Who is buying Splunk?CiscoGoogleMandiantCrowdstrikeFor which of these open-source libraries were a CVE logged with a CVSS score of 10/10 (and then rejected again as a duplicate of an 8.8/10 CVE)libwebp FFmpegGziplibssh Talking about CVSS 10’s, which one of these also clocked the 10/10 this week?Progress WS_FTPProgress MOVEitProgress FlowmonProgress SitefinitySysdig researchers uncovered an operation called AMBERSQUID, which can cost victims up to $10,000 per day. Which services are targeted by the TA?AWSAzureGoogle CloudVMwareGroup-IB wrote about ShadowSyndicate, a new Ransomware-as-a Service player.What were 52 servers used by the TA to host?Cobalt Strike C2 frameworkBrute Ratel C4 frameworkVictim Encryption KeysVictim Stolen DataAccording to US Cyber Agencies, where are China-linked hackers hiding?Router FirmwareUS Internet CafesMicrochipsLinkedInAWS published a write-up on how they track and deter threat actors.What is the name given to the suite of tools used to streamline this process?MadPotEC2CompleteCloudWatchGuardDutyThe DFIRReport investigated a Ransomware case where threat actors abused legitimate RMM software during their attack.Which RMM software was up for abuse this time? ScreenConnectAnyConnectFastConnectDisConnectNorth Korean hackers were targeting victims with fake recruitment scams involving programming challenges.What was the first coding challenge the targets were asked to complete?Writing 'Hello, World!'Implementing a Bubble SortWriting the days of the weekImplementing a random number generator♪ Sleep with one eye open, Gripping your pillow tight ♪SentinelOne detailed the Sandman APT. Which industry were the specifically targeting?TelecommunicationFinanceICSEngergy