Podcasts about Cyber

Share on
Share on Facebook
Share on Twitter
Share on Reddit
Share on LinkedIn
Copy link to clipboard
  • 4,916PODCASTS
  • 14,414EPISODES
  • 35mAVG DURATION
  • 6DAILY NEW EPISODES
  • May 20, 2022LATEST

POPULARITY

20122013201420152016201720182019202020212022


Best podcasts about Cyber

Show all podcasts related to cyber

Latest podcast episodes about Cyber

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Bumblebee Malware from TransferXL URLs https://isc.sans.edu/forums/diary/Bumblebee+Malware+from+TransferXL+URLs/28664/ Microsoft Out-of-Band Update fixes Authentication Issues https://docs.microsoft.com/en-us/windows/release-health/status-windows-11-21h2#you-might-see-authentication-failures-on-the-server-or-client-for-services Sonicwall Patch for SMA 1000 https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0010 QNAP NAS Deadbolt Ransomware https://www.qnap.com/en/security-news/2022/take-immediate-actions-to-secure-qnap-nas-and-update-qts-to-the-latest-available-version 380,000 open Kubernetes API Servers https://www.shadowserver.org/news/over-380-000-open-kubernetes-api-servers/ Doj Annnounces New Polciy for Charging Cases under the Computer Fraud and Abuse Act https://www.justice.gov/opa/pr/department-justice-announces-new-policy-charging-cases-under-computer-fraud-and-abuse-act

Paul's Security Weekly TV
Year in Cyber Review 2021 - Robert Lee - PSW #741

Paul's Security Weekly TV

Play Episode Listen Later May 19, 2022 57:21


The past year has been filled with incredible changes in the cyber security landscape from ICS, Mobile, Cloud, and increased threats from Ransomware. This discussion will focus on crucial and quick discussions surrounding the cyber landscape that has changed quickly and forced organizations to consider revamping many of their policies and preparations. Join us for a humorous, and insightful journey back over the past year filled with examples for practitioners, organizations, and those just starting in cyber security.   Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw741

Cyber Casts
America's Complicated Relationship With Nuclear Power

Cyber Casts

Play Episode Listen Later May 19, 2022 33:24


The atom. For a few brief years in the middle of the 20th century, America and the world was cowed by the awesome possibility and terrifying reality of nuclear energy. Nuclear power had the potential to revolutionize the world but nuclear bombs could destroy it. But still … for a brief moment it seemed like nuclear energy would save the world. Then came Three Mile Island, Chernobyl, and The China Syndrome. America fell out of love with nuclear energy.That might be changing. Climate change and scientific advances might just be the shot in the arm the flagging nuclear energy industry needs. But did the dangers actually go away?That's the subject of the excellent podcast Wild Thing. Its third season is all about the shifting landscape of nuclear energy. It's comprehensive, excellent, and it's produced and hosted by former NPR editor Laura Krantz. On this episode of Cyber, Krantz sits down with Matthew to discuss Going Nuclear.We're recording CYBER live on Twitch. Watch live during the week. Follow us there to get alerts when we go live. We take questions from the audience and yours might just end up on the show.Subscribe to CYBER on Apple Podcasts or wherever you listen to your podcasts. See acast.com/privacy for privacy and opt-out information.

CYBER
America's Complicated Relationship With Nuclear Power

CYBER

Play Episode Listen Later May 19, 2022 33:24


The atom. For a few brief years in the middle of the 20th century, America and the world was cowed by the awesome possibility and terrifying reality of nuclear energy. Nuclear power had the potential to revolutionize the world but nuclear bombs could destroy it. But still … for a brief moment it seemed like nuclear energy would save the world. Then came Three Mile Island, Chernobyl, and The China Syndrome. America fell out of love with nuclear energy.That might be changing. Climate change and scientific advances might just be the shot in the arm the flagging nuclear energy industry needs. But did the dangers actually go away?That's the subject of the excellent podcast Wild Thing. Its third season is all about the shifting landscape of nuclear energy. It's comprehensive, excellent, and it's produced and hosted by former NPR editor Laura Krantz. On this episode of Cyber, Krantz sits down with Matthew to discuss Going Nuclear.We're recording CYBER live on Twitch. Watch live during the week. Follow us there to get alerts when we go live. We take questions from the audience and yours might just end up on the show.Subscribe to CYBER on Apple Podcasts or wherever you listen to your podcasts. See acast.com/privacy for privacy and opt-out information.

Paul's Security Weekly (Video-Only)
Year in Cyber Review 2021 - Robert Lee - PSW #741

Paul's Security Weekly (Video-Only)

Play Episode Listen Later May 19, 2022 57:21


The past year has been filled with incredible changes in the cyber security landscape from ICS, Mobile, Cloud, and increased threats from Ransomware. This discussion will focus on crucial and quick discussions surrounding the cyber landscape that has changed quickly and forced organizations to consider revamping many of their policies and preparations. Join us for a humorous, and insightful journey back over the past year filled with examples for practitioners, organizations, and those just starting in cyber security.   Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw741

Defense in Depth
Who Investigates Cyber Solutions?

Defense in Depth

Play Episode Listen Later May 19, 2022 27:53


All links and images for this episode can be found on CISO Series Cyber professionals, who is responsible on your team for investigating new solutions? Check out this post and this post for the discussion that are the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Our guest is Nick Ryan, director of enterprise technology security and risk, Baker Tilly. Thanks to our podcast sponsor, Votiro Can you trust that your content and data is free of malware and ransomware? With Votiro you can. Votiro removes evasive and unknown malware from content in milliseconds, without impacting file fidelity or usability. It even works on password-protected and zipped files. Plus, it's an API, so it integrates with everything – including Microsoft 365. Learn more at Votiro.com. In this episode: We ask cyber professionals, who is responsible on their team for investigating new solutions? If it's a collaborative effort, how is that handled? What are CISOs looking for in a solution? And we discuss using existing solutions before purchasing and implementing more solutions.

