Podcasts about ransomware attacks

  • 368PODCASTS
  • 644EPISODES
  • 31mAVG DURATION
  • 1WEEKLY EPISODE
  • Sep 17, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about ransomware attacks

Latest podcast episodes about ransomware attacks

Security Now (MP3)
SN 1043: Memory Integrity Enforcement - Crypto ATM Scam Epidemic

Security Now (MP3)

Play Episode Listen Later Sep 17, 2025 171:36 Transcription Available


Apple just rewrote the rules of device security with a chip-level upgrade that could wipe out most iPhone vulnerabilities overnight. Find out how "memory integrity enforcement" aims to make exploits a thing of the past—and why it took half a decade to pull off. Are Bitcoin ATMs anything more than scamming terminals. Ransomware hits the Uvalde school district and Jaguar. Did "Scattered LapSus Hunters" just throw in the towel. Germany, for one, to vote "no" on Chat Control. Russia's new MAX messenger has startup troubles. Samsung follows Apple's WhatsApp patch chain. Shocker: UK school hacks are mostly by students. HackerOne was hacked. Connected washing machines in Amsterdam hacked. DDoS breaks another record. Bluesky to implement conditional age verification. Enforcement actions for Global Privacy Control. Might Apple have finally beaten vulnerabilities Show Notes - https://www.grc.com/sn/SN-1043-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: joindeleteme.com/twit promo code TWIT vanta.com/SECURITYNOW threatlocker.com for Security Now bitwarden.com/twit Melissa.com/twit

All TWiT.tv Shows (MP3)
Security Now 1043: Memory Integrity Enforcement

All TWiT.tv Shows (MP3)

Play Episode Listen Later Sep 17, 2025 171:51


Apple just rewrote the rules of device security with a chip-level upgrade that could wipe out most iPhone vulnerabilities overnight. Find out how "memory integrity enforcement" aims to make exploits a thing of the past—and why it took half a decade to pull off. Are Bitcoin ATMs anything more than scamming terminals. Ransomware hits the Uvalde school district and Jaguar. Did "Scattered LapSus Hunters" just throw in the towel. Germany, for one, to vote "no" on Chat Control. Russia's new MAX messenger has startup troubles. Samsung follows Apple's WhatsApp patch chain. Shocker: UK school hacks are mostly by students. HackerOne was hacked. Connected washing machines in Amsterdam hacked. DDoS breaks another record. Bluesky to implement conditional age verification. Enforcement actions for Global Privacy Control. Might Apple have finally beaten vulnerabilities Show Notes - https://www.grc.com/sn/SN-1043-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: joindeleteme.com/twit promo code TWIT vanta.com/SECURITYNOW threatlocker.com for Security Now bitwarden.com/twit Melissa.com/twit

Security Now (Video HD)
SN 1043: Memory Integrity Enforcement - Crypto ATM Scam Epidemic

Security Now (Video HD)

Play Episode Listen Later Sep 17, 2025 171:21 Transcription Available


Apple just rewrote the rules of device security with a chip-level upgrade that could wipe out most iPhone vulnerabilities overnight. Find out how "memory integrity enforcement" aims to make exploits a thing of the past—and why it took half a decade to pull off. Are Bitcoin ATMs anything more than scamming terminals. Ransomware hits the Uvalde school district and Jaguar. Did "Scattered LapSus Hunters" just throw in the towel. Germany, for one, to vote "no" on Chat Control. Russia's new MAX messenger has startup troubles. Samsung follows Apple's WhatsApp patch chain. Shocker: UK school hacks are mostly by students. HackerOne was hacked. Connected washing machines in Amsterdam hacked. DDoS breaks another record. Bluesky to implement conditional age verification. Enforcement actions for Global Privacy Control. Might Apple have finally beaten vulnerabilities Show Notes - https://www.grc.com/sn/SN-1043-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: joindeleteme.com/twit promo code TWIT vanta.com/SECURITYNOW threatlocker.com for Security Now bitwarden.com/twit Melissa.com/twit

Security Now (Video HI)
SN 1043: Memory Integrity Enforcement - Crypto ATM Scam Epidemic

Security Now (Video HI)

Play Episode Listen Later Sep 17, 2025 171:21 Transcription Available


Apple just rewrote the rules of device security with a chip-level upgrade that could wipe out most iPhone vulnerabilities overnight. Find out how "memory integrity enforcement" aims to make exploits a thing of the past—and why it took half a decade to pull off. Are Bitcoin ATMs anything more than scamming terminals. Ransomware hits the Uvalde school district and Jaguar. Did "Scattered LapSus Hunters" just throw in the towel. Germany, for one, to vote "no" on Chat Control. Russia's new MAX messenger has startup troubles. Samsung follows Apple's WhatsApp patch chain. Shocker: UK school hacks are mostly by students. HackerOne was hacked. Connected washing machines in Amsterdam hacked. DDoS breaks another record. Bluesky to implement conditional age verification. Enforcement actions for Global Privacy Control. Might Apple have finally beaten vulnerabilities Show Notes - https://www.grc.com/sn/SN-1043-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: joindeleteme.com/twit promo code TWIT vanta.com/SECURITYNOW threatlocker.com for Security Now bitwarden.com/twit Melissa.com/twit

Radio Leo (Audio)
Security Now 1043: Memory Integrity Enforcement

Radio Leo (Audio)

Play Episode Listen Later Sep 17, 2025 171:36


Apple just rewrote the rules of device security with a chip-level upgrade that could wipe out most iPhone vulnerabilities overnight. Find out how "memory integrity enforcement" aims to make exploits a thing of the past—and why it took half a decade to pull off. Are Bitcoin ATMs anything more than scamming terminals. Ransomware hits the Uvalde school district and Jaguar. Did "Scattered LapSus Hunters" just throw in the towel. Germany, for one, to vote "no" on Chat Control. Russia's new MAX messenger has startup troubles. Samsung follows Apple's WhatsApp patch chain. Shocker: UK school hacks are mostly by students. HackerOne was hacked. Connected washing machines in Amsterdam hacked. DDoS breaks another record. Bluesky to implement conditional age verification. Enforcement actions for Global Privacy Control. Might Apple have finally beaten vulnerabilities Show Notes - https://www.grc.com/sn/SN-1043-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: joindeleteme.com/twit promo code TWIT vanta.com/SECURITYNOW threatlocker.com for Security Now bitwarden.com/twit Melissa.com/twit

Security Now (Video LO)
SN 1043: Memory Integrity Enforcement - Crypto ATM Scam Epidemic

Security Now (Video LO)

Play Episode Listen Later Sep 17, 2025 171:21 Transcription Available


Apple just rewrote the rules of device security with a chip-level upgrade that could wipe out most iPhone vulnerabilities overnight. Find out how "memory integrity enforcement" aims to make exploits a thing of the past—and why it took half a decade to pull off. Are Bitcoin ATMs anything more than scamming terminals. Ransomware hits the Uvalde school district and Jaguar. Did "Scattered LapSus Hunters" just throw in the towel. Germany, for one, to vote "no" on Chat Control. Russia's new MAX messenger has startup troubles. Samsung follows Apple's WhatsApp patch chain. Shocker: UK school hacks are mostly by students. HackerOne was hacked. Connected washing machines in Amsterdam hacked. DDoS breaks another record. Bluesky to implement conditional age verification. Enforcement actions for Global Privacy Control. Might Apple have finally beaten vulnerabilities Show Notes - https://www.grc.com/sn/SN-1043-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: joindeleteme.com/twit promo code TWIT vanta.com/SECURITYNOW threatlocker.com for Security Now bitwarden.com/twit Melissa.com/twit

