Mirai hits the honeypots. Medical device telemetry attacked. More on infostealers in the C2C market. Third-party risk management practices. Cyber skills gaps in the UK. SiegedSec hits NATO sites

Published: July 27, 2023, 8:15 p.m.

The Mirai botnet afflicts Tomcat. CardioComm services are downed by cyberattack. Uptycs calls infostealers \u201corganization killers" as related security incidents double in a year. Legacy third-party risk management practices meet with dissatisfaction. Cyber skill gaps reported in the UK's workforce. Our guest is George Prichici of OPSWAT with a look at a Microsoft Teams vulnerability. Our new Threat Vector segment features a conversation with David Moulton and Michael Sikorski on the potential threats from LLMs and AI.\xa0And SiegedSec hits NATO sites.\nOn this first segment of Threat Vector, Michael "Siko" Sikorski, CTO & VP of Engineering for Unit 42, joins host David Moulton to discuss LLMs & AI and the impacts to expect on social engineering, phishing, and more.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/12/142\n\nThreat Vector links.\nPalo Alto Networks Unit 42\n\nSelected reading.\nTomcat Under Attack: Exploring Mirai Malware and Beyond (Aquasec)\nCardioComm, a provider of ECG monitoring devices, confirms cyberattack downed its services (TechCrunch)\xa0\nDetecting the Silent Threat: 'Stealers are Organization Killers' (Uptycs)\nCyber security skills in the UK labour market 2023 (DSIT)\nNATO investigates alleged data theft by SiegedSec hackers (BleepingComputer)\nNATO investigating apparent breach of unclassified information sharing platform (CyberScoop)\xa0\nSiegedSec Compromise NATO (Cyberint)\nLearn more about your ad choices. Visit megaphone.fm/adchoices