This episode currently has no reviews.
Submit ReviewCyberattack hits a Ukrainian energy provider. NCSC updates its guidance on preparing for a long-term Russian cyber campaign. Royal Army accounts are hijacked. A hacktivist group claims to have hit Iranian sites. A very very large database of PII is for sale on the dark web. Chase Snyder from ExtraHop has a look back at WannaCry, 5 years on. Ben Yelin examines the constitutionality of keyword search warrants. And a rogue employee makes off with bug reports.
For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/127
Russian hackers allegedly target Ukraine's biggest private energy firm (CNN)
Proruskí hackeri opäť útočili. Ďalšia významná spoločnosť hlási, že čelila kybernetickým útokom (Vosveteit.sk)
Preparing for the long haul: the cyber threat from Russia (NCSC)
Official British Army Twitter and YouTube accounts hijacked by NFT scammers (Hot for Security)
British army confirms breach of its Twitter and YouTube accounts (the Guardian)
British Army hit by cyberattack as Twitter and YouTube accounts hacked (The Telegraph)
Iranians' Remote Access to Banking Services Cut Off Over 'Cyber Attacks' (IranWire)
Hackers Claim Theft of Police Info in China’s Largest Data Leak (Bloomberg)
Hacker Selling Shanghai Police Database with Billions of Chinese Citizens Data (HackRead)
Hacker claims to have stolen 1 bln records of Chinese citizens from police (Reuters)
HackerOne disclosed on HackerOne: June 2022 Incident Report (HackerOne)
employee-caught-stealing.html">HackerOne Employee Caught Stealing Vulnerability Reports for Personal Gains (The Hacker News)
Rogue HackerOne employee steals bug reports to sell on the side (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices
This episode currently has no reviews.
Submit ReviewThis episode could use a review! Have anything to say about it? Share your thoughts using the button below.
Submit Review