CyberWire Daily

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also included interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world. Listen to their daily podcasts here on the cyber post.

Ransomware groups continue to shift identities and targets. Assessments of the cyber phases of...

0
Ransomware groups continue to shift identities and targets. Assessments of the cyber phases of a hybrid war. Is wartime tough for criminals? Anonymous counts coup…against Moscow’s taxis. REvil (or an...

News on three ransomware operations: BianLian, Cuba, and Ragnar Locker. How the gangs are...

0
News on three ransomware operations: BianLian, Cuba, and Ragnar Locker. How the gangs are recruiting. Mobile app supply chain blues. Happy Insider Threat Month. The BianLian ransomware gang is better...

Malicious Chrome extensions. BEC in Kentucky. Dispatches from a hybrid war, including state-directed, partisan,...

0
Malicious Chrome extensions. BEC in Kentucky. Dispatches from a hybrid war, including state-directed, partisan, and criminal action. ICS advisories. “Cosplaying” hardware. Chrome extensions steal browser data. A business email compromise...

Cyberespionage around the South China Sea. Oktapus and the Twilio compromise. Notes from Russia’s...

0
Cyberespionage around the South China Sea. Oktapus and the Twilio compromise. Notes from Russia’s hybrid war. And the LockBit gang looks beyond double extortion. Cyberespionage around the South China Sea....

How a hybrid war spreads its cyber effects. Russian and Chinese cyber ops in...

0
How a hybrid war spreads its cyber effects. Russian and Chinese cyber ops in Latin America. Greenwashing influence. Iranian threat actor exploits Log4j vulnerabilities against Israeli targets. Russian cyber operations...

A Black Basta update. Okta talks Scatter Swine. Nobelium’s MagicWeb. Wartime stress in the...

0
A Black Basta update. Okta talks Scatter Swine. Nobelium's MagicWeb. Wartime stress in the cyber underworld. LastPass security incident. CISA adds to its Known Exploited Vulnerabilities Catalog. Palo Alto describes...

Ransomware attack hits a French hospital. Lessons for the fifth domain from six months...

0
Ransomware attack hits a French hospital. Lessons for the fifth domain from six months of hybrid war. Deepfake scams have arrived. Threat actors prepare to exploit Hikvision camera vulnerability. A...

Notes from six months of hybrid war. Oktapus criminal campaign. Exotic Lily and Bumblebee...

0
Notes from six months of hybrid war. Oktapus criminal campaign. Exotic Lily and Bumblebee Loader. Insights derived from DNS traffic. US DHS shutters its Disinformation Governance Board. Ukrainian and Russian...

Iranian APT data extraction tool described. LockBit gang comes under DDoS. Twitter whistleblower security...

0
Iranian APT data extraction tool described. LockBit gang comes under DDoS. Twitter whistleblower security claims made public. Greek natural gas supplier under cyberattack. Updates on a hybrid war. Iranian APT...

Bogus DDoS protection pages distribute malware. Estonia deals with DDoS attacks. Roskomnadzor’s Internet panopticon.And...

0
Bogus DDoS protection pages distribute malware. Estonia deals with DDoS attacks. Roskomnadzor's Internet panopticon.And data-tampering attacks are regarded as a growing risk. Bogus DDoS protection pages distribute malware. Estonia deals...
Error decoding the Instagram API json