This episode currently has no reviews.
Submit ReviewAn APT41 subgroup uses new techniques to bypass security products. Iranian cyberespionage group MuddyWater is using Managed Service Provider tools. Wipers reappear in Ukrainian networks. Meta observes and disrupts the new NodeStealer malware campaign. The City of Dallas is moderately affected by a ransomware attack. My conversation with Karin Voodla, part of the US State Department’s Cyber fellowship program. Lesley Carhart from Dragos shares Real World Stories of Incident Response and Threat Intelligence. And there’s been an indictment and a takedown in a major dark web carder case.
For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/86
on-security-titans-earth-longzhi-returns-with-new-tricks.html">Attack on Security Titans: Earth Longzhi Returns With New Tricks (Trend Micro)
APT groups muddying the waters for MSPs (ESET)
Russian hackers use WinRAR to wipe Ukraine state agency’s data (BleepingComputer)
The malware threat landscape: NodeStealer, DuckTail, and more (Engineering at Meta)
Facebook disrupts new NodeStealer information-stealing malware (BleepingComputer)
NodeStealer Malware Targets Gmail, Outlook, Facebook Credentials (Decipher)
City of Dallas likely targeted in ransomware attack, city official says (Dallas News)
Cybercriminal Network Fueling the Global Stolen Credit Card Trade is Dismantled (US Department of Justice)
Secret Service, State Department Offer Up To $10 Million Dollar Reward For Information On Wanted International Fugitive (US Secret Service)
Police dismantles Try2Check credit card verifier used by dark web markets (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices
This episode currently has no reviews.
Submit ReviewThis episode could use a review! Have anything to say about it? Share your thoughts using the button below.
Submit Review