In this episode, we spend way too much time discussing a specious article about how state sanctioned criminals don't actually present any unique methods of disruption, and then hop skip and jump to Lapsus$ for a few minutes.
This one ran too long, both for the State Sanctioned, and the hack on Axie Infinity (coming next week!) so we broke it into two episodes.
Article 1 - https://www.csoonline.com/article/3655075/leaked-hacker-logs-show-weaknesses-of-russia-s-cyber-proxy-ecosystem.html
Supporting Articles:
LEAKED CHATS SHOW RUSSIAN RANSOMWARE GANG DISCUSSING PUTIN’S INVASION OF UKRAINE
Article 2 - A Closer Look at the LAPSUS$ Data Extortion Group
Supporting Articles:
Trustwave’s Action Response: The Lapsus$ Hacker Group Shows Us the Importance of Securing the Digital Supply Chain
If you found this interesting or useful, please follow us on Twitter @serengetisec and subscribe and review on your favorite podcast app!
In this episode, we look at the accusation that North Korea was behind the Harmony Bridge hack, Twitter users behind fished by a devious...
In our continual search for the most useful Information Security Report, chock full of insight and wisdom, we review the Talos Inaugural Year In...
In this episode, we review some recent news articles that caught our eye, ranging from record breaking DDOS to avoiding burnout and invisible variables!...