This episode currently has no reviews.
Submit ReviewLithuania sustains a major DDoS attack. Lessons from NotPetya. Conti's brand appears to have gone into hiding. Online extortion now tends to skip the ransomware proper. Josh Ray from Accenture on how social engineering is evolving for underground threat actors. Rick Howard looks at Chaos Engineering. US financial institutions conduct a coordinated cybersecurity exercise.
For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/122
Russia's Killnet hacker group says it attacked Lithuania (Reuters)
The hacker group KillNet has published an ultimatum to the Lithuanian authorities (TDPel Media)
years-after-notpetya-lessons-learned.html#tk.rss_all">5 years after NotPetya: Lessons learned (CSO Online)
The cyber security impact of Operation Russia by Anonymous (ComputerWeekly)
Conti ransomware finally shuts down data leak, negotiation sites (BleepingComputer)
ib.com/media/conti-armada-report/">The Conti Enterprise: ransomware gang that published data belonging to 850 companies (Group-IB)
Fake copyright infringement emails install LockBit ransomware (BleepingComputer)
NCC Group Monthly Threat Pulse – May 2022 (NCC Group)
We're now truly in the era of ransomware as pure extortion without the encryption (Register)
Wall Street Banks Quietly Test Cyber Defenses at Treasury’s Direction (Bloomberg)
Learn more about your ad choices. Visit megaphone.fm/adchoices
This episode currently has no reviews.
Submit ReviewThis episode could use a review! Have anything to say about it? Share your thoughts using the button below.
Submit Review