podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
Cyware
Shows
TechSpective Podcast
Cybersecurity’s Quiet Revolution: What We’re Missing While Chasing the Hype
There’s something happening in cybersecurity right now that’s both exciting and a little disorienting. As generative and agentic AI take over headlines, conference keynotes, and investor decks, it’s easy to assume we’re on the verge of some great leap forward. The reality is more complicated—and more interesting. In the latest episode of the TechSpective Podcast, I had the chance to sit down with Sachin Jade, Chief Product Officer at Cyware, for a conversation that cuts through the buzzwords. We cover a lot of ground—from AI’s place in the SOC to the underrated power of relevance i...
2025-12-18
49 min
TechSpective Podcast
Cybersecurity’s Quiet Revolution: What We’re Missing While Chasing the Hype
There’s something happening in cybersecurity right now that’s both exciting and a little disorienting. As generative and agentic AI take over headlines, conference keynotes, and investor decks, it’s easy to assume we’re on the verge of some great leap forward. The reality is more complicated—and more interesting. In the latest episode of the TechSpective Podcast, I had the chance to sit down with Sachin Jade, Chief Product Officer at Cyware, for a conversation that cuts through the buzzwords. We cover a lot of ground—from AI’s place in the SOC to the underrated power of relevance i...
2025-12-18
49 min
The Gate 15 Podcast Channel
Weekly Security Sprint EP 138. Reports galore and shoring up for the holidays.
In this week's Security Sprint, Dave and Andy covered the following topics:Warm Open:• TribalHub Magazine, Winter 2025: A Publication For Technology Minded Professionals In Tribal Government Tribal Health, Tribal-Gaming And Non-Gaming Tribal Enterprises. Includes Tribal-ISAC happenings!• React2Shell: Risky Bulletin: APTs go after the React2Shell vulnerability within hours & Critical Security Vulnerability in React Server Components • We discussed our daily SUN and Weekly Ransomware & Data Breach Digest available via Gate 15’s GRIP: Join the GRIP! Gate 15’s Resilience and Intelligence Portal (GRIP) utilizes the robust capabilities available in Cyware’s C...
2025-12-09
17 min
China Hack Report: Daily US Tech Defense
Noodlophiles Phish, Ghost-Taps Swipe, and SAP Gets Pwned: China Hacks the US Biz
This is your China Hack Report: Daily US Tech Defense podcast.Hey, it’s Ting, back with your essential China Hack Report: Daily US Tech Defense. If your SOC is buzzing louder than cicadas in August, you’ll want to pay close attention—this week has been a cyber roller coaster, and today we have some particularly spicy headlines from the US–China cyber front. The last 24 hours saw some brazen moves by Chinese-speaking threat groups, especially with their use of ghost-tapping NFC relay fraud. According to reports from GBHackers and Cyware Social, these threat actors are sell...
2025-08-19
03 min
Future of Threat Intelligence
Cyware’s Jawahar Sivasankaran on Automating Threat-Centric Operations
In this special RSA 2025 episode of The Future of Threat Intelligence, David speaks with Jawahar Sivasankaran, President of Cyware, about their partnership with Team Cymru to democratize threat intelligence. Jawahar outlines how their CTI program in a box approach enables organizations to implement comprehensive threat intelligence capabilities in weeks rather than months. Jawahar offers a unique perspective on industry progress and remaining challenges in collaborative defense. This conversation explores the practical realities of operationalizing threat intelligence for organizations beyond the most mature security teams, the current implementation of AI in security operations, and a thoughtful assessment of h...
2025-05-20
08 min
Enterprise Security Weekly (Video)
Secrets and their role in infrastructure security - Jawahar Sivasankaran, Chas Clawson, Sergey Gorbaty, Fernando Medrano - ESW #406
Segment 1 - Secrets and their role in infrastructure security From API keys and tokens to environment variables and credentials, secrets are foundational—and often overlooked—attack surfaces in cloud-native and distributed systems. We break down the risks tied to poor secret hygiene, discuss emerging patterns for secure secret management at scale, and shares insights on integrating secrets management into systems design. This segment is sponsored by Fastly. Visit https://securityweekly.com/fastly to learn more about them! Segment 2 - Weekly Enterprise News In this week's enterprise security news, we have: Funding, mostly focused on iden...
2025-05-12
2h 14
Enterprise Security Weekly (Audio)
Secrets and their role in infrastructure security - Jawahar Sivasankaran, Chas Clawson, Sergey Gorbaty, Fernando Medrano - ESW #406
Segment 1 - Secrets and their role in infrastructure security From API keys and tokens to environment variables and credentials, secrets are foundational—and often overlooked—attack surfaces in cloud-native and distributed systems. We break down the risks tied to poor secret hygiene, discuss emerging patterns for secure secret management at scale, and shares insights on integrating secrets management into systems design. This segment is sponsored by Fastly. Visit https://securityweekly.com/fastly to learn more about them! Segment 2 - Weekly Enterprise News In this week's enterprise security news, we have: Funding, mostly focused on iden...
2025-05-12
2h 14
Security Weekly Podcast Network (Audio)
Secrets and their role in infrastructure security - Jawahar Sivasankaran, Chas Clawson, Sergey Gorbaty, Fernando Medrano - ESW #406
Segment 1 - Secrets and their role in infrastructure security From API keys and tokens to environment variables and credentials, secrets are foundational—and often overlooked—attack surfaces in cloud-native and distributed systems. We break down the risks tied to poor secret hygiene, discuss emerging patterns for secure secret management at scale, and shares insights on integrating secrets management into systems design. This segment is sponsored by Fastly. Visit https://securityweekly.com/fastly to learn more about them! Segment 2 - Weekly Enterprise News In this week's enterprise security news, we have: Funding, mostly focused on iden...
2025-05-12
2h 14
Security Weekly Podcast Network (Video)
Secrets and their role in infrastructure security - Jawahar Sivasankaran, Chas Clawson, Sergey Gorbaty, Fernando Medrano - ESW #406
Segment 1 - Secrets and their role in infrastructure security From API keys and tokens to environment variables and credentials, secrets are foundational—and often overlooked—attack surfaces in cloud-native and distributed systems. We break down the risks tied to poor secret hygiene, discuss emerging patterns for secure secret management at scale, and shares insights on integrating secrets management into systems design. This segment is sponsored by Fastly. Visit https://securityweekly.com/fastly to learn more about them! Segment 2 - Weekly Enterprise News In this week's enterprise security news, we have: Funding, mostly focused on iden...
2025-05-12
2h 14
Dauntless LeadHERship
#11 - If You’re Not Replaceable, You’re Not Promotable (Featuring Joe Aurilia, Sr. VP of Operations, Cyware)
Welcome to Episode #11 of the Dauntless LeadHERship Podcast! In this episode, Lisa Kent (Host) chats with Joe Aurilia, Sr. VP of Operations, Cyware.We believe in the transformative power of women leading boldly. Our mission is to inspire, support, and empower women at all stages of their leadership and life journey. Whether you’re an emerging leader or a seasoned executive, we provide the resources, community, and opportunities to help you thrive.Join us for weekly episodes about business, entrepreneurship, and stories about women making a difference in the world.Website:https://da...
2025-04-15
40 min
Hyperdrive Minds: Sales and Marketing Leaders Share Revenue Generating Strategies
Tactical RevOps & Strategic Cybersecurity Operations w/ Joe Aurilia - Hyperdrive Minds Podcast 13
Joe Aurilia is the SVP of Operations for Cyware, a threat intelligence sharing platform, SOAR platform, and cybersecurity managed servicing provider. He has over 20 years in technology, operations, and strategic planning, guiding teams and organizations to peak performance across diverse industries. He helps growth-stage SaaS companies scale by untangling GTM operations and unlocking revenue potential. He architects the people, processes, and platforms that enable teams to move faster, backed by 20+ years in Operations and Technology, and a track record of 10x revenue growth. He is taking on select advisory roles where disciplined RevOps, operational rigor, or technology strategy can...
2025-02-22
1h 03
C-Level Up Podcast
Transforming Leadership in Cybersecurity - guest Rick Howard
Welcome to C-Level Up, where we delve into the minds of industry leaders to uncover their strategies, insights, and stories. In today’s episode, we’re honored to host Rick Howard, a true visionary in the cybersecurity world. Rick is the President of the Cybersecurity Canon—think of it as the Hall of Fame for cybersecurity literature, or the "Cyber Pulitzer." With a career spanning decades across military and civilian sectors, Rick’s contributions have shaped how we understand and approach cybersecurity today. From serving as Chief Security Officer at Palo Alto Networks to advisory roles wi...
