Hackers strike LiteSpeed cache again.

Published: Aug. 23, 2024, 8:10 p.m.

The exploitation of the LiteSpeed Cache Wordpress plugin has begun. Halliburton confirms a cyberattack. Velvet Ant targets Cisco Switch appliances. The Qilin ransomware group harvests credentials stored in Google Chrome. Ham radio enthusiasts pay a million dollar ransom. SolarWinds releases a hotfix to fix a hotfix. A telecom company will pay a million dollar fine over President Biden deepfakes. The Justice Department is suing the Georgia Institute of Technology and an affiliated company for allegedly failing to meet required cybersecurity standards for Pentagon contracts. Today\u2019s guest is Dustin Moody, mathematician at NIST, speaking with N2K's Brandon Karpf about post-quantum encryption standards.\xa0 When it comes to phishing simulations, sometimes the cure is scarier than the disease.\nMiss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you\u2019ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.\n\nCyberWire Guest\nToday\u2019s guest Dustin Moody, mathematician at NIST, talks with N2K's Brandon Karpf about their first 3 finalized post-quantum encryption standards. You can hear more of Brandon and Dustin\u2019s conversation as they go into more detail on the individual standards on Sunday in our Special Edition podcast. Stay tuned.\xa0\nYou can read more on the newly-released standards here. Want to learn more about what post-quantum cryptography is? Check out this resource from NICE.\xa0\n\nSelected Reading\nHackers are exploiting critical bug in LiteSpeed Cache plugin (Bleeping Computer)\nOil industry giant Halliburton confirms 'issue' following reported cyberattack (The Record)\nChina-Nexus Threat Group \u2018Velvet Ant\u2019 Exploits Zero-Day on Cisco Nexus Switches (Sygnia)\nQilin ransomware now steals credentials from Chrome browsers (Bleeping Computer)\nARRL IT Security Incident - Report to Members (ARRL: The National Association for Amateur Radio)\nSolarWinds Leaks Credentials in Hotfix for Exploited Web Help Desk Flaw (SecurityWeek)\nTelecom company hit with $1 million penalty over AI-generated fake Biden robocalls (The Record)\nDOJ sues Georgia Tech over allegedly failing to meet cyber requirements for DOD contracts (CyberScoop)\nUni phishing test based on fake Ebola scare prompts apology (The Register)\n\nShare your feedback.\nWe want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.\xa0\n\nWant to hear your company in the show?\nYou too can reach the most influential leaders and operators in the industry. Here\u2019s our media kit. Contact us at cyberwire@n2k.com to request more info.\nThe CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. \xa9 N2K Networks, Inc.\nLearn more about your ad choices. Visit megaphone.fm/adchoices