Join us for State of Cybercrime, where experts discuss the latest trends and developments in the world of cybercrime and provide insights into how organizations can protect themselves from potential threats. Sponsored by Varonis
…
continue reading
In this episode of 'State of Cybercrime', the hosts discuss various topics including an executive order on Artificial Intelligence(AI) by President Biden promoting a balance between AI safety, security, privacy and innovation, as well as implications for American leadership in AI. They covered the disruptive Mozi Botnet, SolarWinds CISO's challenge…
…
continue reading
Few breaches have drawn as much social media fervor as the recent 23andMe incident, in which the genomics company was victim to a massive credential stuffing attack that leveraged leaked and reused passwords to target accounts without MFA. What differentiates this attack from others is that 23andMe itself was not breached, but an entire wave of its…
…
continue reading
Join Matt Radolec and David Gibson for this episode of the State of Cybercrime, recording from Black Hat 2023, as they cover the latest threats you need to know about.Also be sure to check out our webinar, New SEC Cyber Rules: Action Plan for CISOs and CFOs on Tuesday, August 22 | 12 p.m. ET. Link here:https://info.varonis.com/en/webinar/what-the-n…
…
continue reading
The Storm-0558 incident has proven to be even more widespread than initially reported. While Microsoft originally stated that only Outlook.com and Exchange Online were affected, Wiz Research has discovered that the compromised signing key may have allowed the cybercriminal group to forge access tokens for SharePoint, Teams, OneDrive, and every othe…
…
continue reading
A Microsoft zero-day vulnerability has allowed hacking group Storm-0558 to forge Azure AD authentication tokens, and breach organizations — including U.S. government agencies — in the past week.Watch this State of Cybercrime episode to hear our experts break down how this attack happened, see the discoveries made by the Varonis Threat Labs team, an…
…
continue reading
Across the globe, CL0P ransomware group is extorting hundreds of organizations after exploiting an unknown SQL injection vulnerability in file transfer service MOVEit. The victims need to contact the ransomware group by June 14 or their stolen data will be published publicly on the group’s extortion site.Join Matt Radolec, David Gibson, and special…
…
continue reading
In the wake of the U.S. defense leak, the Pentagon CIO has given a one-week deadline for all defense agencies to ensure compliance with DOD information security protocols. But what does that actually mean?Join Matt, David, and Varonis Team Lead Engineer for U.S. Public Sector Trevor Brenn for a State of Cybercrime episode that breaks down what the …
…
continue reading
Links mentioned in this episode: • Video course (free) on building an IR plan: https://info.varonis.com/thank-you/course/cyber-incident-response • Blog post about LockBit: https://www.varonis.com/blog/anatomy-of-a-ransomware-attack • Blog post about HardBit: https://www.varonis.com/blog/hardbit-2.0-ransomware…
…
continue reading
Recent cyberattacks, zero-days, and APTs have positioned China as a cybersecurity adversary.Join Matt Radolec and David Gibson for a special State of Cybercrime episode, during which the two will discuss the recent wave of stealth Chinese cyberattacks against U.S. private networks and what this means for U.S.-Chinese relations in 2023.Matt and Davi…
…
continue reading
Still reeling from last year’s data breach, password manager LastPass recently shared that the same attacker who targeted the organization in August has struck again, this time using stolen data to hack an employee’s home computer. Join Matt Radolec and David Gibson as they walk you through the multi-stage attack, revisiting the discussion of the i…
…
continue reading
We're back! Kind of. We'll soon relaunch this podcast and wanted to give you a quick update on what's happening.By Kelsea Morrison
…
continue reading
Thanks for watching the first season of the security tools podcast! Want more? We're live on the SecurityFwd YouTube channel twice per week! Come hack with us or watch any of the previously recorded streams.By Kody Kinzie
…
continue reading
S
State of Cybercrime


1
Hacking Through School: College Cybersecurity Jobs with Nick Godshall
49:26
49:26
Play later
Play later
Lists
Like
Liked
49:26
Nick's Twitter: https://twitter.com/nickgodshall Kody's Twitter: https://twitter.com/kodykinzie Varonis Cyber Attack Workshop: https://www.varonis.com/cyber-workshop/By Kelsea Morrison
…
continue reading
S
State of Cybercrime


