Listen to the latest updates, developments, and insights into the world of cybersecurity. Learn how to protect yourself against the ever evolving threat of cybercrime from leading talk radio shows and premium podcasts.
Ukrainian Police Arrest Multiple Clop Ransomware Gang Suspects
"And south korean police raids color klopp ransomware gang suspects. Six alleged members of the notorious klopp ransomware gang were arrested in raids carried out by ukrainian and south korean law enforcement who seized cash cars in several computers. The gang is known for targeting high profile companies including the widely publicized hack into defense contractor bombarded where klopp was able to obtain blueprints for military jet radar equipment claps resume also includes reportedly swiping details related to two million credit cards from south korean retailer. Eland and an attempt earlier this year extort infosec firm qualis trend micro recently noted that of the most notorious ransomware gangs klopp led the way with five terabytes of stolen data published online over one billion records belonging to cvs health exposed online on thursday website planet in conjunction with researcher jeremiah. Fowler revealed that an online database belonging to cvs health had no form of authentication in place to prevent unauthorized entry. The database exposed more than one billion records including. Cvs website visitor id's session id's search details in email addresses and yet another example of miskin figured cloud services impacting security. The researchers noted that these details could prove useful to hackers wanting to craft targeted phishing attacks as well as competitors who may be interested in. Cvs system search query data website planet privately disclosed the issue to cvs health who confirmed the database belonged to them and was managed by an unnamed vendor on their behalf. Public access was restricted shortly. Following the disclosure
Carnival Passengers Warned Hackers May Have Stolen Personal Information
"Even though cruise voyages were curtailed because of the pandemic carnival corporation says the data breach may have exposed customer information carnival says it was hacked in March and cyber intruders may have gotten social security numbers passport information dates of birth home addresses and health information for its passengers and crew on carnival Holland America and princess cruise ships carnival spokesman says those affected have been notified carnival which is based in Miami also divulged it was hit twice last year with ransomware attacks but did not say if payments were made hi Jackie Quinn
The Emerging Role of Bitcoin in Spreading Malware
"So professor what we are talking about here. Today is the work that was undertaken by yourself and your colleagues on the emerging row of bitcoin empowering advanced malware and what we're really looking at here is the use of bitcoin blockchain to cigna the location of the master bought and for some of our listeners. Who are not too familiar with this. Concept are some call it the command and control infrastructure or the c to order. Cnc which you be able share with us the inner workings of this See to cnc infrastructure in spreading propagating executing malware to launch ransomware. Didata tights certainty. So when you are a criminal and you want to infect machines for your personal gains for example to use them to send spam messages or to mine cryptocurrency or to do advertisements. These kind of things you are going to cast a wide net and you're going to infect machines on the checked for example by by fishing or by drive by most these things but then the problem is now you've infected a number of machines let's say hundreds or thousands of computers which are now running your mail. We're how'd you get commands to them. How do you instruct them what to do. So what you need is a commodity control server some machine some central point way. All of these infected computers are contacting asking for things to do for example which emails should send out or whether uploading some too because some of the malware might be stealing your credentials. Your passwords credit card information somewhere this inflammation needs to be dumped so that the cyber criminal can actually make use of it so this is what we call a commodity controlled server. And that's kind of essential point the over your point where the buck nassir has an oval. That's currently going on. Like how many butts are there with. They can send commands and we even know about the si infrastructures where the buck nasa can take chunk out of the button it and rented out to other people
Biden Warns Putin Against Cyberattacks on U.S. Infrastructure
"President biden and russian president vladimir putin met yesterday to discuss a range of issues dividing their two countries one particularly fraught topic they covered cyberattacks. The us has seen a surge alleged cyber attacks from hackers based in russia in recent months a press conference after their meeting biden said he gave putin a list of critical infrastructure. That should be off limits to cyber attacks and he said the us would defend itself pointed out. We have significant cyber capability. He knows he doesn't know exactly what is significant in fact they violate basic norms. We will respond a separate news conference. Putin denied that moscow was involved in any cyber sabotage and he said that he and biden agreed to begin. Consultations on
Three Degrees of Separation From Neil Fallon With Rockie Brockway
"We are here with the most patient guests on the planet earth because we had some technical difficulties morning. Rockie brockway is currently the practice lead for the office of the cfo. Wow that sounds like really formal. And i'm gonna say trusted sec. Which just makes me think of dave and formal in dave. Don't go together but this learn more about that. Twenty eight years of experience and information security business risk rocky you specialize in business risk analysis in the inherent relationships between data assets adversaries and the organization's brand value you provide strategic and tactical advisory services for trusted set clients assisting them in maturing their organization security programs so first of all thank you so much for being here and being patient thank you. It's a pleasure to be on podcast. I'm excited actually to learn a little more about first of all this title even means the practice lead for the office of the cfo for trusted sec. Because that's not something i've heard before. So what is what. Does that even mean church. So so at trust the sec. My role and my team You know really is working close with organizations in kind of that virtual chief information security officer just from an activity perspective Helping organizations further mature their security programs really taking a look at how organizations can better align the the protection of important stuff Really with the business right. So there's so much that from a from an organic security program growth perspective that doesn't know inherently are naturally aligned with you know what the business is actually trying to accomplish. Security tends to be kind of a bubble over here for many organizations and so we we try to break down those barriers help. Organizations help really help organizations at our align all those activities around protecting the important things with the with business need in an requirements.
