Podcast: Lebanese Cedar, Nefilim Ghost Credentials, SolarWinds, and Emotet
ShadowTalk hosts Stefano, Adam, and Kim bring you the latest in threat intelligence. This week they cover:
- More threat actors and attack vectors are being investigated in the
SolarWinds compromise
- Law enforcement officials in the Netherlands are delivering an Emotet
update that will remove it from infected devices
- Kim talks Lebanese Cedar - What’s new in their latest attack?
- Adam reviews Nefilim ransomware - how were they able to gain access
and why it reinforces the need for securing employee accounts
- Plus, don’t miss the malware name of the week!
RecordedFeb 12 202141 mins
Your place is confirmed, we'll send you email reminders
Digital Shadows Threat Researchers Stefano De Blasi and Alec Alvarado
The past 12 months have seen a significant increase in the number of ransomware variants, ransomware targets, and ransomware payments. This rise in ransomware has been helped by another pernicious trend: the risk of initial access brokers. A sharp increase in remote work, among other things, has helped initial access brokers (IAB) reach their full potential. Plus, their work is increasingly lucrative with access selling for an average of $7,100. In this webinar we cover:
- How Initial Access Brokers give rise to ransomware
- The different types of access most commonly sold
- How the rise in remote work has caused additional challenges
- The most common geographies targeted
- How cybercriminals use this access and what that means for your
business
Digital Shadows Threat Researchers Stefano De Blasi and Alec Alvarado
The past 12 months have seen a significant increase in the number of ransomware variants, ransomware targets, and ransomware payments. This rise in ransomware has been helped by another pernicious trend: the risk of initial access brokers. A sharp increase in remote work, among other things, has helped initial access brokers (IAB) reach their full potential. Plus, their work is increasingly lucrative with access selling for an average of $7,100. In this webinar we cover:
- How Initial Access Brokers give rise to ransomware
- The different types of access most commonly sold
- How the rise in remote work has caused additional challenges
- The most common geographies targeted
- How cybercriminals use this access and what that means for your
business
Digital Shadows Threat Researchers Kim Bromley, Dylan Gray, Stefano De Blasi, and Adam Cook
ShadowTalk hosts Stefano, Adam, Dylan, and Kim bring you the latest in threat intelligence. This week they cover:
- The Australian Criminal Intelligence Commission (ACIC) issues three new
warrants for dealing with cybercrime - how does this new legislation
increase law enforcement powers?
- VMware has revealed a critical-rated bug - what should security teams
know?
- Adam covers ICEDID Infection and ransomware
- The team discuss the DPRK Indictment
Digital Shadows Threat Researchers Kim Bromley, Dylan Gray, Stefano De Blasi, and Adam Cook
ShadowTalk hosts Stefano, Adam, Dylan, and Kim bring you the latest in threat intelligence. This week they cover:
- The Australian Criminal Intelligence Commission (ACIC) issues three new
warrants for dealing with cybercrime - how does this new legislation
increase law enforcement powers?
- VMware has revealed a critical-rated bug - what should security teams
know?
- Adam covers ICEDID Infection and ransomware
- The team discuss the DPRK Indictment
Digital Shadows CISO Rick Holland and Threat Researchers Alec Alvarado, Charles Ragland, and Ivan Righi
ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
- The team talks Initial Access Brokers (IAB) - what role do these middle-
men play in the ransomware game?
- How can your company mitigate risks against IABs?
- The latest on the Accellion incident
- Third party attacks - where does the blame fall?
Digital Shadows CISO Rick Holland and Threat Researchers Alec Alvarado, Charles Ragland, and Ivan Righi
ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
- The team talks Initial Access Brokers (IAB) - what role do these middle-
men play in the ransomware game?
- How can your company mitigate risks against IABs?
- The latest on the Accellion incident
- Third party attacks - where does the blame fall?
Jamie Hart, Digital Shadows Cyber Threat Intelligence Analyst
Supply chain cybersecurity risk warnings increased by 80% by Q2, 2020, and this trend is likely to continue. During this webinar, Jamie Hart will cover:
- Overview of supply chain compromise and third party risks
- Historical supply chain attacks
- Common tactics, techniques an procedures
- Mitigation options
Jamie Hart, Digital Shadows Cyber Threat Intelligence Analyst
Supply chain cybersecurity risk warnings increased by 80% by Q2, 2020, and this trend is likely to continue. During this webinar, Jamie Hart will cover:
- Overview of supply chain compromise and third party risks
- Historical supply chain attacks
- Common tactics, techniques an procedures
- Mitigation options
Threat Researchers Kim Bromley, Dylan Gray, Stefano De Blasi, and Adam Cook
ShadowTalk hosts Stefano, Adam, Dylan, and Kim bring you the latest in threat intelligence. This week they cover:
- Adam takes us through the latest on Egregor and related arrests - is the
threat group down but not out?
- Dylan talks SIM-swapping - who was targeted?
- Kim brings us the most recent news on the Centreon breach
- Plus, the team reviews the Oldsmar water treatment facility attack
Threat Researchers Kim Bromley, Dylan Gray, Stefano De Blasi, and Adam Cook
ShadowTalk hosts Stefano, Adam, Dylan, and Kim bring you the latest in threat intelligence. This week they cover:
- Adam takes us through the latest on Egregor and related arrests - is the
threat group down but not out?
- Dylan talks SIM-swapping - who was targeted?
- Kim brings us the most recent news on the Centreon breach
- Plus, the team reviews the Oldsmar water treatment facility attack
Michael Marriott, Senior Product Marketing Manager, Digital Shadows
Credential exposure is a high-priority issue, preventing attackers from accessing your systems or selling this access to the highest bidder in dark web criminal marketplaces.
Yet, not all detected exposed credentials are useful to security teams. Analysts must assess if the credentials are authentic or made up, if they are active or inactive, if the email and password matches the corporate format policy, and if they have been previously actioned— all to say, does this exposed credentials pair pose a risk to our organization?
Join us for a webinar to understand how this process is now automated in SearchLight by our Microsoft Azure AD integration, drastically reducing the time required to triage.
Michael Marriott, Senior Product Marketing Manager, Digital Shadows
Credential exposure is a high-priority issue, preventing attackers from accessing your systems or selling this access to the highest bidder in dark web criminal marketplaces.
Yet, not all detected exposed credentials are useful to security teams. Analysts must assess if the credentials are authentic or made up, if they are active or inactive, if the email and password matches the corporate format policy, and if they have been previously actioned— all to say, does this exposed credentials pair pose a risk to our organization?
Join us for a webinar to understand how this process is now automated in SearchLight by our Microsoft Azure AD integration, drastically reducing the time required to triage.
CISO Rick Holland and Threat Researchers Alec Alvarado, Austin Merritt, and Ivan Righi
ShadowTalk hosts Alec, Ivan, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
- Cyberpunk and Witcher fans beware - threat actors target the CD Projekt
Red source code
- Ziggy ransomware calls it quits - is law enforcement activity driving this
impact?
- Oldsmar, FL water treatment facility gets hacked - could other critical
infrastructure be at risk?
- Researcher impacts dozens of tech firms through a supply chain attack,
winning a $130,000 ‘bug bounty’
CISO Rick Holland and Threat Researchers Alec Alvarado, Austin Merritt, and Ivan Righi
ShadowTalk hosts Alec, Ivan, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
- Cyberpunk and Witcher fans beware - threat actors target the CD Projekt
Red source code
- Ziggy ransomware calls it quits - is law enforcement activity driving this
impact?
- Oldsmar, FL water treatment facility gets hacked - could other critical
infrastructure be at risk?
- Researcher impacts dozens of tech firms through a supply chain attack,
winning a $130,000 ‘bug bounty’
Threat Researchers Kim Bromley, Stefano De Blasi, and Adam Cook
ShadowTalk hosts Stefano, Adam, and Kim bring you the latest in threat intelligence. This week they cover:
- More threat actors and attack vectors are being investigated in the
SolarWinds compromise
- Law enforcement officials in the Netherlands are delivering an Emotet
update that will remove it from infected devices
- Kim talks Lebanese Cedar - What’s new in their latest attack?
- Adam reviews Nefilim ransomware - how were they able to gain access
and why it reinforces the need for securing employee accounts
- Plus, don’t miss the malware name of the week!
Threat Researchers Kim Bromley, Stefano De Blasi, and Adam Cook
ShadowTalk hosts Stefano, Adam, and Kim bring you the latest in threat intelligence. This week they cover:
- More threat actors and attack vectors are being investigated in the
SolarWinds compromise
- Law enforcement officials in the Netherlands are delivering an Emotet
update that will remove it from infected devices
- Kim talks Lebanese Cedar - What’s new in their latest attack?
- Adam reviews Nefilim ransomware - how were they able to gain access
and why it reinforces the need for securing employee accounts
- Plus, don’t miss the malware name of the week!
In this webinar, we dive into ransomware and extortion. We take a look at:
- Trends from 2020
- What to expect in 2021
- Why is Ransomware a big deal?
- Copycat Crimes
- Initial access and business intelligence gathering
- APT's
In this webinar, we dive into ransomware and extortion. We take a look at:
- Trends from 2020
- What to expect in 2021
- Why is Ransomware a big deal?
- Copycat Crimes
- Initial access and business intelligence gathering
- APT's
Digital Shadows CISO, Rick Holland and Threat Researchers, Alec Alvarado, Austin Merritt and Charles Ragland
ShadowTalk hosts Alec, Charles, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
- Mimecast confirms SolarWinds attackers breached security certificate -
the latest updates
- The rise and fall of Emotet plus unique video footage of the takedown
- NetWalker ransomware targeted and taken down by US and Bulgarian
Law Enforcement
- Avaddon adopts a new tactic - could it become the MO of other threat
groups?
- North Korean threat actors go phishing for security researchers with fake
social media profiles
Digital Shadows CISO, Rick Holland and Threat Researchers, Alec Alvarado, Austin Merritt and Charles Ragland
ShadowTalk hosts Alec, Charles, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
- Mimecast confirms SolarWinds attackers breached security certificate -
the latest updates
- The rise and fall of Emotet plus unique video footage of the takedown
- NetWalker ransomware targeted and taken down by US and Bulgarian
Law Enforcement
- Avaddon adopts a new tactic - could it become the MO of other threat
groups?
- North Korean threat actors go phishing for security researchers with fake
social media profiles
Digital Shadows SearchLight protects organizations against external risk exposure. Organizations register their company names, brand names, domains, and document marketings for monitoring. Through the SearchLight portal, we provide the most relevant and critical digital risks with complete visibility, context, recommended actions, and ways to remediate the risk.
Podcast: Lebanese Cedar, Nefilim Ghost Credentials, SolarWinds, and EmotetThreat Researchers Kim Bromley, Stefano De Blasi, and Adam Cook[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]41 mins