show episodes
 
The Threat Monitor podcast is a semimonthly tip from SearchSecurity.com that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.
 
Fantasy Football fans, this is the podcast for you. Marcas Grant provides detailed fantasy football analysis combining in-depth stats and film study to help you win your league and earn bragging rights over your friends, coworkers or family. A mix of humor and pop-culture references keep the show fresh and light, & will expose you to new movies, music, books and more!
 
The Human Rights Foundation's original audio content serves as a storytelling platform for some of the world's bravest activists, artists, policy-makers, business leaders, and technologists. Our podcast provides those who risk their safety in return for a chance to raise the world's awareness of human rights issues, and the incredibly important work that is being done to address them.
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
 
From the bleeding edge of science to the mysteries of the human mind, top-secret experiments and the remarkable stories of people, places and events just off the edge of the mainstream map, the creators of Stuff They Don’t Want You To Know bring you Strange News Daily – shedding light on the most bizarre, disturbing and unusual news of the day.
 
The phone hacking scandal that closed News of the World was big, but that was just the tip of the iceberg. At the bottom of that iceberg of 'dark arts' - hacking, burglary, bugging, and bribing bent cops - is the body of Daniel Morgan. It’s been described by an Assistant Commissioner of the Metropolitan Police as “one of the most disgraceful episodes in the entire history of the Metropolitan Police Service.” Over the three decades since Daniel was killed, five failed police investigations an ...
 
Past speeches and talks from the Black Hat Briefings computer security conferences. October 17-18 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Katsuya Uchida was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-japan-05/bh-jp-05-main.html Black Hat Briefings bring together a unique mix in security: t ...
 
Loading …
show series
 
Agencies continue to respond to the Pulse Secure VPN vulnerabilities. Updates on the SolarWinds compromise show that it remains a threat, and that it was designed to escape detection and, especially, attribution. A cryptojacking botnet is exploiting vulnerable Microsoft Exchange Server instances. Facebook takes down two Palestinian groups distribut…
 
Guest LTC Erica Mitchell from Army Cyber Institute joins us to talk about their infrastructure resiliency research project called Jack Voltaic. The Army Cyber Institute’s (ACI’s) Jack Voltaic (JV) project enables the institute to study incident response gaps alongside assembled partners to identify interdependencies among critical infrastructure an…
 
DarkSide says it’s feeling the heat and is going out of business, but some of its affiliates are still out and active, for now at least. A popular hackers’ forum says it will no longer accept ransomware ads. The Bash Loader supply chain compromise afflicts another known victim. Colonial Pipeline resumes delivery of fuel. Irresponsible disclosure of…
 
The US Executive Order on Improving the Nation’s Cybersecurity is out. Colonial Pipeline partially resumed delivery of fuel yesterday evening, as its preparation for and response to the cyberattack it sustained receive scrutiny. The DarkSide’s extortion of the US pipeline company seems likely to prompt regulatory revision. DarkSide operators say th…
 
FireEye provides an overview of the DarkSide ransomware-as-a-service operation. Forcepoint suggests a connection between DarkSide and other ransomware gangs, notably REvil. Colonial Pipeline continues its recovery efforts from the cyber attack it sustained. As ransomware grows more common, CISA offers advice on how to prepare defenses. A new Androi…
 
Picture of the week. TsuNAME - "DNS Configuration Flaw Lets Attackers Take Down DNS Servers" Huh Google? Tor's Exit Nodes. 21 Nails in Exim's coffin. Project Hail Mary: A Novel. Closing the loop. SpinRite update. News from the Darkside. We invite you to read our show notes at https://www.grc.com/sn/SN-818-Notes.pdf Hosts: Steve Gibson and Leo Lapor…
 
Picture of the week. TsuNAME - "DNS Configuration Flaw Lets Attackers Take Down DNS Servers" Huh Google? Tor's Exit Nodes. 21 Nails in Exim's coffin. Project Hail Mary: A Novel. Closing the loop. SpinRite update. News from the Darkside. We invite you to read our show notes at https://www.grc.com/sn/SN-818-Notes.pdf Hosts: Steve Gibson and Leo Lapor…
 
Updates on the DarkSide ransomware attack on Colonial Pipeline. Other ransomware strains, including Avaddon and Babuk are out, and dangerous. Guidelines on 5G threat vectors. Lemon Duck cryptojackers are looking for vulnerable Exchange Server instances. A bogus, malicious Chrome app is circulating by smishing. Ben Yelin examines an online facial re…
 
