Articles

  • 5 days ago | news.bloombergtax.com | Jake Bleiberg

    XYour Choices Regarding Cookies and IdentifiersWe and our 150 third party partners use cookies and similar technologies ("Cookies") and hashed identifiers (e.g., a hashed version of your name, email address or phone number) to help us identify you on our site and third-party sites and to process certain information, such as your IP address and digital identifiers, to analyze site usage and provide you with relevant advertisements and content.

  • 5 days ago | news.bloombergtax.com | Dina Bass |Jeff Stone |Jake Bleiberg

    The clues that hackers had broken into a major US telecom were almost imperceptible — like tiny undulations in a river’s current. To the company, the ripples looked like normal traffic, according to a person familiar with the attack. But to threat analysts at Microsoft Corp., they pointed to the presence of intruders. At the time, there was no way of assessing the seriousness of the breach. Months of detective work lay ahead.

  • 5 days ago | financialpost.com | Jake Bleiberg

    Skip to ContentAdvertisement 1Investigators with the U.S. DOJ and the SEC have been probing a transaction between CrowdStrike and Carahsoft Technology to supply software to the IRSArticle contentU.S. prosecutors and regulators investigating a US$32 million deal between CrowdStrike Holdings Inc.

  • 5 days ago | news.bloomberglaw.com | Dina Bass |Jeff Stone |Jake Bleiberg

    The clues that hackers had broken into a major US telecom were almost imperceptible — like tiny undulations in a river’s current. To the company, the ripples looked like normal traffic, according to a person familiar with the attack. But to threat analysts at Microsoft Corp., they pointed to the presence of intruders. At the time, there was no way of assessing the seriousness of the breach. Months of detective work lay ahead.

  • 5 days ago | bloomberg.com | Dina Bass |Jeff Stone |Jake Bleiberg

    The clues that hackers had broken into a major US telecom were almost imperceptible — like tiny undulations in a river’s current. To the company, the ripples looked like normal traffic, according to a person familiar with the attack. But to threat analysts at Microsoft Corp., they pointed to the presence of intruders. At the time, there was no way of assessing the seriousness of the breach. Months of detective work lay ahead.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →

Coverage map

X (formerly Twitter)

Followers
4K
Tweets
30K
DMs Open
Yes
Jake Bleiberg
Jake Bleiberg @JZBleiberg
9 May 25

RT @ValOnTheBorder: Newark Mayor Ras Baraka was arrested Friday at an ICE Detention Center where he was protesting its opening, a federal p…

Jake Bleiberg
Jake Bleiberg @JZBleiberg
9 May 25

Microsoft sleuths noticed tiny ripples in a river of US telecom data. Government investigators flagged suspicious router configuration data downloads. Together, the puzzle pieces showed of an audacious cyberespionage campaign. W/@dinabass, @jeffstone500 https://t.co/kevGgx76Oy

Jake Bleiberg
Jake Bleiberg @JZBleiberg
9 May 25

RT @dinabass: We took an inside look at Microsoft's MSTIC threat intel center, the team that hunts nation-state hackers and helped the US g…