AWS for Software Companies Podcast
Ep144: 8 Trillion Observations a Week: How Arctic Wolf Uses AI to Stop Ransomware Attacks

AWS for Software Companies Podcast

Play Episode Listen Later Sep 11, 2025 19:27


Dean Teffer of Arctic Wolf reveals how they process 8 trillion weekly security observations to find "a needle in a stack of needles," and breaks down real-world GenAI lessons learned.Topics Include:Dean Teffer, VP of AI at Arctic Wolf, discusses company's GenAI journeyArctic Wolf: decade-old security operations company serving mid-market customers globallyOperates massive security operation center, now launching AI-powered productsAI agent recently identified Black Basta ransomware attack, enabling rapid containmentDean's 15+ years in cybersecurity: traditional ML focused on detectionGenAI breakthrough allows natural language interaction with security modelsArctic Wolf processes 8 trillion weekly observations, correlating suspicious activitiesChallenge: finding specific threats in "stack of needles," not haystackSuccess measured by making human analysts faster, more consistent, scalableEvolved from treating GenAI like traditional ML to integrated workflowsKey misconception: GenAI isn't magic, needs proper data and reasoningAdvice: start with existing challenges, build flexible systems for adaptationGenAI excels at summarizing information and supporting complex decisionsFuture vision: AI handles routine threats, humans focus on creativityDemocratizing machine learning capabilities to broader range of subject expertsParticipants:Dean Teffer – Vice President of AI, Arctic WolfFurther Links:Arctic Wolf: Website | LinkedIn | AWS MarketplaceSee how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon.com/isv/

Business of Tech
Ransomware Attacks Surge, Google AI Vulnerabilities Exposed, and New Malware Analysis Tool Released

Business of Tech

Play Episode Listen Later Aug 7, 2025 19:33


Two sophisticated ransomware groups, Akira and Lynx, are increasingly targeting managed service providers (MSPs) and small businesses by exploiting stolen credentials and vulnerabilities. Together, they have compromised over 365 organizations, with Akira targeting major firms like Hitachi Vantara and Lynx focusing on critical infrastructure, including a CBS affiliate in Chattanooga, Tennessee. Both groups utilize double extortion tactics, combining file encryption with data theft to pressure victims into paying ransoms. This shift in tactics highlights the evolving threat landscape for MSPs and small businesses.In response to the growing cybersecurity threats, the U.S. Cybersecurity and Infrastructure Security Agency has released Thorium, an open-source platform designed for malware and forensic analysis. Thorium can automate tasks and process over 10 million files per hour, empowering IT professionals without in-house malware analysis capabilities to conduct effective preliminary analyses. This tool aims to enhance cybersecurity operations and better manage risks associated with complex malware threats.Additionally, SonicWall has issued a warning to its customers to disable SSL Virtual Private Network (VPN) services due to active ransomware attacks targeting its systems. Meanwhile, Google's AI-powered bug hunter, Big Sleep, has identified 20 security vulnerabilities in popular open-source software, raising concerns about the reliability of AI-generated bug reports. A newly discovered prompt injection vulnerability in Google's Gemini AI chatbot poses serious security risks, enabling attackers to craft convincing phishing campaigns without relying on links or attachments.The podcast also discusses the alarming rise in cybersecurity incidents, particularly social engineering attacks, which have tripled in the first half of 2025. A report from Level Blue indicates that social engineering now accounts for 39% of initial access incidents, with fake CAPTCHA schemes rising dramatically. Furthermore, the report highlights the risks associated with unauthorized AI tool usage, revealing that 97% of organizations lack adequate access controls, exposing sensitive data to potential threats. This underscores the need for organizations to strengthen their defenses and educate users on emerging threats. Four things to know today00:00 Attackers Up Their Game: Ransomware Hits MSPs, SonicWall Vulnerable, and Google's AI Found Exploitable05:53 Social Engineering Surges as Shadow AI Breaches Drive Up Cyber Costs and Risk Exposure08:35 Neglected Tech, Rising Risk: Email and Printers Still Expose Businesses to Modern Threats11:04 From Ransomware to Retirements: Vendor Shifts Reveal Risks and Realignment in the IT Channel This is the Business of Tech.     Supported by:  https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship https://getflexpoint.com/msp-radio/ Tell us about a newsletter! https://bit.ly/biztechnewsletter  All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

Communism Exposed:East and West
The Secret Payments That Keep Global Ransomware Attacks Going

Communism Exposed:East and West

Play Episode Listen Later Aug 4, 2025 9:51


Voice-Over-Text: Pandemic Quotables
The Secret Payments That Keep Global Ransomware Attacks Going

Voice-Over-Text: Pandemic Quotables

Play Episode Listen Later Aug 4, 2025 9:51


Pandemic Quotables
The Secret Payments That Keep Global Ransomware Attacks Going

Pandemic Quotables

Play Episode Listen Later Aug 4, 2025 9:51


Communism Exposed:East & West(PDF)
The Secret Payments That Keep Global Ransomware Attacks Going

Communism Exposed:East & West(PDF)

Play Episode Listen Later Aug 4, 2025 9:51


3 Pie Squared - ABA Business Leaders
ABA News - Ransomware attacks, HIPAA Compliance & More!

3 Pie Squared - ABA Business Leaders

Play Episode Listen Later Jun 10, 2025 31:52


Welcome to the ABA Business Leaders News, the go-to show for aspiring and current ABA practice owners who want to keep up to date with the latest happenings in the world of ABA. Every week, your hosts April and Stephen Smith bring you actionable insights, news, and real-world advice to help you navigate the challenges and celebrate the wins of starting and running your own ABA practice.

Cyber Security Today
Cybersecurity Today: Hijacker Scams, Ransomware Attacks, and Summer Travel Threats

Cyber Security Today

Play Episode Listen Later May 30, 2025 13:33 Transcription Available


  In this episode of Cybersecurity Today, host Jim Love covers critical updates in the world of cyber threats. The FBI warns of hijackers posing as IT support to infiltrate law firms, a Wisconsin city reveals a ransomware attack affecting 67,000 residents, and a Texas city refuses to pay a ransom, risking the public release of sensitive data. The episode also highlights the 3-2-1-1-0 backup strategy as a defense against ransomware and reports on sophisticated scams targeting summer travelers. Additionally, Jim previews tomorrow's discussion on scammers targeting vulnerable groups. 00:00 Introduction and Headlines 00:29 FBI Warns of IT Support Scams Targeting Law Firms 03:18 Ransomware Attack on Sheboygan, Wisconsin 05:24 Texas City Refuses Ransom Payment 07:05 Understanding the 3-2-1-1-0 Backup Strategy 09:37 Summer Travel Scams on the Rise 12:55 Conclusion and Upcoming Topics

The InfoQ Podcast
Kubernetes Edge Resiliency: Recovering from Ransomware Attacks in Minutes

