Article 5? Its complicated. Influence ops for economic advantage. SOHO routers under attack. YTStealer described. RansomHouse hits AMD. A NetWalker affiliate cops a plea.

Published: June 29, 2022, 8:30 p.m.

NATO's response to Killnet's cyberattacks on Lithuania. Influence operations in the interest of national market share. SOHO routers are under attack. YTStealer is out and active in the wild. RansomHouse hits AMD. CISA releases six ICS security advisories. The most dangerous software weaknesses. Betsy Carmelite from Booz Allen Hamilton takes a look back at Biden\u2019s executive order on cyber. Our guest is Philippe Humeau of CrowdSec on taking a collaborative approach to security. And a guilty plea in the case of the NetWalker affiliate.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/11/124\n\nSelected reading.\nCould the Russian cyber attack on Lithuania draw a military response from NATO? (Sky News)\xa0\nPro-PRC DRAGONBRIDGE Influence Campaign Targets Rare Earths Mining Companies in Attempt to Thwart Rivalry to PRC Market Dominance (Mandiant)\nZuoRAT Hijacks SOHO Routers to Silently Stalk Networks (Lumen)\xa0\nNew YTStealer Malware Aims to Hijack Accounts of YouTube Content Creators (Hacker News)\nRansomHouse Extortion Group Claims AMD as Latest Victim (RestorePrivacy)\xa0\nRansomHouse gang claims to have some stolen AMD data (Register)\nCISA releases 6 Industrial Control Systems Advisories (Cybersecurity and Infrastructure Security Agency)\n2022 CWE Top 25 Most Dangerous Software Weaknesses (CISA)\xa0\nNetwalker ransomware affiliate agrees to plead guilty to hacking charges (The Record by Recorded Future)\nLearn more about your ad choices. Visit megaphone.fm/adchoices