FireEye Hacked, Foxconn Ransomware Attack, Apple’s New Privacy Features

In episode 151 for December 14th 2020: What you need to know about the stolen FireEye “Red Team” tools and the FUD going on in the media about the attack, Foxconn gets hit with a ransomware attack plus details on how ransomware attacks are evolving, and how Apple is stopping advertisers from tracking you across different applications.

** Links mentioned on the show **

FireEye Shares Details of Recent Cyber Attack, Actions to Protect Community

The Stolen FireEye Red Team Tools Are Mostly Open Source

Foxconn electronics giant hit by ransomware, $34 million ransom

Apple could block apps that don’t comply with new privacy feature

Scoop: WhatsApp goes after Apple over privacy label requirements

Tom’s take on Apple’s “privacy labels” – Episode 147
Watch on YouTube:

** Watch this episode on YouTube **

** Thank you to our sponsors! **

Silent Pocket

Visit to check out Silent Pocket’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”.

Click Armor

To find out how “gamification” of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor’s gamified awareness training platform, visit:

** Help support the show **

Looking for an affordable, reliable, no logs VPN provider? Support the podcast by purchasing a Private Internet Access VPN subscription via our affiliate link:

** Subscribe and follow the show **

Sign-up for our email newsletter to receive our free Facebook Privacy & Security Guide, full transcripts of each weekly episode, contest announcements, and special offers from our sponsors:

Subscribe on your favorite podcast app:

Contact us:






The post FireEye Hacked, Foxconn Ransomware Attack, Apple’s New Privacy Features appeared first on The Shared Security Show.

*** This is a Security Bloggers Network syndicated blog from The Shared Security Show authored by Tom Eston. Read the original post at: