Podcasts about cyberattacks

Attack on a computer system

  • 1,999PODCASTS
  • 4,360EPISODES
  • 31mAVG DURATION
  • 2DAILY NEW EPISODES
  • Dec 5, 2022LATEST
cyberattacks

POPULARITY

20152016201720182019202020212022

Categories



Best podcasts about cyberattacks

Show all podcasts related to cyberattacks

Latest podcast episodes about cyberattacks

The CyberWire
Swapping cyberattacks in a hybrid war. Privateers or just a side-hustle? US CSRB will investigate Lapsu$ Group. Notes on the cyber underworld.

The CyberWire

Play Episode Listen Later Dec 5, 2022 29:43


Wiper malware hits Russian targets. Microsoft sees an intensification of Russian cyber operations against Ukraine. State policy, privateering, or an APT side-hustle? The US Cyber Safety Review Board will investigate the Lapsu$ Group. Rackspace works to remediate a security incident. The Schoolyard Bully Trojan harvests credentials. Grayson Milbourne of OpenText Security Solutions on attacks on common open source dev libraries. Rick Howard looks at CISO career paths. And trends in ransomware: cybercrime succeeds when the gang runs like a business. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/231 Selected reading. CryWiper: fake ransomware (Kaspersky). CryWiper data wiper targets Russian courts and mayors' offices (Computing) Never-before-seen malware is nuking data in Russia's courts and mayors' offices (Ars Technica) Russian regions attacked by new wiper posing as ransomware (Cybernews) Preparing for a Russian cyber offensive against Ukraine this winter (Microsoft On the Issues) Russia coordinating Ukraine hacks with missiles, could increasingly target European allies, Microsoft warns (POLITICO) Russia Is Boosting Its Cyber Attacks on Ukraine, Allies, Microsoft Says (Bloomberg.com)  Hackers linked to Chinese government stole millions in Covid benefits (NBC News) Cyber Safety Review Board to Conduct Second Review on Lapsus$ (US Department of Homeland Security) Rackspace: Ongoing Exchange outage caused by security incident (BleepingComputer)  Schoolyard Bully Trojan Facebook Credential Stealer (Zimperium) The Professionalization of Ransomware: How Gangs Are Becoming Like Businesses (LookingGlass Cyber Solutions Inc.)

All TWiT.tv Shows (Video LO)
This Week in Enterprise Tech 521: Merry xNAS

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Dec 3, 2022 70:08


GitHub Actions vulnerability, US bans sales of Huawei, TrueNAS open source hyperconverged storage, and more. Tesla finally delivers its first production Semi Artifact poisoning in GitHub Actions imports malware via software pipelines US bans sales of Huawei, Hikvision, ZTE, and Dahua equipment FBI, CISA say Cuba ransomware gang extorted $60M from victims this year Data security concerns are driving changes in US consumer behavior and demands iXsystems VP of Marketing Mario Blandini talks about TrueNAS' open source storage and how it can be leveraged in a wide range of environments Hosts: Louis Maresca, Brian Chee, and Curtis Franklin Guest: Mario Blandini Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: onlogic.com/TWIT hover.com/twit Code Comments

This Week in Enterprise Tech (Video HD)
TWiET 521: Merry xNAS - GitHub Actions vulnerability, US bans sales of Huawei, TrueNAS open source storage

This Week in Enterprise Tech (Video HD)

Play Episode Listen Later Dec 3, 2022 70:08


GitHub Actions vulnerability, US bans sales of Huawei, TrueNAS open source hyperconverged storage, and more. Tesla finally delivers its first production Semi Artifact poisoning in GitHub Actions imports malware via software pipelines US bans sales of Huawei, Hikvision, ZTE, and Dahua equipment FBI, CISA say Cuba ransomware gang extorted $60M from victims this year Data security concerns are driving changes in US consumer behavior and demands iXsystems VP of Marketing Mario Blandini talks about TrueNAS' open source storage and how it can be leveraged in a wide range of environments Hosts: Louis Maresca, Brian Chee, and Curtis Franklin Guest: Mario Blandini Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: onlogic.com/TWIT hover.com/twit Code Comments

This Week in Enterprise Tech (MP3)
TWiET 521: Merry xNAS - GitHub Actions vulnerability, US bans sales of Huawei, TrueNAS open source storage

This Week in Enterprise Tech (MP3)

Play Episode Listen Later Dec 3, 2022 69:48


GitHub Actions vulnerability, US bans sales of Huawei, TrueNAS open source hyperconverged storage, and more. Tesla finally delivers its first production Semi Artifact poisoning in GitHub Actions imports malware via software pipelines US bans sales of Huawei, Hikvision, ZTE, and Dahua equipment FBI, CISA say Cuba ransomware gang extorted $60M from victims this year Data security concerns are driving changes in US consumer behavior and demands iXsystems VP of Marketing Mario Blandini talks about TrueNAS' open source storage and how it can be leveraged in a wide range of environments Hosts: Louis Maresca, Brian Chee, and Curtis Franklin Guest: Mario Blandini Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: onlogic.com/TWIT hover.com/twit Code Comments

All TWiT.tv Shows (MP3)
This Week in Enterprise Tech 521: Merry xNAS

All TWiT.tv Shows (MP3)

