POPULARITY
Categories
The EU fines Meta for transatlantic data transfers. FIN7 returns, bearing Cl0p ransomware. Python Package Index temporarily suspends new registrations due to a spike in malicious activity. Typosquatting and TurkoRAT. UNC3944 uses SIM swapping to gain access to Azure admin accounts. A Turla retrospective. Rick Howard tackles workforce development. Our guest is Andrew Peterson of Fastly to discuss the intricate challenges of secure software development. And the FBI was found overstepping its surveillance authorities. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/98 Selected reading. Meta Fined $1.3 Billion Over Data Transfers to U.S. (Wall Street Journal) Meta fined record $1.3 billion and ordered to stop sending European user data to US (AP News) Notorious Cyber Gang FIN7 Returns With Cl0p Ransomware in New Wave of Attacks (The Hacker News) Researchers tie FIN7 cybercrime family to Clop ransomware (The Record) Cybercrime gang FIN7 returned and was spotted delivering Clop ransomware (Security Affairs) PyPI new user and new project registrations temporarily suspended. (Python) PyPI repository restored after temporarily suspending new activity (Computing) RATs found hiding in the NPM attic (ReversingLabs) Legitimate looking npm packages found hosting TurkoRat infostealer (CSO Online) SIM Swapping and Abuse of the Microsoft Azure Serial Console: Serial Is Part of a Well Balanced Attack (Mandiant) Mozilla Explains: SIM swapping (Mozilla) The Underground History of Russia's Most Ingenious Hacker Group (WIRED) Justice Department Announces Court-Authorized Disruption of Snake Malware Network Controlled by Russia's Federal Security Service (US Department of Justice) Hunting Russian Intelligence “Snake” Malware (CISA) FBI misused intelligence database in 278,000 searches, court says (Reuters) FBI misused controversial surveillance tool to investigate Jan. 6 protesters (The Record) FBI broke rules in scouring foreign intelligence on Jan. 6 riot, racial justice protests, court says (AP News)
An investigation exposed that the Pentagon, and taxpayers, get taken advantage of by U.S. defense contractors. Bill Whitaker sits down with a former top contract negotiator who says the accountability system is broken. Cyber con artists are using artificial intelligence, apps and social engineering to scam Americans out of $10 billion dollars a year. Sharyn Alfonsi reports. Famous for his giant sculptures, Jeff Koons holds the record for the highest price ever paid at auction for a work by a living artist. He shares his next big idea with Anderson Cooper.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Dawn Cappelli, OT CERT Director at Dragos, sits down to share what she has learned after her 25+ year career in the industry. She recalls wanting to have been a rockstar when she grew up, now she refers to herself as the fairy godmother of security. She shares some of the amazing things she got to work on throughout her career, including working with the Secret Service when the Olympics came to Salt Lake City, Utah in 2002. She shares how she was able to rise through the ranks to get to where she is now. Dawn talks about how she wasn't ready to retire quite yet because she loved the industry so much, saying "I retired, but I knew I still loved security. I have this passion for protection and so Dragos came along and they offered me this role of Director of OT CERT. I feel like I'm the security fairy godmother." She shares words of wisdom for all trying to get into the industry, saying that you need to always take the risk like she did when she first started her career. We thank Dawn for sharing her story with us.
We talk a lot about understanding the current cyber threats and risks involved in not remaining vigilant in protecting against them. Today, we review the Hospital Cyber Resiliency Initiative Landscape Analysis, recently released by 405d. It provides stats and case studies from the real world. It also gives us areas we need to work on and where we need to put our investment of time and money to protect against these threats. More info at HelpMeWithHIPAA.com/407
Over the past two weeks, the Department of Justice has issued two press releases announcing disruption efforts it has taken against malicious cyber actors. One operation involved the disruption of Russia's so-called Snake Malware Network, and the other involved the indictment of a Russian national for ransomware attacks on critical infrastructure. To talk about these disruption efforts, Lawfare Senior Editor Stephanie Pell sat down with Alex Iftimie, Partner at the law firm Morrison Foerster, and a former federal prosecutor in the National Security and Cyber Crimes Units in the U.S. Attorney's Office for the Eastern District of Virginia. They talked about the operational details and sophistication of some aspects of these disruption operations, the significance and relationship of these operations to other disruption efforts, and how these recent efforts fit into the broader picture of the DOJ's and the U.S. government's efforts to disrupt malicious cyber actors. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
Section 230 survives SCOTUS. Lemon Group's pre-infected devices. The IRS is sending cyber attachés to four countries in a new pilot program. A Wisconsin man is charged with stealing DraftKings credentials. Russian hacktivists conduct DDoS attacks against Polish news outlets. An update on RedStinger. Grayson Milbourne from OpenText Cybersecurity discusses IoT and the price we pay for convenience. Our guest is Matthew Keeley with info on an open source domain spoofing tool, Spoofy. And war principles and hacktivist auxiliaries. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/97 Selected reading. “Honey, I'm Hacked”: Ethical Questions Raised by Ukrainian Cyber Deception of Russian Military Wives (Just Security) A Mysterious Group Has Ties to 15 Years of Ukraine-Russia Hacks (Wired) CloudWizard APT: the bad magic story goes on (SecureList) Ukraine at D+441: Skirmishing along the line of contact, and in cyberspace. (The CyberWire) Russian dissident gets three years in prison colony for DDoS attacks on military website (Cybernews) Europe: The DDoS battlefield (Help Net Security) Russian hackers hit Polish news sites in DDoS attack (Cybernews) 18-year-old charged with hacking 60,000 DraftKings betting accounts (Bleeping Computer) Garrison Complaint (Department of Justice) IRS-CI deploys 4 cyber attachés to locations abroad to combat cybercrime (IRS) IRS deploys cyber attachés to fight cybercrime abroad (The Hill) Cybercrime gang pre-infects millions of Android devices with malware (Bleeping Computer) This Cybercrime Syndicate Pre-Infected Over 8.9 Million Android Phones Worldwide (The Hacker News) Lemon Group's Cybercriminal Businesses Built on Preinfected Devices (Trend Micro)
5/17/23: CYBER CHRIST SUPERSTAR - A.I. AM WHAT A.I. AM W/ MATTHEW JAMES BAILEY "Antichrist consciousness" is trending online now that a tyrant king has been crowned and that Artificial Intelligence is trying to convince us all that it is human. This digital tulpa will be given power by the internet of bodies that will all be enslaved with a biometric tattoo or a chip and ultimately, connect them to the new technocratic spirituality. Advanced tech allegedly will have the power to convince the entire world that an electronic or digital Cyberchrist projection will fool everyone. Tonight on Ground Zero, Clyde Lewis talks with A.I. innovator and pioneer, Matthew James Bailey about CYBER CHRIST SUPERSTAR - A.I. AM WHAT A.I. AM. #GroundZero #ClydeLewis #AI #AntichristConsciousness https://groundzeromedia.org/5-17-23-cyber-christ.../ Ground Zero with Clyde Lewis is live M-F from 7-10pm, pacific time, and streamed for free at groundzero.radio and talkstreamlive.com. There is a delayed broadcast on our local Portland radio station, KPAM 860, from 9pm-12am, pacific time. To leave a message, call our toll-free line at 866-536-7469. To listen by phone: 717-734-6922. To call the live show: 503-225-0860. For Android and iPhones, download the Paranormal Radio app. The transcript of each episode will be posted after the show on our website at groundzeromedia.org. In order to access Ground Zero's exclusive digital library which includes webinars, archived shows/podcasts, research groups, videos, documents, and more, you need to sign up at aftermath.media. Subscriptions start at $7/month. Check out the yearly specials!
One man knows better than most, just what cyber tactics Russia has been using to attack Ukraine – not just since the full invasion in February of 2022 – but since the war began in Crimea in 2014. Since then, Ukraine has served as an unwitting testing ground for Russian cyber aggression with an impact that has often spread well beyond the country's borders. State Secrets host Suzanne Kelly sat down in Kyiv with the head of Ukraine's Department of Cyber and Information Security at the Security Service of Ukraine to dig in on Illia Vitiuk's frontline perspective on what he calls the first cyber war in history.
Cyber agencies warn of BianLian ransomware. There's a new gang using leaked Baduk-based ransomware. Chinese government-linked threat actors target TP-link routers with custom malware. ChatGPT-themed fleeceware is showing up in online stores. Ukraine is now a member of NATO's Cyber Centre. Tim Starks from the Washington Post shares insights on section 702 renewal. Our guest is Ismael Valenzuela from BlackBerry sharing the findings from their Global Threat Intelligence Report. And the CIA's offer to Russian officials may have had some takers. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/95 Selected reading. #StopRansomware: BianLian Ransomware Group (Cybersecurity and Infrastructure Security Agency CISA) Newly identified RA Group compromises companies in U.S. and South Korea with leaked Babuk source code (Cisco Talos Blog) The Dragon Who Sold His Camaro: Analyzing Custom Router Implant (Check Point Research) Fake ChatGPT Apps Scam Users Out of Thousands of Dollars, Sophos Reports (GlobeNewswire News Room) Ukraine joins NATO Cyber Centre (Computing) Russian Officials Unnerved by Ukraine Bloodshed Are Contacting CIA, Agency Says (Wall Street Journal)
DDoS "carpet bombing." Lancefly infests Asian targets. Cyber insurance trends. Infostealers in the C2C market. A Russian espionage service is masquerading as a criminal gang. KillNet's running a psyop radio station of questionable quality. Joe Carrigan describes baiting fraudsters with fake crypto. Our guest is Gemma Moore of Cyberis talking about how red teaming can upskill detection and response teams. And geopolitical DDoS. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/94 Selected reading. 2023 DDoS Threat Intelligence Report (Corero) Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors (Symantec) 2023 Cyber Claims Report (Coalition) The Growing Threat from Infostealers (Secureworks) Cybercriminals who targeted Ukraine are actually Russian government hackers, researchers say (TechCrunch) DDoS Attacks Targeting NATO Members Increasing (Netscout) Following the long-running Russian aggression against Ukraine. (The CyberWire)
Cybersecurity has moved from a luxury to a necessity for pretty much every business. But still, many organizations are operating in a reactive rather than a proactive fashion when it comes to securing their networks. Adam Burke, VP Sales & Partnerships, Quest Technology Management, explains why this is and how to change your mindset and operate in a more secure fashion. Tune in to learn:What is Quest Technology? (1:45)The security needed to work in the cloud (5:10)Recommendations for organizations to address potential security concerns (11:45)Finding the right person to protect your infrastructure (19:30)How to choose the right third-party to help with cybersecurity (22:30)How Adam got his tech chops (25:55)The impact of AI in tracking cybersecurity activity (32:20)How fast Quest can help a customer in need (39:20)The benefits of military service for a tech professional (41:00)–Zayo's future-ready network and tailored connectivity solutions enable some of the world's most innovative companies to connect what's next for their business. Exceptional end-user experiences and better business outcomes demand one thing – a strong, healthy network. How's your network health? There's one way to find out – take Zayo's Network Health Check now. https://zayo.is/3ztMpIuMission.org is a media studio producing content for world-class clients. Learn more at mission.org.
Discord sees a third-party data breach. Black Basta conducts a ransomware attack against technology company ABB. Intrusion Truth returns to dox APT41. Anonymous Sudan looks like a Russian front operation. Attribution and motivation of "RedStinger" remain murky. CISA summarizes Russian cyber offensives. Remote code execution exploits Ruckus in the wild. Our guest is Dave Russell from Veeam with insights on data protection. Matt O'Neill from the US Secret Service on their efforts to thwart email compromise and romance scams. And espionage by way of YouTube comments. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/93 Selected reading. Discord discloses data breach after support agent got hacked (Bleeping Computer) Discord suffered a data after third-party support agent was hacked (Security Affairs) Multinational tech firm ABB hit by Black Basta ransomware attack (Bleeping Computer) Breaking: ABB confirms cyberattack; work underway to restore operations (ET CISO) Black Basta conducts ransomware attack against Swiss technology company ABB (The CyberWire) They dox Chinese hackers. Now, they're back. (Washington Post) What's Cracking at the Kerui Cracking Academy? (Intrusion Truth) Posing as Islamists, Russian Hackers Take Aim at Sweden (Bloomberg) Anonymous Sudan: Threat Intelligence Report (TrueSec) Uncovering RedStinger - Undetected APT cyber operations in Eastern Europe since 2020 (Malwarebytes) Russian ‘Red Stealer' cyberattacks target breakaway territories in Ukraine (Cybernews) Russia Cyber Threat Overview and Advisories (CISA) Known Exploited Vulnerabilities Catalog (CISA) CISA Adds Seven Known Exploited Vulnerabilities to Catalog (CISA) CISA warns of critical Ruckus bug used to infect Wi-Fi access points (Bleeping Computer) Security Bulletins (Ruckus) ROK union leaders charged with spying for North Korea in ‘movie-like' scheme (NK News)
Today on the Social-Engineer Podcast: The Security Awareness Series, Ryan and I are joined by John Young. Like many security experts, John started out on the wrong side of the law by manipulating the AT&T phone system as a teenage phone phreak in New York City before he was scared straight by the FBI. His career started four decades ago in 1982, and by 1987 Young became the network director at McDonnell Douglas's $41.8 billion C-17 program. He eventually retired from IBM after a 30-year career in the corporate cyberwar trenches to launch his own company, CyberDef. Regarded as one of America's top corporate cybersecurity experts and thought leaders, Young's published dozens of articles, appeared on countless podcasts, and is designing a video course for people based on his book so that they can thrive in cybersecurity. [May 15, 2023] 00:00 - Intro 00:53 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 04:51 - John Young Intro 06:41 - Scared Straight 15:38 - Imposter Syndrome 16:53 - Don't Quit Your Day Job! 22:54 - Integration is Key 28:05 - The Effect of AI on Cyber Security 32:32 - Tips to Stay Ahead 38:17 - Policies, Processes and Procedures 38:37 - Book Recommendations: - Don't Hack! – John Young 43:22 - Find John Young Online - LinkedIn: linkedin.com/in/john-young-4aa083151/ - Website: https://cyberdef.tv 43:55 - Learn to Thrive 46:42 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
Cyber-physical architect, artist, and founder of Ozel Office, Güvenç Özel joins the podcast to discuss the impacts of technology on the future of the profession, how architecture is perceived through mixed media, and the design process for his installation, Holoflux, at this year's Coachella Valley Music and Arts Festival CLAIM CEU CREDIT HERE
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Geolocating IPs is Harder Than You Think https://isc.sans.edu/diary/Geolocating%20IPs%20is%20harder%20than%20you%20think/29834 Pre-Infected Mobile Phones https://www.theregister.com/2023/05/11/bh_asia_mobile_phones/ Dragos Breach https://www.dragos.com/blog/deconstructing-a-cybersecurity-event/ AndoryuBot Targets Ruckus Admin RCE Vulnerability https://www.fortinet.com/blog/threat-research/andoryubot-new-botnet-campaign-targets-ruckus-wireless-admin-remote-code-execution-vulnerability-cve-2023-25717
Power and energy security strategist Emma Stewart is always on the lookout for what's next in the U.S. electric grid, whether that be an influx of renewable energy or cyberattacks by malicious hackers. Her engineering background helps her understand how things work so she can break them to build them again, but stronger. Emma has announced she's joining Idaho National Laboratory as Chief Power Grid Scientist and Research Strategist in the lab's National and Homeland Security Directorate, putting her on the forefront of efforts to keep Americans' electricity networks resilient in the face of cyberthreats. Emma previously worked as Chief Scientist for the National Rural Electric Cooperative Association, which represents the nation's roughly 900 non-profit electric co-ops. Because rural infrastructure can lack the same level of funding or support compared to bigger electric companies, she often had to puzzle over how to fortify distributed resources from nation-state cyberthreats.----------Listen to this episode to hear more about: * How cyber mutual assistance programs can help level the playing field in the fight against adversaries * Emma's cancer survivorship * Takeaways from the S4 industrial cybersecurity conference in Miami Beach, where Emma was a speaker
We talk a lot about encrypted phones on Cyber. Everyone loves a secure communication channel that no one can peer into. But some companies, well, if there's criminal activity going on they're gonna sell you out. And the cops have gotten very good at setting up honeypots and hacking into existing networks.But there's one encrypted service out there that is, as far as we know, still secure. It's called No. 1 Business Communication and it's a favorite of the Italian Mafia. On this episode of Cyber, Joseph Cox comes on to explain how and why No. 1 Business Communication has survived in a world where authorities have shut down the competition. Stories discussed in this episode:Inside the Italian Mafia's Encrypted Phone of ChoiceWe're recording CYBER live on Twitch and YouTube. Watch live during the week. Follow us there to get alerts when we go live. We take questions from the audience and yours might just end up on the show. Subscribe to CYBER on Apple Podcasts or wherever you listen to your podcasts. Hosted on Acast. See acast.com/privacy for more information.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Exploratory Data Analysis with CISSM Cyber Attacks Database Part 2 https://isc.sans.edu/diary/Exploratory%20Data%20Analysis%20with%20CISSM%20Cyber%20Attacks%20Database%20-%20Part%202/29828 Microsoft Patched Outlook (actually Windows) vulnerability again https://www.akamai.com/blog/security-research/important-outlook-vulnerability-bypass-windows-api Law Enforcement and Intelligence Agencies Disable "Snake" Malware https://media.defense.gov/2023/May/09/2003218554/-1/-1/1/JOINT_CSA_HUNTING_RU_INTEL_SNAKE_MALWARE_20230509.PDF Fake System Update Drop Malware https://www.malwarebytes.com/blog/threat-intelligence/2023/05/fake-system-update-drops-new-highly-evasive-loader
10 May 2023 AM Show - Mark Cook, Chris York, and Special Guest: No Response from Officials After Vulnerability Demonstration - NASS Revealed; Like, Comment, Share, and SUBSCRIBE! On Rumble: https://rumble.com/user/ConservativeDaily On Foxhole: https://pilled.net/profile/181316 Follow us on Social Media: https://libertylinks.io/ConservativeDaily https://libertylinks.io/JoeOltmann https://libertylinks.io/Apollo https://libertylinks.io/PaulFleuret We might get canceled again…don't miss anything important. Subscribe to our newsletter: https://bit.ly/joinconservativedaily If you want to support the show, you can donate here: http://bit.ly/cd-donate https://www.americaneducationdefenders.com/ is a 501c3 that creates education content to enable children to have fun and develop their gifts! 10% off with Promo Code CD23 All proceeds enable Paul to create more amazing content! Support and protect your family and your second amendment NOW. DCF Guns is your one-stop-shop for firearms, ammunition, body armor, gear, and training. Get prepared for anything at https://www.dcfguns.co/ and use Promo Code JOE for 5% Discount online. Get the best coffee that only TRUE PATRIOTS can handle at https://beardedmancoffee.com/ and use Promo Code 1776 Support the fight for our nation by use promo code CD21 to get up to 66% off at https://www.mypillow.com/radiospecials or by placing your order over the phone at 800-872-0627. BUY 1 GET 1 FREE Special on the MyPillow 2.0 with Code CD21 Become a Conservative Daily member right now for massive savings on Faxblasts and member only perks! Use the link and sign up today! https://conservative-daily.com/forms/Step1b Text FREEDOM to 89517 to get added to our text list to receive notifications when we go Live! Privacy Policy: https://conservative-daily.com/Legal/Privacy Terms: https://conservative-daily.com/Legal/Terms Reply STOP to stop further text messages from Conservative Daily. Message and Data Rates may apply. Need help? (855) 954-6644 or reply HELP. Subscribe to our daily podcast at Apple Podcasts: http://bit.ly/ConservativeDailyPodcast We are also available on Spotify! https://open.spotify.com/show/2wD8YleiBM8bu0l3ahBLDN And on Pandora: https://www.pandora.com/podcast/conservative-daily-podcast/PC:37034 And on iHeart Radio: https://www.iheart.com/podcast/256-conservative-daily-podcast-53710765/ on TuneIn: https://tunein.com/radio/Conservative-Daily-Podcast-p1350272/ And now also on Audible! https://www.audible.com/pd/Conservative-Daily-Podcast-Podcast/B08JJQQ4M Support Joe Oltmann in his legal battle against Eric Coomer: https://givesendgo.com/defendjoeoltmann
A Ransomware report highlights targeting and classification. Phishing remains a major threat. Cisco addresses an expired certificate issue. LockBit and Medusa hit school districts with ransomware. US and Canadian cyber units wrap up a hunt-forward mission in Latvia. Ben Yelin on NYPD surveillance. Our CyberWire producer Liz Irvin interviews Damien Lewke, a graduate student at MIT. And an unknown threat actor is collecting against both Russia and Ukraine. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/90 Selected reading. GRIT Ransomware Report: April 2023 (GuidePoint Security) DNSFilter State of Internet Security - Q1 2023 (DNSFilter) Identify vEdge Certificate Expired on May 9th 2023 (Cisco) The State of Ransomware Attacks in Education 2023: Trends and Solutions (Veriti) US Cyber Command 'Hunts Forward' in Latvia (Voice of America) US cyber team unearths malware during ‘hunt-forward' mission in Latvia (C4ISRNET) Uncovering RedStinger - Undetected APT cyber operations in Eastern Europe since 2020 (Malwarebytes) Bad magic: new APT found in the area of Russo-Ukrainian conflict (Kaspersky)
James Stanger, chief technology evangelist at CompTIA, discusses CompTIA's Cloud+ certification and why security professionals must consider adding it to the certification toolbox.0:00 - CompTIA Cloud+ certification 1:06 - Benefits of Cloud+3:24 - Cloud+ is vendor agnostic6:27 - Preparing for Cloud+8:43 - Cloud+'s future 11:18 - Good Cloud+ training 12:50 - How to study for Cloud+14:26 - OutroAbout InfosecInfosec's mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec Skills to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ's security awareness training. Learn more at infosecinstitute.com.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Microsoft Patch Tuesday https://isc.sans.edu/diary/Microsoft%20May%202023%20Patch%20Tuesday/29826 GitHub "Push Protection" now out of Beta https://github.blog/2023-05-09-push-protection-is-generally-available-and-free-for-all-public-repositories/
Show is Sponsored by https://www.expressvpn.com/yaron & https://www.fountainheadcasts.comJoin this channel to get access to perks:https://www.youtube.com/@YaronBrook/joinLike what you hear? Like, share, and subscribe to stay updated on new videos and help promote the Yaron Brook Show: https://bit.ly/3ztPxTxSupport the Show and become a sponsor: https://www.patreon.com/YaronBrookShowOr make a one-time donation: https://bit.ly/2RZOyJJContinue the discussion by following Yaron on Twitter (https://bit.ly/3iMGl6z) and Facebook (https://bit.ly/3vvWDDC )Want to learn more about Ayn Rand and Objectivism? Visit the Ayn Rand Institute: https://bit.ly/35qoEC3#capitalism #Economy #Objectivism #AynRand #politics
In this week's podcast, we discussed why it was so hard to break into cybersecurity. With the increasing importance of cybersecurity, it was no wonder that more and more people were interested in pursuing a career in this field. Our guest today was Matt Peterson with Guidepoint Security, a cybersecurity professional with over two decades of experience.Matt explained that one of the biggest challenges in breaking into cybersecurity was the ever-changing nature of the field. As new technologies and threats emerge, cybersecurity professionals must constantly stay up to date with the latest tools and techniques. This requires a significant amount of time and effort and can be daunting for those just starting out.Another challenge is the lack of formal education and training programs specifically tailored to cybersecurity. While there are some degree programs and certifications available, they may not provide the practical experience and hands-on training that employers are looking for. This can make it difficult for new professionals to get their foot in the door and gain the necessary knowledge to advance in their careers.Additionally, the cybersecurity field is highly competitive, with many qualified candidates vying for a limited number of job openings. This means that even those with the necessary skills and experience may struggle to find employment in the field.Despite these challenges, Matt emphasized that breaking into cybersecurity is not impossible. Networking, gaining practical experience through internships or volunteer work, and continuing education and training can all help aspiring professionals stand out in a crowded field. With dedication and perseverance, it is possible to build a successful career in cybersecurity.
