Artwork for podcast It's 5:05! Daily cybersecurity and open source briefing
Episode #292: Edwin Kwan: 5Ghoul Vulnerabilities Affecting Most 5G Smart Phones; Katy Craig: P2PInfect: Evolving to Target Routers and IoT Devices; Ian Garrett: That Job Candidate Might Be a Hacker; Mark Miller: This Day in Tech History
Episode 29212th December 2023 • It's 5:05! Daily cybersecurity and open source briefing • Contributors from Around the World
00:00:00 00:08:36

Shownotes

Free, ungated access to all 290+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.

The stories we’re covering today.

Mark Miller: December 12th, 1980. Apple computer holds their initial public offering selling 4.6 million shares at $22 per share, and turning more than 40 Apple employees and investors into instant millionaires.

Edwin Kwan: A set of 14 security vulnerabilities named "5Ghoul" has been discovered in the firmware implementation of 5G mobile network modems from major chipset vendors like MediaTek and Qualcomm. The flaw impacts USB and IoT modems along with hundreds of smartphone models running Android and iOS.

Katy Craig: Cybersecurity researchers from Cato Security Labs have uncovered a new variant of P2PInfect compiled for the MIPS architecture used widely in routers and IoT devices. This latest version indicates the botnet's expanding capability is in reach.

Ian Garrett: Now hackers are applying to jobs? TA4557, a threat actor active since 2018, is evolving its strategy to directly target recruiters with malicious URLs. Once the recruiter responds, TA4557 replies with a URL linking to a website controlled by the threat actor, posing as the candidate's resume.

Chapters