logo
episode-header-image
Jun 2023
22m 46s

A Joint Advisory on LockBit. AI chatbots...

N2K Networks
About this episode

The Five Eyes, alongside a couple of allies, issue a LockBit advisory. AI aids in proofreading phishing attacks. Anonymous Sudan mounts nuisance-level DDoS attacks against US companies. France alleges a disinformation campaign conducted by Russian actors. KillNet says it's partnered with the less-well-known Devil Sec. The private cybersecurity industry's effect on the war in Ukraine. Carole Theriault ponders oversharing on social media. Our guest is Duncan Jones from Quantinuum on the threats of Harvest Now, Decrypt Later tactics. And a note on this month’s Patch Tuesday.


For links to all of today's stories check out our CyberWire daily news briefing:

https://thecyberwire.com/newsletters/daily-briefing/12/114


Selected reading.

Understanding Ransomware Threat Actors: LockBit (Joint Cybersecurity Advisory)

U.S. Measures in Response to the Crisis in Sudan (US Department of State)

Generative AI Enables Threat Actors to Create More (and More Sophisticated) Email Attacks (Abnormal Security)

France Accuses Russia of Online Disinformation Campaign (Bloomberg)

The Private Sector’s Evolving Role in Conflict—From Cyber Assistance to Intelligence (R Street)

Microsoft Patches Critical Windows Vulns, Warns of Code Execution Risks (SecurityWeek)

Patch Tuesday: Critical Flaws in Adobe Commerce Software (SecurityWeek)

Patch Tuesday fixes 4 critical RCE bugs, and a bunch of Office holes (Naked Security)

Learn more about your ad choices. Visit megaphone.fm/adchoices

Up next
Yesterday
Chinese hackers serve up espionage.
Chinese hackers infiltrate a major U.S. law firm. The EU Commission President warns Russia is waging a hybrid war against Europe. Researchers say LoJax is the latest malware from Russia’s Fancy Bear. Salesforce refuses ransom demands. London Police arrest two teens over an allege ... Show More
32m 4s
Oct 7
Critical GoAnywhere bug fuels ransomware wave.
Microsoft tags a critical vulnerability in Fortra’s GoAnywhere software. A critical Redis vulnerability could allow remote code execution. Researchers tie BIETA to China’s MSS technology enablement. Competing narratives cloud the Oracle E-Business Suite breach. An Ohio-based visi ... Show More
32m 23s
Oct 6
Oracle zero-day serves up persistent access.
A critical zero-day in Oracle E-Business Suite is under active exploitation. ICE plans a major expansion of its social media surveillance operations. Discord confirms a third-party data breach. A critical vulnerability in the Unity game engine could allow arbitrary code execution ... Show More
23m 47s
Recommended Episodes
Jul 2024
CYBER UNCUT: LockBit out for revenge and the latest insights from the Australian Cyber Security Summit
In this episode of Cyber Uncut, Liam Garman and Daniel Croft unpack the latest cyber security news, complete with some interesting lessons for business leaders from this year’s Australian Cyber Security Summit. The pair begin the podcast with an update on allegations of a breach ... Show More
28m 4s
Feb 2021
Nicole Perlroth, "This Is How They Tell Me the World Ends: The Cyberweapons Arms Race" (Bloomsbury, 2021)
For years, cybersecurity experts have debated whether cyber-weapons represent a destabilizing new military technology or merely the newest tool in the spies’ arsenal. In This Is How They Tell Me the World Ends (Bloomsbury, 2021), Nicole Perlroth makes a compelling case that cyber ... Show More
59m 4s
Feb 2021
The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning
The image of a hooded individual illuminated by the glare of a computer screen hacking into a company’s network is the classic picture of what a cyber attack looks like. The reality, though, is these attackers are almost never a one-man band, but rather a sophisticated team armed ... Show More
40m 57s
Jun 2021
Cyberguerre: des conflits invisibles aux conséquences bien réelles
Aucun coup n'est tiré, mais les dégâts peuvent être considérables et les conséquences, dramatiques. Souvent silencieuses, parfois spectaculaires, les cyberattaques se multiplient –qu'elles soient le fait de simples criminels, d'États souverains ou d'une collaboration des deux. De ... Show More
26m 17s
Mar 2022
War in Ukraine: the cyber frontier
How the conflict in Ukraine is playing out in cyberspace. With the conflict in Ukraine still raging following Russia’s invasion Ed Butler speaks to hackers from Ukraine including Vlad Styran of Berezha Security Group, one of the people tasked with fending off digital attacks on U ... Show More
18m 4s
Mar 2023
How A Satellite Hack Became a Cybersecurity Wakeup Call
People around the world rely on satellites for their internet connections, credit card transactions–and even to keep track of time.  Last year, a suspected Russian-led satellite hack exposed how vulnerable they are to security breaches, from individual hackers seeking to pilfer i ... Show More
31m 54s