CyberWire Daily

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also included interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world. Listen to their daily podcasts here on the cyber post.

Election-season cyber incidents in Germany. South Africa works to recover from a ransomware attack...

0
Election-season cyber incidents in Germany. South Africa works to recover from a ransomware attack on government networks. Cryptojacking botnet moves to Windows targets. Ransomware notes. Denial-of-service at a German election...

Log4Shell exploited by criminals and intelligence services. Private sector offensive cyber capabilities. Noberus ransomware...

0
Log4Shell exploited by criminals and intelligence services. Private sector offensive cyber capabilities. Noberus ransomware used in double-extortion attacks. Squid Game phishbait. Log4Shell is exploited by criminals and intelligence services. Private...

SolarMarket malware carried in some WordPress sites. Russian privateers don’t much like REvil’s takedown....

0
SolarMarket malware carried in some WordPress sites. Russian privateers don’t much like REvil’s takedown. The SVR in the supply chain. Malicious Squid Games app. Scary social media. SolarMarket infestations are...

More stolen alt-coin is returned. Accenture reports minimal effects in the alleged LockBit attack....

0
More stolen alt-coin is returned. Accenture reports minimal effects in the alleged LockBit attack. Home routers attacked. Source code for sale? PrintNightmare exploited in the wild. Extradition cases. More stolen...

A threat to release stolen proprietary data. The C2C market: division of labor and...

0
A threat to release stolen proprietary data. The C2C market: division of labor and loss-leading marketing ploys. Misconfigured Salesforce Communities. Sanctions-induced headwinds for Huawei. RansomEXX threatens to release stolen proprietary...

Public Wi-Fi advice from NSA. South African ports recover from ransomware. Iranian rail incident...

0
Public Wi-Fi advice from NSA. South African ports recover from ransomware. Iranian rail incident was a wiper attack. Developments in the criminal-to-criminal market. Intercept vendors under scrutiny.

Log4j updates, including one deadline. Other, non-Log4j, challenges. RSAC postpones itself until June. A...

0
Log4j updates, including one deadline. Other, non-Log4j, challenges. RSAC postpones itself until June. A German court awards pain-and-suffering damages in a breach case. An update of where things stand with...

Cyberespionage campaign looks a lot like SIGINT collection. Magnitude gets more capable. VPN exploits...

0
Cyberespionage campaign looks a lot like SIGINT collection. Magnitude gets more capable. VPN exploits solicited. Ransomware trends. Seven years for UPMC hacker. Plenty of Candy Corn coming. The LightBasin “activity...

More APT activity. Brigading, Mass Reporting, and Coordinated Inauthentic Behavior. CISA names the CSAC...

0
More APT activity. Brigading, Mass Reporting, and Coordinated Inauthentic Behavior. CISA names the CSAC members. Cybercriminals sentenced. A whistleblower with an ulterior motive? An APT is exploiting Internet-facing instances of...

Espionage by password spraying, and espionage via peanut butter sandwich. Ransomware and DDoS warnings....

0
Espionage by password spraying, and espionage via peanut butter sandwich. Ransomware and DDoS warnings. Two journalists get the Nobel Peace Prize Teheran is running password spraying attacks (especially on Thursdays...
Error decoding the Instagram API json