POPULARITY
Tom Bonner and Eoin Wickens from HiddenLayer's SAI Team to discuss their research on weaponizing machine learning models with ransomware. Researchers at HiddenLayer's SAI Team have developed a proof-of-concept attack for surreptitiously deploying malware, such as ransomware or Cobalt Strike Beacon, via machine learning models. The attack uses a technique currently undetected by many cybersecurity vendors and can serve as a launchpad for lateral movement, deployment of additional malware, or the theft of highly sensitive data. In this research the team raising awareness by demonstrate how easily an adversary can deploy malware through a pre-trained ML model. The research can be found here: WEAPONIZING MACHINE LEARNING MODELS WITH RANSOMWARE
Tom Bonner and Eoin Wickens from HiddenLayer's SAI Team to discuss their research on weaponizing machine learning models with ransomware. Researchers at HiddenLayer's SAI Team have developed a proof-of-concept attack for surreptitiously deploying malware, such as ransomware or Cobalt Strike Beacon, via machine learning models. The attack uses a technique currently undetected by many cybersecurity vendors and can serve as a launchpad for lateral movement, deployment of additional malware, or the theft of highly sensitive data. In this research the team raising awareness by demonstrate how easily an adversary can deploy malware through a pre-trained ML model. The research can be found here: WEAPONIZING MACHINE LEARNING MODELS WITH RANSOMWARE
(Photography by Tom Bonner, courtesy of Aquarium of the Pacific.) "We know what to do," says Aquarium of the Pacific President and CEO Dr. Peter Kareiva. He's talking about the ways communities can collaborate on combating climate change. And those activities will be the focus of a brand-new course which the Aquarium is offering, this autumn, in partnership with Orange Coast College. Entitled "Ocean Conservation and Community Science", the course is geared towards high-school students. Class sessions will happen at the Aquarium, two nights a week, starting August 30th, according to the Aquarium's website. The course is free to high-school students, who will receive three units of college credit. Labs and optional field trips will accompany the class sessions. A mission beyond the classroom (Photograph by Cassandra Davis, courtesy of Aquarium of the Pacific.) More importantly, though, the curriculum will provide discourse with conservation specialists and hands-on activities. The goals: to reach students who might otherwise not have the opportunity to discover their own personal connections with nature--and to give back to the community. That "giving back" element comes with encouraging the students to continue to act on that connection, long after the final class session has concluded. In fact, Dr. Kareiva, who will be the lead instructor, says the new course may very well open the door to careers which students hadn't previously considered. Dr. Kareiva and a number of conservationists will be sharing both their expertise. and the ways in which their talents led to their current career path. And these will be two-way conversations, with students encouraged to share their ideas and get involved in labs and hands-on activities. (Photograph by Eileen Delrosario, courtesy of Aquarium of the Pacific.) Arts-oriented students, especially, may be surprised to discover the ways their talents could fit into a science career with a focus on conservation. "I think everybody's a conservationist at heart," Dr. Kareiva explains. ("No one wants to destroy the planet.") While the course is currently full, Dr. Kareiva says there is a wait list available. In addition, his vision is an expansion of this class, to include other communities and universities, in the future. Dr. Kareiva offered a preview of the new course. discussed the Aquarium's conservation activities, and shared his perspectives on taking action to heal the environment. On this edition of Over Coffee® we cover: How Dr. Kareiva became inspired to focus his talents as a scientist on conservation; The goals of the new course and how it differs from a traditional "class"; What students will experience in "Ocean Conservation and Community Science"; Why "community conservation" is effective; The real-world interactive experiences available to students; How to get on the waitlist; How Dr. Kareiva has observed young Aquarium visitors connecting with nature; The ways in which we engage with conservation in a personal way; How programs like the new class can inspire youth to explore science careers that might otherwise have never occurred to them as possibilities; The roles arts-oriented students might want to consider in future conservation-oriented careers; How the new course reflects the ways in which the education field is evolving; Dr. Kareiva's future vision for the course; Our best chance at addressing the problems of climate change; How youth volunteers are applying their talents to conservation efforts; How an early study illustrated the power of effective communication in educating the public about climate change.
This week, Glebe chairman Rocky McMillan gives us the inside track on why he sacked manager Harry Hudson, the support he's received this week and the future for the club. Dartford captain Tom Bonner reflects on their good form and hopes for the rest of the season, and we look ahead to a massive game at the top of National League South. Plus we've got all the rest of the news from across the county and some - but not as much as usual - of the usual chat, including the storm, poker and being alone in a big department store. See acast.com/privacy for privacy and opt-out information.
