In this episode, we spend way too much time discussing a specious article about how state sanctioned criminals don't actually present any unique methods of disruption, and then hop skip and jump to Lapsus$ for a few minutes.
This one ran too long, both for the State Sanctioned, and the hack on Axie Infinity (coming next week!) so we broke it into two episodes.
Article 1 - https://www.csoonline.com/article/3655075/leaked-hacker-logs-show-weaknesses-of-russia-s-cyber-proxy-ecosystem.html
Supporting Articles:
LEAKED CHATS SHOW RUSSIAN RANSOMWARE GANG DISCUSSING PUTIN’S INVASION OF UKRAINE
Article 2 - A Closer Look at the LAPSUS$ Data Extortion Group
Supporting Articles:
Trustwave’s Action Response: The Lapsus$ Hacker Group Shows Us the Importance of Securing the Digital Supply Chain
If you found this interesting or useful, please follow us on Twitter @serengetisec and subscribe and review on your favorite podcast app!
This week we discuss company surveillance via JP Morgan Chase, and then the sentences handed down for the CSO of Uber and an Engineer...
Hosted by David Schwendinger and Matthew Keener, welcome to the Security Serengeti! Please join us for our introductory episode where we take a look...
In this episode we review Attack Surface Monitoring, discuss what it is and what you should look at if you're reviewing products. Related Webcast...