LockBit picks a brawl with banks.

Published: June 26, 2024, 8:10 p.m.

LockBit drops files that may or may not be from the Federal Reserve. Progress Software patches additional flaws in MOVEit file transfer software. A popular polyfil open source library has been compromised. DHS starts staffing up its AI Corps. Legislation has been introduced to evaluate the manual operations of critical infrastructure during cyber attacks. Researchers discover a new e-skimmer targeting CMS platforms. A breach at Neiman Marchus affects nearly 65,000 people. South African health services grapple with ransomware amidst a monkeypox outbreak.\xa0 Medusa is back. On the Learning Layer, Sam and Joe discuss the CISSP's CAT format and how to walk into test day with confidence. The VA works to clear the backlog caused by the ransomware attack onChange Healthcare.\nOur 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.\nMiss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you\u2019ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.\n\nCyberWire Guest\nOn our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K\u2019s comprehensive CISSP training course, which includes a simulated Computer Adaptive Test (CAT) final exam.\nSam and Joe discuss the CISSP's CAT format and how to walk into test day with confidence. Good luck Joe!\n\nSelected Reading\nLockbit Leaks Files for Evolve Bank & Trust in Its Alleged \u2018Federal Reserve\u2019 Data Dump (Metacurity)\nProgress Software warns of new vulnerabilities in MOVEit Transfer and MOVEit Gateway (Cyber Daily)\nPolyfill supply chain attack hits 100K+ sites (Sansec)\nExclusive: DHS hires first 10 AI Corps members (Axios)\nUS House bill seeks to assess manual operations of critical infrastructure during cyber attacks (Industrial Cyber)\nCaesar Cipher Skimmer targets popular CMS used by e-stores (Security Affairs)\nNeiman Marcus confirms breach. Is the customer data already for sale? (Malwarebytes)\nSouth Africa\u2019s national health lab hit with ransomware attack amid mpox outbreak (The Record)\nNew Medusa malware variants target Android users in seven countries (Bleeping Computer)\nAfter Crippling Ransomware Attack, VA Is Still Dealing with Fallout, Trying to Pay Providers (Military.com)\n\nShare your feedback.\nWe want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.\xa0\n\nWant to hear your company in the show?\nYou too can reach the most influential leaders and operators in the industry. Here\u2019s our media kit. Contact us at cyberwire@n2k.com to request more info.\nThe CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. \xa9 N2K Networks, Inc.\nLearn more about your ad choices. Visit megaphone.fm/adchoices