Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/26/3c/30/263c3003-f19b-cb33-9291-14fa145e54fe/mza_72390587056937988.png/600x600bb.jpg
The Cybersecurity Digest
The Cybersecurity Digest LLC
14 episodes
1 month ago
In the ever-evolving world of cybersecurity, keeping updated on the latest developments is crucial. The Cybersecurity Digest is your curated source for the most recent cybersecurity updates. Our goal is to bring you a comprehensive roundup of news, ensuring you’re well-informed and ahead of the curve. Stay Informed to Stay Secure.
Show more...
Tech News
News
RSS
All content for The Cybersecurity Digest is the property of The Cybersecurity Digest LLC and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In the ever-evolving world of cybersecurity, keeping updated on the latest developments is crucial. The Cybersecurity Digest is your curated source for the most recent cybersecurity updates. Our goal is to bring you a comprehensive roundup of news, ensuring you’re well-informed and ahead of the curve. Stay Informed to Stay Secure.
Show more...
Tech News
News
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/44035588/357b95985333003f.png
Telegram EvilVideo, PlayRansomWare targets ESXi, and a North Korean Infiltration Attempt
The Cybersecurity Digest
19 minutes 23 seconds
1 year ago
Telegram EvilVideo, PlayRansomWare targets ESXi, and a North Korean Infiltration Attempt

Cybersecurity Digest for 24 July 2024

Today we discuss the following items:

Crowdstrike Stealer:
Threat Actor Uses Fake Recovery Manual to Deliver Unidentified Stealer (crowdstrike.com)

ESET’s EvilVideo Discovery
Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android (welivesecurity.com)

TrendMicro’s Playransomware Targeting ESXi:
New Play Ransomware Linux Variant Targets ESXi Shows Ties With Prolific Puma | Trend Micro (US)

Magneto Credit Card Theft Malware:
Attackers Abuse Swap File to Steal Credit Cards (sucuri.net)

Vulnerable Ad Injecting Driver:
HotPage: Story of a signed, vulnerable, ad-injecting driver (welivesecurity.com)

BreachForums DataLeak Exposes Members:
BreachForums v1 hacking forum data leak exposes members’ info (bleepingcomputer.com)

KnowBe4 North Korean Insider:
How a North Korean Fake IT Worker Tried to Infiltrate Us (knowbe4.com)

Vishing Attacks:
Whose Voice Is It Anyway? AI-Powered Voice Spoofing for Next-Gen Vishing Attacks | Google Cloud Blog

Huntress AsyncRAT Blog:
Fake Browser Updates Lead to BOINC Volunteer Computing Software | Huntress


CISA KEV Additions:
NVD - CVE-2024-39891 (nist.gov)
NVD - CVE-2012-4792 (nist.gov)


Music in order that it appears licensed via Artlist.io : 
Lizard by Captain Qubz
Feel The Air by Ikoliks


The Cybersecurity Digest
In the ever-evolving world of cybersecurity, keeping updated on the latest developments is crucial. The Cybersecurity Digest is your curated source for the most recent cybersecurity updates. Our goal is to bring you a comprehensive roundup of news, ensuring you’re well-informed and ahead of the curve. Stay Informed to Stay Secure.