<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <atom:link href="https://feeds.megaphone.fm/cyberwire-research-saturday" rel="self" type="application/rss+xml"/>
    <title>Research Saturday</title>
    <link>https://thecyberwire.com/podcasts/research-saturday</link>
    <language>en</language>
    <copyright>© 2024 N2K Networks, Inc. 706761</copyright>
    <description>Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.</description>
    <image>
      <url>https://megaphone.imgix.net/podcasts/720fb496-dcfb-11ea-a475-bbdae30535a9/image/research-saturday-cover-art-cw.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress</url>
      <title>Research Saturday</title>
      <link>https://thecyberwire.com/podcasts/research-saturday</link>
    </image>
    <itunes:explicit>no</itunes:explicit>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle></itunes:subtitle>
    <itunes:author>N2K Networks</itunes:author>
    <itunes:summary>Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.</itunes:summary>
    <content:encoded>
      <![CDATA[<p>Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.</p>]]>
    </content:encoded>
    <itunes:owner>
      <itunes:name>N2K Networks Inc.</itunes:name>
      <itunes:email>producer@n2k.com</itunes:email>
    </itunes:owner>
    <itunes:image href="https://megaphone.imgix.net/podcasts/720fb496-dcfb-11ea-a475-bbdae30535a9/image/research-saturday-cover-art-cw.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
    <itunes:category text="Technology">
    </itunes:category>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
    </itunes:category>
    <item>
      <title>The spy who logged me in.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/424/notes</link>
      <description>Mark Kelly, Staff Threat Researcher at Proofpoint, is discussing their work on "I’d come running back to EU again: TA416 resumes European government espionage campaigns." China-linked threat group TA416 has resumed large-scale phishing and malware campaigns targeting European governments, diplomatic missions tied to the EU and NATO, and more recently Middle Eastern entities following the outbreak of conflict in Iran. 

The group has continually evolved its tactics between mid-2025 and early 2026, using techniques like fake Cloudflare verification pages, Microsoft OAuth redirect abuse, and malicious C# project files to deliver customized PlugX malware through spearphishing campaigns. Researchers say the renewed activity reflects shifting geopolitical priorities tied to EU-China tensions, the Russia-Ukraine war, and instability in the Middle East, while highlighting TA416’s ongoing focus on intelligence gathering against diplomatic networks.

The research and executive brief can be found here:


  
I’d come running back to EU again: TA416 resumes European government espionage campaigns 


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 May 2026 05:00:00 -0000</pubDate>
      <itunes:title>The spy who logged me in.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>424</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Mark Kelly, Staff Threat Researcher at Proofpoint, is discussing their work on "I’d come running back to EU again: TA416 resumes European government espionage campaigns." China-linked threat group TA416 has resumed large-scale phishing and malware campaigns targeting European governments, diplomatic missions tied to the EU and NATO, and more recently Middle Eastern entities following the outbreak of conflict in Iran. 

The group has continually evolved its tactics between mid-2025 and early 2026, using techniques like fake Cloudflare verification pages, Microsoft OAuth redirect abuse, and malicious C# project files to deliver customized PlugX malware through spearphishing campaigns. Researchers say the renewed activity reflects shifting geopolitical priorities tied to EU-China tensions, the Russia-Ukraine war, and instability in the Middle East, while highlighting TA416’s ongoing focus on intelligence gathering against diplomatic networks.

The research and executive brief can be found here:


  
I’d come running back to EU again: TA416 resumes European government espionage campaigns 


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/mark-kelly-cti/">Mark Kelly</a>, Staff Threat Researcher at <a href="https://www.proofpoint.com/us">Proofpoint</a>, is discussing their work on "I’d come running back to EU again: TA416 resumes European government espionage campaigns." China-linked threat group TA416 has resumed large-scale phishing and malware campaigns targeting European governments, diplomatic missions tied to the EU and NATO, and more recently Middle Eastern entities following the outbreak of conflict in Iran. </p>
<p>The group has continually evolved its tactics between mid-2025 and early 2026, using techniques like fake Cloudflare verification pages, Microsoft OAuth redirect abuse, and malicious C# project files to deliver customized PlugX malware through spearphishing campaigns. Researchers say the renewed activity reflects shifting geopolitical priorities tied to EU-China tensions, the Russia-Ukraine war, and instability in the Middle East, while highlighting TA416’s ongoing focus on intelligence gathering against diplomatic networks.</p>
<p><strong>The research and executive brief can be found here:</strong></p>
<ul>
  <li>
<a href="https://www.proofpoint.com/us/blog/threat-insight/id-come-running-back-eu-again-ta416-resumes-european-government-espionage">I’d come running back to EU again: TA416 resumes European government espionage campaigns</a> </li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1443</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a3a5b9cc-1164-11f0-a530-e3f25adfc288]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3816953948.mp3?updated=1778253811" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Double-edged threat.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/423/notes</link>
      <description>Today we are joined by Justin Albrecht, Principal Researcher at Lookout, discussing "Attackers Wielding DarkSword Threaten iOS Users." DarkSword is a highly sophisticated iOS exploit chain discovered by Lookout that targets iPhones (iOS 18.4–18.6.2), enabling near zero-click compromise and rapid theft of sensitive data, including credentials and cryptocurrency wallet information. 

Likely deployed by a Russia-linked threat actor (UNC6353) against Ukrainian users, it uses watering hole attacks on compromised websites and operates in a “hit-and-run” fashion—exfiltrating data within minutes before wiping traces. The campaign highlights a growing secondary market for advanced exploits, allowing financially motivated groups to access powerful tools once reserved for state actors, significantly expanding the mobile threat landscape.

The research and executive brief can be found here:


  
⁠Attackers Wielding DarkSword Threaten iOS Users



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 May 2026 05:00:00 -0000</pubDate>
      <itunes:title>Double-edged threat.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>423</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Today we are joined by Justin Albrecht, Principal Researcher at Lookout, discussing "Attackers Wielding DarkSword Threaten iOS Users." DarkSword is a highly sophisticated iOS exploit chain discovered by Lookout that targets iPhones (iOS 18.4–18.6.2), enabling near zero-click compromise and rapid theft of sensitive data, including credentials and cryptocurrency wallet information. 

Likely deployed by a Russia-linked threat actor (UNC6353) against Ukrainian users, it uses watering hole attacks on compromised websites and operates in a “hit-and-run” fashion—exfiltrating data within minutes before wiping traces. The campaign highlights a growing secondary market for advanced exploits, allowing financially motivated groups to access powerful tools once reserved for state actors, significantly expanding the mobile threat landscape.

The research and executive brief can be found here:


  
⁠Attackers Wielding DarkSword Threaten iOS Users



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we are joined by <a href="https://www.linkedin.com/in/justin-albrecht-64099617b/">Justin Albrecht</a>, Principal Researcher at <a href="https://www.lookout.com/">Lookout</a>, discussing "Attackers Wielding DarkSword Threaten iOS Users." DarkSword is a highly sophisticated iOS exploit chain discovered by Lookout that targets iPhones (iOS 18.4–18.6.2), enabling near zero-click compromise and rapid theft of sensitive data, including credentials and cryptocurrency wallet information. </p>
<p>Likely deployed by a Russia-linked threat actor (UNC6353) against Ukrainian users, it uses watering hole attacks on compromised websites and operates in a “hit-and-run” fashion—exfiltrating data within minutes before wiping traces. The campaign highlights a growing secondary market for advanced exploits, allowing financially motivated groups to access powerful tools once reserved for state actors, significantly expanding the mobile threat landscape.</p>
<p><strong>The research and executive brief can be found here:</strong></p>
<ul>
  <li>
<a href="https://blog.7ai.com/quish-splash-when-the-qr-code-is-the-weapon-a-multi-wave-phishing-campaign-that-slipped-past-every-filter">⁠</a><a href="https://www.lookout.com/threat-intelligence/article/darksword">Attackers Wielding DarkSword Threaten iOS Users</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1851</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a37df37e-1164-11f0-a530-234f62833702]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2114196118.mp3?updated=1777650720" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A QRazy clever scam. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/422/notes</link>
      <description>This week, we are joined by Juliana Testa, Senior Security Engineer from 7AI, sharing their work on "Quish Splash - When the QR Code Is the Weapon: A Multi-Wave Phishing Campaign That Slipped Past Every Filter." A large-scale “quishing” campaign used QR codes embedded in image attachments to hide phishing URLs, allowing 28 out of 33 emails to bypass SPF, DKIM, DMARC, and Microsoft Defender and land directly in inboxes. 

Each recipient received a unique QR code and tracking ID, defeating traditional detection methods and enabling attackers to scale the campaign to over 1.6 million emails across multiple organizations while shifting execution to less-secure mobile devices. The attack was ultimately uncovered through AI-driven alerting combined with human analysis and threat hunting, highlighting a major blind spot in email security and the need for QR code inspection, mobile protections, and tighter auto-reply controls.

The research and executive brief can be found here:


  Quish Splash - When the QR Code Is the Weapon: A Multi-Wave Phishing Campaign That Slipped Past Every Filter.


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Apr 2026 05:00:00 -0000</pubDate>
      <itunes:title>A QRazy clever scam. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>422</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Juliana Testa, Senior Security Engineer from 7AI, sharing their work on "Quish Splash - When the QR Code Is the Weapon: A Multi-Wave Phishing Campaign That Slipped Past Every Filter." A large-scale “quishing” campaign used QR codes embedded in image attachments to hide phishing URLs, allowing 28 out of 33 emails to bypass SPF, DKIM, DMARC, and Microsoft Defender and land directly in inboxes. 

Each recipient received a unique QR code and tracking ID, defeating traditional detection methods and enabling attackers to scale the campaign to over 1.6 million emails across multiple organizations while shifting execution to less-secure mobile devices. The attack was ultimately uncovered through AI-driven alerting combined with human analysis and threat hunting, highlighting a major blind spot in email security and the need for QR code inspection, mobile protections, and tighter auto-reply controls.

The research and executive brief can be found here:


  Quish Splash - When the QR Code Is the Weapon: A Multi-Wave Phishing Campaign That Slipped Past Every Filter.


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/juliana-testa/">Juliana Testa</a>, Senior Security Engineer from <a href="https://7ai.com/">7AI</a>, sharing their work on "Quish Splash - When the QR Code Is the Weapon: A Multi-Wave Phishing Campaign That Slipped Past Every Filter." A large-scale “quishing” campaign used QR codes embedded in image attachments to hide phishing URLs, allowing 28 out of 33 emails to bypass SPF, DKIM, DMARC, and Microsoft Defender and land directly in inboxes. </p>
<p>Each recipient received a unique QR code and tracking ID, defeating traditional detection methods and enabling attackers to scale the campaign to over 1.6 million emails across multiple organizations while shifting execution to less-secure mobile devices. The attack was ultimately uncovered through AI-driven alerting combined with human analysis and threat hunting, highlighting a major blind spot in email security and the need for QR code inspection, mobile protections, and tighter auto-reply controls.</p>
<p><strong>The research and executive brief can be found here:</strong></p>
<ul>
  <li><a href="https://blog.7ai.com/quish-splash-when-the-qr-code-is-the-weapon-a-multi-wave-phishing-campaign-that-slipped-past-every-filter">Quish Splash - When the QR Code Is the Weapon: A Multi-Wave Phishing Campaign That Slipped Past Every Filter.</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1133</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a357fdd6-1164-11f0-a530-dfbd60dc35d1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8100628337.mp3?updated=1776965642" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A new breed of RAT.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/421/notes</link>
      <description>Today we are joined by Dr. Darren Williams, Founder and CEO of BlackFog, to discuss his team's work on "Steaelite RAT Enables Double Extortion Attacks from a Single Panel." A new remote access trojan, Steaelite, is being marketed on underground forums as an all-in-one platform that combines remote access, credential theft, surveillance, and ransomware deployment through a single browser-based dashboard. 

Unlike traditional cybercrime toolchains, it merges data exfiltration and ransomware capabilities into one interface, with automated credential harvesting beginning as soon as a victim is infected. The tool signals a growing shift toward streamlined “double extortion” attacks, where data theft and encryption happen within the same system—raising the stakes for defenders to stop threats before data is exfiltrated.

The research and executive brief can be found here:


  Steaelite RAT Enables Double Extortion Attacks from a Single Panel


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Apr 2026 05:00:00 -0000</pubDate>
      <itunes:title>A new breed of RAT.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>421</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Today we are joined by Dr. Darren Williams, Founder and CEO of BlackFog, to discuss his team's work on "Steaelite RAT Enables Double Extortion Attacks from a Single Panel." A new remote access trojan, Steaelite, is being marketed on underground forums as an all-in-one platform that combines remote access, credential theft, surveillance, and ransomware deployment through a single browser-based dashboard. 

Unlike traditional cybercrime toolchains, it merges data exfiltration and ransomware capabilities into one interface, with automated credential harvesting beginning as soon as a victim is infected. The tool signals a growing shift toward streamlined “double extortion” attacks, where data theft and encryption happen within the same system—raising the stakes for defenders to stop threats before data is exfiltrated.

The research and executive brief can be found here:


  Steaelite RAT Enables Double Extortion Attacks from a Single Panel


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we are joined by <a href="https://www.linkedin.com/in/darrenwwilliams/">Dr. Darren Williams</a>, Founder and CEO of <a href="https://www.blackfog.com/">BlackFog</a>, to discuss his team's work on "Steaelite RAT Enables Double Extortion Attacks from a Single Panel." A new remote access trojan, Steaelite, is being marketed on underground forums as an all-in-one platform that combines remote access, credential theft, surveillance, and ransomware deployment through a single browser-based dashboard. </p>
<p>Unlike traditional cybercrime toolchains, it merges data exfiltration and ransomware capabilities into one interface, with automated credential harvesting beginning as soon as a victim is infected. The tool signals a growing shift toward streamlined “double extortion” attacks, where data theft and encryption happen within the same system—raising the stakes for defenders to stop threats before data is exfiltrated.</p>
<p><strong>The research and executive brief can be found here:</strong></p>
<ul>
  <li><a href="https://www.blackfog.com/steaelite-rat-double-extortion-from-single-panel/">Steaelite RAT Enables Double Extortion Attacks from a Single Panel</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1312</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a3311586-1164-11f0-a530-47ee5e1cabe8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8137946432.mp3?updated=1776448577" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A wolf in admin clothing.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/420/notes</link>
      <description>Today we are joined by Selena Larson, Threat Researcher from Proofpoint  research team and co-host of Only Malware in the Building, talking about their work on "(Don't) TrustConnect: It's a RAT in an RMM hat." Proofpoint uncovered TrustConnect, a malware-as-a-service platform posing as a legitimate remote monitoring and management (RMM) tool, but actually functioning as a remote access trojan (RAT) sold to cybercriminals for $300/month. 

The operation used a fake business website, legitimate-looking certificates, and branded installers (like fake Microsoft Teams or Zoom apps) to trick victims, while providing attackers with full remote control, file transfer, and surveillance capabilities. Although parts of its infrastructure were disrupted, the threat actor quickly rebounded with new variants, highlighting both the resilience of the operation and its deep ties to the broader cybercriminal ecosystem abusing RMM tools.

The research and executive brief can be found here:


  (Don't) TrustConnect: It's a RAT in an RMM hat


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Apr 2026 05:00:00 -0000</pubDate>
      <itunes:title>A wolf in admin clothing.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>420</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Today we are joined by Selena Larson, Threat Researcher from Proofpoint  research team and co-host of Only Malware in the Building, talking about their work on "(Don't) TrustConnect: It's a RAT in an RMM hat." Proofpoint uncovered TrustConnect, a malware-as-a-service platform posing as a legitimate remote monitoring and management (RMM) tool, but actually functioning as a remote access trojan (RAT) sold to cybercriminals for $300/month. 

The operation used a fake business website, legitimate-looking certificates, and branded installers (like fake Microsoft Teams or Zoom apps) to trick victims, while providing attackers with full remote control, file transfer, and surveillance capabilities. Although parts of its infrastructure were disrupted, the threat actor quickly rebounded with new variants, highlighting both the resilience of the operation and its deep ties to the broader cybercriminal ecosystem abusing RMM tools.

The research and executive brief can be found here:


  (Don't) TrustConnect: It's a RAT in an RMM hat


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we are joined by <a href="https://www.linkedin.com/in/selenalarson/">Selena Larson</a>, Threat Researcher from <a href="https://www.linkedin.com/company/proofpoint/">Proofpoint</a>  research team and co-host of <a href="https://thecyberwire.com/podcasts/only-malware-in-the-building">Only Malware in the Building</a>, talking about their work on "(Don't) TrustConnect: It's a RAT in an RMM hat." Proofpoint uncovered TrustConnect, a malware-as-a-service platform posing as a legitimate remote monitoring and management (RMM) tool, but actually functioning as a remote access trojan (RAT) sold to cybercriminals for $300/month. </p>
<p>The operation used a fake business website, legitimate-looking certificates, and branded installers (like fake Microsoft Teams or Zoom apps) to trick victims, while providing attackers with full remote control, file transfer, and surveillance capabilities. Although parts of its infrastructure were disrupted, the threat actor quickly rebounded with new variants, highlighting both the resilience of the operation and its deep ties to the broader cybercriminal ecosystem abusing RMM tools.</p>
<p><strong>The research and executive brief can be found here:</strong></p>
<ul>
  <li><a href="https://www.proofpoint.com/us/blog/threat-insight/dont-trustconnect-its-a-rat">(Don't) TrustConnect: It's a RAT in an RMM hat</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1484</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a30a3da8-1164-11f0-a530-c3507c900f03]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8774977559.mp3?updated=1775842418" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Startup surge sparks spy interest.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/419/notes</link>
      <description>This week, we are joined by Santiago Pontiroli, Threat Intelligence Research Lead from Acronis TRU team, discussing their work on "New year, new sector: Transparent Tribe targets India’s startup ecosystem." The Acronis Threat Research Unit uncovered a new campaign by Transparent Tribe showing the group has expanded beyond traditional government and defense targets to India’s startup ecosystem, especially cybersecurity and OSINT-focused firms. 

The attackers use startup-themed lures delivered via ISO files and malicious shortcuts to deploy Crimson RAT, a highly obfuscated tool capable of surveillance, data theft, and system control. Despite this shift, the campaign closely mirrors the group’s long-standing espionage tactics, suggesting startups are being targeted for their connections to government, law enforcement, and sensitive intelligence networks.

The research and executive brief can be found here:


  New year, new sector: Transparent Tribe targets India’s startup ecosystem


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Apr 2026 05:00:00 -0000</pubDate>
      <itunes:title>Startup surge sparks spy interest.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>419</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Santiago Pontiroli, Threat Intelligence Research Lead from Acronis TRU team, discussing their work on "New year, new sector: Transparent Tribe targets India’s startup ecosystem." The Acronis Threat Research Unit uncovered a new campaign by Transparent Tribe showing the group has expanded beyond traditional government and defense targets to India’s startup ecosystem, especially cybersecurity and OSINT-focused firms. 

The attackers use startup-themed lures delivered via ISO files and malicious shortcuts to deploy Crimson RAT, a highly obfuscated tool capable of surveillance, data theft, and system control. Despite this shift, the campaign closely mirrors the group’s long-standing espionage tactics, suggesting startups are being targeted for their connections to government, law enforcement, and sensitive intelligence networks.

The research and executive brief can be found here:


  New year, new sector: Transparent Tribe targets India’s startup ecosystem


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/spontiroli/">Santiago Pontiroli</a>, Threat Intelligence Research Lead from <a href="https://www.linkedin.com/company/acronis/">Acronis</a> TRU team, discussing their work on "New year, new sector: Transparent Tribe targets India’s startup ecosystem." The Acronis Threat Research Unit uncovered a new campaign by Transparent Tribe showing the group has expanded beyond traditional government and defense targets to India’s startup ecosystem, especially cybersecurity and OSINT-focused firms. </p>
<p>The attackers use startup-themed lures delivered via ISO files and malicious shortcuts to deploy Crimson RAT, a highly obfuscated tool capable of surveillance, data theft, and system control. Despite this shift, the campaign closely mirrors the group’s long-standing espionage tactics, suggesting startups are being targeted for their connections to government, law enforcement, and sensitive intelligence networks.</p>
<p><strong>The research and executive brief can be found here:</strong></p>
<ul>
  <li><a href="https://www.acronis.com/en/tru/posts/new-year-new-sector-transparent-tribe-targets-indias-startup-ecosystem/">New year, new sector: Transparent Tribe targets India’s startup ecosystem</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1155</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a2e19a1a-1164-11f0-a530-1778e6e48175]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8859278701.mp3?updated=1775232742" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When “safe” documents aren’t.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/418/notes</link>
      <description>Omer Ninburg, CTO of Novee Security, joins us on this episode of Research Saturday to discuss their work on "From PDF to Pwn: Scalable 0day Discovery in PDF Engines and Services Using Multi-Agent LLMs." Historically, Portable Document Formats – the immutable, localized PDF – was once considered a “safe” component inside enterprise environments. That is no longer the case.

To demonstrate how PDF services and engines can be exploited, the team at Novee used their proprietary, multi-agent LLM system to uncover vulnerability patterns, and systematically scale them into a broad discovery campaign across two PDF vendor ecosystems.

The research uncovered 16 verified vulnerabilities across client-side PDF viewers, embedded plugins, and server-side PDF services.



The research and executive brief can be found here:


  ⁠From PDF to Pwn: Scalable 0day Discovery in PDF Engines and Services Using Multi-Agent LLMs


  Hacker-Trained AI Discovers 16 New 0-Day Vulnerabilities in PDF Engines


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Mar 2026 05:00:00 -0000</pubDate>
      <itunes:title>When “safe” documents aren’t.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>418</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a2baffb8-1164-11f0-a530-6bcc20f0f523/image/8f3cd4038c81bba2a8ea4ca89f3e23c4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Omer Ninburg, CTO of Novee Security, joins us on this episode of Research Saturday to discuss their work on "From PDF to Pwn: Scalable 0day Discovery in PDF Engines and Services Using Multi-Agent LLMs." Historically, Portable Document Formats – the immutable, localized PDF – was once considered a “safe” component inside enterprise environments. That is no longer the case.

To demonstrate how PDF services and engines can be exploited, the team at Novee used their proprietary, multi-agent LLM system to uncover vulnerability patterns, and systematically scale them into a broad discovery campaign across two PDF vendor ecosystems.

The research uncovered 16 verified vulnerabilities across client-side PDF viewers, embedded plugins, and server-side PDF services.



The research and executive brief can be found here:


  ⁠From PDF to Pwn: Scalable 0day Discovery in PDF Engines and Services Using Multi-Agent LLMs


  Hacker-Trained AI Discovers 16 New 0-Day Vulnerabilities in PDF Engines


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/omer-ninburg-941b4b85/">Omer Ninburg</a>, CTO of <a href="https://novee.security/">Novee Security</a>, joins us on this episode of Research Saturday to discuss their work on "From PDF to Pwn: Scalable 0day Discovery in PDF Engines and Services Using Multi-Agent LLMs." Historically, Portable Document Formats – the immutable, localized PDF – was once considered a “safe” component inside enterprise environments. That is no longer the case.</p>
<p>To demonstrate how PDF services and engines can be exploited, the team at Novee used their proprietary, multi-agent LLM system to uncover vulnerability patterns, and systematically scale them into a broad discovery campaign across two PDF vendor ecosystems.</p>
<p>The research uncovered 16 verified vulnerabilities across client-side PDF viewers, embedded plugins, and server-side PDF services.</p>
<p><br></p>
<p><strong>The research and executive brief can be found here:</strong></p>
<ul>
  <li>⁠<a href="https://novee.security/blog/from-pdf-to-pwn-scalable-0day-discovery-in-pdf-engines-and-services-using-multi-agent-llms-2/">From PDF to Pwn: Scalable 0day Discovery in PDF Engines and Services Using Multi-Agent LLMs</a>
</li>
  <li><a href="https://novee.security/blog/hacker-trained-ai-discovers-16-new-0-day-vulnerabilities-in-pdf-engines/">Hacker-Trained AI Discovers 16 New 0-Day Vulnerabilities in PDF Engines</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1263</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a2baffb8-1164-11f0-a530-6bcc20f0f523]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2925735484.mp3?updated=1774547657" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A subtle flaw, a massive blast radius.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/417/notes</link>
      <description>Yuval Avrahami from Wiz joins to share their work on "CodeBreach: Infiltrating the AWS Console Supply Chain and Hijacking AWS GitHub Repositories via CodeBuild."  Wiz Research uncovered “CodeBreach,” a critical supply chain vulnerability caused by a subtle misconfiguration in AWS CodeBuild pipelines that allowed attackers to take over key GitHub repositories, including the widely used AWS JavaScript SDK that powers the AWS Console. 

By exploiting an unanchored regex filter, unauthenticated attackers could trigger privileged builds, steal credentials, and potentially inject malicious code into software used across a majority of cloud environments. AWS has since remediated the issue and introduced stronger safeguards, but the incident highlights a growing trend of attackers targeting CI/CD pipelines where small misconfigurations can lead to massive downstream impact.

The research can be found here:


  CodeBreach: Infiltrating the AWS Console Supply Chain and Hijacking AWS GitHub Repositories via CodeBuild


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Mar 2026 05:00:00 -0000</pubDate>
      <itunes:title>A subtle flaw, a massive blast radius.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>417</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Yuval Avrahami from Wiz joins to share their work on "CodeBreach: Infiltrating the AWS Console Supply Chain and Hijacking AWS GitHub Repositories via CodeBuild."  Wiz Research uncovered “CodeBreach,” a critical supply chain vulnerability caused by a subtle misconfiguration in AWS CodeBuild pipelines that allowed attackers to take over key GitHub repositories, including the widely used AWS JavaScript SDK that powers the AWS Console. 

By exploiting an unanchored regex filter, unauthenticated attackers could trigger privileged builds, steal credentials, and potentially inject malicious code into software used across a majority of cloud environments. AWS has since remediated the issue and introduced stronger safeguards, but the incident highlights a growing trend of attackers targeting CI/CD pipelines where small misconfigurations can lead to massive downstream impact.

The research can be found here:


  CodeBreach: Infiltrating the AWS Console Supply Chain and Hijacking AWS GitHub Repositories via CodeBuild


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/yuval-avrahami-25139416b/">Yuval Avrahami</a> from <a href="https://www.linkedin.com/company/wizsecurity/">Wiz</a> joins to share their work on "CodeBreach: Infiltrating the AWS Console Supply Chain and Hijacking AWS GitHub Repositories via CodeBuild."  Wiz Research uncovered “CodeBreach,” a critical supply chain vulnerability caused by a subtle misconfiguration in AWS CodeBuild pipelines that allowed attackers to take over key GitHub repositories, including the widely used AWS JavaScript SDK that powers the AWS Console. </p>
<p>By exploiting an unanchored regex filter, unauthenticated attackers could trigger privileged builds, steal credentials, and potentially inject malicious code into software used across a majority of cloud environments. AWS has since remediated the issue and introduced stronger safeguards, but the incident highlights a growing trend of attackers targeting CI/CD pipelines where small misconfigurations can lead to massive downstream impact.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.wiz.io/blog/wiz-research-codebreach-vulnerability-aws-codebuild">CodeBreach: Infiltrating the AWS Console Supply Chain and Hijacking AWS GitHub Repositories via CodeBuild</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1038</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a294c1f4-1164-11f0-a530-87d9be25495d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1689945789.mp3?updated=1774025676" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Your AI sidekick might be a spy.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/416/notes</link>
      <description>This week, we are joined by Or Eshed, Co-Founder and CEO from LayerX Security, discussing their work on "How We Discovered A Campaign of 16 Malicious Extensions Built to Steal ChatGPT Accounts." Researchers uncovered a coordinated campaign of 16 malicious browser extensions posing as ChatGPT productivity tools while secretly stealing user accounts. 

The extensions intercept ChatGPT session authentication tokens and send them to attacker-controlled servers, allowing threat actors to impersonate users and access their conversations, files, and connected services like Google Drive or Slack. The findings highlight how AI-focused browser extensions are creating a new attack surface, emphasizing the need for organizations to closely monitor and restrict third-party AI tools.

The research can be found here:


  
⁠⁠⁠How We Discovered A Campaign of 16 Malicious Extensions Built to Steal ChatGPT Accounts



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Mar 2026 05:00:00 -0000</pubDate>
      <itunes:title>Your AI sidekick might be a spy.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>416</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a26d7054-1164-11f0-a530-cf9caeb70ca9/image/8f3cd4038c81bba2a8ea4ca89f3e23c4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Or Eshed, Co-Founder and CEO from LayerX Security, discussing their work on "How We Discovered A Campaign of 16 Malicious Extensions Built to Steal ChatGPT Accounts." Researchers uncovered a coordinated campaign of 16 malicious browser extensions posing as ChatGPT productivity tools while secretly stealing user accounts. 

The extensions intercept ChatGPT session authentication tokens and send them to attacker-controlled servers, allowing threat actors to impersonate users and access their conversations, files, and connected services like Google Drive or Slack. The findings highlight how AI-focused browser extensions are creating a new attack surface, emphasizing the need for organizations to closely monitor and restrict third-party AI tools.

The research can be found here:


  
⁠⁠⁠How We Discovered A Campaign of 16 Malicious Extensions Built to Steal ChatGPT Accounts



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/or-eshed/">Or Eshed</a>, Co-Founder and CEO from <a href="https://www.linkedin.com/company/layerx-security/">LayerX Security</a>, discussing their work on "How We Discovered A Campaign of 16 Malicious Extensions Built to Steal ChatGPT Accounts." Researchers uncovered a coordinated campaign of 16 malicious browser extensions posing as ChatGPT productivity tools while secretly stealing user accounts. </p>
<p>The extensions intercept ChatGPT session authentication tokens and send them to attacker-controlled servers, allowing threat actors to impersonate users and access their conversations, files, and connected services like Google Drive or Slack. The findings highlight how AI-focused browser extensions are creating a new attack surface, emphasizing the need for organizations to closely monitor and restrict third-party AI tools.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://www.infoblox.com/blog/threat-intelligence/parked-domains-become-weapons-with-direct-search-advertising/">⁠⁠⁠</a><a href="https://layerxsecurity.com/blog/how-we-discovered-a-campaign-of-16-malicious-extensions-chatgpt/">How We Discovered A Campaign of 16 Malicious Extensions Built to Steal ChatGPT Accounts</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1367</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a26d7054-1164-11f0-a530-cf9caeb70ca9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9854407143.mp3?updated=1773268372" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The scareware rabbit hole.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/415/notes</link>
      <description>This week we are joined by Marcelle Lee, cybersecurity consultant and researcher, discussing "CTI tradecraft: Investigating a mobile scareware campaign." She details how a routine click on a Google News story led to a mobile scareware pop-up—and a deeper investigation into a broader campaign.

Using free tools like Censys, URLScan, VirusTotal, and CyberChef, she pivoted from two domains to uncover more than 100 related domains, shared infrastructure, and links to questionable antivirus apps in the Google Play Store. The findings are mapped to the MITRE ATT&amp;CK framework, showing how freely available resources can power meaningful, actionable threat intelligence.

The research can be found here:


  
⁠CTI tradecraft: Investigating a mobile scareware campaign



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Mar 2026 06:00:00 -0000</pubDate>
      <itunes:title>The scareware rabbit hole.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>415</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by Marcelle Lee, cybersecurity consultant and researcher, discussing "CTI tradecraft: Investigating a mobile scareware campaign." She details how a routine click on a Google News story led to a mobile scareware pop-up—and a deeper investigation into a broader campaign.

Using free tools like Censys, URLScan, VirusTotal, and CyberChef, she pivoted from two domains to uncover more than 100 related domains, shared infrastructure, and links to questionable antivirus apps in the Google Play Store. The findings are mapped to the MITRE ATT&amp;CK framework, showing how freely available resources can power meaningful, actionable threat intelligence.

The research can be found here:


  
⁠CTI tradecraft: Investigating a mobile scareware campaign



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by <a href="https://www.linkedin.com/in/marcellelee/">Marcelle Lee</a>, cybersecurity consultant and researcher, discussing "CTI tradecraft: Investigating a mobile scareware campaign." She details how a routine click on a Google News story led to a mobile scareware pop-up—and a deeper investigation into a broader campaign.</p>
<p>Using free tools like Censys, URLScan, VirusTotal, and CyberChef, she pivoted from two domains to uncover more than 100 related domains, shared infrastructure, and links to questionable antivirus apps in the Google Play Store. The findings are mapped to the MITRE ATT&amp;CK framework, showing how freely available resources can power meaningful, actionable threat intelligence.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://www.infoblox.com/blog/threat-intelligence/parked-domains-become-weapons-with-direct-search-advertising/">⁠</a><a href="https://feedly.com/ti-essentials/posts/cti-tradecraft-investigating-a-mobile-scareware-campaign?utm_campaign=31864603-q425_ML_campaign_investigation&amp;utm_source=marcelle_post">CTI tradecraft: Investigating a mobile scareware campaign</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1673</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a2461fae-1164-11f0-a530-a7ee2f2a1e86]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1524581446.mp3?updated=1772735397" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The parking lot of digital danger.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/414/notes</link>
      <description>This week we are joined by Dr. Renée Burton, Vice President of Infoblox Threat Intel, discussing "Parked Domains and Direct Search: An Underreported Security Risk." Parked domains are no longer harmless ad pages — new research finds that in today’s “direct search” or zero-click parking ecosystem, more than 90% of visits to certain parked lookalike domains lead to scams, malware, or deceptive content, often hidden behind layers of traffic distribution systems and device fingerprinting. 

The report details three previously unpublished domain portfolio actors who weaponize typosquatting, DNS manipulation — including rare “double fast flux” techniques highlighted in a 2025 advisory from Cybersecurity and Infrastructure Security Agency — and even misconfigured name server records to evade detection and funnel real users toward malicious advertisers. Beyond malvertising, some parked lookalike domains collect misdirected email, fuel business email compromise, and exploit outdated links — including those surfaced by generative AI — underscoring how a simple typo can expose users and enterprises to significant risk.

The research can be found here:


  Parked Domains Become Weapons with Direct Search Advertising


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Feb 2026 06:00:00 -0000</pubDate>
      <itunes:title>The parking lot of digital danger.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>414</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by Dr. Renée Burton, Vice President of Infoblox Threat Intel, discussing "Parked Domains and Direct Search: An Underreported Security Risk." Parked domains are no longer harmless ad pages — new research finds that in today’s “direct search” or zero-click parking ecosystem, more than 90% of visits to certain parked lookalike domains lead to scams, malware, or deceptive content, often hidden behind layers of traffic distribution systems and device fingerprinting. 

The report details three previously unpublished domain portfolio actors who weaponize typosquatting, DNS manipulation — including rare “double fast flux” techniques highlighted in a 2025 advisory from Cybersecurity and Infrastructure Security Agency — and even misconfigured name server records to evade detection and funnel real users toward malicious advertisers. Beyond malvertising, some parked lookalike domains collect misdirected email, fuel business email compromise, and exploit outdated links — including those surfaced by generative AI — underscoring how a simple typo can expose users and enterprises to significant risk.

The research can be found here:


  Parked Domains Become Weapons with Direct Search Advertising


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by <a href="https://www.linkedin.com/in/ren%C3%A9e-burton-b7161110b/">Dr. Renée Burton</a>, Vice President of <a href="https://www.linkedin.com/company/infoblox/">Infoblox</a> Threat Intel, discussing "Parked Domains and Direct Search: An Underreported Security Risk." Parked domains are no longer harmless ad pages — new research finds that in today’s “direct search” or zero-click parking ecosystem, more than 90% of visits to certain parked lookalike domains lead to scams, malware, or deceptive content, often hidden behind layers of traffic distribution systems and device fingerprinting. </p>
<p>The report details three previously unpublished domain portfolio actors who weaponize typosquatting, DNS manipulation — including rare “double fast flux” techniques highlighted in a 2025 advisory from Cybersecurity and Infrastructure Security Agency — and even misconfigured name server records to evade detection and funnel real users toward malicious advertisers. Beyond malvertising, some parked lookalike domains collect misdirected email, fuel business email compromise, and exploit outdated links — including those surfaced by generative AI — underscoring how a simple typo can expose users and enterprises to significant risk.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.infoblox.com/blog/threat-intelligence/parked-domains-become-weapons-with-direct-search-advertising/">Parked Domains Become Weapons with Direct Search Advertising</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1273</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a21f4780-1164-11f0-a530-5f8496e27ada]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3058280928.mp3?updated=1772139699" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Telegram for the throne.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/413/notes</link>
      <description>Today we have Tomer Bar, VP of Security Research at SafeBreach Labs, discussing their work on "Prince of Persia: A Decade of Iranian Nation-State APT Campaign Activity under the Microscope". In this first installment of SafeBreach’s deep dive into the Iranian-linked APT known as “Prince of Persia,” originally exposed by Palo Alto Networks Unit 42, researchers reveal that the group never truly went dark after 2022—but instead evolved. 

Led by Tomer, the investigation uncovers new variants of Foudre and Tonnerre malware, expanded campaign scale, active C2 infrastructure through late 2025, and a shift toward Telegram-based command-and-control. The research provides rare, sustained visibility into nearly a decade of Iranian nation-state cyber operations, offering fresh indicators of compromise and insight into how the group continues to refine its tooling, obfuscation, and targeting.

The research can be found here:


  Prince of Persia, Part 1: A Decade of Iranian Nation-State APT Campaign Activity under the Microscope


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Feb 2026 06:00:00 -0000</pubDate>
      <itunes:title>Telegram for the throne.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>413</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Today we have Tomer Bar, VP of Security Research at SafeBreach Labs, discussing their work on "Prince of Persia: A Decade of Iranian Nation-State APT Campaign Activity under the Microscope". In this first installment of SafeBreach’s deep dive into the Iranian-linked APT known as “Prince of Persia,” originally exposed by Palo Alto Networks Unit 42, researchers reveal that the group never truly went dark after 2022—but instead evolved. 

Led by Tomer, the investigation uncovers new variants of Foudre and Tonnerre malware, expanded campaign scale, active C2 infrastructure through late 2025, and a shift toward Telegram-based command-and-control. The research provides rare, sustained visibility into nearly a decade of Iranian nation-state cyber operations, offering fresh indicators of compromise and insight into how the group continues to refine its tooling, obfuscation, and targeting.

The research can be found here:


  Prince of Persia, Part 1: A Decade of Iranian Nation-State APT Campaign Activity under the Microscope


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we have <a href="https://www.linkedin.com/in/tomer-bar-878a348b/">Tomer Bar</a>, VP of Security Research at <a href="https://www.linkedin.com/company/safebreach/">SafeBreach</a> Labs, discussing their work on "Prince of Persia: A Decade of Iranian Nation-State APT Campaign Activity under the Microscope". In this first installment of SafeBreach’s deep dive into the Iranian-linked APT known as “Prince of Persia,” originally exposed by Palo Alto Networks Unit 42, researchers reveal that the group never truly went dark after 2022—but instead evolved. </p>
<p>Led by Tomer, the investigation uncovers new variants of Foudre and Tonnerre malware, expanded campaign scale, active C2 infrastructure through late 2025, and a shift toward Telegram-based command-and-control. The research provides rare, sustained visibility into nearly a decade of Iranian nation-state cyber operations, offering fresh indicators of compromise and insight into how the group continues to refine its tooling, obfuscation, and targeting.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.safebreach.com/blog/prince-of-persia-a-decade-of-an-iranian-nation-state-apt-campaign-activity">Prince of Persia, Part 1: A Decade of Iranian Nation-State APT Campaign Activity under the Microscope</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1281</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a1f7e10e-1164-11f0-a530-4b35920f877b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5632994674.mp3?updated=1771539670" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stealer in the status bar.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/412/notes</link>
      <description>Today we have Ziv Mador, VP of Security Research from LevelBlue SpiderLabs discussing their work on "SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp." Researchers at LevelBlue SpiderLabs have identified a new Brazilian banking Trojan dubbed Eternidade Stealer, spread through WhatsApp hijacking and social engineering campaigns that use a Python-based worm to steal contacts and distribute malicious MSI installers. 

The Delphi-compiled malware targets Brazilian victims, profiles infected systems, dynamically retrieves its command-and-control server via IMAP email, and deploys banking overlays to harvest credentials from financial institutions and cryptocurrency platforms. The campaign reflects the continued evolution of Brazil’s cybercrime ecosystem, combining WhatsApp propagation, geofencing, encrypted C2 communications, and process injection to maintain stealth and persistence.

The research can be found here:


  SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Feb 2026 06:00:00 -0000</pubDate>
      <itunes:title>Stealer in the status bar.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>412</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Today we have Ziv Mador, VP of Security Research from LevelBlue SpiderLabs discussing their work on "SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp." Researchers at LevelBlue SpiderLabs have identified a new Brazilian banking Trojan dubbed Eternidade Stealer, spread through WhatsApp hijacking and social engineering campaigns that use a Python-based worm to steal contacts and distribute malicious MSI installers. 

The Delphi-compiled malware targets Brazilian victims, profiles infected systems, dynamically retrieves its command-and-control server via IMAP email, and deploys banking overlays to harvest credentials from financial institutions and cryptocurrency platforms. The campaign reflects the continued evolution of Brazil’s cybercrime ecosystem, combining WhatsApp propagation, geofencing, encrypted C2 communications, and process injection to maintain stealth and persistence.

The research can be found here:


  SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we have <a href="https://www.linkedin.com/in/ziv-mador-a9bab2/">Ziv Mador</a>, VP of Security Research from <a href="https://www.linkedin.com/company/levelbluecyber/">LevelBlue</a> SpiderLabs discussing their work on "SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp." Researchers at LevelBlue SpiderLabs have identified a new Brazilian banking Trojan dubbed Eternidade Stealer, spread through WhatsApp hijacking and social engineering campaigns that use a Python-based worm to steal contacts and distribute malicious MSI installers. </p>
<p>The Delphi-compiled malware targets Brazilian victims, profiles infected systems, dynamically retrieves its command-and-control server via IMAP email, and deploys banking overlays to harvest credentials from financial institutions and cryptocurrency platforms. The campaign reflects the continued evolution of Brazil’s cybercrime ecosystem, combining WhatsApp propagation, geofencing, encrypted C2 communications, and process injection to maintain stealth and persistence.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.levelblue.com/blogs/spiderlabs-blog/spiderlabs-ids-new-banking-trojan-distributed-through-whatsapp/">SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>934</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a1d0035a-1164-11f0-a530-ffcaf0a1bbe7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3731424921.mp3?updated=1770998742" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The phishing kit that thinks like a human.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/411/notes</link>
      <description>Piotr Wojtyla, Head of Threat Intel and Platform at Abnormal AI, is discussing their work on "InboxPrime AI: New Phishing Kit Fueling Scalable, AI-Powered Cybercrime." A new AI-powered phishing kit called InboxPrime AI is rapidly gaining traction in underground forums, automating the creation and delivery of highly believable phishing emails that mimic legitimate business communications and leverage Gmail’s web interface to evade detection. 

First spotted in October 2025, the kit combines AI-generated content, template variation, sender identity spoofing, and built-in spam checks to maximize inbox placement and dramatically lower the barrier to running large-scale phishing campaigns. Its shift to a one-time $1,000 purchase and growing user base underscore the industrialization of phishing and highlight how quickly AI-driven attack tools are outpacing legacy email defenses.

The research can be found here:


  
⁠⁠⁠InboxPrime AI: New Phishing Kit Fueling Scalable, AI-Powered Cybercrime



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Feb 2026 06:00:00 -0000</pubDate>
      <itunes:title>The phishing kit that thinks like a human.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>411</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Piotr Wojtyla, Head of Threat Intel and Platform at Abnormal AI, is discussing their work on "InboxPrime AI: New Phishing Kit Fueling Scalable, AI-Powered Cybercrime." A new AI-powered phishing kit called InboxPrime AI is rapidly gaining traction in underground forums, automating the creation and delivery of highly believable phishing emails that mimic legitimate business communications and leverage Gmail’s web interface to evade detection. 

First spotted in October 2025, the kit combines AI-generated content, template variation, sender identity spoofing, and built-in spam checks to maximize inbox placement and dramatically lower the barrier to running large-scale phishing campaigns. Its shift to a one-time $1,000 purchase and growing user base underscore the industrialization of phishing and highlight how quickly AI-driven attack tools are outpacing legacy email defenses.

The research can be found here:


  
⁠⁠⁠InboxPrime AI: New Phishing Kit Fueling Scalable, AI-Powered Cybercrime



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/piotr-wojtyla/">Piotr Wojtyla</a>, Head of Threat Intel and Platform at <a href="https://www.linkedin.com/company/abnormal-ai/">Abnormal AI</a>, is discussing their work on "InboxPrime AI: New Phishing Kit Fueling Scalable, AI-Powered Cybercrime." A new AI-powered phishing kit called InboxPrime AI is rapidly gaining traction in underground forums, automating the creation and delivery of highly believable phishing emails that mimic legitimate business communications and leverage Gmail’s web interface to evade detection. </p>
<p>First spotted in October 2025, the kit combines AI-generated content, template variation, sender identity spoofing, and built-in spam checks to maximize inbox placement and dramatically lower the barrier to running large-scale phishing campaigns. Its shift to a one-time $1,000 purchase and growing user base underscore the industrialization of phishing and highlight how quickly AI-driven attack tools are outpacing legacy email defenses.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://censys.com/blog/exploiting-funneling-behavior-of-injects">⁠⁠⁠</a><a href="https://abnormal.ai/blog/inboxprime-ai-phishing-kit">InboxPrime AI: New Phishing Kit Fueling Scalable, AI-Powered Cybercrime</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1552</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a1a592b4-1164-11f0-a530-bb6b283f2a49]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1844686249.mp3?updated=1770394301" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The link knows all.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/410/notes</link>
      <description>Muhammad Danish, University of New Mexico lead author and cybersecurity researcher, discussing his team's work on "Private Links, Public Leaks: Consequences of Frictionless User Experience on the Security and Privacy Posture of SMS-Delivered URLs".  This paper examines how the push for frictionless user experiences has led many services to rely on SMS-delivered, single-click URLs—an inherently insecure channel that can be intercepted or leaked. 

Analyzing more than 322,000 unique URLs from 33 million messages, the researchers found widespread security failures, including exposed PII across 701 endpoints at 177 services due to weak, token-based authentication that treats possession of a link as sufficient authorization. The study also identified low-entropy tokens enabling mass URL enumeration and data overfetching issues, though disclosures prompted 18 services to fix flaws, improving privacy protections for at least 120 million users.

The research can be found here:


  
⁠Private Links, Public Leaks: Consequences of Frictionless User Experience on the Security and Privacy Posture of SMS-Delivered URLs



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 31 Jan 2026 06:00:00 -0000</pubDate>
      <itunes:title>The link knows all.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>410</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Muhammad Danish, University of New Mexico lead author and cybersecurity researcher, discussing his team's work on "Private Links, Public Leaks: Consequences of Frictionless User Experience on the Security and Privacy Posture of SMS-Delivered URLs".  This paper examines how the push for frictionless user experiences has led many services to rely on SMS-delivered, single-click URLs—an inherently insecure channel that can be intercepted or leaked. 

Analyzing more than 322,000 unique URLs from 33 million messages, the researchers found widespread security failures, including exposed PII across 701 endpoints at 177 services due to weak, token-based authentication that treats possession of a link as sufficient authorization. The study also identified low-entropy tokens enabling mass URL enumeration and data overfetching issues, though disclosures prompted 18 services to fix flaws, improving privacy protections for at least 120 million users.