2024-12-30
33 min
The Gate 15 Podcast Channel
Weekly Security Sprint EP 81. Arrest and Disruption Tuesday - hostile events, terrorgram, and more.
In this week's Security Sprint, Dave and Andy covered the following topics: Warm Start: Press Release! Gate 15 Partners with Cyware to Enhance Cybersecurity and Homeland Security Resilience. Gate 15's Resilience and Intelligence Portal (GRIP) now leverages the robust capabilities available in Cyware's Collaborate platform to provide the homeland security community with all-hazards technology-enhanced, human-driven analysis products. Main Topics: Physical Threats, Notable Dates: · Pakistani National Charged for Plotting Terrorist Attack in New York City in Support of ISIS · Man Plotted to Kill Jews in New York...
2024-09-10
25 min
Unspoken Security
Is Any Security Marketing NOT Bullshit?
In this episode of Unspoken Security, host AJ Nash sits down with Emily Phelps, Director of Marketing Communications at CYWARE. They dive into the core challenges and strategies in cybersecurity marketing. Emily emphasizes the importance of not just attracting customers but ensuring they are the right fit to prevent churn and frustration. She highlights the need for authenticity in marketing messages, noting that misleading claims can harm both the company's reputation and customer trust.AJ and Emily also discuss the essential goals of marketing within the cybersecurity industry, stressing the need to build and retain a loyal...
2024-09-03
1h 09
The Gate 15 Podcast Channel
Weekly Security Sprint EP 74. Information sharing and resiliency; Crowdstrike, MDM, and Health
In this weeks Security Sprint, Dave and Andy covered the following topics: Warm Start: · FB-ISAO Releases an All-Faiths Analysis of Attacks on U.S. Houses of Worship in 2023. · New Cyware Survey Reveals Critical Gaps in Cybersecurity Threat Intelligence Sharing and Collaboration. · Private-public partnership releases new bank resources for cloud computing adoption. o Financial Sector Cloud Outsourcing Issues and Considerations. Main Topics: CrowdStrike Outage: · CISA: Widespread IT Outage Due to CrowdStrike Update (being updated; update 9:45 a.m., EDT, July 21, 2024) · Canadian Centre for Cyber Security - Alert - Issue impacting CrowdStrike Falcon EDR · UK NCSC: Statement on major IT outage · NZ-NCSC: NCSC statement on global IT outage · CrowdStrike says significant nu...
2024-07-23
27 min
RevOps Unboxed
Reducing friction in sales contract creation with Joe Aurilia Jr.
On this episode of RevOps Unboxed, Sandy Robinson sits down with Joe Aurilla Jr, SVP of Operations at Cyware, to discuss how you can reduce friction during sales contract creation. They discuss streamlining Salesforce usage, leveraging AI, and more.About our guest, Joe Aurilia Jr.Joe Aurilia Jr is SVP of Operations at Cyware, and a seasoned revenue-aligned operator with broad multidisciplinary skills fully capable of diving deep into each business facet to create value, drive change, and demonstrate strategic impact.About our host, Sandy RobinsonSandy is SVP...
2024-07-03
28 min
ITOps, DevOps, AIOps - All Things Ops
Ep. 39 - Scaling Cyware: Lessons From Growing the Company Headcount Fivefold - With Joe Aurilia
How can you scale your tech company while maintaining rigorous operational standards? Senior VP of Operations at Cyware Joe Aurilia shares what he learned while 5x-ing the company.In this episode, Joe shares how he's building operations from the ground up, handling the complexities of international teams, and embedding a culture of security and compliance in a rapidly growing company.You'll learn:1. How to balance immediate operational needs with long-term growth strategies2. The challenges and solutions of managing a globally distributed team3. The importance of fostering a culture of security...
2024-06-25
41 min
SaaS Sessions
S8E7 - Building Across Borders ft. Joe Aurilia, SVP of Operations at Cyware
In this episode of the SaaS Sessions Podcast, we hosted Joe Aurelia, Senior Vice President of Operations at Cyware, who shares his extensive journey in scaling businesses globally.Joe discusses his transition from heavy applications to SaaS, his role in growing Cyware from two to seven countries, and the challenges and strategies in managing remote teams.He emphasizes the importance of process standardization, continuous learning, and risk mitigation in business operations. Joe also sheds light on the balance between speed and perfection, and the importance of allowing team autonomy for growth....
2024-06-24
35 min
Security Weekly Podcast Network (Video)
Automated Pentesting, AI in SecOps, & AI-Powered Analytics - Jason Keirstead, Jay Mar-Tang, Anthony Aurigemma - ESW #361
Despite building up impressive security stacks in the Cloud, organizations are still struggling to keep their environments safe. Pentera recently introduced Pentera Cloud as the first tool to provide automated pentesting capabilities for cloud environments. This conversation will focus on the challenge of security validation and pentesting in the cloud, and how Pentera Cloud is redefining the speed and scale of pentesting in the cloud. This segment is sponsored by Pentera. Visit https://www.securityweekly.com/penterarsac to learn more about them! Jason Keirstead, Cyware's VP of Collective Threat Defense, takes us beyond the AI...
2024-05-10
45 min
Enterprise Security Weekly (Video)
Automated Pentesting, AI in SecOps, & AI-Powered Analytics - Jason Keirstead, Jay Mar-Tang, Anthony Aurigemma - ESW #361
Despite building up impressive security stacks in the Cloud, organizations are still struggling to keep their environments safe. Pentera recently introduced Pentera Cloud as the first tool to provide automated pentesting capabilities for cloud environments. This conversation will focus on the challenge of security validation and pentesting in the cloud, and how Pentera Cloud is redefining the speed and scale of pentesting in the cloud. This segment is sponsored by Pentera. Visit https://www.securityweekly.com/penterarsac to learn more about them! Jason Keirstead, Cyware's VP of Collective Threat Defense, takes us beyond the AI...
2024-05-10
45 min
Enterprise Security Weekly (Audio)
Executive Interviews from RSAC! - ESW #361
Tune in to hear 9 executive interviews from RSA Conference 2024, featuring speakers from Zscaler, Open Systems, Aryaka, OpenText, Hive Pro, Critical Start, Anomali, Cyware, and Pentera! Find individual descriptions for each interview on the show notes. Show Notes: https://securityweekly.com/esw-361
2024-05-09
2h 09
CyberWire Daily
Bonus Episode: 2024 Cybersecurity Canon Hall of Fame Inductee: Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us by Eugene Spafford, Leigh Metcalf, Josiah Dykstra and Illustrated by Pattie Spafford. [CSOP]
Rick Howard, N2K’s CSO and The CyberWire’s Chief Analyst and Senior Fellow, interviews Eugene Spafford about his 2024 Cybersecurity Canon Hall of Fame book: “Cybersecurity Myths and Misconceptions.”References:Eugene Spafford, Leigh Metcalf, Josiah Dykstra, Illustrator: Pattie Spafford. 2023. Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us [Book]. Goodreads.Helen Patton, 2024. Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us [Book Review]. Cybersecurity Canon Project. Staff, 2024. CERIAS - Center for Education and Research in Information Assurance and Security [Homepage]. Purdue University. Rick How...
2024-05-07
16 min
What's The Problem?
Episode 49- Neal Dennis- 3 Core Tenants of Zero Trust with Neal Dennis of Cyware Labs
Neal Dennis, Cyber Threat Intelligence Consultant at CyWare & Co-Host of the "Adopting Zero Trust" Podcast, joins to discuss the 3 core tenants of zero trust.
2024-05-02
22 min
Second in Command: The Chief Behind the Chief with Cameron Herold
Ep. 356 - Cyware SVP of Operations, Joe Aurilia Jr.
In today's episode of the Second in Command podcast, Cameron is joined by Joe Aurilia, Jr., the SVP of Operations for Cyware, to explore the intricacies of operational leadership and the dynamics of rapid company growth. Joe played a pivotal role in scaling Cyware from its early seed stage to a Series C funded cybersecurity powerhouse, and shares his experiences and strategies for fostering collaboration, consensus, and a vibrant culture across a multinational team. He explores the challenges of hiring and integrating key talent, the nuances of international operations, and the importance of communication and leadership in breaking down...
