Trending Misterio
iVoox
Descargar app Subir
iVoox Podcast & radio
Descargar app gratis
The Inside Out Security Show
The Inside Out Security Show
Podcast

The Inside Out Security Show 1v3m73

Por Varonis
202
3

us for State of Cybercrime, where experts discuss the latest trends and developments in the world of cybercrime and provide insights into how organizations can protect themselves from potential threats. Sponsored by Varonis 5f1753

us for State of Cybercrime, where experts discuss the latest trends and developments in the world of cybercrime and provide insights into how organizations can protect themselves from potential threats.

Sponsored by Varonis

202
3
Live at Black Hat
Live at Black Hat
Matt Radolec and David Gibson for this episode of the State of Cybercrime, recording from Black Hat 2023, as they cover the latest threats you need to know about. Also be sure to check out our webinar, New SEC Cyber Rules: Action Plan for CISOs and CFOs on Tuesday, August 22 | 12 p.m. ET. Link here: https://info.varonis.com/en/webinar/what-the-new-sec-requirements-mean-for-your-org-2023-08-22
Internet y tecnología 1 año
0
0
7
16:22
The Storm-0558 Rages On
The Storm-0558 Rages On
The Storm-0558 incident has proven to be even more widespread than initially reported. While Microsoft originally stated that only Outlook.com and Exchange Online were affected, Wiz Research has discovered that the compromised g key may have allowed the cybercriminal group to forge access tokens for SharePoint, Teams, OneDrive, and every other app that s logging in with Microsoft credits. Watch our team of experts during this State of Cybercrime episode that assesses the reach of this incident and teaches you what you should do to make sure you are safe and secure.
Internet y tecnología 1 año
0
0
6
19:40
Storm-0558
Storm-0558
A Microsoft zero-day vulnerability has allowed hacking group Storm-0558 to forge Azure AD authentication tokens, and breach organizations — including U.S. government agencies — in the past week. Watch this State of Cybercrime episode to hear our experts break down how this attack happened, see the discoveries made by the Varonis Threat Labs team, and learn what you can do to make sure your data is safe and secure.
Internet y tecnología 1 año
0
0
6
28:54
The MOVEit Exploit
The MOVEit Exploit
Across the globe, CL0P ransomware group is extorting hundreds of organizations after exploiting an unknown SQL injection vulnerability in file transfer service MOVEit. The victims need to the ransomware group by June 14 or their stolen data will be published publicly on the group’s extortion site. Matt Radolec, David Gibson, and special guest Dvir Sason to learn more about how the ransomware group exploited the critical flaw in the transfer application, which they were likely experimenting with since 2021.
Internet y tecnología 2 años
0
0
5
33:41
DOD’S Response to Data Leaks
DOD’S Response to Data Leaks
In the wake of the U.S. defense leak, the Pentagon CIO has given a one-week deadline for all defense agencies to ensure compliance with DOD information security protocols. But what does that actually mean? Matt, David, and Varonis Team Lead Engineer for U.S. Public Sector Trevor Brenn for a State of Cybercrime episode that breaks down what the DOD is demanding from its agencies and how this influences the future of information security within government.
Internet y tecnología 2 años
0
0
6
35:34
U.S. Defense Papers Leak
U.S. Defense Papers Leak
Links mentioned in this episode:  • Video course (free) on building an IR plan: https://info.varonis.com/thank-you/course/cyber-incident-response  • Blog post about LockBit: https://www.varonis.com/blog/anatomy-of-a-ransomware-attack • Blog post about HardBit: https://www.varonis.com/blog/hardbit-2.0-ransomware
Internet y tecnología 2 años
0
0
7
35:26
China's Silent Cyber Campaigns
China's Silent Cyber Campaigns
Recent cyberattacks, zero-days, and APTs have positioned China as a cybersecurity adversary. Matt Radolec and David Gibson for a special State of Cybercrime episode, during which the two will discuss the recent wave of stealth Chinese cyberattacks against U.S. private networks and what this means for U.S.-Chinese relations in 2023. Matt and David also cover: -The congressional TikTok hearing surrounding data privacy concerns as a byproduct of Chinese ownership -The recent Facebook s hacked by the ChatGPT Chrome extension -Our “good news” segment: the shutdown of the notorious Breached hacking forum -The 55 zero-days that were weaponized in 2022
Internet y tecnología 2 años
0
0
6
24:50
Don't Breach Where You Eat
Don't Breach Where You Eat
Still reeling from last year’s data breach, manager Last recently shared that the same attacker who targeted the organization in August has struck again, this time using stolen data to hack an employee’s home computer. Matt Radolec and David Gibson as they walk you through the multi-stage attack, revisiting the discussion of the initial intrusion and outlining how that stolen data was weaponized months later to breach the company’s vault. Matt and David will also spotlight recent vulnerabilities that you should keep an eye on and discuss the meteoric rise of wiperware. We cover: The anatomy of the Last attack and the threats of secret and scanning after a breach New malware and ransomware frameworks The increase in wiperware that’s destroying data rather than holding it for ransom And of course some wins on the cybersecurity front (let’s not forget the good news!)   Links mentioned in the show: HardBit 2.0 Ransomware LockBit ransomware, what you need to know VMware ESXi in the Line of Ransomware Fire   Visit our website and sign up for emails to be notified of new live episodes. Watch the podcast on our Youtube channel.
Internet y tecnología 2 años
0
0
5
35:09
A new beginning
A new beginning
We're back! Kind of. We'll soon relaunch this podcast and wanted to give you a quick update on what's happening.
Internet y tecnología 2 años
0
0
5
00:50
New Hacking with Friends Livestream!
New Hacking with Friends Livestream!
Thanks for watching the first season of the security tools podcast! Want more? We're live on the SecurityFwd YouTube channel twice per week!  Come hack with us or watch any of the previously recorded streams.
Internet y tecnología 4 años
0
0
6
00:48
New Hacking with Friends Livestream!
New Hacking with Friends Livestream!
Thanks for watching the first season of the security tools podcast! Want more? We\'re live on the SecurityFwd YouTube channel twice per week! \r\nCome hack with us or watch any of the previously recorded streams.\r\n
Internet y tecnología 4 años
0
0
7
00:48
Hacking Through School: College Cybersecurity Jobs with Nick Godshall
Hacking Through School: College Cybersecurity Jobs with Nick Godshall
Nick's Twitter: https://twitter.com/nickgodshall Kody's Twitter: https://twitter.com/kodykinzie Varonis Cyber Attack Workshop: https://www.varonis.com/cyber-workshop/
Internet y tecnología 5 años
0
0
7
49:26
Hacking Through School: College Cybersecurity Jobs with Nick Godshall
Hacking Through School: College Cybersecurity Jobs with Nick Godshall
Nick\'s Twitter: https://twitter.com/nickgodshall\r\nKody\'s Twitter: https://twitter.com/kodykinzie\r\nVaronis Cyber Attack Workshop: https://www.varonis.com/cyber-workshop/\r\n
Internet y tecnología 5 años
0
0
5
49:26
Catching Russian Hackers in Decommissioned Servers with Adrian from Thinkst
Catching Russian Hackers in Decommissioned Servers with Adrian from Thinkst
Canary Tokens - https://canarytokens.org/generate Learn more about canaries - https://canary.tools/ Adrian's Twitter - https://twitter.com/sawaba
Internet y tecnología 5 años
0
0
6
50:49
Catching Russian Hackers in Decommissioned Servers with Adrian from Thinkst
Catching Russian Hackers in Decommissioned Servers with Adrian from Thinkst
Canary Tokens - https://canarytokens.org/generate\r\nLearn more about canaries - https://canary.tools/\r\nAdrian\'s Twitter - https://twitter.com/sawaba\r\n
Internet y tecnología 5 años
0
0
7
50:49
Breaking Facial Recognition With Vic From F-Secure
Breaking Facial Recognition With Vic From F-Secure
Apologies for the scratchy mic! Check out Vic's Twitter:  https://twitter.com/VicHarkness Kody's Twitter: https://twitter.com/kodykinzie Varonis Cyber Attack Workshop: https://www.varonis.com/cyber-workshop/  
Internet y tecnología 5 años
0
0
7
58:34
Breaking Facial Recognition With Vic From F-Secure
Breaking Facial Recognition With Vic From F-Secure
Apologies for the scratchy mic!\r\nVic\'s Blog on Defeating Facial Recognition: https://vicharkness.co.uk/2019/02/01/the-art-of-defeating-facial-detection-systems-part-two-the-art-communitys-efforts/\r\nCheck out Vic\'s Twitter:  https://twitter.com/VicHarkness\r\nKody\'s Twitter: https://twitter.com/kodykinzie\r\nVaronis Cyber Attack Workshop: https://www.varonis.com/cyber-workshop/\r\n \r\n
Internet y tecnología 5 años
0
0
5
58:34
Automating the Fight Against Scammers & Unfair Parking Tickets with DoNotPay
Automating the Fight Against Scammers & Unfair Parking Tickets with DoNotPay
Joshua's Twitter: https://twitter.com/jbrowder1 DoNotPay's website: https://donotpay.com Sue Phone Scammers: https://donotpay.com/learn/robocall-compensation This podcast is brought to you by Varonis, if you'd like to learn more check out the Cyber Attack Lab at https://www.varonis.com/cyber-workshop/
Internet y tecnología 5 años
0
0
6
43:53
Automating the Fight Against Scammers & Unfair Parking Tickets with DoNotPay
Automating the Fight Against Scammers & Unfair Parking Tickets with DoNotPay
Joshua\'s Twitter: https://twitter.com/jbrowder1\r\nDoNotPay\'s website: https://donotpay.com\r\nSue Phone Scammers: https://donotpay.com/learn/robocall-compensation\r\nThis podcast is brought to you by Varonis, if you\'d like to learn more check out the Cyber Attack Lab at https://www.varonis.com/cyber-workshop/\r\n
Internet y tecnología 5 años
0
0
7
43:53
Hacking the Wi-fi of Today & Tomorrow With Mathy Vanhoef
Hacking the Wi-fi of Today & Tomorrow With Mathy Vanhoef
Mathy's Website: https://www.mathyvanhoef.com Mathy's YouTube Channel: https://twitter.com/vanhoefm Mathy's Paper on Defeating MAC Address Randomization: https://papers.mathyvanhoef.com/asiaccs2016.pdf This podcast is brought to you by Varonis, if you'd like to learn more check out the Cyber Attack Lab at https://www.varonis.com/cyber-workshop/  
Internet y tecnología 5 años
0
0
5
01:06:48
También te puede gustar Ver más
Red de Sospechosos Habituales
Red de Sospechosos Habituales Todos los capítulos de los podcasts asociados a la red Sospechosos Habituales unidos en este único feed Actualizado
TISKRA
TISKRA Podcast sobre tecnología de consumo y software. Análisis estratégico del mundo Apple, Google, Microsoft, Tesla y Amazon así como de todos aquellos productos de entretenimiento y su posible impacto económico y social. Conducido por @JordiLlatzer Actualizado
Loop Infinito (by Applesfera)
Loop Infinito (by Applesfera) Loop Infinito es un podcast diario de Applesfera presentado por Javier Lacort. Un nuevo episodio cada día de lunes a viernes que analiza la actualidad de Apple dando contexto y perspectiva. Actualizado
Ir a Internet y tecnología