Hi [[ session.user.profile.firstName ]]

Podcast: It’s A Ransomware Roundup: Mount Locker, Old Gremlin, REvil, and More!

ShadowTalk hosts Adam, Kim, Stefano and Dylan bring you the latest in threat intelligence. This week they cover:

- Mount Locker trying to extort 7+ figures from its victims
- Old Gremlin - the team talks new activity attributed to this group
- REvil looking for new affiliates and flexing with bitcoin
- Healthcare hack has severe repercussions
- Attackers exploit Zerologon vulnerability
- Joker Trojan infects Google Play Store for Android - what we know
- Celebrating Cyber Awareness Month with games and more
Recorded Oct 26 2020 40 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Threat Researchers, Adam, Kim, Stefano and Dylan
Presentation preview: Podcast: It’s A Ransomware Roundup: Mount Locker, Old Gremlin, REvil, and More!

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Deep Dive into the 2020 Cyber Threat Intelligence Estimate Jan 13 2021 5:00 pm UTC 32 mins
    Todd Weber (CTO, Optiv) Jen Miller Osborn (Deputy Director of Threat Intelligence, Palo Alto Networks), Rick Holland (CISO)
    Join us for a panel discussion on the key findings from the 2020 Cyber Threat Intelligence Estimate. Todd Weber (CTO of Optiv) Jen Miller Osborn (Deputy Director of Threat Intelligence at Unit 42, Palo Alto Networks), and Rick Holland (CISO at Digital Shadows) discuss a range of topics outlined in the report.

    Attendees will learn about:

    - Ransomware trends, groups, and tactics
    - The malicious use of PowerShell and what defenders can do about it
    - The continuing popularity of account takeover
    - The real impact of COVID-19. Were the initial fears realized?
    - Looking ahead and planning for 2021
  • Deep Dive into the 2020 Cyber Threat Intelligence Estimate Jan 13 2021 12:30 pm UTC 32 mins
    Todd Weber (CTO, Optiv) Jen Miller Osborn (Deputy Director of Threat Intelligence, Palo Alto Networks), Rick Holland (CISO)
    Join us for a panel discussion on the key findings from the 2020 Cyber Threat Intelligence Estimate. Todd Weber (CTO of Optiv) Jen Miller Osborn (Deputy Director of Threat Intelligence at Unit 42, Palo Alto Networks), and Rick Holland (CISO at Digital Shadows) discuss a range of topics outlined in the report.

    Attendees will learn about:

    - Ransomware trends, groups, and tactics
    - The malicious use of PowerShell and what defenders can do about it
    - The continuing popularity of account takeover
    - The real impact of COVID-19. Were the initial fears realized?
    - Looking ahead and planning for 2021
  • Podcast: FunnyDream, Ragnar Locker on Facebook, and Egregor Ransom Notes Dec 21 2020 5:00 pm UTC 22 mins
    Threat Researchers, Kacey Clark, Charles Ragland and Alec Alvarado
    ShadowTalk hosts Kacey, Alec, and Charles, bring you the latest in threat intelligence. This week they cover:

    - New Chinese APT group, FunnyDream, conducts a sophisticated cyber
    espionage campaign targeting SE Asian government entities.
    - Ransomware operators want to be heard
    - Ragnar Locker turns to Facebook and Egregor begins printing
    ransom notes.
    - Is Egregor the new Maze? Let's unpack this.
    - Plus, the team talks about their favorite Thanksgiving dish, plus a side
    of football
  • Podcast: FunnyDream, Ragnar Locker on Facebook, and Egregor Ransom Notes Dec 21 2020 10:30 am UTC 22 mins
    Threat Researchers, Kacey Clark, Charles Ragland and Alec Alvarado
    ShadowTalk hosts Kacey, Alec, and Charles, bring you the latest in threat intelligence. This week they cover:

    - New Chinese APT group, FunnyDream, conducts a sophisticated cyber
    espionage campaign targeting SE Asian government entities.
    - Ransomware operators want to be heard
    - Ragnar Locker turns to Facebook and Egregor begins printing
    ransom notes.
    - Is Egregor the new Maze? Let's unpack this.
    - Plus, the team talks about their favorite Thanksgiving dish, plus a side
    of football
  • Ransomware Roundup: Ransomware Trends in Q3 2020 Dec 17 2020 6:30 pm UTC 28 mins
    Kacey Clark, Threat Researcher Team Lead
    In this session, Digital Shadows will analyze and expand on reported ransomware attacks and delve into how security teams can strengthen their operations. During this presentation, we will explore:

    - Q2 2020 ransomware group activity
    - The most active ransomware groups during Q3 2020
    - Netwalker and Conti ransomware operations
    - How attackers are taking the path of least resistance
    - Methods for identifying ransomware-related risks

    When it comes to ransomware, it seems that a new method or threat group is always on the horizon. As the pay-or-get breached method continues to gain popularity among ransomware operators, new groups and extortion sites have consistently established a foothold in the ransomware landscape.
  • Ransomware Roundup: Ransomware Trends in Q3 2020 Dec 17 2020 11:00 am UTC 28 mins
    Kacey Clark, Threat Researcher Team Lead
    In this session, Digital Shadows will analyze and expand on reported ransomware attacks and delve into how security teams can strengthen their operations. During this presentation, we will explore:

    - Q2 2020 ransomware group activity
    - The most active ransomware groups during Q3 2020
    - Netwalker and Conti ransomware operations
    - How attackers are taking the path of least resistance
    - Methods for identifying ransomware-related risks

    When it comes to ransomware, it seems that a new method or threat group is always on the horizon. As the pay-or-get breached method continues to gain popularity among ransomware operators, new groups and extortion sites have consistently established a foothold in the ransomware landscape.
  • Bad at Keeping Secrets? Understanding the Risk of Exposed Access Keys Dec 10 2020 6:30 pm UTC 25 mins
    Michael Marriott, Senior Product Marketing Manager and Charles Ragland, Security Engineer
    There’s a dilemma facing organizations with software development functions. Companies that build software products, must ship them to their users, and quickly. However, all too often, security teams lack visibility as to whether technical assets, such as access keys, are exposed to online software development platforms.

    In this webinar, attendees will learn about Digital Shadows' most recent research into exposed access keys, as well as the solutions available for security teams to gain this visibility.

    Attendees will learn about:
    - Digital Shadows research findings that analyzed 800,000 leaked access keys.
    - The different types of exposed keys, including database stores, online services, and SSH keys.
    - How SearchLight detects leaked access keys in real-time.
  • Bad at Keeping Secrets? Understanding the Risk of Exposed Access Keys Dec 10 2020 12:00 pm UTC 25 mins
    Michael Marriott, Senior Product Marketing Manager and Charles Ragland, Security Engineer
    There’s a dilemma facing organizations with software development functions. Companies that build software products, must ship them to their users, and quickly. However, all too often, security teams lack visibility as to whether technical assets, such as access keys, are exposed to online software development platforms.

    In this webinar, attendees will learn about Digital Shadows' most recent research into exposed access keys, as well as the solutions available for security teams to gain this visibility.

    Attendees will learn about:
    - Digital Shadows research findings that analyzed 800,000 leaked access keys.
    - The different types of exposed keys, including database stores, online services, and SSH keys.
    - How SearchLight detects leaked access keys in real-time.
  • [Panel] The Ever-Evolving Threat Landscape Dec 3 2020 6:30 pm UTC 59 mins
    Rick Holland, CISO and VP of Strategy, Digital Shadows, Shawn Tuma Co-Chair, Data Privacy & Cybersecurity Practice and more
    Thieves continue to prey on people during a pandemic. The greed never ends. The narratives and techniques keep changing to fool even some of your savvier end-users. Deep fakes, fake news, AI, scams of all sorts—and election season is right around the corner! You have DDoS attacks you can purchase on the Dark Web... nuclear ransomware… what's next?

