Podcasts about cyber operations

Cyber attacks in the US

  • 140PODCASTS
  • 219EPISODES
  • 37mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • Mar 17, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about cyber operations

Latest podcast episodes about cyber operations

The Social-Engineer Podcast
Ep. 297 - Security Awareness Series - Quantifying and Owning Risk with Roy Luongo

The Social-Engineer Podcast

Play Episode Listen Later Mar 17, 2025 34:34


Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Roy Luongo. Roy is the Chief Information Security Officer for the United States Secret Service. He leads a team in the defense and information assurance of all USSS information systems and solutions. Prior to his current role he was the Director, Joint Mission Operations Center for Cyber Command, providing oversight of mission critical Cyber Operations infrastructures. He has also served as Chief, NSA Red Team and Technical Director for Interactive Operations for the NSA. Roy is a retired Army soldier with 20 years' service within the Intelligence and Cyber career fields. [March 17, 2025]   00:00 - Intro 00:17 - Intro Links: -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                01:55 - Roy Luongo Intro 02:44 - The Path to CISO of the Secret Service 04:58 - Cybersecurity in Early Education 07:50 - The Entry Level Catch-22 12:24 - Quantifying Risk 14:27 - The Best Way Forward 16:51 - The Effects and Future of AI 20:06 - Understanding Your Needs 22:11 - Advise to Young Roy 24:56 - The Cost of Training 29:01 - Mentors -          Ed Skoudis -          Brigadier General Brian D. Vile -          Shawn Turskey 29:55 - Lollipop Moments -          TEDxToronto - Drew Dudley "Leading with Lollipops" 31:33 - Book Recommendations -          Cybersecurity Canon - Rick Howard -          Kingpin - Kevin Poulsen -          Turn the Ship Around! - L. David Marquet 33:49 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

Jordan Is My Lawyer
UNBIASED Politics (3/3/25): Trump, Vance, and Zelenskyy Fight It Out, 'Phase 1' of Epstein File Release, Measles Outbreak and Kennedy's Response, Halt on Russian Cyber Operations, and More.

Jordan Is My Lawyer

Play Episode Listen Later Mar 3, 2025 49:33


Get the facts, without the spin. UNBIASED offers a clear, impartial recap of US news, including politics, elections, legal news, and more. Hosted by lawyer Jordan Berman, each episode provides a recap of current political events plus breakdowns of complex concepts—like constitutional rights, recent Supreme Court rulings, and new legislation—in an easy-to-understand way. No personal opinions, just the facts you need to stay informed on the daily news that matters. If you miss how journalism used to be, you're in the right place. In today's episode: One Court Upholds Mass Firings; Another Says No. Here's What Happens Now (0:10) AG Bondi Releases 'Phase 1' of Epstein Files to Conservative Influencers (3:25) President Trump Declares English the Official Language of U.S. (9:14) ACLU Files New Lawsuit Preventing Transfer of Migrants to Guantanamo (11:19) President Trump, VP Vance, and President Zelenskyy Fight It Out in Oval Office (13:21) MANA Nutrition Sees USAID Contract Restored; What You Should Know About DOGE.gov (26:18) Measles Outbreak in Texas; Here's How the New HHS Secretary Is Responding (32:11) New Reports Say Hegseth Has Ordered a Stop on Russian Cyber Operations (37:17) Quick Hitters: Ed. Dept. Offers Employees $25k Buyout, Judge Puts Pause on Trump's Transgender Women in Sports Order, GSA Releases Tech Team Amid Federal Cuts (38:45) Critical Thinking Segment (41:16) Listen/Watch this episode AD-FREE on Patreon. Watch this episode on YouTube. Follow Jordan on Instagram and TikTok. All sources for this episode can be found here.  Learn more about your ad choices. Visit podcastchoices.com/adchoices

Risky Business News
Risky Bulletin: Trump admin halts Russia cyber operations

Risky Business News

Play Episode Listen Later Mar 3, 2025 7:33


The Trump administration stops treating Russian hackers as a threat, Meta seeks a permanent NSO injunction, new Cellebrite zero-days come to light, and big name Russian cyber criminals get … home detention. Show notes

Adversary Universe Podcast
See You I-Soon: A Peek at China's Offensive Cyber Operations

Adversary Universe Podcast

Play Episode Listen Later Jan 16, 2025 36:13


“It would not be an understatement to say that China is the number one national security concern that I think we have here in the West.” China's offensive cyber activity has undergone a massive shift: What used to be simple smash-and-grab operations in the mid-2000s have evolved into sophisticated business models. We got a lens into this environment through a leak stemming from Chinese company I-Soon, whose data provided a narrow but revealing glimpse into the Chinese cyber contractor marketplace. I-Soon is a mid-sized contractor that has been operating since 2010. It provides state-sponsored advanced persistent threat (APT) cyber operations and tools, surveillance products and training for public security agencies, intelligence services and the military. The leak, which came from an anonymous GitHub user, included its internal documents and employee chat logs. These shed light on its products, services and customers as well as how some China-nexus adversaries are connected and sharing tools and capabilities. Adam and Cristian take a deep dive into these findings and how Chinese offensive cyber operations reached this point. They also dig into which PANDA adversaries are connected to I-Soon, how the cyber contractor recruits talent and what we learned about its disgruntled staff. The key takeaway? Leaks like this won't stop adversaries — and China's cyber operations aren't slowing down.

Débat du jour
Guerre hybride : guerre de demain ?

Débat du jour

Play Episode Listen Later Jan 15, 2025 29:30


L'Otan passe à l'offensive suite aux récentes dégradations de câbles sous-marins en mer Baltique. L'Alliance annonce le futur déploiement de navires, avions et drones. La Russie est montrée du doigt après ces incidents survenus en fin d'année dernière. Moscou accusé de mener un conflit hybride en Europe sous plusieurs formes : cyberattaques, guerre informationnelle… Quelles sont les conséquences de la guerre hybride observée aujourd'hui ? Jusqu'où peut-elle être déployée ? Quelles réponses, quels garde-fous ? Pour en débattre :- Ranya Stamboliyska, fondatrice de RS Strategy, société de conseils en Cybersécurité et diplomatie numérique- Francois Delerue, professeur en Droit international à l'Université IE de Madrid. Auteur du livre Cyber Operations and International Law, éditions Cambridge Studies et chercheur associé au Centre Géode, pour Géopolitique de la data sphère à Paris 8- Christine Dugoin-Clément, analyste en Géopolitique, chercheuse à la Chaire Risques de l'IAE Paris-Sorbonne, à l'Observatoire de l'Intelligence Artificielle de Paris 1 Panthéon-Sorbonne, et au CREOGN. Autrice du livre La géopolitique de l'ingérence russe et sa stratégie des Chaos, à paraître en mars, aux éditions PUF.

Débat du jour
Guerre hybride : guerre de demain ?

Débat du jour

Play Episode Listen Later Jan 15, 2025 29:30


L'Otan passe à l'offensive suite aux récentes dégradations de câbles sous-marins en mer Baltique. L'Alliance annonce le futur déploiement de navires, avions et drones. La Russie est montrée du doigt après ces incidents survenus en fin d'année dernière. Moscou accusé de mener un conflit hybride en Europe sous plusieurs formes : cyberattaques, guerre informationnelle… Quelles sont les conséquences de la guerre hybride observée aujourd'hui ? Jusqu'où peut-elle être déployée ? Quelles réponses, quels garde-fous ? Pour en débattre :- Ranya Stamboliyska, fondatrice de RS Strategy, société de conseils en Cybersécurité et diplomatie numérique- Francois Delerue, professeur en Droit international à l'Université IE de Madrid. Auteur du livre Cyber Operations and International Law, éditions Cambridge Studies et chercheur associé au Centre Géode, pour Géopolitique de la data sphère à Paris 8- Christine Dugoin-Clément, analyste en Géopolitique, chercheuse à la Chaire Risques de l'IAE Paris-Sorbonne, à l'Observatoire de l'Intelligence Artificielle de Paris 1 Panthéon-Sorbonne, et au CREOGN. Autrice du livre La géopolitique de l'ingérence russe et sa stratégie des Chaos, à paraître en mars, aux éditions PUF.