The InfoQ Podcast

Play Episode Listen Later May 26, 2025 27:11


Julia Furst Morgado, global technologist at Veeam, discusses Kubernetes edge resilience after a ransomware attack. The mentioned challenges include resource limits, network issues, and security risks. A swift recovery underscored the need for specific backup approaches, write-protected storage, and automated, tested recovery for edge environments to limit disruptions. Read a transcript of this interview: https://bit.ly/42LnBv4 Subscribe to the Software Architects' Newsletter for your monthly guide to the essential news and experience from industry peers on emerging patterns and technologies: https://www.infoq.com/software-architects-newsletter Upcoming Events: InfoQ Dev Summit Boston (June 9-10, 2025) Actionable insights on today's critical dev priorities. devsummit.infoq.com/conference/boston2025 InfoQ Dev Summit Munich (October 15-16, 2025) Essential insights on critical software development priorities. https://devsummit.infoq.com/conference/munich2025 QCon San Francisco 2025 (November 17-21, 2025) Get practical inspiration and best practices on emerging software trends directly from senior software developers at early adopter companies. https://qconsf.com/ QCon AI New York 2025 (December 16-17, 2025) https://ai.qconferences.com/ The InfoQ Podcasts: Weekly inspiration to drive innovation and build great teams from senior software leaders. Listen to all our podcasts and read interview transcripts: - The InfoQ Podcast https://www.infoq.com/podcasts/ - Engineering Culture Podcast by InfoQ https://www.infoq.com/podcasts/#engineering_culture - Generally AI: https://www.infoq.com/generally-ai-podcast/ Follow InfoQ: - Mastodon: https://techhub.social/@infoq - Twitter: twitter.com/InfoQ - LinkedIn: www.linkedin.com/company/infoq - Facebook: bit.ly/2jmlyG8 - Instagram: @infoqdotcom - Youtube: www.youtube.com/infoq Write for InfoQ: Learn and share the changes and innovations in professional software development. - Join a community of experts. - Increase your visibility. - Grow your career. https://www.infoq.com/write-for-infoq

AHLA's Speaking of Health Law
Preparing for and Responding to Ransomware Attacks in the Health Care Sector

AHLA's Speaking of Health Law

Play Episode Listen Later May 20, 2025 33:14 Transcription Available


As ransomware attacks grow more sophisticated, health care organizations face not just massive data privacy risks, but real-time threats to operations, patient safety, and regulatory compliance. Dave Bailey, Vice President of Security Services, Clearwater, speaks with Kirk Nahra, Partner, Wilmer Hale, and Paul Schmeltzer, Member, Clark Hill, about how ransomware impacts everything from hospital workflows to enforcement actions, and what health care organizations can do to prepare and respond to the threat. Kirk and Paul spoke about this topic at AHLA's 2025 Advising Providers: Legal Strategies for AMCs, Physicians, and Hospitals conference in Austin, TX. Sponsored by Clearwater. AHLA's Health Law Daily Podcast Is Here! AHLA's popular Health Law Daily email newsletter is now a daily podcast, exclusively for AHLA Premium members. Get all your health law news from the major media outlets on this new podcast! To subscribe and add this private podcast feed to your podcast app, go to americanhealthlaw.org/dailypodcast.

Cyber Security Today
Cybersecurity Updates: Major Ransomware Attacks Thwarted and Illegal Marketplaces Shut Down

Cyber Security Today

Play Episode Listen Later May 16, 2025 8:13 Transcription Available


In this episode, Jim Love discusses significant cybersecurity events including Coinbase's refusal to pay a $20 million ransom after a data breach, Broadcom's patch for VMware tools vulnerabilities, and Telegram's shutdown of two illegal marketplaces handling $35 billion in transactions. The episode also covers the Co-op's preemptive measures to thwart a ransomware attack and the broader implications for cybersecurity in retail. Experts urge organizations to be prepared with strategic playbooks for potential cyber-attacks. 00:00 Introduction and Headlines 00:26 Telegram's $35 Billion Black Market Shutdown 01:59 Broadcom Patches VMware Tools Vulnerability 03:20 Coinbase Ransom Refusal and Data Breach 04:57 Co-op's Ransomware Defense Strategy 07:36 Conclusion and Upcoming Episodes

The Agribusiness Update
Ransomware Attacks on Ag and Over 15,000 USDA Employees Leave

The Agribusiness Update

Play Episode Listen Later May 13, 2025


There were 84 ransomware attacks against the food and agriculture industry in the first three months of 2025, and over 15,000 USDA employees have taken one of the Trump administration's two financial incentive offers to leave the agency.

Business of Tech
Ransomware Attacks Rise 37% in 2025; Microsoft's New Passwordless Strategy and Security Insights

Business of Tech

Play Episode Listen Later May 9, 2025 17:28


Ransomware attacks have surged dramatically, particularly affecting small and mid-sized businesses (SMBs), which now experience ransomware in 88% of breaches. According to Verizon's 2025 data breach investigations report, ransomware was detected in 44% of over 12,000 data breaches, marking a 37% increase from the previous year. While the number of organizations paying ransoms has decreased, the FBI's report indicates that complaints related to ransom have risen by 9%, making it the top threat to critical infrastructure. The overall online crime losses surged by 33% in 2024, totaling $16 billion, with investment fraud linked to cryptocurrency accounting for the most significant financial losses.A recent report from KeepAware highlights the security risks associated with employee use of web browsers in the workplace, revealing that over 70% of modern malware attacks originate from these unmonitored endpoints. Traditional security tools are ineffective at detecting threats within browsers, leading to increased vulnerabilities. Key findings show that 70% of phishing campaigns impersonate trusted platforms, and a significant portion of file uploads from company devices are directed to personal accounts without detection. This raises concerns about the basic security hygiene that many SMBs still lack, such as multi-factor authentication and unpatched systems.Microsoft has announced a shift towards passwordless accounts by default, emphasizing the need for improved security practices. This change comes in light of significant security breaches, including one involving Defense Secretary Pete Hedgeseth, whose reuse of passwords across multiple accounts raised concerns about national security. Microsoft has dedicated substantial resources to strengthen its systems post-breach, migrating cryptographic keys and eliminating outdated systems. However, the underlying issue of human negligence remains a critical challenge, as advanced technology cannot compensate for poor decision-making and lack of user training.Enable reported its first quarter 2025 results, showcasing a revenue of $118.2 million, reflecting a 3.9% year-over-year growth. Despite exceeding revenue guidance, the company experienced a net loss of $7.2 million, raising concerns about market saturation and pricing pressure in the managed services software ecosystem. The discussion highlights the importance of understanding the dynamics of the MSP market, where churn is sticky and expansion is slow. As the podcast concludes, listeners are encouraged to reflect on the implications of geopolitical and trade policies on tech supply chains and the necessity of modernizing security practices to mitigate risks Four things to know today 00:00 Ransomware, Browser Risks, and Record Losses: 2025 Security Reports Point to a Failure of Fundamentals04:11 Password Reuse, Passkey Hype, and Microsoft's Security Reckoning: What the Latest Breaches Reveal About Culture and Complexity07:49 Durable But Not Disruptive: N-able's Q1 Results Reflect Sluggish MSP Software Growth and Operational Pressure11:53 Tariffs, Tech Gaps, and Legal Risks: The Hidden Pressures Facing U.S. SMBs and Security Leaders Supported by:  https://afi.ai/office-365-backup/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