Play Episode Listen Later Dec 3, 2022 69:48


GitHub Actions vulnerability, US bans sales of Huawei, TrueNAS open source hyperconverged storage, and more. Tesla finally delivers its first production Semi Artifact poisoning in GitHub Actions imports malware via software pipelines US bans sales of Huawei, Hikvision, ZTE, and Dahua equipment FBI, CISA say Cuba ransomware gang extorted $60M from victims this year Data security concerns are driving changes in US consumer behavior and demands iXsystems VP of Marketing Mario Blandini talks about TrueNAS' open source storage and how it can be leveraged in a wide range of environments Hosts: Louis Maresca, Brian Chee, and Curtis Franklin Guest: Mario Blandini Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: onlogic.com/TWIT hover.com/twit Code Comments

Dark Rhino Security Podcast
SC S8 E9 Pro Athlete turned Cybersecurity CEO

Dark Rhino Security Podcast

Play Episode Listen Later Dec 2, 2022 49:58


#SecurityConfidential #DarkRhinoSecurity Greg Tomchick is a former professional athlete. He played in the minor league for three seasons for the St. Louis Cardinals. He is the author of the book Growing into you. He is driven by a passion for cybersecurity from an experience he had with a former company. He is currently the Partner and CEO of Valorr. They focused on identifying and mitigating cyber threats upfront and when necessary, countering cyber attacks with targeted and strategic responses. 00:00 Introduction 01:36 Gregs Origin Story 04:15 Incubation Technologies 05:42 The right mindset 10:26 Cyberattack 15:12 Cybersecurity is a business problem 15:56 100% Cyber security? 16:56 Stimulation Output 17:50 How much cybersecurity is enough? 19:17 The process at Valor 22:38 Communicating with the Department of No 24:50 Advise for CEOs when talking about digital risk 27:16 Talking to the executive team 30:02 The Proactive side 31:58 Threat Actors 34:00 Third-Party Risk and Communicating with Vendors 37:50 Laws 43:12 Gregs Book 46:00 More about Greg To learn more about Greg visit https://www.linkedin.com/in/greg-tomchick/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @DarkRhinoSecurity ​

Automotive News Weekend Drive
December 2, 2022 | U.S. averts rail strike; how dealers should prepare for cyberattacks

Automotive News Weekend Drive

Play Episode Listen Later Dec 2, 2022 17:48


December 2, 2022 | U.S. averts rail strike; how dealers should prepare for cyberattacks by Automotive News

Prime Resources Podcast
Protecting Your Small Business From Cyber Attacks

Prime Resources Podcast

Play Episode Listen Later Dec 1, 2022 32:07


In this episode of the Prime Resources Podcast, BDR's Logistics & Operations Support Manager, Mark, explains how to have great cybersecurity hygiene and protect yourself from cyber-attacks. Whether you are taking all the precautions at home or in your business, there is always a weak link. Discover what it could be and what appropriate steps you can take to defend yourself and your business.(01:07) – About Mark and his cybersecurity expertise(02:35) – What is cybersecurity?(05:12) – Why should small businesses be worried?(07:14) – Are small businesses becoming a target?(09:32) – What are specific cyber attacks that small businesses should be aware of?(11:59) – Did you really win the lottery in Nigeria?(13:58) – How can a business protect itself?(16:28) – What are phishing and other types of attacks?(19:06) – You're only as strong as your weakest link(20:54) – How do we educate our team?(25:42) – Does cyber insurance coverage exist?(28:23) – Cybersecurity resources(30:07) – Final thoughts

Reimagining Cyber
Reimagining Cyber Extra! - Ukraine & cyber attacks, a 'weirdo' in the NSA

Reimagining Cyber

Play Episode Listen Later Nov 30, 2022 16:28


Over the past couple of years Reimagining Cyber has featured guests with lots of interesting perspectives and opinions, but it seems that our info hungry audience wants even more.Hosts Rob Aragao and Stan Wisseman have been asked to share news of their own interactions and experiences, and who are they to say no?So, in the first ever ‘Reimagining Cyber Extra!'  Rob and Stan bow to listener demand and address the following:- The war in Ukraine and a link to a decrease in cyber attacks- A brush with “one of the ‘the biggest minds in cyber and cryptology” (Hint: it's not Rob or Stan)- “Who are all of these weirdos?” Stan reminisces about his early days at the NSA- Cyber Informed Engineering- Can President Biden's zero trust strategy apply to the OT environment?

Messy Times
The Feds Want to Saddle YOU with the Costs of Cyber Attacks!

