Artwork

المحتوى المقدم من N2K Networks, Inc. and N2K Networks. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة N2K Networks, Inc. and N2K Networks أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !

The rebirth of Russia's cyber warfare.

32:04
 
مشاركة
 

Manage episode 413080695 series 2925132
المحتوى المقدم من N2K Networks, Inc. and N2K Networks. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة N2K Networks, Inc. and N2K Networks أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

A Russian hacker group boldly targets critical infrastructure. The Change Healthcare ransomware attack is projected to cost over a billion dollars. Three hundred bucks is the going rate for a SIM swap. PuTTY potentially reveals private keys. Cisco Talos reports a surge in brute-force attacks. Ivanti updates its MDM product. Omni Hotels & Resorts confirm a data breach. Financially motivated hackers target Businesses in Latin America with steganography. A prolific cryptojacker faces decades in prison. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey. The ransomware equivalent of a Saturday night special.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe discuss content and study strategies for Domain 2, Asset Security.

Resources:

Domain 2, Asset Security

Identify and securely provision information assets, establish handling requirements, manage the data lifecycle, and apply data security controls to comply with applicable laws.

  • 2.1 Identify and classify information and assets
  • 2.2 Establish information and asset handling requirements
  • 2.3 Provision resources securely
  • 2.4 Manage data lifecycle
  • 2.5 Ensure appropriate asset retention (e.g., End-of-Life (EOL), End-of-Support (EOS))
  • 2.6 Determine data security controls and compliance requirements

Are you studying for the CISSP exam, considering taking the test soon, or did you have an unsuccessful exam experience? Here are some CISSP exam pitfalls to avoid so that you’re confident and successful on exam day.

Selected Reading

Hackers Linked to Russia’s Military Claim Credit for Sabotaging US Water Utilities (WIRED)

T-Mobile, Verizon workers get texts offering $300 for SIM swaps (Bleeping Computer)

PuTTY SSH client flaw allows recovery of cryptographic private keys (Bleeping Computer)

Large-scale brute-force activity targeting VPNs, SSH services with commonly used login credentials (Talos Intelligence)

Ivanti Patches Two Critical Avalanche Flaws in Major Update (Infosecurity Magazine)

Omni Hotels confirms data compromise in apparent ransomware attack (SC Media)

Steganography Campaign Targets Global Enterprises (GovInfo Security)

Nebraska man allegedly defrauded cloud providers of millions via cryptojacking (The Record)

Ransomware attack has cost UnitedHealth $872 million; total expected to surpass $1 billion (The Record)

‘Junk gun’ ransomware: Peashooters can still pack a punch (Sophos News)

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

  continue reading

2846 حلقات

Artwork

The rebirth of Russia's cyber warfare.

CyberWire Daily

25 subscribers

published

iconمشاركة
 
Manage episode 413080695 series 2925132
المحتوى المقدم من N2K Networks, Inc. and N2K Networks. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة N2K Networks, Inc. and N2K Networks أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

A Russian hacker group boldly targets critical infrastructure. The Change Healthcare ransomware attack is projected to cost over a billion dollars. Three hundred bucks is the going rate for a SIM swap. PuTTY potentially reveals private keys. Cisco Talos reports a surge in brute-force attacks. Ivanti updates its MDM product. Omni Hotels & Resorts confirm a data breach. Financially motivated hackers target Businesses in Latin America with steganography. A prolific cryptojacker faces decades in prison. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey. The ransomware equivalent of a Saturday night special.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe discuss content and study strategies for Domain 2, Asset Security.

Resources:

Domain 2, Asset Security

Identify and securely provision information assets, establish handling requirements, manage the data lifecycle, and apply data security controls to comply with applicable laws.

  • 2.1 Identify and classify information and assets
  • 2.2 Establish information and asset handling requirements
  • 2.3 Provision resources securely
  • 2.4 Manage data lifecycle
  • 2.5 Ensure appropriate asset retention (e.g., End-of-Life (EOL), End-of-Support (EOS))
  • 2.6 Determine data security controls and compliance requirements

Are you studying for the CISSP exam, considering taking the test soon, or did you have an unsuccessful exam experience? Here are some CISSP exam pitfalls to avoid so that you’re confident and successful on exam day.

Selected Reading

Hackers Linked to Russia’s Military Claim Credit for Sabotaging US Water Utilities (WIRED)

T-Mobile, Verizon workers get texts offering $300 for SIM swaps (Bleeping Computer)

PuTTY SSH client flaw allows recovery of cryptographic private keys (Bleeping Computer)

Large-scale brute-force activity targeting VPNs, SSH services with commonly used login credentials (Talos Intelligence)

Ivanti Patches Two Critical Avalanche Flaws in Major Update (Infosecurity Magazine)

Omni Hotels confirms data compromise in apparent ransomware attack (SC Media)

Steganography Campaign Targets Global Enterprises (GovInfo Security)

Nebraska man allegedly defrauded cloud providers of millions via cryptojacking (The Record)

Ransomware attack has cost UnitedHealth $872 million; total expected to surpass $1 billion (The Record)

‘Junk gun’ ransomware: Peashooters can still pack a punch (Sophos News)

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

  continue reading

2846 حلقات

كل الحلقات

×
 
Loading …

مرحبًا بك في مشغل أف ام!

يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.

 

دليل مرجعي سريع