The SolarWinds hack is a fundamental challenge, but I went into work yesterday focused on the same basics.

This may be a game-changer for policy and industry, but the essentials are what make the difference here. It revalidates basic visibility and monitoring. Same as before.

I do not see complex networks as they exist today as bastions where you can close your eyes anywhere assuming you're fine.

What if an attacker just compromised Orion with an exploit like a normal attacker? Or pivoted into its memory space from elsewhere?

What's the difference?
You've got to have pretty incredible network segmentation and administrative tiering and insider threat program before this kind of attack is the biggest risk to worry about.

That doesn't mean it's not incredibly serious. But we're failing way worse than this every single day.
This is a hard dichotomy to talk about without sounding dismissive, but I think it's worth bringing up. Be ever more mindful, but keep our foot on the gas on our fundamentals without letting up.
I'm putting some thoughts together, but I can't get over the fact _they didn't even try to infect your network if it looked like you were watching the machine_.

Like, we should be screaming about this. They know this shit works against them.
Note: This is not saying FireEye and other networks did not have monitoring in place, but it may not have been with tools in their list of "nope I'm not even trying" list.

The fact they hit FireEye seems like a massive mistake since they have internal custom tooling.
Everyone is doom and gloom while I'm like Neil Patrick Harris in Starship Troopers where he puts his hand on the bug and says "they feel fear" and everybody cheers.
It's worth saying, cyber hygiene may be in refutation of buzzwords, but it's not the end-all-be-all of IT protection.
You do need top-flight systems and people at the edges looking for the exceptional vectors.
But I want to keep harping on these fundamentals for everybody else.

More from War

New mass missile test of Zolfaqar and Dezful BMs, as well as use of suicide drones and Shahed-161 UCAVs.

Reporter in video claimed the BMs have ability to maneuver "outside the atmosphere" but since these missiles are quasi-BMs and don't leave the atmosphere, they may have...


...gas thrusters for extra maneuvering ability at very high altitudes where their control surfaces have less use in the thin air. This will make it much harder for ABMs to intercept.

Now into the images; first up is the 8x8 TEL for Zolfaqar/Dezful missiles first seen in 2019. Proof here it's operational and being made in numbers


Another video showing a lot of very precise impacts from different angles


Here are 4 (visible) targets in close proximity with missiles (numbered according to target) going for each of their designated impact points. Incredible accuracy.

You May Also Like

Trending news of The Rock's daughter Simone Johnson's announcing her new Stage Name is breaking our Versus tool because "Wrestling Name" isn't in our database!

Here's the most useful #Factualist comparison pages #Thread 🧵


What is the difference between “pseudonym” and “stage name?”

Pseudonym means “a fictitious name (more literally, a false name), as those used by writers and movie stars,” while stage name is “the pseudonym of an entertainer.”

https://t.co/hT5XPkTepy #english #wiki #wikidiff

People also found this comparison helpful:

Alias #versus Stage Name: What’s the difference?

Alias means “another name; an assumed name,” while stage name means “the pseudonym of an entertainer.”

https://t.co/Kf7uVKekMd #Etymology #words

Another common #question:

What is the difference between “alias” and “pseudonym?”

As nouns alias means “another name; an assumed name,” while pseudonym means “a fictitious name (more literally, a false name), as those used by writers and movie

Here is a very basic #comparison: "Name versus Stage Name"

As #nouns, the difference is that name means “any nounal word or phrase which indicates a particular person, place, class, or thing,” but stage name means “the pseudonym of an
1. Project 1742 (EcoHealth/DTRA)
Risks of bat-borne zoonotic diseases in Western Asia

Duration: 24/10/2018-23 /10/2019

Funding: $71,500
@dgaytandzhieva
https://t.co/680CdD8uug


2. Bat Virus Database
Access to the database is limited only to those scientists participating in our ‘Bats and Coronaviruses’ project
Our intention is to eventually open up this database to the larger scientific community
https://t.co/mPn7b9HM48


3. EcoHealth Alliance & DTRA Asking for Trouble
One Health research project focused on characterizing bat diversity, bat coronavirus diversity and the risk of bat-borne zoonotic disease emergence in the region.
https://t.co/u6aUeWBGEN


4. Phelps, Olival, Epstein, Karesh - EcoHealth/DTRA


5, Methods and Expected Outcomes
(Unexpected Outcome = New Coronavirus Pandemic)