ISACA Podcast
Securing Desktops and Data from Ransomware Attacks

ISACA Podcast

Play Episode Listen Later May 9, 2025 39:32


Ransomware remains one of the most formidable cybersecurity threats facing organizations worldwide. In this episode of the ISACA Podcast, host Chris McGowan speaks with Netwrix endpoint protection expert Jeremy Moskowitz, who explains how ransomware infiltrates and cripples desktop environments. He explains cybercriminals' tactics to exploit social engineering and system misconfigurations to gain unauthorized access, offering actionable insights on the most effective prevention and mitigation strategies. Additionally, Jeremy delivers practical advice that security teams can use to resist ransomware. He shares tips on safeguarding locally stored data, implementing robust backup solutions, enforcing strict access controls and system patching, and educating staff on common red flags associated with ransomware.  Listen & Subscribe to ISACA Podcast  Catch this episode—and more—on the ISACA Podcast Library or on your favorite podcast platform.  Connect & Learn More about Netwrix Netwrix Data Loss Prevention Solution: Learn more Follow Netwrix on LinkedIn: Netwrix Corporation: Posts | LinkedIn Additional Resources Provided by Netwrix: CISA's Ransomware Guidance SANS Institute White Papers on Ransomware NIST SP 800-61 Rev. 2 – Incident Handling Guide Krebs on Security – Ransomware Articles

Cybercrime Magazine Podcast
Cybercrime Magazine Update: Ransomware Attacks. More Than Half Bypass Traditional Detection Tools.

Cybercrime Magazine Podcast

Play Episode Listen Later May 8, 2025 5:29


According to Morphisec, industry research estimates 60 percent of ransomware attacks bypass traditional detection tools, leaving businesses vulnerable. In this episode, host Paul John Spaulding is joined by Steve Morgan, Founder of Cybersecurity Ventures and Editor-in-Chief at Cybercrime Magazine, to discuss. The Cybercrime Magazine Update airs weekly and covers the latest news, interviews, podcasts, reports, videos, and special productions from Cybercrime Magazine, published by Cybersecurity Ventures. For more on cybersecurity, visit us at https://cybersecurityventures.com

Cybercrime Magazine Podcast
Cybercrime News For May. 6, 2025: U.S. Charges Yemeni Hacker Behind Black Kingdom Ransomware Attacks

Cybercrime Magazine Podcast

Play Episode Listen Later May 6, 2025 2:29


The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

HPE Tech Talk
What's going on at the RSA Conference?

HPE Tech Talk

Play Episode Listen Later May 1, 2025 21:37


 What's the current state of the cybersecurity world? This week, Technology Now explores the biggest threats we currently face, the way companies and businesses are securing themselves, and the future of cybersecurity. Our reporter, Jaye Tillson, is at the RSA Conference in San Francisco where he is joined by Jon Green, Chief Technology Officer and Chief Security Officer at HPE Networking, John Spiegel, CTO of Security and HPE Distinguished Technologist, and Gram Ludlow, a Security Product Line Manager at HPE, to tell us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.About our contributorsJaye Tillson: https://www.linkedin.com/in/jaye-tillson/Jon Green: https://www.linkedin.com/in/jongreen4John Spiegel: https://www.linkedin.com/in/john-spiegel-2011543/Gram Ludlow: https://www.linkedin.com/in/gramludlow/Sources:Statista report: https://www.statista.com/statistics/305027/revenue-global-security-technology-and-services-market/RSA Conference: https://www.rsaconference.com/about/Today I Learned: Stretchable batteries Mohsen Mohammadi et al., Make it flow from solid to liquid: Redox-active electrofluids for intrinsically stretchable batteries.Sci. Adv.11,eadr9010(2025).DOI:10.1126/sciadv.adr9010This week in history: https://www.pbs.org/transistor/background1/events/icinv.html https://www.americanscientist.org/article/intel-insider3 

Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise

 What's the current state of the cybersecurity world? This week, Technology Now explores the biggest threats we currently face, the way companies and businesses are securing themselves, and the future of cybersecurity. Our reporter, Jaye Tillson, is at the RSA Conference in San Francisco where he is joined by Jon Green, Chief Technology Officer and Chief Security Officer at HPE Networking, John Spiegel, CTO of Security and HPE Distinguished Technologist, and Gram Ludlow, a Security Product Line Manager at HPE, to tell us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.About our contributorsJaye Tillson: https://www.linkedin.com/in/jaye-tillson/Jon Green: https://www.linkedin.com/in/jongreen4John Spiegel: https://www.linkedin.com/in/john-spiegel-2011543/Gram Ludlow: https://www.linkedin.com/in/gramludlow/Sources:Statista report: https://www.statista.com/statistics/305027/revenue-global-security-technology-and-services-market/RSA Conference: https://www.rsaconference.com/about/Today I Learned: Stretchable batteries Mohsen Mohammadi et al., Make it flow from solid to liquid: Redox-active electrofluids for intrinsically stretchable batteries.Sci. Adv.11,eadr9010(2025).DOI:10.1126/sciadv.adr9010This week in history: https://www.pbs.org/transistor/background1/events/icinv.html https://www.americanscientist.org/article/intel-insider3 

HPE Tech Talk, SMB
What's going on at the RSA Conference?

HPE Tech Talk, SMB

Play Episode Listen Later May 1, 2025 21:37


 What's the current state of the cybersecurity world? This week, Technology Now explores the biggest threats we currently face, the way companies and businesses are securing themselves, and the future of cybersecurity. Our reporter, Jaye Tillson, is at the RSA Conference in San Francisco where he is joined by Jon Green, Chief Technology Officer and Chief Security Officer at HPE Networking, John Spiegel, CTO of Security and HPE Distinguished Technologist, and Gram Ludlow, a Security Product Line Manager at HPE, to tell us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.About our contributorsJaye Tillson: https://www.linkedin.com/in/jaye-tillson/Jon Green: https://www.linkedin.com/in/jongreen4John Spiegel: https://www.linkedin.com/in/john-spiegel-2011543/Gram Ludlow: https://www.linkedin.com/in/gramludlow/Sources:Statista report: https://www.statista.com/statistics/305027/revenue-global-security-technology-and-services-market/RSA Conference: https://www.rsaconference.com/about/Today I Learned: Stretchable batteries Mohsen Mohammadi et al., Make it flow from solid to liquid: Redox-active electrofluids for intrinsically stretchable batteries.Sci. Adv.11,eadr9010(2025).DOI:10.1126/sciadv.adr9010This week in history: https://www.pbs.org/transistor/background1/events/icinv.html https://www.americanscientist.org/article/intel-insider3 

Cyber Security Today
Cybersecurity Month-End Review: Oracle Breach, Signal Group Chat Incident, and Global Cybersecurity Regulations