An analysis of Royal ransomware. PaperCut vulnerability detection methods can be bypassed. Man-in-the-middle phishing attacks are on the rise. A new wave of BEC attacks from an unexpected source. Thomas Etheridge from CrowdStrike, has the latest threat landscape trends. Our guest is Dan Amiga of Island with insights on the enterprise browser category. And a look into recent Russian cyberattacks against Ukraine. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/89 Selected reading. Threat Assessment: Royal Ransomware (Unit 42) PaperCut Exploitation - A Different Path to Code Execution (VulnCheck) New PaperCut RCE exploit created that bypasses existing detections (Bleeping Computer) Man-in-the-Middle (MitM) attacks reaching inboxes increase 35% since 2022 (Cofense) Exploring the Rise of Israel-Based BEC Attacks (Abnormal Security) Russians launch mass cyber attack on online service for queueing to cross border by trucks (Ukrainska Pravda) Reverting UAC-0006: Mass distribution of SmokeLoader using the "accounts" theme (CERT-UA#6613) (CERT-UA)
Nathan Paul Southern (@NathanPSouthern) and Lindsey Kennedy (@LindsAKennedy) are investigative journalists working to bring awareness to the growing issue of cyber-slavery in Southeast Asia facilitated by Chinese triads with links to local government and law enforcement agencies. What We Discuss with Nathan Paul Southern and Lindsey Kennedy: Aided by corrupt government and law enforcement agencies, organized criminals hold thousands of people in modern-day slavery in Southeast Asia, forcing them to run cyber-scams worldwide. Victims are lured by promises of lucrative online trading jobs, and abducted against their will when they arrive — for a minimum of six months — to work as cyber-slaves. These captives are beaten, electrocuted, and tortured if they try to escape or don't make enough money. Suicides, with victims jumping from balconies to their death, have become commonplace. The Cambodian Prime Minister's nephew has been implicated in the human trafficking trade, which is why embassies have been ignored when they plead for intervention. What those of us in the Western world can do to fight back against these organized crime groups and ensure their dirty deeds can no longer be done dirt cheap enough to turn a profit. And much more... Full show notes and resources can be found here: jordanharbinger.com/833 This Episode Is Brought To You By Our Fine Sponsors: jordanharbinger.com/deals Sign up for Six-Minute Networking — our free networking and relationship development mini course — at jordanharbinger.com/course! Like this show? Please leave us a review here — even one sentence helps! Consider including your Twitter handle so we can thank you personally!
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
QR Codes Used in Fake Parking Tickets and Surveys https://www.bleepingcomputer.com/news/security/qr-codes-used-in-fake-parking-tickets-surveys-to-steal-your-money/ Microsoft Edge Update https://learn.microsoft.com/en-us/deployedge/microsoft-edge-relnote-stable-channel Facebook Sees More Fake ChatGPT https://about.fb.com/news/2023/05/metas-q1-2023-security-reports/ CyberGhost VPN Vulnerability https://www.pentestpartners.com/security-blog/bullied-by-bugcrowd-over-kape-cyberghost-disclosure/
Welcome to Talking Cyber, a Cybercrime Magazine podcast series that covers the latest news and breaking stories on the cybereconomy, hackers, intrusions, privacy, security and much more. In this episode, host Theresa Payton is joined by Heather Engel, Managing Partner at Strategic Cyber Partners. To learn more about today's stories, visit https://cybercrimewire.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
Episode 476 is brought to you by... Pickup Music: https://pickupmusic.co/60cyclehum Stringjoy: https://stringjoy.com/partner/60cyclehum/ Use code: HUM to save 10% Big Ear Pedals: https://www.bigearpedals.com/ Chase Bliss Audio: https://www.chaseblissaudio.com/ Support this channel: https://www.patreon.com/60CycleHumcast Want to send us mail? 60 Cycle Hum #615 9450 Mira Mesa Blvd. San Diego, CA 92126 Who's up for a Star Wars marathon? 00:00 Bongcaster - Glassical Creations | Asheville NC | Facebook 28:43 Headless Cyber Freak Guitar 35:30 Steve gives a little more background on why Pickup Music has been working for him 40:30 Gibson has a new CEO, but let's pretend we're the CEOs. 1:05:40 Say Cheese! This week's song was from Kate Ruckus of The Axxxidentals and is called "Get Weird" ***************************** 60CH on Patreon: https://www.patreon.com/60CycleHumcast Buy Something with our affiliate links: Buy a Shirt - https://teespring.com/stores/60-cycle-hum Sweetwater: https://imp.i114863.net/rMb1D zZounds: https://www.zzounds.com/a--3980929 Thomann: https://www.thomannmusic.com/thlpg_1a2l8gl9bs.html?offid=1&affid=405 Amazon: https://amzn.to/2PaUKKO Perfect Circuit: https://bit.ly/3YQG309 Ebay: https://ebay.to/2UlIN6z Reverb: https://reverb.grsm.io/60cyclehum6164 Cool Patch Cables: https://www.tourgeardesigns.com/discount/60cyclehum +++++++++++++++++++++ Social Media Stuff: Facebook: https://www.facebook.com/groups/60cyclehum/ Discord: https://discord.gg/nNue5mPvZX Instagram and Twitter @60cyclehum TikTok: https://www.tiktok.com/@60cyclehum? Hire us for Demos and other marketing opportunities https://60cyclehumcast.com/marketing-packages/ #60cyclehum #guitar #guitars #shameflute
