Episode 34: Satori Botnet, OilRig, PowerShell Security, and the Dragonfly Campaign

July 27, 2018 Digital Shadows

Richard Gold and Rose Bernard join Michael Marriott to talked about updates to the Satori botnet, which has expanded to incorporate new IoT devices using TCP port 5555. Amid news of a new wave of OIlRig attacks, a Middle Eastern espionage campaign, we dive into PowerShell security risks and provide advice on best practices for those using PowerShell. For more information on PowerShell Security Best Practices, check out our blog https://www.digitalshadows.com/blog-and-research/powershell-security-best-practices/. Finally, we assess the Dragonfly campaign against US power grids, and understand what it all means.

Listen on Itunes: https://itunes.apple.com/us/podcast/episode-24-satori-botnet-oilrig-powershell-security/id1326304686?i=1000416741473&mt=2

Listen on Soundcloud: 

Previous Post
GAO’s Equifax Post-mortem Report
GAO’s Equifax Post-mortem Report

It’s common for the exciting and novel issues that confront security professionals on a daily basis to be h...

Next Post
Blog | 2017 Equifax Breach: Impact and Lessons Learned
Blog | 2017 Equifax Breach: Impact and Lessons Learned

Equifax experienced a data breach that occurred in mid-May 2017, was first discovered on 29 Jul 2017, and w...