Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Tony
Mar 12, 2019
Very informative and interesting
Episode | Date |
---|---|
New Billbug campaign, Prestige ransomware, and multiple arrests of alleged cyber-crime gang members
|
Nov 17, 2022 |
Exbyte exfiltration tool, Cranefly uses new tools and novel technique, and OpenSSL bug is downgraded
|
Nov 03, 2022 |
Budworm espionage activity, Spyder Loader malware, and Ransom Cartel links to Sodinokibi
|
Oct 20, 2022 |
Witchetty espionage group activity, Microsoft Exchange Server zero days, and U.S. defense sector targeted by APT groups
|
Oct 06, 2022 |
Espionage activity targeting Asian governments, Webworm develops customized tools, and latest Noberus TTPs
|
Sep 22, 2022 |
Mobile app security, Russian invasion of Ukraine cyber impact continues, and Evil Corp switches focus
|
Sep 08, 2022 |
Bumblebee loader analysis, Raccoon Stealer returns, and LockBit launches a new version
|
Jun 30, 2022 |
BlackCat ransomware, Follina vuln used by Russian actors, and a new version of Metasploit
|
Jun 16, 2022 |
The Follina Microsoft Office vulnerability, Conti break-up, and more ransomware activity
|
Jun 02, 2022 |
Chinese cyber-espionage activity, Conti gang threatens Costa Rica government, and U.S. warns about North Korean citizens seeking jobs in IT
|
May 19, 2022 |
North Korea’s Stonefly, commodity malware, and the potential return of the REvil ransomware
|
May 05, 2022 |
Shuckworm targets Ukraine, Lazarus Dream Job campaign continues, and two dark marketplaces get taken down
|
Apr 21, 2022 |
Spring4Shell, Cicada campaign, new Verblecon malware, and Ukraine invasion cyber activity update
|
Apr 07, 2022 |
What you need to know about hacking group Lapsus$, cyber impacts of Ukraine invasion, and BazarBackdoor deploys new tactics
|
Mar 24, 2022 |
Daxin special: How this advanced malware was discovered
|
Mar 10, 2022 |
Hive and BlackByte ransomware, the money made by cyber criminals, and BEC scammers’ new tactics
|
Feb 24, 2022 |
FBI seizes $3.6 billion in cryptocurrency, cyber attacks against Ukraine continue, and financial organizations in Taiwan targeted
|
Feb 10, 2022 |
Ukraine cyber attacks, law enforcement activity, and a Noberus ransomware attack
|
Jan 27, 2022 |
BadUSB attacks, a new backdoor, and how one APT group managed to infect itself with malware
|
Jan 13, 2022 |
Log4j vulnerabilities, likely Iran-backed attacks on telecoms companies, and new Rust-based Noberus ransomware
|
Dec 16, 2021 |
Yanluowang ransomware update, possible Conti link to Emotet, and the importance of strong passwords
|
Dec 02, 2021 |
Attacks on critical infrastructure, ransomware arrests, and the return of Emotet?
|
Nov 18, 2021 |
BlackMatter updates, lots of law enforcement activity, and new SquirrelWaffle malware is one to watch
|
Nov 04, 2021 |
New research about the Yanluowang ransomware and two separate campaigns targeting victims in Asia
|
Oct 21, 2021 |
Governments tackle cyber crime, ransomware arrests, and an interesting phishing campaign
|
Oct 07, 2021 |
A new ransomware whitepaper and some recent ransomware stories, plus new botnet is carrying out giant DDoS attacks
|
Sep 23, 2021 |
Ransomware, the rising cost of data breaches, and the U.S. points finger at China for Microsoft Exchange Server attacks
|
Jul 29, 2021 |
Kaseya ransomware supply chain attack, new SolarWinds vulnerability, and the rising cost of cyber insurance
|
Jul 15, 2021 |
Ransomware attackers using virtual machines, over-60s lost $1 billion online in 2020, and the EU launches a new cyber security unit
|
Jul 01, 2021 |
Ransomware, takedowns, and political promises to tackle cyber crime
|
Jun 17, 2021 |
In-depth look at the ransomware attack on Ireland’s national health service, as major meat producer JBS also hit with ransomware
|
Jun 03, 2021 |
Colonial Pipeline attack, Darkside ransomware gang, and crypto mining makes a comeback
|
May 20, 2021 |
MFA causes headaches for attackers, and a look at living off the land activity
|
May 06, 2021 |
Pulse Secure VPN zero-day, SolarWinds and Exchange Server developments, and spies approach UK employees on social media
|
Apr 22, 2021 |
Facebook data leak, cyber attack aimed at EU institutions, and cyber criminals use a call center to spread malware
|
Apr 08, 2021 |
Ransomware attackers leverage the Microsoft Exchange Server vulns, WeLeakInfo users hit by data breach, and ransomware payments increase
|
Mar 25, 2021 |
All you need to know about the Microsoft Exchange Server attacks, and some SolarWinds developments
|
Mar 11, 2021 |
Accellion product vulns, Equation group tool copied by Chinese APT, and software supply chain attacks in France
|
Feb 25, 2021 |
Emotet takedown, water plant cyber attack, and a SolarWinds update
|
Feb 11, 2021 |
Raindrop: How the additional tool was discovered in SolarWinds investigation
|
Jan 28, 2021 |
The latest on the SolarWinds hack, a lot of ransomware activity, and healthcare hit hard by cyber attacks
|
Jan 14, 2021 |
Sunburst: Everything we know about the supply chain attack targeting SolarWinds users
|
Dec 17, 2020 |
Cyber predictions for 2021, botnets turn to ransomware, and the Gootkit infostealer reemerges
|
Dec 03, 2020 |
New research about attacks on Japan-linked companies, and APT groups target COVID-19 vaccine makers
|
Nov 19, 2020 |
Maze 'retires' while Ryuk ramps up activity, U.S. election, and the UK ICO hands down a historically large fine
|
Nov 05, 2020 |
Trickbot disruption, newly released Seedworm research, and some noteworthy indictments
|
Oct 22, 2020 |
Round up: Financial sector threats, North Korean actors, WastedLocker and more
|
Oct 08, 2020 |
Round-up: A whole host of vulnerabilities, and the hackers hacking other hackers
|
Mar 12, 2020 |
Round-up: Ransomware criminals continue to innovate, and BEC scammers hit a high-profile victim
|
Mar 05, 2020 |
Special Edition: The RSA Conference 2020
|
Feb 27, 2020 |
Focus On: Pegasus spyware
|
Feb 20, 2020 |
Spotlight On: The healthcare cyber threat landscape
|
Feb 13, 2020 |
Round-up: Traffic jams, increasing defenses, and shortening the Google Chrome ‘patch gap’
|
Feb 06, 2020 |
Round-up: Ransomware, vulnerabilities, and eavesdropping
|
Jan 30, 2020 |
Spotlight On: Software vulnerabilities and patch management
|
Jan 23, 2020 |
Spotlight On: Living off the land
|
Jan 16, 2020 |
Spotlight On: Iranian cyber espionage activity
|
Jan 09, 2020 |
Cyber Security Brief’s Review of the Year
|
Dec 19, 2019 |
Spotlight On: Targeted ransomware – a major trend in 2019
|
Dec 12, 2019 |
Attack Group of the Month: Shamoon – targeting the Middle East with disk-wiping malware
|
Dec 05, 2019 |
Spotlight On: BEC scams – an expensive threat
|
Nov 28, 2019 |
Holiday shopping special: Scams to watch out for this Black Friday and Cyber Monday
|
Nov 21, 2019 |
Privacy concerns, election campaign worries, and phish-y meeting invites
|
Nov 14, 2019 |
Lasers, Bluekeep, and BEC scammers continue to cash in
|
Nov 07, 2019 |
Fancy Bear attack campaign, ransomware hits Johannesburg again, and malware hijacks Discord client
|
Oct 31, 2019 |
A second supply chain attack attempt against CCleaner, voice-controlled home assistants spying on owners, and dodgy mobile biometric authentication
|
Oct 24, 2019 |
An iTunes and iCloud zero-day, ATM malware, and the Sudo vulnerability
|
Oct 17, 2019 |
A controversial Apple app, a far-reaching ruling from the ECJ, and many, many data breaches
|
Oct 10, 2019 |
Deepfakes, disinformation, and the former NATO bunker housing a bulletproof hosting service
|
Oct 03, 2019 |
Tortoiseshell APT group, vBulletin zero-day, and Facebook suspends thousands of apps
|
Sep 26, 2019 |
Cloud security, telecoms companies compromised, and can someone else access your Nest camera?
|
Jun 27, 2019 |
Waterbug, “smart” TVs, and BEC scam hits Canadian city
|
Jun 20, 2019 |
Bug bounties, bad passwords, and Radiohead
|
Jun 13, 2019 |
Twitterbots, ransomware retirements, and email mishaps
|
Jun 06, 2019 |
Tube users’ data to be collected, Baltimore ransomware attack continues to cause problems, and the latest on the BlueKeep vulnerability
|
May 30, 2019 |
BlueKeep bug, ransomware “recovery”, and the dismantling of the GozNym network
|
May 23, 2019 |
GDPR Special: The Impact of the Regulation One Year On
|
May 15, 2019 |
Buckeye’s use of Equation group tools pre Shadow Brokers leak, IoT security, and targeted ransomware
|
May 09, 2019 |
Beapy cryptojacking worm, Emotet’s new hiding technique, and set-top box dangers
|
May 02, 2019 |
Interview: Martijn Grooten, Editor, Virus Bulletin
|
Apr 24, 2019 |
Symantec’s role in Bayrob convictions, Silk Road 2.0 founder jailed, and who’s listening to your Alexa recordings?
