Python obfuscation tools putting developers at risk for a total system take over. Lockbit Ransomware leads to USB drive being use to carry out bank trades. All that and more, this time on ThreatWire. Support ThreatWire → https://www.patreon.com/threatwire @endingwithali Twitch → https://twitch.tv/endingwithali [!!] ThreatWire Patreon has moved to https://www.patreon.com/threatwire - thanks for your support! LINKS https://www.reuters.com/technology/cybersecurity/icbc-ransomware-attack-triggers-global-regulator-trader-scrutiny-2023-11-10/ https://www.infosecurity-magazine.com/news/icbc-and-allen-overy-hit-by/ https://time.com/6333716/china-icbc-bank-hack-usb-stick-trading/ https://www.reuters.com/world/china/chinas-largest-bank-icbc-hit-by-ransomware-software-ft-2023-11-09/ https://www.bleepingcomputer.com/news/security/lockbit-ransomware-leaks-gigabytes-of-boeing-data/ https://usa.kaspersky.com/resource-center/threats/lockbit-ransomware https://checkmarx.com/blog/python-obfuscation-traps/ https://security.snyk.io/vuln/SNYK-PYTHON-PYOBFGOOD-6052826 https://www.csoonline.com/article/654560/why-open-source-software-supply-chain-attacks-have-tripled-in-a-year.html ____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.