Look for any podcast host, guest or anyone
Showing episodes and shows of

OutOfBand

Shows

UhkametsäUhkametsä39: HopeaRottaJaksossa selviää onko HopeaRotta uusi RAP-artisti vaiko jotain muuta. Lisäksi Uhkametsä käy läpi viime vuoden jaksoja ja juontajat esittelevät itsensä ja uratarinansa. Päädyimme kertomaan taustatarinaa itsestämme sikäli jos meillä on uusia kuulijoita jotka eivät ole alkupään jaksoja kuunelleet, jossa mahdollisesti käytiin läpi esittelyjä.Jaksossa myös puidaan, että johtavatko Juuson nykyiset harrastukset rikolliseen uraan.Ainiin, muistakaa Uhkiksen uusi IG:https://www.instagram.com/uhkametsa/Lähteet:https://attack.mitre.org/groups/G0034/https://www.reuters.com/world/europe/russian-hackers-were-inside-ukraine-telecoms-giant-months-cyber-spy-chief-2024-01-04/https://ww...2024-01-141h 35CYFIRMA ResearchCYFIRMA ResearchCYFIRMA Research - Episode 071: A Gamer Turned Malware Developer: Diving Into SilverRat And It’s Syrian RootsThis report provides a glimpse into the evolving landscape of RAT development and malicious activities performed by threat actors working under name of ‘Anonymous Arabic’. Our team investigated the Silver RAT (written in C sharp) which has capabilities to bypass anti-viruses and covertly launch hidden applications, browsers, keyloggers, and other malicious activities. The developers operate on multiple hacker forums and social media platforms, showcasing an active and sophisticated presence, in addition to a Telegram channel offering a range of services including the distribution of cracked RATs, leaked databases, carding activities, and the sale of social media bots, which are empl...2024-01-0804 minOut Of BandOut Of BandLet’s talk about...Threat Informed Defense through Cyber Threat IntelligenceFor S03E06, Gert-Jan Bruggink takes us into the world of Threat-Informed Defence through #cyberthreatintelligence. While taking his first steps in the cybersecurity world as an engineer, and later on as a consultant, he got intrigued by the release of the first APT report, the rise of a (now not so small anymore) open-source information company, and the question “How does the decision-making process work in an organisation?”. Specialising further and further in the world of cyber threat intelligence AND storytelling, he now acts as a Cyber Threat Landscape Cartographer, encouraging every team he guides to think crit...2023-10-0651 minOut of the Woods: The Threat Hunting PodcastOut of the Woods: The Threat Hunting PodcastTop 5 Threat Hunting Headlines - 02 Oct 2023Top 5 Threat Hunting Headlines - 02 Oct 2023 The Thin Line: Educational Tools vs. Malicious Threats – A Focus on The-Murk-Stealer https://www.cyfirma.com/outofband/the-thin-line-educational-tools-vs-malicious-threats-a-focus-on-the-murk-stealer/ Budworm: APT Group Uses Updated Custom Tool in Attacks on Government and Telecoms Org https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/budworm-tool-update-telecoms-govt GitHub – Nick-Vinesmoke/The-Murk-stealer https://github.com/Nick-Vinesmoke/The-Murk-stealer SecureList: A cryptor, a stealer and a banking trojan https://securelist.com/crimeware-report-asmcrypt-loader-lumma-stealer-zanubis-banker/110512/ Meet LostTrust ransomware — A likely rebrand of the MetaEncryptor gang https://www.bleepingcomputer.com/news/security/meet-losttrust-ransomware-a-likely-rebrand-of-the-metaencryptor-gang/  -----   Follow Us! Twitter...2023-10-031h 01CYFIRMA ResearchCYFIRMA ResearchCYFIRMA Research - Episode 030: Stealthy malicious MSI Loader - Overlapping Technique and Infrastructure with BatLoader!The Cyfirma Research team has recently discovered a disguised Stealthy MSI Loader being advertised in underground forums by Russian threat actor, showcasing its remarkable ability to evade detection by both Virus Total scan and Windows Defender. Additionally, through our investigation, we have established a link between this MSI Loader and the BatLoader campaign observed in March 2023, highlighting potential coordination between these threats. Our meticulously crafted report on Stealthy MSI Loader provides a comprehensive and actionable insight into this novel and rapidly evolving threat, emphasizing the urgent need for the cybersecurity community to address and counter this threat promptly. 