The rebirth of Russia's cyber warfare.
A Russian hacker group boldly targets critical infrastructure. The Change Healthcare ransomware attack is projected to cost over a billion dollars. Three hundred bucks is the going rate for a SIM swap. PuTTY potentially reveals private keys. Cisco Talos reports a surge in brute-force attacks. Ivanti updates its MDM product. Omni Hotels & Resorts confirm a data breach. Financially motivated hackers target Businesses in Latin America with steganography. A prolific cryptojacker faces decades in prison. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey. The ransomware equivalent of a Saturday night special.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe discuss content and study strategies for Domain 2, Asset Security.
Resources:
Domain 2, Asset Security
Identify and securely provision information assets, establish handling requirements, manage the data lifecycle, and apply data security controls to comply with applicable laws.
2.1 Identify and classify information and assets
2.2 Establish information and asset handling requirements
2.3 Provision resources securely
2.4 Manage data lifecycle
2.5 Ensure appropriate asset retention (e.g., End-of-Life (EOL), End-of-Support (EOS))
2.6 Determine data security controls and compliance requirements
Are you studying for the CISSP exam, considering taking the test soon, or did you have an unsuccessful exam experience? Here are some CISSP exam pitfalls to avoid so that you’re confident and successful on exam day.
Selected Reading
Hackers Linked to Russia’s Military Claim Credit for Sabotaging US Water Utilities (WIRED)
T-Mobile, Verizon workers get texts offering $300 for SIM swaps (Bleeping Computer)
PuTTY SSH client flaw allows recovery of cryptographic private keys (Bleeping Computer)
Large-scale brute-force activity targeting VPNs, SSH services with commonly used login credentials (Talos Intelligence)
Ivanti Patches Two Critical Avalanche Flaws in Major Update (Infosecurity Magazine)
Omni Hotels confirms data compromise in apparent ransomware attack (SC Media)
Steganography Campaign Targets Global Enterprises (GovInfo Security)
Nebraska man allegedly defrauded cloud providers of millions via cryptojacking (The Record)
Ransomware attack has cost UnitedHealth $872 million; total expected to surpass $1 billion (The Record)
‘Junk gun’ ransomware: Peashooters can still pack a punch (Sophos News)
Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices