Podcasts about trickbot

  • 120PODCASTS
  • 310EPISODES
  • 30mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Jun 11, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about trickbot

Latest podcast episodes about trickbot

OSINT Studio
Recherchen zu Deppen und russischen Hackern - der schmale Grat zwischen OSINT und Doxing

OSINT Studio

Play Episode Listen Later Jun 11, 2024 48:21


In dieser Folge geht es um die Jagd nach einem Hacker und die spektakuläre Operation Endgame. Außerdem wird über die Hetzjagd nach einem Sylt-Video und eine beeindruckende Geolokalisierungsanalyse von Benjamin Strick berichtet. Samuel und Matthias beleuchten wichtige ethische und rechtliche Aspekte von OSINT und deren Einfluss auf Ermittlungen. Weitere spannende Themen dieser Folge sind das Management digitaler Präsenzen, die Analyse von Satellitenbildern und der Umgang mit Desinformation. Wie immer wird betont, wie wichtig kritisches Denken und die Überprüfung von Informationen sind, um Fehl- und Desinformation wirksam zu begegnen. Links: https://www.linkedin.com/pulse/gebt-mir-die-namen-meiner-feinde-lockbitsupp-martin-haunschmid-s6orf/ https://www.troyhunt.com/operation-endgame/ https://github.com/SofianeHamlaoui/Conti-Clear/blob/main/TrickBot.csv https://www.bka.de/SiteGlobals/Forms/Suche/Fahndungsliste_Personenfahndung_Formular.html?nn=26874 https://www1.wdr.de/nachrichten/rassismus-sylt-konsequenzen-medienrecht-100.html https://medium.com/@bendobrown/geolocating-a-gang-lord-wanted-by-the-fbi-an-osint-explainer-68f9b2f020be https://netzpolitik.org/2024/neue-tracking-firma-utiq-wie-telekom-o2-und-vodafone-im-datengeschaeft-mitmischen/ https://www.stiftung-nv.de/de/publikation/nachrichtendienstliche-datenkaeufe https://support.microsoft.com/en-us/windows/retrace-your-steps-with-recall-aa03f8a0-a78b-4b3e-b0a1-2eb8ac48701c https://restoreprivacy.com/protonmail-discloses-user-data-leading-to-arrest-in-spain/ https://inti.io/p/when-privacy-expires-how-i-got-access https://www.nytimes.com/2024/05/10/world/europe/russia-nuclear-weapons-belarus.html https://www.linkedin.com/pulse/hubschrauberabsturz-von-irans-raisi-wird-zum-regierung-ben-heubl-l8u0f/ https://www.lto.de/recht/nachrichten/n/olg-duesseldorf-urteil-spionage-russland-bundeswehr-soldat-agententaetigkeit/ https://akademie.dw.com/en/managing-your-mental-health-when-dealing-with-disinformation/av-68467162 https://www.youtube.com/playlist?list=PLWRGkKg3JC1hErlGmjfhrTZ3XpS37WrRj Feedback & Anregungen an ⁠⁠⁠⁠⁠⁠⁠⁠⁠feedback@osint.studio⁠⁠⁠⁠⁠⁠⁠⁠ © 2024 Samuel Lolagar & Matthias Wilson

The Daily Decrypt - Cyber News and Discussions
January 30 – Outlook Vulnerability, Raptor Breach, and TrickBot Justice – CyberSecurity News

The Daily Decrypt - Cyber News and Discussions

Play Episode Listen Later Jan 30, 2024 14:35


In this episode of "The Daily Decrypt," host offsetkeyz dives into the latest cybersecurity stories that matter. Outlook Vulnerability - We begin with an in-depth look at a significant vulnerability in Microsoft Outlook (CVE-2023-35636), which could allow attackers to access NTLM hashed passwords. Learn about the nature of this phishing attack and how to protect yourself. Read more. Raptor Technologies Breach - Discover the details behind the major data breach at Raptor Technologies, affecting educational institutions. We discuss the implications of this breach and its impact on school safety. Read more. TrickBot Developer Sentenced - Finally, we cover the sentencing of the TrickBot malware developer, highlighting a rare instance of justice in the cybercrime world. Read more. Stay informed and understand the complexities of cyber safety with "The Daily Decrypt." Tune in for concise, engaging, and informative discussions on the ever-evolving world of cybersecurity. Remember to follow us on Twitter @DailyDecryptPod for regular updates and news snippets! OffsetKeyz: Good morning, everyone. We now have a Twitter account, so if you haven't yet, go follow us at Daily Decrypt Pod. This will give you news updates even before they appear on the podcast. As news develops, we'll keep you informed there. Today, we're discussing three stories. The first is an Outlook vulnerability, which will seem familiar if you listened to our recent episode about LLMNR. It was released last month and is quite significant. We'll also talk about a major breach at Raptor Technologies, a security provider for educational institutions like middle schools and high schools. Finally, we'll briefly cover the sentencing of the main developer of the Trickbot malware to five years in jail. In this podcast, we aim to start with simpler topics for a broader audience and gradually delve into more technical aspects, making it accessible for everyone. OffsetKeyz: Microsoft's Patch Tuesday recently disclosed a significant vulnerability in Microsoft Outlook. Discovered by researchers, this vulnerability in Outlook's calendar sharing function could potentially allow attackers to access NT LAN Manager or NTLM hashed passwords when a user opens a specifically crafted file. The attackers crafted headers to expose an NTLM hash during authentication, which is essentially your password in a hashed form. This type of phishing attack is quite targeted, aiming specifically at Outlook users. The breach's nature and scale are concerning, given the widespread use of the older NTLM protocol. Microsoft plans to phase it out in Windows 11 for the more secure Kerberos protocol. The takeaway here is to be cautious with links, especially in Outlook. Verify the source and be aware of deceptive practices like substituting characters. Remember, they're getting the NTLM hash, not the password directly, and this hash needs to be cracked. Using a strong, unique password, preferably generated by a password manager, can significantly mitigate this risk. OffsetKeyz: Next, we have a major breach at Raptor Technologies. This breach is particularly concerning as it involves educational institutions, which often lack robust security resources. Raptor Technologies, a US-based school safety software provider, experienced a breach that exposed about 4 million records, as reported by Jeremiah Fowler. These records included detailed school incident response plans, layouts, and information on infrastructure challenges like malfunctioning cameras and security gaps. This data leak is a serious concern, as it includes blueprints and security response strategies, potentially opening doors to physical threats. The breach underlines the importance of cybersecurity in the education sector and the risks associated with third-party providers. OffsetKeyz: Lastly, the developer behind Trickbot has been sentenced to 64 months in prison. This is a rare occurrence in the cybersecurity world due to the anonymity and complexities involved in tracking cybercriminals. The developer was extradited from South Korea, showcasing the importance of international cooperation in tackling cybercrime. Trickbot, a banking Trojan, has been a significant threat, distributed through phishing emails or malicious websites. It stealthily harvests sensitive information and can deploy ransomware. The sentencing of the developer is a positive step in combating cybercrime and serves as a deterrent for similar activities. OffsetKeyz: That's all for today. I hope you enjoy the new format. We're aiming for a balance between simplicity and in-depth discussion. Feel free to leave comments, feedback, or tweet us with your thoughts. Stay tuned for our upcoming bonus episode, where we'll discuss how to break into cybersecurity, perfect for those seeking a career change or IT professionals wanting to specialize in cybersecurity. Thanks for listening! Thanks to Jered Jones for providing the music for this episode. Find him on Spotify here: https://open.spotify.com/artist/37xLl4KR8hJ5jBuS8zYjQN?si=W75mgw68SsmCb7Zfu5ESeg

The CyberWire
A new purchase is cause for a call out.