1
Catching Russian Hackers in Decommissioned Servers with Adrian from Thinkst
50:50
50:50
Play later
Play later
Lists
Like
Liked
50:50
Canary Tokens - https://canarytokens.org/generate Learn more about canaries - https://canary.tools/ Adrian's Twitter - https://twitter.com/sawabaBy Kody Kinzie, Adrian Sanabria
…
continue reading
S
State of Cybercrime


1
Breaking Facial Recognition With Vic From F-Secure
58:35
58:35
Play later
Play later
Lists
Like
Liked
58:35
Apologies for the scratchy mic! Vic's Blog on Defeating Facial Recognition: https://vicharkness.co.uk/2019/02/01/the-art-of-defeating-facial-detection-systems-part-two-the-art-communitys-efforts/ Check out Vic's Twitter: https://twitter.com/VicHarkness Kody's Twitter: https://twitter.com/kodykinzie Varonis Cyber Attack Workshop: https://www.varonis…
…
continue reading
S
State of Cybercrime


1
Automating the Fight Against Scammers & Unfair Parking Tickets with DoNotPay
43:54
43:54
Play later
Play later
Lists
Like
Liked
43:54
Joshua's Twitter: https://twitter.com/jbrowder1 DoNotPay's website: https://donotpay.com Sue Phone Scammers: https://donotpay.com/learn/robocall-compensation This podcast is brought to you by Varonis, if you'd like to learn more check out the Cyber Attack Lab at https://www.varonis.com/cyber-workshop/…
…
continue reading
S
State of Cybercrime


1
Hacking the Wi-fi of Today & Tomorrow With Mathy Vanhoef
1:06:49
1:06:49
Play later
Play later
Lists
Like
Liked
1:06:49
Mathy's Website: https://www.mathyvanhoef.com Mathy's YouTube Channel: https://twitter.com/vanhoefm Mathy's Paper on Defeating MAC Address Randomization: https://papers.mathyvanhoef.com/asiaccs2016.pdf This podcast is brought to you by Varonis, if you'd like to learn more check out the Cyber Attack Lab at https://www.varonis.com/cyber-workshop/…
…
continue reading
Seytonic's Malduino Website: https://maltronics.com/ Seytonic's Website: https://seytonic.com/ Seytonic's YouTube Channel: https://www.youtube.com/channel/UCW6xlqxSY3gGur4PkGPEUeA This podcast is brought to you by Varonis, if you'd like to learn more check out the Cyber Attack Lab at https://www.varonis.com/cyber-workshop/…
…
continue reading
S
State of Cybercrime


1
CreepDetector - Detecting Stalkers with Wardriving
47:24
47:24
Play later
Play later
Lists
Like
Liked
47:24
Alex's Website: http://alexlynd.com Check out the Creep Detector Video: https://www.youtube.com/watch?v=ug9dHwm3h0s Alex Lynd's Twitter: https://twitter.com/alexlynd Check out Alex's GitHub: https://github.com/AlexLynd This podcast is brought to you by Varonis, if you'd like to learn more check out the Cyber Attack Lab at https://www.varonis.com/cy…
…
continue reading
S
State of Cybercrime


1
Maltego - Open-source Intelligence and Forensics
50:10
50:10
Play later
Play later
Lists
Like
Liked
50:10
Check out Maltego: https://www.maltego.com/ Maltego Twitter: https://twitter.com/maltegohq Check out Maltego use cases: https://docs.maltego.com/support/solutions/articles/15000012022-use-cases This podcast is brought to you by Varonis, if you'd like to learn more check out the Cyber Attack Lab at https://www.varonis.com/cyber-workshop/…
…
continue reading
S
State of Cybercrime