Cyber Security Today

Play Episode Listen Later Apr 5, 2025 48:19 Transcription Available


In this episode of the cybersecurity month-end review, host Jim Love is joined by Daina Proctor from IBM in Ottawa, Randy Rose from The Center for Internet Security from Saratoga Springs, and David Shipley, CEO of Beauceron Security from Fredericton. The panel discusses major cybersecurity stories from the past month, including the Oracle Cloud breach and its communication failures, the misuse of Signal by U.S. government officials, and global cybersecurity regulation efforts such as the UK's new critical infrastructure laws. They also cover notable incidents like the Kuala Lumpur International Airport ransomware attack and the NHS Scotland cyberattack, the continuous challenges of EDR bypasses, and the importance of fusing anti-fraud and cybersecurity efforts. The discussion emphasizes the need for effective communication and stringent security protocols amidst increasing cyber threats. 00:00 Introduction and Panelist Introductions 01:25 Oracle Cloud Breach: A Case Study in Incident Communication 10:13 Signal Group Chat Controversy 20:16 Leadership and Cybersecurity Legislation 23:30 Cybersecurity Certification Program Overview 24:27 Challenges in Cybersecurity Leadership 24:59 Importance of Data Centers and MSPs 26:53 UK Cybersecurity Bill and MSP Standards 28:09 Cyber Essentials and CMMC Standards 32:47 EDR Bypasses and Small Business Security 39:32 Ransomware Attacks on Critical Infrastructure 43:34 Law Enforcement and Cybercrime 47:24 Conclusion and Final Thoughts

HPE Tech Talk
What's the state of the cyber security field in 2025?

HPE Tech Talk

Play Episode Listen Later Mar 20, 2025 21:21


In this episode we are looking once again at our digital security, particularly around the state of the industry in 2025, and the way threats and consumer behaviours are evolving.We'll be looking at the adoption of new kinds of security, how VPNs are still an evolving part of the security equation, and how Security Service Edge (SSE) is beginning to be taken more seriously. Joining us to discuss is Jaye Tillson, Field CTO and Distinguished Technologist at HPE.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. About this week's guest, Jaye Tillson: https://jayetillson.tech/ Sources cited in this week's episode:WEF 2025 cyber security report: https://www.weforum.org/publications/global-cybersecurity-outlook-2025/ Nuclear batteries: https://www.sciencedirect.com/science/article/pii/S2590147825000038?via%3DihubStatistics on nuclear energy: https://www.iea.org/energy-system/electricity/nuclear-power

Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise
What's the state of the cyber security field in 2025?

Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise

Play Episode Listen Later Mar 20, 2025 21:21


In this episode we are looking once again at our digital security, particularly around the state of the industry in 2025, and the way threats and consumer behaviours are evolving.We'll be looking at the adoption of new kinds of security, how VPNs are still an evolving part of the security equation, and how Security Service Edge (SSE) is beginning to be taken more seriously. Joining us to discuss is Jaye Tillson, Field CTO and Distinguished Technologist at HPE.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. About this week's guest, Jaye Tillson: https://jayetillson.tech/ Sources cited in this week's episode:WEF 2025 cyber security report: https://www.weforum.org/publications/global-cybersecurity-outlook-2025/ Nuclear batteries: https://www.sciencedirect.com/science/article/pii/S2590147825000038?via%3DihubStatistics on nuclear energy: https://www.iea.org/energy-system/electricity/nuclear-power

HPE Tech Talk, SMB
What's the state of the cyber security field in 2025?

HPE Tech Talk, SMB

Play Episode Listen Later Mar 20, 2025 21:21


In this episode we are looking once again at our digital security, particularly around the state of the industry in 2025, and the way threats and consumer behaviours are evolving.We'll be looking at the adoption of new kinds of security, how VPNs are still an evolving part of the security equation, and how Security Service Edge (SSE) is beginning to be taken more seriously. Joining us to discuss is Jaye Tillson, Field CTO and Distinguished Technologist at HPE.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. About this week's guest, Jaye Tillson: https://jayetillson.tech/ Sources cited in this week's episode:WEF 2025 cyber security report: https://www.weforum.org/publications/global-cybersecurity-outlook-2025/ Nuclear batteries: https://www.sciencedirect.com/science/article/pii/S2590147825000038?via%3DihubStatistics on nuclear energy: https://www.iea.org/energy-system/electricity/nuclear-power

HPE Tech Talk
AI and Security - the opportunities and challenges

HPE Tech Talk

Play Episode Listen Later Mar 13, 2025 18:41


In this episode we are taking a fresh look at how AI is affecting the world of cybersecurity. As we've explored on the podcast in previous episodes, artificial intelligence has opened up a whole new world of opportunities for our organizations, but it also brings fresh challenges for cybersecurity professionals.We'll be looking at the current state of play, and asking whether AI as a tool to defend us can match AI as a weapon to attack us, with guest Simon Leech, Director of the Cyber Security Centre of Excellence at HPE.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. About this week's guest, Karim Abou Zahab: https://www.linkedin.com/in/karim-abouzahab/Sources cited in this week's episode:McKinsey report into AI use: https://www.mckinsey.com/capabilities/quantumblack/our-insights/the-state-of-ai Statista report into cybercrime costs:  https://www.statista.com/forecasts/1280009/cost-cybercrime-worldwide  Improvements to swarm robot insects: https://news.mit.edu/2025/fast-agile-robotic-insect-could-someday-aid-mechanical-pollination-0115

Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise
AI and Security - the opportunities and challenges

Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise

Play Episode Listen Later Mar 13, 2025 18:41


In this episode we are taking a fresh look at how AI is affecting the world of cybersecurity. As we've explored on the podcast in previous episodes, artificial intelligence has opened up a whole new world of opportunities for our organizations, but it also brings fresh challenges for cybersecurity professionals.We'll be looking at the current state of play, and asking whether AI as a tool to defend us can match AI as a weapon to attack us, with guest Simon Leech, Director of the Cyber Security Centre of Excellence at HPE.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. About this week's guest, Karim Abou Zahab: https://www.linkedin.com/in/karim-abouzahab/Sources cited in this week's episode:McKinsey report into AI use: https://www.mckinsey.com/capabilities/quantumblack/our-insights/the-state-of-ai Statista report into cybercrime costs:  https://www.statista.com/forecasts/1280009/cost-cybercrime-worldwide  Improvements to swarm robot insects: https://news.mit.edu/2025/fast-agile-robotic-insect-could-someday-aid-mechanical-pollination-0115

HPE Tech Talk, SMB
AI and Security - the opportunities and challenges

HPE Tech Talk, SMB

Play Episode Listen Later Mar 13, 2025 18:41


In this episode we are taking a fresh look at how AI is affecting the world of cybersecurity. As we've explored on the podcast in previous episodes, artificial intelligence has opened up a whole new world of opportunities for our organizations, but it also brings fresh challenges for cybersecurity professionals.We'll be looking at the current state of play, and asking whether AI as a tool to defend us can match AI as a weapon to attack us, with guest Simon Leech, Director of the Cyber Security Centre of Excellence at HPE.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. About this week's guest, Karim Abou Zahab: https://www.linkedin.com/in/karim-abouzahab/Sources cited in this week's episode:McKinsey report into AI use: https://www.mckinsey.com/capabilities/quantumblack/our-insights/the-state-of-ai Statista report into cybercrime costs:  https://www.statista.com/forecasts/1280009/cost-cybercrime-worldwide  Improvements to swarm robot insects: https://news.mit.edu/2025/fast-agile-robotic-insect-could-someday-aid-mechanical-pollination-0115