In this week's episode we welcome Uri Levy, the global head of sales of cybersecurity hypergrowth vendor XM Cyber who shares his story, his strategy for scaling revenue around the world and his tips for managing sales teams - and sales leaders. KEY TAKEAWAYS FROM THIS EPISODE: What makes a successful sales leader: understand your data, empower your team and make sure your strategy is aligned with your corporate objectives Hypergrowth: there's no silver bullet! Understand your customer,your market, how you differentiate and how to execute How to determine product market fit Uri Levy is an experienced Cybersecurity Executive with a successful track record in the Strategic and Operational Turnaround of Technology & Cyber companies. He is a graduate of Reichman University and gained his MBA from Tel Aviv University and over the last 25 years, he has built and managed leading network and security solution providers, and consistently achieved sustained growth and brand leadership. His career spans leadership positions with companies such as Computer Associates, PSINet, Xpert Systems, Netcom systems and Skybox Security, and since September 2020 he has been Senior Vice President of Worldwide Sales with leading cyber vendor XM Cyber. LinkedIn: https://www.linkedin.com/in/urilevy/ Website: https://www.xmcyber.com/ YOUR HOST Simon Lader is the host of The Conference Room, Co-Founder of global executive search firm Salisi Human Capital, and podcast growth consultancy Viva Podcasts. Since 1997, Simon has helped cybersecurity vendors to build highly effective teams, and since 2022 he has helped people make money from podcasting. Get to know more about Simon at: Website: https://simonlader.com/ Make Money from Podcasting: https://www.vivapodcasts.com/podcastpowerups Twitter: https://twitter.com/simonlader LinkedIn: https://www.linkedin.com/in/headhuntersimonlader Spotify: https://open.spotify.com/show/3dd0obQSM8cYRV0HCxiuF0
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Quickly Finding Encoded Payloads in Office Documents https://isc.sans.edu/forums/diary/Quickly+Finding+Encoded+Payloads+in+Office+Documents/29818/ Exploratory Data Analysis with CISSM Cyber Attacks Database Part 1 https://isc.sans.edu/forums/diary/Exploratory+Data+Analysis+with+CISSM+Cyber+Attacks+Database+Part+1/29816/ Guildma is now Abusing Colorcpl.exe LOLBIN https://isc.sans.edu/forums/diary/Guildma+is+now+abusing+colorcplexe+LOLBIN/29814/ Leaked MSI Keys https://github.com/binarly-io/SupplyChainAttacks/blob/main/MSI/ImpactedDevices.md https://twitter.com/matrosov/status/1654560343295934464 PHP Packages Compromised https://blog.packagist.com/packagist-org-maintainer-account-takeover/
Weaver Outrage Meter: Low AI Ethics in Managed Services You heard correctly. Ethics in artificial intelligence. This is going to be a big issue moving forward and MSPs had better familiarize themselves with what is happening because before too long, MSPs will be dealing directly with AI devices and scenarios. Compliance reporting All the discussion around compliance lately is missing one crucial element: reporting. Without reporting, no compliance exercise you undertake will be of use to anyone outside your organization. Compliance reporting Balancing transparency with security Lessons learned from FFIEC Making Peace with Cyber Consultants The old adage is "if you can't beat 'em, join 'em." Well, that's not exactly the issue here but it's close. Maybe a better way to put it is "if they can't beat you, they should join you." Cyber consultants are likely here to stay, which is not to say that we can't (or shouldn't) attempt to forge a pathway that is, if not together, at least on parallel tracks. Cyber workers are like anyone else…they all start from the beginning Cyber workers need to understand their own career path Cyber workers need to understand MSPs and be respectful of the role they have
There is no Spoonfeeding in this absolutely flawless, perfect film from outside the purview of the dumb decade they do a podcast about, The Matrix (1999), as well as its 2000s era sequels - movies so bad, they retroactively ruined a great movie. They look at how The Matrix, an End of History era sci-fi action, hacker thriller, kung fu movie changed the game in so many ways both then and now: from parodies, to memes, to legacy sequels, to the disconcerting number of people who truly believe we are living in a simulation. Themes discussion starts at 1:04:30
“Man plans, the Universe laughs” - unfortunately, that's been the saying for far too long when it comes to cybersecurity. Security leaders know it's only a matter of time before their organization gets breached, but instead of being ready for it, they rely on fixing the problem after it happens. In Cisco's newest report, the first ever Cybersecurity Readiness Index, it was found that a small minority of businesses globally (15%) consider themselves to be ready and able to defend against the expanding array of cybersecurity risks and threats of today. Organizations need to get ready and stay ready with solutions they can trust. This segment is sponsored by Cisco. Visit https://securityweekly.com/ciscorsac to learn more about them! OpenText Cybersecurity is on a mission to simplify security by delivering smarter, innovative solutions. Geoff Bibby, the SVP of OpenText Cybersecurity Marketing & Strategy, will offer insight into the company's purpose-built approach to create a powerhouse cybersecurity portfolio that scales to meet the security needs of large enterprises down to individual consumers. This segment is sponsored by OpenText. Visit https://securityweekly.com/opentextrsac to learn more about them! The continued headcount shortage facing cybersecurity teams is driving many organizations to embrace Managed Detection and Response (MDR) as a way to combat cyber threats. With this demand, dozens of MDR companies have emerged over the past two years. Critical Start's CTO, Randy Watkins, will discuss the origin of MDR, share evaluation tips, and reveal some of the potential pitfalls. This segment is sponsored by Critical Start. Visit https://securityweekly.com/criticalstartrsac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw316
