meta_pixel
Tapesearch Logo
CyberWire Daily

FamousSparrow’s sneaky resurgence.

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 27 March 2025

⏱️ 30 minutes

🧾️ Download transcript

Summary

China’s FamousSparrow is back. A misconfigured Amazon S3 bucket exposes data from an Australian fintech firm. Researchers uncover a sophisticated Linux-based backdoor targeting industrial systems. Infiltrating the BlackLock Ransomware group’s infrastructure. Solar inverters in the security spotlight. Credential stuffing gets automated. CISA updates the Known Exploited Vulnerabilities catalog. The UK’s NCA warns of online groups involved in sadistic cybercrime and real-world violence. Authorities arrest a dozen  individuals linked to the now-defunct Ghost encrypted communication platform. Our guest is Tal Skverer, Research Team Lead from Astrix, discussing the OWASP NHI Top 10 framework. Remembering our friend Matt Stephenson.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest We are joined by Tal Skverer, Research Team Lead from Astrix, who is discussing the OWASP NHI Top 10 framework and how teams can use these as they implement NHIs into their systems. Selected Reading Chinese Spy Group FamousSparrow Back with a Vengeance, Targets US (Infosecurity Magazine) Aussie Fintech Vroom Exposes Thousands of Records After AWS Misconfiguration (HackRead) New Sophisticated Linux Backdoor Targets OT Systems via 0-Day RCE Exploit (GB Hackers) Blacklock Ransomware: A Late Holiday Gift with Intrusion into the Threat Actor's Infrastructure (Resecurity) Dozens of solar inverter flaws could be exploited to attack power grids (Bleeping Computer) Threat Actors Using Powerful Cybercriminal Weapon 'Atlantis AIO' to Automate Credential Stuffing Attacks (Cyber Security News) CISA Adds of Sitecore CMS Code Execution Vulnerability to List of Known Exploited Vulnerabilities (Cyber Security News) NCA Warns of Sadistic Online “Com” Networks (Infosecurity Magazine) 12 Cybercriminals Arrested Following Takedown of Ghost Communication Platform (Cyber Security News) Matt Stephenson remembrance (LinkedIn)  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at [email protected] to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the Cyberwire Network, powered by N2K.

0:12.0

Investigating is hard enough. Your tools shouldn't make it harder.

0:16.6

Maltigo brings all your intelligence into one platform and gives you curated data,

0:21.4

along with a full suite of tools to handle any digital investigation.

0:25.5

Plus, with on-demand courses and live training, your team won't just install the platform.

0:30.6

They'll actually use it and connect the dots so fast,

0:34.4

cybercriminals won't realize they're already in cuffs.

0:38.2

Maltigo is trusted by global law enforcement, financial institutions, and security teams worldwide.

0:44.3

See it in action now at Maltigo.com. China's famous Sparrow is back.

1:03.4

A misconfigured Amazon S3 bucket exposes data from an Australian fintech firm.

1:08.3

Researchers uncover a sophisticated Linux-based backdoor targeting industrial systems,

1:13.7

infiltrating the Blacklock ransomware group's infrastructure, solar inverters in the security

1:18.9

spotlight. Credential stuffing gets automated. SISA updates the known exploited vulnerabilities

1:24.3

catalog. The UK's NCAA warns of online groups involved in sadistic cybercrime and real-world

1:31.1

violence.

1:32.3

Authorities arrest a dozen individuals linked to the now-defunct ghost-encrypted communication

1:37.1

platform.

1:38.3

Our guest is Talsk Verer, research team lead from Asterix discussing the OASP NHA top 10 framework.

1:46.1

And remembering our friend Matt Stevenson.

2:00.4

It's Thursday, March 27, 2025.

2:03.5

I'm Dave Bittner, and this is your Cyberwire Intel briefing.

2:21.6

Thanks for joining us here today.

...

Transcript will be available on the free plan in -5 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.