Podcasts about Sandworm

  • 193PODCASTS
  • 327EPISODES
  • 45mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • May 2, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Sandworm

Latest podcast episodes about Sandworm

Pinball News & Pinball Magazine
Pinball Magazine & Pinball News PINcast April 2025 recap

Pinball News & Pinball Magazine

Play Episode Listen Later May 2, 2025 100:06


It's the battle of the big beasts this month with two mammoth new game launches and a third poised to be revealed. So, Jonathan from Pinball Magazine and Martin from Pinball News are back to bring you all the details in April's Pinball Industry News PINcast.The first beast into the arena was the Sandworm from Barrels of Fun's new Dune game. Based on the 2021 and 2024 Dune movies, the second release from the Houston-based manufacturer comes fully loaded with extensive cinematic assets as well as a new Horizon Atmospheric Lighting system, anti-reflective glass, a shaker motor and even a topper.Facing off against the Sandworm is the ‘Eighth Wonder of the World' in the form of Stern Pinball's new King Kong: Myth of Terror Island. The story of King Kong has been reimagined for Stern's latest cornerstone game which features an animated Kong being summoned by a swinging gong. Kong wreaks havoc, of course, aided by a giant spider as he blocks the balls and smashes a subway car to release the locked balls inside.The third beast is the elephant-in-the-room that is Jersey Jack Pinball's upcoming Harry Potter game. With manufacturing already underway at the company's Elk Grove Village factory, what will be the impact when we get the official release, expected later this month?Also looming large over the industry is the effect of trade tariffs – imposed, planned or threatened. Pinball manufacturers are taking their own approaches to the price increases on buying components and shipping complete games, while others are taking a wait-and-see approach. With some cuts in production already announced or anticipated, Jonathan and Martin look at who's doing what, and what it means for the wider market.There are also current production updates, along with news of some people leaving their posts and others being appointed to new positions.Plus, there are new code updates, of course, as well as some new products and limited-time special offers you won't want to miss.Also in this month's PINcast, Jonathan and Martin swap the pinball table for the dinner table to find out What's Cooking with… legendary game designer, Steve Ritchie. Steve spills the beans on his favourite recipes, so you too can eat like a King.So, make sure you download or stream this latest Pinball Industry News PINcast right now from your favourite podcast supplier. You'll also find it on YouTube and YouTube Music, or you can get it direct from Spotify on the link above, and don't forget you can also subscribe to the PINcast for free to guarantee you get the freshest episode delivered to you every month, the very moment it is released.With so much happening in the pinball industry right now and so much more excitement coming up, join Jonathan and Martin each month to guarantee you don't miss any of it. After all, it's the podcast the pinball industry listens to.

Breach FM - der Infosec Podcast
Spotlight - APT44 & die GRU - Sabotage, Stromausfälle & Krieg - der Fall Sandworm

Breach FM - der Infosec Podcast

Play Episode Listen Later Apr 25, 2025 83:53


In diesem Deep Dive analysieren wir die Operationen des russischen APT Akteurs Sandworm/APT44 von ihren ersten Angriffen bis zu den jüngsten Entwicklungen. Wir untersuchen, wie Sandworm Russlands geopolitische Agenda durch gezielte Angriffe auf ukrainische Stromnetze, globale Lieferketten wie bei NotPetya und mobile Kriegsführung mit Infamous Chisel vorantreibt. Wir zeigen die Vielfalt ihrer Methoden - von Propaganda über Sabotage bis hin zur Unterstützung des Angriffskriegs Russland in der Ukraine - und beleuchten die Reaktionen von NATO, EU und Technologieunternehmen. Ein nüchterner Blick auf Cyber als Werkzeug hybrider Kriegsführung, die Bedrohungen für Länder wie die baltischen Staaten oder Moldawien und die ungewisse Zukunft digitaler Konflikte.Quellen:(1) https://en.wikipedia.org/wiki/Sandworm_(hacker_group)(2) https://adarma.com/blog/sandworm/(3) https://attack.mitre.org/groups/G0034/(4) https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/(5) https://www.ncsc.gov.uk/news/new-sandworm-malware-cyclops-blink-replaces-vpnfilter(6) https://www.aljazeera.com/news/2020/10/19/six-russian-military-officers-accused-of-widespread-hacking(7) https://industrialcyber.co/critical-infrastructure/ukrainian-cert-details-malicious-plan-by-sandworm-group-to-disrupt-critical-infrastructure-facilities/(8) https://thehackernews.com/2022/04/russian-hackers-tried-attacking.html(9) https://nsarchive.gwu.edu/media/32139/ocr(10) https://de.wikipedia.org/wiki/Sandworm(11) https://www.microsoft.com/en-us/security/blog/2022/04/27/ukraine-war-update-microsofts-hunt-for-threats-to-ukrainian-networks/(12) https://www.wired.com/story/sandworm-russian-hackers-indictment/(13) https://www.wired.com/story/sandworm-hackers-indicted-olympics-notpetya/(14) https://www.justice.gov/opa/press-release/file/1328521/download(15) https://www.state.gov/rewards-for-justice-russian-military-intelligence-officers-wanted/(16) https://www.gov.uk/government/news/uk-sanctions-russian-cyber-criminals-from-gru-sandworm(17) https://www.bellingcat.com/news/uk-and-europe/2020/10/19/inside-the-grus-cyberwarfare-unit/(18) https://www.spiegel.de/netzwelt/netzpolitik/sandworm-russische-cybertruppe-als-gefahr-fuer-europa-a-00000000-0002-0001-0000-000169773292(19) https://www.washingtonpost.com/national-security/2022/03/10/russia-ukraine-cyberattacks/(20) https://www.cisa.gov/news-events/alerts/2022/03/15/cisa-advisory-russian-state-sponsored-cyber-actors-targeting-us-cleared-defense(21) https://www.cert.gov.ua/article/37638(22) https://www.mandiant.com/resources/blog/apt44-unearthing-sandworm(23) https://services.google.com/fh/files/misc/apt44-unearthing-sandworm.pdf(24) https://industrialcyber.co/ransomware/mandiant-exposes-apt44-russias-sandworm-cyber-sabotage-unit-targeting-global-critical-infrastructure/(25) https://duo.com/decipher/a-decade-of-sandworm-digging-into-apt44-s-past-and-future(26) https://adarma.com/blog/sandworm/(27) https://www.hhs.gov/sites/default/files/seashell-blizzard-threat-actor-profile-tlpclear.pdf(28) https://greydynamics.com/the-apt44-sandworm-a-threat-assessment/(29) https://blog.eclecticiq.com/sandworm-apt-targets-ukrainian-users-with-trojanized-microsoft-kms-activation-tools-in-cyber-espionage-campaigns(30) https://www.conquer-your-risk.com/2024/04/19/apt44-russias-forefront-in-cyber-warfare-and-espionage-report/(31) https://www.lemonde.fr/en/pixels/article/2024/04/17/how-sandworm-russia-s-elite-hackers-attacked-a-small-mill-instead-of-dam-they-targetted_6668731_13.html

The Cybersecurity Defenders Podcast
#199 - Intel Chat: Lazarus Group, BadPilot, PAN-OS, emoji exfil, Kitty Stealer & PolarEdge

The Cybersecurity Defenders Podcast

Play Episode Listen Later Mar 7, 2025 36:13


In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel.North Korea's state-backed Lazarus Group is believed to be responsible for the largest cryptocurrency heist ever recorded, stealing $1.5 billion from the Bybit exchange. The "BadPilot" hacking campaign has been linked to Russia's Sandworm threat group, a unit of the GRU known for cyber espionage and disruptive attacks. GreyNoise has observed active exploitation of CVE-2025-0108, a critical authentication bypass vulnerability in Palo Alto Networks' PAN-OS. Security researcher Paul Butler has demonstrated a novel technique for smuggling arbitrary data using emojis, leveraging the way modern text encoding and rendering systems handle Unicode characters.Kitty Stealer is a newly identified malware targeting macOS systems, designed to steal sensitive user data such as credentials, browser cookies, and cryptocurrency wallets.SEKOIA researchers have uncovered a previously unknown IoT botnet named PolarEdge, which has been operating covertly for an extended period.

Geek Girl Soup
14.30: Oscars 2025: The Good, the Bad, and the Brooches

Geek Girl Soup

Play Episode Listen Later Mar 6, 2025 80:40


Hollywood's biggest night has come and gone, and we're here to break down everything—from the jaw-dropping wins to the record-breaking speeches, the best-dressed stars, and, of course, those iconic brooches.This week, Susan, Kelly, and Cort are joined by our annual Oscars expert, Erik C. Andersen, to discuss the unexpected wins, the indie film takeover, and Conan O'Brien's hilarious hosting.Timestamps & Highlights[00:00:00] Welcome Back, Erik! – A Geek Girl Soup Oscars tradition! Plus, a little love for soap operas before we get to the main event.[00:04:00] Adrien Brody Sets a Record (And Not in a Good Way) – Five minutes and 40 seconds of speech? Make it stop.[00:06:00] The Indie Film Revolution – This year's Oscars had a record number of indie wins. Anora cleaned up, The Brutalist made waves, and Flow got Latvia its first-ever Oscar![00:10:00] Best Bit: The Sandworm – The Dune visual effects may have won an Oscar, but that Sandworm gag stole the show. (Also, we know the guy inside it!)[00:14:00] Kieran Culkin, Oscar Darling – He's hilarious, he's talented, and he keeps winning awards. [00:18:00] Mick Jagger, Elton John, and the Music Industry at the Oscars – A rock ‘n' roll takeover![00:23:00] No Other Land: The Speech That Mattered Most – A powerful moment from the Best Documentary winners.[00:30:00] The Best Fashion Moments – Coleman Domingo's perfection, Halle Berry's disco-ball dress, and brooches galore![00:40:00] What's Next for Hollywood? – With indie films thriving and blockbusters struggling, where does the industry go from here?-Original music by Garrett ThompsonFollow us:Instagram @GeekGirlSoupBlueSky @GeekGirlSoupContinue the conversation on FacebookListen to Cort's podcast with Brad at PureFandom.comCheck out Susan's movie stats on Letterboxd Email your questions and comments to GeekGirlSoup@gmail.comGeek on!

