Podcast: CDPR Victimized, Ziggy’s End, and the Oldsmar Water Incident
ShadowTalk hosts Alec, Ivan, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
- Cyberpunk and Witcher fans beware - threat actors target the CD Projekt
Red source code
- Ziggy ransomware calls it quits - is law enforcement activity driving this
impact?
- Oldsmar, FL water treatment facility gets hacked - could other critical
infrastructure be at risk?
- Researcher impacts dozens of tech firms through a supply chain attack,
winning a $130,000 ‘bug bounty’
RecordedFeb 19 202123 mins
Your place is confirmed, we'll send you email reminders
Threat Researchers Stefano De Blasi and Alec Alvarado
The past 12 months have seen a significant increase in the number of ransomware variants, ransomware targets, and ransomware payments. This rise in ransomware has been helped by another pernicious trend: the risk of initial access brokers. In this webinar we cover:
- How Initial Access Brokers give rise to ransomware
- The different types of access most commonly sold
- How the rise in remote work has caused additional challenges
- The most common geographies targeted
- How cybercriminals use this access and what that means for your
business
Threat Researchers Stefano De Blasi and Alec Alvarado
The past 12 months have seen a significant increase in the number of ransomware variants, ransomware targets, and ransomware payments. This rise in ransomware has been helped by another pernicious trend: the risk of initial access brokers. In this webinar we cover:
- How Initial Access Brokers give rise to ransomware
- The different types of access most commonly sold
- How the rise in remote work has caused additional challenges
- The most common geographies targeted
- How cybercriminals use this access and what that means for your
business
Jamie Hart, Digital Shadows Cyber Threat Intelligence Analyst
Supply chain cybersecurity risk warnings increased by 80% by Q2, 2020, and this trend is likely to continue. During this webinar, Jamie Hart will cover:
- Overview of supply chain compromise and third party risks
- Historical supply chain attacks
- Common tactics, techniques an procedures
- Mitigation options
Jamie Hart, Digital Shadows Cyber Threat Intelligence Analyst
Supply chain cybersecurity risk warnings increased by 80% by Q2, 2020, and this trend is likely to continue. During this webinar, Jamie Hart will cover:
- Overview of supply chain compromise and third party risks
- Historical supply chain attacks
- Common tactics, techniques an procedures
- Mitigation options
Threat Researchers Kim Bromley, Dylan Gray, Stefano De Blasi, and Adam Cook
ShadowTalk hosts Stefano, Adam, Dylan, and Kim bring you the latest in threat intelligence. This week they cover:
- Adam takes us through the latest on Egregor and related arrests - is the
threat group down but not out?
- Dylan talks SIM-swapping - who was targeted?
- Kim brings us the most recent news on the Centreon breach
- Plus, the team reviews the Oldsmar water treatment facility attack
Threat Researchers Kim Bromley, Dylan Gray, Stefano De Blasi, and Adam Cook
ShadowTalk hosts Stefano, Adam, Dylan, and Kim bring you the latest in threat intelligence. This week they cover:
- Adam takes us through the latest on Egregor and related arrests - is the
threat group down but not out?
- Dylan talks SIM-swapping - who was targeted?
- Kim brings us the most recent news on the Centreon breach
- Plus, the team reviews the Oldsmar water treatment facility attack
Michael Marriott, Senior Product Marketing Manager, Digital Shadows
Credential exposure is a high-priority issue, preventing attackers from accessing your systems or selling this access to the highest bidder in dark web criminal marketplaces.
Yet, not all detected exposed credentials are useful to security teams. Analysts must assess if the credentials are authentic or made up, if they are active or inactive, if the email and password matches the corporate format policy, and if they have been previously actioned— all to say, does this exposed credentials pair pose a risk to our organization?
Join us for a webinar to understand how this process is now automated in SearchLight by our Microsoft Azure AD integration, drastically reducing the time required to triage.
Michael Marriott, Senior Product Marketing Manager, Digital Shadows
Credential exposure is a high-priority issue, preventing attackers from accessing your systems or selling this access to the highest bidder in dark web criminal marketplaces.
Yet, not all detected exposed credentials are useful to security teams. Analysts must assess if the credentials are authentic or made up, if they are active or inactive, if the email and password matches the corporate format policy, and if they have been previously actioned— all to say, does this exposed credentials pair pose a risk to our organization?
Join us for a webinar to understand how this process is now automated in SearchLight by our Microsoft Azure AD integration, drastically reducing the time required to triage.
CISO Rick Holland and Threat Researchers Alec Alvarado, Austin Merritt, and Ivan Righi
ShadowTalk hosts Alec, Ivan, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
- Cyberpunk and Witcher fans beware - threat actors target the CD Projekt
Red source code
- Ziggy ransomware calls it quits - is law enforcement activity driving this
impact?
- Oldsmar, FL water treatment facility gets hacked - could other critical
infrastructure be at risk?
- Researcher impacts dozens of tech firms through a supply chain attack,
winning a $130,000 ‘bug bounty’
CISO Rick Holland and Threat Researchers Alec Alvarado, Austin Merritt, and Ivan Righi
ShadowTalk hosts Alec, Ivan, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
- Cyberpunk and Witcher fans beware - threat actors target the CD Projekt
Red source code
- Ziggy ransomware calls it quits - is law enforcement activity driving this
impact?