Messy Times

Play Episode Listen Later Nov 30, 2022 39:58


Bruce de'Medici returns to the Messy Times studios to discuss the recent brilliant idea for the US government - meaning YOU, the taxpayer - to backstop massive insurance losses which insurance companies don't feel like paying when a cyber attack causes billions of dollars in damage to American companies. Bear in mind both the attacked company AND the insurance provider entered into a cyber insurance contract voluntarily in a free market. The insurance company is not offering to share the profits with you, the taxpayer, from a cyber policy which doesn't pay out any claims. They are very interested, however, in having you come to their rescue should a company make a claim for a payout. After getting a fresh dose of infuriating #Enlightentainment from two non-conflicted observers about one more instance of Leviathan reaching into your pocket to pay off someone else's losses, might we suggest as a palate cleanser that you check out CoinGeek's Bitcoin 101 free course offering? It is more important than ever that you get a clear handle on this whole Bitcoin Thing: https://tpow.app/ebc70fcc --- Send in a voice message: https://anchor.fm/messytimes/message Support this podcast: https://anchor.fm/messytimes/support

Presserevue
Presserevue

Presserevue

Play Episode Listen Later Nov 30, 2022 4:08


Datt den ADR-Deputéierte Roy Reding trotz senger Geriichtsaffär an der Chamber bleift, kënnt net gutt un an et gouf eng grouss Cyberattack bei Cobolux

Farm and Ranch Report
Ag is 'definitely a target' for cyber attacks

Farm and Ranch Report

Play Episode Listen Later Nov 30, 2022


In recent years, the number of cyberattacks targeting agricultural companies has surged.

Cybersecurity Unplugged
The CISO and The Cyberattack

Cybersecurity Unplugged

Play Episode Listen Later Nov 30, 2022 36:38


Steve Stone is the vice president of Rubrik Zero Labs, which is a new cybersecurity research team that Stone leads. In this episode of Cybersecurity Unplugged, Stone breaks down The State of Data Security Report, how the CISO job level is affected by cyberattacks and more.

SpyCast
“The FBI & Cyber” – with Cyber Division Chief Bryan Vorndran (Part 2 of 2)

SpyCast

Play Episode Listen Later Nov 29, 2022 40:18


Summary Bryan Vorndran (Website, LinkedIn) joins Andrew (Twitter; LinkedIn) to discuss how the FBI has adapted to the digital age. As Bryan says, “We are not your grandparents FBI.” What You'll Learn Intelligence The evolution of the FBI and cyber  Weakening cyber adversaries  Motivations behind creating and distributing malware How to keep your information safe from cyber attacks Reflections Adapting to change within the intelligence field The value of a passionate and committed team And much, much more… Episode Notes When Bryan Vorndran attended the FBI Academy in 2003, cyber was not on his personal radar, nor was it on Quantico's vigorous training schedule. Now, almost 20 years later, Bryan serves as the Assistant Director of the FBI's Cyber Division.  What changed in those 20 years to bring Bryan to the forefront of the cyber battlefield, and how have the tactics and strategies used in this used in this field evolved alongside the ever-changing face of cyber?  Tune into this week's SpyCast episode to find out!  The FBI has historically been associated with law enforcement and criminal justice. How does cyber fit into this world, and what is the FBI's strategy for defending the country against cyber adversaries?  And… Check out the FBI Cyber's Most Wanted list. A look through the details on each of these wanted posters can give you a better idea of the vast array of cyber-crimes committed around the world.  Quotes of the Week “We will not arrest our way out of the ransomware problem. We are not going to arrest our way out of the Russia China Nation state cyber vector problem. Right? It's just not going to happen. But again, national tool power is something we will always do, but there has to be a way to degrade the ecosystem to make their life more challenging.” – Bryan Vordran. Resources *SpyCasts* Sure, I Can Hack Your Organization – with Eric Escobar, Part 1 (2022) Sure, I Can Hack Your Organization – with Eric Escobar, Part 2 (2022) From the CIA to Strategic Cyber - with Hans Holmer (2022) CIA Case Officer, Cyber Entrepreneur, Burning Man Volunteer – with Mike Susong (2022) Cyberattacks, Espionage & Ransomware – Inside Microsoft's MSTIC (2021) The Cyber Zeitgeist – Cyberwire Host Dave Bittner (2021) *Beginner Resources* What is cybersecurity?, IBM (n.d.) [Article] How does Malware Work?, Peter Baltazar, Malware Fox (2021) [Article] Director Wray on FBI Cyber Strategy, FBI (2020) Books Dark Territory: The Secret History of Cyber War, Fred Kaplan (Simon & Schuster, 2017)  Spam Nation: The Inside Story of Organized Cybercrime, Brian Krebs (Sourcebooks, 2015)  DarkMarket: How Hackers Became the New Mafia, Misha Glenny (Vintage, 2012) The FBI: A History, Rhodri Jefferys-Jones (Yale, 2007) Articles FBI: Beware of Cyber-Threat from Russian Hacktivists, Phil Muncaster, Info Security (2022) Web shell attacks continue to rise, Microsoft Security (2021) Thingbots: The Future of Botnets in the Internet of Things, Paul Sabanal, Security Intelligence (2016) Video Inside the FBI: Decoding the Cyber Threat (2022) Made in Beijing: The Plan for Global Market Domination (2022) FBI Oregon Cyber Jobs: Cyber Special Agent (2022) Life on an FBI Cyber Squad (2020)  The Evolving Attack Surface (2020) Primary Sources  Oversight of the FBI Cyber Division (2022) Sodinokibi/REvil Ransomware Defendant Extradited to United States and Arraigned in Texas (2021)  Bryan A. Vorndran Named Assistant Director of the FBI Cyber Division (2021) The FBI's Role in Cyber Security (2014) *Wildcard Resource* Quiz: Test your knowledge of the FBI in pop culture!