    Our experts will discuss what they are seeing in the wild. Tune in and see what you can do to strengthen your organizational security.
  • [Panel] The Ever-Evolving Threat Landscape Dec 3 2020 10:00 am UTC 59 mins
    Rick Holland, CISO and VP of Strategy, Digital Shadows, Shawn Tuma Co-Chair, Data Privacy & Cybersecurity Practice and more
    Thieves continue to prey on people during a pandemic. The greed never ends. The narratives and techniques keep changing to fool even some of your savvier end-users. Deep fakes, fake news, AI, scams of all sorts—and election season is right around the corner! You have DDoS attacks you can purchase on the Dark Web... nuclear ransomware… what's next?

    Our experts will discuss what they are seeing in the wild. Tune in and see what you can do to strengthen your organizational security.
  • Podcast: RegretLocker, OceanLotus, Millions Seized in Cryptocurrency, and more! Nov 30 2020 7:00 pm UTC 50 mins
    Digital Shadows Threat Researchers, Stefano De Blasi, Dylan Gray, Adam Cook, and Kim Bromley
    ShadowTalk hosts Stefano, Kim, Dylan, and Adam bring you the latest in threat intelligence. This week they cover:

    - RegretLocker’s approach to quickly encrypting files - how their
    efficiency compares to counterpart Ryuk
    - Vx Underground’s code used in ransomware attacks
    - APT32, or OceanLotus, using social media and news sites to draw in
    users and redirect them to phishing pages
    - U.S. DoJ seizes $24 Million in cryptocurrency, assisting the Brazilian
    government
  • Podcast: RegretLocker, OceanLotus, Millions Seized in Cryptocurrency, and more! Nov 30 2020 10:30 am UTC 50 mins
    Digital Shadows Threat Researchers, Stefano De Blasi, Dylan Gray, Adam Cook, and Kim Bromley
    ShadowTalk hosts Stefano, Kim, Dylan, and Adam bring you the latest in threat intelligence. This week they cover:

    - RegretLocker’s approach to quickly encrypting files - how their
    efficiency compares to counterpart Ryuk
    - Vx Underground’s code used in ransomware attacks
    - APT32, or OceanLotus, using social media and news sites to draw in
    users and redirect them to phishing pages
    - U.S. DoJ seizes $24 Million in cryptocurrency, assisting the Brazilian
    government
  • Podcast: Election Update, Kimsuky Activity, Maze Group Announces Closing Recorded: Nov 18 2020 20 mins
    Digital Shadows CISO, Rick Holland and Threat Researchers, Kacey Clark, Charles Ragland and Alec Alvarado
    ShadowTalk hosts Kacey, Alec, Charles and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:

    - Election update - Because that’s what’s on many people’s minds right now
    - North Korean Group Kimsuky Targets Government Agencies With New Malware
    - Maze Group announces closing of its operations
    - Wroba mobile malware targets US smartphones
    - Plus: Group discusses Guy Fawkes
  • Podcast: Election Update, Kimsuky Activity, Maze Group Announces Closing Recorded: Nov 18 2020 20 mins
    Digital Shadows CISO, Rick Holland and Threat Researchers, Kacey Clark, Charles Ragland and Alec Alvarado
    ShadowTalk hosts Kacey, Alec, Charles and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:

    - Election update - Because that’s what’s on many people’s minds right now
    - North Korean Group Kimsuky Targets Government Agencies With New Malware
    - Maze Group announces closing of its operations
    - Wroba mobile malware targets US smartphones
    - Plus: Group discusses Guy Fawkes
  • Podcast: The Team Gets Spooky with Fancy Bear, Ryuk, and More! Recorded: Nov 17 2020 45 mins
    Digital Shadows Threat Researchers, Stefano De Blasi, Dylan Gray, Adam Cook, and Kim Bromley
    ShadowTalk hosts Stefano, Dylan, Adam, and Kim bring you the latest in threat intelligence. This week they cover:
    - EU slaps sanctions on GRU leader, Fancy Bear
    - Kim discusses the latest on Ryuk and provides insight on its evolution
    - Breach against Finnish psychotherapy giant Vastaamo - patients
    getting targeted for ransom
    - Plus, a little Halloween fun!
  • Podcast: The Team Gets Spooky with Fancy Bear, Ryuk, and More! Recorded: Nov 17 2020 45 mins
    Digital Shadows Threat Researchers, Stefano De Blasi, Dylan Gray, Adam Cook, and Kim Bromley
    ShadowTalk hosts Stefano, Dylan, Adam, and Kim bring you the latest in threat intelligence. This week they cover:
    - EU slaps sanctions on GRU leader, Fancy Bear
    - Kim discusses the latest on Ryuk and provides insight on its evolution
    - Breach against Finnish psychotherapy giant Vastaamo - patients
    getting targeted for ransom
    - Plus, a little Halloween fun!
  • Podcast: SandWorm Indicted by DOJ, Darkside Has A Soft Spot, and More Recorded: Nov 16 2020 25 mins
    Digital shadows CISO, Rick Holland, Threat Researchers, Kacey, Alec and Austin
    ShadowTalk hosts Kacey, Alec, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
    - SandWorm and its link to Russia’s GRU - what’s their history and what
    does this mean?
    - The Darkside ransomware group takes a philanthropic approach to
    cybercrime
    - Ryuk leverages Bazar Loader and Zerologon vulnerability in their
    recent (and very speedy) attack
    - Plus: The group discusses their favorite WiFi names
  • Podcast: SandWorm Indicted by DOJ, Darkside Has A Soft Spot, and More Recorded: Nov 16 2020 25 mins
    Digital shadows CISO, Rick Holland, Threat Researchers, Kacey, Alec and Austin
    ShadowTalk hosts Kacey, Alec, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
    - SandWorm and its link to Russia’s GRU - what’s their history and what
    does this mean?
    - The Darkside ransomware group takes a philanthropic approach to
    cybercrime
    - Ryuk leverages Bazar Loader and Zerologon vulnerability in their
    recent (and very speedy) attack
    - Plus: The group discusses their favorite WiFi names
  • Threat Model of a Remote Worker Recorded: Nov 11 2020 56 mins
    Rick Holland, CISO and VP of Strategy
    Though the remote-work landscape has been steadily moving forward over the past decade, COVID-19 has forced many organizations to accelerate their plans or create them on the fly. Digital Shadows has produced a threat model for the remote worker, taking into account the various risks and threats that employees face while working offsite.

    CISO Rick Holland and Information Security Director Isidoros Monogioudis share their thoughts on the remote worker threat model in this webinar.

    You will learn:
    - How threat actors are targeting remote workers
    - 6 major cyber risks and threats to your remote employees
    - How to mitigate remote working risks to your employees
  • Threat Model of a Remote Worker Recorded: Nov 11 2020 56 mins
    Rick Holland, CISO and VP of Strategy
    Though the remote-work landscape has been steadily moving forward over the past decade, COVID-19 has forced many organizations to accelerate their plans or create them on the fly. Digital Shadows has produced a threat model for the remote worker, taking into account the various risks and threats that employees face while working offsite.

    CISO Rick Holland and Information Security Director Isidoros Monogioudis share their thoughts on the remote worker threat model in this webinar.

    You will learn:
    - How threat actors are targeting remote workers
    - 6 major cyber risks and threats to your remote employees
    - How to mitigate remote working risks to your employees
The Leader in Digital Risk Protection
Digital Shadows SearchLight protects organizations against external risk exposure. Organizations register their company names, brand names, domains, and document marketings for monitoring. Through the SearchLight portal, we provide the most relevant and critical digital risks with complete visibility, context, recommended actions, and ways to remediate the risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Podcast: It’s A Ransomware Roundup: Mount Locker, Old Gremlin, REvil, and More!
  • Live at: Oct 26 2020 11:30 am
  • Presented by: Threat Researchers, Adam, Kim, Stefano and Dylan
  • From:
Your email has been sent.
or close