- Oldsmar, FL water treatment facility gets hacked - could other critical
infrastructure be at risk?
- Researcher impacts dozens of tech firms through a supply chain attack,
winning a $130,000 ‘bug bounty’
Threat Researchers Kim Bromley, Stefano De Blasi, and Adam Cook
ShadowTalk hosts Stefano, Adam, and Kim bring you the latest in threat intelligence. This week they cover:
- More threat actors and attack vectors are being investigated in the
SolarWinds compromise
- Law enforcement officials in the Netherlands are delivering an Emotet
update that will remove it from infected devices
- Kim talks Lebanese Cedar - What’s new in their latest attack?
- Adam reviews Nefilim ransomware - how were they able to gain access
and why it reinforces the need for securing employee accounts
- Plus, don’t miss the malware name of the week!
Threat Researchers Kim Bromley, Stefano De Blasi, and Adam Cook
ShadowTalk hosts Stefano, Adam, and Kim bring you the latest in threat intelligence. This week they cover:
- More threat actors and attack vectors are being investigated in the
SolarWinds compromise
- Law enforcement officials in the Netherlands are delivering an Emotet
update that will remove it from infected devices
- Kim talks Lebanese Cedar - What’s new in their latest attack?
- Adam reviews Nefilim ransomware - how were they able to gain access
and why it reinforces the need for securing employee accounts
- Plus, don’t miss the malware name of the week!
In this webinar, we dive into ransomware and extortion. We take a look at:
- Trends from 2020
- What to expect in 2021
- Why is Ransomware a big deal?
- Copycat Crimes
- Initial access and business intelligence gathering
- APT's
In this webinar, we dive into ransomware and extortion. We take a look at:
- Trends from 2020
- What to expect in 2021
- Why is Ransomware a big deal?
- Copycat Crimes
- Initial access and business intelligence gathering
- APT's
Digital Shadows CISO, Rick Holland and Threat Researchers, Alec Alvarado, Austin Merritt and Charles Ragland
ShadowTalk hosts Alec, Charles, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
- Mimecast confirms SolarWinds attackers breached security certificate -
the latest updates
- The rise and fall of Emotet plus unique video footage of the takedown
- NetWalker ransomware targeted and taken down by US and Bulgarian
Law Enforcement
- Avaddon adopts a new tactic - could it become the MO of other threat
groups?
- North Korean threat actors go phishing for security researchers with fake
social media profiles
Digital Shadows CISO, Rick Holland and Threat Researchers, Alec Alvarado, Austin Merritt and Charles Ragland
ShadowTalk hosts Alec, Charles, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:
- Mimecast confirms SolarWinds attackers breached security certificate -
the latest updates
- The rise and fall of Emotet plus unique video footage of the takedown
- NetWalker ransomware targeted and taken down by US and Bulgarian
Law Enforcement
- Avaddon adopts a new tactic - could it become the MO of other threat
groups?
- North Korean threat actors go phishing for security researchers with fake
social media profiles
In this talk, Digital Shadows CISO, Rick Holland, will take you on a journey looking at 2020's top cybercrime hits. All your favorites will be included; "monkey see monkey do" ransomware, account takeover, and access keys on public-facing software repositories. Rick will also make fun of "derpweb" icebergs while mixing in some BBQ analogies.
In this talk, Digital Shadows CISO, Rick Holland, will take you on a journey looking at 2020's top cybercrime hits. All your favorites will be included; "monkey see monkey do" ransomware, account takeover, and access keys on public-facing software repositories. Rick will also make fun of "derpweb" icebergs while mixing in some BBQ analogies.
Digital Shadows Threat Researchers, Kim Bromley, Stefano De Blasi, and Adam Cook
ShadowTalk hosts Stefano, Kim, and Adam bring you the latest in threat intelligence. This week they cover:
- FireEye, a top security firm, suffers a breach just weeks after
announcing a huge investment by Blackstone
- Phishing campaigns target the distribution of the Covid-19 vaccine
- Ransomware gangs resort to cold-calling victims in order to cash in
- Plus, the very festive ‘Malware name of the week’
Digital Shadows Threat Researchers, Kim Bromley, Stefano De Blasi, and Adam Cook
ShadowTalk hosts Stefano, Kim, and Adam bring you the latest in threat intelligence. This week they cover:
- FireEye, a top security firm, suffers a breach just weeks after
announcing a huge investment by Blackstone
- Phishing campaigns target the distribution of the Covid-19 vaccine
- Ransomware gangs resort to cold-calling victims in order to cash in
- Plus, the very festive ‘Malware name of the week’
Digital Shadows SearchLight protects organizations against external risk exposure. Organizations register their company names, brand names, domains, and document marketings for monitoring. Through the SearchLight portal, we provide the most relevant and critical digital risks with complete visibility, context, recommended actions, and ways to remediate the risk.
Podcast: CDPR Victimized, Ziggy’s End, and the Oldsmar Water IncidentCISO Rick Holland and Threat Researchers Alec Alvarado, Austin Merritt, and Ivan Righi[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]23 mins