Trojan Source–a threat to the software supply chain. Ransomware goes to influence operations school....
Trojan Source--a threat to the software supply chain. Ransomware goes to influence operations school. Triple extortion? Criminal target selection.
Researchers describe Trojan Source, a hard-to-detect threat to the software supply...
Disinformation at the UN. Phishing against Ukraine. Hydra Market taken down. Is someone carrying...
Disinformation at the UN. Phishing against Ukraine. Hydra Market taken down. Is someone carrying on for Lapsus$? Compromise at Mailchimp. FIN7 branches out into ransomware.
Disinformation at the UN. Russian...
Influence operations in the grey zone. FSB raids REvil. Open Source Software Security Summit...
Influence operations in the grey zone. FSB raids REvil. Open Source Software Security Summit looks to public-private cooperation. Privateering and state-sponsored cybercrime.
A large-scale cyberattack against Ukrainian websites looks like...
Cyber war: a continuing threat, a blurry line between combatants and noncombatants. Chinese cyberespionage...
Cyber war: a continuing threat, a blurry line between combatants and noncombatants. Chinese cyberespionage and its “plumbing.” CISA adds Known Exploited Vulnerabilities. News from Jersey.
US officials continue to rate...
Electioneering, domestic, but with international implications. The Mirai botnet is exploiting OMIGOD. Container shipper...
Electioneering, domestic, but with international implications. The Mirai botnet is exploiting OMIGOD. Container shipper sustains data breach. Odd ads. Phishing with Mr. Musk’s name.
Cyber electioneering, in Hungary and Russia,...
Srsly Risky Biz: Why did Russia deploy hackers to war zones?
In this podcast Patrick Gray and Tom Uren talk about how Ukraine has countered Russia’s cyber operations.
They also look at various...
EP 135: The D.R. Incident
Full Transcript
Omar Avilez worked in the CSIRT of the Dominican Republic when a major cyber security incident erupted. Omar walks us through what happened and the incident response procedures...
Between Two Nerds: The Balance between Offence and Defence
In this edition of Between Two Nerds Tom Uren and The Grugq look at the natural advantages that network defenders have....
Risky Business #649 — Java being a fiddly mess saves the day
On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including:
The log4j bug...
Article 5? It’s complicated. Influence ops for economic advantage. SOHO routers under attack. YTStealer...
Article 5? It’s complicated. Influence ops for economic advantage. SOHO routers under attack. YTStealer described. RansomHouse hits AMD. A NetWalker affiliate cops a plea.
NATO's response to Killnet's cyberattacks on...