ITSPmagazine | Technology. Cybersecurity. Society
Security-As-Code | Integrating Security Testing Into The SDLC | A Conversation With Andy Rappaport | Redefining CyberSecurity Podcast With Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 23, 2022 57:14


GuestAndy RappaportData Security Architect at iRobot [@iRobot]On LinkedIn | https://www.linkedin.com/in/andyrappaport/HostSean MartinCo-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinOn Mastodon | https://infosec.exchange/@seanmartin____________________________This Episode's SponsorsAsgardeo | https://itspm.ag/asgardeo-by-wso2-u8vcEdgescan | https://itspm.ag/itspegweb___________________________Episode NotesWe've come a long way in software development, moving from a months-long waterfall model to a software development lifecycle (SDLC) that's all about continuous improvement and continuous delivery (CI/CD). Has security testing kept up, and how can it fit in? Let's find out during this chat with Data Security Architect, Andy Rappaport.____________________________Resources____________________________To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurity-podcastAre you interested in sponsoring an ITSPmagazine Channel?

The CyberWire
Watch out for abuse of pentesting tools. Cyber attack on Guadeloupe. Ducktail's evolution. Cybersecurity for ports. ICS security advisories. And stay safe shopping during the holidays.

The CyberWire

Play Episode Listen Later Nov 23, 2022 28:55


Another pentesting tool may soon be abused by threat actors. Cyberattack disrupts Guadeloupe. Ducktail evolves and expands. Warning of the potential disruption cyberattacks might work against European ports. CISA releases eight industrial control system advisories. Patrick Tiquet, VP of Security and Architecture at Keeper Security, talks about the FedRAMP authorization process. Bryan Vorndran of the FBI Cyber Division with reflections on ransomware. And stay safe on Black Friday (and Cyber Monday, and Panic Saturday, and…you get the picture. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/225 Selected reading. Nighthawk: An Up-and-Coming Pentest Tool Likely to Gain Threat Actor Notice (Proofpoint) Making Cobalt Strike harder for threat actors to abuse (Google Cloud Blog) Guadeloupe government fights 'large-scale' cyberattack (AP NEWS) Vietnam-Based Ducktail Cybercrime Operation Evolving, Expanding (SecurityWeek) Cyber as important as missile defences - ex-NATO general (Reuters) CISA Releases Eight Industrial Control Systems Advisories (CISA)  Black Friday and Cyber Monday risks. (CyberWire)

SpyCast
“The FBI & Cyber” – with Cyber Division Chief Bryan Vorndran (Part 1 of 2)

SpyCast

Play Episode Listen Later Nov 22, 2022 50:33


Summary Brian Vorndran (Website, LinkedIn) joins Andrew (Twitter; LinkedIn) to discuss how the FBI has adapted to the digital age. As Brian says, “We are not your grandparents FBI.” What You'll Learn Intelligence The evolution of the FBI and cyber  Weakening cyber adversaries  Motivations behind creating and distributing malware How to keep your information safe from cyber attacks Reflections Adapting to change within the intelligence field The value of a passionate and committed team And much, much more… Episode Notes When Brian Vorndran attended the FBI Academy in 2003, cyber was not on his personal radar, nor was it on Quantico's vigorous training schedule. Now, almost 20 years later, Brian serves as the Assistant Director of the FBI's Cyber Division.  What changed in those 20 years to bring Brian to the forefront of the cyber battlefield, and how have the tactics and strategies used in this used in this field evolved alongside the ever-changing face of cyber?  Tune into this week's SpyCast episode to find out!  The FBI has historically been associated with law enforcement and criminal justice. How does cyber fit into this world, and what is the FBI's strategy for defending the country against cyber adversaries?  And… Check out the FBI Cyber's Most Wanted list. A look through the details on each of these wanted posters can give you a better idea of the vast array of cyber-crimes committed around the world.  Quotes of the Week “We will not arrest our way out of the ransomware problem. We are not going to arrest our way out of the Russia China Nation state cyber vector problem. Right? It's just not going to happen. But again, national tool power is something we will always do, but there has to be a way to degrade the ecosystem to make their life more challenging.” – Bryan Vordran. Resources *SpyCasts* Sure, I Can Hack Your Organization – with Eric Escobar, Part 1 (2022) Sure, I Can Hack Your Organization – with Eric Escobar, Part 2 (2022) From the CIA to Strategic Cyber - with Hans Holmer (2022) CIA Case Officer, Cyber Entrepreneur, Burning Man Volunteer – with Mike Susong (2022) Cyberattacks, Espionage & Ransomware – Inside Microsoft's MSTIC (2021) The Cyber Zeitgeist – Cyberwire Host Dave Bittner (2021) *Beginner Resources* What is cybersecurity?, IBM (n.d.) [Article] How does Malware Work?, Peter Baltazar, Malware Fox (2021) [Article] Director Wray on FBI Cyber Strategy, FBI (2020) Books Dark Territory: The Secret History of Cyber War, Fred Kaplan (Simon & Schuster, 2017)  Spam Nation: The Inside Story of Organized Cybercrime, Brian Krebs (Sourcebooks, 2015)  DarkMarket: How Hackers Became the New Mafia, Misha Glenny (Vintage, 2012) The FBI: A History, Rhodri Jefferys-Jones (Yale, 2007) Articles FBI: Beware of Cyber-Threat from Russian Hacktivists, Phil Muncaster, Info Security (2022) Web shell attacks continue to rise, Microsoft Security (2021) Thingbots: The Future of Botnets in the Internet of Things, Paul Sabanal, Security Intelligence (2016) Video Inside the FBI: Decoding the Cyber Threat (2022) Made in Beijing: The Plan for Global Market Domination (2022) FBI Oregon Cyber Jobs: Cyber Special Agent (2022) Life on an FBI Cyber Squad (2020)  The Evolving Attack Surface (2020) Primary Sources  Oversight of the FBI Cyber Division (2022) Sodinokibi/REvil Ransomware Defendant Extradited to United States and Arraigned in Texas (2021)  Bryan A. Vorndran Named Assistant Director of the FBI Cyber Division (2021) The FBI's Role in Cyber Security (2014) *Wildcard Resource* Quiz: Test your knowledge of the FBI in pop culture!