|
Apr 18, 2019 |
Hotel booking privacy, dark marketplace selling your digital fingerprint, and Mar-a-Lago intruder update
|
Apr 11, 2019 |
Malware sneaked onto Trump property, Albany ransomware attack, and Tesla tricked
|
Apr 04, 2019 |
Elfin research, ASUS software supply chain attack, insider threats, and mobile security
|
Mar 28, 2019 |
Interview: Neil Jenkins, Chief Analytic Officer, Cyber Threat Alliance
|
Mar 21, 2019 |
Highlights from RSA Conference 2019
|
Mar 14, 2019 |
ISTR Special: Enterprise
|
Mar 07, 2019 |
ISTR Special: Consumers
|
Feb 28, 2019 |
Google backtracks, Apple gets sued, and Australia a victim of state-sponsored cyber attack
|
Feb 21, 2019 |
Stolen data for sale, Mac malware, and container vulnerabilities
|
Feb 14, 2019 |
Insecure IoT devices, password breach checks, and misleading phone apps
|
Feb 07, 2019 |
Japan to hack civilians’ IoT devices, Apple Facetime bug, and an evolution in BEC scams
|
Jan 31, 2019 |
Attacks on financial institutions in Africa, dodgy free mobile VPN apps, and Facebook shutters multiple “inauthentic” accounts
|
Jan 24, 2019 |
Ukrainians indicted, cash for Tesla hacks, and cryptocurrency exchanges breached
|
Jan 17, 2019 |
German data leak, untrustworthy IoT devices, and PewDiePie hackers go quiet
|
Jan 10, 2019 |
What Were the Top 5 Cyber Security Stories of 2018?
|
Dec 20, 2018 |
Money mule arrests, grandparent scams, and new research into the Seedworm group
|
Dec 13, 2018 |
SamSam developments, an AI gaffe, and some massive data breaches
|
Dec 06, 2018 |
Operation Eversion, Magecart, and the UK parliament takes on Facebook
|
Nov 29, 2018 |
Special Report: Conficker’s 10th anniversary
|
Nov 22, 2018 |
Formjacking, lots of vulnerabilities get patched, and a BEC scam costs a cinema company millions
|
Nov 15, 2018 |
Lazarus ATM attacks, Inception Framework uses new backdoor, and small businesses’ cyber risk
|
Nov 08, 2018 |
SamSam ransomware, Midterms 2018, new Emotet activity, and Docker APIs exploited for cryptojacking
|
Nov 01, 2018 |
Super Micro spy chip story contradictions, Russian woman indicted in U.S. for conspiring to interfere in U.S. elections, and Twitter tackles disinformation campaigns
|
Oct 25, 2018 |
Special Report: What is it Really Like to Work in Cyber Security?
|
Oct 18, 2018 |
Gallmaker research, Navionics breach, and Fitbit data used by cops in murder investigation
|
Oct 11, 2018 |
APT28 activity, cryptojacking research, and Face ID used to access criminal suspect’s phone
|
Oct 04, 2018 |
Formjacking research, WordPress plugins cause problems, the dangers of plaintext password storage, and the Mojave zero day
|
Sep 27, 2018 |
Xbash threat, TripAdvisor fake review clampdown, blockchain casinos targeted, and who is behind DDoS attacks on UK unis?
|
Sep 20, 2018 |
Deep Dive: Symantec Takes on Software Supply Chain Attacks
|
Sep 13, 2018 |
One billion dollars in Bitcoin on the move, data breaches, Mastercard and Google’s info-sharing deal, and MikroTik developments
|
Sep 06, 2018 |
Andromeda botnet, DNC “hack”, a new Windows zero day, and dark web developments
|
Aug 30, 2018 |
How much do your mobile apps really know about you? Is your charging cable safe? And is end-to-end encryption under threat?
|
Aug 23, 2018 |
Special Report: Financial Threats
|
Aug 16, 2018 |
“Security through obscurity”, Snapchat's source code leak, MikroTik coin mining campaign, and Symantec talks machine learning at Black Hat
|
Aug 09, 2018 |
Coin mining in games, SIM hijacking, connected car vulnerabilities, and attacks on the software supply chain within the supply chain
|
Aug 02, 2018 |
Leafminer research, data breaches, credential stuffing, and IoT security fails
|
Jul 26, 2018 |
Powershell risks, extortion scams that threaten embarrassment, Twitter clamps down on dodgy accounts, and the financial impact of data breaches
|
Jul 19, 2018 |
Special Report: Software Update Supply Chain Attacks
|
Jul 12, 2018 |
Mid-year review: Some of the biggest stories of 2018 so far, including VPNFilter, Orangeworm, and Meltdown and Spectre
|
Jul 05, 2018 |
Ticketmaster breach, insider attacks, the issue of legacy systems in businesses, and is encrypted ransomware a new trend?
|
Jun 28, 2018 |
New Symantec research on the Thrip cyber espionage group, BEC scammers, and coinminers in court in Japan
|
Jun 21, 2018 |