2023-08-1504 minIl Caffettino di Mario MoroniIl Caffettino di Mario MoroniSafechat: l'app fasulla che ruba dati da Whatsapp e TelegramDiverse testate anche in Italia (Punto Informatico, Html, ecc) hanno citato la notizia. I ricercatori di Cyfirma (https://www.cyfirma.com/outofband/apt-bahamut-targets-individuals-with-android-malware-using-spear-messaging/) hanno scoperto un'app malware che ruba dati sui cellulare Android in tutto il mondo. Metti SEGUI a “Il Caffettino” su Spotify e attiva la CAMPANELLA :) Manda un Whatsapp vocale con la tua domanda: 335.5791901 Leggi “La fine dei social”: https://amzn.to/439sETd Accedi alla community: https://t.me/mariomoronicanale Contattami: mario@mariomoroni.it Buon Caffettino!See omnystudio.com/listener for privacy information.2023-08-0404 minOut Of BandOut Of BandLet's talk about Crisis Management Preparation🟠 Stephen Delahunty and Sebastien Jardin discuss with us in S03E05 on how to prepare organisations for "what happens after the boom"; or in other words, how to deal with large cyber crises. Stephen and Sebastien talk us through what Cyber Crisis Management Preparation is, how they cannot fail when being invited train a C-Suite, and how experience in the military and the TV and film world help them with dealing with curveballs and egos. Tune in to learn more! Quote of the talk: “A crisis simulation is like haute couture: Everything is custom and tailored, unique for ev...2023-07-071h 04Out of the Woods: The Threat Hunting PodcastOut of the Woods: The Threat Hunting PodcastTop 5 Threat Hunting Headlines - 20 June 2023**Threat Hunting: Shifting Gears in Query Tuning June 28th @ 12:00 - 12:30 PM ET 👇 https://info.cyborgsecurity.com/en-us/shifting-gears **Out of the Woods LIVE Episode July 20th @ 7:00 - 8:30 PM ET 👇 https://info.cyborgsecurity.com/en-us/threathuntingpodcast-s1e10 ----- Top 5 Threat Hunting Headlines - 20 June 2023 Skuld: The Infostealer that Speaks Golang https://www.trellix.com/en-us/about/newsroom/stories/research/skuld-the-infostealer-that-speaks-golang.html Fulfilling Expected SEC Requirements for Cybersecurity Expertise at Board Level https://www.securityweek.com/fulfilling-expected-sec-requirements-for-cybersecurity-expertise-at-board-level/ Mystic Stealer – Evolving “stealth” M...2023-06-2138 minOut Of BandOut Of BandLet's Talk About Identity & Access Management (IAM)🟠 Joe Zanini takes us in S03E04 into the complex world of Identity & Access Management (IAM). We talk about what IAM is and why it is so difficult to implement properly in an organisation. We shed some light on Joe's journey through the IAM space since 2008, and why it is important to know a little bit of every security domain if you want to work in IAM. Tune in to learn more! Guest Profile: Joe Zanini LinkedIn: https://www.linkedin.com/in/joezanini/ –––––––––––––––––––––––––––––– Track: Drive — Markvard [Audio Library Release] Music provided by Audio Library Plus Watch: https://youtu.be/3dQDaKnyiX...2023-06-0235 minCYFIRMA ResearchCYFIRMA ResearchCYFIRMA Research - Episode 009: DeltaBoys - Black Hats On The RiseDeltaBoys have been operating since December 2021, initially starting out as database brokers and carders. However, in August 2022, their operation evolved into mass defacement and the ‘initial access’ broking market, providing webshells to sensitive websites. To fund their geopolitically motivated operations, they built a diverse catalogue of recently compromised databases, ‘zero-days’, ‘exploits to known vulnerabilities’, webshells, and leaked credit cards for sale.Link to Research Report: https://www.cyfirma.com/outofband/deltaboys-black-hats-on-the-rise/#Cybersecurity #CyberIntelligence #etlm #situationalawarenesshttps://www.cyfirma.com/2023-05-2902 minCYFIRMA ResearchCYFIRMA ResearchCYFIRMA Research - Episode 008:The Meaning of ETLM for the Upcoming Ukrainian OffensiveA year and a half into the Russian war in Ukraine, the defending Ukrainians are now reconstituting their attrited forces for an imminent counter-attack, which might be the last opportunity the Ukrainian commanders will get to push the occupiers out of the country, before the external support, the country is relying on gets exhausted. The future of the country hinges on the success of the counter-offensive and its success hinges on numerous factors, out of which the ability to perform combined arms maneuvers at the operational level will be the most important one in order to root out the...2023-05-2405 minCYFIRMA ResearchCYFIRMA ResearchCYFIRMA Research - Episode 007: Evolution of KILLNET from Hacktivism to Private Hackers Company and the Role of Sub-groupsRecently KILLNET creator; ‘KillMilk’, announced that they were building a global team of operators from the darknet and special services members, with financially motivated destructive capabilities. Their operation went full circle from offering services to hackers and competing businessmen, to taking orders from private and state persons, along with defending the interests of the Russian Federation. CYFIRMA research report focused on analyzing KILLNET, Subgroups, capabilities, and recent development in the group’s motive.Key PointsThe KILLNET operation has