EM360 Podcast
Darktrace: The Fast and Furious Nature of Cybersecurity

EM360 Podcast

Play Episode Listen Later May 19, 2022 17:53


The Nature of Cybersecurity is undergoing rapid evolution. Cyber attacks are becoming more violent - and sophisticated. Big developments in tech over the last few years have led to some of the most shocking ransomware incidents. In this episode of the EM360 podcast, Chief Research Analyst at https://it-harvest.com/ (IT-Harvest), https://www.linkedin.com/in/stiennon/ (Richard Stiennon) speaks to https://www.linkedin.com/in/mmmpp/?originalSubdomain=uk (Mariana Periera), Director of Email Security Products at https://www.darktrace.com/en/ (Darktrace), to explore: How businesses can come back stronger following a threat The email supply chain and how attackers are using legitimate credentials to attack Core capabilities and the importance of augmenting with AI The true changing nature of cybersecurity

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

VMWare Flaws https://core.vmware.com/vmsa-2022-0014-questions-answers-faq https://blog.barracuda.com/2022/05/17/threat-spotlight-attempts-to-exploit-new-vmware-vulnerabilities/ Tesla BLE Proximity Authentication Vulnerable to Relay Attacks https://research.nccgroup.com/2022/05/15/technical-advisory-ble-proximity-authentication-vulnerable-to-relay-attacks/ Credit Card Scraping via Malicious PHP Code https://www.ic3.gov/Media/News/2022/220516.pdf Microsoft updating Delegated Admin Privileges https://docs.microsoft.com/en-gb/partner-center/announcements/2022-may#13

Defense & Aerospace Report
Cyber Report [May 18, 22] IISS' Dr. Greg Austin on Russia's Cyber Maturity

Defense & Aerospace Report

Play Episode Listen Later May 18, 2022 33:37


On this week's Cyber Report, sponsored by Fortress Information Security, Dr. Greg Austin who heads the Cyber Power and Future Conflict program at the International Institute for Strategic Studies in Singapore, discusses Russia's cyber capabilities, Moscow's approach to cyber, US and allied offensive and defensive cyber abilities, how brain drain will undermine Russian information and communications technology, Western efforts to live without Russian labor and Russia's ability to substitute for banned Western technologies, cyber lessons from the Ukraine War, what China is learning from international sanctions on Russia and how Beijing is working hard to avoid running afoul of US export law with Defense & Aerospace Report Editor Vago Muradian.

THE VALLEY CURRENT®️ COMPUTERLAW GROUP LLP
The Valley Current®: Did SCOTUS Suffer a Cyber Breach Last Night?

THE VALLEY CURRENT®️ COMPUTERLAW GROUP LLP

Play Episode Listen Later May 18, 2022 40:58


How long has it been since you last read Roe v Wade? Whether you agree with the outcome or not, you might agree with Professor Rafael Chodos that it is not a very persuasive decision overall. Recently, a draft opinion on reproductive rights was leaked and the first page of it is all you really need to read to see that there is an ongoing effort overturn the 50-year-old landmark decision, just not in the way you might think. In his opinion, Justice Samuel Alito argues that Roe v Wade represents a departure by the Supreme Court from its proper role, but is there something more shocking about this document? Jack Russo and Rafael Chodos discuss how this stolen document was released when it is believed that the Supreme Court guards its computer system well.

Stock Day Media
Tego Cyber Inc. Updates The Stock Day Podcast on Its 2022 Commercialization Progress and Goals

Stock Day Media

Play Episode Listen Later May 18, 2022 10:17


The Stock Day Podcast welcomed Tego Cyber Inc. (TGCB)(“the Company”), a company that was created to capitalize on the emerging cyber threat intelligence market. CEO of the Company, Shannon Wilkinson, joined Stock Day host Sever Copley. 

Cybercrime Magazine Podcast
Mastering Cyber. Stay Secure on Vacation! Alissa “Dr Jay” Abdullah, Deputy CSO, Mastercard.

Cybercrime Magazine Podcast

Play Episode Listen Later May 18, 2022 1:38


Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard. https://mastercard.us/en-us.html

Was läuft heute?
Beth und das Leben, In der Cyber-Hölle: Schrecken im Internet, Lovestruck High

Was läuft heute?

Play Episode Listen Later May 18, 2022 4:40


Amy Schumer schmeißt in der Comedy-Serie „Beth und das Leben“ ihr Leben über den Haufen, Netflix guckt auf einen enormen Cyberkriminalitäts-Fall in Korea und an der „Lovestruck High“ werden amerikanische High-School-Klischees in einer Dating-Show durchgespielt. >> Artikel zum Nachlesen: https://detektor.fm/kultur/was-laeuft-heute-beth-und-das-leben-in-der-cyber-hoeller-schrecken-im-internet-lovestruck-high

Podcasts – detektor.fm
Was läuft heute? | Beth und das Leben, In der Cyber-Hölle: Schrecken im Internet, Lovestruck High

Podcasts – detektor.fm

Play Episode Listen Later May 18, 2022 4:40


Amy Schumer schmeißt in der Comedy-Serie „Beth und das Leben“ ihr Leben über den Haufen, Netflix guckt auf einen enormen Cyberkriminalitäts-Fall in Korea und an der „Lovestruck High“ werden amerikanische High-School-Klischees in einer Dating-Show durchgespielt. >> Artikel zum Nachlesen: https://detektor.fm/kultur/was-laeuft-heute-beth-und-das-leben-in-der-cyber-hoeller-schrecken-im-internet-lovestruck-high

