
Episode #166 - Fake Proof of Concept for Zero Day Exploits, The Third SQL Vulnerability Related to Moveit Clop Ransomware Campaign Disclosed, Barracuda hack is the Chinese
It's 5:05! Daily cybersecurity and open source briefing
Audio is streamed directly from the publisher (dts.podtrac.com) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.
Show Notes
It's 5:05 on Monday, June 19th, 2023. From the Sourced Podcast Network in New York city, this is your host, Pokie Huang. Stories in today's episode come from Edwin Kwan in Sydney, Australia, Olimpiu Pop in Transylvania, Romania, Katy Craig in San Diego, California, Marcel Brown in St. Louis, Missouri.
Let's get to it.
Fake Proof of Concept for Zero Day Exploits used to Deliver Malware
🇦🇺 Edwin Kwan, Sydney, Australia ↗
Fake zero-day PoC exploits on GitHub push Windows, Linux malware
The Third SQL Vulnerability Related to Moveit Clop Ransomware Campaign Disclosed
🇷🇴 Olimpiu Pop, Transylvania, Romania ↗
Third MOVEit Transfer Vulnerability Disclosed by Progress Software
Exclusive: US government agencies hit in global cyberattack
Mass Exploitation of Zero-Day Bug in MOVEit File Transfer Underway
Brand-New Security Bugs Affect All MOVEit Transfer Versions
MOVEit Transfer Critical Vulnerability – CVE Pending (June 15, 2023) - Progress Community
Barracuda hack is the Chinese
🇺🇸 Katy Craig, San Diego, California ↗
Barracuda: Customers Must Replace Impacted Email Security Devices ‘Immediately’ | CRN
Chinese spies breached hundreds of public, private networks, security firm says - ABC News