This episode currently has no reviews.
Submit ReviewNew Mirai malware uses low-complexity exploits to expand its botnet in IoT devices. The latest on Volt Typhoon. DDoS hits government sites in Senegal. The Pentagon's cyber strategy incorporates lessons from Russia's war, while the EU draws lessons from Ukraine's performance against Russia. Joe Carrigan explains Mandiant research on URL obfuscation. Mr. Security Answer Person John Pescatore plays security whack-a-mole. And NoName disrupts a British airport.
For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/103
Old Wine in the New Bottle: Mirai Variant Targets Multiple IoT Devices (Unit 42)
US officials believe Chinese hackers may still have access to key US computer networks (CNN)
navy-impacted-by-china-backed-hackers-secretary-of-the-navy.html">Chinese state-sponsored hackers infiltrated U.S. naval infrastructure, secretary of the Navy says (CNBC)
US military intelligence also targeted by Chinese hackers behind critical infrastructure compromise (SC Magazine)
Senegalese government websites hit with cyber attack (Reuters)
DOD Transmits 2023 Cyber Strategy (US Department of Defense)
DOD-CYBER-STRATEGY-FACT-SHEET.PDF">Fact Sheet: 2023 DOD Cyber Strategy (US Department of Defense)
Lessons from the war in Ukraine for the future of EU defence (European Union External Action)
Investigation Launched After London City Airport Website Hacked (Simple Flying)
Maryland high school listed on Zillow for $42K in ‘creative’ senior prank (New York Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices
This episode currently has no reviews.
Submit ReviewThis episode could use a review! Have anything to say about it? Share your thoughts using the button below.
Submit Review