Cybercrime Magazine Podcast
CISO Minute. Defending Against Cyberattacks. Theresa Payton, Former White House CIO.

Cybercrime Magazine Podcast

Play Episode Listen Later Nov 21, 2022 2:34


Cybercrime Magazine CISO Minute host Theresa Payton, Former White House CIO, discusses some of the different ways in which CISOs defend against cyberattacks. The CISO Minute is sponsored by https://knowbe4.com/ • For more on cybersecurity, visit us at https://cybersecurityventures.com/

All TWiT.tv Shows (MP3)
This Week in Enterprise Tech 520: Catchpoint and Release

All TWiT.tv Shows (MP3)

Play Episode Listen Later Nov 19, 2022 68:56


Apple to use US-made chips in 2024, vulnerabilities in space, network observability with Catchpoint, and more. Zero-trust initiatives stall, as cyberattack costs rocket to $1M per incident Tim Cook says Apple will use chips made in America from 2024 Spacecraft vulnerable to failure, thanks to aerospace networking bug Amazon to cut around 10,000 corporate and tech jobs, making largest layoffs in its history ISP deploys fiber service with a wrinkle - the users themselves own each network Catchpoint CMO Gerardo Dada talks about network monitoring and observability Hosts: Curtis Franklin and Brian Chee Guest: Gerardo Dada Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT Code Comments nureva.com/twit

All TWiT.tv Shows (Video LO)
This Week in Enterprise Tech 520: Catchpoint and Release

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Nov 19, 2022 69:15


Apple to use US-made chips in 2024, vulnerabilities in space, network observability with Catchpoint, and more. Zero-trust initiatives stall, as cyberattack costs rocket to $1M per incident Tim Cook says Apple will use chips made in America from 2024 Spacecraft vulnerable to failure, thanks to aerospace networking bug Amazon to cut around 10,000 corporate and tech jobs, making largest layoffs in its history ISP deploys fiber service with a wrinkle - the users themselves own each network Catchpoint CMO Gerardo Dada talks about network monitoring and observability Hosts: Curtis Franklin and Brian Chee Guest: Gerardo Dada Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT Code Comments nureva.com/twit

This Week in Enterprise Tech (Video HD)
TWiET 520: Catchpoint and Release - Apple to use US-made chips, Amazon layoffs, observability with Catchpoint

This Week in Enterprise Tech (Video HD)

Play Episode Listen Later Nov 19, 2022 69:15


Apple to use US-made chips in 2024, vulnerabilities in space, network observability with Catchpoint, and more. Zero-trust initiatives stall, as cyberattack costs rocket to $1M per incident Tim Cook says Apple will use chips made in America from 2024 Spacecraft vulnerable to failure, thanks to aerospace networking bug Amazon to cut around 10,000 corporate and tech jobs, making largest layoffs in its history ISP deploys fiber service with a wrinkle - the users themselves own each network Catchpoint CMO Gerardo Dada talks about network monitoring and observability Hosts: Curt Franklin and Brian Chee Guest: Gerardo Dada Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT Code Comments nureva.com/twit

This Week in Enterprise Tech (MP3)
TWiET 520: Catchpoint and Release - Apple to use US-made chips, Amazon layoffs, observability with Catchpoint

This Week in Enterprise Tech (MP3)

Play Episode Listen Later Nov 19, 2022 68:56


Apple to use US-made chips in 2024, vulnerabilities in space, network observability with Catchpoint, and more. Zero-trust initiatives stall, as cyberattack costs rocket to $1M per incident Tim Cook says Apple will use chips made in America from 2024 Spacecraft vulnerable to failure, thanks to aerospace networking bug Amazon to cut around 10,000 corporate and tech jobs, making largest layoffs in its history ISP deploys fiber service with a wrinkle - the users themselves own each network Catchpoint CMO Gerardo Dada talks about network monitoring and observability Hosts: Curt Franklin and Brian Chee Guest: Gerardo Dada Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT Code Comments nureva.com/twit

ITSPmagazine | Technology. Cybersecurity. Society
CyberSecurity Flips The Bird And Moves To InfoSec.Exchange | How The Mastodon Social Platform Can Play A Key Role In Exchanging Ideas, Challenges, And Solutions | A Conversation With Jerry Bell | Redefining CyberSecurity Podcast With Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 18, 2022 43:26


GuestsJerry BellVP and CISO, IBM Public Cloud [@IBM | @IBMcloud] and founder & co-host of the Defensive Security Podcast [@defensivesec]On Mastodon | https://infosec.exchange/@jerry/109302267835657653On Linkedin | https://www.linkedin.com/in/maliciouslink/On Twitter | https://twitter.com/MaliciouslinkMarco CiappelliCo-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelliOn Mastodon | https://infosec.exchange/@MarcociappelliHostSean MartinCo-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinOn Mastodon | https://infosec.exchange/@seanmartin____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Pentera | https://itspm.ag/pentera-tyuw___________________________Episode NotesAs turmoil ensues on the bird social platform and we witness the information security community making a mad dash to the InfoSec.Exchange instance operating on Mastodon. In this episode, we bring the creator of InfoSec.Exchange, Jerry Bell, to learn more about the Mastodon platform, the vision for InfoSec.Exchange, and what the cybersecurity community can do to ensure this platform continues to reach its potential.____________________________ResourcesInfosec.Exchange on Mastodon: https://infosec.exchange/homeVolunteer for InfoSec Exchange: https://infosec.exchange/@jerry/109302267835657653Donate to InfoSec Exchange: https://liberapay.com/Infosec.exchange/Jerry's Blog: https://infosec.engineering/Defensive Security Podcast: https://defensivesecurity.org____________________________To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurity-podcastAre you interested in sponsoring an ITSPmagazine Channel?

Freedom From Addiction
Cyberwarfare

Freedom From Addiction

Play Episode Listen Later Nov 16, 2022 5:51


  Estimates suggest China has stolen between $200 billion and $600 billion in trade secrets and intellectual property every year for the last two decades. The end game of all this cyber espionage is to rule the world The globalist cabal that seeks to “reset” the world intends to replicate the Chinese surveillance and control system worldwide, but whether they'll actually allow the Chinese to rule their New World Order is up for debate Cyberattacks and hacking have become a primary business, but cyberwarfare is also being used on the national level to destroy dissenters of the NWO. Right now, they're primarily censoring inconvenient truths about all things relating to COVID, but in the future, they will silence discussion on any topic that threatens undemocratic rule by globalists When hackers destroyed my website and email servers, they clearly had no intention of making money off of it. They wanted to destroy our infrastructure in order to silence us One of the most aggressive promoters of illegal cyberwarfare against U.S. citizens is Bill Gates-funded pediatrician Dr. Peter Hotez. Twice, the science journal Nature has published articles by Hotez in which he calls for the use of cyberwarfare assaults on American citizens who disagree with official COVID narratives This is the opinion of Dr. Joseph Mercola. To dive deeper, go to:  mercola.com.  

Federal Newscast
Pentagon continues to face challenges responding to cyber attacks on military networks

Federal Newscast

Play Episode Listen Later Nov 15, 2022 7:42 Transcription Available


(11/15/22) - In today's Federal Newscast: The Pentagon continues to face challenges in responding to cyber-attacks on military networks. Agencies may get some help with training for human resources specialists. And the Defense Department still can't meet its goals for keeping its planes "mission ready."

The Tech Blog Writer Podcast
2174: Venafi - The Rise of Nation-State Cyber Attacks

The Tech Blog Writer Podcast

Play Episode Listen Later Nov 14, 2022 23:17


Venafi®, the inventor and leading provider of machine identity management, recently announced new research findings that evaluate the security impact of the increasing number of nation-state attacks and recent shifts in geopolitics. The survey of over 1,100 security decision-makers (SDMs) globally found that 66% of organizations have changed their cybersecurity strategy as a direct response to the conflict between Russia and Ukraine, while nearly two-thirds (64%) suspect their organization has been either directly targeted or impacted by a nation-state cyberattack. I invited Kevin Bocek to join me on the podcast to discuss how cybersecurity has become intertwined with geopolitics, with state-backed hackers using cybercrime to advance their nation's wider political, economic, and military goals. I learn how everyone is a target, and unlike a kinetic warfare attack, only you can defend your business against nation-state cyberattacks. There is no cyber-Iron Dome or cyber-NORAD. Every CEO and board must recognize that cybersecurity is one of the top three business risks for everyone, regardless of industry." We also discuss the Venafi research into the methods used by nation-state threat actors shows the use of machine identities is growing in state-sponsored cyberattacks. The digital certificates and cryptographic keys that serve as machine identities are the foundation of security for all secure digital transactions. Machine identities are used by everything from physical devices and to software to communicate securely.

TD Ameritrade Network
Growing Concern For Supply Chain Cyber Attacks

TD Ameritrade Network

Play Episode Listen Later Nov 14, 2022 5:42


How can online shoppers and companies protect themselves? "Supply chains are being targeted by cyber criminals as the holiday season kicks in. Attacks could disrupt the entire shopping season for consumers. It is important to create safe online shopping habits to prevent attacks. Hackers can do a lot of damage with personal identity and payment information," says LastPass CEO Karim Toubba.

Cyber Security Today
Cyber Security Today, Nov. 14, 2022 - Lessons from cyber attacks against Ukraine, and beware of attempted extortion emails

Cyber Security Today

Play Episode Listen Later Nov 14, 2022 7:00


This episode reports on mistakes that led to hacks in Ukraine, a wave of threatening emails, work-from-home websites shut and more

This Week in Enterprise Tech (MP3)
TWiET 519: Do No Evil, CISO No Evil - Apple invests in satellite infra, cloud services security, CISO explained

This Week in Enterprise Tech (MP3)

Play Episode Listen Later Nov 12, 2022 70:02


Apple invests in satellite infrastructure, securing cloud services, CISO role deep-dive, and more. Amazon debuts Sparrow, a new bin-picking robot arm Aiphone bug allows cyberattackers to literally open (physical) doors FLIR redesigned its thermal camera to work with any mobile device World's top chipmaker eyes Arizona for new $12 billion semiconductor plant Apple to spend $450M in satellite services for iPhone 14's Emergency SOS Amazon and Microsoft cloud leaks highlight lingering misconfiguration issues Fastly CISO Mike Johnson on the role of CISO (Chief Information Security Officer) and how it has evolved Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Mike Johnson Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: Melissa.com/twit itpro.tv/enterprise nordlayer.com/twit

This Week in Enterprise Tech (Video HD)
TWiET 519: Do No Evil, CISO No Evil - Apple invests in satellite infra, cloud services security, CISO explained

This Week in Enterprise Tech (Video HD)

Play Episode Listen Later Nov 12, 2022 75:37


Apple invests in satellite infrastructure, securing cloud services, CISO role deep-dive, and more. Amazon debuts Sparrow, a new bin-picking robot arm Aiphone bug allows cyberattackers to literally open (physical) doors FLIR redesigned its thermal camera to work with any mobile device World's top chipmaker eyes Arizona for new $12 billion semiconductor plant Apple to spend $450M in satellite services for iPhone 14's Emergency SOS Amazon and Microsoft cloud leaks highlight lingering misconfiguration issues Fastly CISO Mike Johnson on the role of CISO (Chief Information Security Officer) and how it has evolved Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Mike Johnson Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: Melissa.com/twit itpro.tv/enterprise nordlayer.com/twit

All TWiT.tv Shows (MP3)
This Week in Enterprise Tech 519: Do No Evil, CISO No Evil

All TWiT.tv Shows (MP3)

Play Episode Listen Later Nov 12, 2022 75:15


Apple invests in satellite infrastructure, securing cloud services, CISO role deep-dive, and more. Amazon debuts Sparrow, a new bin-picking robot arm Aiphone bug allows cyberattackers to literally open (physical) doors FLIR redesigned its thermal camera to work with any mobile device World's top chipmaker eyes Arizona for new $12 billion semiconductor plant Apple to spend $450M in satellite services for iPhone 14's Emergency SOS Amazon and Microsoft cloud leaks highlight lingering misconfiguration issues Fastly CISO Mike Johnson on the role of CISO (Chief Information Security Officer) and how it has evolved Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Mike Johnson Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: Melissa.com/twit itpro.tv/enterprise nordlayer.com/twit

All TWiT.tv Shows (Video LO)
This Week in Enterprise Tech 519: Do No Evil, CISO No Evil

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Nov 12, 2022 75:37


Apple invests in satellite infrastructure, securing cloud services, CISO role deep-dive, and more. Amazon debuts Sparrow, a new bin-picking robot arm Aiphone bug allows cyberattackers to literally open (physical) doors FLIR redesigned its thermal camera to work with any mobile device World's top chipmaker eyes Arizona for new $12 billion semiconductor plant Apple to spend $450M in satellite services for iPhone 14's Emergency SOS Amazon and Microsoft cloud leaks highlight lingering misconfiguration issues Fastly CISO Mike Johnson on the role of CISO (Chief Information Security Officer) and how it has evolved Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Mike Johnson Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: Melissa.com/twit itpro.tv/enterprise nordlayer.com/twit

Cybercrime Magazine Podcast
Cybercrime Wire For Nov. 10, 2022. North Idaho College Hit By Cyberattack. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Nov 10, 2022 1:26


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is sponsored by Deloitte Cyber. To learn more about our sponsor, visit https://deloitte.com/cyber • For more breaking news, visit https://cybercrimewire.com

ITSPmagazine | Technology. Cybersecurity. Society
Practicing Information Security As A Small And Medium Sized Business | Why CyberSecurity Is Everybody's Business | A Conversation With Scott Schober | Redefining CyberSecurity Podcast With Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 10, 2022 41:26


GuestScott SchoberPresident and CEO of Berkeley Varitronics Systems [@BVSystems]On Linkedin | https://www.linkedin.com/in/snschober/On Twitter | https://twitter.com/ScottBVSOn Facebook | https://www.facebook.com/scott.schober.585HostSean MartinCo-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsAsgardeo | https://itspm.ag/asgardeo-by-wso2-u8vcPentera | https://itspm.ag/pentera-tyuw___________________________Show NotesWhat is a cybersecurity best practice anyway? And which company is it “best” for? In this conversation, Scott Schober and Sean Martin break down common cybersecurity practices and how businesses of all sizes (especially SMBs/SMEs) can dissect what matters most for their business and how the organization as a whole can adopt the most appropriate cybersecurity practices.Scott also shares his personal story of being targeted by cyber activists and cybercriminals, along with the details for how his personal compromise became a vector to the business being threatened. This is a serious conversation that many don't talk about. However, hearing this story sheds some much-needed light on how threats and attacks become reality — targeted or not.____________________________ResourcesBooks | Hacked Again Cybersecurity is Everybody's Business: https://scottschober.com/cybersecurity-is-everybodys-business/____________________________To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurity-podcastAre you interested in sponsoring an ITSPmagazine Channel?

The 217 Today Podcast
217 Today: Cybersecurity expert questions Champaign County’s claims of a cyberattack at voting polls

The 217 Today Podcast

Play Episode Listen Later Nov 9, 2022


In today's deep dive, we’ll hear about claims of a cyberattack on Champaign County election systems, plus election results from the county and across the state. 

Security Now (MP3)
SN 896: Something for Everyone - Dropbox breach, cyber bank heists, Russia goes Linux, OpenSSL flaw update

Security Now (MP3)

Play Episode Listen Later Nov 9, 2022 115:31


Picture of the Week. A minor Dropbox breach. OpenSSL follow-up. FTC sued and settled with a repeated offender. $1.2 billion in reported ransomware payments during 2021. Akamai's Q3 Threat Report. Initial Access Brokerages. How do today's bank heists work? De-Fi De-struction De-jour. Russia moves to Linux. We're The Red Cross. Don't attack us, please! Where there's a will, there's a way. From China with Love. The UK's NCSC scan plan. Miscellany. Closing The Loop. SpinRite. We invite you to read our show notes at https://www.grc.com/sn/SN-896-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT drata.com/twit

Security Now (Video HD)
SN 896: Something for Everyone - Dropbox breach, cyber bank heists, Russia goes Linux, OpenSSL flaw update

Security Now (Video HD)

Play Episode Listen Later Nov 9, 2022 115:31


Picture of the Week. A minor Dropbox breach. OpenSSL follow-up. FTC sued and settled with a repeated offender. $1.2 billion in reported ransomware payments during 2021. Akamai's Q3 Threat Report. Initial Access Brokerages. How do today's bank heists work? De-Fi De-struction De-jour. Russia moves to Linux. We're The Red Cross. Don't attack us, please! Where there's a will, there's a way. From China with Love. The UK's NCSC scan plan. Miscellany. Closing The Loop. SpinRite. We invite you to read our show notes at https://www.grc.com/sn/SN-896-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT drata.com/twit

All TWiT.tv Shows (MP3)
Security Now 896: Something for Everyone

All TWiT.tv Shows (MP3)

Play Episode Listen Later Nov 9, 2022 115:31


Picture of the Week. A minor Dropbox breach. OpenSSL follow-up. FTC sued and settled with a repeated offender. $1.2 billion in reported ransomware payments during 2021. Akamai's Q3 Threat Report. Initial Access Brokerages. How do today's bank heists work? De-Fi De-struction De-jour. Russia moves to Linux. We're The Red Cross. Don't attack us, please! Where there's a will, there's a way. From China with Love. The UK's NCSC scan plan. Miscellany. Closing The Loop. SpinRite. We invite you to read our show notes at https://www.grc.com/sn/SN-896-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT drata.com/twit

Security Now (Video LO)
SN 896: Something for Everyone - Dropbox breach, cyber bank heists, Russia goes Linux, OpenSSL flaw update

Security Now (Video LO)

Play Episode Listen Later Nov 9, 2022 115:31


Picture of the Week. A minor Dropbox breach. OpenSSL follow-up. FTC sued and settled with a repeated offender. $1.2 billion in reported ransomware payments during 2021. Akamai's Q3 Threat Report. Initial Access Brokerages. How do today's bank heists work? De-Fi De-struction De-jour. Russia moves to Linux. We're The Red Cross. Don't attack us, please! Where there's a will, there's a way. From China with Love. The UK's NCSC scan plan. Miscellany. Closing The Loop. SpinRite. We invite you to read our show notes at https://www.grc.com/sn/SN-896-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT drata.com/twit

Radio Leo (Audio)
Security Now 896: Something for Everyone

Radio Leo (Audio)

Play Episode Listen Later Nov 9, 2022 115:31


Picture of the Week. A minor Dropbox breach. OpenSSL follow-up. FTC sued and settled with a repeated offender. $1.2 billion in reported ransomware payments during 2021. Akamai's Q3 Threat Report. Initial Access Brokerages. How do today's bank heists work? De-Fi De-struction De-jour. Russia moves to Linux. We're The Red Cross. Don't attack us, please! Where there's a will, there's a way. From China with Love. The UK's NCSC scan plan. Miscellany. Closing The Loop. SpinRite. We invite you to read our show notes at https://www.grc.com/sn/SN-896-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT drata.com/twit