Paul's Security Weekly
Ransomware Attacks a Decade In: What Changed? What Didn't? - benny Vasquez, Mike Mitchell - ESW #397

Paul's Security Weekly

Play Episode Listen Later Mar 10, 2025 118:32


2025 brings us close to an interesting milestone - ransomware attacks, in their current, enterprise-focused form, are almost a decade old. These attacks are so common today, it's impossible to report on all of them. There are signs of hope, however - ransomware payments are significantly down. There are also signs defenders are getting more resilient, and are recovering more quickly from these attacks. Today, with Intel471's Mike Mitchell, we'll discuss what defenders need to know to protect against today's ransomware attacks. He'll share some stories and anecdotes from his experiences with customers. He'll also share some tips, and tricks for successful hunts, and how to catch attacks before even your tools trigger alerts. Segment Resources: https://intel471.com/blog/how-ransomware-may-trend-in-2025 And now, for something completely different! I've always urged the importance for practitioners to understand the underlying technology that they're challenged with defending. When we're yelling at the Linux admins and DevOps folks to "just patch it", what does that process entail? How do those patches get applied? When and how are they released in the first place? This is often one of the sticking points when security folks get nervous about "going open source", as if 90% of the code in their environments doesn't already come from some open source project. It's a legitimate concern however - without a legal contract, and some comfort level that a paid support team is actually going to fix critical vulnerabilities, how do we develop trust or a relationship with an open source project? In this interview, benny Vasquez, the Chair of the board of directors for AlmaLinux, will fill in some of the gaps for us, and help us understand how an open source project can not only be trusted, but in many cases may be more responsive to security teams' needs than a commercial vendor. Segment Resources: benny's 'highly scientific' survey on cloud vs on-prem usage across AlmaLinux users In the enterprise security news, Why is a consulting firm raising a $75M Series B? A TON of Cybereason drama just dropped Skybox Security shuts down after 23 years The chilling effect on security leaders is HERE, and what that means IT interest in on-prem, does NOT mean they're quitting the cloud Updates on the crazy Bybit heist the state of MacOS malware Skype is shutting down Mice with CRISPR'ed woolly mammoth fur is NOT the real life Jurassic Park anyone was expecting All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-397

Enterprise Security Weekly (Audio)
Ransomware Attacks a Decade In: What Changed? What Didn't? - benny Vasquez, Mike Mitchell - ESW #397

Enterprise Security Weekly (Audio)

Play Episode Listen Later Mar 10, 2025 118:32


2025 brings us close to an interesting milestone - ransomware attacks, in their current, enterprise-focused form, are almost a decade old. These attacks are so common today, it's impossible to report on all of them. There are signs of hope, however - ransomware payments are significantly down. There are also signs defenders are getting more resilient, and are recovering more quickly from these attacks. Today, with Intel471's Mike Mitchell, we'll discuss what defenders need to know to protect against today's ransomware attacks. He'll share some stories and anecdotes from his experiences with customers. He'll also share some tips, and tricks for successful hunts, and how to catch attacks before even your tools trigger alerts. Segment Resources: https://intel471.com/blog/how-ransomware-may-trend-in-2025 And now, for something completely different! I've always urged the importance for practitioners to understand the underlying technology that they're challenged with defending. When we're yelling at the Linux admins and DevOps folks to "just patch it", what does that process entail? How do those patches get applied? When and how are they released in the first place? This is often one of the sticking points when security folks get nervous about "going open source", as if 90% of the code in their environments doesn't already come from some open source project. It's a legitimate concern however - without a legal contract, and some comfort level that a paid support team is actually going to fix critical vulnerabilities, how do we develop trust or a relationship with an open source project? In this interview, benny Vasquez, the Chair of the board of directors for AlmaLinux, will fill in some of the gaps for us, and help us understand how an open source project can not only be trusted, but in many cases may be more responsive to security teams' needs than a commercial vendor. Segment Resources: benny's 'highly scientific' survey on cloud vs on-prem usage across AlmaLinux users In the enterprise security news, Why is a consulting firm raising a $75M Series B? A TON of Cybereason drama just dropped Skybox Security shuts down after 23 years The chilling effect on security leaders is HERE, and what that means IT interest in on-prem, does NOT mean they're quitting the cloud Updates on the crazy Bybit heist the state of MacOS malware Skype is shutting down Mice with CRISPR'ed woolly mammoth fur is NOT the real life Jurassic Park anyone was expecting All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-397

Paul's Security Weekly TV
Ransomware Attacks a Decade In: What Changed? What Didn't? - Mike Mitchell - ESW #397

Paul's Security Weekly TV

Play Episode Listen Later Mar 9, 2025 34:54


2025 brings us close to an interesting milestone - ransomware attacks, in their current, enterprise-focused form, are almost a decade old. These attacks are so common today, it's impossible to report on all of them. There are signs of hope, however - ransomware payments are significantly down. There are also signs defenders are getting more resilient, and are recovering more quickly from these attacks. Today, with Intel471's Mike Mitchell, we'll discuss what defenders need to know to protect against today's ransomware attacks. He'll share some stories and anecdotes from his experiences with customers. He'll also share some tips, and tricks for successful hunts, and how to catch attacks before even your tools trigger alerts. Segment Resources: https://intel471.com/blog/how-ransomware-may-trend-in-2025 Show Notes: https://securityweekly.com/esw-397

Enterprise Security Weekly (Video)
Ransomware Attacks a Decade In: What Changed? What Didn't? - Mike Mitchell - ESW #397

Enterprise Security Weekly (Video)

Play Episode Listen Later Mar 9, 2025 34:54


2025 brings us close to an interesting milestone - ransomware attacks, in their current, enterprise-focused form, are almost a decade old. These attacks are so common today, it's impossible to report on all of them. There are signs of hope, however - ransomware payments are significantly down. There are also signs defenders are getting more resilient, and are recovering more quickly from these attacks. Today, with Intel471's Mike Mitchell, we'll discuss what defenders need to know to protect against today's ransomware attacks. He'll share some stories and anecdotes from his experiences with customers. He'll also share some tips, and tricks for successful hunts, and how to catch attacks before even your tools trigger alerts. Segment Resources: https://intel471.com/blog/how-ransomware-may-trend-in-2025 Show Notes: https://securityweekly.com/esw-397

Placing You First Insurance Podcast by CRC Group
Cyber Insurance Remains Critical as Ransomware Attacks Rise

Placing You First Insurance Podcast by CRC Group

Play Episode Listen Later Feb 6, 2025 30:25 Transcription Available


Learn more about navigating cyber threats and insurance with insights from Hunter Maskell, a Director with the CRC / INSUREtrust Cyber Practice Group and Professional Lines Broker Chris Zepeda. Ransomware attacks are making a sophisticated resurgence, matching the concerning levels of 2020 and 2021. Despite strides in incident response, the financial strain from business interruptions and legal battles lingers. While current market conditions may seem buyer-friendly, the looming specter of increasing claims warns of impending premium adjustments. Listen as we dissect the delicate balance between competitive pricing and sustainable risk management, ensuring you're prepared for the challenges ahead. The landscape of cyber insurance is ever-shifting, and understanding coverage nuances with the help of specialists is crucial. This episode is your guide to staying ahead in an era where cyber risks and solutions constantly evolve. Visit REDYIndex.com for critical pricing analysis and a snapshot of the marketplace. Do you want to take your career to the next level? Join #TeamCRC to get access to best-in-class tools, data, exclusive programs, and more! Send your resume to resumes@crcgroup.com today!

