Listen

Description

Summary of Earchings in Recent Sextortion Attack

https://isc.sans.edu/forums/diary/Sextortion+Follow+the+Money/23922/

Adware Distributed with Legitimate Applications

https://www.bleepingcomputer.com/news/security/fake-websites-for-keepass-7zip-audacity-others-found-pushing-adware/

https://twitter.com/JusticeRage

PDF Editor Supply Chain Exploit

https://cloudblogs.microsoft.com/microsoftsecure/2018/07/26/attack-inception-compromised-supply-chain-within-a-supply-chain-poses-new-risks/