Defense Unicorns, A Podcast
Inside Cyber Defense: Col. Sean Kern on Building Agile, Secure Teams

Defense Unicorns, A Podcast

Play Episode Listen Later Jan 9, 2025 52:27


In this episode, Defense Unicorns welcomes Col. Sean Kern, the Director of Cyberspace Operations Strategy at SAIC, who brings experience in military and cybersecurity strategy. Kern shares his journey from military service to civilian leadership, sharing the unique challenges and adjustments required in the transition. He discusses how his military background shaped his understanding of systems and software engineering and how essential it is to cultivate a resilient and adaptable culture in any DevSecOps team. Kern emphasizes that trust, humility, and continuous learning are cornerstones for building high-performing cybersecurity operations, both in the military and private sectors.The conversation dives deep into automation and the role of human judgment in high-stakes cybersecurity decisions. Kern puts a focus on a balanced approach, where automation speeds up processes without sacrificing the critical oversight humans provide. His thoughts on combating biases within AI and ensuring ethical applications of automation highlight the importance of strategic human involvement. His perspective illustrates how both tech innovation and human expertise are essential to adapting cybersecurity practices for dynamic challenges.Kern also addresses the structural complexities of coordinating cybersecurity operations across military branches. He explores the need for a more unified organizational framework that could enhance operational readiness and efficiency in cyber operations. Drawing from his experience, Kern advocates for a strategic, flexible, and consistent approach to cybersecurity management, emphasizing that speed and adaptability are key to staying ahead of potential threats in today's world.Key Quote:“Culture is going to happen whether you do it or not. Like that's the scary part. It's going to exist. You know, if it's left to its own devices, then if you get anything good out of it, that's pure chance. That's pure luck and we don't need to fight China on pure chance or pure luck. So we need to be deliberate about the culture we put in place.”Col. Sean KernTime Stamps:(00:32) Sean Kern's Military Background(06:42) Transitioning from the Military to the Private Sector(11:47) Building Effective Teams and Organizations(19:59) The Importance of Culture(28:24) Automation vs. Human Accuracy(34:50) Organizational Design for Cyber Operations(49:14) Lightning RoundLinks:Connect with Col. Sean KernLearn More About SAICConnect with Rebecca LivelyLearn More About Defense Unicorns

Security Conversations
Palo Alto network edge device backdoor, Cyberhaven browser extension hack, 2024 research highlights

Security Conversations

Play Episode Listen Later Dec 27, 2024 113:11


Three Buddy Problem - Episode 26: We discuss the discovery of a Palo Alto network firewall attack and a stealthy network edge device backdoor (LITTLELAMB.WOOLTEA), the Cyberhaven hack and the shady world of browser extensions, and a look back at the top research projects that caught our attention in 2025. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).

Risky Business News
Between Two Nerds: The evolution of Russia's cyber operations in Ukraine

Risky Business News

Play Episode Listen Later Dec 16, 2024 29:28


In this edition of Between Two Nerds Tom Uren and The Grugq talk about the evolution of Russian cyber operations during its invasion of Ukraine. This episode is also available on Youtube. Show notes

Risky Business
Wide World of Cyber: SentinelOne's Chris Krebs on Chinese cyber operations

Risky Business

Play Episode Listen Later Dec 13, 2024


In this edition of the Wild World of Cyber podcast Patrick Gray sits down with SentinelOne's Chief Intelligence and Public Policy Officer Chris Krebs to talk all about Chinese cyber operations. They look at the Salt Typhoon and Volt Typhoon campaigns, the last 20 years of Chinese operations, and the evolution of the cyber roles of China's Ministry of State Security and People's Liberation Army. It's a very dense hour of conversation! This podcast was recorded in front of an audience at the Museum of Contemporary Art in Sydney. This episode is also available on Youtube. Show notes

Risky Business News
Between Two Nerds: Why the US is so uptight about cyber operations

Risky Business News

Play Episode Listen Later Dec 9, 2024 30:05


In this edition of Between Two Nerds Tom Uren and The Grugq talk about how states have very different approaches to controlling cyber operations. At the very beginning they refer to this Microsoft Threat Intelligence post. Show notes Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage

The Cognitive Crucible
#210 Paul Groestad on Cognitive Warfare

The Cognitive Crucible

Play Episode Listen Later Dec 3, 2024 40:14


The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, CDR Paul Grostad discusses the emerging threat of cognitive warfare, emphasizing the importance of information in modern societies and the potential for it to be weaponized. Until recently, Paul led Cognitive Warfare concept development for the NATO strategic warfare development command, HQ SACT, in Norfolk Virginia. NATO defines cognitive warfare as: the deliberate, synchronized military and non-military activities throughout the continuum of competition designed to shape the information environments and affect audience, attitudes, perceptions, and behaviors to gain, maintain, and protect cognitive superiority. Recording Date: 29 Nov 2024 Research Question: Paul Groestad suggests an interested student or researcher examine:  How can we ethically gain situational awareness and monitor the Information Environment without negatively impacting values like freedom of speech and freedom of the press? How can we effectively deter against non-attributable hostile acts in the Grey Zone, or below the threshold of armed conflict? AI powered influence is on the rise, what are different ways to utilize AI to defend, counter or respond? Resources: Cognitive Crucible Podcast Episodes Mentioned #33 August Cole on FICINT and the Cognitive Warfighting Domain #180 Tanna Krewson on Cognitive Warfare Cognitive Warfare Products on the NATO Innovation Hub Cognitive warfare: a conceptual analysis of the NATO ACT cognitive warfare exploratory concept by Christoph Deppe and Gary S Schaal. (FYI: This report is an analysis of an earlier draft version of The Cognitive Warfare EXPLORATORY Concept, which was shared with nations for comments in April 2023. Significant review, analysis and experimentation has gone into the document since then.) Allied Command Transformation develops the Cognitive Warfare Concept to Combat Disinformation and Defend Against “Cognitive Warfare” “Data is the new oil” Clive Humby On Geopolitics: New Cold Wars by David Sanger (2024) On the changing character of warfare: The Dragons and the Snakes by David Kilcullen (2020) New Rules of War by Sean McFate The Weaponisation of Everything by Mark Galeotti (2022) On Russian Strategic Culture and Information Warfare: The Russian Understanding of War by Oscar Jonsson (2019) Unmasking Maskirovka by Daniel Bagge (2019) The Story of Russia by Orlando Figes (2022) On Technology: Our Next Reality by Alvin Graylin and Louis Rosenberg (2024) The Battle for your Brain by Nita Farahany (2023) Snow Crash by Neal Stephenson (1992) Daemon by Daniel Suarez (2009) Link to full show notes and resources Guest Bio:  CDR Paul Groestad is a Norwegian naval officer with 30+ years experience in Signals, C4ISR, Cyber Operations and Information Warfare at all levels of the Norwegian Armed Forces and the NATO Command Structure. His current position is with the Norwegian Ministry of Defense at the Department for Security Policy and Operations where he is desk officer for Hybrid threats and Malign Influence.  In his previous position at NATOs Warfare Development Command, HQ SACT in Norfolk, Virginia, USA, he was the Deputy Branch Head for Concept Development and led the project for NATOs Cognitive Warfare Concept. He is a graduate of the Norwegian Naval Academy and Joint Command and Staff College, holds a Masters degree in Military Art and Science from the Norwegian Defence University College and a Bachelor's degree in Information Science from the University of Bergen.  His 2017 Master's thesis was on the topic of Russian Influence Operations. About: The Information Professionals Association (IPA) is a non-profit organization dedicated to exploring the role of information activities, such as influence and cognitive security, within the national security sector and helping to bridge the divide between operations and research. Its goal is to increase interdisciplinary collaboration between scholars and practitioners and policymakers with an interest in this domain. For more information, please contact us at communications@information-professionals.org. Or, connect directly with The Cognitive Crucible podcast host, John Bicknell, on LinkedIn. Disclosure: As an Amazon Associate, 1) IPA earns from qualifying purchases, 2) IPA gets commissions for purchases made through links in this post.