The Cybersecurity Defenders Podcast
#195 - Intel Chat: APT tunnelling, BadPilot, CVE-2025-0108, emojis & Kitty Stealer (take 2)

The Cybersecurity Defenders Podcast

Play Episode Listen Later Feb 21, 2025 35:09


In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel.Network traffic tunneling is a technique used by attackers to bypass security controls and exfiltrate data or establish covert communication channels. Threat actors use various tunneling methods, including DNS tunneling, HTTP/S tunneling, and ICMP tunneling, each with its own advantages depending on the target environment.The "BadPilot" hacking campaign has been linked to Russia's Sandworm threat group, a unit of the GRU known for cyber espionage and disruptive attacks.GreyNoise has observed active exploitation of CVE-2025-0108, a critical authentication bypass vulnerability in Palo Alto Networks' PAN-OS. This vulnerability allows unauthenticated attackers to gain administrative access to affected firewall devices, posing a significant risk to organizations relying on PAN-OS for network security.Security researcher Paul Butler has demonstrated a novel technique for smuggling arbitrary data using emojis, leveraging the way modern text encoding and rendering systems handle Unicode characters.Kitty Stealer is a newly identified malware targeting macOS systems, designed to steal sensitive user data such as credentials, browser cookies, and cryptocurrency wallets.

Black Hills Information Security
2025-02-17 - Prove That You're Wearing Pants

Black Hills Information Security

Play Episode Listen Later Feb 19, 2025 65:31


 00:00 - PreShow Banter™ — Prove That You're Wearing Pants05:50 - BHIS - Talkin' Bout [infosec] News 2025-05-1706:46 - Story # 1: Fortinet discloses second firewall auth bypass patched in January07:12 - Story # 1b: Fortinet CEO boasts it was voted the “most trusted” cybersecurity firm. Don't die laughing08:45 - Story # 1c: Forbes Most Trusted Companies in America 2025 List16:25 - Story # 2: SAML Bypass Authentication on GitHub Enterprise Servers to Login as Other User Account18:37 - Story # 2b: Rapid7 Flags New PostgreSQL Zero-Day Connected to BeyondTrust Exploitation20:04 - Story # 3: Putting the human back into AI is key, former NSA Director Nakasone says36:35 - Story # 4: Apple Confirms USB Restricted Mode Exploited in ‘Extremely Sophisticated' Attack37:44 - Story # 5: DOGE Exposes Once-Secret Government Networks, Making Cyber-Espionage Easier than Ever43:14 - Story # 5b: DOGE's .gov site lampooned as coders quickly realize it can be edited by anyone46:59 - Story # 6: Man who SIM-swapped the SEC's X account pleads guilty51:26 - Story # 7: Russia's Sandworm caught snarfing credentials, data from American and Brit orgs53:55 - Story # 8: Nearly 10 years after Data and Goliath, Bruce Schneier says: Privacy's still screwed 

Risky Business News
Risky Bulletin: Sandworm deploys Tor nodes on hacked networks

Risky Business News

Play Episode Listen Later Feb 16, 2025 7:43


Sandworm deploys Tor nodes on hacked networks, the UK drops military training for cyber staff, Salt Typhoon's hacking spree continues, and Russian APTs adopt device code phishing. Show notes

Cyber Security Headlines
LockBit host sanctions, DeepSeek security, trojanized KMS

Cyber Security Headlines

Play Episode Listen Later Feb 12, 2025 7:10


LockBit host sanctioned  A peak at DeepSeek's weak security Sandworm targeting Ukraine with trojanized KMS Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines

Cyber Security Headlines
LockBit host sanctioned, DeepSeek security, trojanized KMS

Cyber Security Headlines

Play Episode Listen Later Feb 12, 2025 7:18


LockBit host sanctioned  A peak at DeepSeek's weak security Sandworm targeting Ukraine with trojanized KMS Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines

Scenecraft
Bonus Categories of 2024! (Nightcap)

Scenecraft

Play Episode Listen Later Feb 5, 2025 59:51


In another Nightcap episode, we explore additional films from 2024 in categories like "Honorable Mentions", "Wasn't For Me", "Wasn't For Them", "Top Series", "Scene of the Year" and "Most Anticipated of 2025". Drop us a line at contact@scenecraftpodcast.com, or follow us on Instagram, Threads, TikTok and Bluesky @scenecraftpodcast for the latest news on the show. — Show Notes — Honorable Mentions ~ 00:01:30 Mark – A Quiet Place: Day One, Juror #2, Didi Connor – Babes, It's What's Inside, Fly Me to the Moon Cody – Nosferatu, A Complete Unknown, The Brutalist   Wasn't For Me ~ 00:14:34 Mark – Hundreds of Beavers Connor – Anora Cody – Juror #2   Wasn't For Them ~ 00:27:40 Mark – Trap Connor – Snack Shack Cody – Fly Me to the Moon   Top Series ~ 00:38:49 Mark – Squid Game: Season 2, The Sticky Connor – Fallout Cody – Ripley   Scene of the Year ~ 00:46:45 Mark – Riding the Sandworm from Dune: Part Two Connor – Forest Drive from Civil War Cody – The Bommy Knocker from Furiosa: A Mad Max Saga   Scene of the Year ~ 00:53:02 Mark – Wake Up Dead Man: A Knives Out Mystery Connor – Mickey 17 Cody – One Battle After Another (FKA The Battle Of Baktan Cross) -- Thanks for listening!

Microsoft Threat Intelligence Podcast
Seashell Blizzard Ramping Up Operations and OSINT Trends of DPRK Threat Actors

Microsoft Threat Intelligence Podcast

Play Episode Listen Later Jan 22, 2025 26:02


In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by security researchers Elise Eldridge and Anna Seitz to discuss the most recent notable developments across the threat landscape.   The threat actor, also known as Sandworm or APT44, has also been observed resuming the use of the wrappers WalnutWipe and SharpWipe, and expanded the use of the Prickly Pear malware downloader. The team highlights the geopolitical implications of these attacks, particularly in the context of Russia's influence on energy and global events. Sherrod also touches on the history of wipers in cyber operations and transitions to a discussion with Elise about trends in North Korean cyber activity, emphasizing Microsoft's ongoing efforts to analyze and mitigate these threats.  In this episode you'll learn:       Why recent attacks have targeted the European energy sector  How Seashell Blizzard's attacks in 2024 involved spear-phishing campaigns  Why North Korean hackers infiltrate companies through remote IT job programs    Some questions we ask:        How has Seashell Blizzard returned to using wipers, and what might explain this shift?  After sending out crafted spear-phishing emails, what happens next in the attack chain?  How might global geopolitics impact Seashell Blizzard's campaigns?     Resources:   View Elise Eldridge LinkedIn   View Anna Seitz on LinkedIn   View Sherrod DeGrippo on LinkedIn     Related Microsoft Podcasts:                    Afternoon Cyber Tea with Ann Johnson  The BlueHat Podcast  Uncovering Hidden Risks        Discover and follow other Microsoft podcasts at microsoft.com/podcasts     Get the latest threat intelligence insights and guidance at Microsoft Security Insider      The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.  

The CyberWire
Breached but not broken.

The CyberWire

Play Episode Listen Later Dec 19, 2024 34:38


CISA urges senior government officials to enhance mobile device security. Russian state-sponsored hacker group Sandworm is targeting Ukrainian soldiers. A website bug in GPS tracking firm Hapn is exposing customer information. Multiple critical vulnerabilities have been identified in Sharp branded routers. Ireland's Data Protection Commission fines Meta $263 million for alleged GDPR violations. Google releases an urgent Chrome security update to address four high-rated vulnerabilities. Cyberattacks on India-based organizations surged 92% year-over-year. Cybercriminals target Google Calendar to launch phishing attacks. Fortinet patches a critical vulnerability in FortiWLM. Juniper Networks warns of a botnet infection targeting routers with default credentials. Our guest is Jeff Krull, principal and practice leader of Baker Tilly's cybersecurity practice, with advice on using employee access controls to limit internal cyber threats. When is “undesirable” a badge of honor? Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest is Jeff Krull, principal and practice leader of Baker Tilly's cybersecurity practice, talking about using employee access controls to limit internal cyber threats. Selected Reading CISA urges senior government officials to lock down mobile devices amid ongoing Salt Typhoon breach (The Record) Sandworm-linked hackers target users of Ukraine's military app in new spying campaign (The Record) Tracker firm Hapn spilling names of thousands of GPS tracking customers (TechCrunch) Multiple security flaws reported in SHARP routers (Beyond Machines) Meta fined $263 million for alleged GDPR violations that led to data breach (The Record) Update Google Chrome Now—4 New Windows, Mac, Linux Security Warnings (Forbes) India Sees Surge in Banking, Utilities API Attacks (Dark Reading) Google Calendar Phishing Scam Targets Users with Malicious Invites (Hackread) Fortinet Patches Critical FortiWLM Vulnerability (SecurityWeek) Juniper Warns of Mirai Botnet Targeting Session Smart Routers (SecurityWeek) Recorded Future CEO Calls Russia's “Undesirable” Listing a “Compliment” (Infosecurity Magazine) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

L.A.M.E. Book Club Podcast
Book Character Hear Me Out Cake (Gone Wrong?)

