Hi [[ session.user.profile.firstName ]]

Podcast: Nobelium Attacks, VMWare Exploits, and More

ShadowTalk hosts Sean, Alec, Charles, and Digital Shadows CISO, Rick Holland, bring you the latest in threat intelligence. This week they cover:
- Alec dives into Nobelium - who are they and what happened in the latest attack?
- Charles takes us through VMWare exploits - how does it compare to earlier vulnerabilities?
- Rick discusses the Biden Administration’s open letter to business leaders on the state of ransomware
- Plus, check out our latest content including thoughts on the 2021 Verizon DBIR
Recorded Jun 11 2021 24 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Threat Researchers Alec Alvarado, Sean Nikkel, Charles Ragland, and Digital Shadows CISO, Rick Holland
Presentation preview: Podcast: Nobelium Attacks, VMWare Exploits, and More
  • Channel
  • Channel profile
  • 2021: The Year of Third-Party Risk Jul 27 2021 4:00 pm UTC 29 mins
    Digital Shadows Threat Intelligence Manager, Alec Alvarado
    Join Digital Shadows Threat Intelligence Manager, Alec Alvarado, as he dives into trends and incidents associated with third-party risk so far this year. In this session we’ll cover:

    - Term clarification - defining third-party risk
    - Historical examples of attacks and tactics used
    - Cybercriminal trends and patterns
    - Forecasting for the future and how to mitigate these types of risks
  • 2021: The Year of Third-Party Risk Jul 27 2021 9:30 am UTC 29 mins
    Digital Shadows Threat Intelligence Manager, Alec Alvarado
    Join Digital Shadows Threat Intelligence Manager, Alec Alvarado, as he dives into trends and incidents associated with third-party risk so far this year. In this session we’ll cover:

    - Term clarification - defining third-party risk
    - Historical examples of attacks and tactics used
    - Cybercriminal trends and patterns
    - Forecasting for the future and how to mitigate these types of risks
  • Enterprise Cyber Crime Update Jul 22 2021 6:00 pm UTC 56 mins
    Ben Johnson, Field CTO, Digital Shadows and Brandon Kaier, Field CTO, Red8
    Motivating reasons for those who perpetrate cyber crime is changing. While money is still a primary motivator, the number of fake websites designed to accept payment for hospitals and web based businesses is going up exponentially. Cyber crime is however, rapidly expanding from just being about money to corporate/state sponsored espionage and ideology. One of the biggest trends in ransomware attacks is the attempt to hide the fact that a threat element has been in your network for months or even years. If you thought the attack was for money have you thought why you were targeted?Just recently Go Fund Me suffered a data breach. Why would a site whose primary purpose is to help those in need be attacked?

    How does your organization ensure that it’s intellectual property, customer information, business reputation, and interface with your customer base isn’t being sold or highjacked? Come join us as we discuss these topics and more.
  • Enterprise Cyber Crime Update Jul 22 2021 12:00 pm UTC 56 mins
    Ben Johnson, Field CTO, Digital Shadows and Brandon Kaier, Field CTO, Red8
    Motivating reasons for those who perpetrate cyber crime is changing. While money is still a primary motivator, the number of fake websites designed to accept payment for hospitals and web based businesses is going up exponentially. Cyber crime is however, rapidly expanding from just being about money to corporate/state sponsored espionage and ideology. One of the biggest trends in ransomware attacks is the attempt to hide the fact that a threat element has been in your network for months or even years. If you thought the attack was for money have you thought why you were targeted?Just recently Go Fund Me suffered a data breach. Why would a site whose primary purpose is to help those in need be attacked?

    How does your organization ensure that it’s intellectual property, customer information, business reputation, and interface with your customer base isn’t being sold or highjacked? Come join us as we discuss these topics and more.
  • Dark Web Monitoring: Best Practices and Use Cases Jul 13 2021 4:00 pm UTC 31 mins
    Michael Marriott, Director, Product Marketing Manager
    Dark web monitoring is not a use case in and of itself. Instead, it encompasses a variety of different use cases such as exposed credential monitoring, fraud, and insider threat monitoring. If security leaders want to successfully operationalize intelligence from dark web sources, then focusing on such specific use cases is critical.

    In this webinar we'll cover:
    - Most popular use cases
    - Best practices for dark web monitoring
    - Outline different types of maturity
    - Provide a checklist for legal considerations
  • Dark Web Monitoring: Best Practices and Use Cases Jul 13 2021 9:30 am UTC 31 mins
    Michael Marriott, Director, Product Marketing Manager
    Dark web monitoring is not a use case in and of itself. Instead, it encompasses a variety of different use cases such as exposed credential monitoring, fraud, and insider threat monitoring. If security leaders want to successfully operationalize intelligence from dark web sources, then focusing on such specific use cases is critical.