2024-02-13
41 min
The Gate 15 Podcast Channel
The Gate 15 Interview EP 41. Cyware’s Tom Stockmeyer on info sharing, threat intel, collective defense, popcorn and The Big House
In this episode of The Gate 15 Interview, Andy Jabbour welcomes Tom Stockmeyer, Cyware’s Director, Enterprise East, ISAC's and Federal. Cyber security leader with experience in helping threat sharing communities such as ISACs and ISAOs and their Member companies improve the fidelity of their intel and accelerate threat intel sharing amongst Members. Tom served in the Marine Corps from 1979 to 1983. He has an MBA from the Michael Coles School of Business, Kennesaw University. Tom has held several executive positions, has served on numerous technology Boards. Tom on LinkedIn. In the discussion we address: Tom’s backgr...
2023-12-18
46 min
My Privacy Help
Privacy vs Security Explained | MyPrivacy.Help (7)
* Reclaim your privacy: https://myprivacy.help * Bitcoin Basics podcast: https://bitcoinbasics.help “What’s the real difference between data security & data privacy? VPNs may not be offering you any data privacy. What’s the most private VPN solution? How to setup your own VPN. Self-hosting what?!?” Show page: https://myprivacy.help/7 #privacy #selfhost #cybersecurity TIMESTAMPS: 00:00 Start 02:03 Offline privacy vs security 04:09 Online privacy vs security 08:08 Your VPN does not give you any privacy 11:40 Your own VPN is the b...
2023-12-02
18 min
My Privacy Help
Medibank hack & protecting yourself against data leaks | MyPrivacy.Help (6)
* Reclaim your privacy: https://myprivacy.help * Bitcoin Basics podcast: https://bitcoinbasics.help “MediBank Private (Australian health insurance) is just another major data leak so how can you best protect your personal data? What are 3 free things you can do right now to improve your cybersecurity & privacy?” Show page: https://myprivacy.help/6 #MediBank #DataBreach #CyberSecurity TIMESTAMPS: 00:00 Start 01:57 Medibank Private data leak 03:27 Government’s response 05:56 Preventing against data leaks 08:39 How to check if your details have been leaked...
2023-12-02
24 min
Out of the Woods: The Threat Hunting Podcast
Top 5 Threat Hunting Headlines - 27 Nov 2023
Top 5 Threat Hunting Headlines - 27 Nov 2023 Secure List: HrServ – Previously Unknown Web Shell Used in APT Attack https://securelist.com/hrserv-apt-web-shell/111119/ Group-IB: Hunting Rituals #2.2: Threat Hunting for Abuse of Windows Services https://www.group-ib.com/blog/hunting-rituals-windows-services-part-2/ Red Canary: Threat Hunting for PsExec, Open-Source Clones, and Other Lateral Movement Tools https://redcanary.com/blog/threat-hunting-psexec-lateral-movement/ Talos: A Deep Dive into Phobos Ransomware, Recently Deployed by 8Base Group https://blog.talosintelligence.com/deep-dive-into-phobos-ransomware/ Cyware: Lazarus Group Exploit MagicLine2NX Flaw to Launch Su...
2023-11-28
48 min
CMO Convo
Joe Aurilia | Everything your ops specialist wants their CMO to know | CMO Convo
Businesses are growing increasingly complex, and the role of ops specialists is increasing in importance.But ops doesn't happen in the background. They aren't your magic helpers tinkering away in the background doing everything without assistance.For ops to be effective, the function and personnel need to be working closely with your marketing teams, and aligned with leadership's goals.That's why we spoke to Joe Aurilia Jr, Senior Vice President of Operations at Cyware, to break down everything ops specialists want their CMOs to know for successful alignment and collaboration.
2023-11-01
40 min
The Operations Room: A Podcast for COO’s
11. Why licensing 170 SaaS tools is a great idea!
In this episode we discuss the topic of: Why licensing 170 SaaS tools is a great idea! Our special guest is Joe Aurilia, Jr., Senior VP Operations at Cyware. As a former CIO, Joe comes at the COO role from a really interesting angle. We discuss the following:Why 170 SaaS applications in an organisation with 270 employees?What does best practice look like in the procurement process? What should it look like in a smaller organisation?How do you ensure ownership ensuring the organisation is receiving the expected value from a given tool?How do you ensure you don't miss...
2023-10-05
46 min
Secret Ops
Applying Technology and Operations to Leadership with Joe Aurilia
As a self-proclaimed ‘Swiss Army Knife’ of executive functions, Joe Aurilia has served at the executive level across diverse departments. He is currently the Senior Vice President of Operations for Cyware, an automated alert aggregation and advisory sharing platform designed to drive real-time situational awareness.In this episode we discuss:The power of working in a range of different job rolesAdvice for non-technical individuals when approaching new technology How to quantify what a tool can actually do for youHow to best communicate the importance of operational initiatives… and what do people mostly get wrong about operations?
2023-09-06
45 min
Producing a Disaster
Beatstars: A Deep Dive
Beatstars Unmasked: All the Answers You've Been Seeking Beatstars has worked with beatmakers producing miracles in the process, There just seems to be information that stays hidden, and questions that are never answered by Abe (Also I realized I butchered his last name the whole time) Sorry Abe! I hope this mini-documentary is informative. These are my sources for the research done in this video. Zippia: https://www.zippia.com/beatstars-careers-1415605/revenue/ GlassDoor: https://www.glassdoor.com/Overview/Working-at-BeatStars-EI_IE3320925.11,20.htm SEC: https://www.sec.gov/Archives/edgar/data/1690042/000169004217000002/beatstarsformcar.pdf Forbes: https://www.forbes.com/sites/ogdenpayne/2017/01/04/beatstars-the-bootstrapped-startup-making-it-easy-to-purchase-a-no-1-hit...
2023-09-04
11 min
CyberWire Daily
A cyberespionage operation of unclear provenance shifts its targets. Cyberattacks on voting in Ecuador. Other notes from the cyber underworld. And doxing the Duma.
HiatusRAT shifts its targets. Ecuador's difficulties with voting is attributed to cyberattacks. Carderbee is an APT targeting Hong Kong. auDA (OOO-duh) turns out not to have been breached. Ukrainian hacktivists claim to dox a senior member of Russia's Duma. Russian influence operations take aim at NATO's July summit. Joe Carrigan describes attacks on LinkedIn accounts. Our guest is John Hernandez from Quest to discuss why he believes the MOVEit flaw is a wakeup call for CISOs. Security, not by obscurity, but by typo.For links to all of today's stories check out our CyberWire...
2023-08-22
29 min
Redefining CyberSecurity
Beyond the Silos: The Evolution of Threat Intelligence | Taking an Intelligence-Driven Approach to Security Operations | A Brand Story Conversation from Black Hat USA 2023 | A Cyware Story with Willy Leichter
In this Brand Story podcast episode, as part of our Black Hat USA conference coverage, host Sean Martin connects with Willy Leichter as he sheds light on his extensive experience spanning over 24 years in the security realm. With a keen focus on cyclical patterns of security, he underscores the unique position of Cyware, a brand that has worked assiduously to bridge silos across industries. While discussing the broader vision of threat intelligence, he underscores its potential in predicting and mitigating attacks proactively.Join Wily and Sean and they dig into the complexities of threat intelligence, highlighting the...
2023-08-10
30 min
Hire Learning with Oz Rashid
Joe Aurilia, Jr. — From First US Employee to Global Powerhouse. How an Operational Mindset Can Lead to Great Hiring
On today’s episode, our host, Oz Rashid, welcomes Joe Aurilia, Jr., Senior Vice President of Operations at Cyware, a cybersecurity company focusing on Cyber Fusion and collective defense. Having joined the company as the first US hire, Joseph talks about the challenges and opportunities of working in a geographically dispersed workforce with offices across multiple countries. Joe’s overall hiring philosophy revolves around considering whether he could have enjoyable and productive conversations with potential candidates on a regular basis. This approach holds true regardless of the candidate's location, as col...
2023-08-09
31 min
Abrazando lo Digital Esta Semana
23 de julio de 2023
Esta semana, del 24 de julio de 2023, en noticias de transformación digital, ha habido avances en la inteligencia artificial generativa en el lugar de trabajo, así como un ciberataque de China a la Embajada de Estados Unidos. Además, los tejidos de datos están comenzando a surgir como una tendencia.Inteligencia ArtificialMeta, el pionero de IA, impresiona a la comunidad tecnológica con un lanzamiento revolucionario: Llama 2, el último modelo LLM de código abierto. Desbloqueando el poder de comprensión del lenguaje para todos los desarrolladores, esta innovación sorprendente promete r...
2023-07-25
05 min
Embracing Digital This Week
July 24, 2023
This week, July 24, 2023, in digital transformation news, there have been developments in Generative AI in the workplace and a China cyber attack on the US Embassy. Additionally, Data Fabrics are beginning to surface as a trend.Artificial IntelligenceMeta, the AI trailblazer, wows the tech community with a game-changing release - introducing Llama 2, the latest open-source LLM model. Unlocking the power of language understanding for all developers, this groundbreaking innovation promises to revolutionize AI projects. Bid farewell to complexity and welcome seamless AI training. Get ready to ride the wave of...
2023-07-25
05 min
Cyber Briefing
Cyber Briefing: 2023.06.30
Welcome to Cyber Briefing, the newsletter that informs you about the latest cybersecurity advisories, alerts, incidents and news every weekday. 👉 What are the latest cybersecurity alerts, incidents, and news? ******************************************************************** 🚨 #CyberAlerts ******************************************************************** CISA Releases Nine ICS Advisories Source: CISA Massive Growth of Pro-Russia DDoS Project 'DDoSia' Source: Sekoia Microsoft Resolves Start Menu and Windows Search Bug Source: Microsoft Arcserve Addresses High-Severity Authentication Bypass Vulnerability Source: MDSec Iranian Cyber Espionage Group MuddyWater Exploits New PhonyC2 Framework for Tar...
2023-06-30
08 min
Cybersecurity News Byte with Jim Guckin
Episode 61: June 20 2023
Links https://www.hackread.com/diicot-hackers-ssh-servers-brute-force-malware/ https://www.securityweek.com/barracuda-zero-day-attacks-attributed-to-chinese-cyberespionage-group/ https://www.welivesecurity.com/2023/06/15/android-gravityrat-goes-after-whatsapp-backups/ https://cyware.com/news/third-bug-in-moveit-transfer-found-d35a9335 https://www.helpnetsecurity.com/2023/06/19/cve-2023-35708/ https://www.bleepingcomputer.com/news/security/moveit-transfer-customers-warned-of-new-flaw-as-poc-info-surfaces/ https://cyberscoop.com/energy-department-cl0p-moveit-cisa/ New Threat Group Targets SSH Servers Cado Labs Researchers Diicotemerging Romanian threat actorAKA Mexalsextensive technical knowledge active since 2020 new campaignCayosin botnetMirai-based botnet agenttarget routers running the Linux-based OS OpenWRTtargets are the internet exposed SSH servers with password authentication enabled. username and password list is pretty restrictive including only default or easy-to-guess credentials. TacticsShell Script...
2023-06-21
20 min
Abrazando lo Digital Esta Semana
6 de junio de 2023
Noticias sobre transformación digital para el 6 de junio de 2023. Esta semana hay más trabajos en AI, importantes infracciones de ciberseguridad y mejores prácticas en tecnología en la nube.Inteligencia ArtificialEl CEO de OpenAI, Sam Altman, advierte que la compañía podría retirar sus servicios de la UE por las preocupaciones que generan las regulaciones del plan de Ley de IA. Esto pone de manifiesto una creciente división transatlántica sobre el control de la IA. Empresas de tecnología de EE. UU., como Google, se están p...
2023-06-13
05 min
Adopter le Digital Cette Semaine
29 mai 2023
Actualités pour l'adoption du numérique pour la semaine du 29 mai 2023 : découvrez les nouvelles réglementations pour l'IA, l'augmentation des cyberattaques étatiques et les investissements en informatique de pointe. #Numérique #IA #Cybersécurité #InformatiqueDePointeIntelligence ArtificielleLe PDG d'OpenAI, Sam Altman, met en garde contre le possible retrait des services de l'entreprise en UE en raison des inquiétudes concernant la réglementation prévue par l'AI Act. Cela souligne une fracture transatlantique croissante sur le contrôle de l'IA. Les entreprises technologiques américaines, dont Google, se préparent à u...
2023-06-05
04 min
Umarmung Digital Diese Woche
29. Mai 2023
Nachrichten für die Einführung von Digitaltechnologien in der Woche vom 29. Mai 2023: Erfahren Sie mehr über neue Vorschriften für Künstliche Intelligenz, zunehmende Cyberangriffe von Nationalstaaten und Investitionen in Edge Computing.Inteligencia ArtificialEl CEO de OpenAI, Sam Altman, advierte que la compañía podría retirar sus servicios de la UE por las preocupaciones que generan las regulaciones del plan de Ley de IA. Esto pone de manifiesto una creciente división transatlántica sobre el control de la IA. Empresas de tecnología de EE. UU., como Google, se...
2023-06-05
05 min
Cybersecurity News Byte with Jim Guckin
Episode 58: May 28 2023
Links https://www.cybersecuritydive.com/news/summer-holiday-weekends-cyber/651434/ https://www.netwrix.com/download/documents/Netwrix_Hybrid_Security_Trends_Report_2023_Enterprise_Sector.pdf - Copy URL if you don’t trust the link…I get it https://www.prnewswire.com/news-releases/netwrix-report-enterprises-suffer-more-ransomware-and-other-malware-attacks-than-smaller-organizations-301831669.html Hot Pixel Technical Paper: https://arxiv.org/abs/2305.12784 https://www.bleepingcomputer.com/news/security/hot-pixels-attack-checks-cpu-temp-power-changes-to-steal-data/ https://www.cadosecurity.com/updates-to-legion-a-cloud-credential-harvester-and-smtp-hijacker/ https://cyware.com/news/enhanced-legion-credential-harvester-targets-ssh-servers-and-aws-credentials-77e34efc Entering the Summer Caution Seaso Memorial Day Weekend Start of the Summer Vacation Season pattern has emer...
2023-05-29
36 min
Embracing Digital This Week
May 1, 2023
News and stories from the Week of May 01, 2023, in Digital Transformation, including cyberattacks and intelligent edge, non-verbal communication AI, and company merges in the IoT space.Artificial IntelligenceThe AI backlash begins: Fans of Snapchat are expressing their discontent with using ChatGPT-powered bots on the platform, marking a backlash against AI. Users criticize the lack of human-like responses and the inability to differentiate between actual and AI-generated content. The incident highlights growing concerns and the need for a balanced implementation of AI in social media platforms.https://www.techradar.com/news/the-ai-backlash-begins-snapchat-fans-revolt-against-chatgpt-powered-bot
2023-05-23
05 min
Breakpoint Security Podcast
Proactive Threat Prevention with Threat Intelligence | Episode Teaser
TOPIC: Proactive Threat Prevention with Threat IntelligenceIn this episode, we discuss the challenges of Threat Intelligence in the modern Threat landscape and how security teams can conduct Threat Intelligence to Proactively Stop Advanced Attacks. Guest: Avkash Kathiriya, Sr. VP - Research and Innovation at Cyware LabsAvkash is the VP of Research at a US-based Cyber security product startup. Avkash is an astute cybersecurity professional with more than 13 years of experience in core security technology domains including Cyber Defense, Security Orchestration and Automation, Cyber Resiliency, Threat Hunting, a...
2023-04-14
02 min
Breakpoint Security Podcast
Proactive Threat Prevention with Threat Intelligence | Avkash Kathiriya | Full Ep.
TOPIC: Proactive Threat Prevention with Threat IntelligenceIn this episode, we discuss the challenges of Threat Intelligence in the modern Threat landscape and how security teams can conduct Threat Intelligence to Proactively Stop Advanced Attacks. Guest: Avkash Kathiriya, Sr. VP - Research and Innovation at Cyware LabsAvkash is the VP of Research at a US-based Cyber security product startup. Avkash is an astute cybersecurity professional with more than 13 years of experience in core security technology domains including Cyber Defense, Security Orchestration and Automation, Cyber Resiliency, Threat Hunting, a...
2023-04-14
1h 11
Out of the Woods: The Threat Hunting Podcast
Top 5 Threat Hunting Headlines - 10 April 2023
**Threat Hunting Workshop: Hunting for Impact April 26 @ 12:00 - 1:00 PM ET 👇 https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-7 **Out of the Woods LIVE Podcast Recording - Episode 8 April 20 @ 7:00 - 8:30 PM ET 👇 https://info.cyborgsecurity.com/en-us/threathuntingpodcast-s1e8 ----- Top 5 Threat Hunting Headlines - 10 April 2023 CISA Adds Five Known Exploited Vulnerabilities to Catalog https://www.cisa.gov/news-events/alerts/2023/04/07/cisa-adds-five-known-exploited-vulnerabilities-catalog Hackers Flood NPM with Bogus Packages Causing a DoS Attack https://thehackernews.com/2023/04/hackers-flood-npm-with-bogus-packages.html MERCURY and DEV-1084: Destructive Attack on Hybrid Environment ht...
2023-04-13
38 min
It's 5:05! Daily cybersecurity and open source briefing
Episode #107 - It's 5:05, Tuesday, March 28, 2023
Hey, it's 5:05 on Tuesday, March 28th, 2023. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from Ax Sharma in Manchester, UK, Olimpiu Pop in Transylvania, Romania, Katy Craig in San Diego, California, Edwin Kwan in Sydney, Australia, Marcel Brown in St. Louis, Missouri. Let's get to it.Redis CVE Race Condition🇬🇧 Ax Sharma, Manchester UKChatGPT Data Leak and Redis Race Condition Vulnerability That Remains UnfixedLiberte, Egalite, Fraternite Surveillance: France to use AI...
2023-03-28
09 min
It's 5:05! Daily cybersecurity and open source briefing
Episode #80 - It's 5:05, Friday, February 17, 2023
Hey! It’s 5:05, on Friday, February 17, 2023. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from Edwin Kwan in Sydney, Australia, Trac Bannon in Camp Hill, Pennsylvania, Ian Garrett in Arlington, Virginia, Katy Craig in San Diego, California and Marcel Brown in St. Louis, Missouri.Let’s get to it!Is Your Smart Speaker Eavesdropping?🇦🇺 Edwin Kwan, Sydney, AustraliaAlexa, who else is listening? | WeLiveSecurityValentine’s Day Breakup: Goodbye Internet Explorer🇺🇸 Tracy (Trac) Bannon, Camp Hill, Pennsylva...
2023-02-17
11 min
It's 5:05! Daily cybersecurity and open source briefing
Episode #58 - It's 5:05, Wednesday, January 18, 2023
Hey! It’s 5:05, Wednesday, January 18, 2023. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from Katy Craig in San Diego, California, Edwin Kwan in Sydney, Australia, Kadi Grigg in Alexandria, Virginia and Olimpiu Pop in Transylvania, Romania. Let's get to it!🇺🇸 Katy Craig, San Diego, CaliforniaFortinet OS exploitedhttps://arstechnica.com/information-technology/2023/01/fortinet-says-hackers-exploited-critical-vulnerability-to-infect-vpn-customers/🇦🇺 Edwin Kwan, Sydney, AustraliaMalicious Python Lolipop packages in the Wild https://www.bleepingcomputer.com/news/security/malicious-lolip0p-pypi-packages-install-info-stealing-malware/ 🇦🇺...
2023-01-18
09 min
Out of the Woods: The Threat Hunting Podcast
Out of the Woods: Top 5 Threat Hunting Headlines
**Join our Threat Hunting Workshop: Hunting for Credential Access on February 8th from 12:00 – 1:00 PM ET and earn your “Credential Access – Level 1” certification! Save your seat 👇 https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-5 Many of 13 New Mac Malware Families Discovered in 2022 Linked to China https://www.securityweek.com/many-13-new-mac-malware-families-discovered-2022-linked-china?&web_view=true https://objective-see.org/blog/blog_0x71.html Microsoft Ends Windows 7 Extended Security Updates on Tuesday https://www.bleepingcomputer.com/news/microsoft/microsoft-ends-windows-7-extended-security-updates-on-tuesday/?&web_view=true Attackers Abuse Genuine Windows Tool to Deliver Pupy RAT https://cyware.com...
2023-01-10
34 min
Thou Shalt Listen: Randomness Reimagined
Season 3, Episode 2 - Most Notorious Hacking Groups, The Most Unlucky US Naval Vessel
https://cyware.com/news/top-10-most-notorious-hacking-groups-of-all-time-32d01ba2 https://www.businessinsider.com/uss-william-d-porter-was-the-navys-unluckiest-warship-2021-7
2022-12-03
16 min
Cyber Morning Call
Cyber Morning Call - #209 - 30/11/2022
[Referências do Episódio] - MIT Technology Review - The Cyber Defense Index 2022/23 - https://mittrinsights.s3.amazonaws.com/CDIreport.pdf - KNOWN EXPLOITED VULNERABILITIES CATALOG - https://www.cisa.gov/known-exploited-vulnerabilities-catalog - ATTACKER USES A POPULAR TIKTOK CHALLENGE TO LURE USERS INTO INSTALLING MALICIOUS PACKAGE - https://checkmarx.com/blog/attacker-uses-a-popular-tiktok-challenge-to-lure-users-into-installing-malicious-package/ - Hackers Exploit RCE Vulnerability in Windows Internet Key Exchange - https://cyware.com/news/hackers-exploit-rce-vulnerability-in-windows-internet-key-exchange-ce908a01/?web_view=true - Critical Flaw Exploited to Bypass Fortinet Products and Compromise Orgs - https://www.hackre...
2022-11-30
04 min
Cyware's CyberCast
CyberCast EP 9: A Cyber Journey from National Security to Finance to Healthcare
Errol Weiss is an accomplished information security executive recognized internationally as a visionary and a leader in threat intelligence operations and management. Weiss has 15 years of cyber security experience within banking and finance. He currently works in healthcare as the Chief Security Officer (CSO) for the Health-ISAC. Throughout his career he has leveraged his ability to build information security strategies aligned to business risk and corporate goals.In the last year and 10 months Weiss has served as a Senior Fellow at the McCrary Institute for Cyber and Critical Infrastructure Security. His prior experience includes roles with Bank of America, the...
2022-03-04
39 min
Cyware's CyberCast
CyberCast EP 8: Tari Schreider on Democratizing Cyber, Defeating Ransomware, and the NFL Playoffs
Today we are joined by Tari, a nationally known expert on cybersecurity who created cyber programs for one of the largest oil and gas companies, a Canadian electric utility company, a 911 system, and one of the largest retailers in the US. He has appeared on ABC News, CNN, CNBC, NPR, and has had numerous articles printed in security and business magazines, including Business Week, New York Times, SC Magazine, The Wall Street Journal and many others. Safe to say Tari is the perfect guest to kick off 2022.In this episode we discuss the democratization of cyber, defeating ransomware, and the...
2022-01-31
43 min
Security Insights - Cybersecurity for Real-World Workplaces
Breaking Down the Ransomware Index Spotlight Report
Host Adrian Vernon is joined by Ivanti's Senior Vice President of Security Products Sri Mukkamala, CEO of Cyber Security Works (CSW) Aaron Sandeen, and Senior Intelligence Analyst at Cyware Neil Dennis. They break down the recent collaborative Ransomware Index Spotlight Report to make sure you are up to date on today's cybersecurity landscape. The conversation includes:How the report was put togetherWhat you can expect from the reportThe importance of the collaborationSurprising contextsWhy a yearly compliance checkpoint may not be enoughThe possible future of ransomwareCYBER HYGIENE!Check out the report at ivanti.comJoin...
2021-11-17
37 min
Cyware's CyberCast
CyberCast EP 7: Ivanti's Dr. Srinivas Mukkamala on AI's Impact on Cyber Security
Artificial Intelligence (AI): Future of cybersecurity or buzzword? This week we dig into how AI is shaping cybersecurity, its history of incorporation into the Department of Defense (DoD)'s, and how it's helping secure businesses today. We are joined by Dr. Srinivas Mukkamala, an industry AI and neural network pioneer who co-founded RiskSense, an infosec company recently acquired by Ivanti.This week's guest:Dr. Srinivas Mukkamala, SVP of Product of Security Products at IvantiHost:Thomas Bain, VP of Marketing at CywareProducer:Elliot Volkman, Editorial Lead at Cyware
2021-10-18
37 min
Cyber Work
How to become a cybersecurity threat intelligence professional | Guest Neal Dennis
Neal Dennis of Cyware talks to us about building a collective defense via increased threat intelligence sharing in the global security community. Dennis has worked with customer success and clients, helping them map out new intelligence workflows, and has also built out several intelligence analysis programs for Fortune 500 companies. Neal started his career as a SIGINT specialist while serving in the United States Marine Corps and later supported cyber initiatives for USCYBERCOM, STRATCOM, NSA, 24th Air Force, USAF Office of Special Investigations and JFCC-NW. – Download our ebook, Developing cybersecurity talent and teams: https://www.infosecinstitute.com/ebook
2021-08-02
41 min
The Tonya Hall Innovation Show
How to prevent chaos in a major hack: Redundancy, says intelligence analyst
Tonya asks Neal Dennis, Cyber threat intelligence expert at Cyware, what are the main takeaways the Colonial Pipeline hack has left for businesses. Learn more about your ad choices. Visit megaphone.fm/adchoices
2021-07-06
10 min
Cyware's CyberCast
CyberCast EP 06: SecurityScorecard on Quantifying Risk
In the future, could security ratings be as important as credit rating? Gartner says yes. This week we are chatting with the CEO and Co-Founder of SecurityScorecard, Aleksandr Yampolskiy.SecurityScorecard is the global leader in cybersecurity ratings and the only service with over two million companies continuously rated.This week's guests:Aleksandr Yampolskiy, CEO and Co-Founder of SecurityScorecardHost:Thomas Bain, VP of Marketing at CywareProducer:Elliot Volkman, Editorial Lead at Cyware
2021-07-02
35 min
The Bottom Line with Deepak and Syed
E25 - SOLANA DEX, Taproot vs ETH 2.0, Inverse Bitcoin ETF, $50 Amazon Giftcard giveaway !!!
