POPULARITY
Authorities sanctioned 11 alleged members of the cybercriminal groups, while the US Justice Department unsealed three federal indictments against nine people accused of being members. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoices
How do you conduct an incident response for an entire country? When it's 27 different life-critical government ministries each with up to 850 individual devices -- that's uncharted territory. Esteban Jimenez of ATTI Cyber talks about his experience with the reconstruction of the cybersecurity system following Conti, how the country handled a second ransomware attack from the Hive ransomware group, and we'll discuss what yet remains to be done to secure Costa Rica -- and other Latin American countries from future attacks. Transcript here.
What is is like to hack an entire country, to take it's government services offline, to deny a government an ability to function? Costa Rica knows. Esteban Jimenez of AttiCyber has been helping Costa Rica improve its cybersecurity posture for more than 16 years, and he has been helping them recently recover from a crippling ransomware attack in April 2022 that hit 28 ministries of the government. Central and Latin America appear to be a new playground for bad actors testing new malware. But Central and Latin America are learning how to fight back.
What is Conti (ransomware)? --- Support this podcast: https://podcasters.spotify.com/pod/show/wikipediaread/support
What is Conti (ransomware)? --- Support this podcast: https://podcasters.spotify.com/pod/show/wikipediaread/support
For around two years the Conti ransomware group rampaged across the internet. They attacked hospitals, educational institutions, businesses, governments, and many more, raking in hundreds of millions of dollars in ransomware payments. Business was booming for the cybercriminals. At least it was until the Russian President Vladimir Putin announced the full-scale invasion of Ukraine. The Conti leadership quickly pledged their loyalty to Russia and then everything began to fall apart.This is the story of one of the most professional, prolific, and devastating organized cybercriminal groups in history.Speaker(s):Selena Larson – Senior Threat Intelligence Analyst and DISCARDED Podcast Co-host at Proofpoint - TwitterBerk Albayrak, Threat Intelligence Analyst within the PRODAFT Threat Intelligence team and expert on Wizard Spider - TwitterConor Gallagher – Crime and Security Correspondent of the Irish Times - TwitterAllan Liska, Threat Intelligence Analyst at Recorded Future and author of Ransomware: Understand. Precent. Recover. - TwitterJuan Ignacio Nicolossi, the team leader for the Threat Intelligence Team at PRODAFT.Zoë Brammer, Cyber & Information Operations Associate at the Institute for Security and Technology - Ransomware Ecosystem MapJake Moore, Global Cybersecurity Advisor for ESET.Artwork by Paulina Rosol-BarrassAdditional Reading:Reports/Papers:PRODAFT - Conti Ransomware Group In-Depth AnalysisPRODAFT - Wizard Spider In-Depth AnalysisGoogle - Fog of War: How the Ukraine Conflict Transformed the Cyber Threat LandscapeDISCARDED Podcast (Proofpoint) -
Grab a cup of coffee and join Ryan Kovar, Mick Baccio, and Audra Streetman for another episode of Coffee Talk with SURGe. You can watch the episode livestream here. This week the team from Splunk discussed Signal's response to the Twilio breach, the FTC's effort to create new data privacy rules, and a $10 million reward for information about a suspected Conti ransomware operator. Mick and Ryan competed in a 60 second charity challenge benefiting The Hunger Project. They each took turns explaining the importance of encrypted comms following news of Facebook testing end-to-end encrypted messages on the Messenger app. They also talked about their experience at Black Hat and Defcon last week in Las Vegas. Links: Signal says 1,900 users' phone numbers exposed by Twilio breach (Tech Crunch) FTC moves to create data security and privacy rules (The Record) U.S. State Department reward for information about alleged Conti suspect (Twitter) Facebook begins testing default end-to-end encryption on Messenger (The Verge)
The U.S. government said it will offer up to $10 million for information related to five people believed to be high-ranking members of the notorious Russia-backed Conti ransomware gang.
The U.S. government said it will offer up to $10 million for information related to five people believed to be high-ranking members of the notorious Russia-backed Conti ransomware gang.
On Security Now, Steve Gibson explains what has happened to the Conti ransomware gang. For more, check out Security Now: https://twit.tv/sn/877 Hosts: Steve Gibson and Jason Howell You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/
On Security Now, Steve Gibson explains what has happened to the Conti ransomware gang. For more, check out Security Now: https://twit.tv/sn/877 Hosts: Steve Gibson and Jason Howell You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/
On Security Now, Steve Gibson and Leo Laporte discuss how the Conti ransomware gang have been actively compromising Intel motherboard firmware. For this story and more, check out Security Now: https://twit.tv/sn/874 Hosts: Steve Gibson and Leo Laporte You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/
On Security Now, Steve Gibson and Leo Laporte discuss how the Conti ransomware gang have been actively compromising Intel motherboard firmware. For this story and more, check out Security Now: https://twit.tv/sn/874 Hosts: Steve Gibson and Leo Laporte You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/
On Security Now, Steve Gibson and Leo Laporte discuss how the Conti ransomware gang have been actively compromising Intel motherboard firmware. For this story and more, check out Security Now: https://twit.tv/sn/874 Hosts: Steve Gibson and Leo Laporte You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/
PEBCAK Podcast: Information Security News by Some All Around Good People
Welcome to this week's episode of the PEBCAK Podcast! We've got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast PEBCAK - Acronym of “problem exists between chair and keyboard.”
The new president of Costa Rica has declared that his country is at war with a ransomware group. The cybercriminal gang known as ‘Conti' has disabled agencies across the government since April using ransomware attacks.Plus, the CEO of a disability rights group has praised Apple for its new accessibility tools. We speak with Kamran Mallick from Disability Rights UK about the new tech, including voice controls, eye tracking and door detection for the blind.Plus:‘Closest probe to the sun' captures ‘breathtaking' imagesBoeing's Starliner to launch uncrewed test flight to International Space StationEU reveals plans to stop using Russian gasTesla opens up its superchargers to all EV drivers in the UKWhatsApp reportedly testing a new feature that lets you quietly leave group chats Follow us on Twitter for more news @EveningStandard See acast.com/privacy for privacy and opt-out information.
