Podcasts about us cyber command

  • 115PODCASTS
  • 191EPISODES
  • 37mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • Jun 1, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about us cyber command

Latest podcast episodes about us cyber command

The CyberWire
Brandon Karpf: A sailor of the 21st century. [Transitioning service member] [Career Notes]

The CyberWire

Play Episode Listen Later Jun 1, 2025 11:27


Please enjoy this encore of Career Notes. Lieutenant in the US Navy and Skillbridge Fellow at the CyberWire, Brandon Karpf, knew he wanted to join the military at a young age. He achieved that through the US Naval Academy where he was a member of the men's heavyweight rowing team. Commissioned as a cryptologic warfare officer, Brandon was sent to MIT for a graduate degree where he experienced the exact opposite of the Naval Academy's highly structured life. Brandon's later work with both NSA and US Cyber Command helped him gain experience and cyber operations skills. As he transitions from active duty to civilian life, Brandon shares his personal challenges and struggles during that process. Through the DoD Skillbridge Fellowship program, Brandon's transition has him sharing his skills with the CyberWire. We thank Brandon for sharing his expertise and his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices

Risky Business News
Srsly Risky Biz: US Cyber Command to be unleashed

Risky Business News

Play Episode Listen Later May 8, 2025 21:24


Tom Uren and Patrick Gray talk about how the US is planning to take the gloves off in cyberspace and conduct much more aggressive offensive cyber operations. US responses to cyber espionage have not been very aggressive to date, but Tom is not convinced that cyber punches are required, so much as blows that really hurt. The pair also discuss TeleMessage, the Signal clone the Trump cabinet has been using. The app managed to sidestep certification and assessment processes and ended up being used by various agencies in the US government. And the White House. It's a mystery how this happened. This episode is also available on Youtube. Show notes

Federal Drive with Tom Temin
Cyber Command adapts to realities of constant digital conflict

Federal Drive with Tom Temin

Play Episode Listen Later May 1, 2025 7:32


US Cyber Command has come a long way in the past 15 years, and it's finally closing the gap between day to day operations and the strategic view of cyber. Federal News Network's Anastasia Obis reports.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Risky Business News
Between Two Nerds: Releasing the hounds on scam compounds

Risky Business News

Play Episode Listen Later Apr 28, 2025 31:23


In this edition of Between Two Nerds Tom Uren and The Grugq discuss the Southeast Asian criminal syndicates that run online scam compounds. Should organisations like US Cyber Command or the UK's National Cyber Force target these gangs with disruption operations? This episode is also available on Youtube. Show notes UN Office of Drugs and Crime on Southeast Asian transnational cyber scammers

Times Daily World Briefing
Trump's cyber purge a "priceless gift” to US enemies

Times Daily World Briefing

Play Episode Listen Later Apr 11, 2025 10:19


Donald Trump sacking General Timothy Haugh as head of the National Security Agency and US Cyber Command - after a conspiracist influencer accused him of disloyalty - has been described by a senior Democrat as a “priceless gift” to the US' enemies. Cyber security specialist Dr Tim Stevens considers whether the disruption opens up an opportunity for the likes of Russia and China, and what the risks are if an unqualified loyalist is put in place.The World in 10 is the Times' daily podcast dedicated to global security. Expert analysis of war, diplomatic relations and cyber security from The Times' foreign correspondents and military specialists. Watch more: www.youtube.com/@ListenToTimesRadio Read more: www.thetimes.com Picture: Getty Images Hosted on Acast. See acast.com/privacy for more information.

Risky Business
Risky Business #787 -- Trump fires NSA director, CISA cuts inbound

Risky Business

Play Episode Listen Later Apr 9, 2025 53:01


On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news: Oracle quietly cops to being hacked, but immediately pivots into pretending it didn't matter NSA and CyberCom leaders fired for not being MAGA enough US Treasury had some dusty corners it hadn't found China in yet, looked, found China in them …which is a great time to discuss slashing CISA's staffing Ransomware crews and bullet proof hosting providers are getting rekt, and we love it And Microsoft patches yet another logging 0-day being used in the wild. This episode is sponsored by Yubico, makers of Yubikey hardware authentication tokens. Yubico's Vice President of Solutions Architecture and Alliances Derek Hanson joins to discuss how the consumer-centric passkey ecosystem has become a real challenge for enterprises. One that Yubico is actually ideally positioned to solve. This episode is also available on Youtube. Show notes Oracle privately confirms Cloud breach to customers Oracle have finally issued a written notification to customers about their cybersecurity incident. Head of NSA and US Cyber Command reportedly fired | Cybersecurity Dive Trump fires numerous National Security Council staff - The Washington Post Trump administration under scrutiny as it puts major round of CISA cuts on the table | Cybersecurity Dive Hackers Spied on US Bank Regulators' Emails for Over a Year - Bloomberg This is how Jeffrey Goldberg got added to the Signal chat Cybercriminals are trying to loot Australian pension accounts in new campaign | The Record from Recorded Future News $500,000 stolen in Australian super fund data breach | Superannuation | The Guardian Australian regulator pulls licenses of 95 companies in effort to crack down on investment scams | The Record from Recorded Future News Everest ransomware group's darknet site offline following defacement | The Record from Recorded Future News On March 28, 2025, a threat actor leaked internal data from Medialand, a major bulletproof hosting (BPH) provider long linked to Yalishanda (LARVA-34). There's a ransomware group named DragonForce going around hacking its rivals. After Mamona and BlackLock, the group has now hacked RansomHub The DragonForce ransomware group hacked two rivals this month CISA, experts warn of Crush file transfer attacks as ransomware gang makes threats | The Record from Recorded Future News Kill Security Campaign Targets CrushFTP Servers National Vulnerability Database | NIST Microsoft patches zero-day actively exploited in string of ransomware attacks | CyberScoop Exploitation of CLFS zero-day leads to ransomware activity | Microsoft Security Blog Is The Sofistication In The Room With Us? - X-Forwarded-For and Ivanti Connect Secure (CVE-2025-22457)

Daily Kos Radio - Kagro in the Morning
Kagro in the Morning - April 4, 2025

Daily Kos Radio - Kagro in the Morning

Play Episode Listen Later Apr 4, 2025 116:44


Why pay more? For far less than the hourly rate of a psychiatrist, David Waldman can address much of the anxiety that you, and he, suffer beneath the surface of each day. Dollar for dollar, KITM sooths and informs better than most barbers, bartenders, or even Uber drivers. Try some today! While you're doing that, do something else! There's plenty to be done and you're the one to do it. You have to do it, no one else is going to do it, they are too busy doing their part. Don't make us tariff you. Yesterday, Donald K. Trump pitched the world into a steep nosedive, before parachuting out somewhere over the Doral golf course. What was he thinking? Great minds struggle to decipher and explain Trump's tariff calculations, failing to consider that tiny minds came up with it. Actually, it's not difficult to see that these tariffs are just another way to leverage and measure acquiescence and obsequence. How can the Democrats ever pull us out of this horrible spin? IEEPA! Don't ask Trump anything about SignalGate. Don't ask him about anything. Please don't ask him about his $5 million instant citizen gold card. Interim and future U.S. attorney for the District of Columbia, Ed Martin is as Trumpy as they come, alarming federal prosecutors across the political spectrum. There's no point along any spectrum unalarmed by Laura Loomer, who unfortunately has Trump's rear, uh, “ear” to whisper sweet enemy lists into. The 5th floor window that General Timothy Haugh, the director of the National Security Agency and US Cyber Command was shoved out of was in fact, not literal, as the deep state had all of office windows sealed due to “the environment”. South Koreans are still puzzling over why their leader declared martial law, while Americans are puzzling over how to get our justice system to work half as well as the South Korean's.

Risky Business News
Between Two Nerds: A European cyber command

Risky Business News

Play Episode Listen Later Mar 10, 2025 33:33


In this edition of Between Two Nerds Tom Uren and The Grugq talk about what Europe should do given that US security guarantees are evaporating. Should Europe grow its cyber capabilities, what it would get out of it and how should it go about doing it? This episode is also available on Youtube. Show notes Zero Day on the Trump Administration order that US Cyber Command stand down it's Russian cyber operations

IT Privacy and Security Weekly update.
EP 232.5 Deep Dive - See for Miles and Miles with The IT Privacy and Security Weekly Update for the Week Ending March 4th., 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Mar 6, 2025 18:56


How did Microsoft's Copilot expose private GitHub repositories, and what are the risks?Copilot accessed over 20,000 private GitHub repositories due to cached data from when they were public. Even after repos were made private, Copilot could still generate responses using this cached data, risking exposure of sensitive information like credentials and corporate secrets.What is the "nRootTag" exploit in Apple's Find My network?The "nRootTag" exploit allows attackers to track Bluetooth devices like AirTags without owners knowing. While AirTags use cryptographic keys to change Bluetooth addresses, attackers can rapidly compute these keys using GPUs, achieving a 90% tracking success rate.Why is the UK demanding an iCloud backdoor, and how has Apple responded?The UK wants access to encrypted iCloud data for law enforcement, but Apple opposes it, withdrawing its Advanced Data Protection from the UK. The US has also criticized the demand as a privacy and legal overreach.Why is Signal withdrawing from Sweden?Signal is leaving Sweden over proposed laws requiring backdoor access to encrypted chats. The company refuses to weaken encryption, emphasizing its commitment to user privacy.Why has the US reportedly halted offensive cyber operations against Russia?The US Cyber Command, under Defense Secretary orders, has paused cyber attacks on Russia, possibly for diplomatic reasons. Supporters see it as de-escalation; critics worry it weakens deterrence against Russian cyber threats.Why has Australia banned Kaspersky Lab products?Australia banned Kaspersky from government systems, citing espionage and foreign interference risks. The move signals concerns over antivirus software's deep system access and the company's Russian ties.How was a Cellebrite exploit used to hack a Serbian student's phone?A Cellebrite zero-day targeting Android's Linux kernel USB drivers allowed attackers with physical access to bypass the lock screen. This raises concerns over surveillance tools being misused against activists.What changes did Mozilla make to Firefox Terms of Use, and why was there backlash?Mozilla initially claimed broad rights over user-submitted content, sparking fears of data monetization. After criticism, they revised the terms, clarifying user ownership and denying AI data harvesting.

Risky Business News
Srsly Risky Biz: Starlink an internet lifeline for pig butchering compounds

Risky Business News

Play Episode Listen Later Mar 6, 2025 22:03


In this podcast Tom Uren and Patrick Gray discuss how Starlink is providing an internet lifeline for scam compounds that have had their internet access cut by Thai authorities. Starlink has a very poor track record dealing with unauthorised use, but it is time for the company to develop the processes to keep on top of these problems. They also discuss how President Trump's actions that favour Russia will make Five Eyes partners take stock, particularly when it comes to HUMINT intelligence sharing. Finally they examine the did-it-happen-or-not stand-down of US Cyber Command's Russian operations. This episode is also available on Youtube. Show notes

The Deep Dive Radio Show and Nick's Nerd News
US Cyber Command is standing down on Russia...

The Deep Dive Radio Show and Nick's Nerd News

Play Episode Listen Later Feb 26, 2025 12:46


this doesn't seem like a wise move...

AZ Tech Roundtable 2.0
Cybersecurity Response Plan w/ Frank Grimmelmann of ACTRA - AZ TRT S06 EP03 (264) 2-9-2025

AZ Tech Roundtable 2.0

Play Episode Listen Later Feb 25, 2025 49:14


  Cybersecurity Response Plan w/ Frank Grimmelmann of ACTRA   - AZ TRT S06 EP03 (264) 2-9-2025                 What We Learned This Week ACTRA Arizona Cyber Threat Response Alliance Cyber threats affect everyone from Gov't to business to private and growing Companies need to be responsive with speed to be effective + share information of attacks ACTRA has members from both government and private sector ACTRA helped create a state cybersecurity response model that other states can use     Guest: Frank Grimmelmann https://www.actraaz.org/actra/leadership President & CEO/Intelligence Liaison Officer   Mr. Grimmelmann also serves as Co-Chair (together with Arizona's Chief Information Security Officer) for the Arizona Cybersecurity Team (‘ACT'), created through the Governor's Executive Order signed in March 2018. He also serves as a Founding Member of the National Leadership Group for the Information Sharing & Analysis Organization Standards Organization (‘ISAO SO') at the University of Texas San Antonio (UTSA), created under the President's Executive Order 13691 in February 2015. As ACTRA's leader, Mr. Grimmelmann was invited as the first private sector representative in the Arizona Counter Terrorism Information Center (ACTIC) and served as its first private sector Executive Board representative from 2014-2019. He presently acts as ACTRA's designated private sector liaison to ACTRA's Key Agency and other non-Member Stakeholders.    Mr. Grimmelmann served four terms as AZ InfraGard's President from 2009-2012, serves today on numerous academic advisory boards, co-Chairs the Greater Phoenix Chamber's Cybersecurity Workforce Collaborative initiative, and is an engaged Member of the Arizona Technology Council's Cybersecurity Advisory Board.  In 2019, Mr. Grimmelmann was honored by the FBI, and the Board of Directors of both ACTRA and Arizona InfraGard as the first recipient of Arizona InfraGard's ‘Visionary Award' for creating the ACTRA framework  over his last 2 terms as Arizona InfraGard's President, and ACTRA's resulting collaboration between law enforcement/ intelligence agencies/USCYBERCOM, and its public, private and academic organizations over the past 7 years.   He was simultaneously recognized by the FBI's then Deputy Director for his contribution over the years. He remains an active Member of InfraGard since 2003 and an active Lifetime Member of the FBI Citizens Academy since 2006.   Since 2002 he has devoted his full-time attention to protecting our nation's critical infrastructure and national security interests, through eliminating unnecessary silos that hinder communication, allowing  us to respond to today's increasing threat from our cyber adversaries, and in turn permitting ACTRA's Member Organizations to protect their critical infrastructure and our national security interests, while protecting their organization's assets .   Educationally, he holds a dual MBA in International Business and Finance from the University of California at Berkeley and brings decades of experience as a senior executive in finance, healthcare and government, prior to focusing on Cybersecurity in response to 9/11.          Notes:   Seg 2   Cyber threats affect everybody, business, personal, and government. Cyber crime is a fact of life that we need to live with it, but stay ahead.   Criminals are on the offense and only have to be correct 1% of the time. Everybody else is playing defense and has to be right 100% of the time.   AI is an advanced tool that is turned out to be a two edge sword, can help and hurt. AI can only catch so much but can give a few of what is going on.   This is a matter of national security, dealing with homeland security and many other departments of the government.   You have threat intelligence to determine roles on how you're going to handle hackers and ransom ware. Hackers can be local or foreign.   All companies need a cyber policy and some sort of rapid tactical response.   Cyber attacks are an ever growing threat to people and businesses, and continue to surge in 2024. There was 107% surge in malware attacks.   These are on corporate computers, computers at work or home computers or even Home devices like Ring. You get a text through devices, phishing attacks.   Company business email can be compromised in an attack, people's passwords come out and it leads to millions of dollars in losses. Elderly people are very vulnerable, 353,000 attacks.   You have supply chain threats by terrorist and nation state actors. There was a recent attack on United Healthcare for 100 million. People‘s information was exposed. This led to a $22 million ransom payment.   Cyber attacks cause $2.9 billion in damages. Companies are paying ransom to faceless criminals. Very tough for the FBI to be tracking down on these criminals and try to fend off the extortion of stolen data.   Payments for ransom could be made through Bitcoin, which is difficult to trace, though it leaves somewhat of a forensic trail. Constant need for regulation and oversight from the government.   Famous incident last year was not even an attack, but the Crowdstrike software update. ACTRA had a quick response that day. One that helps clients and partners recover fast. In a similar instant, Delta was down for weeks with computer problems.   When you think about what goes on with banks back to 2008 - what loans they have on balance sheet and then off balance sheet securitized - not regulated like normal loans.   Issues with underwriting standards on loans. Not even sure what can be affected in a Cyber attack. Off balance sheet loans and debt is similar to crypto or Bitcoin where it is not being regulated.   PPD-41 was a directive to show responsibilities of government agencies and dealing in cyber. You had homeland security as a defensive arm to protect the nation's assets.   Enforcement is done in the US by the FBI. Overseas it's done by US Cyber Command.     Seg 3   Frank background in the 1990s in private business, worked in healthcare. Then was the chief info officer and the only 2000s at clinical in Stanford. Healthcare is very vulnerable.   Post 9/11 he worked with FBI outreach program called InfraGuard on how to share intelligence with cyber threats. Needs to be treated like terrorism or criminal acts, though they're taking stolen IP. Need to move to a more stable world.   2011 study was done by government organizations to review the process and make recommendations on how to deal with counterterrorism and cyber.   90% of the critical infrastructure in the US is in the private sector. They do need Fed level help, but have also have a local response. Cyber threat actors move quickly and act like a terrorist organization.   General Stanley McChrystal had a great quote, ‘It takes a network to defeat a network.' Cybersecurity is everyone's problem. You need education and organization. This is a 5th generation problem and you have to be adaptive.   ACTRA is a nonprofit dealing with cyber security. They've got pillars of empowerment, trust technology and intelligence. Need for the private companies to develop to train and recruit to handle this threat.   They created a model which allows to bring the fight on offense - and all work together sharing information. Virtual response team, small and big with the private sector as a partner.   ACTRA is a hub for info, and keeps its member information private. Some members are public like Arizona State. Actual model can be used for the rest of the nation. Government and private cannot do it alone. Not all states have this type of organization, but probably need it.     Seg 4   ACTRA started in January 2013. Give U.S. states a model for cyber security. Collective defense and share information with public and private organizations. The goal is to breakdown silos between government and the corporate world.   Not just a thing tank, has an active model. Review of ACTRA model is best in the country and a good hub for response and info.   In 2015, they helped Wisconsin create their own state organization for cyber threats. Soon after, Maryland created one using ACTRA as a model. Needs to be an effort of collaboration, merge the construct of entrepreneur spirit to take action.   So the government cyber threats are handled nationally at a Fort Meade, where the NSA is.   Frank's background in business in finance and healthcare fields.   Info is useless if not used for action. You need actionable intelligence that is current to take down a threat. You need more than continuing education and certificates for people, must go beyond this.   Virtual response team like a local militia who can help protect assets. Going after cyber criminals can be a little bit like a whack a mole.   Overtime, hopefully there will be a national strategy for info sharing. A type of decentralized and local organization that work with government.   The private sector owns the vast amount of data so they have to determine who they're going to share it with and how.   Defend vs Cyber fast while still working within the spirit of the law.       Seg. 1 Clips from Related Shows: Cybersecurity, Disruption, Blockchain & Terrorism w Ari Redbord of TRM Labs - BRT S02 EP31 (78) 8-1-2021     What We Learned This Week Cybersecurity is extremely important industry for national security TRM Labs startup in cyber-security, monitors blockchain OFAC - Gov't administers economic and trade sanctions Ransomeware – specific breach, takeover of a computer system, holds data hostage Programatic Money Laundering – bad guys create new addresses, create ‘shell' companies   Guest: Ari Redbord, Head of Legal and Government Affairs w/ TRM Labs https://www.linkedin.com/in/ari-redbord-4054381b4/ https://www.trmlabs.com/post/trm-labs-appoints-ari-redbord-as-head-of-legal-government-affairs   Ari is formerly a US Attorney, and worked in the Treasury Department, now advises the Government on cybersecurity, and Blockchain. Cybersecurity is a fast growing and extremely important industry for national security, and corporate interests. There are Nation States acting as bad players in the cyber realm and targeting the US Government and US business. We discuss the advancements in technology on cyber crime, blockchain, crypto, and online fraud. How is the FBI dealing with Ransomware, and other cyber attacks on prime targets like the Colonial Pipeline, or other big corps. What Regulations are coming in banking, and Fintech, with KYC (Know Your Customer), plus the big banks like JP Morgan Chase and Goldman are on board.  What the blockchain ledger can help solve in security, to monitor criminal activity in real time with the help of crypto exchanges like Coinbase.  Lastly, what TRM Labs does for clients, how they advise, operate, and who they work with.   Full Show: HERE     Phishing, Malware & Cybersecurity - Try Not to Get Pwned - BRT S02 EP47 (94) 11-21-2021   What We Learned This Week:   Have I been Pwned? Means have I been breached / hacked – did someone hack my email or website Phishing – most common type of email threat, like when you receive a strange email with a link – Do Not Open – DELETE (and alert other office staff of the email) Ramsonware – hack your website, or data – hold it hostage for an extortion ‘ransom' payment Dark Web – where stolen data, & info is being bought & sold VPN Connections – direct and secure   Guests: Vince Matteo, Seven Layer Networks, Inc. https://sevenlayers.com/ Vince Matteo is a certified penetration tester, a security researcher, and a senior consultant at Seven Layers (.com) where he focuses on securing small businesses.  Vince is the author of "Hacking 101 – A Beginner's Guide to Penetration Testing", he's a bug bounty hunter with 17 published critical vulnerabilities, and he's presented talks on offensive hacking at security conferences -- most recently GrrCON in Grand Rapids, MI and BSides in College Station, TX.  Outside of work, Vince is an accomplished endurance athlete, an Ironman age group champion, and in his spare time, you can find him in the desert -- training for the next hundred-mile ultramarathon.    Full Show: HERE     Biotech Shows: https://brt-show.libsyn.com/category/Biotech-Life+Sciences-Science   AZ Tech Council Shows:  https://brt-show.libsyn.com/size/5/?search=az+tech+council *Includes Best of AZ Tech Council show from 2/12/2023   Tech Topic: https://brt-show.libsyn.com/category/Tech-Startup-VC-Cybersecurity-Energy-Science  Best of Tech: https://brt-show.libsyn.com/size/5/?search=best+of+tech   ‘Best Of' Topic: https://brt-show.libsyn.com/category/Best+of+BRT      Thanks for Listening. Please Subscribe to the AZ TRT Podcast.     AZ Tech Roundtable 2.0 with Matt Battaglia The show where Entrepreneurs, Top Executives, Founders, and Investors come to share insights about the future of business.  AZ TRT 2.0 looks at the new trends in business, & how classic industries are evolving.  Common Topics Discussed: Startups, Founders, Funds & Venture Capital, Business, Entrepreneurship, Biotech, Blockchain / Crypto, Executive Comp, Investing, Stocks, Real Estate + Alternative Investments, and more…    AZ TRT Podcast Home Page: http://aztrtshow.com/ ‘Best Of' AZ TRT Podcast: Click Here Podcast on Google: Click Here Podcast on Spotify: Click Here                    More Info: https://www.economicknight.com/azpodcast/ KFNX Info: https://1100kfnx.com/weekend-featured-shows/     Disclaimer: The views and opinions expressed in this program are those of the Hosts, Guests and Speakers, and do not necessarily reflect the views or positions of any entities they represent (or affiliates, members, managers, employees or partners), or any Station, Podcast Platform, Website or Social Media that this show may air on. All information provided is for educational and entertainment purposes. Nothing said on this program should be considered advice or recommendations in: business, legal, real estate, crypto, tax accounting, investment, etc. Always seek the advice of a professional in all business ventures, including but not limited to: investments, tax, loans, legal, accounting, real estate, crypto, contracts, sales, marketing, other business arrangements, etc.  

Defense & Aerospace Report
DEFAERO Strategy Series [Feb 12, 25] Dr. Richard Andres on Reforming Jointness

Defense & Aerospace Report

Play Episode Listen Later Feb 12, 2025 40:51


On today's Strategy Series program, sponsored by General Atomic Aeronautical Systems, Dr. Richard Andres, a professor at the national defense university and the former adviser to the secretary of the Air Force and commander of US Cyber Command, joins Defense & Aerospace Report Editor Vago Muradian to discuss the report for the Mitchell Institute for Aerospace Studies he cowrote with former Air Force Chief of Staff Gen. Buzz Mosley, USAF Ret., and Mitchell's Maj. Gen. Larry Stutzriem, USAF Ret.; why jointness has prioritized today's readiness over strategic planning and the need to return more authority to the military services to accelerate innovation and program execution.

Risky Business News
Srsly Risky Biz: Why two hats are better than two heads

Risky Business News

Play Episode Listen Later Dec 19, 2024 19:48


In this podcast Tom Uren and Patrick Gray talk about the likelihood that the incoming Trump administration will end the ‘dual-hat' arrangement where a single officer leads both US Cyber Command and the National Security Agency. This would result in Cyber Command outranking NSA and could prioritise cyber disruption operations over intelligence collection. That would be a bad outcome. They also talk about how changes to SEC disclosure rules have led to an outpouring of corporate drivel and how WhatsApp became an everything app. This episode is also availble on Youtube. Show notes

Wendy Bell Radio Podcast
Hour 3: National Security Expert on Media's Tarnishing of Hegseth's Bronze Medals

Wendy Bell Radio Podcast

Play Episode Listen Later Dec 6, 2024 37:44


Former FBI agent John Guandolo weighs in on Pete Hegseth's confirmation, Hunter's pardon and US Cyber Command's alarming warning about a major cyberattack. A coalition of black churches demands MSNBC suspend Al Sharpton for accepting $500,000 in Kamala cash before their sit down, pre-election "interview." And a Good News about brotherly inclusion that takes us to Clemson, South Carolina.

Defense & Aerospace Report
DEFAERO Strategy Series [Nov 26, 24] IPSOS' Dr. Darrell Bricker & Retired Admiral Mike Rogers

Defense & Aerospace Report

Play Episode Listen Later Nov 26, 2024 41:09


On today's Strategy Series program, sponsored by General Atomics Aeronautical Systems, Dr. Darrell Bricker, the CEO of Ipsos Public Affairs and adviser on the annual agenda of the annual Halifax International Security Forum, discusses the results of the HISF-Ipsos Threat Index derived from polling 22, 000 people in more than 30 countries; and retired US Navy Adm. Mike Rogers, a former director of the National Security Agency and commander of US Cyber Command who is now the chairman of the advisory board of cybersecurity firm Claroty, discusses China's Salt Typhoon attack on US and allied communications systems, the cutting of a fiber-optic cable between Finland and Germany, and takeaways from this year's Halifax Forum with Defense & Aerospace Report Editor Vago Muradian.

Bloomberg Talks
Mike Rogers Talks Cybersecurity, Politics, Trump

Bloomberg Talks

Play Episode Listen Later Nov 11, 2024 7:57 Transcription Available


Former commander of US Cyber Command, Michael Rogers, says the security environment clearly has gotten worse with conflicts in the Middle East, compared to 4 years ago. More nations like China, Russia, Iran are using the power of disinformation to make people believe that we are seeing is real or accurate. He speaks with Bloomberg's Haidi Stroud-WattsSee omnystudio.com/listener for privacy information.

The CyberWire
Stephen Hamilton: Getting the mission to the next level. [Military] [Career Notes]

The CyberWire

Play Episode Listen Later Oct 27, 2024 7:38


Enjoy this special encore episode where we are joined by Army Cyber Institute Technical Director and Chief of Staff Colonel Stephen Hamilton, as he takes us on his computer science journey. Fascinated with computers since the second grade, Stephen chose West Point after high school to study computer science. Following graduation he moved into the signal branch as it most closely matched his interest in ham radio as no branch related directly to computing. He was pulled from the motor pool to help with another area's computing needs and then worked his way to teaching computer science at. West Point and US Cyber Command. Stephen recommends coding it first to help realize the nuances, and then code it again. We thank Stephen for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices

Career Notes
Stephen Hamilton: Getting the mission to the next level. [Military]

Career Notes

Play Episode Listen Later Oct 27, 2024 7:38


Enjoy this special encore episode where we are joined by Army Cyber Institute Technical Director and Chief of Staff Colonel Stephen Hamilton, as he takes us on his computer science journey. Fascinated with computers since the second grade, Stephen chose West Point after high school to study computer science. Following graduation he moved into the signal branch as it most closely matched his interest in ham radio as no branch related directly to computing. He was pulled from the motor pool to help with another area's computing needs and then worked his way to teaching computer science at. West Point and US Cyber Command. Stephen recommends coding it first to help realize the nuances, and then code it again. We thank Stephen for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices

AFIO Podcast
AFIO Now Presents: RADM Peg Klein

AFIO Podcast

Play Episode Listen Later Sep 23, 2024 24:42


RADM Peg Klein speaks with AFIO board member Everette Jordan about her exceptional career at the NSA, the US Cyber Command, and the US Navy.  Interview: Tuesday, 28 May 2024. Hosted by AFIO President James Hughes, Interviewed by Everette Jordan.

Defense & Aerospace Report
Defense & Aerospace Daily Podcast [Sep 17, 24] Adm. Mike Rogers on Latest Cyber Storylines

Defense & Aerospace Report

Play Episode Listen Later Sep 17, 2024 36:05


Adm. Mike Rogers, USN Ret., a former director of the National Security Agency and commander of US Cyber Command who is now the chairman of the advisory board of cybersecurity firm Claroty, joins Defense & Aerospace Report Editor Vago Muradian to discuss the recent revelation that Chinese hackers have for the first time taken the provocative step of installing malware in key US infrastructure; how Washington must respond to restore deterrence, the range of actions the Biden administration should consider including a targeted cyber operations to damage the Chinese economy; actions Congress should take to curb Chinese access to US technology and networks; countering the growing coordination among China, Russia, Iran and North Korea; increasingly sophisticated Russian efforts to undermine US elections; and why creating an independent cyber force is a bad idea.

Defense Unicorns, A Podcast
From Marine to Cyber Security Expert

Defense Unicorns, A Podcast

Play Episode Listen Later Sep 5, 2024 59:51


Join us on this episode of Defense Unicorns Podcast as we are joined by Kurt Sanger, retired Marine and former Deputy Staff Judge Advocate at US Cyber Command. Kurt shares his journey from growing up in New York City to studying at Holy Cross and Cardozo Law School, where his interest in the Marine Corps began. He reflects on his early roles in military justice and his transition into cyber operations law, providing candid insights into the challenges and motivations that shaped his path.In this episode, Kurt discusses the evolution of cyber partnerships and the critical role of trust and collaboration within the Five Eyes community. He sheds light on the complexities of legal counsel in military operations, emphasizing the importance of clear communication and the broad responsibilities of military attorneys. Through key events like the ISIS conflict and the Sony breach, Kurt illustrates the rapid shift from theory to practice in cyber operations.We also delve into the challenges of great power competition, the debate over the US Cyber Command's role, and the essential collaboration between technologists and lawyers in shaping cyber policy. Kurt offers a thought-provoking perspective on how emerging technologies and international relations could shape the future of conflict.--Key Quote: “All these organizations have missions and those missions take up all the bandwidth that they have, all the people and all the assets that they have to carry out as it is. And competing in cyberspace is most likely never going to be the priority of an organization that has a kinetic mission.”-Kurt Sanger--Time Stamps:(00:46) Kurt Sanger's Background and Career Path(04:58) Transition to Cyber Law and Operations(07:08) Challenges and Evolution in Cyber Operations(09:23) Legal and Ethical Considerations in Cyber Operations(26:47) Discussion on Cyber Force and Organizational Structure(46:33) The Future of Cyber Conflict and Hope--Links:Connect with KurtConnect with RebeccaLaw of the Horse, What Cyber Law Might TeachCode is LawThe Nightingale's SongBeats So Lonely

The Kids' Code Podcast
36. Modern Cryptography: From Secret Codes to Cybersecurity (Overview Pt. 1)

The Kids' Code Podcast

Play Episode Listen Later Jul 1, 2024 29:15


In this episode, we discover the secrets of modern cryptography and how it shapes our world to start the latest season of The Kids Code Podcast! Join us as we journey through the evolution of secret codes from the Cold War era to today's digital age. With Dan and Codemaster Cole, we break down complex concepts into fun, digestible bites. Ever wondered how barcodes and postal area codes fit into the world of cryptography? We'll explain the difference between secret and non-secret codes and even introduce you to the fascinating keyboard cipher.This episode dives into the critical importance of cryptography in our daily lives, from encrypted emails and secure online transactions to the high-stakes world of cyberwarfare. We discuss the establishment of the US Cyber Command and its role in defending against cyber-attacks. Plus, don't miss our exploration of Easter eggs in video games and movies, revealing the fun and hidden messages that continue to intrigue us. Tune in for an exciting and informative overview of cryptography's past, present, and future, and get ready to unlock the mysteries of secret codes! The music used in this episode was by Bio Unit, RomanSenykMusic, and Orange Free Sounds, and our theme, as always, "Mosquito" by Caspar Babypants.You can contact us hereorYou can contact us on this text line. You can find Dr. Gareth's work at drgarethmoore.com. He has released many puzzled and cipher related books for kids, as well as a lot of stuff for adults, too. Thank you for listening. Support the Show.

Pineland Underground
Till all are One | The Space / SOF / Cyber Triad

Pineland Underground

Play Episode Listen Later May 13, 2024 66:14


Maj. Ashley "Ash" Holzmann is an experienced Psychological Operations Officer serving in the re-established PSYWAR School at the United States Army JFK Special Warfare Center and School. Sgt. Maj. Derek Riley is one of the most experienced Civil Affairs Noncommissioned Officers in the Army Special Operations Regiment. He has incredible deployment experience and serves the Proponency at the United States Army JFK Special Warfare Center and School. From the episode:Persuasive Design of Influential Technology is a term used by several academics and organizations. You can check out this Wikipedia article:https://en.wikipedia.org/wiki/Persuasive_technologyArticles on Overhead Persuasive Infrared:https://breakingdefense.com/2023/02/overhead-persistent-ir-is-how-hypersonic-and-maneuverable-threats-will-be-tracked/https://www.ssc.spaceforce.mil/Newsroom/Article-Display/Article/2744261/united-states-space-force-next-gen-opir-geo-program-completes-block-0-geo-spacehttps://breakingdefense.com/tag/next-generation-overhead-persistent-infrared-next-gen-opir/Use of the French SPOT in Desert Storm:https://www.army.mil/article/161173/smdc_history_25_years_since_first_space_warhttps://spp.fas.org/eprint/mckinley.pdfWhat is Scintillation:https://www.sciencedirect.com/topics/biochemistry-genetics-and-molecular-biology/scintillationAn article theorizing that Scintillation may have been involved in a communications anomaly in a battle in Afghanistan:https://news.agu.org/press-release/space-bubbles-may-have-aided-enemy-in-fatal-afghan-battle/ Definitions of Army Space and Army Cyber from the FMs:From FM 3-14 ARMY SPACE OPERATIONSNearly every Army operation relies on the advantages provided by space capabilities and effects to enhance the effectiveness of combat forces. Space capabilities permit enhanced situational understanding; provides global communications; enables precise and accurate fires; supports the conduct of joint expeditionary entry, movement, and maneuver operations; and provides a conduit for cyber electromagnetic operations supporting Unified Land Operations. These capabilities directly support large slarge-scalecale combat operations by enhancing command and control, providing secure communications over extended distances and across areas without modern infrastructure.Potential adversaries have identified U.S. reliance on space-based capabilities as a critical vulnerability and will attempt to exploit it in order to deter and degrade our ability to act. Army space operations seek ways to maintain assured access to space capabilities, and when necessary, to achieve its objectives in spite of the adversary's counterspace efforts.Army space operations are conducted around the globe, but engaged regionally. Army space operations often are an integral part of a joint team used to plan, fight, and adapt operations across the range of military operations. Army space operations continue to evolve to meet the requirements of a complex and rapidly changing OE.Army space doctrine refines and expands upon joint space doctrine by defining those space tactics and procedures relevant to unified land operations and applicable to large-scale combat operations. Army space operations applies to the tactical, operational, and strategic levels of war, but the results are often challenging to quantify which level or levels benefit as modern conflict may not be easily divided into discrete levels. In an internet-connected world which often exploits social media, theater-level tactical actions may have far-reaching operational and strategic-level impacts. The space capabilities form the framework for how space operations supports the Army warfighting functions. From FM 3-12 CYBERSPACE OPERATIONS AND ELECTROMAGNETIC WARFARE:Cyberspace operations are the employment of cyberspace capabilities where the primary purpose is to achieve objectives in or through cyberspace (JP 3-0). Electromagnetic warfare is a military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy (JP 3-85).Cyberspace is one of the five domains of warfare and uses a portion of the electromagnetic spectrum (EMS) for operations, for example, Bluetooth, Wi-Fi, and satellite transport. Therefore, cyberspace operations and EW require frequency assignment, management, and coordination performed by spectrum management operations. Spectrum management operations consist of four key functions—spectrum management, frequency assignment, host-nation coordination, and policy adherence. Spectrum management operations include preventing and mitigating frequency conflicts and electromagnetic interference (EMI) between friendly forces and host nations during Army operations (refer to ATP 6-02.70). Army Special Operations Recruiting:SOF Recruiting Page (soc.mil)https://www.soc.mil/USASOCHQ/recruiting.html GoArmySOF Site:https://www.goarmysof.army.mil/ The Official Podcast of the United States Army Special Warfare Center and School!USAJFKSWCS selects and trains all Army Special Forces, Civil Affairs, and Psychological Operations soldiers. Please visit our website at: https://www.swcs.milBe sure to check us out and follow us at:https://www.facebook.com/jfkcenterandschoolhttps://www.instagram.com/u.s.armyswcs/https://www.youtube.com/c/USAJFKSWCS/videosPlease like, subscribe, and leave a review! And if you enjoyed this, become a member of the underground by sharing with at least one other person. Word-of-mouth is how movements like this spread.

The Other Side Of The Firewall
Who Is CYBERCOM's Elite Cyber National Mission Force?

The Other Side Of The Firewall

Play Episode Listen Later May 6, 2024 14:53


Ryan and Shannon discuss how the US Cyber Command deployed cyber specialists to more than a dozen countries last year to fortify networks and expose tools that hackers are using. These deployments, known as 'Hunt Forward' missions, were conducted by the Cyber National Mission Force. Other countries have also sought assistance from the US in dealing with cyber threats. The Defense Department is seeking $14.5 billion for cyber activities in fiscal year 2025, indicating a growing recognition of the importance of cybersecurity. Article: Secretive US cyber force deployed 22 times to aid foreign governments https://www.c4isrnet.com/cyber/2024/04/10/secretive-us-cyber-force-deployed-22-times-to-aid-foreign-governments/ Please LISTEN

Risky Business News
Srsly Risky Biz: Why the compromise of open source projects is inevitable

Risky Business News

Play Episode Listen Later Apr 18, 2024 21:41


In this podcast Patrick Gray and Tom Uren talk about how open source software is inherently vulnerable to malicious ‘good samaritan' attacks and what to do about it. They also talk about a recent breach at data analytics company Sisense, how dependency on Microsoft is a strategic risk, and US Cyber Command's view of the world.

The CyberWire
Apple's worldwide warning on mercenary attacks.

