Unveiling the Shadow Strike: A zero-day assault on Ivanti VPN users.

Published: Jan. 11, 2024, 9:10 p.m.

A zero-day hits Ivanti VPN customers. CISA highlights an active MS Sharepoint Server flaw. Cisco patches a critical vulnerability. Atomic Stealer gets updates. Sensitive school emergency planning documents are exposed online. The FCC reports on risky communications equipment. The White House will introduce new cybersecurity requirements for hospitals. Mandiant explains their X-Twitter hack. Our guest is Palo Alto Networks\u2019 Unit 42\u2019s David Moulton, host of the new Threat Vector podcast. And we are shocked - shocked! - to learn that an online sex for money scheme is a scam.\xa0\nRemember to leave us a 5-star rating and review in your favorite podcast app.\nMiss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you\u2019ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.\n\nCyberWire Guest\nGuest David Moulton from Palo Alto Networks joins us to talk about Threat Vector. It\u2019s Unit 42\u2019s segment turned podcast on the N2K media network.\n\nSelected Reading\nIvanti customers urged to patch vulnerabilities allegedly exploited by Chinese state hackers (The Record)\nCISA Urges Patching of Exploited SharePoint Server Vulnerability (SecurityWeek)\nCritical Cisco Unity Connection flaw gives attackers root privileges. Patch now! (CVE-2024-20272) (Help Net Security)\nAtomic Stealer Gets an Upgrade - Targeting Mac Users with Encrypted Payload (The Hacker News)\nFCC's Reimbursement Program shows progress in removing national security risks from communication networks (Industrial Cyber)\nAfter Barrage of Hacks, Hospitals Will Face New Federal Cybersecurity Rules Tied to Funding (The Messenger)\nUS School Shooter Emergency Plans Exposed in a Highly Sensitive Database Leak (WIRED)\nMandiant\u2019s X Account Was Hacked in Brute-Force Password Attack (Infosecurity Magazine)\nBelieving they would be paid a fortune for having sex with women, hundreds of Indian men scammed out of cash \xa0(Graham Cluely)\n\nThreat Vector Links.\nTo get more information on Medusa ransomware, listen to this episode of Threat Vector. \n\nShare your feedback.\nWe want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.\xa0\n\nWant to hear your company in the show?\nYou too can reach the most influential leaders and operators in the industry. Here\u2019s our media kit. Contact us at cyberwire@n2k.com to request more info.\nThe CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. \xa9 2023 N2K Networks, Inc.\nLearn more about your ad choices. Visit megaphone.fm/adchoices