Kultur – detektor.fm
Beth und das Leben, In der Cyber-Hölle: Schrecken im Internet, Lovestruck High

Kultur – detektor.fm

Play Episode Listen Later May 18, 2022 4:40


Amy Schumer schmeißt in der Comedy-Serie „Beth und das Leben“ ihr Leben über den Haufen, Netflix guckt auf einen enormen Cyberkriminalitäts-Fall in Korea und an der „Lovestruck High“ werden amerikanische High-School-Klischees in einer Dating-Show durchgespielt. >> Artikel zum Nachlesen: https://detektor.fm/kultur/was-laeuft-heute-beth-und-das-leben-in-der-cyber-hoeller-schrecken-im-internet-lovestruck-high

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Use Your Browser Internal Password Vault... or Not? https://isc.sans.edu/forums/diary/Use+Your+Browser+Internal+Password+Vault+or+Not/28658/ SQL Server Brute Forcing https://twitter.com/MsftSecIntel/status/1526680337216114693 UpdateAgent Adapts Again https://www.jamf.com/blog/updateagent-adapts-again/ Updated Exploited Vulnerabilities https://www.cisa.gov/uscert/ncas/current-activity/2022/05/10/cisa-adds-one-known-exploited-vulnerability-catalog

The CyberWire
CISA Alert AA22-137A – Weak security controls and practices routinely exploited for initial access. [CISA Alerts]

The CyberWire

Play Episode Listen Later May 17, 2022 2:49


This joint cybersecurity advisory was coauthored by the cybersecurity authorities of the US, Canada, New Zealand, the Netherlands, and the UK. Cyber actors routinely exploit poor security configurations, weak controls, and other poor cyber hygiene practices to gain initial access or as part of other tactics to compromise a victim's system. This joint Cybersecurity Advisory identifies commonly exploited controls and practices, and includes best practices to mitigate these risks. AA22-137A Alert, Technical Details, and Mitigations White House Executive Order on Improving the Nation's Cybersecurity NCSC-NL Factsheet: Prepare for Zero Trust NCSC-NL Guide to Cyber Security Measures N-able Blog: Intrusion Detection System (IDS): Signature vs. Anomaly-Based NCSC-NL Guide to Cyber Security Measures National Institute of Standards and Technology SP 800-123 – Keeping Servers Secured NCSC-UK Guidance – Phishing Attacks: Defending Your Organisation  Open Web Application Security Project (OWASP) Proactive Controls: Enforce Access Controls All organizations should report incidents and anomalous activity to CISA's 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI's 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.

Business of Tech
Tue May-17-2022: Cyber for financial gain, public sentiment shifts on regulation, and do customers care about sustainability?

Business of Tech

Play Episode Listen Later May 17, 2022 9:20


Three things to know today Cyber attacks appear for financial gain – plus one on iPhones even when off Several new tech regulation laws as public sentiment shifts AND Microsoft Sustainability efforts – do customers care?     Want to get the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/   Support the show on Patreon:  https://patreon.com/mspradio/   Want our stuff?  Cool Merch?  Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com   Follow us on: Facebook: https://www.facebook.com/mspradionews/ Twitter: https://twitter.com/mspradionews/ Instagram: https://www.instagram.com/mspradio/ LinkedIn: https://www.linkedin.com/company/28908079/

CYBER
Fired By Starbucks, Union Organizer Wears Fursuit to Rallies

CYBER

Play Episode Listen Later May 17, 2022 47:44


The image is now iconic. An arctic wolf fursona in a Starbucks smock. Stance set wide. A sign in his hand held high that reads “UNION YES!”This was Michael Vestigo dressed in his Fursona as Apollo, a former Starbucks employee in Overland Park, Kansas. Why former? The company fired him for “displaying violent and threatening behavior” after he participated in a walkout of his location as part of a unionization effort.Vestigo is fighting to get his job back and he's not the only person Starbucks has retaliated against for trying to form a union. As Apollo, he's become a symbol of a movement that's sweeping the country. Apollo joined us on today's episode of Cyber to answer your burning questions about Unions and Starbucks. See acast.com/privacy for privacy and opt-out information.

Cyber Casts
Fired By Starbucks, Union Organizer Wears Fursuit to Rallies

Cyber Casts

Play Episode Listen Later May 17, 2022 47:44


The image is now iconic. An arctic wolf fursona in a Starbucks smock. Stance set wide. A sign in his hand held high that reads “UNION YES!”This was Michael Vestigo dressed in his Fursona as Apollo, a former Starbucks employee in Overland Park, Kansas. Why former? The company fired him for “displaying violent and threatening behavior” after he participated in a walkout of his location as part of a unionization effort.Vestigo is fighting to get his job back and he's not the only person Starbucks has retaliated against for trying to form a union. As Apollo, he's become a symbol of a movement that's sweeping the country. Apollo joined us on today's episode of Cyber to answer your burning questions about Unions and Starbucks. See acast.com/privacy for privacy and opt-out information.

Breaking Analysis with Dave Vellante
Are Cyber Stocks Oversold or Still too Pricey?