On Security Now, Leo Laporte and Steve Gibson talk about how the Conti ransomware gang wants to overthrow the Costa Rican government. For this story and more, check out Security Now: https://twit.tv/sn/871 Hosts: Steve Gibson and Leo Laporte You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/
This episode reports on credit card web scraping with PHP, Conti ransomware gang threatens overthrow of Costa Rica, a warning to users of Bluetooth Low Energy smart locks patches from Nvidia
On Security Now, Leo Laporte and Steve Gibson talk about how the Conti ransomware gang wants to overthrow the Costa Rican government. For this story and more, check out Security Now: https://twit.tv/sn/871 Hosts: Steve Gibson and Leo Laporte You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/
On the show today, we cast our own Conti ransomware documentary and, in Watchtower Weekly, we marvel at government quantum computing. We also invite 1Password's Director of Product Design, Jamie Heuze, to discuss 1Password 8 on iOS and Android – now in early access! Hit play to find out all the delicious new features and for a backstage look into the design process.
The Conti Ransomware gang has startled many for their criminally effective startup environment. Well organized with third party affiliates and even “bounties” for enterprise insiders to provide them with information on their own organizations makes them #Conti is one of the most prolific ransomware gangs today. Join to learn about:How the Conti Ransomware attacks do reconnaissance and pick their targets.Their favorite best practices tools, tactics, and techniques.How offensive testing techniques can be used in your enterprise to safely simulate Conti attacks to shore up defenses against them and other attackers.Check out Cymulate's 2021 State of Cybersecurity Effectiveness Usage Report for free here: https://cymulate.com/resources/2021-c...Dave Klein, Director, and Cyber Evangelist for Cymulate is a 20 plus year cybersecurity veteran is a well-known author, speaker, and cybersecurity expert.Simply Cyber's mission is to help purpose driven professionals make and and take a cybersecurity career further, faster.
This episode reports on ransomware, wiperware, the latest attacks by APT29 and a warning to NAS users
This episode is a unique look inside the Conti ransomware group, courtesy of a four-part series from Krebs on Security. We review the interesting takeaways from Brian Kreb's series of over 12,000-words from quite a bit of research. The series was inspired by a hack of Conti that resulted in a traunch of internal documents being made public. This gives a unique view into how the organization thinks, how it is laid out just like any other business, the weapons it uses to spread ransomware, and its attempts to branch out to other areas of cybercrime. If you enjoy the episode, be sure to check out the articles that inspired it: https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-i-evasion (https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-i-evasion) https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-ii-the-office (https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-ii-the-office) https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-iii-weaponry (https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-iii-weaponry) https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-iv-cryptocrime (https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-iv-cryptocrime) Mentioned in this episode: Free eBook version of O'Reilly's Modern Data Protection For a limited time, you can get a free ebook copy of my latest O'Reilly book, Modern Data Protection. Just go to druva.com/podcast and download it!
This week, Dr. Doug talks: Modern problems, Conti, Toyota, Android and Android, BitB, HP, and Jason Wood on this edition of the Security Weekly News! Show Notes: https://securityweekly.com/swn197 Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, Dr. Doug talks: Modern problems, Conti, Toyota, Android and Android, BitB, HP, and Jason Wood on this edition of the Security Weekly News! Show Notes: https://securityweekly.com/swn197 Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, Dr. Doug talks: Modern problems, Conti, Toyota, Android and Android, BitB, HP, and Jason Wood on this edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn197
Viasat Cyberattack, AvosLocker & Conti Ransomware & China joins the fight Cybersecurity News CyberHub Podcast March 21st, 2022 Today's Headlines and the latest #cybernews from the desk of the #CISO: CISA, FBI warn of satellite network hacks following Viasat cyberattack Western Digital app bug gives elevated privileges in Windows, macOS US Critical Infrastructure Targeted by AvosLocker Ransomware 'CryptoRom' Crypto Scam Abusing iPhone Features to Target Mobile Users Ukrainian Security Researcher Leaks Newer Conti Ransomware Source Code Google: Chinese state hackers target Ukraine's government Story Links: https://therecord.media/cisa-fbi-warn-of-satellite-network-hacks-following-viasat-cyberattack/ https://www.bleepingcomputer.com/news/security/western-digital-app-bug-gives-elevated-privileges-in-windows-macos/ https://www.securityweek.com/us-critical-infrastructure-targeted-avoslocker-ransomware https://thehackernews.com/2022/03/cryptorom-crypto-scam-abusing-iphone.html https://www.securityweek.com/ukrainian-security-researcher-leaks-newer-conti-ransomware-source-code https://www.bleepingcomputer.com/news/security/google-chinese-state-hackers-target-ukraine-s-government/ “The Microsoft Doctrine” by James Azar now on Substack https://jamesazar.substack.com/p/the-microsoft-doctrine The Practitioner Brief is sponsored by: KnowBe4: https://info.knowbe4.com/phishing-security-test-cyberhub ****** Find James Azar Host of CyberHub Podcast, CISO Talk, Goodbye Privacy, Digital Debate, and Other Side of Cyber James on Linkedin: https://www.linkedin.com/in/james-azar-a1655316/ Telegram: CyberHub Podcast ****** Sign up for our newsletter with the best of CyberHub Podcast delivered to your inbox once a month: http://bit.ly/cyberhubengage-newsletter ****** Website: https://www.cyberhubpodcast.com Youtube: https://www.youtube.com/c/TheCyberHubPodcast Rumble: https://rumble.com/c/c-1353861 Facebook: https://www.facebook.com/CyberHubpodcast/ Linkedin: https://www.linkedin.com/company/cyberhubpodcast/ Twitter: https://twitter.com/cyberhubpodcast Instagram: https://www.instagram.com/cyberhubpodcast Listen here: https://linktr.ee/cyberhubpodcast The Hub of the Infosec Community. Our mission is to provide substantive and quality content that's more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. Thank you for watching and Please Don't forget to Like this video and Subscribe to my Channel! #cybernews #infosec #cybersecurity #cyberhubpodcast #practitionerbrief #cisotalk #ciso #infosecnews #infosec #infosecurity #cybersecuritytips #podcast #technews #tinkertribe #givingback #securitytribe #securitygang #informationsecurity
Bill and Greg discuss the impact should Russia disconnect form the internet, Pi Day, Conti Ransomware group messages, and the dynamic of Ransomware - how does the war in Ukraine change ransomware now that state sponsored entities are busy?