The BlackBerry Cylance 2020 Threat Report contains a broad range of topics vital to the interests of anyone with a computer. The report is drivey by veterans of the security industry from BlackBerry and Cylance. The goal of the report is to make security information, predictions, and lessons learned accessible to everyone, regardless of role or title. The 2020 Threat Report examines 2019’s major security breaches and considers recent advancements that may prevent past mistakes from repeating. We have gathered some of the researchers for a discussion about what went into the report… and what you can get out of it. This special episode of InSecurity takes a look at the cybersecurity threats of 2019 through a conversation with Threat Researchers Ebudo Osime, Anuj Soni & Tom Bonner. We examine BlackBerry Cylance’s research on all things cybersecurity for the prior year in order to get a handle on the coming years. We’re not selling products… we’re putting our experts to work to analyze the prior year in order to see what might be coming… About Ebudo Osime Ebudo Osime is a Threat Intelligence Analyst at BlackBerry. She is a threat intelligence advocate, threat hunter, researcher and an engineer with over 4 years in security. She has previously worked in IT Project Management, IT Consulting with Ernst and Young, Network and Security Operations. Ebudo Received her GIAC certification in Threat Intelligence and holds a Masters in Electronic Systems Engineering with a specialization in creating secure protocols for detecting denial of service attacks in IoT networks. About Anuj Soni Anuj Soni (@asoni) is a Senior Threat Researcher at BlackBerry Cylance. In addition to his corporate work, he is a SANS Certified instructor. Anuj has over 15 years of experience in the world of cybersecurity including previous stops at Booz Allen Hamilton where he worked as an Incident Response & Malware/Forensic Analyst About Tom Bonner Tom Bonner (@thomas_bonner) is a Director of Threat Research: BlackBerry Cylance. With over 18 years of experience in the security industry, including stops at HP Enterprise, Promon AS and Norman Shark… Tom helped design the block, build the block and has definitely been around the Cybersecurity block About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
The KM sports team's latest #kent #football #podcast with #dartford defender Tom Bonner. He talks about #playoff campaigns, #promotion and #wembley. Bonner reveals why he joined #ebbsfleet instead of #dover, playing for #camUTD and #ntfc as well as what really happened before the play-off final versus #maidstone in 2016.
Researchers at Blackberry Cylance have been tracking payload obfuscation techniques employed by OceanLotus (APT32), specifically steganography used to hide code within seemingly benign image files. Tom Bonner is director of threat research at Blackberry Cylance, and he joins us to share their findings. The original research can be found here: https://www.cylance.com/en-us/lp/threat-research-and-intelligence/oceanlotus-steganography-malware-analysis-white-paper-2019.html The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.
Researchers at Blackberry Cylance have been tracking payload obfuscation techniques employed by OceanLotus (APT32), specifically steganography used to hide code within seemingly benign image files. Tom Bonner is director of threat research at Blackberry Cylance, and he joins us to share their findings. The original research can be found here: https://www.cylance.com/en-us/lp/threat-research-and-intelligence/oceanlotus-steganography-malware-analysis-white-paper-2019.html
The BlackBerry Cylance 2019 Threat Report The Cylance 2019 Threat Report represents the company’s piece of the overall cybersecurity puzzle It details the trends observed and the insights gained, and the threats Cylance’s consulting team, research team, and customers encountered over the past year Cylance shares this report in the hope that you will put it to good use in our collective ght against the rising tide of cyber attacks worldwide. The BlackBerry Cylance 2019 Threat Report provides unique findings drawn from our consulting engagements, threat research and intelligence efforts, and through feedback provided by Cylance customers. We share this information with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats. Join Matt Stephenson as he chats with Aditya Kapoor, Jim Walter and Tom Bonner about the cybersecurity trends, topics, and innovations that dominated the past year. The BlackBerry Cylance panel of experts offer additional insights into the discoveries drawn from our internal data, customer communications, threat research, and intelligence efforts. About Aditya Kapoor Aditya Kapoor is Head of Security Research and Innovation at Cylance. He joined Cylance three years ago as and is passionate about creating technologies that drive innovative features within products. He is currently focused on driving deeper program analysis for supercharging ML models, firmware security and analyzing current threat trends to drive innovative engineering solutions. Aditya speaks regularly at various conferences and firmly believes in the common cause of the security industry. Previously Aditya worked at McAfee/Intel for more than ten years as Research Architect where he reverse engineered malware, as well as designed several product technologies. About Jim Walter Jim Walter is a Senior Security Researcher with Cylance. He focuses on next-level attacks, actors, and campaigns as well as 'underground' markets and associated criminal activity. Jim is a regular speaker at cybersecurity events and has authored numerous articles, whitepapers and blogs specific to advanced/low-level threats. He joined Cylance following 17 years at McAfee/Intel Security running their Advanced Threat Research and Threat Intelligence teams and content streams. About Tom Bonner Tom Bonner (@thomas_bonner) is Director of Threat Research at Cylance. He has over 17 years' experience in the cyber security/anti-malware industry as an analyst, software developer and manager. As an experienced cybersecurity professional, that’s all we could get out of him. We feel lucky to have gotten that much. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceT Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
In today’s podcast, we hear that Huawei’s CFO was arrested in Vancouver on a US sanctions beef. Anonymous sources tell Reuters Chinese intelligence was behind the Marriott hack. A Flash zero-day is used in an attack against a Russian hospital. SamSam warnings and new US indictments. In the UK, Parliament releases internal Facebook emails that suggest discreditable data-use practices. Facebook says the emails are being taken out of context. And DDoS downs Illinois homework. Dr. Charles Clancy from VA Tech’s Hume Center on the ban of specific 5G hardware around the world. Guest is Tom Bonner from Cylance on the SpyRATs of Ocean Lotus. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_06.html Support our show