show episodes
 
Artwork

101
Modem Mischief

Keith Korneluk

Unsubscribe
Unsubscribe
Monthly+
 
Modem Mischief tells the true stories of the outlaws of cyberspace. Hackers, dark web lurkers and cybercrime perpetrators of the digital underground are explored in this true crime series.
  continue reading
 
Discover A Hidden Health-Hacking Code That Unlocks Your Phenomenal Potential for an Outstanding Healthspan, Lifespan and Wealth-span. Find out what most other Doctors don’t tell you, with cutting-edge health-hacktivating advice from Lifestyle Medicine Doctor, GP and Longevity Expert Dr Alka Patel. Featuring candid conversations with celebrities, influencers and industry icons, hear the real-life stories of what it takes to be healthy, wealthy, and wise in today’s world. It’s time to join the ...
  continue reading
 
Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.
  continue reading
 
Loading …
show series
 
Next week marks the start of Fal.Con 2024. CrowdStrike’s annual conference brings together cybersecurity leaders and practitioners, as well as our customers and partners, in Las Vegas for four days of keynotes, breakout sessions, workshops and demos. Adam and Cristian will both be speaking at this year’s show. In this episode, they share the talks …
  continue reading
 
For students aspiring to work in cybersecurity, sitting in a classroom isn’t enough to gain the skills and experience they need to succeed. Industry internships are invaluable opportunities to learn how security pros operate in the real world and understand the responsibilities each role requires. CrowdStrike’s University Program welcomes interns a…
  continue reading
 
FAMOUS CHOLLIMA, a new adversary CrowdStrike is tracking, has recently made headlines for its insider threat activity. In April 2024, CrowdStrike Services responded to the first of several incidents in which FAMOUS CHOLLIMA threat actors targeted 30+ US-based companies. The insiders claimed to be US residents and were hired for remote IT positions,…
  continue reading
 
Where in the world are Adam and Cristian? In this episode, they’re coming to you live from São Paulo, Brazil, where they sat down with a special guest: Fernando Madureira. Fernando is the Global CISO of Cosan, a Brazilian conglomerate of several businesses spanning energy, transportation and logistics, and other sectors that operates around the wor…
  continue reading
 
How do adversaries react when they know they’re being tracked? How do they respond to organizations that are on to them — and how do they know what the defenders know? In this episode, Adam and Cristian explore how adversary behavior shifts as their activity is discovered and tracked. Today’s adversaries carefully research their victims. They read …
  continue reading
 
UK will propose law to ban ransom payments for critical infrastructure entities. EPA outlines enforcement measures to protect water utilities against cyberattacks. Rockwell advises customers to disconnect ICS devices from the internet. Senator Vance asks CISA for information on Volt Typhoon. Guest Kimberly Graham of Dragos joins Dave to discuss reg…
  continue reading
 
What happens when two cyber superpowers — and the most populous countries in the world — target one another? Tensions between China and India have been rising in recent years, and it’s time we take a deep dive into the many factors at play. In this episode, Adam and Cristian examine the dynamics between the two nations, the drivers of their evolvin…
  continue reading
 
Workplace bullying, the Nuclear Option, and why you should never write your passwords down in a notebook. This is the story of Josh Schlute and the Vault 7 Hack. Created, Produced & Hosted by Keith Korneluk Written & Researched by Katie Fedigan-Linton Mixed & Mastered by David Swope Theme Song You Are Digital by Computerbandit…
  continue reading
 
Social engineering is not a new threat — adversaries have long used psychological manipulation to gain access, money, information and more. But as we learn in this episode from Shelly Giesbrecht, Director of Professional Services at CrowdStrike, it remains a top cybersecurity challenge for all organizations. Today’s social engineers are more convin…
  continue reading
 
US Defense Department warns of Russian hacktivists targeting OT devices. The US government establishes safety and security board to advise the deployment of AI in critical infrastructure sectors. Vulnerabilities affect CyberPower UPS management software. US congressmen put forward water system cybersecurity bill. Encore guest Garrett Bladow, Distin…
  continue reading
 
We delve into the story of Hector Monsegur, also known as 'Sabu', a central figure in the hacktivist group Lulzsec. Explore his rise to infamy in the cyber world, his pivotal role in high-profile cyber attacks, and the dramatic turn of events that led him to collaborate with law enforcement. Join us for a gripping narrative on the complexities of c…
  continue reading
 
The rise of hacktivism — the use of hacking techniques to make a statement supporting a political or social cause — is often associated with the Occupy Wall Street movement and the Anonymous hacktivist collective. But the practice of hacking as a form of civil disobedience goes back to the 1990s. It has taken many forms in the years since, driven b…
  continue reading
 
It infected over 10 million computers and caused millions of dollars of damage world wide. The ILOVEYOU computer worm compromised passwords through a bug in Microsoft Outlook. This is the story of ILOVEYOU and the creator, Onel de Guzman. Created, Produced & Hosted by Keith Korneluk Written & Researched by Jim Rowley Mixed and Mastered by David Swo…
  continue reading
 