In weekly Episode 25, Syed starts out with his tech and infosec update highlighted by the news of Blue Origin auctions seat on the first spaceflight with Jeff Bezos for $28 million, and Hackers being able to Exploit Samsung Pre-Installed Apps to Spy on you!! Next, Syed talks about Solanax, which is a DEX set to come out on the Solana blockchain. The crew then transitions into Bitcoin vs Ethereum. Deepak highlights the taproot update for bitcoin in detail, while Syed dives deep into ETH 2.0. To end off this segment, the crew compares the BTC vs ETH cha...
2021-06-13
53 min
Cyware's CyberCast
CyberCast EP 05: From Data to Intelligence With Flashpoint
What's the difference between data and threat intelligence? Moreover, at what point can we say intelligence is truly actionable? This week we spoke to our friends over at Flashpoint about everyone's favorite buzzword, actionable intelligence.This week's guests:Curtis Gartenmann, Director of Risk Intelligence Strategy at FlashpointMike Smola, Director of Risk Intelligence Strategy at FlashpointHost:Thomas Bain, VP of Marketing at CywareProducer:Elliot Volkman, Editorial Lead at Cyware
2021-06-10
1h 08
The Bottom Line with Deepak and Syed
Weekly Episode 21 - Ransomware and Phishing updates, Elon Musk and Bitcoin, Earnings report this trading week, AT&T merger, Stock + Coin Picks
https://thebottomlineds.com To start Episode 21, get an update on the US Pipeline cyber attack and be aware of the ransomware and phishing scams that happened this past week. After the tech and InfoSec update, the crew transitions into an in-depth analysis of Tesla and Elon Musk banning Bitcoin. A merger is happening this coming week as AT&T is close to joining forces with Discovery to rival Netflix and Disney. There are also earning reports coming out for several companies this trading week highlighted by Cisco, Home...
2021-05-17
40 min
Cybersecurity: Amplified And Intensified
Episode 10 - Unrestricted warfare - Vol. I
With the increase of ransomware activity across the US, every incident may be an act of war. Eric Taylor | LinkedIn Twitter: barricadecyber Youtube: barricade cyber solutions - YouTube www.barricadecyber.com Shiva Maharaj | LinkedIn Twitter: kontinuummsp www.kontinuum.com Brian J. Weiss | LinkedIn ITECH Solutions: Overview | LinkedIn www.itech-solutions.com Articles referenced; Pipeline Cyberattack: Colonial remains mostly closed, working to restore service (cnbc.com) Colonial pipeline shutdown highlights need for better OT cybersecurity practices | CSO Online Dark Reading | Security | Protect The Business Ryuk Ransomw...
2021-05-12
46 min
The Bottom Line with Deepak and Syed
Weekly Episode 18 - Tor Botnet targeting Linux Systems, Coin vs Token + Safemoon and meme coins, Microsoft and Amazon Earning Reports this week
Welcome to Weekly Episode 18. www.thebottomlineds.com In this Episode, Syed starts off with his tech update, talking about malware and botnet out in the wild this past week, and also talking about Apple's new Air tag. The crew then transitions into a talk about coin vs token, and how one can create their own token at a very high level. Deepak transitions into a few companies whose earnings reports are coming out this week such as Microsoft and Amazon. To end off, Syed and Deepak go over...
2021-04-26
33 min
Cyware's CyberCast
CyberCast EP 04: Author, Analyst, and Cyber Thought Leader Richard Stiennon
The future of any industry is built upon the foundation of its past. Cybersecurity and where it is today is no different. This week's guest is as much a historian as he is an evangelist for the future of security, Richard Stiennon.Richard's book, Security Yearbook 2020, is the first complete history of the development of IT security solutions. It focuses is on the pioneers in the space and the companies that arose from their efforts. Security Yearbook shares stories from these pioneers, presented in their own voice while the overall story of the space is recounted as it grew from...
2021-04-15
48 min
Cyware's CyberCast
CyberCast EP 3: Ten Eleven Venture's Alex Doll on Backing Cyber Fusion Centers
This week we have a very special guest who has pioneered how growing cyber security companies can grow and scale. Alex Doll, Founder and Managing General Partner of Ten Eleven Ventures, chats with Tom about investing in the future of cyber fusion centers.Ten Eleven Ventures was the first cyber security-specific venture capital fund, with several others now in the mix. Since their founding, they have backed 27 different cyber security companies with more than half a billion dollars.This week's guest:Alex Doll, Founder and Managing General Partner of Ten Eleven VenturesHost:Thomas Bain, VP of Marketing at CywareProducer:Elliot...
2021-03-25
53 min
Enterprise Security Weekly (Audio)
Need More Cowbell - ESW #220
This week, our good friend Ron Gula joins us to talk about cybersecurity investments, tips for both enterprises and enturprenurs. In the enterprise security news funding announcements from Coalition, HeraSoft, Cowbell Cyber, Argon, Cynet, Docker, and Cyware. Sonatype Acquires MuseDev, Sumologic Acquires DF Labs, Acronis acquires Synapsys, Lookout grabs CipherCloud and a cybersecurity SPAC. Kasada announces some new features to its bot detection offering, Rapid7 introduces an agent for CloudFront, Aqua supports ARM, and Chris Roberts joins Cynet! Ilia Kolochenko, the chief architect at Immuniweb joins us to talk about attack surface management! Show Notes: h...
2021-03-19
2h 10
Enterprise Security Weekly (Video)
ARM Support, Cyber "SPAC", Cyber Fusion, Docker, & Beer Outage - ESW #220
This week in the Enterprise Security News: funding announcements from Coalition, HeraSoft, Cowbell Cyber, Argon, Cynet, Docker, and Cyware. Sonatype Acquires MuseDev, Sumologic Acquires DF Labs, Acronis acquires Synapsys, Lookout grabs CipherCloud and a cybersecurity SPAC. Kasada announces some new features to its bot detection offering, Rapid7 introduces an agent for CloudFront, Aqua supports ARM, and Chris Roberts joins Cynet, & more! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw220
2021-03-18
46 min
Cyware's CyberCast
CyberCast EP 02: Advent's Eric Noeth Chats on Cyware Series B, Security Tech Growth
CyberCast is back with a new episode, and we have some huge news: We have closed our Series B round! This new round of investment will greatly fuel the growth of Cyware and allow us to create more series like the CyberCast. With this in mind, we sat down to chat with Eric Noeth of Advent to discuss the news, where cyber is headed, and what is driving growth in new security technology.This week's guest:Eric Noeth, Principal on Advent's technology team in Palo AltoHost:Thomas Bain, VP of Marketing at CywareProducer:Elliot Volkman, Editorial Lead at Cyware
2021-03-17
43 min
Cyware's CyberCast
CyberCast EP 01: Investing in Cyber Security
Introducing CyberCast, Cyware’s first multimedia series designed to bring you first-hand insight, intelligence, and expertise from the cybersecurity world. Your host, Thomas Bain, Cyware's VP of marketing, will take you on a journey to get better acquainted with some of the people advancing the cyber security industry. To kick things off, we’re going to talk to two of the investors helping fuel Cyware become the only provider of Cyber Fusion Centers, and where they see our industry changing the most. This week's guests:Charles Collins, Partner at Emerald Development Managers LPZach Sivertson Managing Director at Prelude, Mercato PartnersHost:Thom...
2021-03-10
55 min
Cyware's CyberCast
Introducing CyberCast
Introducing CyberCast, Cyware’s first multimedia series designed to bring you first-hand insight, intelligence, and expertise from the cybersecurity world. Your host, Thomas Bain, Cyware's VP of marketing, will take you on a journey to get better acquainted with some of the people advancing the cyber security industry. To kick things off, we’re going to talk to two of the investors helping fuel Cyware become the only provider of Cyber Fusion Centers, and where they see our industry changing the most.
