meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

Ukraine evaluates Russia’s cyber ops. Smartphones go to war. Lilith ransomware. ChromeLoader evolves. Rolling-PWN looks real after all. Schulte guilty in Vault 7 case.

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 14 July 2022

⏱️ 30 minutes

🧾️ Download transcript

Summary

An overview of the cyber phase of Russia's hybrid war. Smartphones as sources of targeting information. Lilith enters the ransomware game. ChromeLoader makes a fresh appearance. Honda acknowledges that Rolling-PWN is real (but says it's not as serious as some think). Part two of Carole Theriault’s conversation with Jen Caltrider from Mozilla's Privacy Not Included initiative. Our guest is Josh Yavor of Tessian to discuss Accidental Data Loss Over Email. A guilty verdict in the Vault 7 case. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/134 Selected reading. Ukraine's Cyber Agency Reports Q2 Cyber-Attack Surge (Infosecurity Magazine) 2022 Q2 (SSSCIP) The weaponizing of smartphone location data on the battlefield (Help Net Security) New Lilith ransomware emerges with extortion site, lists first victim (BleepingComputer) A new ransomware operation has been launched under the name 'Lilith,' and it has already posted its first victim on a data leak site created to support double-extortion attacks. New Ransomware Groups on the Rise (Cyble) Cyble analyzes new ransomware families spotted in the wild led by notable examples such as LILITH, RedAlert, and 0Mega. New Lilith ransomware emerges with extortion site, lists first victim (BleepingComputer) New Ransomware Groups on the Rise (Cyble) Researchers Uncover New Variants of the ChromeLoader Browser Hijacking Malware (The Hacker News) ChromeLoader: New Stubborn Malware Campaign (Unit 42) Honda Admits Hackers Could Unlock Car Doors, Start Engines (SecurityWeek) Honda redesigning latest vehicles to address key fob vulnerabilities (The Record by Recorded Future) Statement Of U.S. Attorney Damian Williams On The Espionage Conviction Of Ex-CIA Programmer Joshua Adam Schulte (US Department of Justice) Ex-C.I.A. Engineer Convicted in Biggest Theft Ever of Agency Secrets (New York Times) Former CIA Staffer Convicted For Massive Data Breach To WikiLeaks (Forbes)

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the CyberWire Network, powered by N2K.

0:07.0

Today's episode is sponsored by SRM, your first call for cybersecurity and

0:18.1

investigations. Threats today are evolving faster than ever before and since 2005 SRM has pioneered

0:25.3

tailored security solutions for global corporations and their executives.

0:29.5

Whether it's defending against cyber attacks with their award-winning team of ethical hackers and incident response specialists,

0:36.4

or navigating the murky waters of compliance and ESG challenges,

0:40.9

SRMs, Insight and Straight straightforward advice will help you navigate complex risks

0:46.4

and emerge more resilient.

0:48.4

Their secret, a culture that nurtures the sharpest minds, giving them access to the newest technologies and the freedom

0:55.3

to solve problems in new ways, enabling them to craft simple effective solutions for your

1:01.4

unique cyber challenges.

1:03.7

Search your first call to discover how SRM can help your business. And now a word from our sponsor, Six Cents.

1:23.2

Six Cents provides award-winning cloud-based automated endpoint and vulnerability management solutions

1:29.5

to streamline IT and security operations. With its advanced platform, businesses gain complete visibility and control over their infrastructure, reducing IT and security risks, and optimizing operational efficiency.

1:43.0

With 6 cents, you'll get real-time alerts,

1:46.0

risk-based vulnerability prioritization and remediations,

1:49.0

and an intuitive automation and orchestration engine

1:52.0

so you can focus on your core business goals

1:55.0

confident in the knowledge that your enterprise is secure,

1:58.0

compliant and running smoothly.

2:00.0

Visit 6Cence.com

2:02.0

to learn why enterprises choose them. An overview of the cyber phase of Russia's hybrid war, smartphones as sources of targeting information,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.