Drag0nR3b0rn's Avatar

Drag0nR3b0rn

@drag0nr3b0rn

An opinionated geek. Believes a better world is a possibility. Not afraid of revolutions. Willing to embrace chaos. A jack of many trades, a master of some.

43
Followers
147
Following
35
Posts
25.12.2023
Joined
Posts Following

Latest posts by Drag0nR3b0rn @drag0nr3b0rn

Anything specific you're looking for? Don't have an archive per se, but have a few of them collected.

25.02.2026 06:04 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Offensive Cyber Operations as Relief for Citizens Under Internet Blackout Precisely targeted cyber operations can remove blocking rules or disable network-blocking equipment.

5/5 Read the full article at www.lawfaremedia.org/article/offe...

16.09.2025 10:28 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Offensive Cyber Operations as Relief for Citizens Under Internet Blackout Precisely targeted cyber operations can remove blocking rules or disable network-blocking equipment.

4/5 Finally, I examine the Internet blackout in Iran during the June 2025 war with Israel as a case study to examine the efficacy, legitimacy, and possible implications of such an action.

16.09.2025 10:28 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Offensive Cyber Operations as Relief for Citizens Under Internet Blackout Precisely targeted cyber operations can remove blocking rules or disable network-blocking equipment.

3/5 To this effect, I adopt the third-party countermeasures approach and propose implementing such countermeasures in the form of offensive cyber operations to disrupt internet blackouts.

16.09.2025 10:28 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Offensive Cyber Operations as Relief for Citizens Under Internet Blackout Precisely targeted cyber operations can remove blocking rules or disable network-blocking equipment.

2/5 Specifically, I propose that the efforts made to date to mitigate Internet connectivity interference, such as censorship-resistant communication channels and Starlink's global Internet connectivity, are good to have but are not robust enough.

16.09.2025 10:28 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

A new @lawfaremedia.org piece where I argue that if internet access is to be considered a human right, then internet blackouts violate that right and a more robust response by the international community to combat state-implemented blackouts is required. 🧡/5

16.09.2025 10:28 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

@percepticon.bsky.social might also interest you ;-)

01.07.2025 17:18 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Also, I understand that it is currently being pitched around to other states (you need to finance the project somehow, I guess...<>). At least this is the context in which the Israeli media covers the remarks about cyber security cooperation during Germany's Dobrindt visit.

01.07.2025 14:18 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

When Israeli officials talk about "Iron Dome for cyberspace" - they don't aim for a dome, but mean a solution based on the logic deterrence by denial against cyber incidents, with "Cyber Dome" being a specific national active cyber defense solution by the INCD (the Israeli cyber defense agency).

01.07.2025 14:18 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

There is a bit of context that needs to be added here. "Domification" (i.e., calling defensive solutions "Iron Dome for X" or "Y Dome") is a quite obscure and funny facet of Israeli flavor of securitization.

01.07.2025 14:18 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Better to read as "An Israeli cybersecurity company providing WAF and DDoS mitigation solutions says its Israeli customers experienced a 700% increase in events detected by its products." Which is an Ok newswire, but way less sexy and newsworthy (even though it might be due high-profile customers).

16.06.2025 13:45 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

The #GGE norms, which weren't aimed at confidence and capacity building measures, narrowed what IHL/LOAC allowed - and thus were doomed from day one. Some will even claim they did some damage along the way. This doesn't mean there no place for "Cyber norms". Just not for this set of formal ones.

16.06.2025 13:41 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Does anyone else bicker with their LLM of choice? Mine are so bad. Today perplexity pissed me off so I made her read Arms & Influence then write β€œthere are only two types of deterrence” 100 times.

05.06.2025 22:41 πŸ‘ 3 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0

That looks interesting! Is any more info about the methodology behind those score available?

