Home Artists Posts Import Register

Downloads

Content

ThreatWire Totem Board - Limited Edition! - https://snubsie.com/threatwire-products/tw-totem 


Shop ThreatWire Merch on Teespring! - https://morsecode.creator-spring.com/ 


Support ThreatWire! https://www.patreon.com/shannonmorse 


Follow Shannon on Social Media: https://snubsie.com/links 


Ransomware is Targeting the ESXi Hypervisor, the Reddit Breach was Caused By Employee Credential Phishing, and this new Ransomware is Targeting Linux! All that coming up now on ThreatWire.


 #threatwire #hak5


ThreatWire by Shannon Morse is a weekly news journalism show covering cybersecurity topics for network admins, information security professionals, and consumers.

 

Watch this on youtube: https://youtu.be/FBGbolXt2I8


Chapters:

00:00 Ransomware Targets ESXi Hypervisor 

03:38 Reddit Employee Phished

05:35 Ransomware Targets Linux


Links:

https://blogs.vmware.com/security/2023/02/83330.html

https://www.zdnet.com/article/vmware-warns-of-esxiargs-ransomware-attacks-on-unpatched-esxi-hypervisors/

https://www.vmware.com/security/advisories/VMSA-2021-0002.html

https://arstechnica.com/information-technology/2023/02/hackers-are-mass-infecting-servers-worldwide-by-exploiting-a-patched-hole/

https://thehackernews.com/2023/02/vmware-finds-no-evidence-of-0-day-flaw.html

https://www.bleepingcomputer.com/news/security/cisa-releases-recovery-script-for-esxiargs-ransomware-victims/

https://github.com/cisagov/ESXiArgs-Recover/blob/main/recover.sh

https://thehackernews.com/2023/02/new-esxiargs-ransomware-variant-emerges.html

https://www.bleepingcomputer.com/news/security/new-esxiargs-ransomware-version-prevents-vmware-esxi-recovery/

https://twitter.com/ransomwhere_/status/1623673914822914051

 

https://www.reddit.com/r/reddit/comments/10y427y/we_had_a_security_incident_heres_what_we_know/

https://thehackernews.com/2023/02/reddit-suffers-security-breach-exposing.html

https://www.bleepingcomputer.com/news/security/hackers-breach-reddit-to-steal-source-code-and-internal-data/

https://arstechnica.com/information-technology/2023/02/this-weeks-reddit-breach-shows-companys-security-is-still-woefully-inadequate/


https://nvd.nist.gov/vuln/detail/CVE-2023-0669

https://www.huntress.com/blog/investigating-intrusions-from-intriguing-exploits

https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-it-breached-130-orgs-using-goanywhere-zero-day/

https://www.bleepingcomputer.com/news/security/exploit-released-for-actively-exploited-goanywhere-mft-zero-day/

https://thehackernews.com/2023/02/linux-variant-of-clop-ransomware.html

https://www.bleepingcomputer.com/news/security/clop-ransomware-flaw-allowed-linux-victims-to-recover-files-for-months/

https://www.zdnet.com/article/this-notorious-ransomware-is-now-targeting-linux-systems-too/





Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:


-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆

Our Site → https://www.hak5.org

Shop →  http://hakshop.myshopify.com/

Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1

Support → https://www.patreon.com/threatwire

Contact Us → http://www.twitter.com/hak5

-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆


____________________________________________

Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.

Comments

No comments found for this post.