Breaking Analysis with Dave Vellante

Play Episode Listen Later May 17, 2022 16:39


Cybersecurity stocks have been sending mixed signals as of late…Mostly negative like much of tech. But some, such as Palo Alto Networks, despite a tough go of it recently, have held up better than most tech names. Others like CrowdStrike had been outperforming broader tech in March but then flipped in May. Okta's performance was somewhat tracking along with CrowdStrike for most of the past several months but then the Okta hack changed the trajectory of that name. Zscaler has crossed the critical $1B ARR revenue milestone and sees a path to $5B, but the company's stock fell sharply after its last earnings report and has been on a downtrend since last November…Meanwhile CyberArk's recent beat and raise was encouraging and the stock acted well after its last report. Security remains the #1 initiative priority amongst IT organizations and the spending momentum for many high flying cyber names remains strong. So what gives in cybersecurity? In this Breaking Analysis we focus on security and will update you on the latest data from ETR to try and make sense out of the market and read into what this all means in both the near and long term for some of our favorite names in the sector.

Federal Drive with Tom Temin
Is Energy's decision not to name a political appointee to oversee cyber a mistake?

Federal Drive with Tom Temin

Play Episode Listen Later May 17, 2022 16:51


The White House has three. NSA and US Cyber Command have both a general and one. CISA has one. We're talking about agencies with presidentially appointed, Senate confirmed positions focused on cybersecurity. The Energy Department, on the other hand, decided it didn't need a presidentially appointed or Senate confirmed leader in its Office of Cybersecurity, Energy Security and Emergency Response or CESER. In his weekly Reporter's Notebook, executive editor Jason Miller writes about why some say this decision is short sighted and sends the wrong message especially at a time when the energy sector is facing more serious cyber threats than ever before.

Security Happy Hour
Cyber Career Talk with Mike Miller

Security Happy Hour

Play Episode Listen Later May 17, 2022 71:00


Navigating the cyber world and finding a career can be difficult. Tonight we will discuss Mike's journey and how you can best find your path to the field.Tonight's guest is Mike MillerBecome a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and discussions.Connect with our guests:Mike Millerhttps://twitter.com/totalmikedotcomhttps://linkedin.com/in/mikesportfolio/Bio Links:https://cyberwarriorstudios.bio.linkPodcast Version: Is currently available on Spotify, Apple, Google, and Amazon Podcast.Podcast RSS: https://feeds.buzzsprout.com/1315237.rssHow to Support:Buy Me A Beer: https://www.buymeacoffee.com/CyberWarriorGoFundMe: https://www.gofundme.com/cyber-warrior-studiosPatreon: https://www.patreon.com/CyberWarriorStudiosCashApp: $CyberWarriorStudiosWebsite:https://www.cyberwarriorstudios.comHow to connect with Cyber Warrior:TikTok: https://www.tiktok.com/@cyberwarriorstudiosTwitch: https://twitch.tv/CyberWarriorStudiosTwitter: https://www.twitter.com/CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJfBlog: https://blog.cyberwarriorstudios.comReddit: https://www.reddit.com/r/CyberWarriorStudiosCyber Supply Drop:https://www.cybersupplydrop.org***Security Happy Hour***#cybersecurity#securityhappyhour#cyberwarriorstudios#cyberwarrior#informationsecurity#CyberSupplyDrop#BlueTeam#RedTeam#ContentCreation#Leadership#SecurityMonitoring#SecurityOnion#EnterpriseSecurityMonitoring#Cybersecurity#Infosec#Cyber#hacking#hackers#hacker#security#cyberawareness#securitychampions#Networking#SocialNetworks#CareersSupport the show

Pure Nurture Pregnancy and Birth | A Holistic Approach
How the Tech at Home is Affecting Your Mind and Body with August Brice

Pure Nurture Pregnancy and Birth | A Holistic Approach

Play Episode Listen Later May 17, 2022 37:54


August Brice's passion is finding solutions for mindful living in our digital world. Her online platform, TechWellness.com is the only comprehensive online source that addresses all the challenges of our modern digital world - from EMF Radiation and the effects of blue light to Cyber security and mental wellbeing with tech. On top of her ongoing research, August has built an Advisory Team consisting of world-renown experts in each area, who consult with Tech Wellness and review all major content on the site. All solutions are purchased and tested, never supplied by or sponsored by manufacturers to avoid any influence. In this episode, you will hear about: How August got into tech wellness Electromagnetic hypersensitivity EMF meters EMF-sensitivity studies (or lack of) Infertility studies Studies on pregnant mice The precautionary principle Turn WiFi off when you're not using it Faraday box Disable this on your phone when not in use Smart appliances Your phone camera is watching you Apps August recommends What Airplane Mode means Internet addiction Don't expose children to tech until this age Create device-free time as a family Where to best charge your phone Connect with August: Website: techwellness.com Instagram: @techwellness Facebook: @techwellness Twitter: @techwellness1 LinkedIn: @august-brice Next week, we will prepare for better pregnancies through the lens of Functional Medicine. Sarah Thompson will be guiding us!

EM360 Podcast
Secureworks: Combining Social Engineering Attacks in a Cyber Kill Chain

EM360 Podcast

Play Episode Listen Later May 17, 2022 25:49


When it comes to cybercrime and cybersecurity threats, social engineering attacks are unique in the way that they rely on human error versus software and operating system vulnerabilities. This is because as technological defenses become more and more robust, cybercriminals are increasingly targeting the weakest link in the chain: people. Using a variety of means both online and offline, unsuspecting users can be conned into compromising their security, releasing sensitive information or even transferring money. Secureworks Adversary Group, a security consulting department within Secureworks, walk-us through various social engineering scenarios used during their attack simulations. In the third episode of this three-part podcast with Secureworks, our host Dr Eric Cole the Founder and CEO of Secure Anchor Consulting will be talking with Ben Jacob, Technical Lead at Secureworks, about: Social engineering attack techniques and their lifecycle How phishing, vishing, and spear-phishing impact industries from a social engineering standpoint What can companies offer from a training and education standpoint to help mitigate these risks Value of XDR in detecting suspicious user behaviour

