Microsoft Exchange zero-days exploited. Supply chain attack reported. New Lazarus activity. Mexican government falls victim to hacktivism. Hacking partial mobilization. Former insider threat.

Published: Oct. 3, 2022, 9:15 p.m.

Two Microsoft Exchange zero-days exploited in the wild. A supply chain attack, possibly from Chinese intelligence services. There\u2019s new Lazarus activity: bring-your-own-vulnerable-driver. The Mexican government falls victim to apparent hacktivism. Flying under partial mobilization\u2019s radar. Betsy Carmelite from Booz Allen Hamilton talks about addressing the cyber workforce skills gap. Our guest Rachel Tobac from SocialProof Security brings a musical approach to security awareness training. How\u2019s your off-boarding program working out?\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/11/190\n\nSelected reading.\nMicrosoft Releases Guidance on Zero-Day Vulnerabilities in Microsoft Exchange Server (CISA)\xa0\nCustomer Guidance for Reported Zero-day Vulnerabilities in Microsoft Exchange Server (Microsoft Security Response Center)\nWarning: New attack campaign utilized a new 0-day RCE vulnerability on Microsoft Exchange Server (GTSC)\nURGENT! Microsoft Exchange double zero-day \u2013 \u201clike ProxyShell, only different\u201d (Naked Security)\nMicrosoft confirms two Exchange Server zero days are being used in cyberattacks (The Record by Recorded Future)Microsoft confirms new Exchange zero-days are used in attacks (BleepingComputer)\xa0\nTwo Microsoft Exchange zero-days exploited in the wild. (CyberWre)\xa0\nCISA Adds Three Known Exploited Vulnerabilities to Catalog (CISA)\nSuspected Chinese hackers tampered with widely used customer chat program, researchers say (Reuters)\nReport: Commercial chat provider hijacked to spread malware in supply chain attack (The Record by Recorded Future)\xa0\nCrowdStrike Falcon Platform Identifies Supply Chain Attack via a Trojanized Comm100 Chat Installer (crowdstrike.com)\nAmazon\u2011themed campaigns of Lazarus in the Netherlands and Belgium (WeLiveSecurity)\nLazarus & BYOVD: evil to the Windows core (Virus Bulletin)\nLazarus hackers abuse Dell driver bug using new FudModule rootkit (BleepingComputer)\nMexican government suffers major data hack, president's health issues revealed (Reuters)\nMexican president confirms \u2018Guacamaya\u2019 hack targeting regional militaries (The Record by Recorded Future)\nAnalysis: Mexico data hack exposes government cybersecurity vulnerability (Reuters)\nRussians dodging mobilization behind flourishing scam market (BleepingComputer)\xa0\nHonolulu Man Pleads Guilty to Sabotaging Former Employer\u2019s Computer Network (US Department of Justice)\nLearn more about your ad choices. Visit megaphone.fm/adchoices