L.A.M.E. Book Club Podcast

Play Episode Listen Later Dec 9, 2024 52:26


Watch as we create our Book Character Hear Me Out Cake featuring beloved (and questionable) literary favorites! Join us for laughs and heated debates as we defend our controversial character crushes and share hilarious one-star reviews of our favorite books. From Sarah J. Maas's iconic heroes to surprising picks like the Sandworm from Dune, we're building the ultimate bookish cake that will make you question everything – and maybe your own taste in fictional characters! Get ready for shocking character choices, passionate defenses of unlikely crushes, and plenty of playful banter as we tackle everything from Tamlin to Tom Hanks in Polar Express. Whether you're Team Hobo-on-the-Train or Team King Triton, this episode serves up the perfect blend of bookish humor and questionable taste. Plus, discover which one-star reviews of beloved books had us clutching our pearls and which ones actually made us laugh out loud. This episode is packed with literary references, unexpected picks, and the kind of friendship that makes reading (and judging books) so much fun. From ACOTAR to Crescent City, Twilight to The Hunger Games, no character is safe from our "hear me out" considerations. Even if you disagree with our choices, you're guaranteed to laugh along with our passionate defenses and outrageous selections.

@BEERISAC: CPS/ICS Security Podcast Playlist
Joe Saunders on Advanced Cyberattacks Against Critical Infrastructure

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 8, 2024 34:43


Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)Episode: Joe Saunders on Advanced Cyberattacks Against Critical InfrastructurePub date: 2024-11-07Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationRunsafe Security CEO and Cofounder Joe Saunders joins the Nexus Podcast to discuss the strategic shift from certain APTs toward destructive cyberattacks targeting U.S. critical infrastructure. Groups such as Volt Typhoon and Sandworm have aggressively focused their efforts on hacking OT, IoT, and healthcare organizations, opening new fronts that asset owners and operators, as well as manufacturers of embedded systems must now contend with. The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Aperture: A Claroty Podcast
Joe Saunders on Advanced Cyberattacks Against Critical Infrastructure

Aperture: A Claroty Podcast

Play Episode Listen Later Nov 7, 2024 34:43


Runsafe Security CEO and Cofounder Joe Saunders joins the Nexus Podcast to discuss the strategic shift from certain APTs toward destructive cyberattacks targeting U.S. critical infrastructure. Groups such as Volt Typhoon and Sandworm have aggressively focused their efforts on hacking OT, IoT, and healthcare organizations, opening new fronts that asset owners and operators, as well as manufacturers of embedded systems must now contend with. 

The Editing Podcast
'Dune' Editor Breaks Down the Sandworm Sequence

The Editing Podcast

Play Episode Listen Later Oct 8, 2024 24:31


#editing #dune #oscars Get 14% more video views using mainstream music from Lickd: https://go.lickd.co/The-Editing-Podcast-Dune Host:  @HillierSmith  Guest: Joe Walker Editor: João Bernardo & André Rodrigues Executive Producer: Vishnu Vallabhaneni 0:00 - Joe Walker's Method to Dune 1:31 - Breakdown: The Sand Worm Sequence 4:34 - The Contrast & Vulnerability of Paul 7:35 - Why It's Powerful To NOT Cut 9:30 - Constructing the Sound of the Sand Worm 12:14 - How They Made A REAL Sand Worm 14:10 - Sound Design vs. Hans Zimmer 19:45 - Why Joe Broke THIS Editing Rule 23:03 - Joe Walker's Advice For New Editors In this episode of The Editing Podcast, renowned YouTube-first podcast hosted by editor Hayden Hillier-Smith, Oscar-winning editor Joe Walker joins the show to discuss his groundbreaking work on Dune Part 2. Walker, known for his previous work on Blade Runner 2049, Arrival, and 12 Years a Slave, dives deep into the epic world of Dune, revealing how his past projects paved the way for his collaboration with director Denis Villeneuve on this iconic sci-fi saga. Together, they break down the jaw-dropping Sand Worm sequence, from initial storyboards to its final breathtaking form on screen. Walker offers an insider's perspective on how this iconic scene was meticulously edited, blending VFX with SFX, balancing intense sound design with the incredible score of Hans Zimmer and the overall tension of the scene to capture the immense scale and power of the worms in the deserts of Arrakis. --- Support this podcast: https://podcasters.spotify.com/pod/show/the-editing-podcast/support

Continuum Drag
276 - Frank Herbert's Children of Dune (Part 3)

Continuum Drag

Play Episode Listen Later Oct 1, 2024 48:14


Arrakis gets it's very own Sonic the Sandworm to do something that isn't entirely clear while the Atreides deals with some interpersonal issues in Part 3 of Frank Herbert's Children of Dune.

Living for the Cinema
BEETLEJUICE BEETLEJUICE (2024)

Living for the Cinema

Play Episode Listen Later Sep 10, 2024 17:09 Transcription Available


The Ghost With The Most is BACK!  More than thirty-six years after the original cult smash Beetlejuice was released into theaters, director Tim Burton returns along with Winona Ryder, Catherine O'Hara, and Michael Keaton in the titular role.  New additions to the cast include Jenna Ortega (Scream 6, Wednesday), Monica Bellucci (Irreversible, Matrix Reloaded), and Justin Theroux (The Leftovers, Mulholland Drive).  The plot?  Well....let's just say that there are lots of thrills, chills, laughs, and....disco music? :) Host: Geoff GershonEdited By Ella GershonProducer: Marlene GershonSend us a texthttps://livingforthecinema.com/Facebook:https://www.facebook.com/Living-for-the-Cinema-Podcast-101167838847578Instagram:https://www.instagram.com/livingforthecinema/Letterboxd:https://letterboxd.com/Living4Cinema/

Leaving the Theater
Beetlejuice Beetlejuice (w/ Jonquilyn Hill)

Leaving the Theater

Play Episode Listen Later Sep 9, 2024 16:59


Ronald Young Jr. reviews Beetlejuice Beetlejuice with Jonquilyn Hill… Jonquilyn and RYJ think that Beetlejuice might be canceled in the present political climate of todayJQ - 3 of 5 starsRYJ - 3  of 5 starsFollow me on IG, Tiktok, and Threads - @ohitsbigronFollow Jonquilyn Hill on IG - @jonquilrose and Twitter - @jonquilynhillJonquilyn is a Senior Producer at Vox Media, check out some of her work using the links below:The WeedsThrough the CracksAvailable in theaters and probably eventually on MaxStarring Michael Keaton, Winona Ryder, Catherine O'Hara, Jenna Ortega, Justin Theroux, Monica Belluci, and Willem DafoeWritten by Alfred Gough, and Miles MillarDirected by Tim BurtonFor more information about Beetlejuice Beetlejuice check out this linkSupport Leaving the Theater on Patreon using this link

The Reel Rejects
BEETLEJUICE (1988) MOVIE REVIEW!! FIRST TIME WATCHING!!

The Reel Rejects

Play Episode Listen Later Sep 5, 2024 12:43


JUST IN TIME FOR BEETLEJUICE 2!! Beetlejuice Movie Reaction Watch Along:  https://www.patreon.com/thereelrejects Follow Us On Socials: https://www.instagram.com/reelrejects/  https://www.tiktok.com/@thereelrejects?lang=en With Beetlejuice Beetlejuice opening THIS WEEKEND, Coy Jandreau & Aaron Alexander return to Tim Burton's CLASSIC for a FIRST TIME Reaction, Commentary, Analysis, Breakdown, & Full Movie Spoiler Review for the Supernatural Comedy directed by Burton (Edward Scissorhands, Batman, Alice in Wonderland, Wednesday) and starring Michael Keaton (Batman Returns, Birdman) in his iconic turn as the hilarious & vile bio-exorcist, Betelgeuse, & Winona Ryder (Heathers, Stranger Things) as goth girl icon, Lydia Deetz. Beetlejuice centers on the spirits of a deceased couple played by Alec Baldwin (The Departed, 30 Rock) & Geena Davis (The Fly, Thelma & Louise) who wake up dead only to be harassed by an unbearable family that has moved into their home, causing them to hire a malicious spirit to drive them out... The film also features Catherine O'Hara (Best in Show, Schitt's Creek), Glenn Shadix (A Nightmare Before Christmas), Dick Cavett (A Nightmare on Elm Street 3: Dream Warriors), Robert Goulet (Scrooged), Annie McEnroe (Wall Street), & MORE! Coy & Aaron REACT to all the Best Scenes & Zaniest Moments including It's Showtime!, Netherworld Waiting Room, Free Demon Possession with Every Exorcism, You Guys Really Are Dead, We're Sympatico, Scary Snake, Never Trust the Living, Til Death Do Us Part, The Sandworm, & Beyond!! Follow Coy Jandreau:  Tik Tok: https://www.tiktok.com/@coyjandreau?l... Instagram: https://www.instagram.com/coyjandreau/?hl=en Twitter:  https://twitter.com/CoyJandreau YouTube: https://www.youtube.com/channel/UCwYH2szDTuU9ImFZ9gBRH8w Follow Aaron On Instagram: https://www.instagram.com/therealaaronalexander/?hl=en Support The Channel By Getting Some REEL REJECTS Apparel! https://www.rejectnationshop.com/ Music Used In Manscaped Ad:  Hat the Jazz by Twin Musicom is licensed under a Creative Commons Attribution 4.0 license. https://creativecommons.org/licenses/by/4.0/ POWERED BY @GFUEL Visit https://gfuel.ly/3wD5Ygo and use code REJECTNATION for 20% off select tubs!! Head Editor: https://www.instagram.com/praperhq/?hl=en Co-Editor: Greg Alba Co-Editor: John Humphrey Music In Video: Airport Lounge - Disco Ultralounge by Kevin MacLeod is licensed under a Creative Commons Attribution 4.0 license. https://creativecommons.org/licenses/by/4.0/ Ask Us A QUESTION On CAMEO: https://www.cameo.com/thereelrejects Follow TheReelRejects On FACEBOOK, TWITTER, & INSTAGRAM:  FB:  https://www.facebook.com/TheReelRejects/ INSTAGRAM:  https://www.instagram.com/reelrejects/ TWITTER:  https://twitter.com/thereelrejects Follow GREG ON INSTAGRAM & TWITTER: INSTAGRAM:  https://www.instagram.com/thegregalba/ TWITTER:  https://twitter.com/thegregalba Learn more about your ad choices. Visit megaphone.fm/adchoices

