show episodes
 
Recorded Future takes you inside the world of security intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about ...
 
As hacking leaves the dark corners of the internet and makes its way into our daily lives, we set out to paint a picture of this curious, enlightening, and occasionally criminal world. Join us on Hacked, as Jordan Bloemen, communicator and storyteller, and Scott Francis Winder, technologist and computer security hobbyist, delve into a new topic every episode.
 
We created this podcast series to discuss the latest information on cybersecurity. Listen to Cipher's leading experts review the cybersecurity news, trends, and challenges. The Cipher Podcast has a global cybersecurity perspective, with special guests from the United States, Brazil, Spain and Portugal. Select topics are covered in English and Portuguese.
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over five million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
The Safe and Secure Internet Gambling Initiative promotes the freedom of individuals to gamble online with the proper safeguards to protect consumers and ensure the integrity of financial transactions.This supplemental site is for posting podcasts related to the fight for regulated internet gambling.To visit Safe and Secure: http://www.safeandsecureig.org/
 
Hello! This is The Vergecast, the flagship podcast of The Verge... and your life. Every Friday, Nilay Patel and Dieter Bohn make sense of the week's tech news with help from our wide-ranging staff. And on Tuesdays, Nilay hosts in-depth, one-on-one interviews with major technology leaders. Join us every week for a fun, deeply nerdy, often off-the-rails conversation about what's happening now (and next) in technology and gadgets.
 
Tech Talk Radio is informed and lively commentary about technology. It is a mix of technology, people, politics, careers, and trends. Tech Talk Radio airs each Saturday from 9 to 10 AM in Washington DC on WFED, which broadcasts at 1500 AM. Tech Talk Radio has been broadcasting weekly since June 2000. Prior to 2007, Tech Talk Radio aired on WMAL (630AM), WJFK (106.7FM), and WTWP (107.7FM/1500AM) radio. Most of the weekly broadcasts are still available at www.techtalkonline.com. This is the mo ...
 
Welcome to Security Explained, where we strive to make the complex realm of cyber security better understood by everyone. Join our three hackers / hosts Christopher Grayson, Drew Porter, and Logan Lamb for approachable conversation and a few laughs on the world of hackers, how to think about privacy and security in today's rapidly changing world, and how to keep yourself and your loved ones safe.
 
"Internet Security - Weaknesses and Targets" gives a detailed introduction on problems concerning Internet and Intranet security. After starting with some remarks on risk analysis and computer crimes, security weaknesses and targets are discussed in detail. Besides, more introductions are provided on: human factor and technical failures, attacks on accounts and passwords, attacks on Internet protocol, misuse of design and programming errors, weaknesses in common operating systems, targets in ...
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
 
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Meher Roy, Sunny Aggarwal, and Friederike Ernst. Since 2014, episodes have been downloaded over 4 million times.
 
Loading …
show series
 
Ransomware Defenses https://isc.sans.edu/forums/diary/Ransomware+Defenses/27420/ AXA Stops Ransomware Payments https://www.insurancejournal.com/news/international/2021/05/09/613255.htm http.sys Proof of Concept https://github.com/0vercl0k/CVE-2021-31166 Google/Mozilla colaborating on HTML Sanitizer API https://wicg.github.io/sanitizer-api/#sanitize…
 
2FA vs Ransomware; Ransomware and Cyber Insurance; http.sys PoC; Browser HTML Sanitizer API; SANS.edu Research Ransomware Defenses https://isc.sans.edu/forums/diary/Ransomware+Defenses/27420/ AXA Stops Ransomware Payments https://www.insurancejournal.com/news/international/2021/05/09/613255.htm http.sys Proof of Concept https://github.com/0vercl0k/…
 
Internet of Things | Privacy miniseries Previously in this miniseries, we’ve discussed the challenges of online privacy with experts in that field. In many ways, what can be known about us through our online behaviour pales in comparison to what someone can find out about us by monitoring measurements of the real world, through ours and others’ Int…
 
We speak with Drago Gvozdanovic, CEO of Cynterra, based in Canberra. In an Australian first, cybersecurity and data analysis firm Cynterra, has won a major contract to provide the Australian Government’s Digital Transformation Agency (DTA) with a new generation Secure Internet Gateway (SIG). The first of its kind SIG is based on Cynterra’s fully IR…
 
Ransomware operators begin timing their releases for more reputational damage. Another gang is equipping its ransomware with scripts to disable defenses, and yet another is now into stock shorting. The US Postal Inspection Service is apparently monitoring social media. GCHQ’s head warns of the dangers of becoming dependent on China’s technology. Jo…
 
In this episode of Tech Done Different, you'll hear from two special guests: Jacquie Loustau, Founder of the Australian Women in Security Network and Aby Swabey, Publisher of Women in Magazine. You'll hear from not one but two (!) special guests: Jacquie Loustau, Founder of the Australian Women in Security Network and Aby Swabey, Publisher of Women…
 