Hacker Valley Studio
Something To Say In Cyber With Jon DiMaggio

Hacker Valley Studio

Play Episode Listen Later May 17, 2022 28:29


“If you believe in yourself and you're willing to put in that work, it WILL happen.” - Jon DiMaggio In this episode, Ron and Chris are joined by author and Chief Security Strategist, Jon DiMaggio, to talk about the power of believing in yourself and following through on your dreams. Jon shares the story behind writing his book, The Art of Cyber Warfare, and how he learned to overcome rejection.   Sponsor Links:  Thank you to our sponsors Axonius and Uptycs for bringing this episode to life! Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution. Check them out at Uptycs.com and be sure to stop by their booth #435 at RSA 2022   Guest Bio: Jon DiMaggio is the chief security strategist at Analyst1 and has over 15 years of experience hunting, researching, and writing about advanced cyber threats. As a specialist in enterprise ransomware attacks and nation-state intrusions, such as”Ransom Mafia: Analysis of the World's first Ransomware Cartel”,“Nation State Ransomware” and a “History of REvil”. He has exposed the criminal cartels behind major ransomware attacks, aided law enforcement agencies in federal indictments of nation-state attacks, and discussed his work with The New York Times, Bloomberg, Fox, CNN, Reuters, and Wired. You can find Jon speaking about his research at conferences such as RSA. Additionally, in 2022, Jon authored the book “The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime” published by No Starch Press.   Links: Stay in touch with Jon DiMaggio on LinkedIn and Twitter Connect with Ron Eddings on LinkedIn and Twitter Connect with Chris Cochran on LinkedIn and Twitter Purchase a HVS t-shirt at our shop Continue the conversation by joining our Discord Check out  Hacker Valley Media and Hacker Valley Studio

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Apple Patches Everything https://isc.sans.edu/forums/diary/Apple+Patches+Everything/28654/ Evil Never Sleeps: When Wireless Malware Stays on After Turning Off iPhones https://arxiv.org/pdf/2205.06114.pdf Third-Party Web Trackers Log What You Type Before Submitting https://homes.esat.kuleuven.be/~asenol/leaky-forms/

Task Force 7 Cyber Security Radio
Ep. 214: A View Into Disruptive Technology for Cyber Defenders

Task Force 7 Cyber Security Radio

Play Episode Listen Later May 16, 2022 60:00


Chief Product Officer of Strike Ready Anurag Gurtu joins co-host Andy Bonillo on Episode #214 of Task Force 7 Radio to discuss how Artificial Intelligence and StrikeReady's digital assistant is solving the cyber security talent shortage. We also discussed threat management and how the integrations of so many security domains practitioners, technologies, and processes all need to be working together seamlessly to accomplish a true impact. We finished the show with Anurag sharing lessons learned on starting a company. All this and much more on Episode #214 of Task Force 7 Radio.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

From 0-Day to Mirai: 7 days of BIG-IP Exploits https://isc.sans.edu/forums/diary/From+0Day+to+Mirai+7+days+of+BIGIP+Exploits/28644/ Sonicwall Vulnerabilities Patched https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0009 Zonealarm Patch https://www.zonealarm.com/software/extreme-security/release-history Taking over npm account https://thehackerblog.com/zero-days-without-incident-compromising-angular-via-expired-npm-publisher-email-domains-7kZplW4x/

Cyber Frontiers (Audio MP3)
The Evolution of Cyber Talent Screening with Franz Payer, CEO Cyber Skyline – CF067

Cyber Frontiers (Audio MP3)

Play Episode Listen Later May 13, 2022 64:39


This week on Cyber Frontiers Christian and Jim catch up with Franz Payer, CEO of Cyber Skyline (related episodes: CF059, CF012). We explore the growth and development of the Cyber Skyline platform, which has evolved beyond cyber competitions to a suite of talent screening tools and skills-development capabilities. We get Franz’s perspectives on where companies are currently struggling to keep up with hiring and retaining qualified cybersecurity talent and how Cyber Skyline fills the void. Learn more at Cyber Skyline      Full show notes, transcriptions (available on request), audio and video at http://theAverageGuy.tv/cf67 Cyber Frontiers is all about

Cyber and Technology with Mike
13 May 2022 Cyber and Tech News

Cyber and Technology with Mike

Play Episode Listen Later May 13, 2022 8:45


In today's podcast we cover four crucial cyber and technology topics, including: 1.Zyxel fixes critical flaw in firewall product 2.Researchers find hundreds of WordPress sites compromised 3.Ukrainian man sentenced to four years in prison for cyber crime 4.Iran detected targeting Jordan in sophisticated attack I'd love feedback, feel free to send your comments and feedback to  | cyberandtechwithmike@gmail.com

The Gate 15 Podcast Channel
The Cybersecurity Evangelist: Episode 19 - TCE Evangelizes a Few ICS Security Thingz

The Gate 15 Podcast Channel

Play Episode Listen Later May 13, 2022 25:06


This month, Jen tries to put the “evangelize” in The Cybersecurity Evangelist by spreading the word on some great work in the ICS cybersecurity community. Resources evangelized in this episode: @BEERISAC OT/ICS Security Podcast Playlist https://podcasts.apple.com/us/podcast/beerisac-ot-ics-security-podcast-playlist/id1459741251 Consequence-driven Cyber-informed Engineering (CCE) https://inl.gov/cce/ ICS4ICS https://gca.isa.org/ics4ics Top 20 Secure PLC Coding Practices https://www.plc-security.com/index.html