Young Heretics
Muad'Dib! Why Achilles was Right and Agamemnon was Wrong

Young Heretics

Play Episode Listen Later Aug 20, 2024 57:54


And we're off to the races! The Iliad begins in earnest this week with the outbreak of the feud between Achilles and Agammemnon (#TeamAchilles). The drama that unfolds contains almost the entirety of all that was to come in Greek culture, from the terror of hubris to the magnificent achievement of city-states in coalition. Plus: stick around to the end for a bunch of very cool announcements. Trump the Sandworm: https://x.com/Babygravy9/status/1823830496872136776 Sign up to Audit my Class: ncf.edu/youngheretics Foundations of the West:Athens and the Logos Greek Myth Comix: https://greekmythcomix.com/comic/deaths-in-the-iliad-a-classics-infographic/ Check out our sponsor, the Ancient Language Institute (now offering Old English instruction!): https://ancientlanguage.com/youngheretics/ Pre-order my new book, Light of the Mind, Light of the World: https://a.co/d/2QccOfM Subscribe to my new joint Substack with Andrew Klavan (no relation): https://thenewjerusalem.substack.com

#Millennial: Pretend Adulting, Real Talk
Harris and Walz, Affordable At-Home Entertainment Tips, Popcorn Bucket Mania

#Millennial: Pretend Adulting, Real Talk

Play Episode Listen Later Aug 7, 2024 79:47


Welcome back to #Millennial, the home of pretend adulting and real talk! Ready to see the 2024 physical gift for BAE+ Patrons? Look no further than the M-Word Cloud Shirt! Become a $10+ Patron by 9/6/24 to be eligible to receive this gift! Introducing Tim Walz, Kamala Harris' running mate and Democratic Vice Presidential candidate! Let the battle of the midwestern VP candidates commence! And honestly, there is no fight to be had here: JD Vance continues to flounder and create headaches for the Trump campaign, while the Democratic base is more energized than ever over our ticket! Is it problematic to refer to Vice President Harris as simply Kamala? A listener perspective. Bet you couldn't have guessed that the most popular streaming app isn't Netflix, MAX, or Disney+ but... Tubi! The free streaming alternative has seen a 46% increase in viewership from a year ago, edging out even Disney+'s viewership. Amidst all other major streamers continuing to announce price increases, Tubi features movies and channels dedicated to popular genres and TV shows. Since it's ad-supported, Tubi has been able to remain a free service. Laura is a pessimist and doesn't think it'll last. We share some of our favorite hacks to save on home entertainment through bundling, threatening to cancel to take advantage of win back offers, and family plans. One of the latest collectors items? Popcorn buckets! And it's not just because of that sexual 'Dune' Sandworm bucket. People collect these tie-in novelties for the same reasons anyone collects anything - the nostalgia and exclusivity! But serious question because some of us live in small spaces: what do you do when you run out of room to display them? Save some money and your peace with this week's recommendations: NameCheap for domains (Andrew), Journaling at night to clear your head (Laura), and 'Big Mood' on Tubi (Pam). And in this week's installment of After Dark: Surprise Bitch is back, and we're ready to pepper you with some new questions because we're nosy about y'all's lives. Also Andrew really comes with the tear-jerker questions - we promise we'll tag him back with some of these. ;) Getting through the rest of the year one day at a time is such a MOOD! We hear tips, tricks, and good advice a fair bit, but tell us about the WORST advice you've ever gotten. "...hello? OH SHIT!" Learn more about your ad choices. Visit megaphone.fm/adchoices

Control Loop: The OT Cybersecurity Podcast
Critical infrastructure: Pending legislation and risks and rewards from AI.

Control Loop: The OT Cybersecurity Podcast

Play Episode Listen Later May 1, 2024 23:35


Mandiant ties OT attacks to Sandworm. Russia-linked hackers target Texas water utilities. Belarusian hacktivists hit fertilizer company. CISA issues eight ICS advisories. Dave Bittner's Caveat podcast co host Ben Yelin joins him to discuss pending legislation with potential to affect critical infrastructure, as well as the Department of Energy's assessment of the potential risks and rewards from AI. The Learning Lab is on a hiatus this episode, and will be returning soon! Control Loop News Brief. Mandiant ties OT attacks to Sandworm. Unearthing APT44: Russia's Notorious Cyber Sabotage Unit Sandworm (Mandiant) Russia-linked hackers target Texas water facilities. Rural Texas Towns Report Cyberattacks That Caused One Water System to Overflow (SecurityWeek) Russia-linked hacking group suspected of carrying out cyberattack on Texas water facility, cybersecurity firm says (CNN) Belarusian hacktivists hit fertilizer company. Belarusian hackers claim to breach fertilizer plant in retaliation for support of Lukashenko regime (The Record) CISA issues eight ICS advisories. CISA Releases Eight Industrial Control Systems Advisories (CISA) Control Loop Interview. Host Dave Bittner and his co host from the Caveat podcast on the N2K CyberWire network, Ben Yelin, share some discussion about pending legislation with potential to affect critical infrastructure, and Department of Energy's assessment of the potential risks and rewards from AI. Links to articles:  Crawford puts forward bill on cybersecurity risks to water systems (The Arkansas Democrat-Gazette) US DOE rolls out initial assessment report on AI benefits and risks for critical energy infrastructure (Industrial Cyber)  Control Loop Learning Lab. The Learning Lab is on a break and will be back soon. Stay tuned.  Control Loop Audience Survey. Please take a moment to fill out our super quick survey. It's only 5 short questions. Thanks! Control Loop OT Cybersecurity Briefing. A companion monthly newsletter is available through free subscription and on N2K Networks website.

The Cybersecurity Defenders Podcast
#119 - Special Episode: Sandworm is promoted to APT44

The Cybersecurity Defenders Podcast

Play Episode Listen Later Apr 25, 2024 38:37


In this episode of The Cybersecurity Defenders Podcast, we discuss the GRU-backed cyber unit Sandworm which was recently promoted to APT44 by Mandiant.Sandworm is a notorious hacking group, believed to be linked to Russia's military intelligence agency, the GRU. Known for its destructive cyberattacks, Sandworm has targeted various sectors worldwide, including energy, media, and election systems. Their activities are marked by the use of sophisticated malware and tactics that not only seek to steal information but also to disrupt critical infrastructure. The group gained international prominence with attacks like NotPetya in 2017, which caused billions of dollars in damage across multiple countries, emphasizing their capability to impact global cyber stability.The name "Sandworm" is inspired by the monstrous creatures from Frank Herbert's science fiction novel "Dune," reflecting the group's elusive and destructive nature. Over the years, Sandworm's operations have evolved, showcasing their adaptability and the increasing complexity of their attacks. This evolution highlights the growing challenges in cybersecurity, making the understanding of such threat actors crucial for developing robust defense strategies against state-sponsored cyber warfare.YouTube video showing Sandworm attacking a Ukrainian power plant here.Episode #56 - When the lights went out in Ukraine (Part 1)Episode #74 - When the lights went out in Ukraine (Part 2)Episode #16 - NotPetya

Cyber Security Headlines
TikTok ban update, Sandworm hits Ukraine, North Korean streaming animators

Cyber Security Headlines

Play Episode Listen Later Apr 23, 2024 7:03


TikTok ban passes the US House Sandworm targets critical Ukrainian orgs  North Koreans animating streaming shows Thanks to this week's episode sponsor, Veracode AI coding companions assist in generating high-quality code snippets, while Veracode swoops in to conduct thorough security assessments, identifying and fixing vulnerabilities quickly. With this dynamic duo, developers can innovate with confidence, knowing their code is both efficient and secure. Secure more code with Co-Pilot or any AI coding companion and Veracode. We'll be your wingman anytime.