Risky Business News
Srsly Risky Biz: The PLA's cyber operations go dark

Risky Business News

Play Episode Listen Later Nov 21, 2024 14:54


In this podcast Tom Uren and Patrick Gray talk about what the People's Liberation Army cyber operators have been up to. They used to be China's most visible cyber operators but have since disappeared. They also discuss the shift towards widespread exploitation of 0days, particularly in enterprise perimeter devices. This episode is also available on Youtube.

The Lawfare Podcast
Lawfare Daily: Can Chinese Cyber Operations Be Deterred, with Dakota Cary

The Lawfare Podcast

Play Episode Listen Later Nov 5, 2024 42:38


Dakota Cary, Strategic Advisory Consultant at SentinelOne, joins Lawfare Senior Editor Eugenia Lostri, to discuss his article on U.S. attempts to deter Chinese hacking group Volt Typhoon. They talk about why Volt Typhoon won't stop its intrusions against critical infrastructure, whether other hacking groups can be deterred, and where we should focus our attention to counter malicious activity.Materials discussed during the episode:"Exploring Chinese Thinking on Deterrence in the Not-So-New Space and Cyber Domains," by Nathan Beauchamp-MustafagaFinal Report of the Defense Science Board (DSB) Task Force on Cyber Deterrence, February 2017The Atlantic Council report, "Adapting US strategy to account for China's transformation into a peer nuclear power," by David O. Shullman, John K. Culver, Kitsch Liao, and Samantha WongTo receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also support Lawfare by making a one-time donation at https://givebutter.com/c/trumptrials.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.

The Cybersecurity Defenders Podcast
#164 - Intel Chat: Wazuh, .io, AI, Discord, Palo Alto & GoldenJackal

The Cybersecurity Defenders Podcast

Play Episode Listen Later Oct 21, 2024 40:36


In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel.A recent malware campaign has been discovered that exploits the open-source Wazuh SIEM agent to deliver a cryptomining payload. There is uncertainty surrounding the .io domain following the UK's decision to return the Chagos Islands, including the British Indian Ocean Territory, to Mauritius.The October 2024 report, "Influence and Cyber Operations," explores how AI is being leveraged by both state and non-state actors in cyber campaigns. Key findings show that AI tools are increasingly being used to enhance traditional cyberattacks, particularly in areas like vulnerability research, malware debugging, and influence operations. Discord has recently been blocked in both Russia and Turkey due to claims of illegal activity on the platform.Palo Alto Networks recently patched several critical vulnerabilities in its Expedition tool, which could allow attackers to take control of firewall systems. The most severe flaw, CVE-2024-9463, allows unauthenticated attackers to execute arbitrary OS commands as root, exposing sensitive data like usernames, passwords, and API keys.The article from ESET highlights a cyberespionage campaign conducted by a group known as GoldenJackal, which is targeting government and diplomatic entities, focusing specifically on air-gapped systems in regions such as Europe, the Middle East, and South Asia.

The DownLink
Space Competition: How To Better De-Risk Adversarial Threats To Space Systems' Value

The DownLink

Play Episode Listen Later Sep 28, 2024 35:21


Space Competition: How To Better De-Risk Adversarial Threats To Space Systems' Value This episode was recorded before a live audience at the Space Information Sharing and Analysis Center's Value of Space Summit, convened in Colorado Springs, Colorado. The discussion focuses on threat trends, the lack of insurance cover for certain types of attacks; and how to better secure the value of space systems. Laura Winter speaks with Chris Kunstadter, President at Triton Space; Tomas Peña, Chief Technologist for Cyber Operations at L3Harris Technologies; and Sam Visner, the Space-ISAC Chairman.

Federal Drive with Tom Temin
Air Force revises intelligence and cyber operations directive

Federal Drive with Tom Temin

Play Episode Listen Later Sep 13, 2024 8:21


The Air Force plans to revise a headquarters directive about intelligence and cyber operations. It won't be the first time during an ongoing and sweeping change in force structure that Air Force secretary Frank Kendall announced back in February. Federal News Network Anastasia Obis brings us the latest. Learn more about your ad choices. Visit megaphone.fm/adchoices

Defense Unicorns, A Podcast
From Marine to Cyber Security Expert

Defense Unicorns, A Podcast

Play Episode Listen Later Sep 5, 2024 59:51


Join us on this episode of Defense Unicorns Podcast as we are joined by Kurt Sanger, retired Marine and former Deputy Staff Judge Advocate at US Cyber Command. Kurt shares his journey from growing up in New York City to studying at Holy Cross and Cardozo Law School, where his interest in the Marine Corps began. He reflects on his early roles in military justice and his transition into cyber operations law, providing candid insights into the challenges and motivations that shaped his path.In this episode, Kurt discusses the evolution of cyber partnerships and the critical role of trust and collaboration within the Five Eyes community. He sheds light on the complexities of legal counsel in military operations, emphasizing the importance of clear communication and the broad responsibilities of military attorneys. Through key events like the ISIS conflict and the Sony breach, Kurt illustrates the rapid shift from theory to practice in cyber operations.We also delve into the challenges of great power competition, the debate over the US Cyber Command's role, and the essential collaboration between technologists and lawyers in shaping cyber policy. Kurt offers a thought-provoking perspective on how emerging technologies and international relations could shape the future of conflict.--Key Quote: “All these organizations have missions and those missions take up all the bandwidth that they have, all the people and all the assets that they have to carry out as it is. And competing in cyberspace is most likely never going to be the priority of an organization that has a kinetic mission.”-Kurt Sanger--Time Stamps:(00:46) Kurt Sanger's Background and Career Path(04:58) Transition to Cyber Law and Operations(07:08) Challenges and Evolution in Cyber Operations(09:23) Legal and Ethical Considerations in Cyber Operations(26:47) Discussion on Cyber Force and Organizational Structure(46:33) The Future of Cyber Conflict and Hope--Links:Connect with KurtConnect with RebeccaLaw of the Horse, What Cyber Law Might TeachCode is LawThe Nightingale's SongBeats So Lonely

Security Conversations
Ep9: The blurring lines between nation-state APTs and the ransomware epidemic

Security Conversations

Play Episode Listen Later Aug 23, 2024 66:16


Three Buddy Problem - Episode 9: On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misattribution. Plus, Chinese mobile OS vendor Xiaoimi caught disabling parts of its infrastructure -- including its global app store -- to thwart Pwn2Own contestants; and news of an addition to the LABScon 2024 keynote stage. Hosts: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)

Daily Tech News Show
The FBI Accuses Iran Of Launching Cyber Operations Against Both U.S. Presidential Campaigns - DTH

Daily Tech News Show

Play Episode Listen Later Aug 20, 2024 4:39


The FBI accuses Iran of launching cyber operations against both U.S. presidential campaigns, Apple will make its highest-end iPhones in India for the first time, and Zoom has raised support on webinar calls from 100,000 to 1 million simultaneous viewers.Link to Show Notes

Daily Tech Headlines
The FBI Accuses Iran Of Launching Cyber Operations Against Both U.S. Presidential Campaigns – DTH

Daily Tech Headlines

Play Episode Listen Later Aug 20, 2024


The FBI accuses Iran of launching cyber operations against both U.S. presidential campaigns, Apple will make its highest-end iPhones in India for the first time, and Zoom has raised support on webinar calls from 100,000 to 1 million simultaneous viewers. MP3 Please SUBSCRIBE HERE. You can get an ad-free feed of Daily Tech Headlines forContinue reading "The FBI Accuses Iran Of Launching Cyber Operations Against Both U.S. Presidential Campaigns – DTH"

The Social-Engineer Podcast
Ep. 271 - Security Awareness Series - Advocating for Non-Adversarial Security with Kimberly Sims