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

When Get-WebRequest Fails You https://isc.sans.edu/forums/diary/When+GetWebRequest+Fails+You/28640/ HP PC BIOS Security Updates https://support.hp.com/us-en/document/ish_6184733-6184761-16/hpsbhf03788 INTEL BIOS Advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00601.html Zyxel RCE Vulnerability https://www.rapid7.com/blog/post/2022/05/12/cve-2022-30525-fixed-zyxel-firewall-unauthenticated-remote-command-injection/

CYBER
BONUS: The Surprising Origins of Ransomware

CYBER

Play Episode Listen Later May 12, 2022 33:42


This bonus episode of Cyber is sponsored by Command Line Heroes. If you like Cyber, you're going to like Command Line Heroes. It's an original podcast from Red Hat where listeners hear epic true tales of how developers, programmers, hackers, geeks, and open source rebels are revolutionizing the technology landscape.It's an award winning show that's been running for nine seasons. Every season has a theme and season 9 is all about the dark side of programming. Botnets, logic bombs, and—of course—ransomware. If you've ever wanted to know about the origins of some of the things you hate most on the internet, this season of Command Line Heroes has you covered.With Matthew on this show are Command Line Heroes producers Kim Huang and Johan Philippine.Command Line Heroes Is Available wherever you listen to podcasts.We're recording CYBER live on Twitch. Watch live during the week. Follow us there to get alerts when we go live. We take questions from the audience and yours might just end up on the show.Subscribe to CYBER on Apple Podcasts or wherever you listen to your podcasts. See acast.com/privacy for privacy and opt-out information.

Digital Oil and Gas
275 - The Cyber Baseline has Permanently Shifted

Digital Oil and Gas

Play Episode Listen Later May 12, 2022 11:46


The war in Ukraine has highlighted the role that cyber plays in modern warfare. Some of these tactics are poised to impact the oil and gas industry. Get ready. Duration: 11m 45s Register to attend the June 2nd virtual panel discussion–hosted by Geoffrey Cann–to learn how to proactively protect industrial organizations and critical infrastructure from cyber threats. Hear from leading OT (industrial) Cybersecurity experts– from OTORIO, ACSI and Netscout–on risk management strategies for industrial organizations as they discuss:  --risks of convergence: OT & IT --how to talk to the Board   --the importance of cyber hygiene --risk management best practices Who should attend:   Cybersecurity decision-makers (IT and OT) who want to proactively protect their industrial organizations and critical infrastructure from cyber threats.   Register today: https://us02web.zoom.us/webinar/register/9616503154908/WN_GPZT_zuaRc6D0BncLhgaiw

TRENDIFIER with Julian Dorey
#99 - This Guy Met With Julian Assange & Edward Snowden | Andy Greenberg

TRENDIFIER with Julian Dorey

Play Episode Listen Later May 12, 2022 179:10


(***TIMESTAMPS & Book Links in description below) ~ Andy Greenberg is an award-winning reporter, author, and hacking expert. Currently, Andy is a senior writer for WIRED, covering security, privacy, and information freedom. Throughout his career at Wired (and Forbes before that), Greenberg has been the go-to reporter on major international news stories including: Julian Assange & Wikileaks, Ross Ulbricht & Silk Road, Government-Sponsored hacking in Russia, China, & North Korea –– and the underworld of cryptocurrency. He's the author of “Sandworm” and “This Machine Kills Secrets” –– as well as the forthcoming book “Tracers in the Dark.” Furthermore, he was a main feature in the 2015 Documentary, “Deep Web,” about the downfall of Silk Road. “Sandworm” by Andy Greenberg: https://www.amazon.com/dp/B07GD4MFW2/ref=dp-kindle-redirect?_encoding=UTF8&btkr=1  “This Machine Kills Secrets” by Andy Greenberg: https://rb.gy/4k2suv  ***TIMESTAMPS*** 0:00 - Intro; Andy remembers his first book about Wikileaks; The 2010 Collateral Murder Wikileaks drop; The Cypherpunks 18:03 - Andy talks about when Wikileaks came on his radar; How Andy got into contact with Julian Assange and landed 2010 in person interview with him in London; Andy talks about his sitdown Assange and what he thinks of him; How Wikileaks operates 43:54 - US Bias in Wikileaks reporting?; Assange and his impact on the 2016 election with the DNC email hack; Did Assange know who the source of the hack was?; Guccifer and how the DNC hack went down; The “religious” nature of the hacking argument 1:02:03 - How Andy came to discover the Sandworm story and begin reporting on it; The Ukrainian Power Grid takedowns of 2015 and 2016 and how it went down; The three agencies in Russia and where Sandworm fits in 1:23:57 - Andy explains NotPetya and the Ransomware attacks that groups like Sandworm in Russia utilized to hack and create chaos; The Equation Group hackers at the NSA; Zero Day explained; The Shadow Brokers and Eternal Blue; How Sandworm got into Ukraine's power systems in 2015 1:37:48  - Andy tells the story of the 2017 Maersk global NotPetya attack; The downstream effects across many industries from the Maersk attack; The sobering reality of our modern day all-tech world; Andy explains what happened with the NSA's Stuxnet attack on Iranian Nuclear Centrifuges 2:03:30 - Debating the Mutually Assured Destruction argument with respect to the cyberwar; China's activity in international hacking; “If Russia is a hurricane, China is climate change”; North Korea's criminal hacking teams; The White House just put a bounty on Sandworm 2:22:38 - We need a Geneva Convention for Cyber Warfare and Cyber crimes; The Obama and Trump Whitehouse positions on Russian hacking; Andy's conversation about Sandworm with Obama's Cybersecurity Czar J. Michael Daniel 2:39:22 - Boots on the ground  vs cyber on the ground in Ukraine Russia War?; China's place in the Russia Ukraine Conflict; Andy talks about sitting with Edward Snowden in Russia for an interview ahead of his book, “Sandworm”; What's Snowden like? ~ YouTube EPISODES & CLIPS: https://www.youtube.com/channel/UC0A-v_DL-h76F75xik8h03Q ~ Get $150 Off The Eight Sleep Pod Pro Mattress / Mattress Cover (USING CODE: “TRENDIFIER”): https://eight-sleep.ioym.net/trendifier   PRIVADO VPN FOR $4.99/Month: https://privadovpn.com/trendifier/#a_aid=Julian Julian's Instagram: https://www.instagram.com/julianddorey ~ Beat provided by: https://freebeats.io Music Produced by White Hot