1
Objective-See - Advanced MacOS Security Tools by Ex-NSA Hacker Patrick Wardle
56:23
56:23
Play later
Play later
Lists
Like
Liked
56:23
Check out Objective-See: https://objective-see.com/ Objective-See Twitter: https://twitter.com/objective_see Objective-See Patreon: https://www.patreon.com/objective_see While In Russia: Patrick's RSA talk on hacking journalists - Patrick's Twitter: https://twitter.com/patrickwardle This podcast is brought to you by Varonis, if you'd like to learn …
…
continue reading
S
State of Cybercrime


1
ESP8266 - The Low-cost Wi-Fi Microchip with a Full TCP/IP Stack
48:52
48:52
Play later
Play later
Lists
Like
Liked
48:52
Stefan's Site with links to all of his projects: https://spacehuhn.io/ Twitter: https://twitter.com/spacehuhn YouTube: https://www.youtube.com/channel/UCFmjA6dnjv-phqrFACyI8tw An overview of the ESP8266 https://www.espressif.com/en/products/hardware/esp8266ex/overview Stefan's Github https://github.com/spacehuhn ESP8266 Deauther 2.0 https://github.…
…
continue reading
S
State of Cybercrime


1
Grabify - the IP Logging, Honeypot Tracking URL Shortener
45:01
45:01
Play later
Play later
Lists
Like
Liked
45:01
A honeypot is a tool that acts as bait, luring an attacker into revealing themselves by presenting a seemingly juicy target. In our first Security Tools podcast, we explore a free tool called Grabify that can gather information about scammers or attackers when they click on a honeypot tracking link. https://grabify.link/ https://jlynx.net/ https://…
…
continue reading
We wanted you to be the first to know that next week; we will be back in this same feed with a new security podcast from Varonis. The new Security Tools podcast will keep you up to date with the most exciting and useful tools the Infosec community has to offer. Join us on the new show to hear from the researchers and hackers behind tools like Grabi…
…
continue reading
Summer is approaching, and of course, that’s when we feel the most heat. However, for cybersecurity managers, they feel the heat all the time. They must be right every time because cybercriminals only have to be right once. So summer can potentially feel like it’s year-round for cybersecurity pros and it can cause job burnout. Another problem that …
…
continue reading
Searching a traveler’s phone or laptop is not an extension of a search made on a piece of luggage. As former commissioner of Ontario Ann Cavoukian said, “Your smartphone and other digital devices contain the most intimate details of your life: financial and health records.” In general, it’s also dangerous to connect laws made in accordance with the…
…
continue reading
S
State of Cybercrime


1
Professor Angela Sasse FREng on Human-Centered Security
14:16
14:16
Play later
Play later
Lists
Like
Liked
14:16
Lately, we’ve been hearing more from security experts who are urging IT pros to stop scapegoating users as the primary reason for not achieving security nirvana. After covering this controversy on a recent episode of the Inside Out Security Show, I thought it was worth having an in-depth conversation with an expert. So, I contacted Angela Sasse, Pr…
…
continue reading
S
State of Cybercrime


1
Statistician Kaiser Fung: Fishy Stats (Part 3)
18:38
18:38
Play later
Play later
Lists
Like
Liked
18:38
Over the past few weeks, Kaiser Fung has given us some valuable pointers on understanding the big data stats we are assaulted with on a daily basis. To sum up, learn the context behind the stats — sources and biases — and know that the algorithms that crunch numbers may not have the answer to your problems. In this third segment of our podcast, Kai…
…
continue reading
It’s great to be Amazon to only have one on-call security engineer and have security automated. However, for many organizations today, having security completely automated is still an aspirational goal. Those in healthcare might would love to upgrade, but what if you’re using a system that’s FDA approved, which makes upgrading a little more difficu…
…
continue reading
S
State of Cybercrime


1
Statistician Kaiser Fung: Accuracy of Algorithms (Part 2)
9:16
9:16
Play later
Play later
Lists
Like
Liked
9:16
In part oneof our interview with Kaiser, he taught us the importance of looking at the process behind a numerical finding. We continue the conversation by discussing the accuracy of statistics and algorithms. With examples such as shoe recommendations and movie ratings, you’ll learn where algorithms fall short. Transcript Cindy Ng: In part one, Kai…
…
continue reading
Recently in the security space, there’s been a spate of contradicting priorities. For instance, a recent study showed that programmers will take the easy way out and not implement proper password security. Antidotally, a security pro in a networking and security course noticed another attendee who covered his webcam, but noticeably had his bitlocke…
…
continue reading
S
State of Cybercrime