Paul's Security Weekly
Win 95, LastPass, Kubernetes, Sandworm, Bloomtech, Frontier, 911, Aaran Leyland... - SWN #379

Paul's Security Weekly

Play Episode Listen Later Apr 19, 2024 34:41


Win 95, Cheat Lab, LastPass, Kubernetes, Sandworm, Bloomtech, Frontier, 911, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-379

Paul's Security Weekly TV
Win 95, LastPass, Kubernetes, Sandworm, Bloomtech, Frontier, 911, Aaran Leyland... - SWN #379

Paul's Security Weekly TV

Play Episode Listen Later Apr 19, 2024 34:47


Win 95, Cheat Lab, LastPass, Kubernetes, Sandworm, Bloomtech, Frontier, 911, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-379

Hack Naked News (Audio)
Win 95, LastPass, Kubernetes, Sandworm, Bloomtech, Frontier, 911, Aaran Leyland... - SWN #379

Hack Naked News (Audio)

Play Episode Listen Later Apr 19, 2024 34:41


Win 95, Cheat Lab, LastPass, Kubernetes, Sandworm, Bloomtech, Frontier, 911, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-379

The Daily Decrypt - Cyber News and Discussions
Student Loan Forgiveness Scam, Thwarting Russian Sandworm, and Defending Against Cisco-Reported Brute-Force Attacks

The Daily Decrypt - Cyber News and Discussions

Play Episode Listen Later Apr 18, 2024


Today, we discuss the deceptive world of the "Financial Hardship Department Scam," where unsuspecting Americans are tricked into revealing personal data with the false promise of government aid. Explore the intricacies of this scam and how to protect yourself from becoming a victim. This episode also sheds light on the alarming strategies of Russian Sandworm hackers and global brute-force attacks targeting VPN and SSH services, revealing a complex cybersecurity landscape. Original URLs: Financial Hardship Department Scam: https://cyberguy.com/privacy/the-unsubscribe-email-scam-is-targeting-americans/, https://malwaretips.com/blogs/financial-hardship-department-email-scam-explained/ Russian Sandworm Hackers: https://www.bleepingcomputer.com/news/security/russian-sandworm-hackers-pose-as-hacktivists-in-water-utility-breaches/ Cisco Warning on Brute-Force Attacks: https://thehackernews.com/2024/04/cisco-warns-of-global-surge-in-brute.html Follow us on Instagram: https://www.instagram.com/the_daily_decrypt/ Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/ Logo Design by https://www.zackgraber.com/ Tags for the Episode: Financial Hardship Department Scam, cybersecurity, Russian Sandworm hackers, brute-force attacks, VPN, SSH, email scams, government subsidies scam, cyber threats, cyber protection, Mandiant, Cisco Search Phrases: How to protect against Financial Hardship Department Scam What is the Financial Hardship Department Scam Russian Sandworm hackers in US utilities Cisco alert on brute-force attacks Cybersecurity threats in 2024 Email scams involving government aid Preventing cyber attacks on VPN and SSH How Russian hackers disguise as hacktivists Identifying and preventing email scams Latest cybersecurity reports from Cisco and Mandiant Transcript Apr18 Americans are being targeted by a sophisticated scam from the Financial Hardship Department, which promises government subsidies and stimulus checks as a facade to steal personal information and money. Stick around cause we're gonna give them a call. Russian sandworm hackers, disguised as hacktivist groups, have infiltrated water utilities in the United States and Europe, executing sophisticated cyberattacks that manipulate public narratives in favor of Russia according to recent findings by Mandiant. And finally, Cisco has issued an alert on a sharp rise in global brute force attacks targeting VPN and SSH services, revealing a sophisticated threat landscape that exploits Tor exit nodes and various anonymizing proxies since March 18th of 2024. What steps can organizations take to protect their networks from these global brute force attacks? So in recent news, a concerning scam from the Financial Hardship Department is targeting Americans across the country. This was actually brought to my attention from my mother. She reported something suspicious to her IT department, which is me. She received an email with the subject that was her full name, and inside the email was a very compelling argument. That she was entitled to some sort of student loan forgiveness plan, and the money is available right away. And this specific scam isn't necessarily breaking news, but this type of scam, this category of scam, is very effective and very prevalent. And this is because of a thing called OSINT, or Open Source Intelligence, where people can use information they find online about you in order to get you to do things. So, if someone wrote you an email And they knew exactly how much student debt you had, and they knew your full name, and they knew you ran to school. You might be more enticed to give them a call, respond to the email, or even click a link. If you're interested in seeing this email and walking through all of the key indicators that this is not a legit email, and it is in fact a scam, I'm going to be posting a reel a little bit later today on our Instagram that we'll have the email and we're going to go through each one of the indicators that this is a scam so that you can help protect yourself against this scam. But just a high level, the email came from someone at hotmail. com. Nobody with any clout is going to email you from a personal email address. Step one. All right. Number two, there's a sense of urgency. It says that you have a case open, but for only one more day. So give us a call back at this number. And just for fun, I went ahead and gave this number a call using my google voice number and was ready to record it and talk to them and see what they were gonna try to get out of me and maybe give them some fake information. The email was received yesterday and since then the number has been decommissioned. Calling the scammer. Bummer. There are also some weird formatting issues with this email. And then at the bottom, it says you opted into advertising services, provides an address, and then it provides a URL to unsubscribe. This specific email is formatted so poorly that the URL doesn't even become clickable. But they're trying to get you on two directions here. They're trying to get you to call and give up your information. And they're trying to get you to click this unsubscribe link. Now that kind of gets your wheels turning, doesn't it? Most emails have unsubscribe links, and most of them are from emails you might not even recognize. You just want to get them out of your inbox. Now trust me, I am all for inbox sanitization and organization, but clicking unsubscribe links as a habit is a bad one. Clicking any links in an email is a bad habit. And yes, unsubscribe is URL that could take you wherever you want. And usually, when you're about to click it, you're kind of in a hurry, you're not really checking, you're not thinking about it. So attackers know this, and they're going to send you something you really don't want, and they're going to provide a link to unsubscribe. Probably don't click it. Instead, send it to spam. Send it to junk. Train your inbox to send that somewhere else where you don't have to worry about it. Even if the unsubscribe link isn't malicious, it can serve a different purpose. It can let attackers or scammers know that that email address is active. And might actually ramp up the amount of spam, scam emails, or newsletters you may get because people are interested in buying your email address if they know it's an active email address. So now you've just confirmed it, they might go sell it to some other people. It might actually increase the amount of spam you get. There is a service called unroll. me that can help consolidate and manage email subscriptions efficiently. It allows you to view all your subscriptions in one place and makes it easy to unsubscribe from them. Another thing you can do is use alias emails. So if you're an iPhone user, The iPhone will often prompt you to mask your email address. It's a good idea because you can delete that email address at any time. If you start getting spam from it, you can also use tools like fast mail or start mail, and just generate a new email address that forwards to your normal email address. This will also help protect you and your privacy online because they're not just mapping one email address to your identity. Now they have to map tons and tons to keep track of you. So it'll help reduce trackers on Google. It'll help reduce. The efficacy of certain attacks when your password is breached on the dark web. So for more tips and tricks, and for a further analysis on these scam emails, be Instagram later today. Cybersecurity firm Mandiant has exposed how the notorious Sandworm hacking group linked to Russian military intelligence, has camouflaged its cyberattacks by masquerading as hacktivist groups. The Russian ensemble, known by aliases such as Black Energy, Seashell Blizzard, and Voodoo Bear, has been active since 2009, and their operations are accredited to Unit 74455 of Russian's GRU. Mandian's latest findings suggest that Sandworm operates under several online personas to launch data leaks and disrupt operations. Notably, three hacktivist branded telegram channels named Zaxnet Team, Cyber Army of Russia Reborn, and SolSopec, that's Russian, have been instrumental in disseminating pro Russian narratives and misleading the audience about the origin of the cyberattacks. These personas act independently, yet share a common goal of aligning their activities with Russian interests. So, before we move on, just a quick note on hacktivism. There are a few main motivators for attackers when placing an attack. Money, power, fame. And activism is a pretty popular one. So to help give an idea of what a hacktivist organization would be like, it's maybe a pro Ukraine organization that's working to spread the truth about what's going on in a foreign war, and so they might be trying to actually hack the Russian government to help Ukraine, or something like that. Their motivation is not money, so they're not out there trying to get credentials to their bank accounts and stuff like that. They're trying to work towards their organization's mission, which is to spread the truth about foreign wars in favor of a certain country. So these Russian attackers that are responsible for many attacks on U. S. critical infrastructure, especially water utilities, are gaining footholds by pretending to be a hacktivist group. Maybe they're pro Russia, maybe they're pro Ukraine. They're doing what they can to try to sway public opinion in Russia's favor, which involves all sorts of propaganda that I'm not even aware of. But Mandiant's report extends beyond the facade of hacktivism. They have traced back multiple cyber incidents to Sandworm, including attacks on water utilities in the U. S. and Poland, and hydroelectric facilities in France. The authenticity of these intrusion remains under investigation, but confirmation of related malfunctions by U. S. utility officials lends proof. Furthermore, Sandworm's influence operations are designed to bolster Russian wartime objectives by seeding misinformation and creating an illusion of widespread support for the war. The sophistication of these tactics illustrates a strategic shift from direct sabotage in Ukraine, where they targeted critical infrastructure like state networks and the power grid, to a more nuanced cyber espionage and intrusion. influence operations. Mandiant also highlights APT44's activities over the past year including targeting NATO countries electoral systems and engaging in intelligence collection to aid Russian military efforts. The threat posed by APT44 is severe, with ongoing operations focused on Ukraine and an elevated risk of interference in upcoming national elections and significant political events worldwide. So this election season, especially in the United States, is going to be absolutely crazy. The simplicity of access that these foreign, quote, hacktivists or propaganda pushers have over the United States is huge. It's palpable. They can just create TikToks about something you're interested in, which is Ukraine and the things that are happening in this foreign war, and you share it, and the more it gets shared, the more validity it accumulates in people's eyes. And this rapid consumption of social media has almost completely forgotten about citing sources or doing any sort of further research into what you just saw on a 60 second video clip. So I encourage you personally to, I mean, first of all, don't spend too much time on social media. If you get, if you catch yourself doom scrolling, try to get off and go on a walk. And second of all, think about everything you watch as if it were a lie. How could this video be lying to you right now? How could this video be stretching the truth? You know, are these videos actually shot where they are? Are they in front of a green screen? What sources do these people have? to claim what they're saying. Is what they're saying promoting a specific narrative? Maybe for Russia, maybe for Ukraine. And if so, that increases the likelihood that what they're saying is stretched or slightly untrue. So just as we have to look at every email with a lot of scrutiny, make sure we don't click any bad links, we also have to look at everything we consume because our brains are very vulnerable to what we see. And the internet right now is just pushing what we already believe, further enforcing our misbeliefs. There's been a notable spike in brute force attacks globally, as reported by Cisco. Specifically targeting devices such as VPNs, or virtual private networks, web application authentication interfaces, and SSH services. Cisco Talos experts pinpointed that these attacks have been originating from Tor exit nodes and various anonymizing tunnels and proxies since at least March 18th of 2024. The implication of these attacks are serious, potentially leading to unauthorized network access, account lockouts, or even denial of service conditions. A range of devices have come under siege, including popular VPN solutions like Cisco Secure Firewall VPN, Checkpoint, Fortinet, SonicWall, along with RD web services and brands such as Mikrotik, Draytek, and Ubiquiti. Stomp's foot on Ubiquiti. Cisco Talos has identified that the brute forcing attempts not only utilize generic credentials, but Also valid usernames tied to specific organizations, indicating a methodical approach to this cybersecurity threat. The attack traffic, as analyzed, predominantly flows through known proxy services such as TOR, VPNgate, IPDEA proxy, BigMama proxy, SpaceProxies, NexusProxy, ProxyRack, etc. And details on the IP addresses and the credentials used in these attacks have been compiled and made accessible for the concerned parties to bolster their defenses. So check out the show notes if you want more IOCs of this, so that you can maybe set up some signature detections or behavior detections, etc. In parallel to these brute force incidents, Cisco has raised alarms about password spray attacks, etc. targeting remote access VPN services as well. This trend was highlighted alongside a recent disclosure from Fortinet FortiGuard labs reporting the exploitation of a patched vulnerability in TP Link Archer AX21 routers by DDoS botnet malware facilities. Which brings us back to our SoHo days, right? If you're running one of these routers, make sure it's patched. Make sure your home router is up to date. You don't want to be getting DDoS'd by a botnet. Or you don't want to be part of the botnet that does the de tossing, excuse me. Security researchers, Cara Lin and Vincent Lee from FortiGuard Labs underscore the continuous threat posed by botnets, which exploit IOT vulnerabilities relentlessly. They strongly advise users to remain vigilant against DDoS botnets and to apply patches promptly. Cisco has provided several recommendations to mitigate the risks associated with these type of cyberattacks. These include enabling logging, okay, securing default remote access VPN profiles, and blocking connection attempts from identified malicious sources. Specific guidance involves implementing interface level ACLs using the shun command and configuring control plane ACLs to further fortify network defenses against unauthorized access attempts. Moreover, Cisco suggests considering additional hardening implementations for RAVPN, such as adopting certificate based authentication to enhance the security posture against these ongoing cyber threats. So I will definitely be taking a. Much deeper look at these IOCs for my own personal network, because yeah, this can apply to enterprises and this can apply to tech enthusiasts who set up VPNs to access their own home network. So let's, uh, not to point any fingers at myself, but that's definitely something I want to avoid being compromised. So if you're hearing this, IOCs in the show notes and let's stay ahead of this. And that's all we got for you today. Tomorrow, we're going to be releasing just a discussion episode about the key takeaways from HackspaceCon, which occurred last weekend. The two co hosts from this podcast were lucky enough to be able to attend and boy, were we inspired. So if you're interested in hacking satellites or what kind of vulnerabilities satellites have. Or other things that I never considered from a non space background. Be sure to check that episode out tomorrow.

