In this episode, we spend way too much time discussing a specious article about how state sanctioned criminals don't actually present any unique methods of disruption, and then hop skip and jump to Lapsus$ for a few minutes.
This one ran too long, both for the State Sanctioned, and the hack on Axie Infinity (coming next week!) so we broke it into two episodes.
Article 1 - https://www.csoonline.com/article/3655075/leaked-hacker-logs-show-weaknesses-of-russia-s-cyber-proxy-ecosystem.html
Supporting Articles:
LEAKED CHATS SHOW RUSSIAN RANSOMWARE GANG DISCUSSING PUTIN’S INVASION OF UKRAINE
Article 2 - A Closer Look at the LAPSUS$ Data Extortion Group
Supporting Articles:
Trustwave’s Action Response: The Lapsus$ Hacker Group Shows Us the Importance of Securing the Digital Supply Chain
If you found this interesting or useful, please follow us on Twitter @serengetisec and subscribe and review on your favorite podcast app!
This week we sat down to discuss how the Solarwinds breach was found 6 months earlier, but they couldn't get to the bottom of...
In this episode, we go deep down the paranoid rabbit hole to discuss what the government would do with facial recognition technology, and we...
Hosted by David Schwendinger and Matthew Keener, welcome to the Security Serengeti! Rather than look at the news this week, instead we take a...