NATO Leaders Declare China a Global Security Challenge
"Meetings in brussels president biden and nato allies warned about growing international influence. China is mentioned nearly a dozen times a lengthy communicate that was released monday. It's a shift from past nato summits when beijing was barely mentioned in a press conference. Nato secretary general jens stoltenberg spoke about the need to engage china on a wide range of issues. We see that china's common close to those in cyberspace. We'll see them in africa in arctic. See them trying to control our infrastructure. We had the discussion about five g. And therefore what we do. Nato tend to thirty is highly relevant also for how to dress china with more resilient with more technology and all the things we want to do together.
Volkswagen and Audi Hit by Hackers
"Popular carmakers have become the latest target for hackers volkswagen and volkswagen and audi were hit by data. Breach information was stolen for more than three million customers and prospective buyers mostly here in the us it includes phone numbers and email addresses collected from twenty fourteen to twenty nineteen vw says. The hackers may have also gotten birthdays social security numbers driver's license numbers from customers. Who apply for loans. Now the company says it is reaching out to people affected and it's offering free credit protection as for how this happened. The cyber thieves apparently hacked a third party vendor the many volkswagen and audi dealerships partner with for marketing purposes. But it's not clear yet who was behind the hack or what they plan to do with the information. vw did report the incident to law
Now the Hackers Have Come for Our Hamburgers
"Well what do you want from me. More high profile hacks to tell you about though these seem to be just run of the mill data breaches not ransomware attacks as if that makes it better. Mcdonald's says hackers breached its operations in some markets exposing some us business info and delivery customer data in south korea and taiwan quoting cnbc. The burger chain said friday that it recently hired external consultants to investigate unauthorized activity on an internal security system prompted by a specific incident in which the unauthorized access cut off a week after it was identified. Mcdonald's said the investigators discovered that company data had been breached in markets including the us south korea and taiwan. The company said in a message to us employees. Mcdonald's said the breach disclosed some business contact information for us employees and franchisees along with some information about restaurants such as seating capacity and the square footage of play areas. The company said no customer data was breached in the us and that the employee data exposed wasn't sensitive or personal. The company advise employees and franchisees to watch for fishing and to use discretion when asked for information. Mcdonald's said attackers stole customer emails. Phone numbers and addresses for delivery customers in south korea and taiwan. In taiwan hackers also stole employee information including names and contact. Information mcdonald said the company said. The number of files exposed was small without disclosing the number of people affected. the breach. didn't include customer payment information mcdonald said and quote.
Should State-Issued IDs Be Stored on Our iPhones?
"Privacy advocates are warning about a apple feature that allows an iphone to copy and store state driver's licenses as npr's bobby allen reports apple says it's about convenience but experts worry about misuse apple. Wants to disrupt the wallet. It's working with states and the transportation security administration to allow digital id's on iphones to be accepted as official proof of identity. Privacy experts worry about this being used for unwanted tracking and the possibility of apple one day selling licensed to advertisers arum sinnreich at american university says he's also concerned about the ideas being exposed in a hack. They are all good reasons. Why we should give pause before seating. Some of the functions of our state government to private corporation apple says the id's will be encrypted and secure but critics say the tech giant's real end goal is to make iphones
Hackers Breach Electronic Arts, Stealing Game Source Code and Tools
"Motherboard sources shared forum posts made by hackers claiming to have stolen source code for electronic arts fee twenty feet twenty one code for e as matchmaking server also source code and tools for the frostbite engine and various frameworks and sdk's totally in seven hundred eighty gigabytes of data ea since confirmed to motherboard. It suffered data breach the hackers clams are correct but that no player data was accessed. And he doesn't think there's any risk to player privacy.