Cyber Security Headlines
Water utility threats, GPT-4 hacking, SIM swap solicitation

Cyber Security Headlines

Play Episode Listen Later Apr 18, 2024 7:21


Sandworm-linked group tied to attack on water utilities GPT-4 reads security advisories Cell carrier workers solicited for SIM swaps Thanks to today's episode sponsor, Conveyor Conveyor is the market leading AI-powered platform that automates the entire customer security review process — from sharing your security posture and SOC 2 in a single portal to using that same information to automate answering security questionnaires with 90% accuracy.  Use Conveyor to fly through any customer security review in minutes. It might sound like every other software claim out there, but there's a reason our customers have dubbed Conveyor their ‘favorite security tool of the year'. Test it out in a free proof of concept at www.conveyor.com

Daily Tech Headlines
Mandian Links Hacktivist Group Cyber Army of Russia To Sandworm – DTH

Daily Tech Headlines

Play Episode Listen Later Apr 17, 2024


Google Maps adds more charging features for EV drivers, Snap plans to watermark AI images made with its tools, Take-Two halts some projects to cut costs. MP3 Please SUBSCRIBE HERE. You can get an ad-free feed of Daily Tech Headlines for $3 a month here. A special thanks to all our supporters–without you, none ofContinue reading "Mandian Links Hacktivist Group Cyber Army of Russia To Sandworm – DTH"

The Star Wars Archives by Youtini
TSWA - Sand 2 - Sandworm Bugaloo part 1

The Star Wars Archives by Youtini

Play Episode Listen Later Apr 7, 2024 63:46


To celebrate the release of Dune 2 in cinemas Jose and Trevor take a deep dive into the many points of comparison between Dune and Star Wars and try to determine once and for all exactly how much George Lucas was influenced by Frank Herbert's books.

The Star Wars Archives by Youtini
TSWA - Sand 2 - Sandworm Boogaloo part 2

The Star Wars Archives by Youtini

Play Episode Listen Later Apr 7, 2024 72:36


To celebrate the release of Dune 2 in cinemas Jose and Trevor continue their deep dive into the many points of comparison between Dune and Star Wars and try to determine once and for all exactly how much George Lucas was influenced by Frank Herbert's books.

The Succ
Ep. 97 - Step-Sandworm, What are You Dune 2 My Peanits?

The Succ

Play Episode Listen Later Apr 2, 2024 34:52


Jason, Matt, Ash and Phil take a detour into talks of clown motels in Philadelphia, Wrestlemania, horny video games, and the merits of Dune's lore, specifically sucking off sandworms. Oh, and a little bit of talk about Elon Musk phrenology and another installment of Shitposter of the Week.

Laugh It Up Fuzzball
Laugh It Up Fuzzball #391 – Right hand Sandworm Left hand Falcon

Laugh It Up Fuzzball

Play Episode Listen Later Apr 1, 2024 60:21


Welcome to the place where we get to let our geek flags fly and talk about all things geek. Basically a fuzzy guide to life, the universe, and everything but mostly geek stuff. This level of the podcast is the return of Blue Sessions and includes: Acolyte poster John Williams interview with Variety Beetlejuice Beetlejuice trailer - 6 Sep House of the Dragon S2 trailers - Jun 16 Wonder Man and Ironheart will see the light of day Billy Dee Williams re: Lando Furiosa trailer - May 24 Interview with the Vampire S2 trailer - May 12 X-Men ‘97 premiere earns 100% on Rotten Tomatoes Tennessee passed ELVIS act to ensure artist protection from AI Disney+ to stream Macross anime The Penguin teaser - on Max this Fall The Phantom Menace popcorn buckets and soda cups Lucasfilm partners with TruMoo for real blue milk in grocery stores starting April 17 RIP Chance Perdomo - age 27 Dragon Ball theme park in Saudi Arabia Doctor Who S1 trailer - May 10 Batman attacking the first Death Star Kenobi physical release calls it a limited series Asajj Ventress voice actor teases more stories Leslye Headland teases second season for Acolyte Disney releases merch, events, and more for their Season of the Force Obi Wan Kenobi's nickname tied to Duchess Satine Jake Lloyd's mom says his health has improved and he still loves Star Wars Defending America and the Galaxy: Star Wars and the Strategic Defense Initiative Rebel Moon - Part Two: The Scargiver premieres April 19 Wish on Apr 3 More Trailers: Alien Romulus (Aug 16) / Fall Guy (May 3) NeverEnding story reboot Popeye live action First annual Chronic Con in Chicago, October 11-13, 2024 Bob Iger believes Deadpool & Wolverine will be successful Steven Moffat penned one of the new Dr Who episodes and talks about new season RIP Louis Gossett Jr. - age 87 Geeky watches plus brief non-spoiler thoughts: The Simpsons S35 Ep 13-? / The Marvels / Captain Marvel / Cinderella / Beauty and the Beast / Princess and the Frog / the end of Iron Man 2 tonight / a whole bunch of Doctor Who / The Bad Batch S3 Ep 8-9 / X-Men ‘97 Ep 1-3 / Shogun Ep 5-6 / Manhunt Ep 2-4 / Invincible S2 Ep 5-6 / Mean Girls / Ghostbusters: Frozen Empire / Napoleon / Masters of the Air Ep 1-2 Congrats on completing Level 391 of the podcast! Think positive, test negative, stay safe, wash your hands, wear a mask, and good luck out there. Feel free to contact me on Twitter and/or Instagram (@wookieeriot). You can also reach the show by e-mail, laughitupfuzzballpodcast@gmail.com., or by joining the Facebook group (https://www.facebook.com/groups/1879505335626093). I'd love to hear from you. Merch is available at teepublic.com/user/laugh-it-up-fuzzball. Also subscribe to the feed on Apple podcasts, Google podcasts, Stitcher, Breaker, IHeartRadio, RadioPublic, Spotify, or any of the apps which pull from those sources. Go do your thing so I can keep doing mine. If you feel so inclined, drop a positive rating or comment on those apps. Ratings help others find the madness. Tell your friends, geekery is always better with peers. Thank YOU for being a part of this hilarity! There's a plethora of ways to comment about the show and I look forward to seeing your thoughts, comments, and ideas. May the force be with us all, thanks for stopping by, you stay classy, be excellent to each other and party on dudes! TTFN… Wookiee out! --- Send in a voice message: https://podcasters.spotify.com/pod/show/laugh-it-up-fuzzball/message Support this podcast: https://podcasters.spotify.com/pod/show/laugh-it-up-fuzzball/support

