Episode 88: Firmware, Fraud, and Federal Fumbles
Links https://www.wral.com/news/education/threat-actor-claims-to-have-nc-student-data-may-2025 https://www.wral.com/story/a-hacker-s-ransom-inside-the-cyberattack-that-compromised-nc-student-and-teacher-records/21989281 https://thehackernews.com/2025/05/breaking-7000-device-proxy-botnet-using.html https://www.bleepingcomputer.com/news/security/magento-supply-chain-attack-compromises-hundreds-of-e-stores https://www.washingtonpost.com/technology/2025/05/06/signal-archive-cybersecurity-waltz-wyden https://www.washingtonpost.com/politics/2025/05/01/waltz-signal-app-photo-cabinet https://en.wikipedia.org/wiki/United_States_government_group_chat_leaks PowerSchool Breach: When ‘Delete’ Doesn’t Mean Gone When Your Toaster Joins a Cybercrime Ring The Phantom Backdoor: Six Years of Silent Sabotage The TeleMessage Debacle in Government Communications Develop an incident response plan to address security breaches swiftly. This includes identifying the breach, containing it, notifying affected…
Read More
Recent Comments