Mirais new variant targets IoT devices. Volt Typhoon investigation continues. Hacktivism in Senegal. Lessons learned from Ukraine.

Published: May 30, 2023, 8:15 p.m.

New Mirai malware uses low-complexity exploits to expand its botnet in IoT devices. The latest on Volt Typhoon. DDoS hits government sites in Senegal. The Pentagon's cyber strategy incorporates lessons from Russia's war, while the EU draws lessons from Ukraine's performance against Russia. Joe Carrigan explains Mandiant research on URL obfuscation. Mr. Security Answer Person John Pescatore plays security whack-a-mole. And NoName disrupts a British airport.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/12/103\n\nSelected reading.\nOld Wine in the New Bottle: Mirai Variant Targets Multiple IoT Devices (Unit 42)\nUS officials believe Chinese hackers may still have access to key US computer networks (CNN)\nChinese state-sponsored hackers infiltrated U.S. naval infrastructure, secretary of the Navy says (CNBC)\nUS military intelligence also targeted by Chinese hackers behind critical infrastructure compromise (SC Magazine)\nSenegalese government websites hit with cyber attack (Reuters)\nDOD Transmits 2023 Cyber Strategy (US Department of Defense)\nFact Sheet: 2023 DOD Cyber Strategy (US Department of Defense)\nLessons from the war in Ukraine for the future of EU defence (European Union External Action)\nInvestigation Launched After London City Airport Website Hacked (Simple Flying)\nMaryland high school listed on Zillow for $42K in \u2018creative\u2019 senior prank (New York Post)\nLearn more about your ad choices. Visit megaphone.fm/adchoices