come full circle, evolving from a service provider for hackers and competing businesses, to a priv...2023-05-1704 minCYFIRMA ResearchCYFIRMA ResearchCYFIRMA Research - Episode 006:Exploiting the PowerPress 10.0 Stored Cross-Site Scripting Vulnerability (CVE-2023-1917)The PowerPress plugin, which allows WordPress users to publish and manage podcasts, was found to contain a stored Cross-Site Scripting (XSS) vulnerability. The vulnerability allowed authenticated threat actors with contributor-level permissions or higher to inject malicious web scripts into pages, using the plugin’s shortcode, potentially leading to the theft of sensitive information, manipulation of site content, or redirection of users to malicious websites. The vulnerability was fully addressed in version 10.0.2 of the plugin, the latest version is 10.0.7. and all Wordfence users are fully protected against it. However, users are urged to update their sites to the latest patched ve...2023-05-1604 minCYFIRMA ResearchCYFIRMA ResearchCYFIRMA Research - Episode 005: SarinLocker RansomwareSarinLocker is written by NecroSys, who is associated with FusionCore group. The threat actor group known as FusionCore is a relatively new and determined group, originating from Europe. The group is running Malware-as-a-service, along with hacker-for-hire services. They have a wide range of skills and rely on open-source tools to increase evasiveness in their malware toolkit. The current version of SarinLocker v1.0 may not be highly sophisticated, we anticipate that it is still undergoing development and expect that future versions will include enhanced capabilities.Link to Research Report: https://www.cyfirma.com/outofband/sarinlocker-ransomwarehttps...2023-05-1303 minCyber Morning CallCyber Morning CallCyber Morning Call - #292 - 11/04/2023[Referências do Episódio] - Analyzing Impala Stealer – Payload of the first NuGet attack campaign - https://jfrog.com/blog/impala-stealer-malicious-nuget-package-payload/ - ARES Leaks – Emerging Cyber Crime Cartel - https://www.cyfirma.com/outofband/ares-leaks-emerging-cyber-crime-cartel/ - MERCURY and DEV-1084: Destructive attack on hybrid environment - https://www.microsoft.com/en-us/security/blog/2023/04/07/mercury-and-dev-1084-destructive-attack-on-hybrid-environment/ [Ficha técnica] Apresentação: Carlos Cabral Roteiro: Carlos Cabral e Daniel Venzi Edição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia Projeto...2023-04-1105 minOut Of BandOut Of BandLet's talk about Malware Analysis🟠 Max Kersten, a self-taught Malware Analyst at Trellix’ Advanced Threat Research team joins us in S03E03 of Out of Band to discuss Malware Analysis. In addition to talking about his journey from writing code at 12 years old, being a Law School dropout and finally teaching himself how to perform Malware Analysis, we get to learn about the contributions he is making to the community, Reverse Engineering Malware and some of the high ways you and I can take into the field! Tune in to learn more.  Guest Profiles:  Max Kersten Linke...2023-04-061h 05Out Of BandOut Of BandLet's Talk about Social Engineering🟠 In Season 3 Episode 02 of Out of Band we are joined by Stephanie Carruthers (Snow), Chief People Hacker for the X‑Force Red team at IBM to talk about Social Engineering. Stephanie’s background is rather unique having worked in Sales and Special Effects Makeup before pivoting into cyber. She shares her journey of becoming a Social Engineer, the challenges she faces in her role and much needed advice for those that would be interested in cybersecurity or social engineering! Tune in to learn more. Guest Profile: Stephanie Carruthers LinkedIn: https://www.linkedin.com/in/step...2023-03-0236 minCyber Morning CallCyber Morning CallCyber Morning Call - #263 - 28/02/2023[Referências do Episódio] - RIG Exploit Kit: In-Depth Analysis - https://www.prodaft.com/m/reports/RIG___TLP_CLEAR-1.pdf - PureCrypter targets government entities through Discord - https://www.menlosecurity.com/blog/purecrypter-targets-government-entities-through-discord/ - TA569: SocGholish and Beyond - https://www.proofpoint.com/us/blog/threat-insight/ta569-socgholish-and-beyond - Exfiltrator-22: An Emerging Post-Exploitation Framework - https://www.cyfirma.com/outofband/exfiltrator-22-an-emerging-post-exploitation-framework/ [Ficha técnica] Apresentação: Carlos Cabral Roteiro: Carlos Cabral e Daniel Venzi Edição de áudi...2023-02-2805 minOut Of BandOut Of BandLet's talk about Critical Thinking in Cybersecurity🟠 Season 3 Episode 01 of Out of Band delves into the topic of Critical Thinking in Cybersecurity. We are joined by Ramon Garo, Manager of CSIRT Incident Response Analysts at IBM, to share his unique perspective and share