650 - Truque de engenharia social é usado em ataques com o Lumma Stealer
Description
[Referências do Episódio]
[TREND MICRO NO FORRESTER] - https://www.trendmicro.com/explore/forrester-wave-xdr/01054-v1-en-www
Tricks and Treats: GHOSTPULSE’s new pixel- level deception - https://www.elastic.co/security-labs/tricks-and-treats
Unmasking Lumma Stealer : Analyzing Deceptive Tactics with Fake CAPTCHA - https://blog.qualys.com/vulnerabilities-threat-research/2024/10/20/unmasking-lumma-stealer-analyzing-deceptive-tactics-with-fake-captcha
New Bumblebee Loader Infection Chain Signals Possible Resurgence - https://www.netskope.com/blog/new-bumblebee-loader-infection-chain-signals-possible-resurgence
F5 fixed a high-severity elevation of privilege vulnerability in BIG-IP - https://securityaffairs.com/170022/security/f5-patches-big-ip-elevation-of-privilege-bug.html
ESET partner breached to send data wipers to Israeli orgs - https://www.bleepingcomputer.com/news/security/eset-partner-breached-to-send-data-wipers-to-israeli-orgs/
Analysis of the Crypt Ghouls group: continuing the investigation into a series of attacks on Russia - https://securelist.com/crypt-ghouls-hacktivists-tools-overlap-analysis/114217/
Roteiro e apresentação: Carlos Cabral e Bianca Oliveira
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia