Hi [[ session.user.profile.firstName ]]

Podcast: Microsoft Exchange attribution, NSO Spyware, Zero-days, and Clippy

ShadowTalk hosts Stefano, Saul, Rory, and Kim bring you the latest in threat intelligence. This week they cover:
- Microsoft Exchange server attach attributed to China
- At least 180 journalists have been selected as targets by clients of the cybersurveillance company NSO Group
- Zero-day exploits in 2021
- Tor gets an update
Recorded Jul 30 2021 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Digital Shadows Threat Researchers, Stefano De Blasi, Saul Burban, Rory Donovan and Kim Bromley
Presentation preview: Podcast: Microsoft Exchange attribution, NSO Spyware, Zero-days, and Clippy
  • Channel
  • Channel profile
  • SecureWorld Remote Sessions: Ransomware in 2021 Nov 16 2021 4:00 pm UTC 64 mins
    Digital Shadows Threat Researcher, Matthew Alec Alvarado
    Digital Shadows reviews and expands on observed ransomware attacks and how security teams can fortify their defenses. During this presentation, we will explore:

    - 2021 ransomware group activity, with a quarterly increase of 47%
    - The most active ransomware groups during 2021
    - The disappearance of REvil, and emergence of new variants
    - Methods for identifying ransomware-related risks
  • Detecting Exposed Data Online: Best Practices Oct 27 2021 4:00 pm UTC 31 mins
    Michael Marriott
    With increased data dumps related to ransomware, security teams are increasingly concerned about sensitive data exposed on the dark web. Unfortunately, data is exposed in even more locations, even more often. Code repositories, websites, and misconfigured file stores are exposing billions of files.

    Luckily, there are approaches you can take to detect and remediate these issues. Join Digital Shadows to learn about best practices for detecting exposed data across online.

    Attendees will learn about:
    - Top sources of exposed data
    - Types of exposed data
    - Free tools to get started
  • Detecting Exposed Data Online: Best Practices Oct 27 2021 9:30 am UTC 31 mins
    Michael Marriott
    With increased data dumps related to ransomware, security teams are increasingly concerned about sensitive data exposed on the dark web. Unfortunately, data is exposed in even more locations, even more often. Code repositories, websites, and misconfigured file stores are exposing billions of files.

    Luckily, there are approaches you can take to detect and remediate these issues. Join Digital Shadows to learn about best practices for detecting exposed data across online.

    Attendees will learn about:
    - Top sources of exposed data
    - Types of exposed data
    - Free tools to get started
  • Special Pod: Threats to Crypto and Tracking Ransomware with Blockchain Analytics Oct 20 2021 4:00 pm UTC 42 mins
    ShadowTalk hosts Sean Nikkel, CISO Rick Holland, and Dr. Tom Robinson, Chief Scientist and Co-Founder of Elliptic
    ShadowTalk hosts Sean Nikkel and CISO, Rick Holland sit down with Dr. Tom Robinson, Chief Scientist and Co-Founder of Elliptic. They cover:

    - Dr. Robinson’s early days as a physicist before getting into the world of cybersecurity
    - Cyberthreats to Bitcoin and the Cryptocurrency landscape
    - Tracking Ransomware with Blockchain Analytics
  • Special Pod: Threats to Crypto and Tracking Ransomware with Blockchain Analytics Oct 20 2021 9:30 am UTC 42 mins
    ShadowTalk hosts Sean Nikkel, CISO Rick Holland, and Dr. Tom Robinson, Chief Scientist and Co-Founder of Elliptic
    ShadowTalk hosts Sean Nikkel and CISO, Rick Holland sit down with Dr. Tom Robinson, Chief Scientist and Co-Founder of Elliptic. They cover:

    - Dr. Robinson’s early days as a physicist before getting into the world of cybersecurity
    - Cyberthreats to Bitcoin and the Cryptocurrency landscape
    - Tracking Ransomware with Blockchain Analytics
  • [Podcast] NOBELIUM Malware, BEC scheme, and EU Condemns Russian Cyberactivity Recorded: Oct 8 2021 29 mins
    ShadowTalk host Adam Cook alongside Kim Bromley, and Saul Burban
    ShadowTalk host Adam alongside Kim, and Saul bring you the latest in threat intelligence. This week they cover:
    - Newly detected NOBELIUM malware creates persistent backdoor
    - Four individuals charged with wide-ranging BEC scheme
    - EU condemns Russian cyber activity ahead of elections
  • FBI under fire, Microsoft goes passwordless, and RaidForums Recorded: Oct 6 2021 1 min
    ShadowTalk host Sean alongside Rick, Alec, and Ivan
    ShadowTalk host Sean alongside Rick, Alec, and Ivan bring you the latest in threat intelligence. This week they cover:

    - FBI under fire about decryption keys
    - Microsoft goes passwordless
    - RaidForums left restricted area open
  • Ransomware in 2021 Recorded: Oct 5 2021 42 mins
    Digital Shadows Threat Intelligence Analysts, Alec Alvarado and Sean Nikkel
    Digital Shadows reviews and expands on observed ransomware attacks and how security teams can fortify their defenses. During this presentation, we explore:

    - 2021 ransomware group activity, with a quarterly increase of 47%
    - The most active ransomware groups during 2021
    - The disappearance of REvil, and emergence of new variants
    - Methods for identifying ransomware-related risks
  • Ransomware in 2021 Recorded: Oct 5 2021 42 mins
    Digital Shadows Threat Intelligence Analysts, Alec Alvarado and Sean Nikkel
    Digital Shadows reviews and expands on observed ransomware attacks and how security teams can fortify their defenses. During this presentation, we explore:

    - 2021 ransomware group activity, with a quarterly increase of 47%
    - The most active ransomware groups during 2021
    - The disappearance of REvil, and emergence of new variants
    - Methods for identifying ransomware-related risks
  • [Podcast] NOBELIUM Malware, BEC scheme, and EU Condemns Russian Cyberactivity Recorded: Oct 4 2021 29 mins
    ShadowTalk host Adam Cook alongside Kim Bromley, and Saul
    ShadowTalk host Adam alongside Kim, and Saul bring you the latest in threat intelligence. This week they cover:
    - Newly detected NOBELIUM malware creates persistent backdoor
    - Four individuals charged with wide-ranging BEC scheme
    - EU condemns Russian cyber activity ahead of elections
  • FBI under fire, Microsoft goes passwordless, and RaidForums Recorded: Sep 30 2021 1 min
    ShadowTalk host Sean alongside Rick, Alec, and Ivan
    ShadowTalk host Sean alongside Rick, Alec, and Ivan bring you the latest in threat intelligence. This week they cover:

    - FBI under fire about decryption keys
    - Microsoft goes passwordless
    - RaidForums left restricted area open
  • [Podcast] Mozi arrest, Fortinet credentials, and Splunk PowerShell Release Recorded: Sep 17 2021 18 mins
    Threat Researchers Sean Nikkel, Ivan Righi, Austin Merritt and CISO Rick Holland
    ShadowTalk hosts Sean, Rick, Ivan, and Austin bring you the latest in threat intelligence. This week they cover:

    Mozi botnet operators arrested in China, >1.5M devices since 2019
    Groove gang releases creds of comp’d Fortinet appliances, ~500k
    Splunk releases new PowerShell analytics for threat hunters, includes support for SOAR responses
  • Impersonating Domains: Breaking Research and New Functionality Recorded: Sep 15 2021 36 mins
    Lauren Place, Stefano De Blasi, Sean Nikkel,
    Lauren Place joins Photon’s Stefano De Blasi and Sean Nikkel to discuss the latest research into impersonating domains and walkthrough SearchLight’s industry-leading domain monitoring capabilities

    Attendees will learn about:
    - The state of domain impersonation in 2021, with primary-sourced data findings
    - Different motivations behind domain impersonation
    - Phishing campaigns in action SearchLight’s unique approach to domain monitoring
    - Free tools to get your domain monitoring capability kick-started.
  • Impersonating Domains: Breaking Research and New Functionality Recorded: Sep 15 2021 36 mins
    Lauren Place, Stefano De Blasi, Sean Nikkel,
    Lauren Place joins Photon’s Stefano De Blasi and Sean Nikkel to discuss the latest research into impersonating domains and walkthrough SearchLight’s industry-leading domain monitoring capabilities

    Attendees will learn about:
    - The state of domain impersonation in 2021, with primary-sourced data findings
    - Different motivations behind domain impersonation
    - Phishing campaigns in action SearchLight’s unique approach to domain monitoring
    - Free tools to get your domain monitoring capability kick-started.
  • [Podcast] Mozi arrest, Fortinet credentials, and Splunk PowerShell Release Recorded: Sep 13 2021 18 mins
    Threat Researchers Sean Nikkel, Ivan Righi, Austin Merritt and CISO Rick Holland
    ShadowTalk hosts Sean, Rick, Ivan, and Austin bring you the latest in threat intelligence. This week they cover:

    Mozi botnet operators arrested in China, >1.5M devices since 2019
    Groove gang releases creds of comp’d Fortinet appliances, ~500k
    Splunk releases new PowerShell analytics for threat hunters, includes support for SOAR responses
  • [Podcast] Bryson Bort, Cyber Gandalf and MORE! Recorded: Sep 9 2021 50 mins
    CISO Rick Holland, Sean Nikkel, Bryson Bort
    Digital Shadow’s CISO Rick Holland and Senior Cyber Threat Intel Analyst Sean Nikkel host this special edition of ShadowTalk. They are joined by special guest CEO and Founder at SCYTHE, Bryson Bort. They discuss:
    - Bryson’s origin story and his experiences with the U.S. Army
    - Bryson’s charity work and the famous Unicorn Chef, and many other of Bryson’s alter egos like Cyber Gandalf
    - Threat Intelligence and how adversary emulation can complement it Purple team exercises
  • [Podcast] Bryson Bort, Cyber Gandalf and MORE! Recorded: Sep 9 2021 50 mins
    CISO Rick Holland, Sean Nikkel, Bryson Bort
    Digital Shadow’s CISO Rick Holland and Senior Cyber Threat Intel Analyst Sean Nikkel host this special edition of ShadowTalk. They are joined by special guest CEO and Founder at SCYTHE, Bryson Bort. They discuss:
    - Bryson’s origin story and his experiences with the U.S. Army
    - Bryson’s charity work and the famous Unicorn Chef, and many other of Bryson’s alter egos like Cyber Gandalf
    - Threat Intelligence and how adversary emulation can complement it Purple team exercises
  • Podcast: Prometheus, Ransomware Updates, and Microsoft Morse Code Recorded: Aug 27 2021 35 mins
    Digital Shadows Threat Researchers Adam Cook, Chris Morgan, Kim Bromley
    ShadowTalk hosts Adam, Chris, and Kim bring you the latest in threat intelligence. This week they cover:

    - Malicious use of TDS and the newly reported Prometheus TDS
    - Ransomware updates: Synack release decryption key and Vice Society targets PrintNightmare
    - The Microsoft phishing campaign that utilized morse code as an encryption mechanism
  • Podcast: Phishing Site Targets Scammers, $600 Million Crypto Hack and MORE! Recorded: Aug 20 2021 30 mins
    Sean Nikkel, Ivan Righi, Charles Ragland, Rick Holland
    ShadowTalk hosts Sean, Ivan, Charles, and CISO Rick Holland bring you the latest in threat intelligence. This week they cover:

    - CISO Rick Holland touches on the latest news on AlphaBay - could the forum be back?
    - The team chat about LockBit’s big hit on Accenture
    - Charles runs through Krebs Security run-in with a scammer who had been targeted by a phishing site for BriansClub
    - Ivan talks about the Chinese espionage group that pulled a false flag to Iran and Israel
    - Sean delves into the latest news on the $600 Million crypto hack
  • Podcast: Wiper Malware Targets Olympics, MeteorExpress, PwnedPiper and Hopper! Recorded: Aug 13 2021 1 min
    Digital Shadows Threat Researchers, Adam Cook, Dylan Gray and Kim Bromley
    ShadowTalk hosts Adam, Dylan and Kim bring you the latest in threat intelligence. This week they cover:
    - Recent Wiper malware targeting the 2020 Tokyo Olympics
    - Dylan dives into the MeteorExpress attack, which targeted Iranian transport systems
    - Kim runs through PwnedPiper vulnerabilities that impact pneumatic tube systems in hospitals - could this lead to a ransomware attack?
    - Adam and the team discuss a new machine learning security tool called Hopper, which is used to
    detect lateral movement - before discussing the future of machine learning and AI in cyber security
    - Plus, the team answers some of your questions!
The Leader in Digital Risk Protection
Digital Shadows SearchLight protects organizations against external risk exposure. Organizations register their company names, brand names, domains, and document marketings for monitoring. Through the SearchLight portal, we provide the most relevant and critical digital risks with complete visibility, context, recommended actions, and ways to remediate the risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Podcast: Microsoft Exchange attribution, NSO Spyware, Zero-days, and Clippy
  • Live at: Jul 30 2021 2:00 pm
  • Presented by: Digital Shadows Threat Researchers, Stefano De Blasi, Saul Burban, Rory Donovan and Kim Bromley
  • From:
Your email has been sent.
or close