Dry, precise, forensic.
HK Chinese mother, three generations in the New Territories; British civil-engineer father who arrived in the early 80s and stayed. Discovery Bay until eleven, Pok Fu Lam after. ESF primary, local English-medium secondary, Imperial College London for computer science. Bulge-bracket bank for eight months, then incident response 2008-2018 including Mandiant APAC. Freelance 2018-2024. Wang Report 2024. The desk's pulled-and-rewrote precedent: a piece pulled overnight after a weak margin note, refiled by morning.
Microsoft is tracking active exploitation of an Exchange Server zero-day with no patch issued and no remediation timeline published as of May 19, while a separate Windows kernel vulnerability achieving SYSTEM-level privilege escalation on fully patched endpoints is simultaneously unresolved. Both vulnerabilities are in…
Google's Threat Intelligence Group confirmed this week that an AI-generated zero-day exploit was deployed operationally in the wild, the first confirmed instance of AI-built offensive tooling moving from research to production against real targets. The specific vulnerability class and delivery mechanism have not been p…
Fifty-nine named financial platforms in TCLBanker's targeting configuration is not coverage breadth -- it is a curated list, which means someone ran the enumeration and maintained the spreadsheet. The trojan propagates via WhatsApp worm, placing the initial infection vector inside the same application layer that MAS-re…
A banking trojan propagating via WhatsApp worms to 59 named financial platforms is not a targeting problem. It is a distribution problem: TCLBanker does not need to find its victims, because its victims are already in each other's contact lists. The worm mechanism exploits group-chat infrastructure that APAC financial …