In this episode, we spend way too much time discussing a specious article about how state sanctioned criminals don't actually present any unique methods of disruption, and then hop skip and jump to Lapsus$ for a few minutes.
This one ran too long, both for the State Sanctioned, and the hack on Axie Infinity (coming next week!) so we broke it into two episodes.
Article 1 - https://www.csoonline.com/article/3655075/leaked-hacker-logs-show-weaknesses-of-russia-s-cyber-proxy-ecosystem.html
Supporting Articles:
LEAKED CHATS SHOW RUSSIAN RANSOMWARE GANG DISCUSSING PUTIN’S INVASION OF UKRAINE
Article 2 - A Closer Look at the LAPSUS$ Data Extortion Group
Supporting Articles:
Trustwave’s Action Response: The Lapsus$ Hacker Group Shows Us the Importance of Securing the Digital Supply Chain
If you found this interesting or useful, please follow us on Twitter @serengetisec and subscribe and review on your favorite podcast app!
Hosted by David Schwendinger and Matthew Keener, welcome to the Security Serengeti! Please join us for our introductory episode where we take a look...
This weeks we discuss the UK's latest attempt to force backdoors into end to end encryption, India's 6 hour reporting mandate is a failure,...
In this episode, we deep dive into two articles, linked below.Ransomware gang urges victims’ customers to demand a ransom payment Experts fear that Biden’s...