DarkSide Explained: The Ransomware Group Responsible for Colonial Pipeline Attack
"Michael schwartz welcome to fresh air the inner workings of ransomware that you found out where fascinating. Let's start with what you learned. The victim sees on the screen when dark side captures the computer system. When the ransomware is uploaded into a victim's computer system the first thing they see is a ransom note. It says at the top welcome to dark side and it contains a list of instructions on how the victim can go about unlocking their data. They have no access to their data and what they need to do. Is they'll rely on dark side by paying a ransom to provide them with a key that will allow them to get these files back and the letter is written in a kind of very formal business. Like manner with very subtle threats. Warned victims are warned. Not to try and tamper with their computers themselves. Try not to access the data themselves because this may result in the loss of the data completely. And so. they're they're instructed to get in touch immediately with the dark side representative to begin negotiations over the ransom and not only locks victims out of computer systems that hackers can steal proprietary data right and this is basically to put added pressure on the business. Not only does the victim risk losing access to important computer files that may be necessary for the day to day running of the business but the hackers will threaten to spill this information into the public domain to be used by competitors to be used by other hackers to carry out additional attacks on the company. And so they're really really hard pressed to act very very quickly to clear this up. The victims
NYC's 1,000-Lawyer Law Department Targeted by Cyberattack
"Cyberattack disrupts new york city law department the new york police department and fbi cyber task force are investigating intrusion into the new york city lot apartments it systems which could potentially have exposed sensitive information belonging to more than a thousand department employees on monday. The city government confirmed the incident and restricted admission into affected systems preventing government lawyers from accessing documents. Though the excess restrictions have disrupted court filings a law department spokesperson indicated that the agency was taking steps to minimize the impact cases. The incident comes just days after the metropolitan transportation authority confirmed intrusion by hackers into its databases amazon successfully presses to omit consumer protections from senate china bill on tuesday. The senate passed legislation aimed at countering china's growing economic power however after aggressive lobbying led by amazon. It excluded a measure designed to protect online shoppers from counterfeit and dangerous products. The measure known as the informed consumers act would have required online marketplaces to bolster identification procedures for third party. Merchants who sell on their sites in order to better weed out it stolen in unsafe products from rogue sellers. The bill would have been forced by the federal trade commission and violations would have been subject to civil penalties intel fixes. High severity vulnerabilities with june. Twenty twenty one platform update until his issued fixes addressing. Seventy security vulnerabilities as part of the june twenty. Twenty one patch. Tuesday according to intel's director of communications jerry. Bryant half of the vulnerabilities were discovered through. Intel's internal research security. Updates of note include five high. Severity vulnerabilities impacting. The intel virtualization technology directed o products. The bios firmware for some intel processors and the intel security library until detailed the security flaws insecurity advisories published on wednesday on its product security center
Meat Company JBS Confirms It Paid $11M Ransom in Cyberattack
"How the world's largest meat processor was able to quickly get back online after a cyberattack Bs USA now confirming it did pay a ransom $11 million to the hackers who broke into its computer system JBs, saying when it paid, the company was still mainly operational, and it wanted to mitigate more problems. JBs is just the latest company to pay a ransom something the FBI advises against doing. NBC's Alex Stone,
Biden Revokes and Replaces Trump Order That Banned TikTok
"Cyber scoop reports that sentinel one believes it knows roughly speaking who hacked into russian government networks last year it was the security firm says chinese espionage services and not one of the five is the espionage group they call the thunder cats gets the credit sentinel labs reports and it bases its conclusions on what it regards as decisive code similarities to campaigns the abt has earlier used against targets in southeast asia. Sentinel one researcher. One andres guerrero sawday told cyber scoop quote. The idea of chinese targeting of russian government and vice versa should not shock us sino. Russian relations are complex and involve hot button issues like a shared border diplomatic and economic interests and quote. What is relatively unusual is russia's decision to publicly call out a hostile espionage operation diplomatic signaling by press release is more common in the west you as president biden this morning issued an executive order that effectively rescinds his predecessors bands of we chat and tiktok while acknowledging an ongoing emergency. The new executive order directs engagement security reviews and data protection instead of outright bans.
