346 episodes

Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.

Research Saturday N2K Networks

    • Technology

Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.

    1700 IPs and counting.

    1700 IPs and counting.

    Amit Malik, Director of Threat Research at Uptycs, is sharing their work on "New Threat Detected: Inside Our Discovery of the Log4j Campaign and Its XMRig Malware." The Uptycs Threat Research Team has discovered a large-scale Log4j campaign involving over 1700 IPs, aiming to deploy XMRig cryptominer malware.
    This ongoing operation was initially detected through the team's honeypot collection, prompting an in-depth analysis of the campaign. The research says "The JNDI plugin is particularly useful to attackers because it allows them not only to fetch the values of environment variables in the target system but also to freely define the URL and protocol resource for the JNDI network connection."
    The research can be found here:
    New Threat Detected: Inside Our Discovery of the Log4j Campaign and Its XMRig Malware

    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 17 min
    International effort dismantles LockBit.

    International effort dismantles LockBit.

    Jon DiMaggio, a Chief Security Strategist at Analyst1, is sharing his work on "Ransomware Diaries Volume 5: Unmasking LockBit." On February 19, 2024, the National Crime Agency (NCA), a UK sovereign law enforcement agency, in collaboration with the FBI, Europol, and nine other countries under "Operation Cronos," disrupted the LockBit ransomware gang’s data leak site used for shaming, extorting, and leaking victim data.
    The NCA greeted visitors to LockBit’s dark web leak site with a seizure banner, revealing they had been controlling LockBit’s infrastructure for some time, collecting information, acquiring victim decryption keys, and even compromising the new ransomware payload intended for LockBit 4.0.
    The research can be found here:
    Ransomware Diaries Volume 5: Unmasking LockBit

    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 30 min
    From secret images to encryption keys.

    From secret images to encryption keys.

    This week, we are joined by Hosein Yavarzadeh from the University of California San Diego, as he is discussing his work on "Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor" This paper introduces new methods that let attackers read from and write to specific parts of high-performance CPUs, such as the path history register (PHR) and prediction history tables (PHTs).
    These methods allow two main types of attacks. One can reveal a program's control flow history, as shown by recovering a secret image through the libjpeg routines. The other enables detailed transient attacks, demonstrated by extracting an AES encryption key, highlighting significant security risks for these systems.
    The research can be found here:
    Graph: Growing number of threats leveraging Microsoft API

    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 22 min
    The double-edged sword of cyber espionage.

    The double-edged sword of cyber espionage.

    Dick O'Brien from Symantec Threat Hunter team is discussing their research on “Graph: Growing number of threats leveraging Microsoft API.” The team observed an increasing number of threats that have begun to leverage the Microsoft Graph API, usually to facilitate communications with command-and-control (C&C) infrastructure hosted on Microsoft cloud services.
    The research states "the technique was most recently used in an attack against an organization in Ukraine, where a previously undocumented piece of malware used the Graph API to leverage Microsoft OneDrive for C&C purposes."
    The research can be found here:
    Graph: Growing number of threats leveraging Microsoft API

    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 20 min
    Geopolitical tensions rise with China.

    Geopolitical tensions rise with China.

    Adam Marré, CISO at Arctic Wolf, is diving deep into geopolitical tension with China including APT31, iSoon and TikTok with Dave this week. They also discuss some of the history behind China cyber operations.
    Adam shares information on how different APT groups are able to create spear phishing campaigns, and provides info on how to combat these groups.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 35 min
    Cerber ransomware strikes Linux.

    Cerber ransomware strikes Linux.

    Christopher Doman, Co-Founder and CTO at Cado Security, is talking about their research on "Cerber Ransomware: Dissecting the three heads." This research delves into Cerber ransomware being deployed onto servers running the Confluence application via the CVE-2023-22518 exploit. 
    The research states "Cerber emerged and was at the peak of its activity around 2016, and has since only occasional campaigns, most recently targeting the aforementioned Confluence vulnerability."
    The research can be found here:
    Cerber Ransomware: Dissecting the three heads

    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 15 min

Top Podcasts In Technology

TikTok
Catarina Vieira
The Instagram Stories - Social Media News
The Instagram Stories, Daniel Hill
Today in iOS  - The Unofficial iPhone, iPad, and Apple Watch Podcast
Rob @ podCast411 and Part of the podcast411network
TED Radio Hour
NPR
Macpreneur
Damien Schreurs
I'd Rather Be Scripting
Ash Arnwine & Kerri Shotts

You Might Also Like

CyberWire Daily
N2K Networks
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Cyber Security Headlines
CISO Series
Grumpy Old Geeks
Jason DeFillippo & Brian Schulmeister with Dave Bittner
Click Here
Recorded Future News
CISO Series Podcast
David Spark, Mike Johnson, and Andy Ellis