Nightmare Now
Real Dune Sandworms and Their Cryptid Cousins

Nightmare Now

Play Episode Listen Later Apr 1, 2024 58:49


Just-Us Losers
Issue #285 - "Dune 2 Review"

Just-Us Losers

Play Episode Listen Later Mar 26, 2024 66:22


March 25, 2024 - We're back! After a hiatus that was exactly as long as we intended, Preston and Batmatt have returned to give you their thoughts about Dune 2. Spoiler warning throughout, so be sure to watch the movie first, and then come back and share all of your thoughts with us!Don't forget to subscribe and follow us!iTunes: https://itunes.apple.com/us/podcast/just-us-losers/id1241054006?mt=2Spotify: https://open.spotify.com/show/0vICUJjEJL5NDV66fJ9gjg?si=eHuOPj52QBWSYsB762uVwgFacebook: https://www.facebook.com/JustUsLosersPodcast/Twitter: https://twitter.com/JustUsLosersPod Instagram: https://www.instagram.com/justusloserspod/?hl=en Email: JustUsLosersPod@gmail.comYouTube: https://www.youtube.com/channel/UCk_xEkEnx9xqhg_qpI9o8kwREM Homepage: https://remproductions.net/ 

The Security Detail
Ep. 6: Electric featuring Robert M. Lee, CEO and Co-Founder of Dragos

The Security Detail

Play Episode Listen Later Mar 13, 2024 54:26


Cybersecurity is crucial for the electric sector to safeguard critical infrastructure from cyber threats and potential disruptions, ensuring the reliable and secure delivery of electricity to homes, businesses, and essential services. In episode 6, Robert M. Lee, CEO and Co-Founder of Dragos provides an overview of the top cyber threats facing electric utilities and the role that Dragos plays in strengthening ICS and OT resilience.   Resources:  Dragos Community Defense Program: https://www.dragos.com/community/community-defense-program/ Dragos 2023 OT Cybersecurity Year in Review report: https://www.dragos.com/ot-cybersecurity-year-in-review/ SANS Instructor Biography: https://www.sans.org/profiles/robert-m-lee/ Sandworm book: https://www.amazon.com/Sandworm-Cyberwar-Kremlins-Dangerous-Hackers/dp/0385544405 'U.S. Government Disrupts Botnet People's Republic of China Used to Conceal Hacking of Critical Infrastructure': https://www.justice.gov/opa/pr/us-government-disrupts-botnet-peoples-republic-china-used-conceal-hacking-critical 'Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation's Main Intelligence Directorate of the General Staff (GRU)': https://www.justice.gov/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian 'A Global Police Operation Just Took Down the Notorious LockBit Ransomware Gang': https://www.wired.com/story/lockbit-ransomware-takedown-website-nca-fbi/ 'Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology': https://www.mandiant.com/resources/blog/sandworm-disrupts-power-ukraine-operational-technology The Five ICS Cybersecurity Critical Controls: https://www.sans.org/white-papers/five-ics-cybersecurity-critical-controls/ SECURING OPERATIONAL TECHNOLOGY: A DEEP DIVE INTO THE WATER SECTOR: https://homeland.house.gov/hearing/securing-operational-technology-a-deep-dive-into-the-water-sector/

The Weedsmen Potcast
Dune 2: Sandworm Boogaloo

The Weedsmen Potcast

Play Episode Listen Later Mar 13, 2024


On this week’s show Chris and Aaron talk about: lost podcasts, a semi-legal Vape Distributor explodes (literally), Dune 2, and Drive-Away Dolls (Dykes). Please follow us on Twitter @TheWeedsmen420, Instagram @TheWeedsmenPotcast, and on Facebook at Facebook.com/TheWeedsmenPotcast/ Download the rest of our shows at ChristopherMedia.net The post Dune 2: Sandworm Boogaloo first appeared on Christopher Media.

Scenecraft
Dune: Part Two (Scene: Riding the Sandworm) + Pro Take: Greig Fraser - Cinematographer

Scenecraft

Play Episode Listen Later Mar 11, 2024 76:11


In this episode of Scenecraft, we break down the "Riding the Sandworm" sequence from Dune: Part Two (2024), directed by Denis Villeneuve. We are also joined by Greig Fraser, Cinematographer on the film, for his "Pro Take" at the end of the episode! Drop us a line at contact@scenecraftpodcast.com, or follow us on Instagram, X, TikTok, and Threads @scenecraftpodcast for the latest news on the show. YouTube soon to launch! — Show Notes — Quick Takes ~ 00:00:56 Drive Away Dolls (2024), Shortcomings (2023), The Piano Teacher (2001), Atlanta (2016-2022), Wonka (2023), Nyad (2023) Dune: Part Two (General Review) ~ 00:16:00 Scene Selection ("Riding the Sandworm") ~ 00:24:39 Pro Take (Greig Fraser – Cinematographer) ~ 00:53:26 Thanks for listening!

Shouting Into the Void
Ep.172 Can We Make a Better Sandworm?

Shouting Into the Void

Play Episode Listen Later Mar 11, 2024 70:33


In this one, Mike and Cody are looking for a replacement for the sandworms of Arrakis. Its pretty much that simple. Look, not every description or episode concept needs a long description or lead up. Some episodes are just as simple as answering the questions, and this is one of those. No big deal. JEEZNEW SITV MERCH!JOIN THE PATREON!https://linktr.ee/sitvpodAlbum art by @haileycomet_tattoo Support the show

Movies On The Rocks
SPECIAL EPISODE: DUNE PART 2 -- JUSTIN BIEBER W/SPECIAL GUEST

Movies On The Rocks

Play Episode Listen Later Mar 9, 2024 134:42


WOW!!!! DUNE PART 2!! This movie did not disappoint and neither did our guest. Eric came back for this special episode to talk about one of our fave movie series and one of our fave directors. I don't want to say too much, but it was great catching up and talking about not only a great scifi/fantasy film but possibly the next best picture winner (at least in my opinion). In any case, listen to this episode with a glass of your own water of life and then go out to see the movie on your own. As always, we do this with drink in our hearts and a SANDWORM in our hearts!!! LONG LIVE THE FIGHTERS!!! INTRO: PEG & THE REJECTED -- ALL SING ALONG REFILL: SHAOLIN DUB -- SKANKING IT EASY DUB OUTRO: DISTEMPER -- HAPPY END EMAIL : MOVIESONTHEROCKS2020@GMAIL.COM INSTAGRAM: @moviesrockpodcast

The First Run
TFR Ep. 698: Dune Part II, Lisa Frankenstein, 2024 Oscars Predictions

The First Run

Play Episode Listen Later Mar 8, 2024 53:58


This week on The First Run, Chris and Matt saddle up a grand poppa Sandworm and ride into Dune-iverse with Dune Part 2. While it's Christmas morning for Matt, after Part 1, Chris felt like he needed to see Part 2 in order to get the whole experience. Whelp, swing and a miss on that one. As we're clearly in the middle of a larger story, how does Dune Part 2 measure up against the great second films in sci-fi cinematic history? Or should Chris cut the spice intake and chill a bit. Then it's on to the comedy/horror mash up, ‘Lisa Frankenstein'. Does Zelda Williams' directorial debut spark to life? There's spice-y rundown of the big releases on Physical Media, featuring the Streaming and Straight to DVD Picks of the Week. Then Matt and Chris help you fill out your Oscars bracket with their picks that will win and which picks deserve to win. So fire up your 5 layer bean dip as you prep your Oscars Party. It's The First Run! 00:00-21:23: Intro/Dune Part 221:24-30:30: Physical Media Picks30:31-37:59: Lisa Frankenstein38:00-52:44: 2024 Oscars Picks52:45-53:58: Wrap UpTheme music by Jamal Malachi Ford-Bey

Living for the Cinema
DUNE PART II (2024)

Living for the Cinema

Play Episode Listen Later Mar 1, 2024 19:50 Transcription Available


Since we are apparently still several years away from the next Star Wars or Star Trek movie on the big screen, director Denis Villeneuve has given us the next best thing....or maybe something even better? :) This long-awaited sequel to the Oscar nominated sci-fi blockbuster Part 1 picks up EXACTLY where the previous film left off.....Paul (Timothee Chalomet) and Jessica (Rebecca Ferguson) now venturing on the desert planet of Arrakis (otherwise known as Dune) with the Fremen tribe lead by Javier Bardem's Stilgar while also becoming getting more acquainted with Chani played by Zendaya.  And of course a burgeoning war begins to escalate with the Harkonnens who have violently taken over the desert planet lead by the Baron played by Stellan Skarsgard.  Also including in this stacked cast are Florence Pugh, Josh Brolin, Christopher Walken, Dave Baustista, and Austin Butler.  LONG LIVE THE FIGHTERS!Host & Editor: Geoff GershonProducer: Marlene Gershon https://livingforthecinema.com/Facebook:https://www.facebook.com/Living-for-the-Cinema-Podcast-101167838847578Instagram:https://www.instagram.com/livingforthecinema/Letterboxd:https://letterboxd.com/Living4Cinema/