The research can be found here:


  
⁠Private Links, Public Leaks: Consequences of Frictionless User Experience on the Security and Privacy Posture of SMS-Delivered URLs



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/cs-maestro/">Muhammad Danish</a>, University of New Mexico lead author and cybersecurity researcher, discussing his team's work on "Private Links, Public Leaks: Consequences of Frictionless User Experience on the Security and Privacy Posture of SMS-Delivered URLs".  This paper examines how the push for frictionless user experiences has led many services to rely on SMS-delivered, single-click URLs—an inherently insecure channel that can be intercepted or leaked. </p>
<p>Analyzing more than 322,000 unique URLs from 33 million messages, the researchers found widespread security failures, including exposed PII across 701 endpoints at 177 services due to weak, token-based authentication that treats possession of a link as sufficient authorization. The study also identified low-entropy tokens enabling mass URL enumeration and data overfetching issues, though disclosures prompted 18 services to fix flaws, improving privacy protections for at least 120 million users.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://censys.com/blog/exploiting-funneling-behavior-of-injects">⁠</a><a href="https://arxiv.org/abs/2601.09232">Private Links, Public Leaks: Consequences of Frictionless User Experience on the Security and Privacy Posture of SMS-Delivered URLs</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1301</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a17f20ac-1164-11f0-a530-d734519c773d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1950630347.mp3?updated=1769790876" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Caught in the funnel.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/409/notes</link>
      <description>Today we have Andrew Northern, Principal Security Researcher at Censys, discussing "From Evasion to Evidence: Exploiting the Funneling Behavior of Injects". This research explains how modern web malware campaigns use multi-stage JavaScript injections, redirects, and fake CAPTCHAs to selectively deliver payloads and evade detection. 

It shows that these attack chains rely on stable redirect and traffic-distribution chokepoints that can be monitored at scale. Using the SmartApe campaign as a case study, the report demonstrates how defenders can turn those chokepoints into high-confidence detection and tracking opportunities.

The research can be found here:


  From Evasion to Evidence: Exploiting the Funneling Behavior of Injects


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Jan 2026 06:00:00 -0000</pubDate>
      <itunes:title>Caught in the funnel.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>409</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Today we have Andrew Northern, Principal Security Researcher at Censys, discussing "From Evasion to Evidence: Exploiting the Funneling Behavior of Injects". This research explains how modern web malware campaigns use multi-stage JavaScript injections, redirects, and fake CAPTCHAs to selectively deliver payloads and evade detection. 

It shows that these attack chains rely on stable redirect and traffic-distribution chokepoints that can be monitored at scale. Using the SmartApe campaign as a case study, the report demonstrates how defenders can turn those chokepoints into high-confidence detection and tracking opportunities.

The research can be found here:


  From Evasion to Evidence: Exploiting the Funneling Behavior of Injects


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we have <a href="https://www.linkedin.com/in/anorthern/">Andrew Northern</a>, Principal Security Researcher at <a href="https://www.linkedin.com/company/censysio/">Censys</a>, discussing "From Evasion to Evidence: Exploiting the Funneling Behavior of Injects". This research explains how modern web malware campaigns use multi-stage JavaScript injections, redirects, and fake CAPTCHAs to selectively deliver payloads and evade detection. </p>
<p>It shows that these attack chains rely on stable redirect and traffic-distribution chokepoints that can be monitored at scale. Using the SmartApe campaign as a case study, the report demonstrates how defenders can turn those chokepoints into high-confidence detection and tracking opportunities.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://censys.com/blog/exploiting-funneling-behavior-of-injects">From Evasion to Evidence: Exploiting the Funneling Behavior of Injects</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1413</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a157efdc-1164-11f0-a530-930ff5689fcb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9034131225.mp3?updated=1769790336" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Picture perfect deception.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/408/notes</link>
      <description>Today we are joined by Ben Folland, Security Operations Analyst from Huntress, discussing their work on "ClickFix Gets Creative: Malware Buried in Images." This analysis covers a ClickFix campaign that uses fake human verification checks and a realistic Windows Update screen to trick users into manually running malicious commands. 

The multi-stage attack chain leverages mshta.exe, PowerShell, and .NET loaders, ultimately delivering infostealers like LummaC2 and Rhadamanthys, with payloads hidden inside PNG images using steganography. While technically sophisticated, the campaign hinges on simple user interaction, underscoring the importance of user awareness and controls around command execution.

The research can be found here:


  ClickFix Gets Creative: Malware Buried in Images


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Jan 2026 06:00:00 -0000</pubDate>
      <itunes:title>Picture perfect deception.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>408</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Today we are joined by Ben Folland, Security Operations Analyst from Huntress, discussing their work on "ClickFix Gets Creative: Malware Buried in Images." This analysis covers a ClickFix campaign that uses fake human verification checks and a realistic Windows Update screen to trick users into manually running malicious commands. 

The multi-stage attack chain leverages mshta.exe, PowerShell, and .NET loaders, ultimately delivering infostealers like LummaC2 and Rhadamanthys, with payloads hidden inside PNG images using steganography. While technically sophisticated, the campaign hinges on simple user interaction, underscoring the importance of user awareness and controls around command execution.

The research can be found here:


  ClickFix Gets Creative: Malware Buried in Images


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we are joined by <a href="https://www.linkedin.com/in/ben-f-309963233/">Ben Folland</a>, Security Operations Analyst from <a href="https://www.linkedin.com/company/huntress-labs/">Huntress</a>, discussing their work on "ClickFix Gets Creative: Malware Buried in Images." This analysis covers a ClickFix campaign that uses fake human verification checks and a realistic Windows Update screen to trick users into manually running malicious commands. </p>
<p>The multi-stage attack chain leverages mshta.exe, PowerShell, and .NET loaders, ultimately delivering infostealers like LummaC2 and Rhadamanthys, with payloads hidden inside PNG images using steganography. While technically sophisticated, the campaign hinges on simple user interaction, underscoring the importance of user awareness and controls around command execution.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.huntress.com/blog/clickfix-malware-buried-in-images">ClickFix Gets Creative: Malware Buried in Images</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1217</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a130b016-1164-11f0-a530-f3d12b9bc403]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2746686361.mp3?updated=1768584073" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Walking on EggStremes.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/407/notes</link>
      <description>This week, we are joined by Martin Zugec, Technical Solutions Director from Bitdefender, sharing their work and findings on "EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company." Built for long-term espionage, the campaign uses DLL sideloading, in-memory execution, and abused Windows services to stay stealthy and persistent.

We walk through how the multi-stage framework delivers a powerful backdoor with reconnaissance, lateral movement, data theft, and keylogging capabilities—and what this operation reveals about the evolving tactics defenders need to watch for.

The research can be found here:


  EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Jan 2026 06:00:00 -0000</pubDate>
      <itunes:title>Walking on EggStremes.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>407</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Martin Zugec, Technical Solutions Director from Bitdefender, sharing their work and findings on "EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company." Built for long-term espionage, the campaign uses DLL sideloading, in-memory execution, and abused Windows services to stay stealthy and persistent.

We walk through how the multi-stage framework delivers a powerful backdoor with reconnaissance, lateral movement, data theft, and keylogging capabilities—and what this operation reveals about the evolving tactics defenders need to watch for.

The research can be found here:


  EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/martinzugec/">Martin Zugec</a>, Technical Solutions Director from <a href="https://www.linkedin.com/company/bitdefender/">Bitdefender</a>, sharing their work and findings on "EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company." Built for long-term espionage, the campaign uses DLL sideloading, in-memory execution, and abused Windows services to stay stealthy and persistent.</p>
<p>We walk through how the multi-stage framework delivers a powerful backdoor with reconnaissance, lateral movement, data theft, and keylogging capabilities—and what this operation reveals about the evolving tactics defenders need to watch for.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://businessinsights.bitdefender.com/eggstreme-fileless-malware-cyberattack-apac">EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1681</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a1095ade-1164-11f0-a530-937e9fc184e6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3905401011.mp3?updated=1767985306" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Don’t trust that app!</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/392/notes</link>
      <description>While our team is out on winter break, please enjoy this episode of Research Saturday.

Today we are joined by ⁠⁠Selena Larson⁠⁠, co-host of ⁠⁠Only Malware in the Building⁠⁠ and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at ⁠⁠Proofpoint⁠⁠, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing." Proofpoint researchers have identified campaigns where threat actors use fake Microsoft OAuth apps to impersonate services like Adobe, DocuSign, and SharePoint, stealing credentials and bypassing MFA via attacker-in-the-middle phishing kits, mainly Tycoon. 

