The US and Israel attribute attacks on PLCs to Iran. Agent Raccoon backdoors organizations on three continents. XDSpy is reported to be phishing the Russian defense sector. Trends in digital banking fraud. Repojacking Go module repositories. Ann Johnson from Afternoon Cyber Tea speaks with Lynn Dohm, executive director of WiCyS, about the power of diverse perspectives. And when it comes to security, don't look to the stars.
Guest is Ann Johnson from Afternoon Cyber Tea talking with Lynn Dohm, executive director of WiCyS, about the power of diverse perspectives. Tune in to Microsoft Security’s Afternoon Cyber Tea podcast every other Tuesday on the N2K Network. You can hear Ann’s full interview with Lynn here.
For links to all of today's stories check out our CyberWire daily news briefing:
IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including U.S. Water and Wastewater Systems Facilities (CISA)
Water and Wastewater Cybersecurity (CISA)
P2Pinfect - New Variant Targets MIPS Devices (Cado)
New Tool Set Found Used Against Organizations in the Middle East, Africa and the US (Palo Alto Networks Unit 42)
XDSpy hackers attack military-industrial companies in Russia (The Record)
Mobile Emulators Eclipse Bots in 2023 as Preferred Fraud Vector in North America (PR Newswire)
Hijackable Go Module Repositories (VulnCheck)