Mandiant ties OT attacks to Sandworm. Russia-linked hackers target Texas water utilities. Belarusian hacktivists hit fertilizer company. CISA issues eight ICS advisories. Dave Bittner's Caveat podcast co host Ben Yelin joins him to discuss pending legislation with potential to affect critical infrastructure, as well as the Department of Energy’s as…
  continue reading
 
Organizations fear adversaries will attack. Threat hunters assume adversaries are already in the system — and their investigations seek unusual behavior that may indicate malicious activity is afoot. Andrew Munchbach, CrowdStrike’s Global VP, Field Engineering, joins Adam and Cristian in this week’s episode to explore what threat hunting is, how it…
  continue reading
 
Chinese-manufactured devices in US networks see a 41% YoY increase. Ukraine-linked hackers deploy ICS malware against Russian infrastructure company. A look at cyberattacks that had physical consequences in 2023. Lessons from NERC’s GridEx exercise. Extension requested for comment period on CISA’s incident reporting rule. Guest Kate Ledesma, Senior…
  continue reading
 
Today’s conversation explores a common question around adversary activity: Why does attribution matter? When a cyberattack hits, why go to the trouble of learning who is behind it? Each attempt at an intrusion can reveal a lot about an adversary — who they are, what they’re doing and what their motivations may be. This information can not only info…
  continue reading
 
Sellafield nuclear waste site to be prosecuted for alleged cybersecurity failings. CISA issues draft proposal for cyber incident reporting by critical infrastructure entities. Threat actor targets Indian government and energy entities. Suspicious NuGet package appears to target developers in the industrial sector. Guest Eric Goldstein, Executive As…
  continue reading
 
On this episode, an all-out cyber world war, the infamous hack of the Girl Scouts’ website, and one hackers’ role in the FBI. This is the story of the Hackweiser hacking group. Show Transcript Shop Modem Mischief Merch! Created, Produced & Hosted by Keith Korneluk Written & Researched by Emily McGinn Edited, Mixed & Mastered by Greg Bernhard Theme …
  continue reading
 
The National Security Agency’s Cybersecurity Collaboration Center (CCC) was created based on a growing need for the public and private sectors to work together and share insights to understand adversaries’ intentions, as well as the scope and scale of their activity. In this special episode of the Adversary Universe podcast, Adam and Cristian are j…
  continue reading
 
On this episode: patriotism, race riots, maritime disputes, cybercrime, a hostage crisis, and the first generation of Chinese hackers. This is the story of the Honker Union hacking group. Support us on Patreon! Show Transcript Shop Modem Mischief Merch! Created, Produced & Hosted by Keith Korneluk Written & Researched by Jim Rowley Edited, Mixed & …
  continue reading
 
Researchers discover a way to hijack web-based PLCs. Threat actor targets manufacturing entities in North America. US Department of Defense launches CORA program. CISA issues ICS advisories. Guest Aura Sabadus, Senior Journalist at ICIS, joins us to discuss how energy insiders are approaching the renewed risks of China's ramp up toward potential at…
  continue reading
 
CrowdStrike Chief Security Officer Shawn Henry joined CrowdStrike as employee number 19 after a 24-year career at the FBI, where he retired as the Bureau’s Executive Assistant Director. Today, he joins Adam and Cristian for a wide-ranging conversation exploring his early days at CrowdStrike and transition to the private sector, his perspective on t…
  continue reading
 
On this episode: website defacement gangs, NASA, September 11th, Venezuelan oligarchs, and the US government’s war on teenage hackers. This is the story of the World of Hell hacking group. Support us on Patreon! Show Transcript Shop Modem Mischief Merch! Created, Produced & Hosted by Keith Korneluk Written & Researched by Jim Rowley Edited, Mixed &…
  continue reading
 
NIST releases Cybersecurity Framework 2.0. Biden administration issues executive order on maritime cybersecurity. Suspected Chinese threat actor continues to exploit Ivanti vulnerabilities. ThyssenKrupp sustains ransomware attack. Guests Liz Martin, Global Advisory Solution Architect at Dragos, and Blake Benson, Senior Director at ABS Group, talk t…
  continue reading
 
The days of automated cyberattacks are dwindling: last year CrowdStrike saw a 60% jump in interactive intrusions, a type of attack in which a human is on the other side, working to break in and navigating their target environment as soon as they gain access. Most (75% of) attacks in 2023 didn’t involve malware at all — in nearly all cases, the adve…
  continue reading
 
Five Eyes publish report on Volt Typhoon. Volt Typhoon targets emergency management services in the US. Siemens and Schneider Electric issue patches. Guest is Magpie Graham, Principal Adversary Hunter Technical Director at Dragos, sharing the findings of Dragos Cybersecurity Year in Review report. The Learning Lab segment will return next episode. …
  continue reading
 
Loading …

Quick Reference Guide