The Social-Engineer Podcast

Play Episode Listen Later Aug 19, 2024 30:10


Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Kimberly Sims. Kimberly is the Deputy CISO, Director of Cyber Operations and Cloud Security for American Century Investments. Kimberly has over 17 years' experience in the Financial Services sector. Prior to joining American Century, Kimberly ran the Information Security Program for the second-largest capital market's desk in the world, responsible for securing systems that process a trillion-dollar debt portfolio.   Kimberly is an advisory member, and IT lead for the Charter for Veterans, a non-profit organization assisting recovering combat wounded veterans. She is an advocate for mentorship and coaching across the security industry and participates in several industry groups. [Aug 19, 2024]   00:00 - Intro 00:22 - Intro Links: -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                03:01 - Kimberly Sims Intro 03:49 - Inspired by a Book 05:32 - Making a Giant Leap! 06:59 - Biggest Mistakes 09:14 - Lessons Learned 11:07 - Security Ambassador 13:23 - Overcoming the Fear 15:20 - Executive Order 17:06 - People, Process, Technology 18:38 - Back to Basics 20:11 - Resiliency Programs 23:14 - The Take Home 24:47 - Jump In! 25:46 - Book Recommendations -          Blink - Malcolm Gladwell -          Pitch Perfect - Bill McGowan -          Permission to Screw Up - Kristen Hadeed 27:49 - Mentors 29:12 - Find Kimberly Sims online -          LinkedIn: in/kimberly-sims-733510/ 29:26 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

The Security Detail
Ep. 3: International Law and Cyber Operations with François Delerue, Assistant Professor of Law at IE University

The Security Detail

Play Episode Listen Later Aug 7, 2024 52:54


International law establishes norms and frameworks to ensure that States conduct their activities in a manner consistent with principles of sovereignty, responsibility, and human rights. In this episode, François Delerue, Assistant Professor of Law at IE University, discusses the application of international law to cyber operations, including the challenges with attribution and the threshold for cyberwarfare.  Resources:  - François Delerue's biography: https://francoisdelerue.eu/ - Cyber Operations and International Law: https://www.cambridge.org/core/books/cyber-operations-and-international-law/74D210E76E46531542AD27CECF07ABDE - Tallinn Manual 2.0: https://www.cambridge.org/core/books/tallinn-manual-20-on-the-international-law-applicable-to-cyber-operations/E4FFD83EA790D7C4C3C28FC9CA2FB6C9 - "Russia Is Fighting for a Treaty That Could Soon Change the Internet Forever" (Newsweek): https://www.newsweek.com/russia-fighting-treaty-that-could-soon-change-internet-forever-1865118 - Microsoft's Digital Geneva Convention Proposal: https://www.microsoft.com/en-us/cybersecurity/content-hub/a-digital-geneva-convention-to-protect-cyberspace    

ITSPmagazine | Technology. Cybersecurity. Society
Subversion in the Digital Age | A Conversation with Lennart Maschmeyer | Redefining Society with Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 25, 2024 42:05


Guest: ✨ Lennart Maschmeyer, Senior Researcher at Center for Security Studies (CSS) at ETH Zurich [@CSS_ETHZurich]On LinkedIn | https://www.linkedin.com/in/lennartmaschmeyer/____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli_____________________________This Episode's SponsorsBlackCloak

The CyberWire
Encore: Rosa Smothers: Secure the planet. [Intelligence] [Career Notes]

The CyberWire

Play Episode Listen Later Jun 16, 2024 7:17


Senior VP of Cyber Operations at KnowBe4, Rosa Smothers, talks about her career as an early cybersecurity professional in what she describes as the Wild, Wild West to her path through government intelligence work. Rosa shares how she always knew she wanted to be involved with computers and how being a big Star Trek nerd and fan particularly of Spock and Uhura helped shape her direction. Following 9/11, Rosa wanted to work for the government and pursue the bad guys and she did just that completing her bachelor's degree and starting in the Defense Intelligence Agency as a cyber threat analyst focusing on extremist groups. She joined the CIA and worked on things you see in the movies, things that are science fictionesque. Rosa recommends talking with people to get your feet wet to find your passion. We thank Rosa for sharing her story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices

Career Notes
Encore: Rosa Smothers: Secure the planet. [Intelligence]

Career Notes

Play Episode Listen Later Jun 16, 2024 7:17


Senior VP of Cyber Operations at KnowBe4, Rosa Smothers, talks about her career as an early cybersecurity professional in what she describes as the Wild, Wild West to her path through government intelligence work. Rosa shares how she always knew she wanted to be involved with computers and how being a big Star Trek nerd and fan particularly of Spock and Uhura helped shape her direction. Following 9/11, Rosa wanted to work for the government and pursue the bad guys and she did just that completing her bachelor's degree and starting in the Defense Intelligence Agency as a cyber threat analyst focusing on extremist groups. She joined the CIA and worked on things you see in the movies, things that are science fictionesque. Rosa recommends talking with people to get your feet wet to find your passion. We thank Rosa for sharing her story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Bid Picture - Cybersecurity & Intelligence Analysis

Send Bidemi a Text Message!In this episode, host Bidemi Ologunde spoke with Chris Hadnagy, a prominent figure in the field of information security, particularly known for his expertise in social engineering. He is the founder and CEO of Social-Engineer, LLC, a company dedicated to security training and consulting. Chris has authored several influential books on social engineering, including "Social Engineering: The Art of Human Hacking" and "Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You.”​In addition to his work with Social-Engineer, LLC, Chris is the founder and executive director of The Innocent Lives Foundation, a non-profit organization that works to unmask anonymous online child predators and assist law enforcement in bringing them to justice​. He also serves as an adjunct professor at the University of Arizona, where he teaches courses on social engineering at the NSA-designated Center of Academic Excellence in Cyber Operations​.Chris' contributions to information security include creating the world's first social engineering framework and newsletter, and he has been involved in various high-profile speaking engagements at conferences like RSA and Black Hat. He is certified as an Offensive Security Certified Professional (OSCP) and has developed several certifications related to social engineering, such as the Certified Ethical Social Engineer (CESE) and the Master's Level Social Engineering (MLSE) certifications​.Support the Show.

REAL PARANORMAL ACTIVITY - THE PODCAST/NETWORK
STRANGE REALITY with DAVE EMMONS S1E14: UFOs AND CHRISTIANITY

REAL PARANORMAL ACTIVITY - THE PODCAST/NETWORK

Play Episode Listen Later Jun 6, 2024 95:26


John Milor is my guest on this episode of The Strange Reality Show with Dave Emmons. The show was recorded on 4-8-24. John discusses the events in his life that led to his interest in writing about UFOs and Christianity. He talks about his latest book, Christian Ufology, among his other book topics. He answers questions of why Christians label all UFOs demonic, and whether UFOs intersect with the teachings of the End Times prophecy. John discusses legendary giants mentioned in the Bible, and there is a link between giants and ETs in the Bible. He talks about ghosts, demons, and the differences between ETs and angels. He tells us a little about his family's history with the paranormal. John Milor has Published 13 books and has two Associate Degrees, a Bachelor's, two Master's Degrees, and advanced military education. He retired from being a military combat Veteran as a Chief Master Sergeant. He was an infantry M-60 gunner and retired as the Chief of Cyber Operations for the US Western Air Defense Sector. You can find John Milor's work on FaceBook, YouTube, LinkedIn, and Amazon, and he welcomes emails to jmilor@yahoo.com Website: www.JohnMilor.com

Beyond The Tin Foil Hat
S06E16 – 05-01-2024 – John Milor - Christian Ufology, Paranormal Researcher, Ancient Astronaut Theory

Beyond The Tin Foil Hat

Play Episode Listen Later May 3, 2024 83:34


John Milor is an author of 13 published books, and is mostly known for his pioneer research in the field of Christian Ufology – a combination of ancient astronaut theory and end-times prophecy. He has been a paranormal researcher for over 30 years.Milor's interest in understanding the paranormal began at 5 years old after he heard his great grandmother's tale of seeing a UFO over 100 years ago. His great grandmother's tale is unique because she was the wife of a minister for 60 years.This story and many other otherworldly encounters in his family have fueled Milor's quest to understand a wide variety of paranormal phenomenon from a Christian perspective.Milor's latest book, Christian Ufology, was featured in the New York Times.Milor draws from an extensive academic background with two Associate degrees, a Bachelor, two Master degrees, and advanced military education. Milor is a retired military combat veteran, and Chief Master Sergeant. He began his military career as an Active Duty Army Infantry M-60 gunner, and retired as the Chief of Cyber Operations for the US Western Air Defense Sector.All are invited to visit his websites to find out more about his books. Milor also has social media sites on Facebook, YouTube, Linked-In, and Amazon,

The CyberWire
Iran's covert cyber operations exposed.

