Shownotes
ποΈ Free access to βItβs 5:05!β on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms π
Edwin Kwan: Frequently Exploited Vulnerabilities in 2022
π¦πΊ Edwin Kwan, Sydney, Australia β
A number of cybersecurity agencies have co-authored a joint Cybersecurity Advisory (CSA) on frequently exploited vulnerabilities in 2022. The advisory provides details on CVEs routinely and frequently exploited by cyber criminals.
Ian Garrett: North Korean Hackers Versus Russian Missile Makers
πΊπΈ Ian Garrett, Arlington, Virginia β
North Korean hackers and Russian missile makers sound like an excellent start to a movie. The North Korean Hacking Group known as ScarCruft has made headlines once again- this time for breaching the IT infrastructure and email server of a prominent Russian space rocket designer βand intercontinental ballistic missile engineering organization.
Katy Craig: Volt Typhoon creeps into Texas
πΊπΈ Katy Craig, San Diego, California β
Brace yourselves for a grave cybersecurity threat lurking right at our doorstep. A notorious Chinese advanced persistent threat known as Volt Typhoon, has plans to sabotage the utilities and communication systems powering US military bases. And they've got their eyes on Texas
Hillary Coover: Regulation China FR
πΊπΈ Hillary Coover, Washington, DC β
China responds to mounting privacy concerns by drafting stringent rules for facial recognition technology, demanding purpose, necessity, and consent in its use while curbing its application in sensitive spaces.