In this episode, we discussed the Krebs on Security series on the Conti Ransomware chat logs. For an hour. Supporting Article Series - Conti Ransomware Group Diaries, Part I: Evasion If you found this interesting or useful, please follow us on Twitter @serengetisec and subscribe and review on your favorite podcast app!
PEBCAK Podcast: Information Security News by Some All Around Good People
Welcome to this week's episode of the PEBCAK Podcast! We've got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast PEBCAK - Acronym of “problem exists between chair and keyboard.”
Mai menü:HacktivizmusÁramszünetekkel sújtott ukrán városok az energiainfrastruktúra elleni támadások utánOroszország közzéteszi az infrastruktúráját DDoS-támadásokkal támadó IP-k és domainek listájátÚj oldalcsatornás támadás a homomorfikus titkosítás ellenAz oroszbarát Conti Ransomware banda célpontja, belső beszélgetések kiszivárogtakcikk2Samsung Encryption Flawcikk2Ez történik, ha két zsarolóvírus-banda egyszerre hackeli meg ugyanazt a célpontot.Súlyos sebezhetőségek által érintett infúziós szivattyúkOrosz-ukrán háború: hogyan segíthetünk a menekülőknek? | atlatszo.huElérhetőségeink:TelegramTwitterInstagramFacebookMail: info@hackeslangos.show
Much of this episode is devoted to new digital curtain falling across Europe. Gus Horwitz and Mark-MacCarthy review the tech boycott that has seen companies like Apple, Samsung, Microsoft and Adobe pull their service from Russia. Nick Weaver describes how Russia cracked down on independent Russian media outlets and blocked access to the websites of foreign media including the BBC and Facebook. Gus reports on an apparent Russian decision to require all servers and domains to transfer Russian zone, thereby disconnecting itself from the global internet. Mark describes how private companies in the U.S. have excluded Russian media from their systems, including how DirecTV's decision to drop RT America led the Russian 24-hour news channel to shutter its operations. In contrast, the EU officially shut down all RT and Sputnik operations, including their apps and websites. Nick wonders if the enforcement mechanism is up to the task of taking down the websites. Gus, Dave and Mark discuss the myth making in social media about the Ukrainian war such as the Ghost of Kyiv, and wonder if fiction might do some good to keep up the morale of the besieged country. Dave Aitel reminds us that despite the apparent lack of cyberattacks in the war, more might be going on under the surface. He also he tells us more about the internal attack that affected the Conti Ransomware gang when they voiced support for Russia. Nick opines that cryptocurrencies do not have the volume to serve as an effective way around the financial sanctions against Russia. Sultan Meghji agrees that the financial sanctions will accelerate the move away from the dollar as the world's reserve currency and is skeptical that a principles-based constraint will do much good to halt that trend. A few things happened other than the war in Ukraine, including President Biden's first state of the union address. Gus notices that much of the speech was devoted to tech. He notes that the presence in the audience of Frances Haugen, the Facebook whistleblower, highlighted Biden's embrace of stronger online children's privacy laws and that the presence of Intel CEO Patrick Gelsinger gave the president the opportunity to pitch his plan to support domestic chip production. Sultan and Dave discuss the cybersecurity bill that passed out of the Senate unanimously. It would require companies in critical sectors to report cyberattacks and ransomware to the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA). They also analyze the concerns that companies have about providing information to the FBI. Dave thinks the bills that were discussed in this week's House Commerce hearing to hold Big Tech accountable, respond to wide-spread public concerns about tech's surveillance business model, but still he thinks they are unlikely to make it through the process to become law. Gus says that Amazon's certification that it has responded to the Federal Trade Commission's inquiries about its proposed $6.5 billion MGM merger triggers a statutory deadline for the agency to act. It is not the company's fault, he says, that the agency has a 2-2 between Democrats and Republicans that will likely prevent them opposing the merger in time. I take the opportunity to note that the Senate Commerce committee sent the nominations of Alvaro Bedoya for the Federal Trade Commission and Gigi Sohn for the Federal Communications Commission to the Senate floor, but that it would likely be several months before the full Senate would act on the nominations. Finally, Nick argues that certain measures in the European Commission's proposed digital identity framework, aiming to improve authentication on the web, would in practice have the opposite effect of dramatically weakening web security. Download the 397th Episode (mp3) You can subscribe to The Cyberlaw Podcast using iTunes, Google Play, Spotify, Pocket Casts, or our RSS feed. As always, The Cyberlaw Podcast is open to feedback. Be sure to engage with @stewartbaker on Twitter. Send your questions, comments, and suggestions for topics or interviewees to CyberlawPodcast@steptoe.com. Remember: If your suggested guest appears on the show, we will send you a highly coveted Cyberlaw Podcast mug! The views expressed in this podcast are those of the speakers and do not reflect the opinions of their institutions, clients, friends, families, or pets.
Much of this episode is devoted to new digital curtain falling across Europe. Gus Horwitz and Mark-MacCarthy review the tech boycott that has seen companies like Apple, Samsung, Microsoft and Adobe pull their service from Russia. Nick Weaver describes how Russia cracked down on independent Russian media outlets and blocked access to the websites of foreign media including the BBC and Facebook. Gus reports on an apparent Russian decision to require all servers and domains to transfer Russian zone, thereby disconnecting itself from the global internet. Mark describes how private companies in the U.S. have excluded Russian media from their systems, including how DirecTV's decision to drop RT America led the Russian 24-hour news channel to shutter its operations. In contrast, the EU officially shut down all RT and Sputnik operations, including their apps and websites. Nick wonders if the enforcement mechanism is up to the task of taking down the websites. Gus, Dave and Mark discuss the myth making in social media about the Ukrainian war such as the Ghost of Kyiv, and wonder if fiction might do some good to keep up the morale of the besieged country. Dave Aitel reminds us that despite the apparent lack of cyberattacks in the war, more might be going on under the surface. He also he tells us more about the internal attack that affected the Conti Ransomware gang when they voiced support for Russia. Nick opines that cryptocurrencies do not have the volume to serve as an effective way around the financial sanctions against Russia. Sultan Meghji agrees that the financial sanctions will accelerate the move away from the dollar as the world's reserve currency and is skeptical that a principles-based constraint will do much good to halt that trend. A few things happened other than the war in Ukraine, including President Biden's first state of the union address. Gus notices that much of the speech was devoted to tech. He notes that the presence in the audience of Frances Haugen, the Facebook whistleblower, highlighted Biden's embrace of stronger online children's privacy laws and that the presence of Intel CEO Patrick Gelsinger gave the president the opportunity to pitch his plan to support domestic chip production. Sultan and Dave discuss the cybersecurity bill that passed out of the Senate unanimously. It would require companies in critical sectors to report cyberattacks and ransomware to the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA). They also analyze the concerns that companies have about providing information to the FBI. Dave thinks the bills that were discussed in this week's House Commerce hearing to hold Big Tech accountable, respond to wide-spread public concerns about tech's surveillance business model, but still he thinks they are unlikely to make it through the process to become law. Gus says that Amazon's certification that it has responded to the Federal Trade Commission's inquiries about its proposed $6.5 billion MGM merger triggers a statutory deadline for the agency to act. It is not the company's fault, he says, that the agency has a 2-2 between Democrats and Republicans that will likely prevent them opposing the merger in time. I take the opportunity to note that the Senate Commerce committee sent the nominations of Alvaro Bedoya for the Federal Trade Commission and Gigi Sohn for the Federal Communications Commission to the Senate floor, but that it would likely be several months before the full Senate would act on the nominations. Finally, Nick argues that certain measures in the European Commission's proposed digital identity framework, aiming to improve authentication on the web, would in practice have the opposite effect of dramatically weakening web security. Download the 397th Episode (mp3) You can subscribe to The Cyberlaw Podcast using iTunes, Google Play, Spotify, Pocket Casts, or our RSS feed. As always, The Cyberlaw Podcast is open to feedback. Be sure to engage with @stewartbaker on Twitter. Send your questions, comments, and suggestions for topics or interviewees to CyberlawPodcast@steptoe.com. Remember: If your suggested guest appears on the show, we will send you a highly coveted Cyberlaw Podcast mug! The views expressed in this podcast are those of the speakers and do not reflect the opinions of their institutions, clients, friends, families, or pets.
As my de-Google project progresses, I realized that I skipped the most important step: reconnaissance. Before you can de-Google your life, you need to first make a list of the Google products and services you interact with - and not all of them have "Google" in their names. Google also owns YouTube, Waze, Nest, Fitbit, Chromebooks, and much more. Furthermore, you need to know and understand what information Google already knows about you. And while you're doing that, you should delete all the existing data and prevent further collection. Thankfully, Google provides several tools to help you do this (most likely due to regulations like GDPR and CCPA). I'll help you create your personal de-Google to-do list. In other news: today I'm launching a massive giveaway promotion to celebrate the 5th anniversary of the podcast!! Also, 100 million Samsung phones shipped with horrible security flaws; Nvidia hackers are pressuring the company to turn off cryptocurrency mining limitations; the (Russian) Conti and TrickBot ransomware operations have been hacked; details of 120,000 Russian soldiers in Ukraine have been leaked (on purpose); the US Senate has passed landmark cybersecurity legislation in light of the rising cyber warfare threat; and the ACLU has published a sobering report about a mass surveillance company called Flock (no relation to Google's FLoC). Article Links 100 Million Samsung Phones Shipped With Flawed Encryption https://www.cpomagazine.com/cyber-security/100-million-samsung-phones-shipped-with-flawed-encryption-galaxy-s8-to-s21-series-cryptographic-keys-trivial-to-expose/ Nvidia Hackers Threaten to Release Mining-Limiter Killer https://www.tomshardware.com/news/nvidia-hackers-threaten-to-release-lhr-performance-limiter Conti Ransomware source code leaked by Ukrainian researcher https://www.bleepingcomputer.com/news/security/conti-ransomware-source-code-leaked-by-ukrainian-researcher/ Details of '120,000 Russian soldiers' leaked by Ukrainian media https://www.theregister.com/2022/03/02/russian_soldier_leaks/ Senate passes cybersecurity act forcing orgs to report cyberattacks, ransom payments https://www.zdnet.com/article/senate-passes-cybersecurity-act-forcing-critical-infrastructure-orgs-to-report-cyberattacks-ransom-payments/ Fast-Growing Company Flock is Building a New AI-Driven Mass-Surveillance System https://www.aclu.org/report/fast-growing-company-flock-building-new-ai-driven-mass-surveillance-system My De-Google Strategy: https://firewallsdontstopdragons.com/my-de-google-strategy/ Lawrence Lessig's article: https://medium.lessig.org/crowdsourced-war-b5774c0ca7b5 Further Info 5th Anniversary Giveaway!! Details will be posted this week on my blog - keep your eye out on my main website! https://firewallsdontstopdragons.com/ Check out Techlore: https://techlore.tech/ Conti Ransomware report from Krebs On Security: https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-i-evasion/ https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-ii-the-office/ https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-iii-weaponry/ Subscribe to the newsletter: https://firewallsdontstopdragons.com/newsletter/new-newsletter/Become a Patron! https://www.patreon.com/FirewallsDontStopDragons Would you like me to speak to your group about security and/privacy? http://bit.ly/Firewalls-SpeakerGenerate secure passphrases! https://d20key.com/#/
This Risk & Repeat podcast episode covers the massive Conti leaks, including the data that was published and what it reveals about the infamous ransomware gang.
