meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

Cyber dimensions of Russia’s hybrid war against Ukraine. Hacktivists and cybercriminals choose sides. Lapsu$ releases NVIDIA and Samsung data (and says a victim hacked back).

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 7 March 2022

⏱️ 27 minutes

🧾️ Download transcript

Summary

Russian influence operations fail as few support Russia's war of aggression. Ukraine will become a "contributing participant" in NATO's CCDCOE. Ukrainian cyberattacks, and the marshaling of hacktivists. Russian cyberattacks: surprisingly restrained and unsurprisingly supported by criminal organizations like Conti. The FBI’s Bryan Vorndran joins us with insights on the work his team did on Sodinokibi. Rick Howard looks at vulnerability management. Lapsu$ gang releases data taken from NVIDIA and Samsung in separate extortion incidents. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/44 Selected reading. What Happened on Day 11 of Russia’s Invasion of Ukraine (New York Times) Putin says Ukraine's future in doubt as cease-fires collapse After temporary cease-fires break down, Putin threatens Ukraine’s government (AP NEWS) Ukraine to join NATO cyber defence centre as 'contributing participant' (Reuters) Putin Is Raising an Iron Firewall Around Russia (Bloomberg) Three reasons Moscow isn't taking down Ukraine's cell networks (POLITICO) Hacktivists Stoke Pandemonium Amid Russia’s War in Ukraine (Wired) DDoS hacktivism: A highly risky exercise (Avast) This Ukrainian cyber firm is offering hackers bounties for taking down Russian sites (The Record by Recorded Future) Ukraine Cyber Official: We Only Attack Military Targets (SecurityWeek) Volunteer Hackers Converge on Ukraine Conflict With No One in Charge (New York Times) Russia shares list of 17,000 IPs allegedly DDoSing Russian orgs (BleepingComputer) Ukraine's 'IT army' targets Belarus railway network, Russian GPS (Reuters) HawkEye 360 detects GPS interference in Ukraine (SpaceNews) Hackers are being forced to pick sides in the Russia-Ukraine war (KTVH) Nvidia allegedly hacks back (Avast) Credentials of 71,000 NVIDIA Employees Leaked Following Cyberattack (SecurityWeek) Leaked stolen Nvidia cert can code-sign Windows malware (Register) Hackers claim massive Samsung leak, including encryption keys and source code (Android Police) Lapsus$ group leaks 190GB of Samsung data, source code (Computing) Samsung’s secret data leaks after devastating cyberattack (SamMobile)

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the CyberWire Network, powered by N2K.

0:07.0

Today's episode is sponsored by SRM, your first call for cybersecurity and

0:18.1

investigations. Threats today are evolving faster than ever before and since 2005 SRM has pioneered

0:25.3

tailored security solutions for global corporations and their executives.

0:29.5

Whether it's defending against cyber attacks with their award-winning team of ethical hackers and incident response specialists,

0:36.4

or navigating the murky waters of compliance and ESG challenges,

0:40.9

SRMs, Insight and Straight straightforward advice will help you navigate complex risks

0:46.4

and emerge more resilient.

0:48.4

Their secret, a culture that nurtures the sharpest minds, giving them access to the newest technologies and the freedom

0:55.3

to solve problems in new ways, enabling them to craft simple effective solutions for your

1:01.4

unique cyber challenges.

1:03.7

Search your first call to discover how SRM can help your business. And now a word from our sponsor, Six Cents.

1:23.2

Six Cents provides award-winning cloud-based automated endpoint and vulnerability management solutions

1:29.5

to streamline IT and security operations. With its advanced platform, businesses gain complete visibility and control over their infrastructure, reducing IT and security risks, and optimizing operational efficiency.

1:43.0

With 6 cents, you'll get real-time alerts,

1:46.0

risk-based vulnerability prioritization and remediations,

1:49.0

and an intuitive automation and orchestration engine

1:52.0

so you can focus on your core business goals

1:55.0

confident in the knowledge that your enterprise is secure,

1:58.0

compliant and running smoothly.

2:00.0

Visit 6Cence.com

2:02.0

to learn why enterprises choose them. Russian influence operations fail as few support Russia's war of aggression.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.