experience on this topic. Ramon has worked in a range of security roles prior to specialising in digital forensics and incident response (DFIR). We delve into its importance, subskills that enable one to be a critical thinker and some of the gotcha’s along the way! Tune in to learn more. Guest Profiles: Ramon Garo LinkedIn: https://www.l...2023-01-2645 minOut Of BandOut Of BandLet's talk about Detection EngineeringSeason 2 Episode 10 of Out of Band delves into the topic of Detection Engineering. We are joined by Detection Engineers Olaf Hartong and Chris Kulakowski who share their unique experiences and perspectives about the field and role. Olaf is the Co-founder and Defensive Specialist at Falcon Force and a Microsoft MVP. Chris is currently a Senior Threat Hunter and Detection Engineer at IBM. They both have held numerous roles in the past and both agree on one thing - Curiosity is key! Tune in to learn more. Guest Profiles: Olaf Hartong LinkedIn: https://www...2022-12-0146 minSANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)ISC StormCast for Wednesday, November 30th, 2022LinkedIn Bots https://isc.sans.edu/diary/Identifying%20Groups%20of%20%22Bot%22%20Accounts%20on%20LinkedIn/29282 Oracle Fusion Middle Ware Exploited CVE-2021-35587 https://www.cisa.gov/known-exploited-vulnerabilities-catalog Windows IKE Flaw Exploited CVE-2022-34721 https://www.cyfirma.com/outofband/windows-internet-key-exchange-ike-remote-code-execution-vulnerability-analysis/ Anker Eufy Cameras Sending Images to Cloud even if asked not to https://www.macrumors.com/2022/11/29/eufy-camera-cloud-uploads-no-user-consent/ Packet Tuesday https://packettuesday.com SANS Holiday Hack Challenge Sign Up https://www.sans.org/mlp/holiday-hack-challenge/2022-11-3006 minSANS Internet Storm Center\'s Daily Network Security News PodcastSANS Internet Storm Center's Daily Network Security News PodcastNetwork Security News Summary for Wednesday November 30th, 2022LinkedIn Bots; Oracle Fusion Exploited; Windows IKE Exploit; Anker Eufy Privacy; SANS Holiday Hack Challenge LinkedIn Bots https://isc.sans.edu/diary/Identifying%20Groups%20of%20%22Bot%22%20Accounts%20on%20LinkedIn/29282 Oracle Fusion Middle Ware Exploited CVE-2021-35587 https://www.cisa.gov/known-exploited-vulnerabilities-catalog Windows IKE Flaw Exploited CVE-2022-34721 https://www.cyfirma.com/outofband/windows-internet-key-exchange-ike-remote-code-execution-vulnerability-analysis/ Anker Eufy Cameras Sending Images to Cloud even if asked not to https://www.macrumors.com/2022/11/29/eufy-camera-cloud-uploads-no-user-consent/ Packet Tuesday https://packettuesday.com SANS Holiday Hack Challenge Sign Up https://www.sans.org/mlp/holiday-hack-challenge/ keywords: holiday hack challenge; packet tuesday; anker; eufy; privacy; cloud; aws; windows; ike...2022-11-3006 minOut Of BandOut Of BandLet's talk about Open Source Intelligence (OSINT)In this episode of Out of Band, we are joined by the one and only - Arno Reuser, the OSINT authority of the Netherlands and abroad, with nearly 30 years of experience within the Dutch military intelligence services (MIVD). With roots as a scientific librarian for the EU Joint Research Center, Arno founded and managed the Open Source Intelligence branch of the Dutch Defense Intelligence and Security Services starting from 1990’s. Arno has won the Lifetime and Golden Candle Award In recognition for his contribution to the Intelligence Community. Need we say more? Guest Profile: Ar...2022-09-0156 minOut Of BandOut Of BandLet's talk about Insider Risk🟠 Episode 8 of outofband focuses on Insider Risk - Insider Threat. We are joined by Erik Schneider, Director at Signpost Six and a Subject Matter Expert on the topic. Some of the things we talked about were: What insider risk is all about, Insider risk vs insider threat terminology and how organizations can better protect/detect and mitigate insider risk. We also go into causes of Insider risk (intentional vs unintentional), insider threat indicators and how to recognise them. Finally, we spoke about what skills are valuable for those that want to join this field. Guest Profile: E...2022-07-1449 minOut Of BandOut Of BandA day in the life of a Cyber Threat Intelligence Analyst🟠 Curtis Jordan, a Senior Threat Intelligence Analyst, joins us in OutofBand for a discussion on Cyber Threat intelligence. We talk about his extensive career path from robotics, development to Intelligence Analysis and dive into what Intelligence really means to him and how it differs from other specialisations. He shares his day in the life of an analyst, his wins and challenges and how you too can become an analyst! Curious for more? Tune In! Guest Profile: Curtis Jordan LinkedIn: https://www.linkedin.com/in/cjordanjr/ 🎧 Listen via Podcast YouT...2022-06-1652 minOut Of BandOut Of BandLet's talk about Operational Technology (OT) Security🟠 Our next OutofBand podcast touches on Operational Technology (OT) Security with our OT SMEs - Dominika Rusek and Alex Stavroulakis. Alex and Dominika demystify the buzzwords IT vs OT vs IoT vs IIoT which we hear a lot about in a simplified manner. We focus on OT systems and discuss the challenges faced in securing them, the skills required and how to gain experience in them without having access to the actual gear. Finally, we touch on their perception around diversity in OT Security and what can be done about it.  Curious for more? Tune In!  -- Guest Profiles --  Domini...2022-05-1950 minOut Of BandOut Of BandA day in the life of a Threat Hunter🟠 Our next OutofBand podcast guest is Thomas Bouve, a Threat Hunt Team Lead and hands down one of the best Threat Hunters we have in the field. We delve into the Threat Hunter role, what the focus of Threat Hunting is, why it is important and some of the misconceptions in the field today. We also discuss the Importance on casting a wider net and not just narrowing down to a specific threat actor, networking vs endpoint hunting, IOC hunting, hunt outcomes but most importantly - a day in the life! Finally, we touch on Burn out and Men...2022-04-2157 minOut Of BandOut Of BandData Security: Cryptography🟠 In today’s episode, Bentoumia Nour, a highly experienced Security Architect, demystifies Data Security and specifically - cryptography. We delve into the concepts behind cryptography: why is cryptography used, why has it’s use increased over time and what are the challenges posed with Quantum computing and etc. Curious for more? Tune In! Guest Profile: Bentoumia Nour LinkedIn: https://www.linkedin.com/in/bentoumia-nour-cissp-cisa-71073647/ Twitter: https://twitter.com/NBentoumia 🎧 Listen via Podcast Spotify: https://open.spotify.com/show/6q7bb...2022-03-1641 minOut Of BandOut Of BandConversations on Cyber Risk Management🟠 In this episode of Out of Band, Dr Magda Chelly shares her perspective on Cyber Risk Management. Magda has held several Chief Information Security Officer roles across Asia and internationally and approaches this topic from a different angle. Curious? Tune In! Guest Profile: Dr Magda Chelly LinkedIn: https://www.linkedin.com/in/m49d4ch3lly/ Twitter: https://twitter.com/m49D4ch3lly Site: www.magda-on-cyber.com Book: Being Brave; Vera's Cyber Adventures https://www.goodreads.com/book/show/59450335-being-brave-vera-s-cyber-adventures?from_search=true&from_srp=true&qid=q3u1VnAtoc&ran...2022-02-1648 minOut Of BandOut Of BandConversations with a BISO🟠 The Business Information Security Officer (BISO) role is a relatively new role in CyberSecurity and thus unknown to many. Fear not! We got you covered. Alyssa Miller, Hacker, BISO and Author of Cyber Security Career Guide, joins us in this episode of Out of Band to demistify her role in cybersecurity. We talk about everything from: how she got there, how we can get there, building your brand, why remaining authentic matters and how we all can #DoBetterBeBetter. Curious? Tune In! Guest Profile: Alyssa Miller LinkedIn: https://www.linkedin.com/in/alyssam-infosec/ Twitter: htt...2022-01-2654 minOut Of BandOut Of BandFinding your way into Cyber Security: CyberWayFinder🟠 Patrick Wheeler, an executive leader and cybersecurity professional has a seat down with the Out of Band Team to discuss how the CyberWayFinder program is helping build bridges within cybersecurity and promoting career transitions for professionals into the same. Do you need help transitioning? Then look no further! Guest Details: Patrick Wheeler LinkedIn: https://www.linkedin.com/in/kpatrickwheeler/ WebSite: https://www.cyberwayfinder.com 🎧 Listen via Podcast Spotify: https://open.spotify.com/show/6q7bbcQUXEn1kjbRwcsAA6?si=CxmhRZKUSxm__bJrjWi6FQ&utm_source=copy-link&dl_branch=1 Google Podcast: https://podcasts.google.com/feed/a...2022-01-1240 minOut Of BandOut Of BandVoices of InfoSec with Gwen Bettwy🟣 Gwen Bettwy, CEO at Tactical Security Inc joins the Out of Band Trio (Anne Leslie, Faith Opiyo & Jennifer Wennekers) to talk about Infosec skills/scars/stripes.  Guest: Gwen Bettwy  Twitter: @GwenBettwy  LinkedIn: https://www.linkedin.com/in/gwenbettwy/  WebSite: http://gwenbettwy.com/ Company: http://tacticalsecurityinc.com/ Blog: http://tacticalsecurityinc.com/Blog ––––––––––––––––––––––––––––––  Track: Drive — Markvard [Audio Library Release]  Music provided by Audio Library Plus  Watch: https://youtu.be/3dQDaKnyiX0 Free Download / Stream: https://alplus.io/drive ––––––––––––––––––––––––––––––2021-12-2249 minOut Of BandOut Of BandA day in the Life of a Forensics Analyst🟣 Cameron Hoelscher, an expert in #DFIR joins us in episode 18 of Out of Band to talk about the Forensic Analyst role. He delves into how Forensics Analysis differs from incidence Response, what makes the role rewarding, it's challenges and a day in the life of an analyst. Cameron also provides insights on how to get into the role and drops a couple of open source tools that can get you started. Needless to say, join us to learn more.  Our Guest: Cameron Hoelscher (@infosecmagic)  https://www.linkedin.com/in/cameronhoelscher/  ––––––––––––––––––––––––––––––  Track: Drive — Markvard [Audio Library Release]  Music provided by...2021-12-0852 minSANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)ISC StormCast for Tuesday, December 7th, 2021The Importance of Out of Band Networks https://isc.sans.edu/forums/diary/The+Importance+of+OutofBand+Networks/28102/ Kaseya Unitrends Backup Appliance Updates https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 Is KAX17 Performing De-Anonymization Attacks Against Tor Users? https://nusenu.medium.com/is-kax17-performing-de-anonymization-attacks-against-tor-users-42e566defce8 Google Chrome Update No 0-Days https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html2021-12-0705 minSANS Internet Storm Center\'s Daily Network Security News PodcastSANS Internet Storm Center's Daily Network Security News PodcastNetwork Security News Summary for Tuesday December 7th, 2021OOB Networks for Incident Handling; Unitrends Backup Updates; Deanonymizing Tor; The Importance of Out of Band Networks https://isc.sans.edu/forums/diary/The+Importance+of+OutofBand+Networks/28102/ Kaseya Unitrends Backup Appliance Updates https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961 Is KAX17 Performing De-Anonymization Attacks Against Tor Users? https://nusenu.medium.com/is-kax17-performing-de-anonymization-attacks-against-tor-users-42e566defce8 Google Chrome Update No 0-Days https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html keywords: google chrome; kax17; nusenu; twitter; out of band; ransomware2021-12-0705 minOut Of BandOut Of BandGetting Started in Infosec: the recruiter view🟣 In episode 17 of Out of Band, we are joined by Natasha Harley, co-founder of cyberexperts and VP of Women in CyberSecurity (WiCyS) UK to discuss her work and experience breaking down entry level barriers for those getting into cybersecurity. Guest: Natasha Harley (@natashaharley9) https://www.linkedin.com/in/natashaharley/ –––––––––––––––––––––––––––––– Track: Drive — Markvard [Audio Library Release] Music provided by Audio Library Plus Watch: https://youtu.be/3dQDaKnyiX0 Free Download / Stream: https://alplus.io/drive ––––––––––––––––––––––––––––––2021-11-2451 minOut Of BandOut Of BandA day in the life of a Security Architect🟣 The Out of Band Team is joined by two highly experienced security professionals - Dani Zamfiroiu and Richard de Vries - to discuss the Security Architect's role. We get to know how they got to their roles, the skills deemed necessary, the challenges they go through and etc. Guest: Richard de Vries (@RADEVRIES2) https://www.linkedin.com/in/richard-de-vries-bsc-0327b35/ https://tales-from-a-security-professional.com Guest: Dani Zamfiroiu (@_ChezDaniela) https://www.linkedin.com/in/dani-z-7135731/ –––––––––––––––––––––––––––––– Track: Drive — Markvard [Audio Library Release] Music provided by Audio Library Plus Watch: https://youtu.be/3dQDaKnyiX0 Free Download / Stream: https...2021-11-1040 minOut Of BandOut Of BandSo you want to be a CISO? : The Recruiter View🟣 David Gadd, an exec-level/CISO recruiter, joins the Out of Band Trio (Anne Leslie, Jennifer Wennekers and Faith Opiyo) to share his recruiter view on becoming a CISO.  We touch on the varying CISO backgrounds and skills needed, what makes a good CISO and how you and I can support our CISO's. We discuss the CISO career path and what we could be doing to get to that role.  Guest: David Gadd https://www.linkedin.com/in/davidgadd/ –––––––––––––––––––––––––––––– Track: Drive — Markvard [Audio Library Release] Music provided by Audio Library Plus Watch: https://youtu.be...2021-10-2748 minOut Of BandOut Of BandCyber recruitment: The good, the bad, and the ugly and how to land the job you really want🟣 In this episode, Jörg Stephan joins the Out of Band Trio (Anne Leslie, Jennifer Wennekers and Faith Opiyo) to share his experience and wisdom on "how to land the job you really want". Guest: Jörg Stephan https://www.linkedin.com/in/johestephan/ –––––––––––––––––––––––––––––– Track: Drive — Markvard [Audio Library Release] Music provided by Audio Library Plus Watch: https://youtu.be/3dQDaKnyiX0​​ Free Download / Stream: https://alplus.io/drive ​​––––––––––––––––––––––––––––––2021-10-1353 