A new RIG campaign is distributing WastedLocker. The US Congress considers two bills informed by the Colonial Pipeline incident, and Congressional committees are looking at the company’s response to the attack. More ransomware gangs go offline, but Conti is still trying to collect from the Irish government. Double encryption appears to be an emergi…
 
Patches and updates are released for a reason. Most are for bug fixes and performance improvements but they also contain security fixes. It's vital that you stay on top and current with your patching. This episode talks about a survey results to why this is the case. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cu…
 
Did you know there are more Amazon Prime members than there are people in Russia? The online seller is massive, and there's really no way to oversell just how much influence it has. It hosts websites you visit every day, sells products you buy week after week, and collects more information about you than you realize. What makes Amazon so successful…
 
Risk management is fun. Said no one. Ever. Cybersecurity awareness training is exciting. Said this same group of people. That is, until now. Let's get ready to rumble at the inaugural Cyber Knockout taking place alongside RSA Conference 2021. Bring people together, get them to compete against each other, add some fun, and everyone can learn invalua…
 
Pushing the Panic or the Not Panic button may as well just be a difference in company culture. Planning, readiness, and experience are part of it, but not all of it. It all starts with how we define a crisis and how we react to it. Successfully leading an organization through a crisis is one of the most challenging – and rewarding – experiences a l…
 
Japan calls out China for cyberespionage. Colonial Pipeline restores service, as organizations look to their own vulnerability to ransomware. The DarkSide gang may have said it’s going out of business, but it’s at least as likely, probably likelier, that they’re either rebranding or absconding. Two other gangs are in business: Conti is hitting Iris…
 
The lack of InfoSec talent is something the cybersecurity industry complains about all the time. How does this challenge differ when we look at mainframe security? Once again, perception and reality are not a match. In Chapter 1 of the Key Resources story, we spoke with Cynthia Overby, President & Co-Founder at Key Resources, to look at the mainfra…
 
The Emotet malware and cybercrime campaign recently made headlines, not for infecting victims with Trickbot or Qbot malware or spinning up a new botnet, but instead for being taken down by law enforcement. In January of this year, an international effort led by Europol took control of Emotet infrastructure, effectively taking it down, as well as ma…
 
One of the most impacting ransomware attacks shut down fuel supply pipelines to the eastern U.S. This episode talks about how the Colonial Pipeline got back online and things you can do to help recover if you ever get hit with ransomware. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Secur…
 
This week Tom and Kevin discuss the Colonial Pipeline ransomware attack, RaaS (Ransomware as a Service), and why ransomware attacks are not going away anytime soon. ** Links mentioned on the show ** Colonial Pipeline Hackers, DarkSide, Apologize, Say Goal ‘Is to Make Money’ https://www.msn.com/en-us/news/world/colonial-pipeline-hackers-darkside-apo…
 
In this interview we speak with Tim Jones, Managing Director and Stefan Prandl, Chief Technology Officer of Hyprfire. Hyprfire is an Australian cybersecurity start-up which has innovated the application of Power Law Statistical Distributions and Behavioural Analytics to achieve effective, real-time network anomaly detection. Get a copy of the Fireb…
 
"Open" Access to Industrial Systems Interfaces is Also Far From Zero https://isc.sans.edu/forums/diary/Open+Access+to+Industrial+Systems+Interface+is+Also+Far+From+Zero/27418/ Malicious Rust Macro for VSCode https://github.com/lucky/bad_actor_poc Exim PoC Released https://adepts.of0x.cc/exim-cve-2020-28018/ Newly Observed PHP-based skimmmer shows o…
 
Exposed VNC; VSCode Rust Exploit; Exim PoC Code; Favicon Webshells "Open" Access to Industrial Systems Interfaces is Also Far From Zero https://isc.sans.edu/forums/diary/Open+Access+to+Industrial+Systems+Interface+is+Also+Far+From+Zero/27418/ Malicious Rust Macro for VSCode https://github.com/lucky/bad_actor_poc Exim PoC Released https://adepts.of0…
 
At 16 years old, Avi Schiffmann built the very first and most popular website for COVID-19 with 30 million daily visitors at its peak. Listen along to his incredible backstory and what's coming next. Avi created nCoV2019.live when the first signs of COVID-19 hit - little did he know it would quickly become one of the most popular COVID-19 tracking …
 
In this episode, host Bidemi Ologunde examines the case of two young men in Sydney, Australia and Portland, Oregon, who ran a successful credential stuffing operation to make thousands of dollars over a period of more than two years. The Australian got two years and two months of supervised community service with zero prison time, while the America…
 
The Zero Trust security model asserts that organizations should not trust anything within its perimeters and instead must inspect every traffic and verify anything connecting to its systems before granting access. While Zero Trust is generating a lot of buzz in the cyber world, it’s often hard to determine the implications of this security model. I…
 
Technical account manager Dominique West takes us on her career journey from engineering to cybersecurity. Even though her undergraduate degree was in information systems, Dominique did not learn about cybersecurity until she personally experienced credit card fraud. She had a range of positions from working the help desk in an art museum to vulner…
 