The CyberWire

Play Episode Listen Later Apr 24, 2024 42:18


The DOJ indicts four Iranian nationals on hacking charges. Legislation to ban or force the sale of TikTok heads to the President's desk. A Russian hack group claims a cyberattack on an Indiana water treatment plant. A roundup of dark web data leaks. Mandiant monitors dropping dwell times. Bcrypt bogs down brute-forcing. North Korean hackers target defense secrets. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey. On our Industry Voices segment, Tony Velleca, CEO of CyberProof, joins us to explore some of the pain points that CISOs & CIOs are experiencing today, and how they can improve their cyber readiness. Ransomware may leave the shelves in Sweden's liquor stores bare.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guests Learning Layer On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K's comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe discuss content and study strategies for CISSP Domain 3 Security Architecture and Engineering, and discuss encryption and non-repudiation. Specifically they cover sub-domain 3.6, "Select and determine cryptographic solutions," which includes: Cryptographic life cycle Cryptographic method Public key infrastructure (PKI). Industry Voices On our Industry Voices segment, Tony Velleca, CEO of CyberProof, joins us to explore some of the pain points that CISOs & CIOs are experiencing today, and how they can improve their cyber readiness.  Selected Reading Rewards Up to $10 Million for Information on Iranian Hackers (GB Hackers) Congress passes bill that could ban TikTok after years of false starts (Washington Post) Russian hackers claim cyberattack on Indiana water plant (The Record) Major Data Leaks from Honda Vietnam, US Airports, and Chinese Huawei/iPhone Users (SOCRadar® Cyber Intelligence Inc.) Global attacker median dwell time continues to fall (Help Net Security) New Password Cracking Analysis Targets Bcrypt (SecurityWeek) North Korean Hackers Target Dozens of Defense Companies (Infosecurity Magazine) ​​Hackers hijack antivirus updates to drop GuptiMiner malware (Bleeping Computer) Sweden's liquor shelves to run empty this week due to ransomware attack (The Record) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

Michigan UFO Sightings and Paranormal Encounters Podcast
Episode 86 - John Milor - Aliens In The Bible, End Times, And The Biblical Perspective On UFOs

Michigan UFO Sightings and Paranormal Encounters Podcast

Play Episode Listen Later Apr 22, 2024 130:07


#UFO #Gensis6 #Antichrist #Aliens #Paranormal #Supernatural #biblicalufos John Milor is an author of 13 published books, and is mostly known for his pioneer research in the field of Christian Ufology – a combination of ancient astronaut theory and end-times prophecy. He has been a paranormal researcher for over 30 years. Milor's interest in understanding the paranormal began at 5 years old after he heard his great grandmother's tale of seeing a UFO over 100 years ago. His great grandmother's tale is unique because she was the wife of a minister for 60 years. This story and many other otherworldly encounters in his family have fueled Milor's quest to understand a wide variety of paranormal phenomenon from a Christian perspective. Milor's latest book, Christian Ufology, was featured in the New York Times. Milor draws from an extensive academic background with two Associate degrees, a Bachelor, two Master degrees, and advanced military education. Milor is a retired military combat veteran, and Chief Master Sergeant. He began his military career as an Active Duty Army Infantry M-60 gunner, and retired as the Chief of Cyber Operations for the US Western Air Defense Sector. All are invited to visit his websites to find out more about his books. Milor also has social media sites on Facebook, YouTube, Linked-In, and Amazon, and he welcomes emails to jmilor@yahoo.com. www.JohnMilor.com www.ChristianUfology.net www.AliensAndTheAntichrist.com www.TheStrongDelusion.net www.AliensInTheBible.com www.Facebook.com/johnmilor www.Amazon.com/author/johnmilor www.YouTube.com/johnmilor https://www.linkedin.com/in/johnmilor/ ********************************************************** You can email the hosts with your UFO/UAP and Paranormal stories at: mi.ufo.podcast@gmail.com Help support the show with the links below: Join this channel to get access to perks: https://www.youtube.com/channel/UCjUTzsRX5rBq9_r7_YtaEJg/join You can now purchase our Merch on the "STORE" TAB in the channel description All Our Links Including Our MERCH Store: https://linktr.ee/mi.ufo.podcast Paypal: Donate via paypal: https://paypal.me/miufo Become a Patreon supporter and get a show shoutout for as long as you're a member! Become a Patreon at: https://www.patreon.com/miufospep Want to be a streamer? Click the link above to try it out! Want to create live streams like this? Check out StreamYard: https://streamyard.com/pal/d/5177974860283904 --- Send in a voice message: https://podcasters.spotify.com/pod/show/michiganufos/message Support this podcast: https://podcasters.spotify.com/pod/show/michiganufos/support

Subconscious Realms
S3 EP 267 - Colorado Springs/Space Force/Shriners/Shrine Of The Sun PT3 - MagiKk MiKkee.

Subconscious Realms

Play Episode Listen Later Apr 8, 2024 119:08


The Lawfare Podcast
How the FBI is Combating Cyberattacks, with Brett Leatherman

The Lawfare Podcast

Play Episode Listen Later Mar 28, 2024 54:15


One of the gravest threats to U.S. national security today—and also one of the newest—is the risk of cyberattacks. They come in many forms, and they can incapacitate companies, institutions, and even the government. To better understand these threats—and how the government is responding to them­—Lawfare Executive Editor Natalie Orpett and Lawfare Contributing Editor Brandon Van Grack sat down with Brett Leatherman, Deputy Assistant Director for Cyber Operations at the FBI. They discussed the FBl's recent operations, threats from both state actors and criminal gangs, and the role of the private sector in U.S. cybersecurity.This is the latest episode in our special series, “The Regulators,” co-sponsored with Morrison Foerster, in which we talk with senior government officials working at the front lines of U.S. national security policy.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.

The Slavic Connexion
The German Perspective on NATO and Ukraine: Developing Interoperability, Information Advantage, & Resiliency