The CyberWire

Play Episode Listen Later Jan 26, 2024 32:17 Very Popular


Senator Wyden calls out the NSA for purchasing American's internet records. Senators look to add IT and ICS environments to federal employee cyber competitions. The FTC asks big tech about their investments in AI. Turns out the GSA bought a bunch of Chinese security cameras. Akira ransomware claims a breach of Lush cosmetics. ESET reports on the Blackwood cyberespionage group. Wired looks at Predatory Sparrow. The U.S. stands firm on the United Nations Cybercrime Treaty. Our guest is Tony Surak, CMO & Operating Partner from DataTribe, with insights on the state of venture capital in cyber. And a Trickbot gang member will be doing some time. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Guest Tony Surak from DataTribe joins us to share his take on the state of the VC cyber market. Selected Reading Wyden Releases Documents Confirming the NSA Buys Americans' Internet Browsing Records; Calls on Intelligence Community to Stop Buying U.S. Data Obtained Unlawfully From Data Brokers, Violating Recent FTC Order  Senate Committee debuts bipartisan bill to add OT, ICS environments to federal employee cyber competition  FTC officially asks Big Tech about their AI deals | Cybernews  GSA Sparks Security Fears After Buying Risky Chinese Cameras Akira ransomware gang says it stole passport scans from Lush • The Register Elusive Chinese Cyberspy Group Hijacks Software Updates to Deliver Malware - SecurityWeek How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar | WIRED On eve of final negotiations, US says consensus growing around ‘narrow' UN cybercrime treaty Trickbot malware developer sentenced to 5 years behind bars • The Register Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Paul's Security Weekly
Veolia, FeverWarn, SystemK, Fortra, GitLab, Ring, Trickbot, Aaran Leyland, and More - SWN #357

Paul's Security Weekly

Play Episode Listen Later Jan 26, 2024 31:50


Visa RB Cash AP Formula 1 Team, Veolia, FeverWarn, SystemK, Fortra, GitLab, Ring, Trickbot, Aaran Leyland, and More News on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-357

Paul's Security Weekly TV
Veolia, FeverWarn, SystemK, Fortra, GitLab, Ring, Trickbot, Aaran Leyland, and More - SWN #357

Paul's Security Weekly TV

Play Episode Listen Later Jan 26, 2024 32:01


Visa RB Cash AP Formula 1 Team, Veolia, FeverWarn, SystemK, Fortra, GitLab, Ring, Trickbot, Aaran Leyland, and More News on the Security Weekly News. Show Notes: https://securityweekly.com/swn-357

Hack Naked News (Audio)
Veolia, FeverWarn, SystemK, Fortra, GitLab, Ring, Trickbot, Aaran Leyland, and More - SWN #357

Hack Naked News (Audio)

Play Episode Listen Later Jan 26, 2024 31:50


Visa RB Cash AP Formula 1 Team, Veolia, FeverWarn, SystemK, Fortra, GitLab, Ring, Trickbot, Aaran Leyland, and More News on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-357

Hack Naked News (Video)
Veolia, FeverWarn, SystemK, Fortra, GitLab, Ring, Trickbot, Aaran Leyland, and More - SWN #357

Hack Naked News (Video)

Play Episode Listen Later Jan 26, 2024 32:01


Visa RB Cash AP Formula 1 Team, Veolia, FeverWarn, SystemK, Fortra, GitLab, Ring, Trickbot, Aaran Leyland, and More News on the Security Weekly News. Show Notes: https://securityweekly.com/swn-357

Talion Threat Set Radio
Threat Bulletin #253

Talion Threat Set Radio

Play Episode Listen Later Jan 26, 2024 6:16


Microsoft confirms details of recent Russian compromise.Kasseika joins ransomware groups performing BYOVD attacks.Trickbot browser injection developer jailed.

The Cyberlaw Podcast
Do AI Trust and Safety Measures Deserve to Fail?

The Cyberlaw Podcast

Play Episode Listen Later Dec 12, 2023 77:35


It's the last and probably longest Cyberlaw Podcast episode of 2023. To lead off, Megan Stifel takes us through a batch of stories about ways that AI, and especially AI trust and safety, manage to look remarkably fallible. Anthropic released a paper showing that race, gender, and age discrimination by AI models was real but could be dramatically reduced by instructing The Model to “really, really, really” avoid such discrimination. (Buried in the paper was the fact that the original, severe AI bias disfavored older white men, as did the residual bias that asking nicely didn't eliminate.) Bottom line from Anthropic seems to be, “Our technology is a really cool toy, but don't use if for anything that matters.”) In keeping with that theme, Google's highly touted OpenAI competitor Gemini was release to mixed reviews when the model couldn't correctly identify recent Oscar winners or a French word with six letters (it offered “amour”). The good news was for people who hate AI's ham-handed political correctness; it turns out you can ask another AI model how to jailbreak your model, a request that can make the task go 25 times faster. This could be the week that determines the fate of FISA section 702, David Kris reports. It looks as though two bills will go to the House floor, and only one will survive. Judiciary's bill is a grudging renewal of 702 for a mere three years, full of procedures designed to cripple the program. The intelligence committee's bill beats the FBI around the head and shoulders but preserves the core of 702. David and I explore the “queen of the hill” procedure that will allow members to vote for either bill, both, or none, and will send to the Senate the version that gets the most votes.  Gus Hurwitz looks at the FTC's last-ditch appeal to stop the Microsoft-Activision merger. The best case, he suspects, is that the appeal will be rejected without actually repudiating the pet theories of the FTC's hipster antitrust lawyers. Megan and I examine the latest HHS proposal to impose new cybersecurity requirements on hospitals. David, meanwhile, looks for possible motivations behind the FBI's procedures for companies who want help in delaying SEC cyber incident disclosures. Then Megan and I consider the tough new UK rules for establishing the age of online porn consumers. I think they'll hurt Pornhub's litigation campaign against states trying to regulate children's access to porn sites.  The race to 5G is over, Gus notes, and it looks like even the winners lost. Faced with the threat of Chinese 5G domination and an industry sure that 5G was the key to the future, many companies and countries devoted massive investments to the technology, but it's now widely deployed and no one sees much benefit. There is more than one lesson here for industrial policy and the unpredictable way technologies disseminate. 23andme gets some time in the barrel, with Megan and I both dissing its “lawyerly” response to a history of data breaches – namely changing its terms of service it harder for customers to sue for data breaches. Gus reminds us that the Biden FCC only took office in that last month or two, and it is determined to catch up with the FTC in advancing foolish and doomed regulatory initiatives. This week's example, remarkably, isn't net neutrality. It's worse. The Commission is building a sweeping regulatory structure on an obscure section of the 2021 infrastructure act that calls for the FCC to “facilitate equal access to broadband internet access service...”: Think we're hyperventilating? Read Commissioner Brendan Carr's eloquent takedown of the whole initiative.  Senator Ron Wyden (D-OR) has a been in his bonnet over government access to smartphone notifications. Megan and I do our best to understand his concern and how seriously to take it.  Wrapping up, Gus offers a quick take on Meta's broadening attack on the constitutionality of the FTC's current structure. David takes satisfaction from the Justice Department's patient and successful pursuit of Russian Hacker Vladimir Dunaev for his role in creating TrickBot. Gus notes that South Korea's law imposing internet costs on content providers is no match for the law of supply and demand. Finally, in quick hits we cover:  The guilty plea of the founder of a cryptocurrency exchange accused of money laundering. Rumors that the ALPHV ransomware site has been taken down by law enforcement IBM's long-term quantum computing research milestones The UK's antitrust throat-clearing about the OpenAI-Microsoft tie-up And Europe's low-on-details announcement of a deal on the world's first comprehensive AI rules  Download 485th Episode (mp3) You can subscribe to The Cyberlaw Podcast using iTunes, Google Play, Spotify, Pocket Casts, or our RSS feed. As always, The Cyberlaw Podcast is open to feedback. Be sure to engage with @stewartbaker on Twitter. Send your questions, comments, and suggestions for topics or interviewees to CyberlawPodcast@gmail.com. Remember: If your suggested guest appears on the show, we will send you a highly coveted Cyberlaw Podcast mug! The views expressed in this podcast are those of the speakers and do not reflect the opinions of their institutions, clients, friends, families, or pets.