[Referências do Episódio] - Timeline dos ataques do Anonymous nos últimos dias - https://www.techarp.com/internet/anonymous-russia-cyberwar-02-28/ - Vídeo do suposto ataque contra uma estação de gás - https://twitter.com/YourAnonNews/status/1497848860319825922 - Leak do Conti Ransomware - https://share.vx-underground.org/Conti/ - Registro da fala de -- sobre reação da OTAN a ciberataques - https://www1.folha.uol.com.br/mundo/2022/02/guerra-na-ucrania-muda-de-estagio-com-novas-armas-e-ataque-hacker.shtml - Sobre o ataque contra a Nvidia - https://portswigger.net/daily-swig/cyber-attack-on-nvidia-linked-to-lapsus-ransomware-gang - Nova análise do ransomware Black Cat - https://www.cybereason.com/blog/cybereason-vs.-blackcat-ransomware - Mais detalhes sobre o HermeticWiper e a descoberta do IsaacWiper - https://www.welivesecurity.com/2022/03/01/isaacwiper-hermeticwizard-wiper-worm-targeting-ukraine/ [Ficha técnica] Roteiro e apresentação: Carlos Cabral Edição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia Projeto gráfico: Julian Prieto
The Cyberspace war leakage, Iran Cyberattack and Conti Ransomware Cybersecurity News CyberHub Podcast February 28th, 2022 Today's Headlines and the latest #cybernews from the desk of the #CISO: US, UK Warn of Iranian Cyberattacks on Government, Commercial Networks Russia vs Ukraine - The War in Cyberspace Conti ransomware's internal chats leaked after siding with Russia Ukraine recruits "IT Army" to hack Russian entities, lists 31 targets Elon Musk activates Starlink to help keep Ukraine's internet up and running Story Links: https://www.securityweek.com/us-uk-warn-iranian-cyberattacks-government-commercial-networks https://www.securityweek.com/russia-vs-ukraine-war-cyberspace https://www.bleepingcomputer.com/news/security/conti-ransomwares-internal-chats-leaked-after-siding-with-russia/ https://www.bleepingcomputer.com/news/security/ukraine-recruits-it-army-to-hack-russian-entities-lists-31-targets/ https://www.wired.com/story/ukraine-it-army-russia-war-cyberattacks-ddos/ https://www.zdnet.com/article/elon-musk-activates-starlink-to-help-keep-ukraines-internet-up/ “The Microsoft Doctrine” by James Azar now on Substack https://jamesazar.substack.com/p/the-microsoft-doctrine The Practitioner Brief is sponsored by: KnowBe4: https://info.knowbe4.com/phishing-security-test-cyberhub ****** Find James Azar Host of CyberHub Podcast, CISO Talk, Goodbye Privacy, Digital Debate, and Other Side of Cyber James on Linkedin: https://www.linkedin.com/in/james-azar-a1655316/ Telegram: CyberHub Podcast ****** Sign up for our newsletter with the best of CyberHub Podcast delivered to your inbox once a month: http://bit.ly/cyberhubengage-newsletter ****** Website: https://www.cyberhubpodcast.com Youtube: https://www.youtube.com/c/TheCyberHubPodcast Rumble: https://rumble.com/c/c-1353861 Facebook: https://www.facebook.com/CyberHubpodcast/ Linkedin: https://www.linkedin.com/company/cyberhubpodcast/ Twitter: https://twitter.com/cyberhubpodcast Instagram: https://www.instagram.com/cyberhubpodcast Listen here: https://linktr.ee/cyberhubpodcast The Hub of the Infosec Community. Our mission is to provide substantive and quality content that's more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. Thank you for watching and Please Don't forget to Like this video and Subscribe to my Channel! #cybernews #infosec #cybersecurity #cyberhubpodcast #practitionerbrief #cisotalk #ciso #infosecnews #infosec #infosecurity #cybersecuritytips #podcast #technews #tinkertribe #givingback #securitytribe #securitygang #informationsecurity
As the Ukraine conflict reaches a new tempo hackers have become a critical part of the defense of the country. The government of Ukraine is calling on hackers to help protect critical infrastructure and spy on Russian troops. Meanwhile Chris Krebs, former CISA Director, has tweeted that the Conti Ransomware gang has pledged to strikeContinue reading "There Are No Borders On The Internet – DTNS 4220"
As the Ukraine conflict reaches a new tempo hackers have become a critical part of the defense of the country. The government of Ukraine is calling on hackers to help protect critical infrastructure and spy on Russian troops. Meanwhile Chris Krebs, former CISA Director, has tweeted that the Conti Ransomware gang has pledged to strike back against anyone who attacks Russia, basically confirming their allegiance with Russia, while US and European cybersecurity and tech companies have actively started to support Ukraine in various ways. Starring Tom Merritt, Sarah Lane, Shannon Morse, Roger Chang, Joe, Amos MP3 Download Using a Screen Reader? Click here Multiple versions (ogg, video etc.) from Archive.org Follow us on Twitter Instgram YouTube and Twitch Please SUBSCRIBE HERE. Subscribe through Apple Podcasts. A special thanks to all our supporters–without you, none of this would be possible. If you are willing to support the show or to give as little as 10 cents a day on Patreon, Thank you! Become a Patron! Big thanks to Dan Lueders for the headlines music and Martin Bell for the opening theme! Big thanks to Mustafa A. from thepolarcat.com for the logo! Thanks to our mods Jack_Shid and KAPT_Kipper on the subreddit Send to email to feedback@dailytechnewsshow.com Show Notes To read the show notes in a separate page click here!
As the Ukraine conflict reaches a new tempo hackers have become a critical part of the defense of the country. The government of Ukraine is calling on hackers to help protect critical infrastructure and spy on Russian troops. Meanwhile Chris Krebs, former CISA Director, has tweeted that the Conti Ransomware gang has pledged to strike back against anyone who attacks Russia, basically confirming their allegiance with Russia, while US and European cybersecurity and tech companies have actively started to support Ukraine in various ways.Starring Tom Merritt, Sarah Lane, Shannon Morse, Roger Chang, Joe Link to the Show Notes. See acast.com/privacy for privacy and opt-out information. Become a member at https://plus.acast.com/s/dtns.
