What the cybercriminals are up to: improving their tools and carrying out the same old dreary social engineering. Budworm APT sightings. And the state of Russias hybrid war.

Published: Oct. 13, 2022, 8:15 p.m.

Emotet ups its game. COVID-19 small business grants as phishbait. Google Translate is spoofed for credential harvesting. Research on the Budworm espionage group. Kevin Magee from Microsoft shares why cybersecurity professionals should join company boards. Our guest is Chris Niggel from Okta with a look at identity shortfalls. And Internet outages during missile strikes, and the prospects of Russia\u2019s hybrid war.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/11/197\n\nSelected reading.\nEmotote\u2019s evolution. (ESET)\nFresh Phish: Small Business COVID-19 Grants Designed for Disaster (INKY)\nSpoofing Google Translate to Steal Credentials (Avanan)\xa0\nBudworm: Espionage Group Returns to Targeting U.S. Organizations (Symantec Blog)\xa0\nInternet outages hit Ukraine following Russian missile strikes (Bitdefender)\nStarlink helped restore energy, communications infrastructure in parts of Ukraine - official (Reuters)\nUkraine\u2019s Vice PM Thanks Starlink for Help to Restore Connections After Missile Attack from Russia (Tech Times)\nWe must tackle Europe\u2019s winter cyber threats head-on (POLITICO)\nThe conflict in Ukraine makes us rethink cyberwar (The Japan Times)\nLearn more about your ad choices. Visit megaphone.fm/adchoices