Modem Mischief tells the true stories of the outlaws of cyberspace. Hackers, dark web lurkers and cybercrime perpetrators of the digital underground are explored in this true crime series.
…
continue reading
A podcast about business ideas and creating sustainable, efficient business operations. Support this podcast: https://podcasters.spotify.com/pod/show/bizhacktivity/support
…
continue reading
Discover A Hidden Health-Hacking Code That Unlocks Your Phenomenal Potential for an Outstanding Healthspan, Lifespan and Wealth-span. Find out what most other Doctors don’t tell you, with cutting-edge health-hacktivating advice from Lifestyle Medicine Doctor, GP and Longevity Expert Dr Alka Patel. Featuring candid conversations with celebrities, influencers and industry icons, hear the real-life stories of what it takes to be healthy, wealthy, and wise in today’s world. It’s time to join the ...
…
continue reading
Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.
…
continue reading
Control Loop is the OT Cybersecurity Podcast, your terminal for ICS security, intelligence, and learning. Every two weeks, we bring you the latest news, strategies, and technologies that industry professionals rely on to safeguard civilization.
…
continue reading
1
Coming Soon to Las Vegas: Adversary Universe Previews #FalCon2024
14:12
14:12
Play later
Play later
Lists
Like
Liked
14:12
Next week marks the start of Fal.Con 2024. CrowdStrike’s annual conference brings together cybersecurity leaders and practitioners, as well as our customers and partners, in Las Vegas for four days of keynotes, breakout sessions, workshops and demos. Adam and Cristian will both be speaking at this year’s show. In this episode, they share the talks …
…
continue reading
1
Intern Spotlight: Starting A Cyber Career with CrowdStrike
36:57
36:57
Play later
Play later
Lists
Like
Liked
36:57
For students aspiring to work in cybersecurity, sitting in a classroom isn’t enough to gain the skills and experience they need to succeed. Industry internships are invaluable opportunities to learn how security pros operate in the real world and understand the responsibilities each role requires. CrowdStrike’s University Program welcomes interns a…
…
continue reading
1
Hunting the Rogue Insiders Operating for FAMOUS CHOLLIMA
31:17
31:17
Play later
Play later
Lists
Like
Liked
31:17
FAMOUS CHOLLIMA, a new adversary CrowdStrike is tracking, has recently made headlines for its insider threat activity. In April 2024, CrowdStrike Services responded to the first of several incidents in which FAMOUS CHOLLIMA threat actors targeted 30+ US-based companies. The insiders claimed to be US residents and were hired for remote IT positions,…
…
continue reading
1
Talking OT Security with Fernando Madureira, Global CISO of Cosan
20:54
20:54
Play later
Play later
Lists
Like
Liked
20:54
Where in the world are Adam and Cristian? In this episode, they’re coming to you live from São Paulo, Brazil, where they sat down with a special guest: Fernando Madureira. Fernando is the Global CISO of Cosan, a Brazilian conglomerate of several businesses spanning energy, transportation and logistics, and other sectors that operates around the wor…
…
continue reading
1
How Adversaries Respond to Law Enforcement Takedowns
43:21
43:21
Play later
Play later
Lists
Like
Liked
43:21
What happens when there is a takedown of a major cybercriminal group or law enforcement activity has a major impact on its leadership? In this episode, Adam and Cristian unpack what happens in the aftermath of a takedown, including how some groups splinter, reemerge and even rebrand.By CrowdStrike
…
continue reading
Aaron Swartz wanted a free and open Internet. The government didn't and it cost Aaron his life. Created, Produced & Hosted by Keith Korneluk Written & Researched by Katie Fedigan-Linton Mixed & Mastered by David Swope Theme Song You Are Digital by Computerbandit
…
continue reading
How do adversaries react when they know they’re being tracked? How do they respond to organizations that are on to them — and how do they know what the defenders know? In this episode, Adam and Cristian explore how adversary behavior shifts as their activity is discovered and tracked. Today’s adversaries carefully research their victims. They read …
…
continue reading
The savange ransomware attack of Colonial Pipeline was close to bringing travel in the United States to a standstill. Created, Produced & Hosted by Keith Korneluk Written & Researched by John Phillips Mixed & Mastered by David Swope Theme Song You Are Digital by Computerbandit
…
continue reading
1
Digging into regulatory compliance issues.
18:23
18:23
Play later
Play later
Lists
Like
Liked
18:23
UK will propose law to ban ransom payments for critical infrastructure entities. EPA outlines enforcement measures to protect water utilities against cyberattacks. Rockwell advises customers to disconnect ICS devices from the internet. Senator Vance asks CISA for information on Volt Typhoon. Guest Kimberly Graham of Dragos joins Dave to discuss reg…
…
continue reading
St. Petersberg computer hacker Vladimir Levin allegedly hacked Citibank in the mid-1990's and stole thousands of dollars. This is his story. Created, Produced & Hosted by Keith Korneluk Written & Researched by John Phillips Mixed & Mastered by David Swope Theme Song You Are Digital by Computerbandit
…
continue reading
What happens when two cyber superpowers — and the most populous countries in the world — target one another? Tensions between China and India have been rising in recent years, and it’s time we take a deep dive into the many factors at play. In this episode, Adam and Cristian examine the dynamics between the two nations, the drivers of their evolvin…
…
continue reading
Workplace bullying, the Nuclear Option, and why you should never write your passwords down in a notebook. This is the story of Josh Schlute and the Vault 7 Hack. Created, Produced & Hosted by Keith Korneluk Written & Researched by Katie Fedigan-Linton Mixed & Mastered by David Swope Theme Song You Are Digital by Computerbandit…
…
continue reading
1
Understanding Social Engineering with Shelly Giesbrecht, Director, Professional Services
42:47
42:47
Play later
Play later
Lists
Like
Liked
42:47
Social engineering is not a new threat — adversaries have long used psychological manipulation to gain access, money, information and more. But as we learn in this episode from Shelly Giesbrecht, Director of Professional Services at CrowdStrike, it remains a top cybersecurity challenge for all organizations. Today’s social engineers are more convin…
…
continue reading
Digital extortion. Hackers sieze your data and a ransom is paid to retrieve it. But this time, it turned deadly... Created, Produced & Hosted by Keith Korneluk Written & Researched by Lauren Minkoff Mixed & Mastered by David Swope Theme Song You Are Digital by Computerbandit
…
continue reading
US Defense Department warns of Russian hacktivists targeting OT devices. The US government establishes safety and security board to advise the deployment of AI in critical infrastructure sectors. Vulnerabilities affect CyberPower UPS management software. US congressmen put forward water system cybersecurity bill. Encore guest Garrett Bladow, Distin…
…
continue reading
We delve into the story of Hector Monsegur, also known as 'Sabu', a central figure in the hacktivist group Lulzsec. Explore his rise to infamy in the cyber world, his pivotal role in high-profile cyber attacks, and the dramatic turn of events that led him to collaborate with law enforcement. Join us for a gripping narrative on the complexities of c…
…
continue reading
The rise of hacktivism — the use of hacking techniques to make a statement supporting a political or social cause — is often associated with the Occupy Wall Street movement and the Anonymous hacktivist collective. But the practice of hacking as a form of civil disobedience goes back to the 1990s. It has taken many forms in the years since, driven b…
…
continue reading
It infected over 10 million computers and caused millions of dollars of damage world wide. The ILOVEYOU computer worm compromised passwords through a bug in Microsoft Outlook. This is the story of ILOVEYOU and the creator, Onel de Guzman. Created, Produced & Hosted by Keith Korneluk Written & Researched by Jim Rowley Mixed and Mastered by David Swo…
…
continue reading
1
Critical infrastructure: Pending legislation and risks and rewards from AI.
24:20
24:20
Play later
Play later
Lists
Like
Liked
24:20
Mandiant ties OT attacks to Sandworm. Russia-linked hackers target Texas water utilities. Belarusian hacktivists hit fertilizer company. CISA issues eight ICS advisories. Dave Bittner's Caveat podcast co host Ben Yelin joins him to discuss pending legislation with potential to affect critical infrastructure, as well as the Department of Energy’s as…
…
continue reading
On this episode: secret government tools, ransomware, and one of the biggest unsolved hacks of all time. This is the story of the Shadow Brokers. Create, Produced & Hosted by Keith Korneluk Written & Researched by David Burgis Mixed & Mastered by David Swope Theme Song You Are Digital by Computerbandit.…
…
continue reading
1
Building a Strong Threat Hunting Program with Andrew Munchbach
36:24
36:24
Play later
Play later
Lists
Like
Liked
36:24
Organizations fear adversaries will attack. Threat hunters assume adversaries are already in the system — and their investigations seek unusual behavior that may indicate malicious activity is afoot. Andrew Munchbach, CrowdStrike’s Global VP, Field Engineering, joins Adam and Cristian in this week’s episode to explore what threat hunting is, how it…
…
continue reading
On this bonus episode, gaming chaos, police raids, and the face behind a notorious Derp hacking group. Created, Produced & Hosted by Keith Korneluk Written & Researched by Emily McGinn Edited, Mixed & Mastered by Greg Bernhard Theme Song You Are Digital by Computerbandit
…
continue reading
Chinese-manufactured devices in US networks see a 41% YoY increase. Ukraine-linked hackers deploy ICS malware against Russian infrastructure company. A look at cyberattacks that had physical consequences in 2023. Lessons from NERC’s GridEx exercise. Extension requested for comment period on CISA’s incident reporting rule. Guest Kate Ledesma, Senior…
…
continue reading
Napster changed the music industry forever. But the music industry sued the illegal streaming service into oblivion. Created, Produced & Hosted by Keith Korneluk Written & Researched by David Burgis Mixed & Mastered by David Swope Theme Song You Are Digital by Computerbandit
…
continue reading
1
Adversary Attribution: What It Means and How It Works
49:45
49:45
Play later
Play later
Lists
Like
Liked
49:45
Today’s conversation explores a common question around adversary activity: Why does attribution matter? When a cyberattack hits, why go to the trouble of learning who is behind it? Each attempt at an intrusion can reveal a lot about an adversary — who they are, what they’re doing and what their motivations may be. This information can not only info…
…
continue reading
This is the story of how one man who called himself Captain Crunch used a toy whistle to hack the phone company. This is John Draper, the original phone phreak. Created, Produced & Hosted by Keith Korneluk Written & Researched by Charlotte Cornbrooks Mixed & Mastered by David Swope Theme Song You Are Digital by Computerbandit…
…
continue reading
Sellafield nuclear waste site to be prosecuted for alleged cybersecurity failings. CISA issues draft proposal for cyber incident reporting by critical infrastructure entities. Threat actor targets Indian government and energy entities. Suspicious NuGet package appears to target developers in the industrial sector. Guest Eric Goldstein, Executive As…
…
continue reading
On this episode, an all-out cyber world war, the infamous hack of the Girl Scouts’ website, and one hackers’ role in the FBI. This is the story of the Hackweiser hacking group. Show Transcript Shop Modem Mischief Merch! Created, Produced & Hosted by Keith Korneluk Written & Researched by Emily McGinn Edited, Mixed & Mastered by Greg Bernhard Theme …
…
continue reading
1
LIVE from Gov Threat Summit: A Chat with Morgan Adamski, Chief of the NSA’s Cybersecurity Collaboration Center
25:52
25:52
Play later
Play later
Lists
Like
Liked
25:52
The National Security Agency’s Cybersecurity Collaboration Center (CCC) was created based on a growing need for the public and private sectors to work together and share insights to understand adversaries’ intentions, as well as the scope and scale of their activity. In this special episode of the Adversary Universe podcast, Adam and Cristian are j…
…
continue reading
On this episode: patriotism, race riots, maritime disputes, cybercrime, a hostage crisis, and the first generation of Chinese hackers. This is the story of the Honker Union hacking group. Support us on Patreon! Show Transcript Shop Modem Mischief Merch! Created, Produced & Hosted by Keith Korneluk Written & Researched by Jim Rowley Edited, Mixed & …
…
continue reading
1
Navigating China's infrastructure risks in the energy sector.
28:51
28:51
Play later
Play later
Lists
Like
Liked
28:51
Researchers discover a way to hijack web-based PLCs. Threat actor targets manufacturing entities in North America. US Department of Defense launches CORA program. CISA issues ICS advisories. Guest Aura Sabadus, Senior Journalist at ICIS, joins us to discuss how energy insiders are approaching the renewed risks of China's ramp up toward potential at…
…
continue reading
1
CrowdStrike CSO Shawn Henry on Election Security, Nation-State Threats and His FBI Career
44:27
44:27
Play later
Play later
Lists
Like
Liked
44:27
CrowdStrike Chief Security Officer Shawn Henry joined CrowdStrike as employee number 19 after a 24-year career at the FBI, where he retired as the Bureau’s Executive Assistant Director. Today, he joins Adam and Cristian for a wide-ranging conversation exploring his early days at CrowdStrike and transition to the private sector, his perspective on t…
…
continue reading
On this episode: website defacement gangs, NASA, September 11th, Venezuelan oligarchs, and the US government’s war on teenage hackers. This is the story of the World of Hell hacking group. Support us on Patreon! Show Transcript Shop Modem Mischief Merch! Created, Produced & Hosted by Keith Korneluk Written & Researched by Jim Rowley Edited, Mixed &…
…
continue reading
NIST releases Cybersecurity Framework 2.0. Biden administration issues executive order on maritime cybersecurity. Suspected Chinese threat actor continues to exploit Ivanti vulnerabilities. ThyssenKrupp sustains ransomware attack. Guests Liz Martin, Global Advisory Solution Architect at Dragos, and Blake Benson, Senior Director at ABS Group, talk t…
…
continue reading
1
A Human at the Keyboard: CrowdStrike Reports 60% Jump in Interactive Intrusions
35:42
35:42
Play later
Play later
Lists
Like
Liked
35:42
The days of automated cyberattacks are dwindling: last year CrowdStrike saw a 60% jump in interactive intrusions, a type of attack in which a human is on the other side, working to break in and navigating their target environment as soon as they gain access. Most (75% of) attacks in 2023 didn’t involve malware at all — in nearly all cases, the adve…
…
continue reading
Five Eyes publish report on Volt Typhoon. Volt Typhoon targets emergency management services in the US. Siemens and Schneider Electric issue patches. Guest is Magpie Graham, Principal Adversary Hunter Technical Director at Dragos, sharing the findings of Dragos Cybersecurity Year in Review report. The Learning Lab segment will return next episode. …
…
continue reading