This episode currently has no reviews.
Submit ReviewA New variant of Chae$ malware is described. A "Smishing Triad" impersonates postal services. A MinIO storage exploit reported. Okta warns of attackers seeking senior admin privileges. LockBit compromises a UK security contractor. DDoS takes down a German financial regulator's site. Infamous Chisel as GRU combat support. Joe Carrigan on Meta uncovering a Chinese influence effort. Our guest is Connie Stack, CEO of Next DLP, discussing data breach notification procedure. And please -PLEASE- remember to change your default passwords.
For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/169
Threat Profile: Chae$ 4 Malware (Morphisec)
"Smishing Triad" Targeted USPS and US Citizens for Data Theft (Resecurity)
triad-targeted-us-citizens.html">'Smishing Triad' Targeted USPS and US Citizens for Data Theft (Security Affairs)
New Attack Vector In The Cloud: Attackers caught exploiting Object Storage Services (Security Joes)
Hackers exploit MinIO storage system to breach corporate networks (BleepingComputer)
warns-of-social-engineering.html">Okta Warns of Social Engineering Attacks Targeting Super Administrator Privileges (The Hacker News)
More Okta customers trapped in Scattered Spider's web (Register)
Cross-Tenant Impersonation: Prevention and Detection (Okta Security)
Breaking: UK MoD attacked by LockBit (Computing)
German financial agency site disrupted by DDoS attack since Friday (BleepingComputer)
LogicMonitor customers hacked in reported ransomware attacks (BleepingComputer)
LogicMonitor customers hit by hackers, because of default passwords (TechCrunch)
Learn more about your ad choices. Visit megaphone.fm/adchoices
This episode currently has no reviews.
Submit ReviewThis episode could use a review! Have anything to say about it? Share your thoughts using the button below.
Submit Review