In this special, Webroot podcast series we offer a behind-the-scenes look at the shadowy world of cybercrime from those battling it on the frontlines. Featuring ChannelE2E co-founder and host Joe Panettieri, alongside guest experts from around the industry, discussions delve into the most pressing i…
Cyberattacks backed by nation states are becoming more frequent in the United States. In fact, according to Dr. Mike McGuire, Senior Lecturer in Criminology at the University of Surrey, there has been a 100% rise in ‘significant' nation-state incidents between 2017-2020 with the most attacking the enterprise at 35%. Have we replaced the “cold war” with the “code war?” It seems so with the SolarWinds hack, described as a “digital Pearl Harbor.” What's more, it's been both speculated and proven that countries like North Korea, China, Iran, and Russia have found the United States vulnerable in cyberspace. Also, it discusses the latest developments, such as Pegasus Spyware, and why it is so elusive.
The accelerated demand for bitcoin has provided cybercriminals with a new playground. It's untraceable, making it perfect for extortion and impersonation. In fact, reported by CBS News, Americans have lost more than $80 million in cryptocurrency investment scams since October, which represents a 1,000% increase from the fall of 2019, according to FTC data. This podcast explores this attack vector and the common methods and scams, including modern mining malware such as LemonDuck and LemonCat.
Black Hat USA Conference, the leading infosec event, was held July 21 – Aug. 3, 2021. Grayson Milbourne recaps some of the hottest (and most interesting!) topics from the conference.
2020 was an unprecedented year in terms of cybercrime. In this episode, Tyler Moffitt, Senior Security Analyst at Webroot, an OpenText company, sits down with host Joe Panettieri to explore Webroot's BrightCloud Threat Report. Their conversation covers the report's major findings and what steps businesses can take to build durable resistance.
It's time to think twice before you watch that illegal football stream! Sites that offer pirated sports are not only illegal, but also a major cybersecurity risk. From common viruses to Bitcoin scams, these sites pose a significant threat to consumers. Host Joe Panettieri welcomes Kelvin Murray, Senior Threat Researcher at Webroot, an OpenText company, to discuss this attack vector and how to limit risk.
There has been a worrying rise in ransomware activity. Recent attacks on organizations like the Houston Rockets and the emergence of Babuk ransomware have caused major concern. Tyler Moffitt, Senior Security Analyst at Webroot, an OpenText company, returns to the podcast to address these developments and how companies can protect themselves through multi-level security planning.
Today's home connections are no longer limited to PCs, tablets and smartphones. Smart speakers, thermostats, doorbells and more are increasingly common. Each comes with its own security vulnerabilities. Security intelligence director Grayson Milbourne sits down with host Joe Panettieri to discuss what homeowners need to know about IoT devices and network security.
Host Joe Panettieri and sr. threat research analyst Kelvin Murray explore cybercrime as a service—why and how hackers have emulated the SaaS business model and applied it to ransomware and other types of attack.
Is Bitcoin the dominant cryptocurrency of cybercrime? Is there a relationship between the value of Bitcoin and its role in cybercrime? Can cryptocurrencies be bought and sold safely? Sr. threat research analyst and resident crypto expert Tyler Moffitt joins host Joe Panettieri to discuss all that and more in this episode.
Major malware attacks make headlines, but it's the legions of smaller ones that line the pockets of cybercriminals. Listen to Joe Panettieri and Webroot security threat analyst Kelvin Murray discuss why small and medium-sized businesses are such highly coveted targets for cyberattacks.
Host Joe Panettieri and Webroot threat analyst Tyler Moffitt explore various hacker personas—including the Impersonator, the Opportunist, and the Infiltrator—to learn what motivates each and how their different priorities require tailored defenses.
Host Joe Panettieri is joined by Webroot security intelligence director Grayson Milbourne to look back at the year that was in cybersecurity: Emotet, business email compromise, deepfakes, and the rest of the ugly trends that emerged in 2020. Then, he'll offer his thoughts on what awaits us in 2021.
In this episode, Webroot director of security intelligence Grayson Milbourne discusses the tactic the FBI recently called "the $26 billion scam." Business email compromise is a confidence game, and Milbourne explains to host Joe Panettieri how it's played.
Electric carmaker Tesla narrowly avoided falling victim to an insider attack when an employee alerted authorities to a bribe he'd been offered. Will you be as lucky? You don't have to count on it with these tips from Webroot senior threat researcher Kelvin Murray.
Each Fall, Webroot counts down the worst malware variants to wreak havoc over the previous year. In this episode, security analyst Tyler Moffitt reveals this year’s list of nastiest malware to host Joe Panettieri.
Our host sits down with Webroot threat researcher Kelvin Murray to discuss deep fakes, their dangers, and some ways you can detect them. Plus, how misinformation is used to spread panic on the web.
Malicious actors know cloud infrastructure contains troves of valuable data. Not surprisingly, some have focused their efforts on compromising it. Our host and threat researcher Tyler Moffitt discuss this trending threat.