minOut Of BandOut Of BandMental Health in Cyber Security🟣 Andrew Foster joins the Out of Band Trio (Anne Leslie, Jennifer Wennekers and Faith Opiyo) to discuss Mental Health in CyberSecurity. We share our perception / understanding of Mental health, experiences with mental health and suggestions on possible ways forward. Guest: Andrew Foster https://www.linkedin.com/in/andrew-foster-security-analyst/ –––––––––––––––––––––––––––––– Track: Drive — Markvard [Audio Library Release] Music provided by Audio Library Plus Watch: https://youtu.be/3dQDaKnyiX0​​ Free Download / Stream: https://alplus.io/drive ​​––––––––––––––––––––––––––––––2021-09-2944 minOut Of BandOut Of BandA day in the life of a Red Teamer🟣 We brought 4 great minds from the world of Offensive Security to discuss what a day in the life of a Red Teamer looks like. tl;dr: It varies but there is a common theme. Tune in to find out. Join Daniëlle Wagemakers, Mathew Ettelaie, Moreno Sint Hill and our return guest Kenneth Linzey in this episode of #OutOfBand.  Guest: Mathew Ettelaie https://www.linkedin.com/in/mettelaie/  Guest: Daniëlle Wagemakers https://www.linkedin.com/in/daniellewagemakers/ Twitter: @0xD4ni  Guest: Moreno Sint Hill https://www.linkedin.com/in/morenosinthill/  Guest: Ke...2021-09-151h 07Out Of BandOut Of BandWomen In Cyber Security Communities🟣 The founder and organizers of Women In Cybersecurity Community Association (WICCA), Valentine Mairet and Chantal Stekelenburg join the Out of Band Trio (Anne Leslie, Faith Opiyo & Jennifer Wennekers) to discuss Women led cybersecurity communities. We discuss why the organization was formed, the challenges involved and maintaining interaction within the community.  Key Takeaway: Get rid of the stereotypes and If you want something - ask for it!  Guest: Valentine Mairet Twitter: @vm00z LinkedIn: https://www.linkedin.com/in/vm00z/ Guest: Chantal Stekelenburg Twitter: @MiFar...2021-09-0143 minOut Of BandOut Of BandThe Class Ceiling🟣 Fortune Barnard, security leader and a long standing cybersecurity professional joins the Out of Band Trio (Anne Leslie, Faith Opiyo & Jennifer Wennekers) to talk about the Class Ceiling. He shares anecdotes about things he has seen, experiences he has lived through and advise on what can be done to overcome the challenges.  Shout out to the leaders that drive change and to organizations like #ShareTheMicInCyber and #ICMCP that are focused in bringing more diversity and representation in CyberSecurity field.  Guest: Fortune Barnard  Twitter: @fconsult1  LinkedIn: https://www.linkedin.com/in/fortunebarnard/  ––...2021-08-1843 minOut Of BandOut Of BandA day in the life of an Incident Responder🟣 Eben Louw joins the Out of Band Trio (Anne Leslie, Faith Opiyo & Jennifer Wennekers) to share stories from his experience as an Incident Responder and tips and tricks for those who are interested in getting into this speciality. This was definitely a fun filled session which we hope our viewers will enjoy.   Our Guest: Eben Louw   Twitter: @EbenWL   LinkedIn: https://www.linkedin.com/in/elouw/  ––––––––––––––––––––––––––––––  Track: Drive — Markvard [Audio Library Release]  Music provided by Audio Library Plus  Watch: https://youtu.be/3dQDaKnyiX0​​  Free Download / Stream: https://alplus.io2021-08-041h 02Out Of BandOut Of BandLet's talk money: Gender gaps, negotiating & empowerment🟣 In part 8 of Out of Band, Anne Leslie, Jennifer Wennekers and Faith  Opiyo discuss the taboo topic: Money. Should it be a taboo? What  influence does gender have on it and why we deem it an important topic.    ––––––––––––––––––––––––––––––  Track: Drive — Markvard [Audio Library Release]  Music provided by Audio Library Plus  Watch: https://youtu.be/3dQDaKnyiX0​​ Free Download / Stream: https://alplus.io/drive ​​ ––––––––––––––––––––––––––––––2021-07-2135 minOut Of BandOut Of BandA day in the life of .. a Blue Teamer (SOC)🟣 The Out of Band Trio are back with part 7. In this episode, Faith  Opiyo, Jennifer Wennekers & Anne Leslie are joined by guests Allan  van Leeuwen who shares his experience as a Blue Teamer working in a  Security Operations Center (SOC). Guests: Allan van Leeuwen - https://www.linkedin.com/in/allan-van-leeuwen-90441653/ –––––––––––––––––––––––––––––– Track: Drive — Markvard [Audio Library Release] Music provided by Audio Library Plus Watch: https://youtu.be/3dQDaKnyiX0 Free Download / Stream: https://alplus.io/drive ––––––––––––––––––––––––––––––2021-07-0746 minOut Of BandOut Of BandGetting Into Security🟣 The Out of Band Trio are back with part 6. In this episode, Jennifer Wennekers, Faith Opiyo & Anne Leslie are joined by guests Alex Stavroulakis and Kenneth Linzey who share their tips and tricks of Getting into Cyber