Exposing Muddled Libra's meticulous tactics with Kristopher Russo & David Moulton. Credit: carloscastilla In the second episode of Threat Vector, Kristopher Russo, senior threat researcher at Unit 42, and David Moulton, discuss the threat landscape and take a deeper dive into the intricate workings of Muddled Libra (related to Scattered Spider and Scatter Swine). This formidable threat group poses significant challenges to telecommunications, technology and software automation industries. Russo explains how Muddled Libra works, with a few distinguishing traits. Muddled Libra employs legitimate persistence tools from trusted vendors to fly under the radar to target firms with access to high-value cryptocurrency holders. The type of data Muddled Libra is after is also highly specific — and they are very persistent in finding it. Muddled Libra has a signature move: exploit the 0ktapus phishing kit to craft believable authentication pages and manipulate victims through social engineering. What are some actionable steps businesses can take to safeguard the cyber environment? Tune in and stay updated. Threat Vector provides insights that are both enlightening and cautionary. Still, these summaries only scratch the surface of the expert perspectives in the full podcast episodes. CISOs, C-level executives or anyone with a vested interest in safeguarding the digital world can benefit from subscribing to the Unit 42 Threat Vector podcast. Discover firsthand the invaluable knowledge, strategies and real-world stories cybersecurity experts share. Threat Vector is your compass in the world of cybersecurity. Listen to all current segments on Unit 42 YouTube channel and Spotify. Related content brandpost Sponsored by Palo Alto Networks Bridging the gap between legacy tools and modern threats: Securing the cloud today Charting the course of cloud security: Bridging the divide between legacy tools and evolving modern threats. Gain visibility today. By Gonen Fink, SVP Products, Cortex & Prisma Cloud, Palo Alto Networks Jun 05, 2024 5 mins Cloud Computing brandpost Sponsored by Palo Alto Networks Is there a natural contradiction within AI-driven code in cloud-native security? Unveiling the duality: Harnessing AI's potential while safeguarding cloud-native security By Amol Mathur, SVP & GM of Prisma Cloud, Palo Alto Networks Jun 03, 2024 5 mins Artificial Intelligence Security brandpost Sponsored by Palo Alto Networks What CIOs need to know about the newly proposed Critical Infrastructure Cyber Incident Reporting Rule The current cybersecurity regulatory landscape continues to evolve, and CIRCIA’s incident reporting requirements are just one of the many emerging regulations organizations will need to observe. By Anand Oswal, Senior Vice President, and GM of Network Security at Palo Alto Networks May 15, 2024 5 mins Security brandpost Sponsored by Palo Alto Networks M&A action is gaining momentum, are your cloud security leaders prepared? Direct visibility is critical in M&A, and cloud-native application protection platforms (CNAPP) are ideal to provide this capability. By Amol Mathur, SVP & GM of Prisma Cloud, Palo Alto Networks Apr 25, 2024 4 mins Cloud Management PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe