
Episode #155 - Exploitation of MOVEit Transfer Zero Day, iOS Triangulation Cyberattack, BrutePrinting
It's 5:05! Daily cybersecurity and open source briefing
Audio is streamed directly from the publisher (dts.podtrac.com) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.
Show Notes
Hey. It's 5:05 on Friday, June 2nd, 2023. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from Edwin Kwon in Sydney, Australia, Mark Miller in Ann Arbor, Michigan, Katy Craig in San Diego, California, Marcel Brown in St. Louis, Missouri.
Let's get to it.
Active Exploitation of MOVEit Transfer Zero Day
🇦🇺 Edwin Kwan, Sydney, Australia ↗
MOVEit Transfer Critical Vulnerability (May 2023) - Progress Community
New MOVEit Transfer zero-day mass-exploited in data theft attacks
Rapid7 Observed Exploitation of Critical MOVEit Transfer Vulnerability
iOS Triangulation Cyberattack
🇺🇸 Mark Miller, Ann Arbor, Michigan↗
Eugene Kasperskey on Twitter: https://twitter.com/e_kaspersky/status/1664263801490014208
Operation Triangulation: Operation Triangulation: iOS devices targeted with previously unknown malware | Securelist
BrutePrinting
🇺🇸 Katy Craig, San Diego, California ↗
[2305.10791] BrutePrint: Expose Smartphone Fingerprint Authentication to Brute-force Attack
New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force
This Day in Tech History
🇺🇸 Marcel Brown, St. Louis, Missouri ↗