The Slavic Connexion

Play Episode Listen Later Mar 10, 2024 39:39


On this episode, we speak with Lieutenant Colonel Martin Wroblewski, PhD, a seasoned officer in the German Army with deep insights into the intricacies of European security dynamics. We delve into the German role in NATO and in the ongoing crisis in Ukraine. LTC Wroblewski shares his expertise on the importance of developing interoperability within NATO forces, the strategic partnership between America and Germany, the critical role of information operations in modern warfare, and strategies for enhancing resiliency in the face of evolving threats particularly in the cyber domain. Thanks for listening! ABOUT THE GUEST LTC Dr. Martin Wroblewski is a native of Germany and a graduate of the University of Bonn, Germany. LTC Wroblewski joined the German Army as an active duty officer in 2016. He graduated from Infantry School in Hammelburg, German Army Officer School in Dresden and the German PSYOP Officer Qualification and Advanced Course in Mayen. Additionally, he attended various courses on Human Intelligence, Behavior Analysis, Advanced Target Audience Analysis as well as several PSYOP- and INFOOP-related trainings at the NATO School in Oberammergau. During his service at the Bundeswehr Operations Communication Center in Mayen, he served as an Information Environment Analyst and as the Sub-Unit Leader Target Audience Analysis of a Psyop Company. In 2019/2020 LTC Wroblewski was deployed with the 6th German Contingent to Enhanced Forward Presence in Rukla, Lithuania. There he held the position of Chief Information Operations. After returning from deployment his duty focus was on the refinement of TAA processes, eFP-related instructor duties, and product development in regards to hybrid threats with a regional emphasis on eastern Europe. In June 2021 he successfully completed the PSYOP Qualification Course at USAJFKSWCS. Starting in September 2021 he serves as an XO with the 6th Psychological Operations Battalion (Airborne) in Fort Liberty (previously Fort Bragg), NC. LTC Wroblewski holds a Master of Arts in Medieval and Modern History, Constitutional, Social and Economic History as well as Modern English Language and Literature from the University of Bonn, Germany. In 2016 he graduated from the PhD program at the University of Bonn in History after an extensive research project with the German Foreign Ministry. Before his career as an active duty officer, LTC Dr. Wroblewski had several years of experience as a private school teacher and public relations consultant. His military awards and decorations include the German and Lithuanian Deployment Medal, the German PSYOP Badge in bronze as well as other medals and awards. PRODUCER'S NOTE: This episode was recorded on December 22, 2023 at The University of Texas at Austin. If you have questions, comments, or would like to be a guest on the show, please email slavxradio@utexas.edu and we will be in touch! PRODUCTION CREDITS Assistant Producer/Host: Basil Fedun Supervising Producer/Host: Nicholas Pierce Assistant EP: Misha Simanovskyy (@MSimanovskyy) Associate Producer: Cullan Bendig (@cullanwithana) Associate Producer: Sergio Glajar Assistant Producer: Taylor Helmcamp Assistant Producer: Eliza Fisher Social Media Manager: Faith VanVleet Production Assistant: Gloria Wang SlavX Editorial Director: Sam Parrish Main Theme by Charlie Harper and additional background music by Beat Mekanik, Alex Productions, Dirk Dehler, Linn Friberg, Joey Hendrixx) Executive Producer & Creator: Michelle Daniel (@MSDaniel) www.msdaniel.com DISCLAIMER: Texas Podcast Network is brought to you by The University of Texas at Austin. Podcasts are produced by faculty members and staffers at UT Austin who work with University Communications to craft content that adheres to journalistic best practices. The University of Texas at Austin offers these podcasts at no charge. Podcasts appearing on the network and this webpage represent the views of the hosts, not of The University of Texas at Austin. https://files.fireside.fm/file/fireside-uploads/images/9/9a59b135-7876-4254-b600-3839b3aa3ab1/P1EKcswq.png Special Guest: LTC Martin Wroblewski.

Policy, Guns & Money
Offensive cyber operations; election integrity and disinformation

Policy, Guns & Money

Play Episode Listen Later Feb 23, 2024 48:59


This week, Dr Alex Caples speaks to Emily Harding from the Centre for Strategic and International Studies about offensive cyber operations and how to respond. They discuss how governments are integrating cyber operations with more traditional military planning, as well as responses to cyber-attacks, and how to deter in the cyber domain. With more than 2 billion people in over 70 countries expected to vote this year, 2024 has been dubbed the year of elections. To explore election related foreign interference and disinformation, David Wroe speaks to Chris Zappone, the Digital Foreign Editor for The Age and the Sydney Morning Herald. They discuss the current state of the information environment, how it has evolved over time, and how social media and AI are being used to spread disinformation. Guests: Alex Caples: https://www.aspi.org.au/bio/dr-alex-caples Emily Harding: https://www.csis.org/people/emily-harding David Wroe: https://www.aspi.org.au/bio/david-wroe Chris Zappone: https://www.smh.com.au/by/chris-zappone-hve6u Music: "Young and Free" by Jonas Hipper, licensed with permission from the Independent Music Licensing Collective - imlcollective.uk

Les dessous de l'infox
Opérations cyber, une menace de déstabilisation des démocraties

Les dessous de l'infox

Play Episode Listen Later Jan 26, 2024 19:30


Le mensonge, distillé sur les réseaux, vient parfois des plus hautes sphères du pouvoir. Dans le cas de la Russie, c'est une arme utilisée pour faire pression sur les alliés de l'Ukraine. Paris en fait les frais depuis l'annonce de nouvelles livraisons d'armes à l'Ukraine. Notre invité est François Delerue, auteur du livre Cyber Operations and International Law (Cambridge Studies) et chercheur associé au centre Géode, pour Géopolitique de la data sphère, partenaire de l'émission. Il évoque les dangers que représente pour les démocraties, la combinaison de menaces cyber et informationnelles, que ce soit dans un contexte de guerre, ou en période électorale.Anatomie d'une campagne de désinformation orchestrée depuis Moscou : dans sa chronique, Grégory Genevrier revient sur l'affaire de la liste des « mercenaires français tués dans un bombardement à Kharkiv » selon Moscou. Il a pu échanger avec certains d'entre eux : ni morts, ni mercenaires, ils témoignent. La CAN et ses à-côtés, victimes de leur succès et de la désinformation : Monique Ngo Mayag de l'AFP Factuel démonte une rumeur qui circule sur les réseaux sociaux, histoire de gâcher la fête au maquis. 

Adversary Universe Podcast
Inside Russia's Laboratory of Cyber Operations — and Beyond

Adversary Universe Podcast

Play Episode Listen Later Jan 11, 2024 41:23


In mid-December 2023, an adversary CrowdStrike tracks as VOODOO BEAR targeted Ukrainian telecom provider Kyivstar, wreaking havoc and disrupting thousands of systems and assets. The Russia-linked adversary has for years treated Ukraine as its “lab of offensive cyber operations”, testing attack techniques and demonstrating the destructive behavior it has become known for since it emerged in late 2010. In this episode, Adam and Cristian dive into the details of the recent Kyivstar attack and how it aligns with VOODOO BEAR's history of disruptive cyberattacks, both in Ukraine and around the world. They also pull back the curtain on the broad, complex history of Russian intrusion operations, shedding light on adversaries operating within the country and what has motivated them over the years.

Out of the Woods: The Threat Hunting Podcast
S1 Ep62: [SPOTLIGHT INTERVIEW] Guarding the Digital Frontier: Insights from Major Pierce

Out of the Woods: The Threat Hunting Podcast

Play Episode Listen Later Nov 30, 2023 42:08


Bonus Episode - November 30, 2023 Embark on an exploratory journey through the domain of cybersecurity with our host, Scott Poley, in this enlightening podcast episode. Our distinguished guest, Major Pierce, currently serving as the Director of Cyber Operations for the PA National Guard, unfolds her unique narrative within the digital defense realm – from her initial draw to the cyber sector to the pivotal decisions guiding her to a leading role. Major Pierce's tenure at the PA National Guard is far from typical. In her pivotal position, she directs a nuanced strategy of cyber operations, tackling the complexities of digital warfare within the U.S. Army. The operations she oversees are characterized by a sophisticated blend of tactical foresight and the raw talent of her team, crafting bespoke solutions that address the multifaceted challenges of national security. In this episode, Major Pierce offers a rare glimpse behind the scenes of military cybersecurity, discussing the trials and triumphs that shape the sector's landscape. As she narrates her professional trajectory and operational insights, listeners are invited to discover the synergy between individual expertise and collective operational success in the dynamic arena of cyber operations. Tune in for an episode rich in anecdotes and wisdom from the forefront of cybersecurity innovation. *Connect with Major Pierce: https://www.linkedin.com/in/christine-pierce-mps-cissp-3a128080/ ----- Follow Us! Twitter: https://twitter.com/CyborgSecInc LinkedIn: https://www.linkedin.com/company/cyborg-security/ YouTube: https://www.youtube.com/cyborgsecurity Instagram: https://www.instagram.com/cyborgsecinc/ Facebook: https://www.facebook.com/CyborgSecInc

ITSPmagazine | Technology. Cybersecurity. Society
Top 3 Cyber Roadmaps for 2024-2034 | A Conversation with Dr. Georgianna "George" Shea | The Soulful CXO Podcast with Dr. Rebecca Wynn