Today's Headlines and the latest #cybernews from the desk of the #CISO: Log4j Update & ED 22-021 & Conti Ransomware US federal agency compromised in suspected APT attack Chinese Hackers Spotted Targeting Transportation Sector Citizen Lab Exposes Cytrox as Vendor Behind 'Predator' iPhone Spyware Story Links: https://www.securityweek.com/log4j-update-patches-new-vulnerability-allows-dos-attacks https://www.cisa.gov/emergency-directive-22-02 https://www.zdnet.com/article/conti-ransomware-attacking-vmware-vcenter-servers-through-log4j-vulnerability/ https://therecord.media/us-federal-agency-compromised-in-suspected-apt-attack/ https://www.securityweek.com/trend-micro-spots-chinese-hackers-targeting-transportation-sector https://www.securityweek.com/citizen-lab-exposes-cytrox-vendor-behind-predator-iphone-spyware “The Microsoft Doctrine” by James Azar now on Substack https://jamesazar.substack.com/p/the-microsoft-doctrine The Practitioner Brief is sponsored by: KnowBe4: https://info.knowbe4.com/phishing-security-test-cyberhub **** Find James Azar Host of CyberHub Podcast, CISO Talk, Goodbye Privacy, Digital Debate, Other Side of Cyber James on Linkedin: https://www.linkedin.com/in/james-azar-a1655316/ James on Parler: @realjamesazar Telegram: CyberHub Podcast ****** Sign up for our newsletter with the best of CyberHub Podcast delivered to your inbox once a month: http://bit.ly/cyberhubengage-newsletter ****** Website: https://www.cyberhubpodcast.com Youtube: https://www.youtube.com/channel/UCPoU8iZfKFIsJ1gk0UrvGFw Facebook: https://www.facebook.com/CyberHubpodcast/ Linkedin: https://www.linkedin.com/company/cyberhubpodcast/ Twitter: https://twitter.com/cyberhubpodcast Instagram: https://www.instagram.com/cyberhubpodcast Listen here: https://linktr.ee/cyberhubpodcast The Hub of the Infosec Community. Our mission is to provide substantive and quality content that's more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.
Today's Headlines and the latest #cybernews from the desk of the #CISO: Conti ransomware gang suffers security breach Severe Code Execution Vulnerabilities Affect OpenVPN-Based Applications Exploit released for Microsoft Exchange RCE bug, patch now GoDaddy Breach Exposes 1.2 Million Managed WordPress Customer Accounts Biometric auth bypassed using fingerprint photo, printer, and glue US govt warns of increased ransomware risks during holidays Story Links: https://therecord.media/conti-ransomware-gang-suffers-security-breach/ https://www.securityweek.com/severe-code-execution-vulnerabilities-affect-openvpn-based-applications https://www.bleepingcomputer.com/news/security/exploit-released-for-microsoft-exchange-rce-bug-patch-now/ https://www.securityweek.com/godaddy-breach-exposes-12-million-managed-wordpress-customer-accounts https://www.bleepingcomputer.com/news/security/biometric-auth-bypassed-using-fingerprint-photo-printer-and-glue/ https://www.bleepingcomputer.com/news/security/us-govt-warns-of-increased-ransomware-risks-during-holidays/ “The Microsoft Doctrine” by James Azar now on Substack https://jamesazar.substack.com/p/the-microsoft-doctrine The Practitioner Brief is sponsored by: KnowBe4: https://info.knowbe4.com/phishing-security-test-cyberhub **** Find James Azar Host of CyberHub Podcast, CISO Talk, Goodbye Privacy, Tech Town Square, and Other Side of Cyber James on Linkedin: https://www.linkedin.com/in/james-j-azar/ James on Parler: @realjamesazar Telegram: CyberHub Podcast Locals: https://cyberhubpodcast.locals.com ****** Sign up for our newsletter with the best of CyberHub Podcast delivered to your inbox once a month: http://bit.ly/cyberhubengage-newsletter ****** Website: https://www.cyberhubpodcast.com Youtube: https://www.youtube.com/channel/UCPoU8iZfKFIsJ1gk0UrvGFw Facebook: https://www.facebook.com/CyberHubpodcast/ Linkedin: https://www.linkedin.com/company/cyberhubpodcast/ Twitter: https://twitter.com/cyberhubpodcast Instagram: https://www.instagram.com/cyberhubpodcast Listen here: https://linktr.ee/cyberhubpodcast The Hub of the Infosec Community. Our mission is to provide substantive and quality content that's more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.
