TCW Episode 8: It just got muddy
Listen now
Description
An attack has caught many wondering what is next and what is safe for all of us who are near the borders for an attack. Like and subscribe on all podcast applications and YouTube. Source for the attack(MuddyWater) https://thehackernews.com/2023/12/iranian-hackers-using-muddyc2go-in-new.html?m=1 https://www.scmagazine.com/brief/muddywater-targets-african-telecommunications-companies https://therecord.media/muddywater-cyber-espionage-africa-telecoms-iran   Source for the group(MuddyWater) https://attack.mitre.org/groups/G0069/ Technical deep dive (with IOC's) https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/iran-apt-seedworm-africa-telecoms Like and Follow our LinkedIn page https://www.linkedin.com/company/thecyberweekly Follow Deogratius Okello https://www.linkedin.com/in/deo-okello/ Follow Josephine Olok  https://www.linkedin.com/in/josephine-olok/    
More Episodes
Show Notes Follow Mudathir  https://www.linkedin.com/in/mudathir-abdulbareu-273983232   Like and Follow our LinkedIn page https://www.linkedin.com/company/thecyberweekly   Like and Follow our X page https://twitter.com/thecyberweekly   Follow Deogratius...
Published 11/23/24
Published 11/23/24
Show Notes  Zip files https://www.bleepingcomputer.com/news/security/hackers-now-use-zip-file-concatenation-to-evade-detection/   Remcos RAT  https://thehackernews.com/2024/11/cybercriminals-use-excel-exploit-to.html   Like and Follow our LinkedIn...
Published 11/14/24