Automation Chat
Our #2 Episode of 2024! Practical Steps for Protecting IT & OT Systems from Ransomware Attacks

Automation Chat

Play Episode Listen Later Dec 3, 2024 40:41


This is a special encore presentation of our #2 most popular episode of 2024 in our “best of” series! In this episode of our “Automation Chat” podcast from The Journal From Rockwell Automation and Our PartnerNetwork magazine, Executive Editor Theresa Houck chats with Dave Kang, Advisory Solutions Architect at Dragos and Kamil Karmali, Senior Global Commercial Manager, Cybersecurity Services at Rockwell Automation. Get nuts-and-bolts, practical information about strengthening cybersecurity for industrial networks and systems, including: How ransomware attacks have evolved over the past year. Steps you can take to prepare for — and recover from — an attack. Common governance models and decision-making structures. 3 key considerations for developing a unified IT and OT strategy. Workforce needs for an effective cybersecurity strategy. How effective cyber hygiene and risk posture helps reduce risk of cyber incidents. Cybersecurity-related compliance requirements in North America and around the world. Why it's vital for manufacturers to have a business continuity plan. And as always, get your family-friendly, silly Joke of the Day. Resources from this episode: Blog: 6 Steps to Reduce Industrial Cybersecurity Risks. Q&A with Executive Editor Theresa Houck: Understanding the OT Threat Landscape Helps Manufacturers Improve Cybersecurity Rockwell Automation Manufacturing Industry Cybersecurity web page. Subscribe to The Journal's 4 print magazines (Feb., May, July and Oct.) by e-mailing Anna Hicks at ahicks@endeavorbusinessmedia.com. Subscribe to our 4 digital magazines at n You can also watch their discussion on YouTube at https://youtu.be/8Pm670QAO9E. Automation Chat is brought to you by The Journal From Rockwell Automation and Our PartnerNetwork magazine. Find us on YouTube. Find us on LinkedIn. Find us on Facebook. Find us on X (Twitter). Please subscribe to “Automation Chat" and give us a 5-star rating and a review.

The SysAdmin DOJO Podcast
What is the State of Ransomware in 2024

The SysAdmin DOJO Podcast

Play Episode Listen Later Nov 20, 2024 36:12


In this eye-opening episode of the Security Swarm Podcast, host Andy Syrewicze and one of our regular guests, Eric Siron, examine the latest ransomware survey findings. They explore the evolving landscape of cyber threats, discussing key trends in ransomware attacks, including a decrease in overall incidents but an increase in the severity of successful breaches.  The conversation provides crucial insights for IT professionals and business leaders, highlighting the importance of user training, cybersecurity awareness, and strategic approaches to mitigating ransomware risks.  Do you want to join the conversation? Join us in our Security Lab LinkedIn Group! Key Takeaways:  Ransomware attacks decreased to 18.6% in 2024, continuing a downward trend. 16.3% of ransomware victims paid the ransom in 2024, a significant increase from 6.9% in 2023. 55.8% of ransomware attacks targeted small organizations with 50 or fewer employees. Over 52.3% of attacks were initiated through email/phishing attempts. 32.6% of ransomware victims were unsure if their data was exfiltrated. 81.3% of organizations provide end-user security awareness training. 54.6% of organizations have purchased ransomware-specific insurance. Threat actors are becoming more sophisticated in targeting and executing attacks. Living off the land attack techniques are increasingly common. Timestamps:  (01:15) History of Ransomware Attacks  (03:37) 2024 Ransomware Attack Statistics  (08:59) Double Extortion Tactics  (15:02) Target Selection and Organization Size  (29:52) Security Awareness Training Insights  (36:15) Ransomware Insurance Trends  (41:44) Disaster Recovery and Insurance Strategies  Episode Resources:  Hornetsecurity Q3 2024 Ransomware Attacks Survey What is ransomware? How can you protect against Ransomware?    --   Protect your organization from ransomware with Hornetsecurity's innovative Security Awareness Service - because your employees are your first line of defense!  Why Security Awareness Training is critical against ransomware:  52.3% of ransomware attacks are caused by email/phishing attempts  81.3% of organizations provide end-user security awareness training  Half of organizations want more time-friendly training methods  An effective security awareness training works best when it's bite-sized, consistent and a part of the organization's security culture. Click here to schedule a free consultation with a Hornetsecurity specialist.

HPE Tech Talk
ZTNA and SSE - what you need to know

HPE Tech Talk

Play Episode Listen Later Oct 31, 2024 20:56


In this episode, we'll be taking a look at two increasingly important cybersecurity technologies: Zero Trust Network Access (ZTNA) and Software Security Edge (SSE).To help dissect these technologies and what they could mean for organizations in the face of the ever-increasing risk from ransomware, we're joined again by John Spiegel, and Jaye Tilson. They are both Field CTOs and Distinguished Technologists at HPE. This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. Do you have a question for the expert? Ask it here using this Google form: https://forms.gle/8vzFNnPa94awARHMA About this week's guests: https://www.linkedin.com/in/jaye-tillson/?originalSubdomain=uk   https://www.linkedin.com/in/john-spiegel-2011543/  Sources and statistics cited in this episode: Ransomware attack rate from Statista: https://www.statista.com/statistics/204457/businesses-ransomware-attack-rate/KMPG research into ransomware: https://assets.kpmg.com/content/dam/kpmg/ca/pdf/2024/04/ca-cyber-incidents-and-intelligence-2023-en.pdfNASA's laser communication record: https://www.jpl.nasa.gov/news/nasas-laser-comms-demo-makes-deep-space-record-completes-first-phase/ 

Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise

In this episode, we'll be taking a look at two increasingly important cybersecurity technologies: Zero Trust Network Access (ZTNA) and Software Security Edge (SSE).To help dissect these technologies and what they could mean for organizations in the face of the ever-increasing risk from ransomware, we're joined again by John Spiegel, and Jaye Tilson. They are both Field CTOs and Distinguished Technologists at HPE. This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. Do you have a question for the expert? Ask it here using this Google form: https://forms.gle/8vzFNnPa94awARHMA About this week's guests: https://www.linkedin.com/in/jaye-tillson/?originalSubdomain=uk   https://www.linkedin.com/in/john-spiegel-2011543/  Sources and statistics cited in this episode: Ransomware attack rate from Statista: https://www.statista.com/statistics/204457/businesses-ransomware-attack-rate/KMPG research into ransomware: https://assets.kpmg.com/content/dam/kpmg/ca/pdf/2024/04/ca-cyber-incidents-and-intelligence-2023-en.pdfNASA's laser communication record: https://www.jpl.nasa.gov/news/nasas-laser-comms-demo-makes-deep-space-record-completes-first-phase/ 

Data Breach Today Podcast
Unforeseen Risks to Medical Devices in Ransomware Attacks