2021-03-10
02 min
The Bottom Line with Deepak and Syed
Weekly Episode 10 - NASA and Solarwinds breach, Short Squeeze 2.0, How to be defensive in the market?, Why yields matter ?
The Bottom Line has now reached Episode 10!! Starting back in mid-December with The Debut, and now 10 weekly episodes in, plus one exclusive episode under the boat, Syed and Deepak are grateful to everyone for their love and support. The Bottom Line will continue to provide everyone with great content going forward as well. In Syed's tech and InfoSec update, he mentions that the SolarWinds breach now includes NASA as a victim. Syed also mentions that a Ransomware gang hacked Ecuador's largest private bank. Two other updates are provided by Syed regarding the T-Mobile data breach via...
2021-03-01
15 min
The CyberWire
Bear tracks all over the US Government’s networks. Pandas and Kittens and Bears, oh my... Emotet’s back. Spyware litigation. A few predictio
The US continues to count the cost of the SVR’s successful cyberespionage campaign. Attribution, and why it’s the TTPs and not the org chart that matters. Emotet makes an unhappy holiday return. It seems unlikely that NSA and US Cyber Command will be separated in the immediate future. Big Tech objects, in court, to NSO Group and its Pegasus spyware (or lawful intercept product, depending on whether you’re in the plaintiff’s or the respondent’s corner). Ben Yelin looks at hyper realistic masks designed to thwart facial recognition software. Our guest Neal Dennis from Cyware wonders if there r...
2020-12-22
25 min
Hacking Humans
The landscape has shifted for holiday shopping to online.
Joe provides some listener feedback on allowing site notifications, Dave shares good news in his story about taking down money mules, Joe's got not as good news about a phishing campaign targeting the COVID-19 vaccine cold chain, The Catch of the Day comes from a listener named Virginia who received a phishing email impersonating a bank, and later in the show, Dave's conversation with Neal Dennis from Cyware on the cybersecurity concerns and pitfalls customers need to look out for and why ecommerce has become a goldmine for hackers.Links to stories: U.S. Law Enforcement...
2020-12-10
33 min
The Tonya Hall Innovation Show
Hackers are sharing data, but companies should too
Tonya Hall sits down with Neal Dennis, cyber threat intelligence advisor at Cyware, to talk about what it means when hackers share data and why he recommends that companies start sharing data as well within the legal boundaries. Learn more about your ad choices. Visit megaphone.fm/adchoices
2020-11-13
09 min
Cup of Cyber
Neural Networks For Better Passwords
Neural Networks For Better Passwords- Cup of Cyber October 27th, 2020 Join us for an inside view of today’s Cyber News and why it matters.November 19th is our next TRIVIA NIGHT. Join us at 7:00 PM Eastern Time for free fun and a chance to win prizes!Congratulations to Mike Bravo for another win!————————— News ————————————-The Future of Ransomware Attackshttps://cyware.com/news/the-future-of-ransomware-attacks-f7b4f2abFraudsters Alter Election Phishing Scamhttps://www.govinfosecurity.com/fraudsters-alter-election-phishing-scam-a-15245Neural Networks Help Users Pick More-Secure Passwordsht...
2020-10-27
30 min
Cup of Cyber
Fairfax Schools do not Pay Ransom
US Cyber Command Tricking TrickBot! - October 13th, 2020 Join us for an inside view of today’s Cyber News and why it matters.Thursday (the 15th) is our next TRIVIA NIGHT. Join us at 7:00 PM Eastern Time for free fun and a chance to win prizes!————————— News ————————————-The seven deadly sins letting hackers hijack America's govt networks: These unpatched bugs leave systems openhttps://www.theregister.com/2020/10/12/cisa_fbi_warning/Ransomware operators now outsource network access exploits to speed up attackshttps://www.zdnet.com/article/ransomware-opera...
2020-10-13
1h 03
Cup of Cyber
Emotet Attacks on US Government!
Emotet Attacks on US Government!- Cup of Cyber - October 7th, 2020 Join us for an inside view of today’s Cyber News and why it matters.————————— News ————————————-Egregor Malware Threatens Public Humiliation on Mass Mediahttps://cyware.com/news/egregor-malware-threatens-public-humiliation-on-mass-media-9c110cf8Release the Kraken: Fileless APT attack abuses Windows Error Reporting servicehttps://blog.malwarebytes.com/malwarebytes-news/2020/10/kraken-attack-abuses-wer-service/CISA alert warns of Emotet attacks on US govt entitieshttps://securityaffairs.co/wordpress/109166/malware/cisa-alert-emotet.html—————————-Todays Offbeat Holiday————-Today is: Canadian Beer Dayhttps://canadianbeerday.ca...
2020-10-07
41 min
Cup of Cyber
Can your Printer Cartridge Be Hacked?
Can your Printer Cartridge Be Hacked? - Cup of Cyber - October 2nd, 2020 Join us for an inside view of today’s Cyber News and why it matters.https://www.cyber-recon.com/courses/rmf-cap/————————— News ————————————-Ahead of U.S. election, malicious email campaign mimics Democratic pitches for volunteershttps://www.reuters.com/article/us-usa-election-cybercrime/ahead-of-u-s-election-malicious-email-campaign-mimics-democratic-pitches-for-volunteers-idUSKBN26N03JBlackTech: A Hacking Group with a Busy Agendahttps://cyware.com/news/blacktech-a-hacking-group-with-a-busy-agenda-c88f7d2aUK found flaw of 'national significance' in Huawei tech, says reporthttps://www.zdnet.com/artic...
2020-10-02
1h 03
Cup of Cyber
90% of Server Attacks try Cryptomining
Cup of Cyber - September 30th, 2020 - 90% of Server Attacks Try CryptominingJoin us for an inside view of today’s Cyber News and why it matters.Today we look inside the Cyber-Recon, RMF & CAP Coursehttps://www.cyber-recon.com/courses/rmf-cap/————————— News ————————————-Vulnerability in Wireless Router Chipsets Prompts Advisoryhttps://www.darkreading.com/vulnerabilities---threats/vulnerability-in-wireless-router-chipsets-prompts-advisory/d/d-id/1339032Microsoft: Some ransomware attacks take less than 45 minuteshttps://www.zdnet.com/article/microsoft-some-ransomware-attacks-take-less-than-45-minutes/Over 90% Attacks on Cloud Servers Attempt Cryptomining, Study Revealshttps://cyware.com/news...
2020-09-30
1h 03
Cup of Cyber
North Korean Hackers Tied to Russia
Cup of Cyber - September 17th, 2020 - North Korean Hackers Tied to RussiaJoin us for an inside view of today’s Cyber News and why it matters.————————— News ————————————-CISA Joins MITRE to Issue Vulnerability Identifiershttps://www.darkreading.com/vulnerabilities---threats/vulnerability-management/cisa-joins-mitre-to-issue-vulnerability-identifiers/d/d-id/1338930New macOS Malware Variant Goes Unnoticed by Antivirus Scannershttps://cyware.com/news/new-macos-malware-variant-goes-unnoticed-by-antivirus-scanners-87fe6375LockBit ransomware launches data leak site to double-extort victimshttps://www.bleepingcomputer.com/news/security/lockbit-ransomware-launches-data-leak-site-to-double-extort-victims/Likely Links Emerge Between...
2020-09-17
53 min
Cup of Cyber
Cup of Cyber - Emotet Kill Switch?
Cup of Cyber - August 28th, 2020 - Emotet Kill Switch?Join us for an inside view of today’s Cyber News and why it matters.Next Trivia Night is September 10 - Congratulations Ralph for your win last time and Alex for the Illy win (Again!)Watch the channel live every weekday morning at 7:30 AM Eastern Time---------------------------Contents------------------------0:00 Welcome5:25 DeathStalker APT Attacked SMBs with Cyber Espionage Tools12:35 Magecart’s Success Paves Way For Cybercriminal Credit Card ‘Sniffer’ Market22:12 Chrome 85 Released With 20 Security Fixes26:28...
2020-08-31
41 min
Cup of Cyber
Cup of Cyber - Amazon Patch is a Red Flag
Cup of Cyber - August 20th, 2020 - Amazon Patch is a Red FlagJoin us for an inside view of today’s Cyber News and why it matters.Next Trivia Night is August 27 - Congratulations Ralph for your win last time and Alex for the Illy winWatch the channel live every weekday morning at 7:30 AM Eastern Time————————— News ————————————-Ponca City Schools Gives Update On Ransomware Attackhttps://www.newson6.com/story/5f3bbf3...Recent Deeds Of REvil Ransomware Family - A Quick Lookhttps://cyware.com/news/recent-deeds...
