– www.bleepingcomputer.com: New ‘Meow’ attack has deleted almost 4,000 unsecured databases– us-cert.cisa.gov: Alert (AA20-209A) | Potential Legacy Risk from Malware Targeting QNAP NAS Devices
– www.theregister.com: If you own one of these 45 Netgear devices, replace it: Firm won’t patch vulnerable gear despite live proof-of-concept code
– threatpost.com: Lazarus Group Brings APT Tactics to Ransomware
– www.mcafee.com: McAfee Defender’s Blog: Operation North Star Campaign
– arstechnica.com: New flaw neuters Secure Boot, but there’s no reason to panic. Here’s why
– www.bleepingcomputer.com: Zoom bug allowed attackers to crack private meeting passwords
– www.reuters.com: EU sanctions Russian intelligence, North Korean, Chinese firms over alleged cyberattacks
– www.justice.gov: Massachusetts Man Sentenced for Illegally Retaining Classified National Defense Information Regarding U.S. Military Programs
– rackcdn.com: Private Industry Notification | Cyber Actors Exploiting Built-In Network Protocols to Carry Out Larger, More Destructive Distributed Denial of Service Attacks (PDF)
– www.federaltimes.com : Will COVID finally kick-start federal telework efforts?
—
This episode is sponsored by
· Anchor: The easiest way to make a podcast. https://anchor.fm/app
—
Send in a voice message: https://anchor.fm/professor-cyber-risk/message
Support this podcast: https://anchor.fm/professor-cyber-risk/support