The CyberWire

Play Episode Listen Later Apr 11, 2024 43:25


Apple warns targeted users of mercenary spyware attacks. CISA expands its Malware Next-Gen service to the private sector. US Cyber Command chronicles their “hunt forward” operations. Taxi fleets leak customer data. Trend Micro tracks DeuterBear malware. The BatBadBut vulnerability enables command injection on Windows. Cybercriminals manipulate GitHub's search functionality. Scully Spider may be utilizing AI generated Powershells scripts. A study from ISC2 shed's light on salary disparities. On our Threat Vector segment, host David Moulton, Director of Thought Leadership at Unit 42, welcomes Donnie Hasseltine, VP of Security at Second Front Systems and a former Recon Marine, as they delve into the indispensable role of a military mindset in cybersecurity. Guest Dr. Sasha Vanterpool, Cyber Workforce Consultant with N2K, introducing the new podcast series Cyber Talent Insights. And AI music sings the license.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guests On our Threat Vector segment, host David Moulton, Director of Thought Leadership at Unit 42, welcomes Donnie Hasseltine, VP of Security at Second Front Systems and a former Recon Marine, as they delve into the indispensable role of a military mindset in cybersecurity. You can listen to the full conversation here.  Guest Dr. Sasha Vanterpool, Cyber Workforce Consultant with N2K, introducing the new podcast series Cyber Talent Insights that is launching on Friday, April 12, 2024. You can read more about Cyber Talent Insights here. Selected Reading iPhone users in 92 countries received a spyware attack warning from Apple (Engadget) CISA to expand automated malware analysis system beyond government agencies (The Record) US Cyber Force Assisted Foreign Governments 22 Times in 2023 (SecurityWeek) Taxi software vendor exposes personal details of nearly 300K (The Register) Cyberespionage Group Earth Hundun's Continuous Refinement of Waterbear and Deuterbear (Trend Micro) BatBadBut: You can't securely execute commands on Windows (Flatt) New Technique to Trick Developers Detected in an Open Source Supply Chain Attack (Checkmarx) Malicious PowerShell script pushing malware looks AI-written (Bleeping Computer) Women make less than men in US cyber jobs — but the gap is narrowing (CyberScoop) Permission is hereby granted (Suno)  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

Cyber Security Headlines
CISA malware analysis, "hunt forward" missions, Spectre v2

Cyber Security Headlines

Play Episode Listen Later Apr 11, 2024 7:26


CISA expands automated malware analysis US Cyber Command launched “hunt forward” missions Spectre v2: Linux Boogaloo  CHECK OUT Capture the CISO season 2 here. Thanks to today's episode sponsor, Vanta The average security pro spends nearly a full workday every week just on compliance. With Vanta, you can automate compliance for in-demand frameworks like SOC 2, ISO 27001, and HIPAA. Even more, Vanta's market-leading Trust Management Platform enables you to unify security program management with a built-in risk register and reporting, and streamline security reviews with AI-powered security questionnaires. Over 7,000 fast-growing companies like Atlassian, Flo Health, and Quora use Vanta to manage risk and prove security in real time. Watch Vanta's on-demand demo at vanta.com/ciso.

The CyberWire
A serious breach showdown.

The CyberWire

Play Episode Listen Later Feb 5, 2024 36:07 Very Popular


Anydesk confirms a serious breach. Clorox and Johnson Controls file cyber incidents with the SEC. There's already a potential Apple Vision Pro kernel exploit. A $25 million deepfake scam. Akamai research hops on the FritzFrog botnet. The US sanctions Iranians for attacks on American water plants. Commando Cat targets Docker API endpoints. Pennsylvania courts fall victim to a DDoS attack. A new leader takes the reins at US Cyber Command and the NSA. Our guest is Dr. Heather Monthie from N2K Networks, with insights on the White House's recent easing of education requirements for federal contract jobs. And remembering one of the great cryptology communicators.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Guest Heather Monthie from N2K Networks shares some insight into the White House's recent easing of education requirements for federal contract jobs. You can find the background to that in our Selected Reading section.  Selected Reading AnyDesk, an enterprise remote software platform used by major firms including Raytheon and Samsung, suffered a security breach - here's what you need to know (IT Pro) Clorox and Johnson Controls Reveal $76m Cyber-Attack Bill (Infosecurity Magazine) MIT student claims to hack Apple Vision Pro on launch day (Cybernews) Finance worker pays out $25 million after video call with deepfake ‘chief financial officer' (CNN) FritzFrog botnet is exploiting Log4Shell bug now, experts say (The Record) US sanctions Iranian officials over cyber-attacks on water plants (BBC) The Nine Lives of Commando Cat: Analysing a Novel Malware Campaign Targeting Docker  (Cado Security) Pennsylvania court agency's website hit by disabling cyberattack, officials say (ABC News) Cyber Command, NSA usher in Haugh as new chief (The Record) White House moves to ease education requirements for federal cyber contracting jobs (CyberScoop) White House moves to ease education requirements for federal cyber contracting jobs (GAO) David Kahn, historian who cracked the code of cryptology, dies at 93 (Washington Post) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Raven Conversations
Raven Conversations: Episode 98 US Cyber Command with Maj. Gen. Charles Jeffries

Raven Conversations

Play Episode Listen Later Dec 12, 2023


In this episode of Raven Conversations, Maj. Gen. Charles Jeffries discusses his experiences in the National Guard and the United States Cyber Command. He also talks about how the National Guard provided him with valuable skillsets that bridged into his civilian career at Microsoft. Original music by Meta Essence

NTEB BIBLE RADIO: Rightly Dividing
NTEB PROPHECY NEWS PODCAST: Trump and the Police State 2024

NTEB BIBLE RADIO: Rightly Dividing

Play Episode Listen Later Nov 27, 2023 78:24


For anyone who's paid even a marginal amount of attention over the last 8 years, you know that America has become a severely-fractured and tribal nation, where there is a different administration of justice based on your political leanings, ideologies and what you say on social media. Biden and Trump both mishandled documents, yet only one is punished. J6 participants are jailed while BLM agitants who burned buildings and killed people walk free. The cop who killed George Floyd has just been stabbed nearly to death in his prison cell, while the cop who killed Ashli Babbitt had a secret trial, was let go scot-free and is praised by the Left. I bet you don't even know his name, and that's on purpose.If you know the right people, you can commit crimes at will. This is America in 2023, and it's about to get a whole lot worse in 2024. On this episode of the NTEB Prophecy News Podcast, the ‘land of the free' has become decidedly less free, much less free. This article you are reading right now is sitting on a site branded as an ‘extremist organization' by the US Cyber Command. Donald Trump ran for president with a vow to ‘drain the Swamp', and he did not fulfill that promise. In fact, the very Swamp he vowed to drain now has him pinned to the wall facing 91 felony counts in Washington, New York, Florida and Georgia. It'll be a miracle if he manages to stay out of jail, let alone become the 47th president of the United States. But…what if he does? What would a Trump presidency look like when The Donald uses his administration to get revenge the same way the Biden administration is doing it to him? What happens to America at that point? Today we show you how much The Swamp has grown, how deep the Deep State has become, and what the future of America might look like when we run it through the filter of your King James Bible. All this and updates on Hamas, the hostages, and everything else you need to know.

Former Action Guys Podcast
Ep. 191 | Brian Russell | 1st ANGLICO Commanding Officer

Former Action Guys Podcast

Play Episode Listen Later Jul 25, 2023 98:28


Brian Russell is a retired artillery officer in the United States Marine Corps. Following his battery time as a Lieutenant, Brian served with the headquarters element of MARSOC before becoming the commanding officer for 1st ANGLICO. Following his command tour, Russell served with US Cyber Command and got to see a quiet part of the military in action.Support the showhttps://patreon.com/formeractionguyshttps://jcramergraphics.comhttps://ANGLICOshop.comBrian's LinksSocial Media Handles:FB: https://www.facebook.com/brian.russell.9028 (Brian Russell)IG: https://www.instagram.com/berclr/?next=%2F (berclr)Twitter: https://twitter.com/OIECol (@OIECol)North Carolina Interscholastic Cycling League:Web: https://www.northcarolinamtb.org/FB: https://www.facebook.com/northcarolinamtb/IG: https://www.instagram.com/northcarolinamtb/Transition Books:Orders to Nowhere from LtCol (ret) Mike Grice, former 1st ANGLICO COTransition by LtCol (ret) Hank Brown, original Chief of Fires USCYBERCOM

It's 5:05! Daily cybersecurity and open source briefing
Episode #176 - American Tech Used by Chinese to Spy on Americans; Stalkerware App Suffers Data Breach; US Cyber Command's “Under Advisement”; Real or Fake? It's up to you to decide

It's 5:05! Daily cybersecurity and open source briefing

Play Episode Listen Later Jul 3, 2023 9:29


Resources for this episode available at 505updates.com. From Hillary Coover in Washington, DC: Many of you might be thinking enough with the Chinese balloon story, but did you know it was fitted with American technology?From Edwin Kwan in Sydney, Australia: It's bad enough when apps you use suffers a data breach. It's worse when apps you didn't know you have gets breached. From Katy Craig in San Diego, California: US Cyber Command's team of tech savvy military and civilian experts known as "Under Advisement", is set to double in size over the next year. Under Advisement's role complements the Cybersecurity and Infrastructure Security Agencies Joint Cyber Defense Collaborative.From Mark Miller in New York City: Last week an article in the New York Times evaluated the accuracy of a set of five AI detection tools for evaluating images. In the best case scenario, 20% incorrectly identified whether an image was AI generated or not. In the worst case, all evaluation engines were incorrect. From Sourced Network Production in New York city. "It's 5:05". I'm Pokie Huang. Today is Monday, July 3rd. Here's the full story behind today's cyber security and open source headlines...

Dark Rhino Security Podcast
S11 E3 From Disinformation to AI - Pt 2

Dark Rhino Security Podcast

Play Episode Listen Later May 26, 2023 28:50


George Kamide was once an anthropologist, a rock climbing instructor, a wedding photographer, and a creative writer. He's the host of the cybersecurity podcast First Watch and the podcast Bare Knuckles and Brass Tacks. As an advocate for greater representation in information security, he sits on the advisory board for Vision & Voice, a community dedicated to lifting women into cyber leadership positions. He has briefed US Cyber Command and the Congressional Cyber Caucus.  00:10 Changing the vulnerability landscape 01:48 Voice Cloning and email chat hacking 05:55 How does a machine generate context? 07:58 Social Media bots 10:06 What jobs will go away with AI?15:40 Whose fault is it? 20:40 Can you 100% trust something? 23:03 Work from Home 26:11 Connecting with George   ---------------------------------------------------------------------- To learn more about George visit https://www.linkedin.com/in/george-ka... To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube:  @Dark Rhino Security ​ ---------------------------------------------------------------------- https://www.zdnet.com/article/watch-o... https://www.wsj.com/articles/i-cloned... https://www.washingtonpost.com/techno... https://abcnews.go.com/GMA/Family/mom... ----------------------------------------------------------------------

Dark Rhino Security Podcast
S11 E2 From Disinformation to AI - Pt 1

Dark Rhino Security Podcast

Play Episode Listen Later May 19, 2023 27:30


George Kamide is a Senior Director at SafeGuard Cyber. He was once an anthropologist, a rock climbing instructor, a wedding photographer, and a creative writer. He's the host of the cybersecurity podcast First Watch and the podcast Bare Knuckles and Brass Tacks. As an advocate for greater representation in information security, he sits on the advisory board for Vision & Voice, a community dedicated to lifting women into cyber leadership positions. He has briefed US Cyber Command and the Congressional Cyber Caucus. 00:00 Introduction 00:18 Our Guest 01:30 George's Origin story 05:04 Twitter bots controlled by Russia 07:37 Does Congress understand the cyber risks? 09:57 First Watch 13:03 Bare knuckles and Brass Tacks 14:15 Bad practices vendors make 18:40 Developing trust with People virtually 20:43 Using AI for Marketing ---------------------------------------------------------------------- To learn more about George visit https://www.linkedin.com/in/george-kamide/https://www.zdnet.com/article/twitter-bot-activity-spiked-after-the-release-of-the-mueller-report/https://www.cyberdefensemagazine.com/russian-twitter-bot-activity-increased-in-the-wake-mueller-report-release/https://www.safeguardcyber.com/podcasts To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #twitterbot #cybersecurity #cyberpodcast #ai #artificialintelligence #marketingusingai #securitypodcast #firstwatchpodcast #bareknucklesandbasstackspodcast #cybernews

No Name Podcast
No Name Podcast On Cyber Persistence Theory

No Name Podcast

Play Episode Listen Later May 15, 2023 79:17


“Cyber Persistence Theory” – a paradigm-shifting book that has already transformed how governments approach the cyber realm. We are delighted to have the authors as our guests on the No Name Podcast! Michael Fischerkeller is a research staff member in the Information, Technology and Systems Division at the Institute for Defense Analyses, a Federally Funded Research and Development Center. Michael has spent his entire professional career supporting the Office of the Secretary of Defense, Joint Chiefs of Staff, Combatant and Multi-National Force commanders, and the Intelligence Community. His areas of expertise are cyber strategy, strategic / operational concept development, and analysis / assessment. Richard J. Harknett is Professor and Director of the School of Public and International Affairs at the University of Cincinnati. He also co-directs the Ohio Cyber Range Institute, a state-wide organization supporting education, workforce, economic, and research development in cybersecurity. He served as Scholar-in-Residence at US Cyber Command and National Security Agency and has held two Fulbright Professor positions.

Defense & Aerospace Report
Daily Podcast [Apr 18, 23] Retired Admiral Mike Rogers on Lessons from Latest Intel Leak

Defense & Aerospace Report

Play Episode Listen Later Apr 18, 2023 31:36


On this episode of the DefAero Report Daily Podcast, sponsored by Bell, Adm. Mike Rogers, USN Ret., the former director of the National Security Agency and former commander of US Cyber Command who is now the chairman of the advisory board of cybersecurity firm Claroty, discusses the latest and largest leak of top secret US documents in a decade allegedly by Massachussetts Air National Guard A1C Jack Teixiera, the common link among the three largest intelligence disclosures by Chelsea Manning, Edward Snowden and now Teixeira, how technology can help mitigate future unauthorized disclosures, impact of the disclosures on intelligence cooperation with allies and partners, and whether Ukraine will have to change operational plans and Washington can continue to collect from Russian sources in the wake of the leaks with Defense & Aerospace Report Editor Vago Muradian.

Hacker Valley Studio
Leading Cybersecurity Incidents as Incident Commander and Responding to a Cyber Crisis

Hacker Valley Studio

Play Episode Listen Later Mar 14, 2023 37:09


In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris tackle arguably one of the most difficult roles in cybersecurity: Incident Response. Drawing on his years of experience at organizations such as US Cyber Command, NSA, and Netflix, Chris shares his knowledge on what it takes to properly handle Severity 1, 2, and 3 level incidents. Together, Ron and Chris cover everything from the roles and responsibilities of an incident commander to the steps of bringing an incident to a close. Lastly, the two share their tips for improving incident response and steps that individuals and organizations can take to integrate incident command and communication efforts.  Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals. NetSPI has a team of skilled pen-testers that can help you find those critical vulnerabilities and become your partner in creating the right remediation game plan for you. Check them out at http://netspi.com/HVM ........................... Links: Purchase an HVS t-shirt at our shop Join our Patreon monthly creative mastermind Connect with Ron Eddings on LinkedIn and Twitter Connect with Chris Cochran on LinkedIn and Twitter Continue the conversation by joining our Discord

The CyberWire
Data breaches and IP. Current cyberespionage campaigns. A warning that the cyber phases of the hybrid war can't be expected to be over, yet. Exfiltration via machine learning inference.

The CyberWire

Play Episode Listen Later Mar 8, 2023 27:48


CISA adds three known exploited vulnerabilities to its Catalog. A data breach at Acer exposes intellectual property. Sharp Panda deploys SoulSearcher malware in cyberespionage campaigns. US Cyber Command's head warns against underestimating Russia in cyberspace. Dave Bittner sits down with Simone Petrella of N2K Networks to discuss the recently-released Defense Cyber Workforce Framework. Betsy Carmelite from Booz Allen Hamilton speaks about CISA's year ahead. And are large language models what the lawyers call an attractive nuisance. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/45 Selected reading. CISA Adds Three Known Exploited Vulnerabilities to Catalog (Cybersecurity and Infrastructure Security Agency CISA) March 7 CISA KEV Breakdown | Zoho, Teclib, Apache (Nucleus Security) Acer Confirms Breach After Hacker Offers to Sell Stolen Data (SecurityWeek) Acer confirms breach after 160GB of data for sale on hacking forum (BleepingComputer) “Sharp Panda”: Check Point Research puts a spotlight on Chinese origined espionage attacks against southeast asian government entities (Check Point Software) Pandas with a Soul: Chinese Espionage Attacks Against Southeast Asian Government Entities (Check Point Research) What can security teams learn from a year of cyber warfare? (Computer Weekly) Russian cyberattacks could intensify during spring offensives in Ukraine, US Cyber Command general says (Stars and Stripes) US Bracing for Bolder, More Brazen Russian Cyberattacks (VOA) Russia remains a ‘very capable' cyber adversary, Nakasone says (C4ISRNet) Employees Are Feeding Sensitive Business Data to ChatGPT (Dark Reading)

The PrOTect OT Cybersecurity Podcast
Admiral TJ White: Keeping People Safe Is The Heart Of Cybersecurity

The PrOTect OT Cybersecurity Podcast

Play Episode Listen Later Feb 16, 2023 56:36


About Admiral TJ White: Vice Admiral TJ White is a retired 30-plus-year national security practitioner, strategist, and cyber operations expert. He has commanded at all levels within the Navy and on joint service, including as the commander of US Fleet Cyber Command, US Tenth Fleet, and US Navy Space Command, as well as the commander of the US Cyber National Mission Force of US Cyber Command. White is a former intelligence director for US Indo-Pacific Command and has served globally in various combat zones and conflict areas supporting competition dynamics. A nonresident senior fellow in the Forward Defense practice of the Atlantic Council's Scowcroft Center for Strategy and Security, White's consulting practice, OneNetworkConnection, LLC, leverages his technical acumen, operational horizon, and strategic vision to assess and manage current and future risk. He is an expert in talent management, risk assessment, and consequence management concerning cybersecurity, critical infrastructure, supply chain, technology policy, and trust relationships. His mission is to bridge the accelerating divide between a digital information technology ecosystem and the genuine impact on human organizational design and enterprise decision-making.In this episode, Aaron and Admiral TJ White discuss:Exploring solutions to overcome challenges in navigating cybersecurity and critical infrastructure complexities.Managing ongoing threats and resources for effective cybersecurity in slow-moving industries.The importance of prioritizing OT to protect physical processes, human life, and national defense and sovereignty.Assessing the impact of vulnerabilities in an organization through the interplay of cybersecurity and organizational factors.Key Takeaways:The biggest and most challenging step in understanding cyberspace is recognizing it as a strategic imperative, and ensuring that the C-suite and board members are invested in developing a comprehensive understanding of the company's mission, vulnerabilities, and exposure to cyber threats.Improving cybersecurity has been an ongoing journey for the US government, industries, and large companies since the Y2K era. This journey involves continuous adaptation to new threats through strong leadership and attention, with the Department of Defense being a successful example through their persistent engagement and defend forward strategies.The power industry, in particular, is a prime example of how technology can lead to increased efficiency, dependability, and performance.Cyberspace is not just technology, but a business risk that ties into the financials, safety, confidentiality, and overall business process. Understanding the vulnerabilities and their impact on the organization is valuable for making informed decisions on how to protect against them."I'm very confident that more and more as a leader, if you just demonstrate and display that you're cognizant that this is a real thing and that there is a place that it is impacting everything that you do. I think the people on your team will want to become knowledgeable about it." — Admiral TJ White Connect with Admiral TJ White: Email: tj@onenetworkconnectionllc.comLinkedIn: https://www.linkedin.com/in/tjwhite01networkconnection/Connect with Aaron:LinkedIn: https://www.linkedin.com/in/aaronccrowLearn more about Industrial Defender:Website: https://www.industrialdefender.com/podcast LinkedIn: https://www.linkedin.com/company/industrial-defender-inc/Twitter: https://twitter.com/iDefend_ICSYouTube: https://www.youtube.com/@industrialdefender7120Audio production by Turnkey Podcast Productions. You're the expert. Your podcast will prove it.