1
Statistician Kaiser Fung: Investigate The Process Behind A Numerical Finding (Part 1)
15:15
15:15
Play later
Play later
Lists
Like
Liked
15:15
In the business world, if we’re looking for actionable insights, many think it's found using an algorithm. However, statistician Kaiser Fung disagrees. With degrees in engineering, statistics, and an MBA from Harvard, Fung believes that both algorithms and humans are needed, as the sum is greater than its individual parts. Moreover, the worldview h…
…
continue reading
Should CISOs use events or scenarios to drive security, not checklists? It also doesn’t matter how much you spend on cybersecurity if ends up becoming shelfware. Navigating one’s role as a CISO is no easy feat. Luckily, the path to becoming a seasoned CISO is now easier with practical classes and interviews. But when cybersecurity is assumed to not…
…
continue reading
S
State of Cybercrime


1
Security Expert and "Hacked Again" Author Scott Schober" (Part 2)
12:27
12:27
Play later
Play later
Lists
Like
Liked
12:27
Scott Schober wears many hats. He's an inventor, software engineer, and runs his own wireless security company. He's also written Hacked Again, which tells about his long running battle against cyber thieves. Scott has appeared on Bloomberg TV, Good Morning America, CNBC, and CNN. We continue our discussion with Scott. In this segment, he talks abo…
…
continue reading
S
State of Cybercrime


1
Security Expert and "Hacked Again" Author Scott Schober" (Part 1)
14:39
14:39
Play later
Play later
Lists
Like
Liked
14:39
Scott Schober wears many hats. He's an inventor, software engineer, and runs his own wireless security company. He's also written Hacked Again, which tells about his long running battle against cyber thieves. Scott has appeared on Bloomberg TV, Good Morning America, CNBC, and CNN. In the first part of the interview, Scott tells us about some of his…
…
continue reading
With data as the new oil, we’ve seen how different companies responded. From meeting new data privacy compliance obligations to combining multiple data anonymized points to reveal an individual’s identity – it all speaks to how companies are leveraging data as a business strategy. Consumers and companies alike are awakening to data’s possibilities …
…
continue reading
S
State of Cybercrime


1
More Scout Brody: Bringing Design Thinking to IoT
9:53
9:53
Play later
Play later
Lists
Like
Liked
9:53
By now, we’ve all seen the wildly popular internet of things devices flourish in pop culture, holding much promise and potential for improving our lives. One aspect that we haven’t seen are IoT devices that not connected to the internet. In our follow-up discussion, this was the vision Simply Secure's executive director Scout Brody advocates, as cu…
…
continue reading
S
State of Cybercrime


1
Scout Brody, Ph.D. on Creating Security Systems Usable for All
13:18
13:18
Play later
Play later
Lists
Like
Liked
13:18
With the spring just a few short weeks away, it’s a good time to clean the bedroom windows, dust off the ceiling fans, and discard old security notions that have been taking up valuable mind space. What do you replace those security concepts with? How about ones that say that security systems are not binary “on-off” concepts, but instead can be see…
…
continue reading
S
State of Cybercrime


1
The Dance Between Governance, Risk Management, and Compliance
23:52
23:52
Play later
Play later
Lists
Like
Liked
23:52
The combination of business and technology-related challenges and the requirement to meet regulatory compliance obligations as well as managing risk is no easy feat. European officials have been disseminating information on how to prevent online scams, general tips as well as warning signs. Other attorneys have been reflecting on legislative develo…
…
continue reading
S
State of Cybercrime


1
Privacy Attorney Tiffany Li and AI Memory, Part II
14:10
14:10
Play later
Play later
Lists
Like
Liked
14:10
Tiffany C. Li is an attorney and Resident Fellow at Yale Law School’s Information Society Project. She frequently writes and speaks on the privacy implications of artificial intelligence, virtual reality, and other technologies. Our discussion is based on her recent paper on the difficulties with getting AI to forget. In this second part, we contin…
…
continue reading
S
State of Cybercrime


1
Reflecting on Breaches, Scams and Fake Everything
26:55
26:55
Play later
Play later
Lists
Like
Liked
26:55
On the last week of the year, the Inside Out Security panelists reflected on the year’s biggest breaches, scams and fake everything. And is computer security warfare? Well, it depends on who you ask. A 7th grader trying to change her grades isn’t an enemy combatant. But keep in mind as another argues, “There's an opponent who doesn't care about you…
…
continue reading
S
State of Cybercrime


1
Privacy Attorney Tiffany Li and AI Memory, Part I
11:31
11:31
Play later
Play later
Lists
Like
Liked
11:31
Tiffany C. Li is an attorney and Resident Fellow at Yale Law School’s Information Society Project. She frequently writes and speaks on the privacy implications of artificial intelligence, virtual reality, and other technologies. Our discussion is based on her recent paper on the difficulties with getting AI to forget. In this first part , we talk a…
…
continue reading
The CIO is responsible for using IT to make the business more efficient. Meanwhile, the CISO is responsible for developing and executing a security program that’s aimed to protect enterprise systems and data from both internal and external threats. At the end of the day, the CISO makes security recommendations to the CIO has the final say. Perhaps …
…
continue reading
S
State of Cybercrime


1
#2018inFiveWords [Regarding Our Security Landscape]
24:55
24:55
Play later
Play later
Lists
Like
Liked
24:55
We need to do better. Exhausting. Dramatic. That’s how the Inside Out Security panelists described our 2018 security landscape. We see the drama unfold weekly on our show and this week was no different. As facial recognition software becomes more prevalent, we’re seeing it used in security to protect even the biggest stars like Taylor Swift. Her se…
…
continue reading
There’s a yin and yang to technology. For instance, the exchange for convenience and ease with our data. Unfortunately Facebook is getting most of the blame, when many companies have collect many points of data as the default setting. Meanwhile, as quickly as diligent security pros are eager to adopt and advance security solutions with biometrics, …
…
continue reading
S
State of Cybercrime


1
Security and Privacy are Joined at the Hip
31:55
31:55
Play later
Play later
Lists
Like
Liked
31:55
We’ve completed almost 100 podcast panels and sometimes it feels like we’re talking in circles. Over the years, the security and privacy landscape have gotten more complex, making baseline knowledge amongst industry pros ever so more important. Old concepts are often refreshed into current foundational security concepts. Technological advancements …
…
continue reading
Passwords are easy to use. Everyone knows how it works. However, many security pros point out the inherent design flaw in passwords as a safe form of authorization and authentication. The good news is that we can reflect upon what old technologies can teach new technologies as we’re creating new products and services. One vital concern to keep in m…
…
continue reading
S
State of Cybercrime


1
Troy Hunt: The Modern State of Insecurity (Part Three)
13:16
13:16
Play later
Play later
Lists
Like
Liked
13:16
Troy Hunt, creator of “Have I been pwned”, gives a virtual keynote that explores how security threats are evolving - and what we need to be especially conscious of in the modern era. In this keynote, you’ll learn: Real world examples of both current and emerging threats How threats are evolving and where to put your focus How to stem the flow of da…
…
continue reading
S
State of Cybercrime


1
Data Privacy Attorney Sheila FitzPatrick on GDPR
15:50
15:50
Play later
Play later
Lists
Like
Liked
15:50
We had a unique opportunity in talking with data privacy attorney Sheila FitzPatrick. She lives and breathes data security and is recognized expert on EU and other international data protection laws. FitzPatrick has direct experience in representing companies in front of EU data protection authorities (DPAs). She also sits on various governmental d…
…
continue reading
Learning about the CIA’s tips and tricks on disguising one’s identity reminded us that humans are creatures of habit and over a period of time, can illuminate predictable behavioral patterns, which are presented as biometric data. As a result, businesses can leverage and integrate these data points with their operations and sales process. For insta…
…
continue reading