Today's episode reports on someone clumsily leaving a database of users of a sex video site open, free incident and vulnerability response advice for IT defenders and a report gives detailed look into the Conti ransomware gang
After the recent stories about Veeam customers being directly targeted by the Conti ransomware group, we invited Rick Vanover and Dave Russell from Veeam to discuss the topic on the podcast. The stories in the press seemed to focus on the attack, as well as how ruthless the Conti ransomware gang tends to be. We thought we'd give Veeam a chance to explain exactly what Veeam customers can do to protect their backups from being exfiltrated and deleted. It seems that Rick, Dave, and company are doing everything they can to explain to all Veeam customers that this is something they should pay attention to. The following are two resources they said should prove useful: Ransomware in 2022: 7 Capabilities You Need for Rapid and Reliable Recovery https://bit.ly/3m32gI8 5 Ransomware Protection Best Practices https://bit.ly/3nh7aAx
Picture of the week Google's FLoC has landed with a hard thud and is now-delayed The high cost of Ireland's recovery from the Conti ransomware attack Who is responsible for damage and data loss following the remote wiping of many Western Digital My Book NAS devices? The story behind an important Edge update Where will Windows 11 run? The passing of an industry legend Steve's favorite web browser keyboard shortcut and his favorite website cloning tool Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsor: att.com/activearmor
Picture of the week Google's FLoC has landed with a hard thud and is now-delayed The high cost of Ireland's recovery from the Conti ransomware attack Who is responsible for damage and data loss following the remote wiping of many Western Digital My Book NAS devices? The story behind an important Edge update Where will Windows 11 run? The passing of an industry legend Steve's favorite web browser keyboard shortcut and his favorite website cloning tool Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsor: att.com/activearmor
Picture of the week Google's FLoC has landed with a hard thud and is now-delayed The high cost of Ireland's recovery from the Conti ransomware attack Who is responsible for damage and data loss following the remote wiping of many Western Digital My Book NAS devices? The story behind an important Edge update Where will Windows 11 run? The passing of an industry legend Steve's favorite web browser keyboard shortcut and his favorite website cloning tool Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsor: att.com/activearmor
Picture of the week Google's FLoC has landed with a hard thud and is now-delayed The high cost of Ireland's recovery from the Conti ransomware attack Who is responsible for damage and data loss following the remote wiping of many Western Digital My Book NAS devices? The story behind an important Edge update Where will Windows 11 run? The passing of an industry legend Steve's favorite web browser keyboard shortcut and his favorite website cloning tool Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsor: att.com/activearmor
Picture of the week Google's FLoC has landed with a hard thud and is now-delayed The high cost of Ireland's recovery from the Conti ransomware attack Who is responsible for damage and data loss following the remote wiping of many Western Digital My Book NAS devices? The story behind an important Edge update Where will Windows 11 run? The passing of an industry legend Steve's favorite web browser keyboard shortcut and his favorite website cloning tool Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsor: att.com/activearmor
Picture of the week Google's FLoC has landed with a hard thud and is now-delayed The high cost of Ireland's recovery from the Conti ransomware attack Who is responsible for damage and data loss following the remote wiping of many Western Digital My Book NAS devices? The story behind an important Edge update Where will Windows 11 run? The passing of an industry legend Steve's favorite web browser keyboard shortcut and his favorite website cloning tool Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsor: att.com/activearmor
Picture of the week Google's FLoC has landed with a hard thud and is now-delayed The high cost of Ireland's recovery from the Conti ransomware attack Who is responsible for damage and data loss following the remote wiping of many Western Digital My Book NAS devices? The story behind an important Edge update Where will Windows 11 run? The passing of an industry legend Steve's favorite web browser keyboard shortcut and his favorite website cloning tool We invite you to read our show notes at https://www.grc.com/sn/SN-825-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsor: att.com/activearmor
Picture of the week Google's FLoC has landed with a hard thud and is now-delayed The high cost of Ireland's recovery from the Conti ransomware attack Who is responsible for damage and data loss following the remote wiping of many Western Digital My Book NAS devices? The story behind an important Edge update Where will Windows 11 run? The passing of an industry legend Steve's favorite web browser keyboard shortcut and his favorite website cloning tool We invite you to read our show notes at https://www.grc.com/sn/SN-825-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsor: att.com/activearmor
Picture of the week Google's FLoC has landed with a hard thud and is now-delayed The high cost of Ireland's recovery from the Conti ransomware attack Who is responsible for damage and data loss following the remote wiping of many Western Digital My Book NAS devices? The story behind an important Edge update Where will Windows 11 run? The passing of an industry legend Steve's favorite web browser keyboard shortcut and his favorite website cloning tool We invite you to read our show notes at https://www.grc.com/sn/SN-825-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsor: att.com/activearmor
Picture of the week Google's FLoC has landed with a hard thud and is now-delayed The high cost of Ireland's recovery from the Conti ransomware attack Who is responsible for damage and data loss following the remote wiping of many Western Digital My Book NAS devices? The story behind an important Edge update Where will Windows 11 run? The passing of an industry legend Steve's favorite web browser keyboard shortcut and his favorite website cloning tool We invite you to read our show notes at https://www.grc.com/sn/SN-825-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsor: att.com/activearmor
Picture of the week Google's FLoC has landed with a hard thud and is now-delayed The high cost of Ireland's recovery from the Conti ransomware attack Who is responsible for damage and data loss following the remote wiping of many Western Digital My Book NAS devices? The story behind an important Edge update Where will Windows 11 run? The passing of an industry legend Steve's favorite web browser keyboard shortcut and his favorite website cloning tool We invite you to read our show notes at https://www.grc.com/sn/SN-825-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsor: att.com/activearmor
Picture of the week Google's FLoC has landed with a hard thud and is now-delayed The high cost of Ireland's recovery from the Conti ransomware attack Who is responsible for damage and data loss following the remote wiping of many Western Digital My Book NAS devices? The story behind an important Edge update Where will Windows 11 run? The passing of an industry legend Steve's favorite web browser keyboard shortcut and his favorite website cloning tool We invite you to read our show notes at https://www.grc.com/sn/SN-825-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsor: att.com/activearmor
Episode 12 of the Triden Group: Security Squad #podcast with Special Guest Mark Sangster!
Topics: 4 vulnerabilities under attack give hackers full control of Android devices Ars Technica Conti ransomware gang victimized US health care, first-responder networks, FBI says Cyber Scoop Irish officials analyze decryption tool as long recovery process from ransomware continues Cyber Scoop News and notes from around the landscape How to Tell a Job Offer from an ID Theft Trap Krebs On Security Recycle Your Phone, Sure, But Maybe Not Your Number Krebs On Security Live Wire is looking at changing telephone companies once again. This is more to benefit callers on the system. If we change companies, the telephone number I've been giving will change. I will announce more if we are changing.