The Cyberlaw Podcast
Do AI Trust and Safety Measures Deserve to Fail?

The Cyberlaw Podcast

Play Episode Listen Later Dec 12, 2023 77:35


It's the last and probably longest Cyberlaw Podcast episode of 2023. To lead off, Megan Stifel takes us through a batch of stories about ways that AI, and especially AI trust and safety, manage to look remarkably fallible. Anthropic released a paper showing that race, gender, and age discrimination by AI models was real but could be dramatically reduced by instructing The Model to “really, really, really” avoid such discrimination. (Buried in the paper was the fact that the original, severe AI bias disfavored older white men, as did the residual bias that asking nicely didn't eliminate.) Bottom line from Anthropic seems to be, “Our technology is a really cool toy, but don't use if for anything that matters.”) In keeping with that theme, Google's highly touted OpenAI competitor Gemini was release to mixed reviews when the model couldn't correctly identify recent Oscar winners or a French word with six letters (it offered “amour”). The good news was for people who hate AI's ham-handed political correctness; it turns out you can ask another AI model how to jailbreak your model, a request that can make the task go 25 times faster. This could be the week that determines the fate of FISA section 702, David Kris reports. It looks as though two bills will go to the House floor, and only one will survive. Judiciary's bill is a grudging renewal of 702 for a mere three years, full of procedures designed to cripple the program. The intelligence committee's bill beats the FBI around the head and shoulders but preserves the core of 702. David and I explore the “queen of the hill” procedure that will allow members to vote for either bill, both, or none, and will send to the Senate the version that gets the most votes.  Gus Hurwitz looks at the FTC's last-ditch appeal to stop the Microsoft-Activision merger. The best case, he suspects, is that the appeal will be rejected without actually repudiating the pet theories of the FTC's hipster antitrust lawyers. Megan and I examine the latest HHS proposal to impose new cybersecurity requirements on hospitals. David, meanwhile, looks for possible motivations behind the FBI's procedures for companies who want help in delaying SEC cyber incident disclosures. Then Megan and I consider the tough new UK rules for establishing the age of online porn consumers. I think they'll hurt Pornhub's litigation campaign against states trying to regulate children's access to porn sites.  The race to 5G is over, Gus notes, and it looks like even the winners lost. Faced with the threat of Chinese 5G domination and an industry sure that 5G was the key to the future, many companies and countries devoted massive investments to the technology, but it's now widely deployed and no one sees much benefit. There is more than one lesson here for industrial policy and the unpredictable way technologies disseminate. 23andme gets some time in the barrel, with Megan and I both dissing its “lawyerly” response to a history of data breaches – namely changing its terms of service it harder for customers to sue for data breaches. Gus reminds us that the Biden FCC only took office in that last month or two, and it is determined to catch up with the FTC in advancing foolish and doomed regulatory initiatives. This week's example, remarkably, isn't net neutrality. It's worse. The Commission is building a sweeping regulatory structure on an obscure section of the 2021 infrastructure act that calls for the FCC to “facilitate equal access to broadband internet access service...”: Think we're hyperventilating? Read Commissioner Brendan Carr's eloquent takedown of the whole initiative.  Senator Ron Wyden (D-OR) has a been in his bonnet over government access to smartphone notifications. Megan and I do our best to understand his concern and how seriously to take it.  Wrapping up, Gus offers a quick take on Meta's broadening attack on the constitutionality of the FTC's current structure. David takes satisfaction from the Justice Department's patient and successful pursuit of Russian Hacker Vladimir Dunaev for his role in creating TrickBot. Gus notes that South Korea's law imposing internet costs on content providers is no match for the law of supply and demand. Finally, in quick hits we cover:  The guilty plea of the founder of a cryptocurrency exchange accused of money laundering. Rumors that the ALPHV ransomware site has been taken down by law enforcement IBM's long-term quantum computing research milestones The UK's antitrust throat-clearing about the OpenAI-Microsoft tie-up And Europe's low-on-details announcement of a deal on the world's first comprehensive AI rules  Download 485th Episode (mp3) You can subscribe to The Cyberlaw Podcast using iTunes, Google Play, Spotify, Pocket Casts, or our RSS feed. As always, The Cyberlaw Podcast is open to feedback. Be sure to engage with @stewartbaker on Twitter. Send your questions, comments, and suggestions for topics or interviewees to CyberlawPodcast@gmail.com. Remember: If your suggested guest appears on the show, we will send you a highly coveted Cyberlaw Podcast mug! The views expressed in this podcast are those of the speakers and do not reflect the opinions of their institutions, clients, friends, families, or pets.

Cyber and Technology with Mike
04 December 2023 Cyber and Tech News

Cyber and Technology with Mike

Play Episode Listen Later Dec 4, 2023 8:12


In today's podcast we cover four crucial cyber and technology topics, including: 1.        British criminal faces 20 years in U.S. prison for cyber crimes 2.        Russian man pleads guilty to cybercrime via trickbot in Ohio 3.        U.S., international partners sanction crypto laundering service 4.        Japanese space agency hit by cyber attack   I'd love feedback, feel free to send your comments and feedback to  | cyberandtechwithmike@gmail.com

WIRED Security: News, Advice, and More
US and UK Mount Aggressive Crackdown on Trickbot and Conti Ransomware Gangs

WIRED Security: News, Advice, and More

Play Episode Listen Later Sep 21, 2023 5:32


Authorities sanctioned 11 alleged members of the cybercriminal groups, while the US Justice Department unsealed three federal indictments against nine people accused of being members. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoices

Cyber and Technology with Mike
11 September 2023 Cyber and Tech News

Cyber and Technology with Mike

Play Episode Listen Later Sep 11, 2023 9:00


In today's podcast we cover four crucial cyber and technology topics, including: 1.        Cisco warns users of ongoing campaign against ASA and FTD products 2.        Ragnar claims attack against Israeli hospital 3.        U.S. says nation states abusing Zoho, Forinet in attack against Aerospace 4.        U.S. and U.K. sanction 11 in connection to Trickbot  I'd love feedback, feel free to send your comments and feedback to  | cyberandtechwithmike@gmail.com

Decipher Security Podcast
Dennis and Lindsey Chop it up

Decipher Security Podcast

Play Episode Listen Later Sep 8, 2023 16:37


Decipher editors Dennis Fisher and Lindsey O'Donnell-Welch break down a busy news week, including Microsoft's revelations about the theft of its signing key, the Trickbot group sanctions, and some new Apple iOS zero days.