2020-08-21
1h 01
Cup of Cyber
Cup of Cyber - Updated IcedID Trojan
Cup of Cyber - August 19th, 2020 - Updated IcedID TrojanJoin us for an inside view of today’s Cyber News and why it matters.Next Trivia Night is August 27 - Congratulations Ralph for your win last time and Alex for the Illy winWatch the channel live every weekday morning at 7:30 AM Eastern Time————————— News ————————————-Ukraine arrests gang who ran 20 crypto-exchanges and laundered money for ransomware gangshttps://www.zdnet.com/article/ukraine...Some email clients are vulnerable to attacks via 'mailto' linkshttps://www.zdnet.com/article/some-em...
2020-08-20
57 min
Cup of Cyber
Cup of Cyber - Hacked By A Network Cable?
Cup of Cyber - August 12th, 2020 - Hacked By A Network Cable?Join us for an inside view of today’s Cyber News and why it matters.Next Trivia Night is August 13 - Congratulations Ralph for your win last time and JJ for the secondWatch the channel live every weekday morning at 7:30 AM Eastern Time————————— News ————————————-Operation Skeleton Key: 'Chimera' Hacker Group Targets Taiwanese Semiconductor Manufacturershttps://cyware.com/news/operation-ske...https://www.secureworks.com/research/...Critical Flaws Affect Citrix Endpoint Management (XenMobile Servers)https...
2020-08-18
44 min
Cup of Cyber
Cup of Cyber - Government Cyber Career Path Tool
Cup of Cyber - August 10th, 2020 - Government Cyber Career Path ToolJoin us for an inside view of today’s Cyber News and why it matters.Next Trivia Night is August 13 - Congratulations Ralph for your win last time and JJ for the secondWatch the channel live every weekday morning at 7:30 AM Eastern Time————————— News ————————————-FBI says an Iranian hacking group is attacking F5 networking deviceshttps://www.zdnet.com/article/fbi-say...New Hacker-for-Hire Threat Actor Unearthed by Security Researchershttps://cyware.com/news/new-hacker-fo......
2020-08-18
55 min
Cup of Cyber
Cup of Cyber - Instagram Stealing Data?
Cup of Cyber - August 14th, 2020 - Instagram Stealing Data?Join us for an inside view of today’s Cyber News and why it matters.Next Trivia Night is August 27 - Congratulations Ralph for your win last time and Alex for the Illy winWatch the channel live every weekday morning at 7:30 AM Eastern Time————————— News ————————————-An Enhanced Variant of Agent Tesla is Making the Roundshttps://cyware.com/news/an-enhanced-v...CactusPete APT Hones Toolset, Resurfaces with New Espionage Targetshttps://threatpost.com/cactuspete-apt...SANS Institute b...
2020-08-18
1h 19
Cup of Cyber
Cup of Cyber - President Bans TikTok
Cup of Cyber - August 11th, 2020 - President Bans TikTokJoin us for an inside view of today’s Cyber News and why it matters.Next Trivia Night is August 13 - Congratulations Ralph for your win last time and JJ for the secondWatch the channel live every weekday morning at 7:30 AM Eastern Time————————— News ————————————-WastedLocker Can Now ByPass Behavioral Detections in Anti-Malware Softwarehttps://cyware.com/news/wastedlocker-...North Korean Hackers Can’t Seem to Take a Breathhttps://cyware.com/news/north-korean-...Facebook’s new ope...
2020-08-18
1h 04
Cup of Cyber
Cup of Cyber - Senate to Ban TikTok
Cup of Cyber - August 7th, 2020 - Senate to Ban TikTokJoin us for an inside view of today’s Cyber News and why it matters.Next Trivia Night is August 13 - Congratulations Ralph for your win last time and JJ for the second————————— News ————————————-US Senate Votes to Ban TikTok on Government Phoneshttps://www.securityweek.com/us-senate-votes-ban-tiktok-government-phonesSharepoint Exploitation Details and PoC Published Before Patch Releasehttps://cyware.com/news/sharepoint-exploitation-details-and-poc-published-before-patch-release-2a7c87c2More Magic Out of Its Hat - Emotet Found Using Stolen Email Attachment...
2020-08-15
36 min
Cup of Cyber
Cup of Cyber - FBI Issues Warning About Windows 7!
Cup of Cyber - August 6th, 2020 - FBI Issues Warning About Windows 7!Join us for an inside view of today’s Cyber News and why it matters.Next Trivia Night is August 13 - Congratulations Ralph for your win last time and JJ for the second————————— News ————————————-Researchers found another way to hack Android cellphones via Bluetoothhttps://www.cyberscoop.com/bluetooth-vulnerability-android-dbappsecurity-black-hat-2020/Dutch Hackers Found a Simple Way to Mess With Traffic Lightshttps://www.wired.com/story/hacking-traffic-lights-netherlands/US offers $10 million reward for hackers meddling in US electionsh...
2020-08-15
39 min
Cup of Cyber
Cup of Cyber - GrandCrab Ransomware Distributor Arrested
Cup of Cyber - August 3rd, 2020 - GrandCrab Ransomware Distributor Arrested Join us for an inside view of todays Cyber News and why it matters.Next Trivia Night is August 13 - Congratulations Ralph for your win last night and JJ for the second————————— News ————————————-GandCrab ransomware distributor arrested in Belarushttps://www.zdnet.com/article/gandcrab-ransomware-distributor-arrested-in-belarus/TrickBot Anchor Malware Infects Both Linux and Windows Systemshttps://cyware.com/news/trickbot-anchor-malware-infects-both-linux-and-windows-systems-cfbe68d7WastedLocker: technical analysishttps://securelist.com/wastedlocker-technical-analysis/97944/Vulnerability Spotlight: Microsoft issues...
2020-08-15
49 min
InfoSec X News
InfoSec X News : Episode 12 Facebook, Paypal, Iran, and Android!!
Today we talked about Facebook Paypal Iran Android https://www.infosecurity-magazine.com/news/facebook-encryption-slammed/ https://www.dawn.com/news/1532960/facebook-plan-to-encrypt-platforms-risks-child-abuse https://tech.co/news/new-paypal-text-message-scam-2018-07 https://cyware.com/news/dont-fall-for-the-paypal-sms-scam-that-steals-your-personal-details-06071073 https://www.forbes.com/sites/daveywinder/2020/02/09/powerful-iran-cyber-attack-takes-down-25-of-national-internet/#1de9070020dc https://www.somagnews.com/internet-access-iran-drops-75-strong-cyber-attack/ https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/ BONUS https://www.ibtimes.sg/android-vulnerability-delete-these-newly-detected-cleaner-apps-your-smartphone-39123 Delete these if you have...
2020-02-10
13 min
InfoSec X News
InfoSec X News : Episode 9 Taxpayers, Wawa, and the UN!!
Today we talked about Taxpayers and getting phished, Wawa in their massive breach, and the UN being shady!!!!!! https://cyware.com/news/taxpayers-look-out-for-these-phishy-tax-scams-5b2c1dc7 https://www.ozarkradionews.com/local-news/bbb-advises-against-tax-scams https://www.infosecurity-magazine.com/news/hackers-uploading-30-m-cards-wawa/ https://www.infosecurity-magazine.com/news/human-rights-fears-as-un-admits/ https://www.forbes.com/sites/daveywinder/2020/01/30/united-nations-confirms-serious-cyberattack-with-42-core-servers-compromised/#7f773b32633d https://www.infosecurity-magazine.com/news/human-rights-fears-as-un-admits/ https://en.wikipedia.org/wiki/Wawa_(company)
2020-01-31
11 min
InfoSec X News
InfoSec X News : Episode 7 Cyber leaders, Managed Service providers, Seattle voters!!
Today we talked about the following. - NEW BILL PROPOSES CYBER LEADERS FOR EACH U.S. STATE -CYBERCRIMINALS ARE SELLING ACCESS TO COMPANY NETWORKS -SEATTLE-AREA VOTERS TO VOTE BY SMARTPHONE Bonus* Jeff Bezos! https://www.infosecurity-magazine.com/news/us-state-cybersecurity-leader-act/ https://www.npr.org/2020/01/22/798126153/exclusive-seattle-area-voters-to-vote-by-smartphone-in-1st-for-u-s-elections https://cyware.com/news/cybercriminals-are-selling-access-to-company-networks-to-make-quick-money-d87c986e https://www.npr.org/2020/01/22/798126153/exclusive-seattle-area-voters-to-vote-by-smartphone-in-1st-for-u-s-elections https://searchitchannel.techtarget.com/definition/managed-service-provider
2020-01-23
08 min