DiscoverTalion Threat Set Radio
Claim Ownership
Talion Threat Set Radio
Author: Talion Threat Intelligence Team
Subscribed: 6Played: 104Subscribe
Share
© 2024 Talion Threat Set Radio
Description
Talion Threat Set Radio is your weekly cyber threat intelligence bulletin. We cut through the noise to give you our honest opinion on the threat news that matters.
171 Episodes
Reverse
Twilio breach allowed attackers access to Okta single use sign on codes.Raspberry Robin USB malware linked to EvilCorp via Dridex similarities.Ransomware written in more obscure languages trend continues with Golang based “Agenda”
LockBit ransomware admin is named and sanctioned.North Korean actors exploiting weak DMARC policies for spearphishing.Ivanti flaws chained together to drop Mirai botnet.
Developers targeted with Python backdoor during false job interviews.New UK law now in effect limits default passwords on smart devices.New malware emerges targeting small office and home routers.
MITRE breached using two Ivanti zero days.CrushFTP victim of targeted zero day exploitation.ArcaneDoor campaign targets vulnerable Cisco devices.
Large scale exploitation of Palo Alto CVE following PoC disclosures.Atlassian vulnerability leveraged to deploy Cerber ransomware.PuTTY flaw can be used to obtain private cryptographic keys.
Warnings issued regarding 10/10 CVSS score Rust vulnerability.Researchers speculate LLM wrote Powershell for malware strain.Change Healthcare hit by ransom demand again following AlphV exit scam.
Sophisticated supply chain attack attempted against multiple Linux distros.Linux false Sudo prompt flaw has persisted for over a decade.DinodasRAT now targeting Linux servers with new variant.
Huge darknet marketplace seized by German takedown effort.Muddywater group using legitimate RM tools for access.APT31 members sanctioned following US infrastructure attacks.
Fujitsu discover malware compromised systems.Russian actors may be targeting Ukrainian telecoms with new wiper malware.New DoS technique discovered able to create infinite feedback loop.
Russian groups accesses Microsoft source code in follow up from January attack.StopCrypt, the ransomware still targeting individuals over business has been upgraded.DarkGate leverage recent SmartScreen vulnerability in attacks.
The Blackcat / AlphV ransomware operation fakes law enforcement takedown to steal from their own affiliate.
LockBit claims swift recovery from takedown operation, downplaying severity and threatening leaks.Lazarus exploit Windows zero day flaw with new improved Rootkit.
DoJ takes down botnet used by Russian state group.LockBit ransomware operation gutted by the NCA.ScreenConnect under active attack, Lockbit utilised.
Microsoft confirms details of recent Russian compromise.Kasseika joins ransomware groups performing BYOVD attacks.Trickbot browser injection developer jailed.
VMware critical flaw under active exploitation.Critical vulnerability discovered in Juniper firewalls and switches.Ivanti bypass flaw exploited in the wild.
Evasive Async RAT has targeted infrastructure for almost a year.New FBot toolkit targets SaaS and cloud platforms.Turkish group uses Mimic ransomware to target MSSQL servers.
Critical Invanti flaw allows compromise of enrolled devices.Multiple malware strains use Google feature for persistence.Microsoft disables MSIX after it is abused by malware again.
Rhadamanthys infostealer gains popularity with new features.MongoDB confirms breach and theft of customer data.FBI confirms it breached the Blackcat ransomware group.
AlphV ransomware outage rumored to be caused by FBI.New "Pool Party" injection technique evades 5 leading EDR solutions.Lazarus continues to abuse Log4J with 3 new malware strains.
NCSC warns of Russian state group social engineering activity.Okta customers affected by recent attack revised from 1% to 100%.Researchers discover Linux rootkit RAT undetected since 2021.