Kurz informiert – die IT-News des Tages von heise online
Kurz informiert vom 08.09.2023 by heise online

Kurz informiert – die IT-News des Tages von heise online

Play Episode Listen Later Sep 8, 2023


Heute mit: KI an Schulen, Trickbot, China, Roku

@BEERISAC: CPS/ICS Security Podcast Playlist

Podcast: Industrial Cyber Weekly RoundupEpisode: Week 7.2023Pub date: 2023-02-17This week we have a potential solution for the ICS security professional shortage, a new member of the IC Hall of fame, Trickbot, Chernovite, WIP26, and moreThe podcast and artwork embedded on this page are from industrialcyber.co, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

ShadowTalk by Digital Shadows
Weekly: Trickbot/Conti Sanctions, OneNote Documents, and NATO DDoS Attacks

ShadowTalk by Digital Shadows

Play Episode Listen Later Feb 17, 2023 29:41


This week's ShadowTalk podcast covers the latest in the Trickbot/Conti Sanctions, OneNote Documents, NATO DDoS Attacks. Get this week's intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-17-feb ***Resources from this week's podcast*** Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don't forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.

WIRED Security: News, Advice, and More
Russia's Ransomware Gangs Are Being Named and Shamed

WIRED Security: News, Advice, and More

Play Episode Listen Later Feb 17, 2023 7:37


Members of the Trickbot and Conti cybercrime gangs have been sanctioned in an unprecedented wave of action against the country's hackers.

WIRED Security: News, Advice, and More
Russia's Ransomware Gangs Are Being Named and Shamed

WIRED Security: News, Advice, and More

Play Episode Listen Later Feb 17, 2023 7:37


Members of the Trickbot and Conti cybercrime gangs have been sanctioned in an unprecedented wave of action against the country's hackers.

Risky Business
Risky Business #695 -- North Korea is ransomwaring hospitals, Russia to make "patriotic" hacking legal

Risky Business

Play Episode Listen Later Feb 15, 2023 60:00


On this week's show Patrick Gray and Adam Boileau discuss the week's security news, including: North Korea is ransomwaring hospitals with homegrown and Russian strains Russia proposes law greenlighting “patriotic hacks” It's 702 renewal time… again CISA releases ESXiArgs recovery script (yay!) UK mulls crimephone ban Much, much more This week's show is brought to you by Thinkst Canary. Haroon Meer is this week's sponsor guest and joins us to talk about Thinkst's latest release: the credit card canary. Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that's your thing. Show notes North Korean hackers extort health care organizations to fund further cyberattacks, US and South Korea say | CNN Politics Risky Biz News: US and UK sanction seven Trickbot members United States and United Kingdom Sanction Members of Russia-Based Trickbot Cybercrime Gang | U.S. Department of the Treasury Risky Biz News: Russia wants to absolve patriotic hackers from any criminal liability The FBI's Most Controversial Surveillance Tool Is Under Threat | WIRED Meet the Creator of North Korea's Favorite Crypto Privacy Service | WIRED CISA publishes recovery script for ESXiArgs ransomware as Florida courts, universities reel - The Record from Recorded Future News decrypt your crypted files in ESXi servers affected by CVE-2020-3992 / CryptoLocker attack Tonga is the latest Pacific Island nation hit with ransomware - The Record from Recorded Future News UK Proposes Making the Sale and Possession of Encrypted Phones Illegal UK High Court allows Bahraini activists to sue government over spyware - The Record from Recorded Future News Russian cybersecurity expert convicted of charges in $90M hack-to-trade case | CyberScoop Deepfake 'news anchors' appear in pro-China footage on social media, research group says - ABC News Geotargeting tools are allowing phishing campaigns to home in on potential victims - The Record from Recorded Future News This week's Reddit breach shows company's security is (still) woefully inadequate | Ars Technica Namecheap denies system breach after email service used to spread phishing scams - The Record from Recorded Future News Mysterious leak of Booking.com reservation data is being used to scam customers | Ars Technica DOM XSS vulnerability in Gartner Peer Insights widget patched | The Daily Swig Dota 2 Under Attack: How a V8 Bug Was Exploited in the Game - Avast Threat Labs OAuth ‘masterclass' crowned top web hacking technique of 2022 | The Daily Swig New XSS Hunter host Truffle Security faces privacy backlash | The Daily Swig 'No evidence of malicious access,' Toyota says about serious bug exploited by outside researcher - The Record from Recorded Future News A year after outcry, IRS still doesn't offer taxpayers alternative to ID.me | CyberScoop

Risky Business
Risky Business #695 -- North Korea is ransomwaring hospitals, Russia to make "patriotic" hacking legal

Risky Business

Play Episode Listen Later Feb 15, 2023


On this week's show Patrick Gray and Adam Boileau discuss the week's security news, including: North Korea is ransomwaring hospitals with homegrown and Russian strains Russia proposes law greenlighting “patriotic hacks” It's 702 renewal time… again CISA releases ESXiArgs recovery script (yay!) UK mulls crimephone ban Much, much more This week's show is brought to you by Thinkst Canary. Haroon Meer is this week's sponsor guest and joins us to talk about Thinkst's latest release: the credit card canary. Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that's your thing. Show notes North Korean hackers extort health care organizations to fund further cyberattacks, US and South Korea say | CNN Politics Risky Biz News: US and UK sanction seven Trickbot members United States and United Kingdom Sanction Members of Russia-Based Trickbot Cybercrime Gang | U.S. Department of the Treasury Risky Biz News: Russia wants to absolve patriotic hackers from any criminal liability The FBI's Most Controversial Surveillance Tool Is Under Threat | WIRED Meet the Creator of North Korea's Favorite Crypto Privacy Service | WIRED CISA publishes recovery script for ESXiArgs ransomware as Florida courts, universities reel - The Record from Recorded Future News decrypt your crypted files in ESXi servers affected by CVE-2020-3992 / CryptoLocker attack Tonga is the latest Pacific Island nation hit with ransomware - The Record from Recorded Future News UK Proposes Making the Sale and Possession of Encrypted Phones Illegal UK High Court allows Bahraini activists to sue government over spyware - The Record from Recorded Future News Russian cybersecurity expert convicted of charges in $90M hack-to-trade case | CyberScoop Deepfake 'news anchors' appear in pro-China footage on social media, research group says - ABC News Geotargeting tools are allowing phishing campaigns to home in on potential victims - The Record from Recorded Future News This week's Reddit breach shows company's security is (still) woefully inadequate | Ars Technica Namecheap denies system breach after email service used to spread phishing scams - The Record from Recorded Future News Mysterious leak of Booking.com reservation data is being used to scam customers | Ars Technica DOM XSS vulnerability in Gartner Peer Insights widget patched | The Daily Swig Dota 2 Under Attack: How a V8 Bug Was Exploited in the Game - Avast Threat Labs OAuth ‘masterclass' crowned top web hacking technique of 2022 | The Daily Swig New XSS Hunter host Truffle Security faces privacy backlash | The Daily Swig 'No evidence of malicious access,' Toyota says about serious bug exploited by outside researcher - The Record from Recorded Future News A year after outcry, IRS still doesn't offer taxpayers alternative to ID.me | CyberScoop

The Cyberlaw Podcast
Who Needs Hackers When You Have Balloons?