Marcas Grant is joined by Football Gameplan founder Emory Hunt for a special new edition of the NFL Fantasy Football Podcast! First, the duo discusses the challenges of scouting during the pandemic and how this strange season will impact rookies, and players from smaller schools, such as HBCU schools, have been impacted (5:19). Then, the hosts dive…
 
Colonial Pipeline shuts down some systems after a ransomware attack, disrupting refined petroleum product delivery in the Eastern US. We’ll check in with Sergio Caltagirone from Dragos for his analysis. Other ransomware attacks hit city and Tribal governments. Joint UK-US alert on SVR tactics issued, and the SVR may have changed its methods accordi…
 
Good security gets out of the way of users while getting in the way of adversaries. Passwords fail on both accounts. Users feel the pain of adhering to complex password policies. Adversaries simply copy, break, or brute-force their way in. Why, then, have we spent decades with passwords as the primary factor for authentication?From the very first t…
 
VP of Global Solutions Architecture at eSentire Tia Hopkins shares her career journey and talks about its beginnings in engineering and pivots into cybersecurity leadership. Tia shares how she liked to take things apart when she was young, including the brand new computer her mother bought her and how she was fascinated by all the pieces of it spre…
 
Guest Mike McLellan from Secureworks joins us to share his team's insights about SUPERNOVA and threat group attribution. Similarities between the SUPERNOVA activity and a previous compromise of the network suggest that SPIRAL was responsible for both intrusions and reveal information about the threat group. In late 2020, Secureworks® Counter Threat…
 
CISA outlines the FiveHands ransomware campaign. Circumstantial evidence suggests that some cybergangs are either controlled by or are doing contract work for Russian intelligence services. US Federal agencies turn their attention to software supply chain security. Scripps Health continues its recovery from cyberattack. Insecure home routers in the…
 
A discussion with democratic leader of Belarus, Sviatlana Tsikhanouskaya on the future of the democratic movement and human rights in Belarus along with:Michael McFaul: Former U.S. Ambassador to RussiaBill Browder: Magnitsky Act ArchitectGarry Kasparov: Chairman of the Human Rights FoundationModerator: Roberto González, Chief Legal Officer at the H…
 
Some possible insight into what a Chinese cyberespionage unit is up to. Hackathons, from Beijing to Washington (the one sponsored by Beijing developed an iPhone zero-day used against China’s Uyghurs). Panda Stealer is after crypto wallets. Microsoft's Kevin Magee reflects on lessons learned in the last year. Our own Rick Howard speaks with Todd Nei…
 
Belgium sustains a DDoS attack that knocks parliamentary sessions offline. New malware strains identified in phishing campaign. Threat actors look for ways of working around multi-factor authentication and open authentication. COVID-19 scams continue online, and attract law enforcement attention. Joe Carrigan describes a compromised password manage…
 
Picture of the Week. REvil hacks Apple supplier Quanta Computer. World-famous Scripps Health taken down. The Big Emotet Botnet Takedown. Emotet's 4,324,770 eMail addresses. Have I Been Pwned domain-wide notifications. QNAP. Gravity NNTP Newsreader updated to v3.0.11.0 Just a bit more about Dan Kaminsky. Closing the Loop. The Ransomware Task Force. …
 
Picture of the Week. REvil hacks Apple supplier Quanta Computer. World-famous Scripps Health taken down. The Big Emotet Botnet Takedown. Emotet's 4,324,770 eMail addresses. Have I Been Pwned domain-wide notifications. QNAP. Gravity NNTP Newsreader updated to v3.0.11.0 Just a bit more about Dan Kaminsky. Closing the Loop. The Ransomware Task Force. …
 
Marcas Grant is joined by fantasy experts Michael F. Florio, Matt Okada, Kate Magdziuk, and Rob Johnson for a special new edition of the NFL Fantasy Football Podcast! With the NFL Draft all wrapped up, the group looks at how the fantasy landscape has shifted with a 12-team, 15-round PPR mock draft (1:51). The hosts explain each of their picks and a…
 
Pulse Secure patches its VPN, and CISA for one thinks you ought to apply those fixes. Apple has also patched two zero-days in its Webkit engine. Scripps Health recovers from what’s said to be a ransomware attack. Researchers describe Genesis, a criminal market for digital fingerprints. Ben Yelin described a grand jury subpoena for Signal user data.…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login