Breach Exposes 8.4 Billion Passwords
"Eight billion plus passwords have been posted on a hacker forum. Eight billion The largest password collection of all time leaked on this forum. After a post after user posted 100 gigabyte text file containing these eight billion passwords that were likely
Pipeline's CEO Defends Ransomware Response During Senate Hearing
"The ceo of colonial pipeline. Joseph blount testified before the senate homeland security committee yesterday a month after his company was hit by a massive ransomware attack that led to the shutdown of the biggest fuel pipeline on the east coast blount faced sharp questions from lawmakers about colonials cyber security practices and the company's communication with authorities during the hack. He also defended his decision to pay four point. Four million dollar ransom to the hackers in exchange for decryption keys. I made the decision to pay. And i made the decision to keep the information about. The payment is confidential as possible. It was the hardest decision. I made in my thirty nine years in the energy industry and i know how critical our pipeline to the country and i put the interests of the country first senior. Us officials have acknowledged that companies often have little choice but to pay these kinds of ransoms but in recent weeks some lawmakers have signaled that they may be open to making payments illegal in some cases or requiring companies to disclose when they pay
Privacy Skills, Jobs and Recruitments With Jared Coseglia
"Janet welcome to the show. Thank you so much for having me. It's an honor to be here. I appreciate it. Thank you so you started to help people in privacy placements as early as two thousand ten. So how did you get into this privacy field. Yeah i came to it. Through e discovery actually in the early stages of my career prior to starting true staffing partners worked almost exclusively in e discovery and you discovery is downstream way right in the information governance life cycle as it relates to data in its journey through this world to eventual litigation investigation and so it became clear to me that around two thousand eleven. Two thousand twelve privacy was now becoming a concern that everybody had to deal with and they were dealing with it as far downstream as e discovery. So like the discovery practitioner. I was looking to move further left in the process. Right the further you move left with your clients the further you move towards the origination of data and the original holders of data the more opportunity you have to influence what happens to that data in all the talent that supports the management massaging. That data downstream. So it was just an organic really matriculation. I left from discovery to governance to privacy insecurity and that sticky intersection between what will call legal and technology has been what i'm most interested and passionate about in really at a broad level of had to use one word to describe the kind of opportunities in people i represent. It would be
ANOM: Hundreds Caught in Massive Global Crime Sting Using Messaging App
"Gang members around the world. Acting U. S attorney Randy Grossman says a nom snag more than 27 million messages from about 12,000 devices and 45 languages, a vast body of evidence of fueled a global sting operation. Every single person who used an, um Used it for a criminal purpose. Criminals using these devices believe they were secretly planning crimes far beneath the radar of law enforcement. But in reality, the criminals were not underneath the radar. They were on it more than 800. People were arrested more than 32 tons of drugs seized. Police in 14 countries also sees 250 guns, 55 luxury cars and more than $148 million in cash and Cryptocurrency. A pair of Senate committees looking into the January attack on the capital
Global Sting Began by Creating Message Service for Crooks
"Also it was a sting on a global level. The FBI helped create a fake app that tricked hundreds of crooks. ABC is Alex Stone explains how they did it. Well, Kitty. I mean, what the FBI did here was really ingenious. And they decided, you know what if criminals globally are communicating on encrypted, secure messaging apps? Why not just create our own? And that's what the FBI did. They built their own app on devices that criminals would use. They deployed it globally. It got popular around the world and Australia was one of the countries that really a lot of people began using it Croatia and elsewhere and nobody using it knew that the FBI was able to see every message the criminals were sending to one another the entire time that It was the FBI's own app that they were using. Here's a big announcement today in San Diego. The amount of intelligence that we received was staggering from seizing drugs, guns and millions of dollars in multiple currencies. To addressing more than 150 threats to life more than 300. People were arrested in advance of the worldwide take down and then 500 more in the past two days, so 800 people that Suzanne Turner with the FBI and San Diego agents say in San Diego, they were the ones who orchestrated this whole plan, and they took down other encrypted platforms they indicted and then Arrested or got them indicted and arrested. Other platform folks that had criminals using their platforms so the criminals will be a vacuum and criminals would have to go to the FBI's platform, not knowing it was the FBI's platform. It was called an, um and the whole time criminal groups had no idea. The FBI was watching every message. 27 million messages were sent in 45 different languages. FBI received a copy of each and every message originating outside the United States that crossed our platform. Similar to a blind copy of an email
Carrots Lead to the Right Outcomes