The Cyberlaw Podcast

Play Episode Listen Later Feb 14, 2023 53:07


The latest episode of The Cyberlaw Podcast gets a bit carried away with the China spy balloon saga. Guest host Brian Fleming, along with guests Gus Hurwitz, Nate Jones, and Paul Rosenzweig, share insights (and bad puns) about the latest reporting on the electronic surveillance capabilities of the first downed balloon, the Biden administration's “shoot first, ask questions later” response to the latest “flying objects,” and whether we should all spend more time worrying about China's hackers and satellites. Gus then shares a few thoughts on the State of the Union address and the brief but pointed calls for antitrust and data privacy reform. Sticking with big tech and antitrust, Gus recaps a significant recent loss for the Federal Trade Commission (FTC) and discusses what may be on the horizon for FTC enforcement later this year. Pivoting back to China, Nate and Paul discuss the latest reporting on a forthcoming (at some point) executive order intended to limit and track U.S. outbound investment in certain key aspects of China's tech sector. They also ponder how industry may continue its efforts to narrow the scope of the restrictions and whether Congress will get involved. Sticking with Congress, Paul takes the opportunity to explain the key takeaways from the not-so-bombshell House Oversight Committee hearing featuring former Twitter executives. Gus next describes his favorite ChatGPT jailbreaks and a costly mistake for an artificial intelligence (AI) chatbot competitor during a demo. Paul recommends a fascinating interview with Sinbad.io, the new Bitcoin mixer of choice for North Korean hackers, and reflects on the substantial portion of the Democratic People's Republic of Korea's gross domestic product attributable to ransomware attacks. Finally, Gus questions whether AI-generated “Nothing, Forever” will need to change its name after becoming sentient and channeling Dave Chapelle. To wrap things up in the week's quick hits, Gus briefly highlights where things stand with Chip Wars: Japan edition and Brian covers coordinated U.S./UK sanctions against the Trickbot cybercrime group, confirmation that Twitter's sale will not be investigated by the Committee on Foreign Investment in the United States (CFIUS), and the latest on Security and Exchange Commission (SEC) v. Covington.     Download 442nd Episode (mp3)  You can subscribe to The Cyberlaw Podcast using iTunes, Google Play, Spotify, Pocket Casts, or our RSS feed. As always, The Cyberlaw Podcast is open to feedback. Be sure to engage with @stewartbaker on Twitter. Send your questions, comments, and suggestions for topics or interviewees to CyberlawPodcast@steptoe.com. Remember: If your suggested guest appears on the show, we will send you a highly coveted Cyberlaw Podcast mug! The views expressed in this podcast are those of the speakers and do not reflect the opinions of their institutions, clients, friends, families, or pets.

The Cyberlaw Podcast
Who Needs Hackers When You Have Balloons?

The Cyberlaw Podcast

Play Episode Listen Later Feb 14, 2023 53:07


The latest episode of The Cyberlaw Podcast gets a bit carried away with the China spy balloon saga. Guest host Brian Fleming, along with guests Gus Hurwitz, Nate Jones, and Paul Rosenzweig, share insights (and bad puns) about the latest reporting on the electronic surveillance capabilities of the first downed balloon, the Biden administration's “shoot first, ask questions later” response to the latest “flying objects,” and whether we should all spend more time worrying about China's hackers and satellites. Gus then shares a few thoughts on the State of the Union address and the brief but pointed calls for antitrust and data privacy reform. Sticking with big tech and antitrust, Gus recaps a significant recent loss for the Federal Trade Commission (FTC) and discusses what may be on the horizon for FTC enforcement later this year. Pivoting back to China, Nate and Paul discuss the latest reporting on a forthcoming (at some point) executive order intended to limit and track U.S. outbound investment in certain key aspects of China's tech sector. They also ponder how industry may continue its efforts to narrow the scope of the restrictions and whether Congress will get involved. Sticking with Congress, Paul takes the opportunity to explain the key takeaways from the not-so-bombshell House Oversight Committee hearing featuring former Twitter executives. Gus next describes his favorite ChatGPT jailbreaks and a costly mistake for an artificial intelligence (AI) chatbot competitor during a demo. Paul recommends a fascinating interview with Sinbad.io, the new Bitcoin mixer of choice for North Korean hackers, and reflects on the substantial portion of the Democratic People's Republic of Korea's gross domestic product attributable to ransomware attacks. Finally, Gus questions whether AI-generated “Nothing, Forever” will need to change its name after becoming sentient and channeling Dave Chapelle. To wrap things up in the week's quick hits, Gus briefly highlights where things stand with Chip Wars: Japan edition and Brian covers coordinated U.S./UK sanctions against the Trickbot cybercrime group, confirmation that Twitter's sale will not be investigated by the Committee on Foreign Investment in the United States (CFIUS), and the latest on Security and Exchange Commission (SEC) v. Covington.     Download 442nd Episode (mp3)  You can subscribe to The Cyberlaw Podcast using iTunes, Google Play, Spotify, Pocket Casts, or our RSS feed. As always, The Cyberlaw Podcast is open to feedback. Be sure to engage with @stewartbaker on Twitter. Send your questions, comments, and suggestions for topics or interviewees to CyberlawPodcast@steptoe.com. Remember: If your suggested guest appears on the show, we will send you a highly coveted Cyberlaw Podcast mug! The views expressed in this podcast are those of the speakers and do not reflect the opinions of their institutions, clients, friends, families, or pets.

Packet Pushers - Full Podcast Feed
Network Break 417: Zoom Chief Raises Bar For CEO Pay Cuts; Fortinet Rolls Out New Firewall Chips

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Feb 13, 2023 51:30


Take a Network Break! On this week's episode we discuss new chip hardware from Fortinet, Extreme integrating its SD-WAN into its network fabric, the US and UK governments sanctioning members of the Trickbot malware gang, more tech layoffs, why tech CEOs should feel more financial pain, and more.

Packet Pushers - Full Podcast Feed
Network Break 417: Zoom Chief Raises Bar For CEO Pay Cuts; Fortinet Rolls Out New Firewall Chips

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Feb 13, 2023 51:30


Take a Network Break! On this week's episode we discuss new chip hardware from Fortinet, Extreme integrating its SD-WAN into its network fabric, the US and UK governments sanctioning members of the Trickbot malware gang, more tech layoffs, why tech CEOs should feel more financial pain, and more. The post Network Break 417: Zoom Chief Raises Bar For CEO Pay Cuts; Fortinet Rolls Out New Firewall Chips appeared first on Packet Pushers.

Packet Pushers - Network Break
Network Break 417: Zoom Chief Raises Bar For CEO Pay Cuts; Fortinet Rolls Out New Firewall Chips

Packet Pushers - Network Break

Play Episode Listen Later Feb 13, 2023 51:30


Take a Network Break! On this week's episode we discuss new chip hardware from Fortinet, Extreme integrating its SD-WAN into its network fabric, the US and UK governments sanctioning members of the Trickbot malware gang, more tech layoffs, why tech CEOs should feel more financial pain, and more.

Packet Pushers - Network Break
Network Break 417: Zoom Chief Raises Bar For CEO Pay Cuts; Fortinet Rolls Out New Firewall Chips

Packet Pushers - Network Break

Play Episode Listen Later Feb 13, 2023 51:30


Take a Network Break! On this week's episode we discuss new chip hardware from Fortinet, Extreme integrating its SD-WAN into its network fabric, the US and UK governments sanctioning members of the Trickbot malware gang, more tech layoffs, why tech CEOs should feel more financial pain, and more. The post Network Break 417: Zoom Chief Raises Bar For CEO Pay Cuts; Fortinet Rolls Out New Firewall Chips appeared first on Packet Pushers.

Packet Pushers - Fat Pipe
Network Break 417: Zoom Chief Raises Bar For CEO Pay Cuts; Fortinet Rolls Out New Firewall Chips

Packet Pushers - Fat Pipe

Play Episode Listen Later Feb 13, 2023 51:30


Take a Network Break! On this week's episode we discuss new chip hardware from Fortinet, Extreme integrating its SD-WAN into its network fabric, the US and UK governments sanctioning members of the Trickbot malware gang, more tech layoffs, why tech CEOs should feel more financial pain, and more.