B2B Tech Talk with Ingram Micro
State of small business security in 2022

B2B Tech Talk with Ingram Micro

Play Episode Listen Later May 12, 2022 24:45


Fortinet recently released a new report about the state of small business security that breaks down areas of top concern and best practices for combating cyber threats.  In a special As the Gears Turn edition, Devaughn Bittle and Patrick Cash speak with Joel Boyd , Director of SMB Solutions at Fortinet , about:  - The rationale behind the new SMB report  - Cyber insurance - Fortinet's product portfolio  Email Ingram Micro's Fortinet team or visit Fortinet for more information.  To join the discussion, follow us on Twitter @IngramTechSol #B2BTechTalk  Listen to this episode and more like it by subscribing to B2B Tech Talk on Spotify , Apple Podcasts , or Stitcher . Or, tune in on our website .

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

TA578 Using Thread-Hijacked Emails to Push ISO Files for Bumblebee Malware https://isc.sans.edu/forums/diary/TA578+using+threadhijacked+emails+to+push+ISO+files+for+Bumblebee+malware/28636/ Google Drive Emerges as Top App for Malware Downloads https://www.helpnetsecurity.com/2022/05/11/malicious-pdf-search-engines/ Vanity URL Abuse https://www.varonis.com/blog/url-spoofing npm Supply Chain Attack Turns Out to be Part of Penetration Test https://jfrog.com/blog/npm-supply-chain-attack-targets-german-based-companies/

Business of Tech
Wed May-11-2022: IT outsourcing trends, Forrester's web3 warning, and Microsofts new cyber offerings

Business of Tech

Play Episode Listen Later May 11, 2022 7:40


Three things to know today IT outsourcing trends globally Forrester's web3 warning AND Microsoft addresses cyber talent gap     Want to get the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/   Support the show on Patreon:  https://patreon.com/mspradio/   Want our stuff?  Cool Merch?  Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com   Follow us on: Facebook: https://www.facebook.com/mspradionews/ Twitter: https://twitter.com/mspradionews/ Instagram: https://www.instagram.com/mspradio/ LinkedIn: https://www.linkedin.com/company/28908079/

Inside Sources with Boyd Matheson
Why More Oversight Might Be Bad For US Cybersecurity

Inside Sources with Boyd Matheson

Play Episode Listen Later May 11, 2022 9:02


Does the military and US intelligence need more checks on its cyber power? The Biden administration thinks so. But Jason Blessing from the American Enterprise Institute has a new piece in The Hill outlining concerns that more bureaucratic oversight on US Cyber Command could make America less safe. See omnystudio.com/listener for privacy information.

Defense & Aerospace Report
Cyber Report [May 11, 22] PSC's David Berteau on CMMC 2.0

Defense & Aerospace Report

Play Episode Listen Later May 11, 2022 26:13


On this week's Cyber Report, sponsored by Fortress Information Security, David Berteau, the president and CEO of the Professional Services Council, discusses the Defense Department's plans to roll out the second version of the Cybersecurity Maturity Model Certification — CMMC 2.0 — next March, why the effort is taking so long, what getting it “right” means, the importance of improving the security of services and government contractors overall, and why recent surveys of public cyber sentiments that on the surface appear grim are actually encouraging with Defense & Aerospace Report Editor Vago Muradian.

GZero World with Ian Bremmer
A cybercrime treaty proposed by…Russia?

GZero World with Ian Bremmer

Play Episode Listen Later May 11, 2022 27:53


Cybercrime is a rapidly growing threat, and one that will require a global effort to combat. But could some of the same measures taken to fight criminals online lead to human rights abuses and a curtailing of freedom? As the United Nations debates a new and expansive cybercrime treaty first proposed by Russia, we're examining the details of the plan, how feasible it would be to find consensus, and what potential dangers await if the treaty is misused by authoritarian governments. Our participants for this fifth and final episode of “Patching the System” are: Amy Hogan-Burney, General Manager, Microsoft's Digital Crimes Unit Ali Wyne, Eurasia Group Senior Analyst (Moderator) This special podcast series from GZERO Media is produced in partnership with Microsoft as part of the award-winning Global Stage series. “Patching the System” highlights the work of the Cybersecurity Tech Accord, a public commitment from over 150 global technology companies dedicated to creating a safer cyber world for all of us.

Drunktor Who: A Doctor Who Podcast
159 - Two For One Shots...I'll Take 13 (S10, Ep13)

Drunktor Who: A Doctor Who Podcast

Play Episode Listen Later May 11, 2022 66:41


We watch "Twice Upon a Time" (Series 10, Episode 13) where the Doctor has doubts about continuing with his existence after battling the Cybermen... but reconsiders after encountering himself post battling the Cybermen. Whilst said Cyber-jerking is occurring, "Bill" returns to show the Doctors what wonderful lives they had, “Nardole” shows up because... who cares... it's "Nardy!", and then "Clara" shows up to either infuriate the Clara haters or invigorate the Clara lovers. Since I count myself in the latter category, I have one final thing to say on this episode: Geronimo!!!