The Cognitive Crucible
#132 Brian Russell on OIE Truths

The Cognitive Crucible

Play Episode Listen Later Jan 24, 2023 43:23


The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, Brian Russell returns to the Cognitive Crucible to discuss what he calls: “OIE Truths.” Based on his extensive information operations experience, these truths represent the best advice he can give to commanders and service members on how to embrace and exploit emerging OIE doctrine and capabilities. Research Question: Brian asks: How do we establish a model for conditions-based command and control? Can we have a construct where a force is trained and certified to a certain standard which can quickly chop to a command with the authority to implement that capability? Resources: Cognitive Crucible Podcast Episodes Mentioned #13 Brian Russell on Behind Enemy Lines #38 Lori Reynolds on Operations in the Information Environment #102 Brian Schweers on the All Domain Effects Team Concept #95 LtGen Matthew Glavy on MCDP 8 Information #126 Edgar Hollandsworth on Talent Development and Intelligence Support for OIE   The Five OIE Truths: What it takes to be successful in the information environment by Col Brian Russell Range: Why Generalists Triumph in a Specialized World by David Epstein Brief: Make a Bigger Impact by Saying Less by Joseph McCormack Marine Corps Gazette Editorial Policy and Writers' Guidelines Link to full show notes and resources https://information-professionals.org/episode/cognitive-crucible-episode-132 Guest Bio: Brian Russell is a recently retired colonel in the United States Marine Corps. After commissioning from North Carolina State University, he served the earliest parts of his 27 year career as an artillery officer with multiple combat deployments including service as a Military Transition Team Leader in Habbaniyah, Iraq, the executive officer of Brigade Headquarters Group in Helmand Province, Afghanistan and Plans Director in Bagram, Afghanistan for a combined joint special operations task force. After giving up command of 1st Air Naval Gunfire Liaison Company in Camp Pendleton CA, he was selected to attend the College of Information and Cyberspace at National Defense University as the sole Marine student in the inaugural resident cyberspace strategy war college program. This educational opportunity earned him a set of orders to US Cyber Command where he served in Fires and Effects division and subsequently served as the J5 Plans Director of Joint Task Force ARES. Most recently he commanded II Marine Expeditionary Force Information Group (II MIG) in Camp Lejeune, North Carolina where he provided joint all domain effects for the MEF commander, 2d and 6th Fleets and multiple key allies and partners.  About: The Information Professionals Association (IPA) is a non-profit organization dedicated to exploring the role of information activities, such as influence and cognitive security, within the national security sector and helping to bridge the divide between operations and research. Its goal is to increase interdisciplinary collaboration between scholars and practitioners and policymakers with an interest in this domain. For more information, please contact us at communications@information-professionals.org. Or, connect directly with The Cognitive Crucible podcast host, John Bicknell, on LinkedIn. Disclosure: As an Amazon Associate, 1) IPA earns from qualifying purchases, 2) IPA gets commissions for purchases made through links in this post.

Defense & Aerospace Report
Cyber Report [Dec 21, 22] Lewis and Montgomery Discuss the Cyber Year in Review

Defense & Aerospace Report

Play Episode Listen Later Dec 21, 2022 38:44


On this week's Cyber Report, sponsored by Fortress Information Security, a year in review with Dr. Jim Lewis, the director of the Strategic Technologies Program at the Center for Strategic and International Studies, and Mark Montgomery, a retired US Navy rear admiral who is the senior director of the Center on Cyber and Technology Innovation at the Foundation for the Defense of Democracies and a Cyber Solarium 2.0 commission senior adviser, who discuss the cyber elements of the $1.7 trillion appropriations measure and the $858 billion National Defense Authorization Act, National Security Agency and US Cyber Command campaign plans to safeguard the 2022 election, cyber lessons from Russia's war on Ukraine, the need for great cyber security regulation, the cost of addressing software and hardware vulnerabilities in US military systems, Biden administration efforts to reduce ransomware attacks, and the biggest cyber threats of 2023 with Defense & Aerospace Report Editor Vago Muradian.

The CyberWire
DDoS as a holiday-season threat to e-commerce. TikTok challenge spreads malware. Meta's GDPR fine. US Cyber Command describes support for Ukraine's cyber defense.

The CyberWire

Play Episode Listen Later Nov 29, 2022 29:42


DDoS as a holiday-season threat to e-commerce. A TikTok challenge spreads malware. Meta's GDPR fine. Mr. Security Answer Person John Pescatore has thoughts on phishing resistant MFA. Joe Carrigan describes Intel's latest efforts to thwart deepfakes. And US Cyber Command describes support for Ukraine's cyber defense. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/227 Selected reading. Holiday DDoS Cyberattacks Can Hurt E-Commerce, Lack Legal Remedy (Bloomberg Law) TikTok ‘Invisible Body' challenge exploited to push malware (BleepingComputer)  $275M Fine for Meta After Facebook Data Scrape (Dark Reading)  Before the Invasion: Hunt Forward Operations in Ukraine (U.S. Cyber Command)

Defense & Aerospace Report
Cyber Report [Nov 02, 22] Mike Rogers on Cyber Elements of the Nat'l Sec and Defense Strategies

Defense & Aerospace Report

Play Episode Listen Later Nov 2, 2022 33:00


On this week's Cyber Report, sponsored by Fortress Information Security, Adm. Mike Rogers, USN Ret., the former director of the National Security Agency and commander of the US Cyber Command who is now the chairman of the advisory board of cybersecurity firm Claroty, discusses the cyber and intelligence aspects of the National Security Strategy and the National Defense Strategy, the importance of both deterring China and Russia while working to improve cybersecurity cooperation with Beijing and Moscow as well as nations worldwide, why Russia has not mounted more aggressive cyber operations against America and its allies supporting Kyiv, the role of cyber in deterring Moscow from using tactical nuclear weapons against Ukraine, cyber and broader takeaways from the Chinese Communist Party's recent congress, the impact of the Biden administration's efforts to curb the export of computer chip making technology to China in curbing Beijing's cyber and AI capabilities, US efforts to ensure the security of America's voting system and countering dis and misinformation as the mid-term elections loom, and whether the Cybersecurity and Infrastructure Security Agency should be independent with Defense & Aerospace Report Editor Vago Muradian.

The CyberWire
Sniffing at the DIB. Sideloading cryptojacking campaign. Nord Stream and threats to critical infrastructure. US Cyber Command describes hunting forward in Ukraine. Fraud meets romance.

The CyberWire

Play Episode Listen Later Oct 5, 2022 33:04 Very Popular


Data's stolen from a US "Defense Industrial Base organization." Major sideloading cryptojacking campaign is in progress. Nord Stream and threats to critical infrastructure. US Cyber Command describes "hunt forward" missions in Ukraine. Andrew Hammond from SpyCast speaks with hacker Eric Escobar about the overlap of traditional intelligence and cybersecurity. Our guest is AJ Nash from ZeroFox with an update on the current threat landscape. Fraud meets romance. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/192 Selected reading. Impacket and Exfiltration Tool Used to Steal Sensitive Information from Defense Industrial Base Organization (CISA) CISA: Multiple government hacking groups had ‘long-term' access to defense company (The Record by Recorded Future) US Govt: Hackers stole data from US defense org using new malware (BleepingComputer)  Side-Loading OneDrive for profit – Cryptojacking campaign detected in the wild (Bitdefender Labs) Drone-loaded seabed ship is latest weapon in Royal Navy's arsenal to counter Russian threat (The Telegraph) Opinion Undersea pipeline sabotage demands the West prepare for more attacks (Washington Post) Ukraine Hasn't Won the Cyber War Against Russia Yet (World Politics Review)  USCYBERCOM Executive Director David Frederick Outlines Cyber Threats & Highlights Importance of Industry Partnerships (GovCon Wire)  Romance scammer and BEC fraudster sent to prison for 25 years (Naked Security)

Passion Struck with John R. Miles
Rear Admiral Danelle Barrett (Ret.) On Leading with Integrity, Humility, and Humor EP 180

