This podcast will give you a summary of the latest news related to cyber intelligence and proactive cyber security in only a few minutes.
The podcast is aimed at professionals who are short on time, or for anyone who would like to know a bit more about what is REALLY happening out there in the cyber world.
The focus of this podcast will be on the latest cyber events for non-technical people; anyone can listen and understand.
Some of the best ways for hackers to hide their identity is by looking like they are some one else, recent example that made public lately by the UK’s National Cyber Security Centre after a two-year probe, The so-called Turla group, which has been linked with Russian intelligence, allegedly hijacked the tools of Oilrig, a group widely linked to the Iranian ministry of Intelligence which is part of the Iranian government, also known as APT34, we covered them in different podcast discussing the patriot hackers from lab dokhtegan.
The fact that russia had close access to the hackers group allowed them to initiate their own attacks, under the cover of APT34.
The Russian group then progressed to initiating their own attacks using Oilrig’s command-and-control infrastructure and software. Organisations in approximately 20 countries were successfully hacked in this way.
This was officially published on leading outlet called the Financial Times.
The Kremlin did not respond to a request for comment from the Financial Times. Russia’s government has consistently denied it is behind hacking attempts on other states.
Another example is from the Winter Olympics that took place in South Korea.
US intelligence agencies were reported to have uncovered the fact that Russian hackers had attempted to disrupt the Winter Olympics in Pyeongchang, South Korea, using lines of code associated with Lazarus Group, attributed to North Korea.
That’s it for this podcast, stay safe and see you in the next podcast.Don’t forget to visit www.cybercure.ai for the latest podcasts on cyber intelligence.