Social engineering as a blunt instrumentalmost like swatting without the middleman.

Published: Oct. 27, 2023, 8:15 p.m.

Eastern European gangs overcome their reservations about working with anglophone criminals. Mirth Connect is vulnerable to a critical flaw. A look at a mercenary spyware strain. \u201cPepsiCo\u201d as phishbait. Ben Yelin explains the FCC\u2019s renewed interest in Net Neutrality. Our guest is Wade Baker from the Cyentia Institute with insights on measuring risk. And Europol thinks police should take a good look at quantum computing and law enforcement.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/12/206\n\nSelected reading.\nOcto Tempest crosses boundaries to facilitate extortion, encryption, and destruction (Microsoft Security)\nMGM Resorts hackers 'one of the most dangerous financial criminal groups\u2019 (Record)\nCritical Mirth Connect Vulnerability Could Expose Sensitive Healthcare Data (SecurityWeek)\xa0\nExamining Predator Mercenary Spyware (HYAS)\nFresh Phish: The Case of the PepsiCo Procurement Ploy (INKY)\xa0\nU.S. Tries New Tack on Russian Disinformation: Pre-Empting It (New York Times)\xa0\nESET APT Activity Report Q2\u2013Q3 2023 (We Live Security)\xa0\nRussian hackers claim takedown of WA\u2019s Transperth transport agency with DDoS attack (Cyber Daily)\xa0\nThe Second Quantum Revolution: The impact of quantum computing and quantum technologies on law enforcement (Europol Innovation Lab)\xa0\nLearn more about your ad choices. Visit megaphone.fm/adchoices