimming. I didn’t know that was possible. And then there was a tussle among the brittle stars to see who got to have the squid,” says France.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read my blog posting guidelines here.
Ben A. • June 2, 2017 4:10 PM
EternalBlue Exploit Spreading Gh0st RAT, Nitol
http://threatpost.com/eternalblue-exploit-spreading-gh0st-rat-nitol/126052/
WikiLeaks Dumps CIA Patient Zero Windows Implant
https://arstechnica.com/security/2017/06/wikileaks-says-cias-pandemic-implant-turns-servers-into-malware-carriers/
http://threatpost.com/wikileaks-dumps-cia-patient-zero-windows-implant/126036/
Crowdfunding Effort to Buy ShadowBrokers Exploits Shuts Down
http://threatpost.com/crowdfunding-effort-to-buy-shadowbrokers-exploits-shuts-down/126010/
Trump administration approves tougher visa vetting, including social media checks
http://www.reuters.com/article/us-usa-immigration-visa-idUSKBN18R3F8
Patches Available for Linux Sudo Vulnerability
https://threatpost.com/patches-available-for-linux-sudo-vulnerability/125985/
OneLogin suffers breach—customer data said to be exposed, decrypted
https://arstechnica.com/security/2017/06/onelogin-data-breach-compromised-decrypted/
https://www.theregister.co.uk/2017/06/01/onelogin_breached/
Security company finds unsecured bucket of US military images on AWS
https://www.theregister.co.uk/2017/06/01/us_national_geospatial_intelligence_agency_leak/
https://arstechnica.com/security/2017/05/defense-contractor-stored-intelligence-data-in-amazon-cloud-unprotected/
On the Mood Among My Former Colleagues at the FBI
https://www.lawfareblog.com/mood-among-my-former-colleagues-fbi
Maybe Skip SHA-3
https://www.imperialviolet.org/2017/05/31/skipsha3.html
Maybe we shouldn’t skip SHA-3
https://www.cryptologie.net/article/400/maybe-dont-skip-sha-3/
Considering the Laptop Ban: Risks, Costs, Benefits, and Alternatives
http://www.heritage.org/sites/default/files/2017-06/IB4710_0.pdf