    In this webinar we'll cover:
    - Most popular use cases
    - Best practices for dark web monitoring
    - Outline different types of maturity
    - Provide a checklist for legal considerations
  • Ransomware Trends in Q1 2021 Jun 22 2021 4:00 pm UTC 30 mins
    Jamie Hart, Digital Shadows Cyber Threat Intelligence Analyst
    Jamie takes us through the newest trends in ransomware for the top of 2021. In this session we cover:

    - Popular tactics by threat actors
    - Most commonly targeted industries and geographies
    - Attacks we've seen so far this year
    - What we can expect for the threat landscape in the short term
  • Ransomware Trends in Q1 2021 Jun 22 2021 9:30 am UTC 30 mins
    Jamie Hart, Digital Shadows Cyber Threat Intelligence Analyst
    Jamie takes us through the newest trends in ransomware for the top of 2021. In this session we cover:

    - Popular tactics by threat actors
    - Most commonly targeted industries and geographies
    - Attacks we've seen so far this year
    - What we can expect for the threat landscape in the short term
  • Podcast: Chinese Cyber Espionage, GitHub Takedowns, and EURO 2020 Predictions Jun 18 2021 4:00 pm UTC 56 mins
    Digital Shadows Threat Researchers, Chris Morgan, Adam Cook, Stefano De Blasi, and Rory Donovan
    ShadowTalk hosts Stefano, Adam, Chris, and newcomer, Rory, bring you the latest in threat intelligence. This week they cover:
    - Adam takes us through the latest cyber espionage campaigns attributed to Chinese-state-sponsored APT groups
    - Rory discusses a sophisticated law enforcement campaign targeting criminal syndicates all over the world
    - Chris dives into the new GitHub policies - what led to these new guidelines?
    - The team talks about updates on the Colonial Pipeline incident - what’s the latest?
    - Plus, the group makes EURO 2020 predictions
  • Podcast: Chinese Cyber Espionage, GitHub Takedowns, and EURO 2020 Predictions Jun 18 2021 9:30 am UTC 56 mins
    Digital Shadows Threat Researchers, Chris Morgan, Adam Cook, Stefano De Blasi, and Rory Donovan
    ShadowTalk hosts Stefano, Adam, Chris, and newcomer, Rory, bring you the latest in threat intelligence. This week they cover:
    - Adam takes us through the latest cyber espionage campaigns attributed to Chinese-state-sponsored APT groups
    - Rory discusses a sophisticated law enforcement campaign targeting criminal syndicates all over the world
    - Chris dives into the new GitHub policies - what led to these new guidelines?
    - The team talks about updates on the Colonial Pipeline incident - what’s the latest?
    - Plus, the group makes EURO 2020 predictions
  • Podcast: Nobelium Attacks, VMWare Exploits, and More Recorded: Jun 11 2021 24 mins
    Threat Researchers Alec Alvarado, Sean Nikkel, Charles Ragland, and Digital Shadows CISO, Rick Holland
    ShadowTalk hosts Sean, Alec, Charles, and Digital Shadows CISO, Rick Holland, bring you the latest in threat intelligence. This week they cover:
    - Alec dives into Nobelium - who are they and what happened in the latest attack?
    - Charles takes us through VMWare exploits - how does it compare to earlier vulnerabilities?
    - Rick discusses the Biden Administration’s open letter to business leaders on the state of ransomware
    - Plus, check out our latest content including thoughts on the 2021 Verizon DBIR
  • Podcast: Nobelium Attacks, VMWare Exploits, and More Recorded: Jun 11 2021 24 mins
    Threat Researchers Alec Alvarado, Sean Nikkel, Charles Ragland, and Digital Shadows CISO, Rick Holland
    ShadowTalk hosts Sean, Alec, Charles, and Digital Shadows CISO, Rick Holland, bring you the latest in threat intelligence. This week they cover:
    - Alec dives into Nobelium - who are they and what happened in the latest attack?
    - Charles takes us through VMWare exploits - how does it compare to earlier vulnerabilities?
    - Rick discusses the Biden Administration’s open letter to business leaders on the state of ransomware
    - Plus, check out our latest content including thoughts on the 2021 Verizon DBIR
  • Initial Access Brokers: The Role in Cybercrime Recorded: Jun 8 2021 19 mins
    Niall MacLeod, Director, Sales Engineering EMEA
    The past 12 months have seen a significant increase in the number of ransomware variants, ransomware targets, and ransomware payments. This rise in ransomware has been helped by another pernicious trend: the risk of initial access brokers. In this webinar we cover:

    - How Initial Access Brokers give rise to ransomware
    - The different types of access most commonly sold
    - How the rise in remote work has caused additional challenges
    - The most common geographies targeted
    - How cybercriminals use this access and what that means for your business
  • Initial Access Brokers: The Role in Cybercrime Recorded: Jun 8 2021 19 mins
    Niall MacLeod, Director, Sales Engineering EMEA
    The past 12 months have seen a significant increase in the number of ransomware variants, ransomware targets, and ransomware payments. This rise in ransomware has been helped by another pernicious trend: the risk of initial access brokers. In this webinar we cover:

    - How Initial Access Brokers give rise to ransomware
    - The different types of access most commonly sold
    - How the rise in remote work has caused additional challenges
    - The most common geographies targeted
    - How cybercriminals use this access and what that means for your business
  • Podcast: Drug Kingpin Taken Down by Cheese and Ransomware Makes a Comeback Recorded: Jun 4 2021 45 mins
    Digital Shadows Threat Researchers, Kim Bromley, Adam Cook, Stefano De Blasi, and Dylan Gray
    ShadowTalk hosts Stefano, Adam, Kim, and Dylan bring you the latest in threat intelligence. This week they cover:
    - Dylan discusses how cheese was the downfall of a drug dealer in the UK and how a cybercriminal messaging forum contributed
    - Kim talks ransomware - how ransom demands stole the spotlight from supply-chain attacks
    - Avaddon victims refuse to pay ransom demands - what happened?
    - Adam dives into politically motivated ransomware
  • Podcast: Drug Kingpin Taken Down by Cheese and Ransomware Makes a Comeback Recorded: Jun 4 2021 45 mins
    Digital Shadows Threat Researchers, Kim Bromley, Adam Cook, Stefano De Blasi, and Dylan Gray
    ShadowTalk hosts Stefano, Adam, Kim, and Dylan bring you the latest in threat intelligence. This week they cover:
    - Dylan discusses how cheese was the downfall of a drug dealer in the UK and how a cybercriminal messaging forum contributed
    - Kim talks ransomware - how ransom demands stole the spotlight from supply-chain attacks
    - Avaddon victims refuse to pay ransom demands - what happened?
    - Adam dives into politically motivated ransomware
  • Podcast: Colonial Pipeline Updates, DarkSide Feels the Pressure, and More! Recorded: May 28 2021 30 mins
    Threat Researchers Alec Alvarado, Ivan Righi, Sean Nikkel, and Charles Ragland
    ShadowTalk hosts Sean, Alec, Ivan, and Charles bring you the latest in threat intelligence. This week they cover:
    - Ivan takes us through the latest updates on DarkSide and the Colonial Pipeline incident - DarkSide faces consequences
    - The team talks about new legislation from the US government - better late than never?
    - Plus, our hosts dive into all things ransomware - what’s happening with the cyber threat landscape?
    - Alec brings us the latest on Conti ransomware targeting Ireland's Department of Health - what was the impact?
    - Charles discusses a new web skimmer indicating ongoing Magecart activity
  • Podcast: Colonial Pipeline Updates, DarkSide Feels the Pressure, and More! Recorded: May 28 2021 30 mins
    Threat Researchers Alec Alvarado, Ivan Righi, Sean Nikkel, and Charles Ragland
    ShadowTalk hosts Sean, Alec, Ivan, and Charles bring you the latest in threat intelligence. This week they cover:
    - Ivan takes us through the latest updates on DarkSide and the Colonial Pipeline incident - DarkSide faces consequences
    - The team talks about new legislation from the US government - better late than never?
    - Plus, our hosts dive into all things ransomware - what’s happening with the cyber threat landscape?
    - Alec brings us the latest on Conti ransomware targeting Ireland's Department of Health - what was the impact?
    - Charles discusses a new web skimmer indicating ongoing Magecart activity
  • Operationalizing Cyber Threat Intelligence with SearchLight Recorded: May 25 2021 29 mins
    Michael Marriott, Senior Product Marketing Manager
    Join Digital Shadows to learn about exciting new functionality, which helps organizations of all sizes to get value out of Cyber Threat Intelligence. These new enhancements enable security teams to operationalize intelligence at tactical, operational, and strategic levels.

    In this webinar we'll cover:

    - Understand how the SearchLight service maps to the Intelligence Cycle
    - Tactical cyber threat intelligence available within SearchLight, including a new Indicators tab
    - Operational threat intelligence, including Mitre ATT&CK mappings and actor profiles
    - Creating strategic intelligence reports in SearchLight
    - Receive a complimentary CTI Best Practices guide
  • Operationalizing Cyber Threat Intelligence with SearchLight Recorded: May 25 2021 29 mins
    Michael Marriott, Senior Product Marketing Manager
    Join Digital Shadows to learn about exciting new functionality, which helps organizations of all sizes to get value out of Cyber Threat Intelligence. These new enhancements enable security teams to operationalize intelligence at tactical, operational, and strategic levels.

    In this webinar we'll cover:

    - Understand how the SearchLight service maps to the Intelligence Cycle
    - Tactical cyber threat intelligence available within SearchLight, including a new Indicators tab
    - Operational threat intelligence, including Mitre ATT&CK mappings and actor profiles
    - Creating strategic intelligence reports in SearchLight
    - Receive a complimentary CTI Best Practices guide
The Leader in Digital Risk Protection
Digital Shadows SearchLight protects organizations against external risk exposure. Organizations register their company names, brand names, domains, and document marketings for monitoring. Through the SearchLight portal, we provide the most relevant and critical digital risks with complete visibility, context, recommended actions, and ways to remediate the risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Podcast: Nobelium Attacks, VMWare Exploits, and More
  • Live at: Jun 11 2021 9:30 am
  • Presented by: Threat Researchers Alec Alvarado, Sean Nikkel, Charles Ragland, and Digital Shadows CISO, Rick Holland
  • From:
Your email has been sent.
or close