Christopher will delve into what lateral security/lateral movement are and identify key lateral security tools (network segmentation, micro-segmentation, advanced threat prevention systems, network sandboxes, and network traffic analysis/network detection and response). He will also touch on why automation is important when it comes to consistent security and the current threat landscape. Segment Resources: https://cio.vmware.com/2023/03/why-cisos-are-looking-to-lateral-security-to-mitigate-ransomware.html https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/lateral-security-is-the-new-cybersecurity-battleground-solution-overview.pdf https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmw-ransomware-lateral-security.pdf This segment is sponsored by VMware. Visit https://securityweekly.com/vmwarenetsecrsac to learn more about them! AT&T Cybersecurity released its 12th annual Cybersecurity Insights Report, “Edge Ecosystem,” which highlights the dramatic shift in computing underpinned by 5G, the edge, and the convergence of networking and security. The report found that business and technology leaders are finally coming together not just to understand the new edge computing ecosystem, but to make more predictable, data-informed business decisions. Collaboration among these leaders, as well as external partners in the ecosystem, will be critical for the edge journey ahead – but more progress must be made to better leverage the edge and transform the business. This segment is sponsored by AT&T Cybersecurity. Visit https://securityweekly.com/attrsac to learn more about them! EASM is a critical component of continuous threat exposure management and a necessary step in improving validation and vulnerability management processes. Gartner recently published a report describing the evolution of EASM and where it's headed in the market. e're excited to see the market move in this direction because, at NetSPI, we're already committed to investing in our team and technology to stay ahead of these trends. We already have a head start. This segment is sponsored by NetSpi. Visit https://securityweekly.com/netspirsac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw316
THIS WEEK!! We got a beer fridge! This is very exciting, obviously, because for six years we have just been drinking not refrigerated beers. This is an improvement. Speaking of which, you know someone in the uber-wealthy realm has a cyber shlong, so, of course, we do a song about that. Then, finally, an actual pyramid like the ones in Egypt is being built in 2023 and HAVE WE GOT A DEAL FOR YOU. Don't be a sucker. Subscribe! Listen! Revel! Sway! Stamp! Stamps! Cyber! Pedals! Fridge!!!
Roger Grimes is an industry expert and the Data Driven Defense Evangelist for KnowBe4. In this episode, Roger and host Charlie Osborne talk about multi-factor authentication (MFA), how much protection it really offers, why it's crucial for businesses to protect themselves from cyberattacks, and more. KnowBe4 is the world's first and largest New-school security awareness training and simulated phishing provider that helps you manage the ongoing problem of social engineering. To learn more about our sponsor, KnowBe4, visit https://knowbe4.com
CJ Dietzman and Jay Stampfl speak with Lora Yordanova, Alliant, live from RISKWORLD 2023 to recap their RISKWORLD TV interview and summarize the current threat landscape in the world of cyber. The two provide insights on cyber insurability, key themes and the continued evolution of ransomware, malware and other defensible cybersecurity risks.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Infostealer Embedded in a Word Document https://isc.sans.edu/diary/Infostealer%20Embedded%20in%20a%20Word%20Document/29810 Cisco SPA-112 Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-spa-unauth-upgrade-UqhyTWW Fortinet May Updates https://www.fortiguard.com/psirt?date=05-2023 PaperCut exploitation - A Different Path to Code Execution https://vulncheck.com/blog/papercut-rce
Andy Bochman is the Senior Grid Strategist-Defender for Idaho National Laboratory's National and Homeland Security directorate. In this role, Andy provides strategic guidance on topics at the intersection of grid security and climate resilience to INL leadership as well as senior U.S. and international government and industry leaders. Andy is a frequent speaker, writer, and trainer who has testified before the U.S. Senate Energy and Natural Resources Committee on energy infrastructure cybersecurity issues and before FERC on the maturity of smart grid cybersecurity standards. He has had recurring conversations on grid security matters with the Senate Select Committee on Intelligence and the National Security Council. In this OODAcast we discuss Andy's most recent book, Countering Cyber Sabotage: Introducing Consequence-based Cyber-Informed Engineering. This book introduces INL's new approach for defending against top-tier cyber adversaries. Watch as we learn how a hockey player transformed into a cybersecurity champion and author of one of the most important books for engineering for critical infrastructure defense.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Increased Number of Configuration File Scans https://isc.sans.edu/diary/Increased%20Number%20of%20Configuration%20File%20Scans/29806 Google Enabling Passkeys https://blog.google/technology/safety-security/the-beginning-of-the-end-of-the-password/ Chrome to Drop Lock Icon from HTTPS https://blog.chromium.org/2023/05/an-update-on-lock-icon.html Attack Against AMD TPM Implementation https://arxiv.org/abs/2304.14717
If you're watching or listening to this show you're probably doing it on a device that owes its very existence to the Apple II. But these days we remember the iPhone, 90s era Windows, and even the Macintosh as these big benchmark moments in widespread adoption of tech.But all those devices wouldn't be here if it weren't for the little Apple II board that could and the people who turned a hobbyist curiosity into a fundamental part of every household in the world.That story is the subject of the new book The Apple II Age: How the Computer Became Personal. This week on Cyber, author Laine Nooney comes on to talk about The Apple II Age and how the little machine ushered in a new world of personal computing. Nooney is also an assistant professor of Media and Information Studies at New York University and the founding editor of ROMchip: A Journal of Games Histories.We're recording CYBER live on Twitch and YouTube. Watch live during the week. Follow us there to get alerts when we go live. We take questions from the audience and yours might just end up on the show. Subscribe to CYBER on Apple Podcasts or wherever you listen to your podcasts. Hosted on Acast. See acast.com/privacy for more information.