04.06.2025 09:38 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

From a short exploration I can already see how it can be useful for my own research, which makes me eager to explore it further and hope that more MDR vendors would follow suit and make the data underlying their yearly report openly available. 6/6

08.04.2025 13:28 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

3/6 This thread (and report), on the other hand, suggest that at least as far as ransomware is concerned it might indeed be a quite simple technical problem - that we should focus our resilience policy efforts on finding proactive technical solution for.

08.04.2025 13:28 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

2/6 It makes it seems that while many cyber security thinkers moved from treating it as a technical problem, i.e., something that should be fixed after the fact, to treating it as a political issue.

08.04.2025 13:28 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
Kevin Beaumont (@GossiTheDog@cyberplace.social) Attached: 1 image Compromised credentials continue to drive a majority of incidents. Why? home PCs and infostealers. MS Recall got the shite kicked out of it because it would have been a disaster...

Still hadn't the time to properly read the @sophossecurity.bsky.social Active Adversary Report, but I find this thread - cyberplace.social/@GossiTheDog... - by @GossiTheDog.cyberplace.social.ap.brid.gy highly interesting. 1/🧡

08.04.2025 13:28 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

5/6 Finally, as a researcher engaged with quantitative research into cyber security, it is great to see some of the data underlying the report publicly available (github.com/sophoslabs/A...), even though, unfortunately, only the data for the latest report is available.

08.04.2025 13:28 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

4/6 The data hints that better default configurations, especially enabling MFA and reducing exposed services, brute-force protection, and better internet facing appliances patching mechanisms might go a long way for improving cyber resilience against Ransomware attacks and generally.

08.04.2025 13:28 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

The 21st century has gone from
jump the shark to tariff the penguin

03.04.2025 16:14 πŸ‘ 51 πŸ” 5 πŸ’¬ 2 πŸ“Œ 0
The β€˜Pacific Rim’ Campaign: Corporate Norm Entrepreneurship and Active Cyber Defense Sophos’s account of its recent active cyber defense campaign can help shape norms of β€œresponsible behavior” in cyberspace.

Read the full article at lawfaremedia.org/article/the-... 5/5

18.03.2025 15:57 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

4/5 Finally, we draw some lessons on the scope and expected efficacy of private-sector CCO/ACD, extending beyond the common "hacking back" debate, norms of responsible behavior in cyber operations, and the importance of communications for fostering both.

18.03.2025 15:57 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

3/5 We call out significant practices evident and language used to juxtapose with some previously published examinations and attempts to define responsible behavior in cyber operations and industry practices.

18.03.2025 15:57 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

2/5 We do so by analyzing the texts published by Sophos, especially the blog posts by Sophos's CEO Joe Levy and CISO @rossmckerchar.bsky.social

18.03.2025 15:57 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

In a new paper with @joedevanny.bsky.social for @lawfare.bsky.social, we use the "Pacific Rim" campaign by @sophossecurity.bsky.social as an opportunity to further the understanding of norms of responsible behavior in cyberspace and counter-cyber operations (CCO)/active cyber defense (ACD).
🧡/5

18.03.2025 15:57 πŸ‘ 3 πŸ” 3 πŸ’¬ 1 πŸ“Œ 0

Living in Israel - there is no need to imagine any of this. Though a difference on the order of magnitude - all those experiences are just too common. This is what makes the lack of explicit and overt Israeli support of Ukraine ever more shameful.

24.02.2025 13:27 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

For more details (and there is quite a bit of those, despite Ariel's best efforts to control my fondness of those), read the full analysis at - www.inss.org.il/publication/...
6/6

18.02.2025 19:46 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

5/6 Instead, we call for focus on implementing a sustainable sovereign datacenter infrastructure build-out and on improving the Israel-USA technological cooperation in a fashion that will enable Israel to be considered a Tier 1 country vis-a-vis the US AI diffusion rules.

18.02.2025 19:46 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

4/6 In the conclusion of our analysis we call on the Israeli govt to avoid getting intoxicated by the promise of "cheap Chinese pathways to AI leadership".

18.02.2025 19:46 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0