Risky Business #795 -- How The Com is hacking Salesforce tenants Podcast By  cover art

Risky Business #795 -- How The Com is hacking Salesforce tenants

Risky Business #795 -- How The Com is hacking Salesforce tenants

Listen for free

View show details

About this listen

On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: New York Times gets a little stolen Russian FSB data as a treatiVerify spots possible evidence of iOS exploitation against the Harris-Walz campaignResearcher figures out a trick to get Google account holders’ full names and phone numbersMajor US food distributor gets ransomwaredThe Com’s social engineering of Salesforce app authorisations is a harbinger of our future problemsAustralian Navy forgets New Zealand has computers, zaps Kiwis with their giant radar. This week’s episode is sponsored by identity provider Okta. Long-time friend of the show Alex Tilley is Okta’s Global Threat Research Coordinator, and he joins to discuss how organisations can use both human and technical signals to spot North Koreans in their midst. This episode is also available on Youtube. Show notes How The Times Obtained Secret Russian Intelligence Documents - The New York TimesUkraine's military intelligence claims cyberattack on Russian strategic bomber maker | The Record from Recorded Future NewsHarris-Walz campaign may have been targeted by iPhone hackers, cybersecurity firm saysiVerify Uncovers Evidence of Zero-Click Mobile Exploitation in the U.S.Spyware maker cuts ties with Italy after government refused audit into hack of journalist’s phone | The Record from Recorded Future NewsItalian lawmakers say Italy used spyware to target phones of immigration activists, but not against journalist | TechCrunchAndroid chipmaker Qualcomm fixes three zero-days exploited by hackers | TechCrunchCellebrite to acquire mobile testing firm Corellium in $200 million deal | CyberScoopApple Gave Governments Data on Thousands of Push NotificationsA Researcher Figured Out How to Reveal Any Phone Number Linked to a Google AccountBruteforcing the phone number of any Google userAcreed infostealer poised to replace Lumma after global crackdown | The Record from Recorded Future NewsBidenCash darknet forum taken down by US, Dutch law enforcement | The Record from Recorded Future NewsNHS calls for 1 million blood donors as UK stocks remain low following cyberattack | The Record from Recorded Future NewsMajor food wholesaler says cyberattack impacting distribution systems | The Record from Recorded Future NewsKettering Health confirms attack by Interlock ransomware group as health record system is restored | The Record from Recorded Future NewsHackers abuse malicious version of Salesforce tool for data theft, extortion | Cybersecurity Diveshubs on X: "IP whitelisting is fundamentally broken. At @assetnote, we've successfully bypassed network controls by routing traffic through a specific location (cloud provider, geo-location). Today, we're releasing Newtowner, to help test for this issue: https://t.co/X3dkMz9gwK" / XRoss Ulbricht Got a $31 Million Donation From a Dark Web Dealer, Crypto Tracers Suspect | WIREDAustralian navy ship causes radio and internet outages to parts of New Zealand
adbl_web_global_use_to_activate_webcro805_stickypopup
No reviews yet