1 999 avsnitt

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

CyberWire Daily CyberWire, Inc.

    • Teknologi
    • 4,5 • 6 betyg

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

    Patrick Morley: Former Carbon Black CEO [Cyber CEOs Decoded]

    Patrick Morley: Former Carbon Black CEO [Cyber CEOs Decoded]

    In this episode, Marc and Patrick Morley, former CEO of Carbon Black, get nostalgic as they discuss Patrick's journey of coming up through the start up scene in the 90s—from working with VCs to taking companies public—and compare it to running cyber companies today. Along with the early career experience that helped form Patrick's leadership philosophy, he shares his experience of becoming CEO of Bit9, seeing the company through a breach, acquiring Carbon Black, bring the company public and later getting acquired by VMWare—this episode is filled to the brim.
    You'll also learn about:

    How build a criteria for joining a start up

    Why cyber is the most mission-driven area of tech

    What it's like to call 600 customers in 2 days after a breach and not lose a single one

    Seven philosophies for running a cyber company

    • 1 tim. 1 min.
    Could REvil have a Copycat? [Research Saturday]

    Could REvil have a Copycat? [Research Saturday]

    Larry Cashdollar from Akamai, joins Dave to discuss their research on a DDoS campaign claiming to be REvil. The research shares that Akamai's team was notified last week of an attack on one of their hospitality customers that they called "Layer 7" by a group claiming to be associated with REvil. In the research, they dive into the attack, as well as comparing it to other similar attacks that have been made by the group.
    The research states "The attacks so far target a site by sending a wave of HTTP/2 GET requests with some cache-busting techniques to overwhelm the website." It also stated that this is a smaller attack than they have seen by the group before, and notes that there seems to be more of a political agenda behind the attack, whereas in the past, REvil has been less political.
    The research can be found here:
    REvil Resurgence? Or a Copycat?

    • 16 min
    Notes on cyber conflict. Lazarus Group blamed for the Harmony cryptocurrency heist. MedusaLocker warning. Observation of the C2C market. The Crypto Queen cracks the FBI’s Ten Most Wanted.

    Notes on cyber conflict. Lazarus Group blamed for the Harmony cryptocurrency heist. MedusaLocker warning. Observation of the C2C market. The Crypto Queen cracks the FBI’s Ten Most Wanted.

    An update on the DDoS attack against Norway. NATO's resolutions on cyber security. North Korea seems to be behind the Harmony cryptocurrency heist. MedusaLocker warninga. Microsoft sees improvements in a gang's technique. Google blocks underworld domains. The Israeli-Iranian conflict in cyberspace. Chris Novak from Verizon with his take on this year’s DBIR. Our guest is Jason Clark of Netskope on the dynamic challenges of a remote workforce.And Now among the FBI’s Ten Most Wanted: one Crypto Queen.

    For links to all of today's stories check out our CyberWire daily news briefing:
    https://thecyberwire.com/newsletters/daily-briefing/11/126

    Selected reading.
    Pro-Russian hackers launched a massive DDoS attack against Norway (Security Affairs)
    NATO establishes program to coordinate rapid response to cyberattacks (POLITICO) 
    NATO to create cyber rapid response force, increase cyber defense aid to Ukraine (CyberScoop)
    FACT SHEET: The 2022 NATO Summit in Madrid | The White House (The White House)
    North Korean Lazarus hackers linked to Harmony bridge thef (TechCrunch) 
    North Korea Suspected of Plundering Crypto to Fund Weapons Programs (Wall Street Journal)
    Crypto crash threatens North Korea's stolen funds as it ramps up weapons tests (Reuters)
    CISA Alert AA22-181A – #StopRansomware: MedusaLocker. (CISA Cybersecurity Alerts with the CyberWire)
    #StopRansomware: MedusaLocker (CISA)
    Microsoft warning: This malware that targets Linux just got a big update (ZDNet) 
    Microsoft Warns of Cryptomining Malware Campaign Targeting Linux Servers (The Hacker News) 
    Google blocked dozens of domains used by hack-for-hire groups (BleepingComputer)
    Countering hack-for-hire groups (Google)
    Gantz orders probe after TV reports hint IDF behind Iran steel plant cyberattack (Times of Israel)
    Proofpoint: Zionist covert operation? (PressTV)
    Zionist intelligence company cyberattacked by Iraqi hackers (Mehr)
    FBI Offers $100,000 Reward for Capture of Ten Most Wanted Fugitive ‘Cryptoqueen’ (FBI)

    • 30 min
    CISA Alert AA22-181A – #StopRansomware: MedusaLocker. [CISA Alert]

    CISA Alert AA22-181A – #StopRansomware: MedusaLocker. [CISA Alert]

    CISA, the FBI, the Department of the Treasury, and the Financial Crimes Enforcement Network are releasing this alert to provide information on MedusaLocker ransomware. Observed as recently as May 2022, MedusaLocker actors predominantly rely on vulnerabilities in Remote Desktop Protocol to access victims’ networks.
    AA22-181A Alert, Technical Details, and Mitigations
    Stop Ransomware
    CISA Ransomware Guide
    CISA No-cost Ransomware Services
    All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.

    • 3 min
    Killnet hits Norwegian websites. Hacktivists tied to Russia's government. Looking ahead to new cyber phases of Russia's hybrid war. C2C market differentiation. Gennady Bukin, call your shoe store.

    Killnet hits Norwegian websites. Hacktivists tied to Russia's government. Looking ahead to new cyber phases of Russia's hybrid war. C2C market differentiation. Gennady Bukin, call your shoe store.

    Killnet hits Norwegian websites. Hacktivists are tied to Russia's government. Amunet as a case study in C2C market differentiation. C2C commodification extends to script kiddies. Andrea Little Limbago from Interos examines borderless data. Rick Howard speaks with Cody Chamberlain from NetSPI on Breach Communication. Roscosmos publishes locations of Western defense facilities…and subsequently says it sustained a DDoS attack.

    For links to all of today's stories check out our CyberWire daily news briefing:
    https://thecyberwire.com/newsletters/daily-briefing/11/125

    Selected reading.
    Pro-Russian hacker group says it attacked Norway (The Independent Barents Observer)
    Cyberattack hits Norway, pro-Russian hacker group fingered (AP NEWS)
    Norway blames "pro-Russian group" for cyber attack (Reuters)
    Mandiant Finds Possible Link Between Kremlin, Pro-Russian ‘Hacktivists’ (Bloomberg)
    Market Differentiation: Cybercriminal Forums’ Unusual Features Designed To Attract Users (Digital Shadows)
    Minors Use Discord Servers to Earn Extra Pocket Money Through Spreading Malware (PR Newswire)
    Russia publishes Pentagon coordinates, says Western satellites 'work for our enemy' (Reuters)
    Russian Space Agency Targeted in Cyberattack (Wall Street Journal)
    Cyberattack hits Russian space agency site after sharing NATO photos (Jerusalem Post)

    • 30 min
    Article 5? It’s complicated. Influence ops for economic advantage. SOHO routers under attack. YTStealer described. RansomHouse hits AMD. A NetWalker affiliate cops a plea.

    Article 5? It’s complicated. Influence ops for economic advantage. SOHO routers under attack. YTStealer described. RansomHouse hits AMD. A NetWalker affiliate cops a plea.

    NATO's response to Killnet's cyberattacks on Lithuania. Influence operations in the interest of national market share. SOHO routers are under attack. YTStealer is out and active in the wild. RansomHouse hits AMD. CISA releases six ICS security advisories. The most dangerous software weaknesses. Betsy Carmelite from Booz Allen Hamilton takes a look back at Biden’s executive order on cyber. Our guest is Philippe Humeau of CrowdSec on taking a collaborative approach to security. And a guilty plea in the case of the NetWalker affiliate.

    For links to all of today's stories check out our CyberWire daily news briefing:
    https://thecyberwire.com/newsletters/daily-briefing/11/124

    Selected reading.
    Could the Russian cyber attack on Lithuania draw a military response from NATO? (Sky News) 
    Pro-PRC DRAGONBRIDGE Influence Campaign Targets Rare Earths Mining Companies in Attempt to Thwart Rivalry to PRC Market Dominance (Mandiant)
    ZuoRAT Hijacks SOHO Routers to Silently Stalk Networks (Lumen) 
    New YTStealer Malware Aims to Hijack Accounts of YouTube Content Creators (Hacker News)
    RansomHouse Extortion Group Claims AMD as Latest Victim (RestorePrivacy) 
    RansomHouse gang claims to have some stolen AMD data (Register)
    CISA releases 6 Industrial Control Systems Advisories (Cybersecurity and Infrastructure Security Agency)
    2022 CWE Top 25 Most Dangerous Software Weaknesses (CISA) 
    Netwalker ransomware affiliate agrees to plead guilty to hacking charges (The Record by Recorded Future)

    • 30 min

Kundrecensioner

4,5 av 5
6 betyg

6 betyg

Mest populära podcaster inom Teknologi

Lex Fridman
Bilar med sladd
Jack Rhysider
Joni Lindgren & Jasmin Yaya
Henric Smolak
Andreessen Horowitz

Du kanske också gillar

CyberWire Inc.
ITWC
CISO Series
The Record by Recorded Future
Johannes B. Ullrich
Cybereason