Indiewire: Screen Talk
Dune: Part 2... How Do You Ride a Sandworm? (Episode 471)

Indiewire: Screen Talk

Play Episode Listen Later Feb 23, 2024 27:16


Anne Thompson and Ryan Lattanzio give their first impressions on Dune: Part 2 and recap the BAFTA's. Learn more about your ad choices. Visit megaphone.fm/adchoices

LPN Deep Dives: Dune
LPN Deep Dives: Dune / Episode 4: Ride It, My Sandworm

LPN Deep Dives: Dune

Play Episode Listen Later Feb 16, 2024 59:43


Venturing onward, we approach the end of the first book of Dune as Henry and Holden intensely break down the unexpected events that lead to the downfall of the Empire while our frail yet powerful Paul realizes the "horrible burden of his terrible purpose"...| Dune Theater Cast |HENRY ZEBROWSKI as BARON HARKONNEN |HOLDEN MCNEELY as SHADDAM IV |JACKIE ZEBROWSKI as ALIA ATREIDES |Produced  & Remastered by Rob Okey - 2024Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License creativecommons.org/licenses/by/3.0

Double Deuce podcast
432: Lil' Juggernauts

Double Deuce podcast

Play Episode Listen Later Feb 11, 2024 26:22


Superbowl Sunday zoom from the future past! The Notes: It's Superbowl Sunday! Will's on the Leroy Jenkins side of the spectrum! The attractiveness of juggernauts! Super Bowl Deuce! Steampunk 3 Musketeers! Ray Stevenson didn't suffer a phonebook to live! Dune 2! Sandworm fleshlights and other fuckable popcorn buckets! Quick What We're Watching to wrap it up! Woman in the Wall and Blue Eye Samurai! You fuckin' that popcorn!? Enjoy Football Christmas and we hope you're off work tomorrow for Football Boxing Day! Contact Us! Follow Us! Love Us! Email: doubledeucepod@gmail.com Twitter & Instagram: @doubledeucepod Facebook: www.facebook.com/DoubleDeucePod/ Patreon: patreon.com/DoubleDeucePod Also, please subscribe/rate/review/share us! We're on Apple, Android, Libsyn, Stitcher, Google, Spotify, Amazon, Radio.com, RadioPublic, pretty much anywhere they got podcasts, you can find the Deuce! Podcast logo art by Jason Keezer! Find his art online at Keezograms! Intro & Outro featuring Rob Schulte! Check out his many podcasts! Brought to you in part by sponsorship from Courtney Shipley, Official Superfans Stefan Rider and Amber Fraley, and listeners like you! Join a tier on our Patreon! Advertise with us! Check out the Lawrence Times's 785 Collective at https://lawrencekstimes.com/785collective/ for a list of local LFK podcasts including this one!  

The CyberWire
Russian hackers hide in Ukraine telecoms for months.

The CyberWire

Play Episode Listen Later Jan 4, 2024 32:00 Very Popular


Sandworm was in Kyivstar's networks for months. Museums face online outages. Emsisoft suggests a ransomware payment ban. An ambulance service suffers a data breach. Mandiant's social media gets hacked. GXC Team's latest offerings in the C2C underground market. 23andMe blames their breach on password reuse. Lawyers are using outdated encryption.  On today's Threat Vector segment, David Moulton chats with Garrett Boyd,  senior consultant at Palo Alto Networks Unit 42  about the importance of internal training and mentorship in cybersecurity. And in Russia, holiday cheers turn to political jeers.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On today's Threat Vector segment with David Moulton features Garrett Boyd, a senior consultant at Unit 42 by Palo Alto Networks with a background as a Marine and professor, discusses the importance of internal training and mentorship in cybersecurity. He provides insights into how training prepares professionals for industry challenges and how mentorship fosters professional growth and innovation. Garrett emphasizes the need for a mentorship culture in organizations and the responsibility of both mentors and mentees in this dynamic. The episode highlights the transformative impact of mentorship through personal experiences and concludes with an invitation for listeners to share their stories and a reminder to stay vigilant in the digital world. Threat Vector To learn what is top of mind each month from the experts at Unit 42 sign up for their Threat Intel Bulletin.  Selected Reading Compromised accounts and C2C markets. Cyberespionage and state-directed hacktivism. (CyberWire) Exclusive: Russian hackers were inside Ukraine telecoms giant for months (Reuters) Hackers linked to Russian spy agency claim cyberattack on Ukrainian cell network (reuters) Museum World Hit by Cyberattack on Widely Used Software (The New York Times) The State of Ransomware in the U.S.: Report and Statistics 2023 (Emsisoft) Nearly 1 million affected by ambulance service data breach (The Record) Mandiant's account on X hacked to push cryptocurrency scam (Bleeping Computer) Cybercriminals Implemented Artificial Intelligence (AI) For Invoice Fraud (Resecurity) 23andMe tells victims it's their fault that their data was breached (TechCrunch+) The Curious Case of MD5 (katelynsills) Firmware prank causes LED curtain in Russia to display ‘Slava Ukraini' — police arrest apartment owner (The Record) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

The CyberWire
Hacktivists assemble to attack Pennsylvania water utility.

The CyberWire

Play Episode Listen Later Nov 27, 2023 20:49


Iranian hacktivists claim an attack on a Pennsylvania water utility. North Korea's increased attention to supply-chains. Rhysida's action against British and Chinese targets. Sandworm activity puts European power utilities on alert. Neanderthals and the Telekopye bot. Mirai-based botnet activity. Our guest is Chris Betz, the new CISO of AWS Security, with insights on the upcoming AWS re:Invent conference. And just how easy is it to track the comings and goings at Mar-a-Lago? CyberWire Guest Our guest today is Chris Betz, the new CISO of AWS Security giving us some insight into what to expect at the AWS re:Invent conference. You can connect with Chris on LinkedIn and find out more about AWS re:Invent on the event website. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/224 Selected Reading Municipal Water Authority of Aliquippa hacked by Iranian-backed cyber group (KDKA News) Iranian-linked cyber army had partial control of Aliquippa water system (Beaver Countian) Cyber Av3ngers Claim Israeli MEKOROT National Water Company Hack (Cyberwarzone) A hack in hand is worth two in the bush (Securelist by Kaspersky) Diamond Sleet supply chain compromise distributes a modified CyberLink installer (Microsoft) UK and Republic of Korea issue warning about DPRK state-linked cyber actors attacking software supply chains (National Cyber Security Centre) Rhysida (SentinelOne) Rhysida, the new ransomware gang behind British Library cyber-attack (The Guardian) RHYSIDA RANSOMWARE GANG CLAIMED CHINA ENERGY HACK (Security Affairs) #StopRansomware: Rhysida Ransomware (CISA) Russia continuing cyberthreats against NATO countries (Defence Industry Europe) Europe's grid is under a cyberattack deluge, industry warns (Politico) Telekopye: Chamber of Neanderthals' secrets (ESET) InfectedSlurs Botnet Spreads Mirai via Zero-Days (Akamai) We Spied on Trump's ‘Southern White House' From Our Couches (Rolling Stone)

The CyberWire
Shopping during wartime? Focus, people.

The CyberWire

Play Episode Listen Later Nov 16, 2023 29:38


Cyber safety for the holidays. Using regulatory risk to pressure a ransomware victim. A call for regulatory action against a supply chain threat. Rhysida malware: a warning and a description. Extending local breaches in Google Workspace. Protestware in open-source products. GRU's Sandworm implicated in campaign against Danish electrical power providers. Jason Meller, Founder & CEO of Kolide joins us as part of our sponsored Industry Voices segment to discuss the findings from The Shadow IT Report. In this Threat Vector segment, David Moulton sits down with Sama Manchanda, a consultant at Unit 42 to discuss the fascinating world of social engineering attacks. And donation scams: exploiting sympathy. In this Threat Vector segment, David Moulton engages in an enlightening conversation with Sama Manchanda, a consultant at Unit 42. The duo embarks on an exploration of the fascinating world of social engineering attacks, delving into the distinct characteristics of phishing, smishing, and vishing. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/219 Threat Vector Please share your thoughts with us for future Threat Vector segments by taking our brief survey. To learn what is top of mind each month from the experts at Unit 42 sign up for their Threat Intel Bulletin.  Selected reading. New Visa Report Tells Consumers to Stay Alert this Holiday Shopping Season (Business Wire) Ransomware gang files SEC complaint over victim's undisclosed breach (BleepingComputer) 11-14-2023 EFF Letter to FTC re: Malware on Android TV Set-Top Boxes (EFF) #StopRansomware: Rhysida Ransomware (Cybersecurity and Infrastructure Security Agency | CISA) Investigating the New Rhysida Ransomware (Fortinet Blog) Analyzing Rhysida Ransomware Intrusion (Fortinet Blog) The Chain Reaction: New Methods for Extending Local Breaches in Google Workspace (Bitdefender) Protestware taps npm to call out wars in Ukraine, Gaza (ReversingLabs) Russia's Sandworm Linked to Unprecedented Danish Energy Hack (Bloomberg). Russian Hackers Linked to 'Largest Ever Cyber Attack' on Danish Critical Infrastructure (The Hacker News) Denmark hit with largest cyberattack on record (Cybernews) Attackers Exploit Crisis for Fraudulent Crypto Donations (Abnormal) Learn more about your ad choices. Visit megaphone.fm/adchoices