
A look at the SideWinder APT. GoAnywhere vulnerability exploited in the wild. Ransomware rampant. Hacktivism in Russia’s hybrid war. Patch Tuesday notes.
CyberWire Daily
00:00
How to Deploy a Deception Strategy in an Enterprise Environment?
Betsy Carmelite: Deception tactics work by simulating critical infrastructures, services and configurations so that you get an attacker interacting with those false IT assets. She says if your leadership is not comfortable with a full robust deception strategy, consider possibly at least seating false administrative credentials to defend against that common threat factor. And now a word from our sponsor, SpyCloud, the Cybercrime Analytics Leader. Get SpyCloud's post-infection remediation guide outlining the seven steps for preventing a malware infection from becoming a full-blown ransomware incident.
Play episode from 23:54
Transcript


