Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
T
The Threatpost Podcast

1
Sponsored Podcast: Ransomware Attacks Exploded in Q4 2020
23:03
23:03
Play later
Play later
Lists
Like
Liked
23:03
Ransomware attacks continue to be a top security issue plaguing companies, with researchers from Fortinet's Fortiguard Labs saying they saw an explosion in ransomware activity towards the end of the fourth quarter of 2020.By Mike Mimoso, Chris Brook
T
The Threatpost Podcast

1
Chinese Hackers Stole NSA-Linked Hacking Tool: Report
19:57
19:57
Play later
Play later
Lists
Like
Liked
19:57
Yaniv Balmas, the head of cyber research with Check Point Software, and Oded Vanunu, the head of products vulnerability research with Check Point Software, talk on this week's Threatpost podcast about the new discoveries around the NSA-linked exploit tools, as well as the implications of the SolarWinds supply-chain hack.…
T
The Threatpost Podcast

1
Emotet's Takedown: Have We Seen the Last of the Malware?
17:20
17:20
Play later
Play later
Lists
Like
Liked
17:20
Law enforcement have been on a malware-takedown rampage: Last week, several agencies took down servers supporting the Emotet malware. Sherrod DiGrippo, senior director of threat research and detection with Proofpoint, said that no activity involving Emotet has been detected since the takedown effort occurred last week.…
T
The Threatpost Podcast

1
Breaking Down Joe Biden's $10B Cybersecurity 'Down Payment'
19:03
19:03
Play later
Play later
Lists
Like
Liked
19:03
Joe Biden's inauguration ceremony last week marked a new strategy for the government's cybersecurity initiatives, with the US president's COVID-19 relief plan including $10 billion in funding for various cybersecurity defense initiatives - from hiring key security personnel to support for the Cybersecurity Infrastructure Security Agency (CISA).…
T
The Threatpost Podcast


1
CISOs Prep For COVID-19 Exposure Notification in the Workplace
23:41
23:41
Play later
Play later
Lists
Like
Liked
23:41
In this week’s Threatpost podcast, senior editor Lindsey Welch talks with Steve Moore, chief security strategist with Exabeam, about the data privacy challenges posed by impending exposure notification implementations in the workplace.By Mike Mimoso, Chris Brook
T
The Threatpost Podcast


1
A Look Ahead at 2021: SolarWinds Fallout and Shifting CISO Budgets
21:45
21:45
Play later
Play later
Lists
Like
Liked
21:45
Threatpost editors Tom Spring, Tara Seals and Lindsey Welch break down the top security stories to look out for in this week's first podcast of 2021 - from the SolarWinds hack to surging ransomware hospital cyberattacks.By Mike Mimoso, Chris Brook
T
The Threatpost Podcast


1
Sponsored Podcast: Simplifying Proactive Defense With Threat Playbooks
24:10
24:10
Play later
Play later
Lists
Like
Liked
24:10
Security defense strategy can be very complex - with security teams not dealing with mere small bits of information, but instead dealing with tens of thousands of data points, from IoCs to TTPs, said Derek Manky, Chief of Security Insights & Global Threat Alliances at Fortinet.By Mike Mimoso, Chris Brook
T
The Threatpost Podcast


1
Sponsored Podcast: Cybersecurity in the 'New Normal'
29:21
29:21
Play later
Play later
Lists
Like
Liked
29:21
From eCommerce threats, to security concerns in connected speakers, Fortinet researchers discuss the top evolving threats of 2020, heading into the new year.By Mike Mimoso, Chris Brook
T
The Threatpost Podcast


1
Amnesia:33 TCP/IP Flaws Plague Millions of IoT Devices
26:20
26:20
Play later
Play later
Lists
Like
Liked
26:20
Researchers - as well as the U.S. Cybersecurity Infrastructure Security Agency (CISA) - are warning of a set of serious vulnerabilities affecting TCP/IP stacks. The flaws impact millions of Internet-of-Things (IoT) devices and embedded systems, including smart thermometers, smart plugs and printers, Forescout researcher Daniel dos Santos said durin…
T
The Threatpost Podcast


1
Sponsored Podcast: Why DNS Filtering is a Top Battle Front Against Malware, Phishing
24:22
24:22
Play later
Play later
Lists
Like
Liked
24:22
Peter Lowe, security researcher with DNSFilter, talks to Cody Hackett on this week's Threatpost Podcast about how DNS filtering tactics are evolving to keep up with new cybercriminal tricks, as well as how companies can protect themselves.By Mike Mimoso, Chris Brook
T
The Threatpost Podcast


1
Smart Doorbells on Amazon, eBay, Harbor Serious Security Issues
22:39
22:39
Play later
Play later
Lists
Like
Liked
22:39
Matt Lewis, research director at NCC Group discloses serious security and privacy in 11 different smart doorbells, which could be exploited by attackers to physically switch off the devices.By Mike Mimoso, Chris Brook
T
The Threatpost Podcast


1
Cybercriminals Batter Automakers With Ransomware, IP Theft Cyberattacks
21:12
21:12
Play later
Play later
Lists
Like
Liked
21:12
Cybercriminals are recognizing that the data that automotive companies have to offer - from customer and employee personal identifiable information (PII) to financial data - are invaluable. Paul Proudhomme, cyber threat intelligence analyst at IntSights, warns that this is translating into cyberattacks - whether it's aimed at Intellectual Property …
T
The Threatpost Podcast


1
Botnet Attackers Turn to Vulnerable IoT Devices
26:37
26:37
Play later
Play later
Lists
Like
Liked
26:37
Cybercriminals behind botnets are increasingly shifting their infrastructure from the cloud to Internet of Things (IoT) devices, according to Derek Manky, Chief of Security Insights & Global Threat Alliances at Fortinet's FortiGuard Labs.By Mike Mimoso, Chris Brook
T
The Threatpost Podcast


1
From Triton to Stuxnet: Preparing for OT Incident Response
24:15
24:15
Play later
Play later
Lists
Like
Liked
24:15
Threatpost talks to Dragos' Lesley Carhart about the top cybersecurity challenges facing manufacturers during the pandemic.By Mike Mimoso, Chris Brook
T
The Threatpost Podcast


1
News Wrap Halloween Edition: Scary Election, Hospital Cyberattack Stories
30:39
30:39
Play later
Play later
Lists
Like
Liked
30:39
This Halloween week, Threatpost editors break down the scariest stories haunting the security space, including: A wave of ransomware attacks targeting a number of hospitals, sparking worries about healthcare security and the impact on patents during COVID-19 "Zombie" vulnerabilities - including Zerologon and SMBGhost - that continued to haunt syste…
T
The Threatpost Podcast


1
Holiday Shopping Craze, COVID-19 Spur Retail Software Security Storm
25:08
25:08
Play later
Play later
Lists
Like
Liked
25:08
Chris Eng, chief research officer with Veracode, warns that the deluge of in-person shoppers during the pandemic has pushed restaurants, boutique shops and other retailers to utilize new online software ecommerce platforms - but they aren't prepared for implementing the correct security measures for these platforms.…
T
The Threatpost Podcast

1
Sponsored Podcast: Phishing Lures Shift from COVID-19 to Job Opportunities
24:30
24:30
Play later
Play later
Lists
Like
Liked
24:30
Derek Manky, Chief of Security Insights & Global Threat Alliances at Fortinet's FortiGuard Labs, said that cybercriminals cashed in on the surge of COVID-19 earlier this year with phishing emails purporting to be from healthcare professionals offering more resources and information about the pandemic.…
T
The Threatpost Podcast

1
News Wrap: Zoom's End-to-End Encryption Rollout and DDoS Extortion Threats
21:21
21:21
Play later
Play later
Lists
Like
Liked
21:21
The Threatpost editors break down the top security stories of the week ended Oct. 16, including: Patch Tuesday insanity, with Microsoft and Adobe releasing fixes for severe vulnerabilities - including a critical, potentially wormable remote code execution Microsoft vulnerability Barnes and Noble being hacked - and why some readers are unhappy with …
T
The Threatpost Podcast

1
305 CVEs and Counting: Bug-Hunting Stories From a Security Engineer
33:17
33:17
Play later
Play later
Lists
Like
Liked
33:17
Larry Cashdollar shares his craziest bug finding stories, including a flaw (CVE-1999-0765) found during his position as a UNIX Systems Administrator, which existed in the SGI IRIX midikeys program - and accidentally threw a wrench in a demo for a navy admiral on the Aegis destroyer class ship.By Mike Mimoso, Chris Brook
T
The Threatpost Podcast

1
Critical Industrial Flaws Pose a Patching Headache For Manufacturers
22:28
22:28
Play later
Play later
Lists
Like
Liked
22:28
Sharon Brizinov, the principal vulnerability researcher with Claroty, who discovered vulnerabilities a software component used by various critical infrastructure systems, talks about why patching is a headache for manufacturers and other industrials firms.By Mike Mimoso, Chris Brook
T
The Threatpost Podcast


1
Vulnerability Disclosure: Ethical Hackers Seek Best Practices
23:48
23:48
Play later
Play later
Lists
Like
Liked
23:48
The Zero Day Initiative team talks about the biggest vulnerability disclosure challenges that ethical hackers are facing - particularly in markets like the industrial world and IoT.By Mike Mimoso, Chris Brook
T
The Threatpost Podcast


1
Disinformation A Booming Industry For Attackers As Elections Loom
20:19
20:19
Play later
Play later
Lists
Like
Liked
20:19
With the U.S. presidential elections looming, disinformation is a top challenge. In the four years since the previous 2016 presidential election, threat actors have created an entire sophisticated and intricate industry around misinformation - raising the bar for social media companies to detect and protect against this threat, new Wednesday Cisco …
T
The Threatpost Podcast


1
News Wrap: AWS Cryptojacking Worm, IBM Privacy Lawsuit and More
13:49
13:49
Play later
Play later
Lists
Like
Liked
13:49
Threatpost editors Lindsey O'Donnell-Welch and Tara Seals discuss the top security news stories of the week ended Aug. 21, including: IBM, the owner of the Weather Channel mobile app, has reached a settlement with the Los Angeles city attorney's office after a 2019 lawsuit alleged that the app was deceiving its users in how it was using their geolo…
T
The Threatpost Podcast


1
Active 'Duri' Campaign Utilizes HTML Smuggling to Cloak Malware
18:39
18:39
Play later
Play later
Lists
Like
Liked
18:39
Researchers are warning of an active campaign that utilized HTML smuggling to deliver malware, effectively bypassing various network security solutions, including sandboxes, legacy proxies and firewalls. Because HTML smuggling is not necessarily a novel technique - it's been used by attackers for awhile - this campaign shows that bad actors continu…
T
The Threatpost Podcast


1
Sponsored Podcast: The Perimeter Gets More Personal in 1H 2020
23:20
23:20
Play later
Play later
Lists
Like
Liked
23:20
Derek Manky, Chief, Security Insights & Global Threat Alliances at Fortinet's FortiGuard Labs, said that the semi-annual FortiGuard Labs Global Threat Landscape Report for the first half of 2020, released Wednesday, reveals an "unprecedented cyber threat landscape."By Mike Mimoso, Chris Brook