NIST SP 800-53 updated. Attack on Scotland Parliament's email system. Consequences of Equation Group leaks. "Mr. Smith" and HBO. Attacks of note: Trickbot, OLE exploits, NetSarang backdoor. Extremist inspiration. BEC.

Published: Aug. 16, 2017, 5:21 p.m.

In today's podcast, we hear about\xa0a new draft of NIST SP 800-53. There's been\xa0an attempt to brute-force\xa0email credentials in\xa0Scotland's Parliament. Fancy Bear's romp through high-end hotel Wi-Fi suggests the Equation Group leaks will be with us for some time. "Mr. Smith" remains at large, and still wants to be paid.\xa0Trickbot\xa0uses unusually convincing counterfeit sites. PowerPoint malware vectors may be part of a criminal test.\xa0NetSarang\xa0urges swift patching of a backdoor in its software. Extremist inspiration persists.\xa0\xa0Ben Yelin from UMD CHHS on privacy concerns with robot vacuum cleaners.\xa0Guest is Jeff Pederson from Kroll Ontrack, a data recovery firm, with tips on data\xa0recovery.And\xa0some guy in Nigeria with more moxie than skills is behind a big business email compromise campaign.\n Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.\n If you\u2019d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference,\xa0check out E8\u2019s white paper.\n Your patient data depends on incident response plans.\xa0Prepare with DeltaRisk's webinar.\n Domain Tools leverages both human and machine intelligence to expose malicious infrastructure.\xa0Learn more in their white paper.\n \xa0\nLearn more about your ad choices. Visit megaphone.fm/adchoices