Packet Pushers - Fat Pipe
Network Break 417: Zoom Chief Raises Bar For CEO Pay Cuts; Fortinet Rolls Out New Firewall Chips

Packet Pushers - Fat Pipe

Play Episode Listen Later Feb 13, 2023 51:30


Take a Network Break! On this week's episode we discuss new chip hardware from Fortinet, Extreme integrating its SD-WAN into its network fabric, the US and UK governments sanctioning members of the Trickbot malware gang, more tech layoffs, why tech CEOs should feel more financial pain, and more. The post Network Break 417: Zoom Chief Raises Bar For CEO Pay Cuts; Fortinet Rolls Out New Firewall Chips appeared first on Packet Pushers.

Talos Takes
Year in Review - Ransomware and Commodity Loaders

Talos Takes

Play Episode Listen Later Feb 10, 2023 11:15


We're back with the final year in review focused episode. This time the focus is on the ever broadening ransomware landscape and the commodity malware loaders that often support it. I'll be joined by one of the researchers from the year in review report, Aliza Johnson to talk about what we saw on the ransomware landscape over the last year as well as how threats like Qakbot, IcedID, and Trickbot have changed and evolved over the last year. We'll also cover how these threats overlap and how LoLBins are yet again an area of concern. 

TechStuff
Tech News: Google Bard Hits a Wrong Note

TechStuff

Play Episode Listen Later Feb 9, 2023 19:57


Microsoft and Google went head to head with their AI-powered chatbot demonstrations, and Google stumbled. No, Google Bard, the James Webb Space Telescope did not take the first picture of an exoplanet. Plus, some hackers receive sanctions from the US and UK and Nintendo gives us our first look at the new Legend of Zelda game.See omnystudio.com/listener for privacy information.

The Security Podcasts
The Cybersecurity and Geopolitical Podcast — What Do the Trickbot Leaks Reveal About Russian Cybercrime? — Episode 12

The Security Podcasts

Play Episode Listen Later Aug 31, 2022 33:53


The Security Podcasts
The Cybersecurity and Geopolitical Podcast — What Do the Trickbot Leaks Reveal About Russian Cybercrime? — Episode 12

The Security Podcasts

Play Episode Listen Later Aug 31, 2022 33:53


In this Cybersecurity & Geopolitical Podcast episode presented by Security magazine, Cyjax CISO Ian Thornton-Trump and Grey Hare Media CEO Philip Ingram, MBE, are joined by Cyjax Cyber Threat Intelligence Analyst Joe Wrieden, author of a report analyzing leaked information to determine how the Trickbot malware group operates. The trio discusses what they dub "cybercrime 2.0" and contextualizes the Trickbot leaks within the ongoing Russian invasion of Ukraine.You can watch the video version here. 

Risky Business
Risky Business #672 -- "Expected behaviour" is in the eye of the beholder

Risky Business

Play Episode Listen Later Jul 20, 2022 Very Popular


On this week's show Patrick Gray and Adam Boileau discuss the week's security news, including: A look at the DHS Cyber Safety Review Board's Log4j report Joshua Schulte no longer the “alleged” Vault7 leaker Chinese APT crews targeted US political journalists before Jan 6 Ransomware gangs make leak sites searchable Why recovering plaintext passwords from Okta is expected behaviour US Government seizes North Korean ransomware payment Much, much more This week's show is brought to you by Trail of Bits. Dan Guido is this week's sponsor guest and he'll tell us about work Trail of Bits did for DARPA on investigating blockchain security fundamentals. Links to everything that we discussed are below and you can follow Patrick or Adam on Twitter if that's your thing. Show notes Patrick Gray on Twitter: "During our discussion yesterday on the show we didn't know pre-existing MDM was preserved when iOS lockdown mode is enabled, which is great!" / Twitter DHS Cyber Safety Review Board found no evidence China knew of Log4j before disclosure Ex-CIA Hacker Convicted for ‘One of the Most Damaging Acts of Espionage in American History' Chinese hackers targeted U.S. political reporters just ahead of Jan. 6 attack, researchers say Experts concerned about ransomware groups creating searchable databases of victim data - The Record by Recorded Future Who-is-Trickbot.pdf A Deep Dive Into the Residential Proxy Service ‘911' – Krebs on Security Risky Biz News: Google removes app permissions from the Play Store Ongoing phishing campaign can hack you even when you're protected with MFA | Ars Technica ‘Password extraction risk' in identity provider Okta disputed | The Daily Swig Authomize Discovers Password Stealing and Impersonation Risks in Okta | Authomize.com Okta Response to Security Report | Okta DOJ seized ransoms paid by health centers in Kansas, Colorado after 2021 attacks - The Record by Recorded Future North Korean hackers target small businesses with H0lyGh0st ransomware, Microsoft warns - The Record by Recorded Future Colorado police investigating ransomware attack on small town - The Record by Recorded Future Albania shuts down government websites, services due to wide ranging cyberattack - The Record by Recorded Future Bandai Namco confirms cyberattack after ransomware group threatens leak - The Record by Recorded Future MiCODUS MV720 GPS tracker | CISA Honda redesigning latest vehicles to address key fob vulnerabilities - The Record by Recorded Future Russia Released a Ukrainian App for Hacking Russia That Was Actually Malware Are blockchains decentralized? | Trail of Bits Blog Announcing the new Trail of Bits podcast | Trail of Bits Blog GitHub - trailofbits/it-depends: A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositories.

The CyberWire
Criminal gangs at war. A "cyber world war?" A new DPRK ransomware operation. Media organizations targeted by state actors. NSA guidance on characterizing threats and risks to microelectronics.

The CyberWire

Play Episode Listen Later Jul 15, 2022 35:50 Very Popular


Gangland goes to war. Is there a "cyber world war" in progress? Ukraine thinks so. A new North Korean ransomware operation is described, but it's not yet clear if it's a state operation or some moonlighting by Pyongyang's operators. Media organizations remain attractive targets for state actors. NSA releases guidance on characterizing threats and risks to microelectronics. Betsy Carmelite from Booz Allen talks about why now is the time to plan for post-quantum cryptography. Our guest is Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly discussing her time at CISA and the work of her team.  For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/135 Selected reading. Inside The Russian Cybergang Thought To Be Attacking Ukraine—The Trickbot Leaks (Forbes) Who is Trickbot? (Cyjax) Who is Trickbot? (Cyjax) NATO and the European Union work together to counter cyber threats (NATO)  The Man at the Center of the New Cyber World War (POLITICO) Russian cyber threat to Canada worse than previously reported: CSE (National Post)  North Korean threat actor targets small and midsize businesses with H0lyGh0st ransomware (Microsoft Security)  Above the Fold and in Your Inbox: Tracing State-Aligned Activity Targeting Journalists, Media (Proofpoint) NSA Publishes Guidance on Characterizing Threats, Risks to DoD Microelectronics (National Security Agency/Central Security Service)

ShadowTalk by Digital Shadows
Weekly: Microsoft Patch Tuesday, Russia Targeted, Hive Ransomware Upgrade, TrickBot Attacks Ukraine

ShadowTalk by Digital Shadows

Play Episode Listen Later Jul 15, 2022 32:13


ShadowTalk host Chris alongside Nicole, Ivan, and Rick bring you the latest in threat intelligence. This week they cover: * Microsoft Patch Tuesday * Chinese cyber espionage groups target Russia * Hive ransomware group takes LockBit information to upgrade to Rust * IBM Security X-Force finds evidence on TrickBot attacking Ukraine ***Resources from this week's podcast*** Ransomware in Q2 2022: Ransomware is Back in Business https://www.digitalshadows.com/blog-and-research/ransomware-in-q2-2022-ransomware-is-back-in-business/ Offensive Nation-State Cyber Threats: Who Takes The Top Spot? https://www.digitalshadows.com/blog-and-research/offensive-nation-state-cyber-threats-who-takes-the-top-spot/ Chinese Cyber Espionage Groups Increasingly Targeting Russia https://www.infosecurity-magazine.com/news/chinese-cyber-espionage-russia/ Hive Ransomware Upgrades to Rust for More Sophisticated Encryption Method https://thehackernews.com/2022/07/hive-ransomware-upgrades-to-rust-for.html Unprecedented Shift: The Trickbot Group is Systematically Attacking Ukraine https://securityintelligence.com/posts/trickbot-group-systematically-attacking-ukraine/ Conti ransomware gang takes over TrickBot malware operation https://www.bleepingcomputer.com/news/security/conti-ransomware-gang-takes-over-trickbot-malware-operation/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don't forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.