A surging number of businesses now find their employees working from home. In this episode, our host and Webroot security intelligence director Grayson Milbourne provides tips for keeping a remote workforce safe from the attacks targeting it.
In this episode, Webroot director of security intelligence Grayson Milbourne and host Joe Panettieri look at the importance of virtual private networks (VPNs) in data security and how these secure “tunnels” shield your connection at coffee shops, shopping malls, and anywhere else you connect while on the go.
It may sound silly, but smishing is a serious threat. Host Joe Panettieri is joined in this episode by Webroot security analyst Tyler Moffitt as he explains how cybercriminals use SMS functionality to con everyone from major banks to the average smartphone user.
Webroot malware threat analyst Kelvin Murray joins host Joe Panettieri to explore the rising threat of business email compromise and the lengths cybercriminals will go to get their eyes on your inbox, plus a look into the shadowy of the Silent Starline cybercrime group.
Mimikatz, open source malware used to gather credentials on Windows computers, is an ancient relic in terms of cybersecurity. On this episode, host Joe Panettieri and Webroot director of security intelligence Grayson Milbourne ponder how a technique first developed in 2007 still poses a threat to PC users.
Denver, Atlanta, Baltimore...the list of cities that have experienced ransomware attacks continues to grow, along with bill footed by taxpayers. On this episode, Webroot director of security intelligence Grayson Milbourne and host Joe Panettieri discuss municipalities as prime targets for hackers.
A hack at NASA's Jet Propulsion Laboratory went unnoticed for 10 months, exposing state secrets with possible national security consequences. Webroot senior threat analyst Kelvin Murray and host Joe Panettieri discuss how the rampant theft of intellectual property also targets SMBs.
IBM claims as much as 35 percent of cybercrime involves man-in-the-middle attacks. Recently, Russian agents used one while trying to hack a European chemical weapons agency. Webroot senior threat analyst Kelvin Murray talks with Joe Panettieri about these popular attacks.
A 10-month breach of the restaurant group Earl Enterprises resulted in the compromise of an estimated two million credit and debit card numbers. In this episode, Joe Panettieri talks rampant information theft with Webroot senior threat analyst Kelvin Murray.
The popular cryptomining tool Coinhive has closed its doors. So the cryptojacking threat should decline, right? ‘Not so fast’ Webroot threat analysts Tyler Moffitt tells host Joe Panettieri. Here's who's filling in where Coinhive left off.
The remote code execution flaw Double Kill is as ominous as it sounds, making it a mainstay in cybercriminals’ exploit kits. Here Joe Panettieri talks with Webroot analysist Tyler Moffit about patching against it and other exploits.
This episode of Hackers Files examines the strange saga of a rare U.S. Department of Homeland Security emergency directive ordering all U.S. federal civilian agencies to secure the login credentials for their internet domain records.
From fingerprints to facial recognition, biometrics aren’t just for sci-fi anymore. But as these technologies grow in prevalence, so do related cyber risks. Host Joe talks with Kelvin Murray, Sr. Threat Research Analyst, about the benefits vs. security risks biometrics present.
In Episode 7 of Hacker Files, Joe Panettieri and Webroot guest George Anderson discuss ransomware attacks against local governments in Georgia and New York, and how cybersecurity training could help minimize incidents at a fraction of the cost of a breach.
The idea behind HTTPS is to create a secure, encrypted connection between your browser and a website. Does it work? Joe Panettieri and Webroot’s Hal Lonas discuss.
While quantum computing has numerous positive implications, some critics worry hackers will leverage this technology for nefarious purposes. Host Joe sits down with Grayson Milbourne, Security Intelligence Director, to get a cybersecurity experts’ perspective.
A five-year-old exploit for home router software was recently used to launch massive spam campaigns. Joe Panettieri and Webroot’s Hal Lonas discuss botnets and how to stop them.
Spear phishing, a hyper-targeted form of the classic phishing attack, is rapidly gaining popularity and financial success. Hear Joe Panettieri and Webroot’s Hal Lonas discuss this highly-sophisticated tactic.
How was Tesla duped into running malware on its own AWS infrastructure? Here, Joe Panettieri and Webroot’s Charlie Tomeo discuss cryptojacking news and its wider repercussions.
Cybercriminals sniff out unsecured remote desktop protocol (RDP) to circumvent even well-planned defenses. Joe Panettieri and Webroot’s Charlie Tomeo discuss RDP as a ransomware delivery strategy.
From APTs to global ransomware, the last decade has seen major innovations in cybercrime and its targets. Tyler Moffitt, Security Analyst, joins Joe Panettieri to cover key trends from the last 10 years, and what they mean for today’s businesses.
In mid-2018, PhishPoint wreaked havoc on many Microsoft Office 365 users duping them into sharing their login credentials allowing access to critical systems. Joe Panettieri and Webroot’s Charlie Tomeo explore the uniqueness of this scenario, how cybercriminals manipulate users with phishing attacks, high-profile phishing successes, and how they can be prevented.Webroot podcasts explore the hottest topics in cybersecurity. Featuring guest industry experts, episodes look at the most significant trends, difficulties, and solutions in cybersecurity today,