"So give me a little bit of background about you kind of outside of that world maybe on how you kind of got into the business and in the role you're in now and board involvement etcetera. We'll so you know i'm I'm a partnered up from ventures in a invest heavily in enterprise offer and And in southern california everywhere and with a focus on cloud and really cyber native cloud native cyber. And so i you know. My background is pretty evenly split between investing so i spent about a decade on the investing side but kind of book end of my career coming out of college. I worked first at morgan stanley in there then private equity group and then at battery ventures for five years and And then i went into operating roles for about a decade working big public companies as well as starting my own startup. a which upfront actually funded. So i have done the both sides of the table. And when i sold it i join them As a partner. But i think my early days kind of back up battery morgan stanley. It's funny because it was in a lot of ways. It's a lot of the same stuff that i invest in now. It's just like you know. Concepts like cloud didn't exist and it was. We're talking about moving data for mainframes into servers. But it was you know moving data in storage and security and you know communications infrastructure in the light. We talked a lot about all the different. Osi layers and stuff. That will make me sound. You know fancy from back in the day but the reality there is nothing else to fund back then so but yeah i mean. I've been you sitting on board. Since i was probably far too young to do it. So i kind of learned in the trenches at battery during like late nineties and early two thousand. And then i got to you know. Go get a real job and actually try to build things much much harder
Chinas Unrestricted Warfare
"When brian shields i notified nortel networks leadership about a major cyber incident. It's not that. He was outright turned aside. They didn't laugh him out of the room like cartoon villains rather according to him and others involved. The people in charge just didn't give it much. Thought they were distracted with other matters. They believed were more. For example there were right in the middle of firing their ceo frank dunn for some shady accounting practices. They did so just full days after. Brian and his team discovered the breach so soon that done himself didn't even hear that he was hacked. But even those who weren't fired didn't hear much about it. Nortel board members later told bloomberg that they couldn't recall the news ever having come up in any of their weekly meetings. They were simply too busy with on boarding the new. Ceo the man they brought in was bill. Owens a decorated former admiral the us navy and former vice chairman of the joint chiefs of staff as ceo. He didn't do anything about the breach either because he didn't prioritize it or if one were to make an educated guess because nobody around him was talking to him about it instead. According to bloomberg quote nortel global technological juggernaut would respond to one of the longest. Running chinese heck's of the decade with password update and a series of overtures to wow and quote.
Global Sting: FBI-Encrypted App Tricks Organized Crime
"Blow to organized crime. Hundreds of criminals worldwide duped into using a messaging app that was being secretly run by the FBI. Police say criminal gangs thought the encrypted app called a nom was safe when in fact, authorities for months have been monitoring millions of messages about drug smuggling, money laundering and planned killings. The APP was part of a worldwide sting called Operation Trojans Shield. Your
Feds Recover Some of the Ransom Paid to Colonial Pipeline Hackers
"Recover most of the ransom payment made to hackers by colonial pipeline CBS as Jeff PJs, newly released To an online digital wallet operated by the cyber gang and then obtain the wallets private key, enabling agents to seize the buns. We turned the tables on dark side. Lisa Monaco is the deputy attorney general. The Department of Justice has found and recaptured the majority of the ransom Colonial paid Experts say they are fighting an uphill battle against Cybercriminals, which FBI director Christopher Wray compared on Friday to the 9 11 terror attack.
U.S. Retrieves Millions in Ransom Paid to Colonial Pipeline Hackers
"U. s. officials say they've recovered sixty four bitcoin valued now at roughly two point. Three million dollars of a ransom paid to the hackers who hit colonial pipeline last month. The fbi said they seized the cryptocurrency from a virtual wallet that the russia based cybercrime group dark side had used to collect the payment in a press conference this afternoon. Deputy attorney general lisa. Monaco said the seizure was the first operation of the departments. Recently launched ransomware and digital extortion task force. Today we turned the tables on dark side by going after entire ecosystem that fuels ransomware and digital extortion attacks including criminal proceeds in the form of digital currency. We will continue to use all of our tools and all of our resources to increase the cost and the consequences of ransomware attacks and other cyber enabled attacks. The colonial pipeline attack forced the shutdown of the main conduit for gasoline and diesel fuel for the east coast.
Tools for Your Cloud Journey
"Welcome back destin. A jeff's great to be back. I am really looking forward to this conversation of the three dimensions. this is probably the one. I'm most curious about personally. Because i've i've not really had a chance myself to use a lot of the the tools that you run into cloud so let's jump right in. I imagined most if not all of the tools used in. It shop half to change. Am i right about that. Well yes and no the previous discussions. We had around people and process or really going to inform the tooling right and if we get the people in process part right up front. The tooling should more often than not become pretty obvious organizations in. There's no one right model for any client or any customer any organization ultimately it's about choosing the right sets of tools that align with what you're trying to do with your people process that ultimately get you to what your endgame is everybody's adoption of the cloud is a little bit different Some organizations to the cloud to consume more native services. And they're not they're not necessarily provisioning workloads in a dynamic manner. That's great because that's what their workloads predicated on right. So they're going to leverage the club more than as a service type of offering but organizations that are transforming the way that they develop and deliver applications if they're doing software development if they're adopting and everything is code model than yet more than likely that the tools are going to change. And then the last dimension that i really encourage organizations to consider as are they going to be hybrid cloud or they're going to be multi cloud because the answers to those questions are going to dramatically affect the tooling that they choose in order to support their work.