Data Breach Today Podcast

Play Episode Listen Later Oct 24, 2024


Data Breach Today Podcast
Unforeseen Risks to Medical Devices in Ransomware Attacks

Data Breach Today Podcast

Play Episode Listen Later Oct 24, 2024


Microsoft Threat Intelligence Podcast
Vanilla Tempest: The Threat Actor Behind Recent Hospital Ransomware Attacks

Microsoft Threat Intelligence Podcast

Play Episode Listen Later Oct 23, 2024 32:52


In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by security researchers Anna and Keivan to discuss two prominent threat actors: Vanilla Tempest and Peach Sandstorm.  Vanilla Tempest, a financially motivated cybercrime group, has been involved in recent ransomware attacks on U.S. hospitals, utilizing various ransomware payloads such as Ink. They are known for using tools like PowerShell scripts and Goot Loader to exfiltrate data and extort victims. Peach Sandstorm, an Iranian nation-state threat actor, focuses on cyber espionage and intelligence collection. They have targeted various sectors, including energy, defense, and critical infrastructure, and have shown increasing sophistication in their attacks. Later, Sherrod speaks with Colton Bremer, a senior security researcher at Microsoft, about his work on the Defender Experts (DEX) team. Colton explains the different tiers of DEX services, which focus on detecting and mitigating advanced threats that may bypass traditional security measures.  In this episode you'll learn:       A backdoor called Tickler that uses Azure infrastructure for command and control  The significance of these groups' tactics and maintaining ransomware resiliency  The different tiers of DEX services detecting and mitigating advanced threats    Some questions we ask:     How does Vanilla Tempest typically execute their attacks?  Has Peach Sandstorm evolved over time in their cyber espionage efforts?  What can individuals or organizations do to mitigate cloud identity abuse?    Resources:   View Colton Bremer on LinkedIn   View Sherrod DeGrippo on LinkedIn     Related Microsoft Podcasts:                    Afternoon Cyber Tea with Ann Johnson  The BlueHat Podcast  Uncovering Hidden Risks        Discover and follow other Microsoft podcasts at microsoft.com/podcasts     Get the latest threat intelligence insights and guidance at Microsoft Security Insider      The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.  

Automation Chat
Practical Steps for Protecting IT & OT Systems from Ransomware Attacks

Automation Chat

Play Episode Listen Later Aug 13, 2024 40:41


In this episode of our “Automation Chat” podcast from The Journal From Rockwell Automation and Our PartnerNetwork magazine, Executive Editor Theresa Houck chats with Dave Kang, Advisory Solutions Architect at Dragos and Kamil Karmali, Senior Global Commercial Manager, Cybersecurity Services at Rockwell Automation. Get nuts-and-bolts, practical information about strengthening cybersecurity for industrial networks and systems, including: How ransomware attacks have evolved over the past year. Steps you can take to prepare for — and recover from — an attack. Common governance models and decision-making structures. 3 key considerations for developing a unified IT and OT strategy. Workforce needs for an effective cybersecurity strategy. How effective cyber hygiene and risk posture helps reduce risk of cyber incidents. Cybersecurity-related compliance requirements in North America and around the world. Why it's vital for manufacturers to have a business continuity plan. And as always, get your family-friendly, silly Joke of the Day. Resources from this episode: Blog: 6 Steps to Reduce Industrial Cybersecurity Risks. Q&A with Executive Editor Theresa Houck: Understanding the OT Threat Landscape Helps Manufacturers Improve Cybersecurity Rockwell Automation Manufacturing Industry Cybersecurity web page. Subscribe to The Journal's 4 print magazines (Feb., May, July and Oct.) by e-mailing Anna Hicks at ahicks@endeavorbusinessmedia.com. Subscribe to our 4 digital magazines at http://rok.auto/thejournal-subscribe. You can also watch their discussion on YouTube at https://youtu.be/8Pm670QAO9E. Automation Chat is brought to you by The Journal From Rockwell Automation and Our PartnerNetwork magazine. Find us on LinkedIn. Find us on Facebook. Find us on X (Twitter). Please subscribe to "Automation Chat" and give us a 5-star rating and a review. ** Named “Best Podcast” 3 Consecutive Years! 2022-2024 Apex Award of Publication Excellence.

The Daily Decrypt - Cyber News and Discussions
Crowdstrike vs. Delta, Home Ransomware Attacks, ISP Compromise – Cybersecurity News

The Daily Decrypt - Cyber News and Discussions

Play Episode Listen Later Aug 6, 2024


In today's episode, we dive into CrowdStrike's refutation of Delta Air Lines' claims over the recent IT failure, the recent surge of Magniber ransomware attacks targeting home users worldwide; we explore how Chinese APT group StormBamboo compromised an ISP to deliver malware, and discuss newly uncovered vulnerabilities in Microsoft Windows Smart App Control and SmartScreen. Join us for this deep dive into current cybersecurity threats and incidents. Video Episode: https://youtu.be/ODwu0Dhpm1Y 00:00 - Intro 01:08 - Crowdstrike v Delta 03:38 - Home Ransomware 06:07 - ISP Compromise 07:36 - Windows Flaw URLs: https://arstechnica.com/information-technology/2024/08/crowdstrike-claps-back-at-delta-says-airline-rejected-offers-for-help/ https://www.bleepingcomputer.com/news/security/surge-in-magniber-ransomware-attacks-impact-home-users-worldwide/ https://www.helpnetsecurity.com/2024/08/05/compromised-isp-dns-malware/ https://thehackernews.com/2024/08/researchers-uncover-flaws-in-windows.html Sign up for digestible cyber news delivered to your inbox: https://news.thedailydecrypt.com Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/ Logo Design by https://www.zackgraber.com/ Tags: CrowdStrike, Delta Air Lines, software update, disruption, StormBamboo, DNS poisoning, cyberespionage, Volexity, Microsoft's vulnerabilities, Smart App Control, threat actors, Apache OFBiz, CVE-2024-38856, remote code execution, cyberattacks Search Phrases: What are today's top cybersecurity news stories? How to protect against Magniber ransomware Steps to take if files are encrypted by ransomware Latest Magniber ransomware outbreak CrowdStrike and Delta Air Lines software update issue Impact of software update failures on airline operations Prevention of DNS poisoning attacks Chinese cyberespionage group StormBamboo latest activities Securing software update mechanisms against malware Windows Smart App Control vulnerabilities How threat actors bypass SmartScreen security measures

The Dallas Morning News
D-FW auto dealers shift gears after ransomware attacks disrupt operations ... and more news

The Dallas Morning News

Play Episode Listen Later Jun 25, 2024 5:37


Dealerships are using old-fashioned methods after a ransomware attack on CDK Global.;Police arrested 21-year-old Davonta Mathis Saturday in connection with two separate fatal shootings last wee; U.S. Rep. Colin Allred marked the two-year anniversary of the U.S. Supreme Court overturning Roe vs. Wade with a Monday news conference at a women's health center that downsized after Texas banned abortions; U.S. Reps. Ronny Jackson of Amarillo and Wesley Hunt of Houston are facing scrutiny over whether spending campaign money at private clubs is appropriate. Learn more about your ad choices. Visit podcastchoices.com/adchoices