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 28, 2023 31:33


Guest: Dr. Georgianna "George" Shea, Chief Technologist, Defense of Democracies [@FDD], Center on Cyber and Technology Innovation (CCTI) and Transformative Cyber Innovation Lab (TCIL)On LinkedIn | https://www.linkedin.com/in/drgeorgesheaHost: Dr. Rebecca WynnOn ITSPmagazine  

Outcomes Rocket
The Changing Landscape of Cyber Operations with Tiffany Kleemann, Managing Director, Deloitte & Touche LLP and Raj Mehta, Partner, Deloitte & Touche LLP

Outcomes Rocket

Play Episode Listen Later Nov 16, 2023 23:11


As organizations recognize the inevitability of breaches, resiliency becomes a paramount concern in their cybersecurity strategy. Leveraging a skilled, extended workforce can help. In this episode, Tiffany Kleemann, managing director in Deloitte & Touche LLPs Cyber practice, and Raj Mehta, partner in Deloitte & Touche LLPs Cyber practice, share their insights on the challenges and strategies in managing cybersecurity at life sciences and healthcare companies. They highlight the increasing targeting of these industries by bad actors, the rapid pace of technological change, the difficulty in attracting and retaining cyber talent, and the emerging financial pressures that organizations now face. Raj and Tiffany shed light on cybersecurity as a strategic business risk, a shift due to regulatory changes for more disclosures of cyber incidents, and the recognition that cybersecurity can accelerate growth, support digital transformation, and enhance brand reputation for healthcare and life sciences organizations. Organizations should prepare for cyberattacks and focus on continuing operations during disruptions, which is why Raj mentions various tactics organizations are using to address cybersecurity challenges while balancing costs and skill sets. Don't miss this insightful episode as we explore the strategies deployed by life sciences and healthcare organizations in the ever-evolving landscape of cybersecurity. Resources: Connect with and follow Tiffany Kleemann on LinkedIn. Connect with and follow Raj Mehta on LinkedIn. Follow Deloitte on LinkedIn. Read insights on this topic on Deloitte's Health Forward blog Learn about the SEC's cyber ruling requirements here Read Deloitte's 2023 Global Future of Cyber Report Source: https://www.hipaajournal.com/july-2021-healthcare-data-breach-report/  Source: https://www.reuters.com/article/us-cybersecurity-hospitals-idUSKCN0HJ21I20140924/

ITSPmagazine | Technology. Cybersecurity. Society
Do We Really Need to Worry about Critical Infrastructure? | A Discussion about Cyber Operations in the Context of the Leaked Vulkan Files | A SecTor Event Coverage Conversation with Marina Krotofil

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 19, 2023 30:02


Guest: Marina Krotofil, Senior Cyber Security Advisor, Critical Infrastructure ProtectionOn Linkedin | https://www.linkedin.com/in/marina-krotofil/Marina's Website | https://www.cyberphysicalsecurity.info/____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________Episode NotesIn this episode of Chats on the Road, hosts Marco Ciappelli and Sean Martin are joined by Marina Krotofil, a specialist in cyber physical security, at the SecTor Canada security conference in Toronto. Marina sheds light on the world of cyber warfare and the evolution of cyber weapons. She discusses the leaked Vulkan files, which reveal Russia's centralized strategy and software platform for managing cyber operations. Marina emphasizes the combination of cyber and physical sabotage required in attacks on critical infrastructure and the focus on controlling the masses through disinformation and propaganda.The conversation covers a range of topics, including the link between cybersecurity and political science, societal implications, and the need for independent thinking. Marina highlights the importance of preparing for cyber attacks during peacetime and the vulnerability of small and medium-sized organizations. She shares insights into Russia's cyber capabilities and practices, providing evidence of their development and testing throughout the years. Marina invites listeners to think critically and independently, encouraging them to consider the political and societal implications of cyber warfare.The episode provides thought-provoking insights into the complexities of cyber warfare and the need to be prepared and vigilant in the face of evolving threats. It explores the manipulation of media and propaganda, the dangers of controlling information flow, and the importance of understanding the long-term game of cyber operations. The conversation is not sensationalized or journalistic in nature, but rather focuses on informing and educating listeners about the realities of cyber warfare.Marina's session at the conference, "Do We Really Need to Worry about Critical Infrastructure?" goes deeper into the analysis of Russia's cyber operations and their connection to the leaked Vulkan documents. Overall, this episode offers listeners a chance to gain a deeper understanding of the challenges posed by cyber warfare and the need for proactive defense measures. It encourages independent thinking and critical analysis, highlighting the importance of staying informed and prepared in an age of evolving cyber threats.About Marina's SecTor Session: In the past, the definition of hybrid war was frequently reduced to a composition of kinetic and cyber warfare to simplify the discussion. Lessened to just two components and in the absence of real-world examples of hybrid war, it was often argued that cyberwarfare, and especially attacks on various critical infrastructures, had the potential of having a critical role at times of significant conflicts with combat actions. However, the events in the Ukrainian war theater have shown that kinetic weapons were preferred at the time of tactical military operations. Ever wondered why this was the case?This talk will consist of two parts. The first part will provide a short yet comprehensive summary of the recently leaked "Vulkan files", classified documentation which provides details about Russian hybrid warfare strategy and distributed software platforms to prepare and manage cyber- and information operations in a centralized manner. In the second part, we will analyze notable Russian cyber operations in the post-Stuxnet era (after 2010) and show how Russia gradually evolved and tested its cyber capabilities and hybrid warfare vision. Some of the operations will be discussed with technical details based on first- and second-hand experiences with such operations. By the end of this talk, the audience should get a better idea about a wide range of factors that impact the success of cyber operations and why cyber attacks on critical infrastructures are more frequently opportunistic than strategic as well as may not always yield the desired impact. In conclusion, the talk will outline a type of cyber operations being conducted in war and peace times.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

It's 5:05! Daily cybersecurity and open source briefing
Episode #187 - Account Takeovers using Evil QR; SIM swap attacks on the rise; Crypto scams have dropped faster than Twitter's user base; Navy Unveils New Cyber Operations Roles; This Day in Tech History

It's 5:05! Daily cybersecurity and open source briefing

Play Episode Listen Later Jul 18, 2023 11:48


The CyberWire
Update on Chinese cyberespionage incident. ICS vulnerabilities. USB attacks. New KEVs. Updates from Russia's hybrid war, as hacktivists swap DDoS attacks and observers draw lessons learned.

The CyberWire

Play Episode Listen Later Jul 14, 2023 30:52


Developments in the case of China's cyberespionage against government Exchange users. Industrial controller vulnerabilities pose a risk to critical infrastructure. USB attacks have risen three-fold in the first half of 2023. CISA adds two vulnerabilities to its Known Exploited Vulnerabilities Catalog. Ghostwriter's continued activity focuses on Poland and Ukraine. Hacktivist auxiliaries swap DDoS attacks. Awais Rashid from University of Bristol shares insights on threat modeling. Our guest is Chris Cochran from Huntress on the challenges small and medium sized businesses face with cyber security. And lessons learned from cyber warfare in Russia's war. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/133 Selected reading. UK says it's working with Microsoft to understand impact of Chinese email hack (Reuters)  What we know (and don't know) about the government email breach (Washington Post) Yet Another MS CVE: Don't Get Caught In The Storm! (Cynet) China Hacking Was Undetectable for Some Who Had Less Expensive Microsoft Services (Wall Street Journal) Security flaws in Honeywell devices could be used to disrupt critical industries (TechCrunch) APT Exploit Targeting Rockwell Automation Flaws Threatens Critical Infrastructure (SecurityWeek) Rockwell Automation ControlLogix Bugs Expose Industrial Systems to Remote Attacks (The Hacker News)  USB drive malware attacks spiking again in first half of 2023 (BleepingComputer) CISA Adds Two Known Vulnerabilities to Catalog (Cybersecurity and Infrastructure Security Agency CISA) Malicious campaigns target government, military and civilian entities in Ukraine, Poland (Cisco Talos Blog) Belarus-linked hacks on Ukraine, Poland began at least a year ago, report says (Record) Crowdsourced Cyber Warfare: Russia and Ukraine Launch Fresh DDoS Offensives (CEPA). Cyber Operations during the Russo-Ukrainian War (CSIS)

The CyberWire
Iran integrates influence and cyber operations. ChatGPT use and misuse. Trends in the cyber underworld. Hybrid warfare and cyber insurance war clauses.

