- VMware Product Release Tracker (vTracker)
- VMware Product Release Tracker (vTracker)
- VMware Product Release Tracker (vTracker)
- If your AI-generated code becomes faulty, who faces the most liability exposure?
- These discoutned earbuds deliver audio so high quality, you'll forget they're mid-range
Part 1: Guarding against sophisticated threats: Strategies for your best defense
In the second episode of Threat Vector, Kristopher Russo, senior threat researcher at Unit 42, and David Moulton, discuss the threat landscape and take a deeper dive into the intricate workings of Muddled Libra (related to Scattered Spider and Scatter Swine). This formidable threat group poses significant challenges to telecommunications, technology and software automation industries.
Russo explains how Muddled Libra works, with a few distinguishing traits. Muddled Libra employs legitimate persistence tools from trusted vendors to fly under the radar to target firms with access to high-value cryptocurrency holders. The type of data Muddled Libra is after is also highly specific — and they are very persistent in finding it.
Muddled Libra has a signature move: exploit the 0ktapus phishing kit to craft believable authentication pages and manipulate victims through social engineering. What are some actionable steps businesses can take to safeguard the cyber environment? Tune in and stay updated.
Threat Vector provides insights that are both enlightening and cautionary. Still, these summaries only scratch the surface of the expert perspectives in the full podcast episodes. CISOs, C-level executives or anyone with a vested interest in safeguarding the digital world can benefit from subscribing to the Unit 42 Threat Vector podcast. Discover firsthand the invaluable knowledge, strategies and real-world stories cybersecurity experts share.
Threat Vector is your compass in the world of cybersecurity. Listen to all current segments on Unit 42 YouTube channel and Spotify.