This episode currently has no reviews.
Submit ReviewThe UN condemns Russia’s war in Ukraine. Ukraine’s cyber volunteers appear to be operating under the direction of Kyiv’s Ministry of Defense, and may be targeting Russian infrastructure. Belarusian cyber operators are phishing with stolen Ukrainian credentials in a cyberespionage campaign. Task Force KleptoCapture. Infusion pumps found vulnerable to cyberattack. TeaBot is found in the Play Store. TCP middlebox reflection. Dan Prince from Lancaster University on trustworthy autonomous systems. Our guest is John Shegerian from ERI on the security angle of e-recycling. And no more Harleys for Mr. Putin.
For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/42
Selected reading.
Cyber Realism in a Time of War
Russia's war spurs corporate exodus, exposes business risks
Using DDoS, DanaBot targets Ukrainian Ministry of Defense
Phishing campaign targets European officials assisting in refugee operations
Anonymous vs. Russia: Hackers Say Space Agency Breached, More Than 1,500 Websites Hit
Conti Ransomware Source Code Leaked
Ukrainian cyber resistance group targets Russian power grid, railways
Army of Cyber Hackers Rise Up to Back Ukraine
U.S. Officials Detail Efforts to Enforce Raft of New Russia Rules
TCP Middlebox Reflection: Coming to a DDoS Near You
android-banking-malware-spreads.html">TeaBot Android Banking Malware Spreads Again Through Google Play Store Apps
Infusion Pump Vulnerabilities: Common Security Gaps
Learn more about your ad choices. Visit megaphone.fm/adchoices
This episode currently has no reviews.
Submit ReviewThis episode could use a review! Have anything to say about it? Share your thoughts using the button below.
Submit Review