An APT41 subgroup uses new techniques to bypass security products. Iranian cyberespionage group MuddyWater is using Managed Service Provider tools. Wipers reappear in Ukrainian networks. Meta observes and disrupts the new NodeStealer malware campaign. The City of Dallas is moderately affected by a ransomware attack. My conversation with Karin Voodla, part of the US State Department's Cyber fellowship program. Lesley Carhart from Dragos shares Real World Stories of Incident Response and Threat Intelligence. And there's been an indictment and a takedown in a major dark web carder case. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/86 Selected reading. Attack on Security Titans: Earth Longzhi Returns With New Tricks (Trend Micro) APT groups muddying the waters for MSPs (ESET) Russian hackers use WinRAR to wipe Ukraine state agency's data (BleepingComputer) WinRAR as a "cyberweapon". Destructive cyberattack UAC-0165 (probably Sandworm) on the public sector of Ukraine using RoarBat (CERT-UA#6550) (CERT-UA) The malware threat landscape: NodeStealer, DuckTail, and more (Engineering at Meta) Facebook disrupts new NodeStealer information-stealing malware (BleepingComputer) NodeStealer Malware Targets Gmail, Outlook, Facebook Credentials (Decipher) City of Dallas likely targeted in ransomware attack, city official says (Dallas News) Cybercriminal Network Fueling the Global Stolen Credit Card Trade is Dismantled (US Department of Justice) Secret Service, State Department Offer Up To $10 Million Dollar Reward For Information On Wanted International Fugitive (US Secret Service) Police dismantles Try2Check credit card verifier used by dark web markets (BleepingComputer)
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
VBA Project References https://isc.sans.edu/diary/VBA%20Project%20References/29800 BGP Message Parsing Vulnerabilities in FRRouting https://www.forescout.com/blog/three-new-bgp-message-parsing-vulnerabilities-disclosed-in-frrouting-software/ JWT ECDSA Algorithm Confusion https://blog.pentesterlab.com/exploring-algorithm-confusion-attacks-on-jwt-exploiting-ecdsa-23f7ff83390f
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Passive Analysis of a Phishing Attachment https://isc.sans.edu/diary/%22Passive%22%20analysis%20of%20a%20phishing%20attachment/29798 Apple Rapid Security Response https://www.macrumors.com/2023/05/01/rapid-security-response-16-4-1/ Grafana Security Release https://grafana.com/blog/2023/04/26/grafana-security-release-new-versions-of-grafana-with-security-fixes-for-cve-2023-28119-and-cve-2023-1387/ Illumina Vulnerability https://www.fda.gov/medical-devices/letters-health-care-providers/illumina-cybersecurity-vulnerability-affecting-universal-copy-service-software-may-present-risks
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Quick IOC Scan With Docker https://isc.sans.edu/diary/Quick%20IOC%20Scan%20With%20Docker/29788 Dobfuscation Scripts When Encodings Help https://isc.sans.edu/diary/Deobfuscating%20Scripts%3A%20When%20Encodings%20Help/29792 Hackers Are Breaking Into AT&T Email Accounts To Steal Cryptocurrency https://techcrunch.com/2023/04/26/hackers-are-breaking-into-att-email-accounts-to-steal-cryptocurrency/ Trheat Actor Selling New Atomic MacOS AMOS Stealer on Telegram https://blog.cyble.com/2023/04/26/threat-actor-selling-new-atomic-macos-amos-stealer-on-telegram/ Zyxel Firewall Vulnerability https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-remote-command-injection-vulnerability-of-firewalls
David Cohen is the Deputy Director of the Central Intelligence Agency, a position he held also during the Obama administration. He's also been Under Secretary for Terrorism and Financial Intelligence in the Department of the Treasury and a partner at the WilmerHale law firm.David Kris, Lawfare contributor and former Assistant Attorney General for the National Security Division, and Bryan Cunningham, Lawfare contributor and Executive Director of the University of California, Irvine's Cybersecurity Policy & Research Institute, sat down with David to talk about his career, including taking the same job twice; the coming debate about the FISA Amendments Act reauthorization; relationships between CIA and other U.S. government elements, particularly in cyber; the new CIA Transnational and Technology Mission Center; and the strategic competition between the United States and the People's Republic of China.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
Taiwan's status in the world has never been clear and neither has the United States' position on the issue. In this Congressional Dish, via footage from the C-SPAN archive dating back into the 1960s, we examine the history of Taiwan since World War II in order to see the dramatic shift in Taiwan policy that is happening in Congress - and in law - right now. Please Support Congressional Dish – Quick Links Contribute monthly or a lump sum via PayPal Support Congressional Dish via Patreon (donations per episode) Send Zelle payments to: Donation@congressionaldish.com Send Venmo payments to: @Jennifer-Briney Send Cash App payments to: $CongressionalDish or Donation@congressionaldish.com Use your bank's online bill pay function to mail contributions to: 5753 Hwy 85 North, Number 4576, Crestview, FL 32536. Please make checks payable to Congressional Dish Thank you for supporting truly independent media! View the show notes on our website at https://congressionaldish.com/cd272-what-is-taiwan Background Sources Recommended Congressional Dish Episodes CD259: CHIPS: A State Subsidization of Industry CD187: Combating China Taiwan History and Background “In Focus: Taiwan: Political and Security Issues” [IF10275]. Susan V. Lawrence and Caitlin Campbell. Updated Mar 31, 2023. Congressional Re