Picture of the Week. Firefox finally achieves sustained "Fission". Conti ransomware. CNA Financial pays up big. When they say IoT do they mean us? "Mean Time to Inventory" The "Doom" CAPTCHA. The "Helios" screensaver. Closing the Loop. The Dark Escrow. We invite you to read our show notes at https://www.grc.com/sn/SN-820-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: Melissa.com/twit udacity.com/TWiT offer code TWIT75 expressvpn.com/securitynow
Picture of the Week. Firefox finally achieves sustained "Fission". Conti ransomware. CNA Financial pays up big. When they say IoT do they mean us? "Mean Time to Inventory" The "Doom" CAPTCHA. The "Helios" screensaver. Closing the Loop. The Dark Escrow. We invite you to read our show notes at https://www.grc.com/sn/SN-820-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: Melissa.com/twit udacity.com/TWiT offer code TWIT75 expressvpn.com/securitynow
Picture of the Week. Firefox finally achieves sustained "Fission". Conti ransomware. CNA Financial pays up big. When they say IoT do they mean us? "Mean Time to Inventory" The "Doom" CAPTCHA. The "Helios" screensaver. Closing the Loop. The Dark Escrow. We invite you to read our show notes at https://www.grc.com/sn/SN-820-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: Melissa.com/twit udacity.com/TWiT offer code TWIT75 expressvpn.com/securitynow
Picture of the Week. Firefox finally achieves sustained "Fission". Conti ransomware. CNA Financial pays up big. When they say IoT do they mean us? "Mean Time to Inventory" The "Doom" CAPTCHA. The "Helios" screensaver. Closing the Loop. The Dark Escrow. We invite you to read our show notes at https://www.grc.com/sn/SN-820-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: Melissa.com/twit udacity.com/TWiT offer code TWIT75 expressvpn.com/securitynow
Picture of the Week. Firefox finally achieves sustained "Fission". Conti ransomware. CNA Financial pays up big. When they say IoT do they mean us? "Mean Time to Inventory" The "Doom" CAPTCHA. The "Helios" screensaver. Closing the Loop. The Dark Escrow. We invite you to read our show notes at https://www.grc.com/sn/SN-820-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: Melissa.com/twit udacity.com/TWiT offer code TWIT75 expressvpn.com/securitynow
Picture of the Week. Firefox finally achieves sustained "Fission". Conti ransomware. CNA Financial pays up big. When they say IoT do they mean us? "Mean Time to Inventory" The "Doom" CAPTCHA. The "Helios" screensaver. Closing the Loop. The Dark Escrow. We invite you to read our show notes at https://www.grc.com/sn/SN-820-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: Melissa.com/twit udacity.com/TWiT offer code TWIT75 expressvpn.com/securitynow
On Security Now, Leo Laporte and Steve Gibson move on from Darkside ransomware to shine a light on Conti ransomware's recent attack of Ireland's health service network. For this story and more, check our Security Now: https://twit.tv/sn/820 Hosts: Steve Gibson and Leo Laporte You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/
Picture of the Week. Firefox finally achieves sustained "Fission". Conti ransomware. CNA Financial pays up big. When they say IoT do they mean us? "Mean Time to Inventory" The "Doom" CAPTCHA. The "Helios" screensaver. Closing the Loop. The Dark Escrow. We invite you to read our show notes at https://www.grc.com/sn/SN-820-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: Melissa.com/twit udacity.com/TWiT offer code TWIT75 expressvpn.com/securitynow
Picture of the Week. Firefox finally achieves sustained "Fission". Conti ransomware. CNA Financial pays up big. When they say IoT do they mean us? "Mean Time to Inventory" The "Doom" CAPTCHA. The "Helios" screensaver. Closing the Loop. The Dark Escrow. We invite you to read our show notes at https://www.grc.com/sn/SN-820-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: Melissa.com/twit udacity.com/TWiT offer code TWIT75 expressvpn.com/securitynow
Picture of the Week. Firefox finally achieves sustained "Fission". Conti ransomware. CNA Financial pays up big. When they say IoT do they mean us? "Mean Time to Inventory" The "Doom" CAPTCHA. The "Helios" screensaver. Closing the Loop. The Dark Escrow. We invite you to read our show notes at https://www.grc.com/sn/SN-820-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: Melissa.com/twit udacity.com/TWiT offer code TWIT75 expressvpn.com/securitynow
On Security Now, Leo Laporte and Steve Gibson move on from Darkside ransomware to shine a light on Conti ransomware's recent attack of Ireland's health service network. For this story and more, check our Security Now: https://twit.tv/sn/820 Hosts: Steve Gibson and Leo Laporte You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/
Picture of the Week. Firefox finally achieves sustained "Fission". Conti ransomware. CNA Financial pays up big. When they say IoT do they mean us? "Mean Time to Inventory" The "Doom" CAPTCHA. The "Helios" screensaver. Closing the Loop. The Dark Escrow. We invite you to read our show notes at https://www.grc.com/sn/SN-820-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: Melissa.com/twit udacity.com/TWiT offer code TWIT75 expressvpn.com/securitynow
On Security Now, Leo Laporte and Steve Gibson move on from Darkside ransomware to shine a light on Conti ransomware's recent attack of Ireland's health service network. For this story and more, check our Security Now: https://twit.tv/shows/security-now/episodes/820 Hosts: Steve Gibson and Leo Laporte You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/
ShadowTalk hosts Sean, Alec, Ivan, and Charles bring you the latest in threat intelligence. This week they cover: - Ivan takes us through the latest updates on DarkSide and the Colonial Pipeline incident - DarkSide faces consequences - The team talks about new legislation from the US government - better late than never? - Plus, our hosts dive into all things ransomware - what’s happening with the cyber threat landscape? - Alec brings us the latest on Conti ransomware targeting Ireland's Department of Health - what was the impact? - Charles discusses a new web skimmer indicating ongoing Magecart activity Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-21-may ***Resources from this week’s podcast*** Colonial Pipeline Updates: https://www.bankinfosecurity.com/2-bills-introduced-in-wake-colonial-pipeline-attack-a-16666 Conti Ransomware: https://www.bleepingcomputer.com/news/security/conti-ransomware-also-targeted-irelands-department-of-health/ PHP Skimmer: https://blog.malwarebytes.com/cybercrime/2021/05/newly-observed-php-based-skimmer-shows-ongoing-magecart-group-12-activity/ Verizon DBIR: https://enterprise.verizon.com/resources/reports/2021-data-breach-investigations-report.pdf Also, don’t forget to reach out to - shadowtalk@digitalshadows.com
In today's podcast we cover four crucial cyber and technology topics, including: 1. Facebook user data for over 500,000,000 for sale on darkweb 2. Capital One informs customers of social security number exposure 3. Conti Ransomware targets school district in Florida, demands 40 million USD 4. DMV support firm Applus technologies impacted by cyber attack I'd love feedback, feel free to send your comments and feedback to | cyberandtechwithmike@gmail.com