Security. A huge shoutout to Black Hills Information Security  for providing free and affordable training for those starting out in Cyber Security. Guests: Alex Stavroulakis - https://www.linkedin.com/in/alexstavroulakis/ Kenneth Linzey - https://www.linkedin.com/in/💻kenneth-linzey-72443151/ –––––––––––––––––––––––––––––– Track: Drive — Markvard [Audio Library Release] Music provided by Audio Library Plus Watch: https://youtu.be/3dQDaKnyiX0 Free Download / Stre2021-06-2345 minOut Of BandOut Of BandFlexible Working: Rethinking 9-5🟣 We released part 5 of our Out of Band podcast! In this episode, Jennifer Wennekers, Anne Leslie and Faith Opiyo discuss #flexibleworking 💻 and what it means to us. We delve into its advantages, unintended consequences and touch on the #genderaspect. We also discuss the impact of COVID on flexible working and what our hopes are for the future - as well as some tips 'n tricks that made our life easier. 🎧 As always, tune in, like & subscribe. 📅 Our next episode will be released on June 23, where we'll discuss how to get into #infosec with guests 💻Kenneth Linzey and Alex Stavro...2021-06-1235 minOut Of BandOut Of BandTokenism: Help or Hinder?🟣 Out of Band is back after a short break for part 4! This time Anne Leslie, Faith Opiyo and Jennifer Wennekers discuss #tokenism: The practice of making only a perfunctory or symbolic effort to be inclusive to members of minority groups. We'll discuss our experiences with tokenism, and whether it has helped or hindered us in the past. Feel free to participate in the discussion below in the comments 👇, and if you want to join us in a next session of Out of Band – let us know! 🎧 As always, tune in, like & subscribe - and we thank you f...2021-06-1235 minOut Of BandOut Of BandGoing Global🟣 Out of Band is back for part three! This time Anne Leslie, Faith Opiyo, Jennifer Wennekers and our (very first) guest Jurgen Visser discuss the cultural aspects 🗺️ that come with working in an international setting or moving abroad 🛫 What are the things we did and did not expect, how did we deal with difficult situations, and what are some of the biggest recommendations we can give? A very warm thanks 🙏🏻 to Jurgen for agreeing to join us in our conversations and sharing his valuable insights! #womenincybersecurity #beingauthentic #realconversations #outofband#choosetochallenge #bebold #infoseccommunity #theculturemap#crossculture #goingglobal –––––––––––––––...2021-06-1255 minOut Of BandOut Of BandKeeping Up Appearances?🟣 Out of Band is back for part two! This time Anne Leslie , Faith Opiyo and Jennifer Wennikers are discussing the keeping up of appearances ✨: What type of mannerisms, habits and attitudes we felt we needed to learn (and sometimes unlearn) in order to carve out a path for ourselves - while eventually discovering that it might lead to not being true to our authentic selves.  #womenincybersecurity #beingauthentic #realconversations #outofband#choosetochallenge #bebold ––––––––––––––––––––––––––––––  Track: Drive — Markvard [Audio Library Release]  Music provided by Audio Library Plus  Watch: https://youtu.be/3dQDaKnyiX0 Free Download / Stream: https://alplus.io/drive ––––––––––2021-06-1242 minOut Of BandOut Of BandHello World!🟣 Hello world!  A few weeks ago three amazing women (Anne Leslie, Jennifer Wennekers and Faith Opiyo) had a bold idea: What if we share the conversations we have amongst ourselves, with the world? And thus, #outofband was born.  🟣 Bold. Brave. Resilient 👉🏻Raw conversations from real  #womenincybersecurity. #choosetochallenge #bebold #women #womeninsecurity #cybersecurity ––––––––––––––––––––––––––––––  Track: Drive — Markvard [Audio Library Release]  Music provided by Audio Library Plus  Watch: https://youtu.be/3dQDaKnyiX0 Free Download / Stream: https://alplus.io/drive ––––––––––––––––––––––––––––––2021-06-1219 minThe Media Network Vintage Vault 2024-2025The Media Network Vintage Vault 2024-2025MN.10.02.1983 Canadian ForcesA newsy edition of the show. Good Morning Britain launches with David Frost. TVAM has some challenges with the unions. Quality Media said they were planning to expand their Caribbean Beacon station to include shortwave. They were planning 2 100 kw transmitters. Guyana is being heard in the European mornings on 5950 kHz. Radio Mediterranean in Malta is also been heard. We broadcast another short feature on spy number stations, this time a feature from a Swedish newspaper. This edition also included Part 2 of Forces Radio, where we featured the Canadians in Europe. I found some interesting post-war recordings and that prompted a...2020-05-0330 min17356_2014SP: CS 5412 Cloud Computing Birman,K17356_2014SP: CS 5412 Cloud Computing Birman,KOutOfBand2014-01-3130 min