Passion Struck with John R. Miles

Play Episode Listen Later Aug 25, 2022 62:41 Transcription Available


After 30 years in the US Navy, retired Rear Admiral Danelle Barrett has learned a lot about effectively leading at the highest levels. She is insightful in everything that matters most if you want to learn how to lead with integrity, humility, humor, and compassion. Today, Danelle Barrett is a sought-after board director, speaker, and leadership coach. During her time as an Admiral, she served as the director of current operations at US Cyber Command and as the Navy Cyber Security Division Director and deputy chief information officer on the Chief of Naval Operations Staff. In her last role, she led the strategy and execution of enterprise IT improvements, cyber security efforts, and cloud operations for over 700,000 personnel across the globe. She is the author of the new book Rock the Boat: Embrace Change, Encourage Innovation, and Be a Successful Leader.  ► Purchase a Copy of Rock the Boat: https://amzn.to/3Agv71z   (Amazon Link) -► Get the full show notes: https://passionstruck.com/danelle-barrett-leading-with-integrity/  --► Subscribe to My Channel Here: https://www.youtube.com/c/JohnRMiles --► Subscribe to the Passion Struck Podcast: https://podcasts.apple.com/us/podcast/passion-struck-with-john-r-miles/id1553279283  What Rear Admiral Danelle Barrett and I Discuss: We spend an hour discussing what it takes to have a successful career. …We discuss how to lead when the PRESSURE IS AT ITS HIGHEST and the clock is ticking. Her guidance is precise, and she offers countless sea stories throughout the interview, including poking fun at herself, that illustrate the core pillars of servant leadership.  We explore the following topics: Why mentoring matters How to manage expectations The keys to effective communication Work-life balance Finding inspiration Overcoming biases Guarding your reputation as a leader How you learn from jerks and so much more Where to Find Rear Admiral Danelle Barrett * Website: https://www.danellebarrett.com/  * Instagram: https://www.instagram.com/mentoringwiththeadmiral/  * Facebook: https://www.facebook.com/groups/mentoringwiththeadmiral1  * Twitter: https://twitter.com/mentoringwitht2 Show Links * Want to hear more leadership advice about how to handle risks, check out my interview with Admiral James Stavridis: https://passionstruck.com/admiral-james-stavridis-to-risk-it-all/  * Do you want to learn how to be a leader with moral courage? Listen to my episode with VADM Sandy Stosz: https://passionstruck.com/admiral-sandy-stosz-leader-with-moral-courage/  * Are you interested in learning the keys to personal growth? Listen to my interview with VADM Ted Carter: https://passionstruck.com/the-key-to-personal-growth-ted-carter/  * Have you ever found yourself in turbulent seas? Check out Read Admiral Tim Gallaudet's advice: https://passionstruck.com/tim-gallaudet-leading-in-turbulent-times/  * My solo episode on why micro choices matter: https://passionstruck.com/why-your-micro-choices-determine-your-life/ * My solo episode on why you must feel to heal: https://passionstruck.com/why-you-must-feel-to-find-emotional-healing/   -- John R. Miles is the CEO, and Founder of PASSION STRUCK®, the first of its kind company, focused on impacting real change by teaching people how to live Intentionally. He is on a mission to help people live a no-regrets life that exalts their victories and lets them know they matter in the world. For over two decades, he built his own career applying his research of passion struck leadership, first becoming a Fortune 50 CIO and then a multi-industry CEO. He is the executive producer and host of the top-ranked Passion Struck Podcast, selected as one of the Top 50 most inspirational podcasts in 2022. Learn more about John: https://johnrmiles.com/  ===== FOLLOW JOHN ON THE SOCIALS ===== * Twitter: https://twitter.com/Milesjohnr * Facebook: https://www.facebook.com/johnrmiles.c0m * Medium: https://medium.com/@JohnRMiles​ * Instagram: https://www.instagram.com/john_r_miles * LinkedIn: https://www.linkedin.com/in/milesjohn/ * Blog: https://johnrmiles.com/blog/ * Instagram: https://www.instagram.com/passion_struck_podcast * Gear: https://www.zazzle.com/store/passion_sruck_podcast  

The CyberWire
Notes on the hybrid war. Criminal gang hits travel and hospitality sectors. Additions to CISA's Known Exploited Vulnerabilities Catalog. CISA issues five ICS security advisories.

The CyberWire

Play Episode Listen Later Aug 19, 2022 31:03 Very Popular


Killnet claims a DDoS campaign against Estonia. The head of GCHQ calls Russian cyber operations a failure. US Cyber Command concludes its "hunt forward" mission in cooperation with Croatia. A criminal gang targets the travel and hospitality sectors. Thomas Pace of NetRise shares insights on firmware vulnerabilities. Daniel Floyd from BlackCloak on Quantifying the Business Need for Digital Executive Protection. CISA issues five ICS security advisories. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/157 Selected reading. Estonia says it repelled major cyber attack after removing Soviet monuments (Reuters) There's a chance regular people didn't even notice: expert on Russian cyber attack (TVP World)  Estonia says it repelled a major cyberattack claimed by Russian hackers. (New York Times) The head of GCHQ says Vladimir Putin is losing the information war in Ukraine (The Economist) Cyber Command deployed 'hunt forward' defenders to Croatia to help secure systems (The Record by Recorded Future) U.S. Cyber Command completes defensive cyber mission in Croatia (CyberScoop) You Can't Audit Me: APT29 Continues Targeting Microsoft 365 (Mandiant) Reservations Requested: TA558 Targets Hospitality and Travel (Proofpoint) Cybercrime Group TA558 Ramps Up Email Attacks Against Hotels (Decipher) CISA Adds Seven Known Exploited Vulnerabilities to Catalog (CISA)  Siemens Linux-based Products (Update G) (CISA) Siemens Industrial Products LLDP (Update B) (CISA) Siemens OpenSSL Affected Industrial Products (CISA) Mitsubishi Electric MELSEC Q and L Series (CISA) Mitsubishi Electric GT SoftGOT2000 (CISA)

The CyberWire
Notes on the underworld: emerging, enduring, and vanishing gangs, and their C2C markets. More spearphishing of Ukrainian targets. US CYBERCOM releases IOCs obtained from Ukrainian networks.

The CyberWire

Play Episode Listen Later Jul 21, 2022 29:54 Very Popular


A criminal talent broker emerges. Developing threats to financial institutions. Phishing through PayPal. Lessons to be learned from LAPSUS$, post-flameout. More spearphishing of Ukrainian targets. US Cyber Command releases IOCs obtained from Ukrainian networks. Johannes Ullrich from SANS on the value of keeping technology simple. Our guests are Carla Plummer and Akilah Tunsill from the organization Black Girls in Cyber. And not really honor, but honor's self-interested first cousin. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/137 Selected reading. Atlas Intelligence Group (A.I.G) – The Wrath of a Titan (Cyberint) 'AIG' Threat Group Launches With Unique Business Model (Dark Reading) Buy, Sell, Steal, EvilNum Targets Cryptocurrency, Forex, Commodities (Proofpoint) Sending Phishing Emails From PayPal (Avanan)  Brazen, Unsophisticated and Illogical: Understanding the LAPSUS$ Extortion Group (Tenable®) Evacuation and Humanitarian Documents used to Spear Phish Ukrainian Entities (Mandiant) Cyber National Mission Force discloses IOCs from Ukrainian networks (U.S. Cyber Command)  The Evolution of Cybercrime: Why the Dark Web is Supercharging the Threat Landscape and How to Fight Back (HP Wolf Security)

The CyberWire
A new loader variant for wiper campaigns. Sanctions, hacktivism, and disinformation. Conti's toxic branding. Happy birthday, US Cyber Command.

The CyberWire

Play Episode Listen Later May 23, 2022 24:25 Very Popular


There's a new loader identified in wiper campaigns. President Putin complains of sanctions and cyberattacks, and vows to increase Russia's cybersecurity. Coordinated inauthenticity at scale. Killnet crows large over Italian operations. Conti's dissolution doesn't mean its operators' disappearance. Rick Howard looks at software defined perimeters. Dinah Davis from Arctic Wolf on how ransomware groups are upping their game to nation state levels. And happy birthday, US Cyber Command...but we're not necessarily wishing you a moonshot for your birthday present. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/98 Selected reading. Sandworm uses a new version of ArguePatch to attack targets in Ukraine (WeLiveSecurity)  Putin complains about barrage of cyberattacks (Military Times) Putin promises to bolster Russia's IT security in face of cyber attacks (Reuters) Russia keeps getting hacked (Mashable)  Putin is bringing his disinformation war to Ukraine (Newsweek)  Putin is bringing his disinformation war to Ukraine (Newsweek) Russian government procured powerful botnet to shift social media trending topics (The Record by Recorded Future) Fronton: Russian IoT Botnet Designed to Run Social Media Disinformation Campaigns (The Hacker News)  Russian Hackers Claim Responsibility for Attacks on Italian Government Websites (Wall Street Journal) Anonymous Declares Cyber-War on Pro-Russian Hacker Gang Killnet (Infosecurity Magazine)  DisCONTInued: The End of Conti's Brand Marks New Chapter For Cybercrime Landscape (AdvIntel)  Notorious cybercrime gang Conti 'shuts down,' but its influence and talent are still out there (The Record by Recorded Future) Could a Cyber Attack Overthrow a Government? Conti Ransomware Group Now Threatening To Topple Costa Rican Government if Ransom Not Paid (CPO Magazine)  Fears grow after ransomware attack on Costa Rica escalates (TechCrunch)  US Cyber Command's birthday (US Cyber Command) U.S. Needs New 'Manhattan Project' to Avoid Cyber Catastrophe | Opinion (Newsweek) Cyber pros are fed up with talk about a cyber-Manhattan Project (Washington Post)

The CyberWire
Dateline Moscow, Kyiv, and Minsk: Hacktivisim and privateering. Log4j vulnerabilities more widespread than initially thought. US Cyber Command deploys "hunt forward" team to Lithuania.

The CyberWire

Play Episode Listen Later May 5, 2022 23:55


Hacktivisim and privateering in Moscow, Kyiv, and Minsk. Log4j vulnerabilities are more widespread than initially thought. US Cyber Command deployed a "hunt forward" team to Lithuania. CISA adds five vulnerabilities to its Known Exploited Vulnerabilities Catalog. Jen Miller-Osborn from Palo Alto Networks discusses the findings from the Center for Digital Government's survey on Getting Ahead of Ransomware. Grayson Milbourne of Webroot/OpenText discusses OpenText's 2022 BrightCloud Threat Report. And Anonymous leaks emails allegedly belonging to the Nauru Police Force. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/87 Selected reading. Russian ally Belarus launches military quick-response drills (Washington Post) Putin's Ukraine War: Desperate Belarus dictator strikes back (Atlantic Council) Russian ransomware group claims attack on Bulgarian refugee agency (CyberScoop) Russia and Ukraine Conflict Q&A | Cybersixgill (Cybersixgill) Threat Advisory: New Log4j Exploit Demonstrates a Hidden Blind Spot in the Global Digital Supply Chain (Cequence) Anonymous Leak 82GB of Police Emails Against Australia's Offshore Detention (HackRead)