Home Artists Posts Import Register

Content

Ransomware-ridden Florida cities are paying up, insulin pumps are vulnerable to potentially deadly wireless hacks, and Chronicle joins Google cloud! All that coming up now on ThreatWire. #threatwire #hak5


Links:

Support me on alternative platforms! https://snubsie.com/support


https://www.youtube.com/shannonmorse --  subscribe to my new channel!


Florida Ransomware:

https://www.cyberscoop.com/ransomware-lake-city-florida-payment/

https://www.cnet.com/news/another-florida-city-pays-hackers-over-ransomware-attack/

https://arstechnica.com/information-technology/2019/06/is-there-something-in-the-water-third-florida-city-hit-by-ransomware/

https://threatpost.com/second-florida-city-pays-hackers-500k-post-ransomware-attack/146018/

https://go.forrester.com/blogs/unconventional-wisdom-explore-paying-the-ransom-in-parallel-with-other-recovery-options/

https://www.zdnet.com/article/why-and-when-it-makes-sense-to-pay-the-ransom-in-ransomware-attacks/


Chronicle, Alphabet’s Security arm, joins Google Cloud:

https://cloud.google.com/blog/topics/inside-google-cloud/the-security-moonshot-joins-google-cloud

https://chronicle.security/

https://www.cyberscoop.com/alphabets-chronicle-uses-big-data-launch-threat-intel-platform/

https://www.businessinsider.com/alphabet-cybersecurity-company-chronicle-joins-google-cloud-2019-6

https://www.cyberscoop.com/chronicle-alphabets-push-into-security-will-join-google-cloud/


Insulin Pumps Flaw:

https://www.fda.gov/news-events/press-announcements/fda-warns-patients-and-health-care-providers-about-potential-cybersecurity-concerns-certain

https://threatpost.com/fda-warns-of-potentially-fatal-flaws-in-medtronic-insulin-pumps/146109/

https://www.medtronicdiabetes.com/customer-support/product-and-service-updates/notice11-letter

https://www.cyberscoop.com/fda-urges-patients-ditch-vulnerable-insulin-pumps-built-medtronic/

https://www.us-cert.gov/ics/advisories/icsma-19-178-01

https://info.medtronicdiabetes.com/legacyexchange



Photo credit:

https://media.defense.gov/2017/May/15/2001746883/-1/-1/0/170519-A-PO640-007.JPG 



-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆

Our Site → https://www.hak5.org

Shop →  https://www.hakshop.com

Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1

Support → https://www.patreon.com/threatwire

Contact Us → http://www.twitter.com/hak5

Threat Wire RSS → https://shannonmorse.podbean.com/feed/

Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999


Host: Shannon Morse → https://www.twitter.com/snubs

Host: Darren Kitchen → https://www.twitter.com/hak5darren

Host: Mubix → http://www.twitter.com/mubix

-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆

Files

(No title)

Comments

Don Bright

i have fallen for phish testing emails. IMHO its just impossible to process 200+ emails a day on deadline, with short staff, from random business partners, and not click a phish once in a while. additional layers of security are crucial IMHO,, like sandbox browsers, disabling unsigned macros, non-admin user access levels, etc etc.