The CyberWire
Chinese industrial espionage warning. Trickbot's privateering. Russian influence ops target NATO resolve. Cozy Bear sighting. Chinese APTs target Russia. NFT scams are pestering Ukraine.

The CyberWire

Play Episode Listen Later Jul 7, 2022 32:36 Very Popular


The FBI and MI-5 warn of Chinese industrial espionage. Revelations of Trickbot's privateering role. Russian influence operations target France, Germany, Poland, and Turkey. Chinese APTs target Russian organizations in a cyberespionage effort. Robert M. Lee from Dragos on CISA expanding the Joint Cyber Defense Collaborative. Ben Yelin speaks with Matt Kent from Public Citizen about the American Innovation and Online Choice Act. And who would guess it, but NFT scams are pestering Ukraine. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/129 Selected reading. Heads of FBI, MI5 Issue Joint Warning on Chinese Spying (Wall Street Journal)  FBI and MI5 leaders give unprecedented joint warning on Chinese spying (the Guardian) FBI and MI5 bosses: China cheats and steals at massive scale (Register) FBI director suggests China bracing for sanctions if it invades Taiwan (Washington Post)  Unprecedented Shift: The Trickbot Group is Systematically Attacking Ukraine (Security Intelligence) Trickbot may be carrying water for Russia (Washington Post) Russia Info Ops Home In on Perceived Weak Links (VOA) Targets of Interest | Russian Organizations Increasingly Under Attack By Chinese APTs (SentinelOne) Chinese hackers targeting Russian government, telecoms: report (The Record by Recorded Future) Near-undetectable malware linked to Russia's Cozy Bear (Register) Russia's Cozy Bear linked to nearly undetectable malware (Computing) When Pentest Tools Go Brutal: Red-Teaming Tool Being Abused by Malicious Actors (Unit 42)  NFT scammers see an opportunity in Ukraine donations (The Record by Recorded Future)

InfoSec Overnights - Daily Security News
Bumblebee sting, Russian attacks, Black Basta rises, and more.

InfoSec Overnights - Daily Security News

Play Episode Listen Later Apr 28, 2022 2:29


A daily look at the relevant information security news from overnight.Episode 228 - 28 April 2022Bumblebee sting - https://www.bleepingcomputer.com/news/security/new-bumblebee-malware-takes-over-bazarloaders-ransomware-delivery/Russian attacks - https://www.zdnet.com/article/microsoft-russia-has-launched-hundreds-of-cyberattacks-against-ukraine/QNAP snap - https://www.bleepingcomputer.com/news/security/qnap-warns-users-to-disable-afp-until-it-fixes-critical-bugs/GitHUb flub - https://threatpost.com/github-repos-stolen-oauth-tokens/179427/Journalists phished -https://threatpost.com/hackers-target-journalists-goldbackdoor/179389/Black Basta rises- https://www.bleepingcomputer.com/news/security/new-black-basta-ransomware-springs-into-action-with-a-dozen-breaches/

Security Now (MP3)
SN 863: Use After Free - OpenSSL Bug, Cybercrime Reporting Law, Node.js Supply Chain Compromise

Security Now (MP3)

Play Episode Listen Later Mar 23, 2022 115:46 Very Popular


Picture of the Week. Report Cybercrime: It's the Law. A software supply chain compromise. Browser in the Browser. TrickBot, MicroTik & Microsoft. The Infinite Loop OpenSSL Bug. CISA Alert AA22-074A. The Windows Local Privilege Escalation that Microsoft seems unable to fix. Use After Free. We invite you to read our show notes at https://www.grc.com/sn/SN-863-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: barracuda.com/securitynow Melissa.com/twit plextrac.com/twit

Risky Business
Risky Business #659 -- Okta and Microsoft meet LAPSUS$

Risky Business

Play Episode Listen Later Mar 23, 2022


On this week's show Patrick Gray and Adam Boileau discuss the week's security news, including: Okta's somewhat awful comms around its LAPSUS$ incident Inside Microsoft's brush with the same group How Elon Musk's Starlink service is being used to drop bombs on Russian tanks US, UK governments warn of impending Russian cyberdoom Much, much more… This week's sponsor interview is with Paul Lanzi, co-founder of Remediant. Paul joins the show this week to talk about cyber insurance. It's a topic that has come up a lot for us lately – ransomware has borderline sunk the current cyber insurance model as payments ballooned and payouts made a lot of insurers adjust premiums to the. But all is not lost – Paul says this blowup means the insurance industry is actually adapting and could wind up being a driver of better security practices. Links to everything that we discussed are below and you can follow Patrick or Adam on Twitter if that's your thing. Show notes Hackers hit authentication firm Okta, customers 'may have been impacted' | Reuters Updated Okta Statement on LAPSUS$ | Okta Microsoft investigating Lapsus$ claims of Bing, Cortana data theft - The Record by Recorded Future DEV-0537 criminal actor targeting organizations for data exfiltration and destruction - Microsoft Security Blog U.K. echoes Biden warning on Russian cyberattacks - The Record by Recorded Future Statement by President Biden on our Nation's Cybersecurity | The White House FBI advised that hackers scanned networks of 5 US energy firms ahead of Biden's Russia cyberattack warning - CNNPolitics CISA, FBI warn of satellite network hacks following Viasat cyberattack - The Record by Recorded Future Specialist Ukrainian drone unit picks off invading Russian forces as they sleep | News | The Times China's DJI And Its Billionaire Chief Put In An Awkward Spot As Both Sides In Ukraine War Use Its Drones Alert: peacenotwar module sabotages npm developers in the node-ipc package to protest the invasion of Ukraine | Snyk Catalin Cimpanu on Twitter: "Following the poisoning of the node-ipc npm package to sabotage systems in Belarus and Russia, Russia's NKTsKI cyber-security agency has told companies to use local repos for FOSS software, use older versions prior to the invasion, and audit new updates https://t.co/3PlKdXTfn1 https://t.co/EV25HBBZFN" / Twitter U.S. bars ex-spies from becoming 'mercenaries,' following Reuters series | Reuters Behold, a password phishing site that can trick even savvy users | Ars Technica Death of the Password? FIDO Alliance Reveals Its New Plan | WIRED Scammers have 2 clever new ways to install malicious apps on iOS devices | Ars Technica New details emerge on prolific Conti-linked cybercrime group Trickbot is using MikroTik routers to ply its trade. Now we know why | Ars Technica Sandworm-linked botnet has another piece of hardware in its sights Hacker Steals Customer Data From Circle, BlockFi, Other Big Crypto Firms - Decrypt Lawmakers Probe Early Release of Top RU Cybercrook – Krebs on Security A different way to do PAM -- Paul Lanzi, Remediant - YouTube

Security Now (Video HI)
SN 863: Use After Free - OpenSSL Bug, Cybercrime Reporting Law, Node.js Supply Chain Compromise