Intel 471 CISO Brandon Hoffman joins us to to discuss Darkside, the ransomware group that attacked the Colonial Pipeline, why the crew may have bitten off more than it can chew and what the attack says about the state of America's Critical Infrastructure. The post Episode 214: Darkside Down: What The Colonial Attack Means For The Future of Ransomwa…
 
Guest LTC Erica Mitchell from Army Cyber Institute joins us to talk about their infrastructure resiliency research project called Jack Voltaic. The Army Cyber Institute’s (ACI’s) Jack Voltaic (JV) project enables the institute to study incident response gaps alongside assembled partners to identify interdependencies among critical infrastructure an…
 
Just like the future, the opportunities created by technology are not equally distributed. Different geographic areas are at a different stage of the occurring digital transformation, and we cannot think that the equalization process is about to go the same way everywhere. Yes, it is a small world after all, but differences exist and need to be res…
 
DarkSide says it’s feeling the heat and is going out of business, but some of its affiliates are still out and active, for now at least. A popular hackers’ forum says it will no longer accept ransomware ads. The Bash Loader supply chain compromise afflicts another known victim. Colonial Pipeline resumes delivery of fuel. Irresponsible disclosure of…
 
H4zy discusses her career journey from esthetician, to medical assistant, to pentester. After 20 years in the beauty and medical fields, H4zy becomes a pentester. Guest H4zy (@__h4zy on Twitter) Host Phillip Wylie This Episode’s Sponsors If you’d like to sponsor this or any other podcast episode on ITSPmagazine, you can learn more here: https://www…
 
The Epic v. Apple trial continues with big drama about naked bananas and weird game definitions. Nilay tries to get Starlink space internet working, and there's new Intel chips. Adi Robertson and Monica Chin join this week. Epic and Apple are now fighting over a naked banana Roku removes YouTube TV from channel store as dispute with Google escalate…
 
Cross Browser Tracking with Schemeflood https://fingerprintjs.com/blog/external-protocol-flooding/ Cisco AnyConnect Secure Mobility Client Patch https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-ipc-KfQO9QhK MSBuild Abused By Attackers https://www.anomali.com/blog/threat-actors-use-msbuild-to-deliver-rats-fil…
 
Cross Browser Tracking; Cisco AnyConnect Patch; MSBuild Abuse Cross Browser Tracking with Schemeflood https://fingerprintjs.com/blog/external-protocol-flooding/ Cisco AnyConnect Secure Mobility Client Patch https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-ipc-KfQO9QhK MSBuild Abused By Attackers https://www.…
 
The US Executive Order on Improving the Nation’s Cybersecurity is out. Colonial Pipeline partially resumed delivery of fuel yesterday evening, as its preparation for and response to the cyberattack it sustained receive scrutiny. The DarkSide’s extortion of the US pipeline company seems likely to prompt regulatory revision. DarkSide operators say th…
 
Apple recently updated its mobile operating system, iOS, to give users a choice about what is shared and how apps use personal data. Journalist Kate O’Flaherty fills us in. Tune in to hear: What the iOS 14.5 update means for users and privacy How to get apps to stop tracking you If families of apps (think: Facebook + Instagram + WhatsApp) track us …
 
Dr. Eric Cole is a former CIA hacker, cybersecurity commissioner to the Obama administration, and advisor to clients including the Obama family, Bill and Melinda Gates, Lockheed Martin, and McAfee. In his new book, CYBER CRISIS: Protecting Your Business from Real Threats in the Virtual World, Dr. Cole gives readers a clear-eyed picture of the infor…
 
The group that has been identified as the one that carried out the cyberattack on the pipeline has said it was a mistake. This episode talks about this group and their motives and why they released a statement about this. Very odd. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In …
 
Ransomware has interrupted a major US gasoline pipeline, Apple didn't tell more than 100 million people their iOS devices had malware, wi-fi design flaws found that could affect everyone, and we sent an Apple AirTag through the mail and followed it. Show Notes: F.B.I. Identifies Group Behind Pipeline Hack Watch hackers break into the US power grid …
 
Number of industrial control systems on the internet is lower then in 2020...but still far from zero https://isc.sans.edu/forums/diary/Number+of+industrial+control+systems+on+the+internet+is+lower+then+in+2020but+still+far+from+zero/27412/ Webcast: Ransoming Critical Infrastructure https://www.sans.org/webcasts/119775 Links to FragAttacks Vendor Bu…
 
Curve is an Automated Market Maker (AMM) that lets users and other decentralized protocols exchange stablecoins (DAI to USDC for example) with low fees and low slippage. Unlike exchanges that match a buyer and a seller, users transact with the smart contract itself. By providing a flatter curve targeted for relatively stable pairs, Curve has establ…
 
Exposed ICS Trending Lower; FragAttack Vendor Bulletins; Adobe Acrobat 0Day Number of industrial control systems on the internet is lower then in 2020...but still far from zero https://isc.sans.edu/forums/diary/Number+of+industrial+control+systems+on+the+internet+is+lower+then+in+2020but+still+far+from+zero/27412/ Webcast: Ransoming Critical Infras…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login