Weekly: H2 Database Vulnerability, DDoS Extortion, and Alternate Ransomware Techniques

Digital Shadows

ShadowTalk Threat Intelligence Podcast · Weekly: H2 Database Vulnerability, DDoS Extortion, and Alternate Ransomware Techniques
 
ShadowTalk host Chris alongside Ivan and Austin bring you the latest in threat intelligence. This week they cover:
  • A Critical H2 Database Vulnerability
  • DDoS Extortion
  • Alternate ransomware techniques

 

Catch up on our latest Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-14th-jan


***Resources from this week’s podcast***

Cyber Threats to the Education System
https://www.digitalshadows.com/blog-and-research/cyber-threats-to-education/

How Do Ransomware Groups Launder Payments
https://www.digitalshadows.com/blog-and-research/how-do-ransomware-groups-launder-payments/

JFrog researchers find JNDI vulnerability in H2 database consoles similar to Log4Shell
https://www.zdnet.com/article/jfrog-researchers-find-jndi-vulnerability-in-h2-database-consoles-similar-to-log4shell/ 

Extortion DDoS attacks grow stronger and more common
https://www.bleepingcomputer.com/news/security/extortion-ddos-attacks-grow-stronger-and-more-common

FBI: Hackers use BadUSB to target defense firms with ransomware
https://www.bleepingcomputer.com/news/security/fbi-hackers-use-badusb-to-target-defense-firms-with-ransomware/

 

Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html 

Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.

Previous Report
Weekly Intelligence Summary 14th Jan
Weekly Intelligence Summary 14th Jan

Researchers have discovered a critical vulnerability in the popular open-source Java SQL database H2

Next Post
How Do Ransomware Groups Launder Payments?
How Do Ransomware Groups Launder Payments?

Ransomware continued to represent arguably the biggest headache for incident responders and blue teams in 2...

×

Threat Intel Fan?

Sign up below to get our TI updates delivered to your inbox!

First Name
Last Name
Company
Country
State- optional
Job Title
Thank you!
Error - something went wrong!