Security Now (Video HI)

Play Episode Listen Later Mar 23, 2022 115:46


Picture of the Week. Report Cybercrime: It's the Law. A software supply chain compromise. Browser in the Browser. TrickBot, MicroTik & Microsoft. The Infinite Loop OpenSSL Bug. CISA Alert AA22-074A. The Windows Local Privilege Escalation that Microsoft seems unable to fix. Use After Free. We invite you to read our show notes at https://www.grc.com/sn/SN-863-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: barracuda.com/securitynow Melissa.com/twit plextrac.com/twit

All TWiT.tv Shows (MP3)
Security Now 863: Use After Free

All TWiT.tv Shows (MP3)

Play Episode Listen Later Mar 23, 2022 115:46


Picture of the Week. Report Cybercrime: It's the Law. A software supply chain compromise. Browser in the Browser. TrickBot, MicroTik & Microsoft. The Infinite Loop OpenSSL Bug. CISA Alert AA22-074A. The Windows Local Privilege Escalation that Microsoft seems unable to fix. Use After Free. We invite you to read our show notes at https://www.grc.com/sn/SN-863-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: barracuda.com/securitynow Melissa.com/twit plextrac.com/twit

Security Now (Video HD)
SN 863: Use After Free - OpenSSL Bug, Cybercrime Reporting Law, Node.js Supply Chain Compromise

Security Now (Video HD)

Play Episode Listen Later Mar 23, 2022 115:46


Picture of the Week. Report Cybercrime: It's the Law. A software supply chain compromise. Browser in the Browser. TrickBot, MicroTik & Microsoft. The Infinite Loop OpenSSL Bug. CISA Alert AA22-074A. The Windows Local Privilege Escalation that Microsoft seems unable to fix. Use After Free. We invite you to read our show notes at https://www.grc.com/sn/SN-863-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: barracuda.com/securitynow Melissa.com/twit plextrac.com/twit

Radio Leo (Audio)
Security Now 863: Use After Free

Radio Leo (Audio)

Play Episode Listen Later Mar 23, 2022 115:46


Picture of the Week. Report Cybercrime: It's the Law. A software supply chain compromise. Browser in the Browser. TrickBot, MicroTik & Microsoft. The Infinite Loop OpenSSL Bug. CISA Alert AA22-074A. The Windows Local Privilege Escalation that Microsoft seems unable to fix. Use After Free. We invite you to read our show notes at https://www.grc.com/sn/SN-863-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: barracuda.com/securitynow Melissa.com/twit plextrac.com/twit

Security Now (Video LO)
SN 863: Use After Free - OpenSSL Bug, Cybercrime Reporting Law, Node.js Supply Chain Compromise

Security Now (Video LO)

Play Episode Listen Later Mar 23, 2022 115:46


Picture of the Week. Report Cybercrime: It's the Law. A software supply chain compromise. Browser in the Browser. TrickBot, MicroTik & Microsoft. The Infinite Loop OpenSSL Bug. CISA Alert AA22-074A. The Windows Local Privilege Escalation that Microsoft seems unable to fix. Use After Free. We invite you to read our show notes at https://www.grc.com/sn/SN-863-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: barracuda.com/securitynow Melissa.com/twit plextrac.com/twit

All TWiT.tv Shows (Video LO)
Security Now 863: Use After Free

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Mar 23, 2022 115:46


Picture of the Week. Report Cybercrime: It's the Law. A software supply chain compromise. Browser in the Browser. TrickBot, MicroTik & Microsoft. The Infinite Loop OpenSSL Bug. CISA Alert AA22-074A. The Windows Local Privilege Escalation that Microsoft seems unable to fix. Use After Free. We invite you to read our show notes at https://www.grc.com/sn/SN-863-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: barracuda.com/securitynow Melissa.com/twit plextrac.com/twit

Firewalls Don't Stop Dragons Podcast
My De-Google Strategy

Firewalls Don't Stop Dragons Podcast

Play Episode Listen Later Mar 7, 2022 63:34


As my de-Google project progresses, I realized that I skipped the most important step: reconnaissance. Before you can de-Google your life, you need to first make a list of the Google products and services you interact with - and not all of them have "Google" in their names. Google also owns YouTube, Waze, Nest, Fitbit, Chromebooks, and much more. Furthermore, you need to know and understand what information Google already knows about you. And while you're doing that, you should delete all the existing data and prevent further collection. Thankfully, Google provides several tools to help you do this (most likely due to regulations like GDPR and CCPA). I'll help you create your personal de-Google to-do list. In other news: today I'm launching a massive giveaway promotion to celebrate the 5th anniversary of the podcast!! Also, 100 million Samsung phones shipped with horrible security flaws; Nvidia hackers are pressuring the company to turn off cryptocurrency mining limitations; the (Russian) Conti and TrickBot ransomware operations have been hacked; details of 120,000 Russian soldiers in Ukraine have been leaked (on purpose); the US Senate has passed landmark cybersecurity legislation in light of the rising cyber warfare threat; and the ACLU has published a sobering report about a mass surveillance company called Flock (no relation to Google's FLoC). Article Links 100 Million Samsung Phones Shipped With Flawed Encryption https://www.cpomagazine.com/cyber-security/100-million-samsung-phones-shipped-with-flawed-encryption-galaxy-s8-to-s21-series-cryptographic-keys-trivial-to-expose/ Nvidia Hackers Threaten to Release Mining-Limiter Killer https://www.tomshardware.com/news/nvidia-hackers-threaten-to-release-lhr-performance-limiter Conti Ransomware source code leaked by Ukrainian researcher https://www.bleepingcomputer.com/news/security/conti-ransomware-source-code-leaked-by-ukrainian-researcher/ Details of '120,000 Russian soldiers' leaked by Ukrainian media https://www.theregister.com/2022/03/02/russian_soldier_leaks/ Senate passes cybersecurity act forcing orgs to report cyberattacks, ransom payments https://www.zdnet.com/article/senate-passes-cybersecurity-act-forcing-critical-infrastructure-orgs-to-report-cyberattacks-ransom-payments/ Fast-Growing Company Flock is Building a New AI-Driven Mass-Surveillance System https://www.aclu.org/report/fast-growing-company-flock-building-new-ai-driven-mass-surveillance-system My De-Google Strategy: https://firewallsdontstopdragons.com/my-de-google-strategy/ Lawrence Lessig's article: https://medium.lessig.org/crowdsourced-war-b5774c0ca7b5  Further Info 5th Anniversary Giveaway!! Details will be posted this week on my blog - keep your eye out on my main website! https://firewallsdontstopdragons.com/ Check out Techlore: https://techlore.tech/ Conti Ransomware report from Krebs On Security: https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-i-evasion/ https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-ii-the-office/ https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-iii-weaponry/ Subscribe to the newsletter: https://firewallsdontstopdragons.com/newsletter/new-newsletter/Become a Patron! https://www.patreon.com/FirewallsDontStopDragons Would you like me to speak to your group about security and/privacy? http://bit.ly/Firewalls-SpeakerGenerate secure passphrases! https://d20key.com/#/

Cyber Security Headlines

Conti and Trickbot code leaks API attacks surge in 2021 Log4Shell still being used in the wild There are many misconceptions about security automation, so Torq is debunking a security automation myth each day this week. Myth 4: Automation Will Replace Skilled Security Professionals Not true. Any business that attempts to automate security will quickly find that most high-stakes security issues are far too complex to be detected and remediated by automation tools alone. Human security professionals need to take the lead delivering nuanced insight about the business impact of a large-scale breach. To learn more about the realities of automation, head to torq.io.