In this week's episode, we discuss indicted Chinese hackers, more lawyer discussion and backups. Test your backups. TEST THEM.
Article 1 - US Accuses China of Using Criminal Hackers in Cyber Espionage Operations
Supporting Articles:
Four Chinese Nationals Working with the Ministry of State Security Charged with Global Computer Intrusion Campaign Targeting Intellectual Property and Confidential Business Information, Including Infectious Disease Research
US and Global Allies Accuse China of Massive Microsoft Exchange Attack
US, EU, UK, NATO blame china for “reckless” Exchange attacks
Biden administration, US allies condemn China's malicious hacking, espionage actions
US charges four suspected Chinese spies who coordinated APT40 hackers
Chinese State-Sponsored Cyber Operations: Observed TTPs
Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China’s MSS Hainan State Security Department
JCAT Intelligence Guide for First Responders
Major foreign holders of U.S. treasury securities as of March 2020
Article 2 - Law Firm for Ford, Pfizer, Exxon Discloses Ransomware Attack
Supporting Articles:
Campbell Conroy & O'Neil Provides Notice of Data Privacy Incident
Quantifying the Costs of Data Breaches
Article 3 - Don’t Wanna Pay Ransom Gangs? Test Your Backups.
Updates mentioned at the end:
NSO Says ‘Enough Is Enough,’ Will No Longer Talk to the Press About Damning Reports
Kaseya Gets Universal Decryptor to Help REvil Ransomware Victims
As always, please subscribe on your favorite podcast app, and rate and review so that other people will come to know and love us as much as our mothers do
In this episode, we discuss Cloudflare IP's being banned in Austria due to overzealous Copyright enforcement, how attackers are moving off of Cobalt Strike...
In this episode we review and discuss a book that was nominated to the Cybersecurity Canon, but not accepted - Daemon by Daniel Suarez....
In this week's episode, we discuss Vendor Security Questionnaire's, Ransomware payment disclosure, Why does SIEM still suck, and finally, vulnerability scanning for just ransomware. ...