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Microsoft May 2022 Patch Tuesday https://isc.sans.edu/forums/diary/Microsoft+May+2022+Patch+Tuesday/28632/ Adobe Updates https://helpx.adobe.com/security/security-bulletin.html npm "foreach" package domain takeover https://www.theregister.com/2022/05/10/security_npm_email/

The Ricochet Audio Network Superfeed
Discovery Institute Podcasts: Joseph Bottum on Cyber Ethics, Poetry, Culture, and Community

The Ricochet Audio Network Superfeed

Play Episode Listen Later May 11, 2022


In this episode of Humanize, Wesley has a wide-ranging a conversation with his close friend Joseph Bottum, one of our most well read and original thinkers. Source

CYBER
Crypto is Collapsing (For Now)

CYBER

Play Episode Listen Later May 10, 2022 39:06


Some days I think that maybe we're not all gonna make it. It's been a bad week for cryptocurrency and, as of this recording, it's only Tuesday. Bitcoin is down. Ethereum down. Stablecoin seems not so stable. The NFT market is on fire. There's copium all around, panicked posters, and soothing souls advising everyone to buy the dip.But won't that just exacerbate the problem? Won't that just delay what people outside the crypto space have been waiting to see happen: the great crypto crash.On this episode of Cyber, Motherboard Managing Editor Jordan Perason is here to answer all our burning crypto questions.We're recording CYBER live on Twitch. Watch live during the week. Follow us there to get alerts when we go live. We take questions from the audience and yours might just end up on the show.Subscribe to CYBER on Apple Podcasts or wherever you listen to your podcasts. See acast.com/privacy for privacy and opt-out information.

The CyberWire
Notes on cyber phases of Russia's hybrid war, including an assessment of Victory Day as an influence op. A look at C2C markets. And Spain's spyware scandal claims an intelligence chief.

The CyberWire

Play Episode Listen Later May 10, 2022 29:34


A quick introductory note on Russia's hybrid war against Ukraine. Russian television schedules hacked to display anti-war message. Phishing campaign distributes Jester Stealer in Ukraine. European Council formally attributes cyberattack on Viasat to Russia. Costa Rica declares a state of emergency as Conti ransomware cripples government sites. DCRat and the C2C markets. The gang behind REvil does indeed seem to be back. More Joker-infested apps found in Google Play. Guest Nick Adams from Differential Ventures discusses what will drive continued growth of cybersecurity beyond attack surfaces and governance from a VC's perspective. Partner Ben Yelin from UMD CHHS on digital privacy concerns in the aftermath of the potential overturn of Roe vs Wade. And Spain's spyware scandal takes down an intelligence chief. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/90 Selected reading. Ukraine morning briefing: Five developments as Joe Biden warns Vladimir Putin has 'no way out' (The Telegraph) Viewpoint: Putin now faces only different kinds of defeat (BBC News)  Putin's Victory Day speech gives no clue on Ukraine escalation (Reuters)  On Victory Day, Putin defends war on Ukraine as fight against ‘Nazis' (Washington Post)  In Speech, Putin Shows Reluctance in Demanding Too Much of Russians (New York Times)  Putin's parade shows he "is going to continue at whatever cost" in Ukraine (Newsweek) Russia's display of military might sent the West a strong message – just not the one Putin intended (The Telegraph) Russian TV Schedules Hacked on Victory Day to Show Anti-War Messages (HackRead)  Russian TV hacked to say ‘blood of Ukrainians is on your hands' (The Telegraph)  Mass Distribution of Self-Destructing Malware in Ukraine (BankInfoSecurity)  Russian cyber operations against Ukraine: Declaration by the High Representative on behalf of the European Union (European Council)

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Octopus Backdoor is Back with a New Embedded Obfuscated Bat File https://isc.sans.edu/forums/diary/Octopus+Backdoor+is+Back+with+a+New+Embedded+Obfuscated+Bat+File/28628/#comments CVE-2022-1388 (BIG-IP) Exploits https://twitter.com/sans_isc/status/1523741896707043328 https://github.com/horizon3ai/CVE-2022-1388 Trend Micro False Positive Aftermath https://success.trendmicro.com/dcx/s/solution/000290966?language=en_US Microsoft Azure https://orca.security/resources/blog/azure-synapse-analytics-security-advisory/ https://msrc-blog.microsoft.com/2022/05/09/vulnerability-mitigated-in-the-third-party-data-connector-used-in-azure-synapse-pipelines-and-azure-data-factory-cve-2022-29972/

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

F5 BIG-IP Unauthenticated RCE Vulnerability (CVE-2022-1388) https://isc.sans.edu/forums/diary/F5+BIGIP+Unauthenticated+RCE+Vulnerability+CVE20221388/28624/ QNAP QVR Update https://www.qnap.com/de-de/security-advisory/qsa-22-07 Raspberry Robin Worm https://redcanary.com/blog/raspberry-robin/ rubygems CVE-2022-29176 explained https://greg.molnar.io/blog/rubygems-cve-2022-29176/ What is the simples malware in the world? https://isc.sans.edu/forums/diary/What+is+the+simplest+malware+in+the+world/28620/

The CyberWire
Amanda Fennell: There's a cyber warrior in all of us [Information]

The CyberWire

Play Episode Listen Later May 8, 2022 9:03


Chief security officer and chief information officer at Relativity, Amanda Fennel shares her story from archeology to cybersecurity. She shares the path that lead her towards becoming an archeologist and how it turned out not being exactly what she expected. She then shares how she got into the cyber business and how her past has impacted what she's doing now. She describes how she would like to be remembered in the cyber world, she says "I do hope that I left things better than I found them, not just the security of a product or a company, but I believe strongly that every person has a little cyber warrior inside of them." We thank Amanda for sharing her story.