The CyberWire

Play Episode Listen Later May 3, 2023 33:15


Iran integrates influence and cyber operations. ChatGPT use and misuse. Phishing reports increased significantly so far in 2023, while HTML attacks double. An update on the Discord Papers. Cyberstrikes against civilian targets. My conversation with our own Simone Petrella on emerging cyber workforce strategies. Tim Starks from the Washington Post joins me with reflections on the RSA conference. And, turns out, a war clause cannot be invoked in denying damage claims in the NotPetya attacks (at least not in the Garden State). For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/85 Selected reading. Rinse and repeat: Iran accelerates its cyber influence operations worldwide (Microsoft On the Issues) ChatGPT Confirms Data Breach, Raising Security Concerns (Security Intelligence)  Samsung Bans Generative AI Use by Staff After ChatGPT Data Leak (Bloomberg)  Malicious email campaigns abusing Telegram bots rise tremendously in Q1 2023, surpassing all of 2022 by 310% (Cofense) Threat Spotlight: Proportion of malicious HTML attachments doubles within a year (Barracuda) Zelensky says White House told him nothing about Discord intelligence leaks (Washington Post) Russia attacks civilian infrastructure in cyberspace just as it does on ground - watchdog (Ukrinform) Merck's Insurers On the Hook in $1.4 Billion NotPetya Attack, Court Says (Wall Street Journal) Merck entitled to $1.4B in cyberattack case after court rejects insurers' 'warlike action' claim (Fierce Pharma)

Irregular Warfare Podcast
The Digital Bear in Ukraine: Russian Cyber Operations Since 2014

Irregular Warfare Podcast

Play Episode Listen Later Apr 20, 2023 55:18


Be sure to visit the Irregular Warfare Initiative's new website to see all of the new articles, podcast episodes, and other content the IWI team is producing! How much of a role have cyber warfare and digital information operations played since Russia's invasion of Ukraine? What about since 2014, when Russia seized Crimea and backed proxy forces in the eastern Donbas region? What lessons on cyber resilience emerge from an examination of Ukraine’s defense against Russian cyber actions? And what do Russia’s cyber operations against Ukraine tell us about the way it conceptualizes and organizes cyber activities? To explore these questions, this episode features a conversation with Gavin Wilde, a senior fellow in the Technology and International Affairs Program at the Carnegie Endowment for International Peace and former director for Russia, Baltic, and Caucasus affairs at the National Security Council, and Jason Kikta, who served for over twenty years in the United States Marine Corps, including seven years at United States Cyber Command designing and managing the national counter-APT and counter-ransomware missions. Intro music: "Unsilenced" by Ketsa Outro music: "Launch" by Ketsa CC BY-NC-ND 4.0

The CyberWire
Traffers and the threat to credentials. WiFi protocol flaw. Cross-chain bridge attacks. A shift in Russian cyber operations. Piracy is patriotic.

The CyberWire

Play Episode Listen Later Mar 29, 2023 24:39


Traffers and the threat to credentials. A newly discovered WiFi protocol flaw. Cross-chain bridge attacks. A shift in Russian cyber operations. Ann Johnson from Afternoon Cyber Tea chats with EY principal Adam Malone. Our guest is Toni Buhrke from Mimecast with a look at the State of Email Security. And is piracy patriotic? For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/60 Selected reading. Traffers and the growing threat against credentials (Outpost24 blog)  WiFi protocol flaw allows attackers to hijack network traffic (BleepingComputer)  Cross-chain bridge attacks. (CyberWire)  2023 Annual State of Email Security Report (Cofense) From Ukraine to the whole of Europe:cyber conflict reaches a turning point (Thales Group)  Russia Ramps Up Cyberattacks On Ukraine Allies: Analysts (Barron's)  Pro-Russian hackers shift focus from Ukraine to EU countries (Radio Sweden)  Russian hackers attack Slovak governmental websites after country supplies Mig-29s to Ukraine (Ukrainska Pravda) Ukraine's Defense Ministry says Russia is encouraging online piracy (The Jerusalem Post)

Stratfor Podcast
Essential Geopolitics: Recent Changes in China's Cyber Operations

Stratfor Podcast

Play Episode Listen Later Mar 21, 2023 10:06


Chinese cyber operations have evolved beyond its traditional tactics as China becomes increasingly emboldened. In this episode of the Essential Geopolitics podcast, RANE Cyber Analyst, Hayley Benedict, compares China's historical cyber operations to the country's more recent cyber activities. RANE is a global risk intelligence company that delivers risk and security professionals access to critical insights, analysis and support to ensure business continuity and resilience for our clients. For more information about RANE's risk management solutions, visit www.ranenetwork.com.    

Stratfor Podcast
Essential Geopolitics: Recent Changes in China's Cyber Operations

Stratfor Podcast

Play Episode Listen Later Mar 21, 2023 10:06


Chinese cyber operations have evolved beyond its traditional tactics as China becomes increasingly emboldened. In this episode of the Essential Geopolitics podcast, RANE Cyber Analyst, Hayley Benedict, compares China's historical cyber operations to the country's more recent cyber activities.RANE is a global risk intelligence company that delivers risk and security professionals access to critical insights, analysis and support to ensure business continuity and resilience for our clients. For more information about RANE's risk management solutions, visit www.ranenetwork.com.

The CyberWire
CISA Alert AA22-264A – Iranian state actors conduct cyber operations against the government of Albania. [CISA Cybersecurity Alerts]

The CyberWire

Play Episode Listen Later Sep 22, 2022 3:09


In July 2022, Iranian state cyber actors—identifying as “HomeLand Justice”—launched a destructive cyber attack against the Government of Albania which rendered websites and services unavailable. An FBI investigation indicates Iranian state cyber actors acquired initial access to the victim's network approximately 14 months before launching the destructive cyber attack, which included a ransomware-style file encryptor and disk wiping malware. AA22-264A Alert, Technical Details, and Mitigations CISA's free Cyber Hygiene Services (CyHy) CISA's zero–trust principles and architecture. Iran Cyber Threat Overview and Advisories. All organizations should report incidents and anomalous activity to CISA's 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI's 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.

The CyberWire
An overview of Russian cyber operations. The IT Army of Ukraine says it's doxed the Wagner Group. Lapsus$ blamed for Uber hack. A look at the risk of stolen single sign-on credentials.

The CyberWire

Play Episode Listen Later Sep 20, 2022 32:16 Very Popular


An overview of Russian cyber operations. The IT Army of Ukraine claims to have doxed the Wagner Group. Who dunnit? Lapsus$ dunnit. Emily Mossburg from Deloitte and Shelley Zalis of the Female Quotient on why gender equality is essential to the success of the cyber industry. We've got a special preview of the International Spy Museum's SpyCast's latest episode with host Andrew Hammond interviewing Robert Gates on the 75th anniversary of the CIA. And a look at the risk of stolen single sign-on credentials. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/181 Selected reading. Ukraine's IT Army hacks Russia's Wagner Group (Computing) Untangling the Russian web: Spies, proxies, and spectrums of Russian cyber behavior  (Atlantic Council) Security update | Uber Newsroom (Uber Newsroom) Tentative attribution in the Uber breach. (CyberWire) Uber says Lapsus$-linked hacker responsible for breach (Reuters) Uber blames security breach on Lapsus$, says it bought credentials on the dark web (ZDNET) Uber's breach shows how hackers keep finding a way in (Protocol) Uber attributes hack to Lapsus$, working with FBI and DOJ on investigation (The Record by Recorded Future) Uber data breach spotlights need for enterprises to ‘get the basics right', say experts (ITP.net) "Keys to the Kingdom" at Risk: Analyzing Exposed SSO Credentials of Public Companies (Bitsight)