
Update on Chinese cyberespionage incident. ICS vulnerabilities. USB attacks. New KEVs. Updates from Russia's hybrid war, as hacktivists swap DDoS attacks and observers draw lessons learned.
CyberWire Daily
00:00
The Importance of Threat Modeling
Professor of Vice-Rishi: Development teams should regularly evaluate threat models. SpyCloud's post-infection remediation guide outlines the seven steps for preventing a malware infection from becoming a full-blown ransomware incident. Be sure to check out this weekend's research Saturday and my conversation with Michael Clark from Sysdig on scarletil 2.0, Fargate, Kubernetes and crypto.
Play episode from 26:26
Transcript