These attacks redirect users to fake Microsoft login pages to capture credentials, 2FA tokens, and session cookies, targeting nearly 3,000 Microsoft 365 accounts across 900 environments in 2025. Microsoft’s upcoming security changes and strengthened email, cloud, and web defenses, along with user education, are recommended to reduce these risks.

The research can be found here:


  
⁠⁠⁠⁠Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Jan 2026 06:00:00 -0000</pubDate>
      <itunes:title>Don’t trust that app!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>392</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>While our team is out on winter break, please enjoy this episode of Research Saturday.

Today we are joined by ⁠⁠Selena Larson⁠⁠, co-host of ⁠⁠Only Malware in the Building⁠⁠ and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at ⁠⁠Proofpoint⁠⁠, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing." Proofpoint researchers have identified campaigns where threat actors use fake Microsoft OAuth apps to impersonate services like Adobe, DocuSign, and SharePoint, stealing credentials and bypassing MFA via attacker-in-the-middle phishing kits, mainly Tycoon. 

These attacks redirect users to fake Microsoft login pages to capture credentials, 2FA tokens, and session cookies, targeting nearly 3,000 Microsoft 365 accounts across 900 environments in 2025. Microsoft’s upcoming security changes and strengthened email, cloud, and web defenses, along with user education, are recommended to reduce these risks.

The research can be found here:


  
⁠⁠⁠⁠Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>While our team is out on winter break, please enjoy this episode of Research Saturday.</strong></em></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/selenalarson/">⁠⁠Selena Larson⁠⁠</a>, co-host of <a href="https://thecyberwire.com/podcasts/only-malware-in-the-building">⁠⁠Only Malware in the Building⁠⁠</a> and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at <a href="https://www.proofpoint.com/us">⁠⁠Proofpoint⁠⁠</a>, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing." Proofpoint researchers have identified campaigns where threat actors use fake Microsoft OAuth apps to impersonate services like Adobe, DocuSign, and SharePoint, stealing credentials and bypassing MFA via attacker-in-the-middle phishing kits, mainly Tycoon. </p>
<p>These attacks redirect users to fake Microsoft login pages to capture credentials, 2FA tokens, and session cookies, targeting nearly 3,000 Microsoft 365 accounts across 900 environments in 2025. Microsoft’s upcoming security changes and strengthened email, cloud, and web defenses, along with user education, are recommended to reduce these risks.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://www.huntress.com/blog/exploitation-of-sonicwall-vpn">⁠⁠⁠</a><a href="https://www.proofpoint.com/us/blog/threat-insight/microsoft-oauth-app-impersonation-campaign-leads-mfa-phishing">⁠Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1241</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a0e0ceca-1164-11f0-a530-bf5cd9ede0fb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5944104831.mp3?updated=1766083362" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Excel-lerating cyberattacks.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/370/notes</link>
      <description>While our team is out on winter break, please enjoy this episode of Research Saturday.

This week, we are joined by ⁠Tom Hegel⁠, Principal Threat Researcher from ⁠SentinelLabs⁠ research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belarusian government espionage, is actively targeting Ukrainian military and government entities as well as Belarusian opposition activists using weaponized Excel documents. 

SentinelLabs identified new malware variants and tactics, including obfuscated VBA macros that deploy malware via DLL files, with payload delivery seemingly controlled based on a target’s location and system profile. The campaign, which began preparation in mid-2024 and became active by late 2024, appears to be an evolution of previous Ghostwriter operations, combining disinformation with cyberattacks to further political and military objectives.

The research can be found here:


  ⁠Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Dec 2025 06:00:00 -0000</pubDate>
      <itunes:title>Excel-lerating cyberattacks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>370</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>While our team is out on winter break, please enjoy this episode of Research Saturday.

This week, we are joined by ⁠Tom Hegel⁠, Principal Threat Researcher from ⁠SentinelLabs⁠ research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belarusian government espionage, is actively targeting Ukrainian military and government entities as well as Belarusian opposition activists using weaponized Excel documents. 

SentinelLabs identified new malware variants and tactics, including obfuscated VBA macros that deploy malware via DLL files, with payload delivery seemingly controlled based on a target’s location and system profile. The campaign, which began preparation in mid-2024 and became active by late 2024, appears to be an evolution of previous Ghostwriter operations, combining disinformation with cyberattacks to further political and military objectives.

The research can be found here:


  ⁠Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>While our team is out on winter break, please enjoy this episode of Research Saturday.</strong></em></p>
<p>This week, we are joined by <a href="https://www.linkedin.com/in/tom-hegel/">⁠Tom Hegel⁠</a>, Principal Threat Researcher from <a href="https://www.linkedin.com/company/sentinelone/">⁠SentinelLabs⁠</a> research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belarusian government espionage, is actively targeting Ukrainian military and government entities as well as Belarusian opposition activists using weaponized Excel documents. </p>
<p>SentinelLabs identified new malware variants and tactics, including obfuscated VBA macros that deploy malware via DLL files, with payload delivery seemingly controlled based on a target’s location and system profile. The campaign, which began preparation in mid-2024 and became active by late 2024, appears to be an evolution of previous Ghostwriter operations, combining disinformation with cyberattacks to further political and military objectives.</p>
<p>The research can be found here:</p>
<ul>
  <li><a href="https://www.sentinelone.com/labs/ghostwriter-new-campaign-targets-ukrainian-government-and-belarusian-opposition/">⁠Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1423</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a0b9200a-1164-11f0-a530-b359e8db660c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5415292051.mp3?updated=1765847027" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The lies that let AI run amok.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/406/notes</link>
      <description>Darren Meyer, Security Research Advocate at Checkmarx, is sharing their work on "Bypassing AI Agent Defenses with Lies-in-the-Loop." Checkmarx Zero researchers introduce “lies-in-the-loop,” a new attack technique that bypasses human‑in‑the‑loop AI safety controls by deceiving users into approving dangerous actions that appear benign. 

Using examples with AI code assistants like Claude Code, the research shows how prompt injection and manipulated context can trick both the agent and the human reviewer into enabling remote code execution. The findings highlight a growing risk as AI agents become more common in developer workflows, underscoring the limits of human oversight as a standalone security control.

The research can be found here:


  
⁠Bypassing AI Agent Defenses With Lies-In-The-Loop



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Dec 2025 06:00:00 -0000</pubDate>
      <itunes:title>The lies that let AI run amok.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>406</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Darren Meyer, Security Research Advocate at Checkmarx, is sharing their work on "Bypassing AI Agent Defenses with Lies-in-the-Loop." Checkmarx Zero researchers introduce “lies-in-the-loop,” a new attack technique that bypasses human‑in‑the‑loop AI safety controls by deceiving users into approving dangerous actions that appear benign. 

Using examples with AI code assistants like Claude Code, the research shows how prompt injection and manipulated context can trick both the agent and the human reviewer into enabling remote code execution. The findings highlight a growing risk as AI agents become more common in developer workflows, underscoring the limits of human oversight as a standalone security control.

The research can be found here:


  
⁠Bypassing AI Agent Defenses With Lies-In-The-Loop



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/darrenmeyer/">Darren Meyer</a>, Security Research Advocate at <a href="https://www.linkedin.com/company/checkmarx/">Checkmarx</a>, is sharing their work on "Bypassing AI Agent Defenses with Lies-in-the-Loop." Checkmarx Zero researchers introduce “lies-in-the-loop,” a new attack technique that bypasses human‑in‑the‑loop AI safety controls by deceiving users into approving dangerous actions that appear benign. </p>
<p>Using examples with AI code assistants like Claude Code, the research shows how prompt injection and manipulated context can trick both the agent and the human reviewer into enabling remote code execution. The findings highlight a growing risk as AI agents become more common in developer workflows, underscoring the limits of human oversight as a standalone security control.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://dti.domaintools.com/inside-the-great-firewall-part-1-the-dump/">⁠</a><a href="https://checkmarx.com/zero-post/bypassing-ai-agent-defenses-with-lies-in-the-loop/">Bypassing AI Agent Defenses With Lies-In-The-Loop</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1476</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a092f1a0-1164-11f0-a530-8712e79537a5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2900673422.mp3?updated=1766170724" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Root access to the great firewall.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/405/notes</link>
      <description>Daniel Schwalbe, DomainTools Head of Investigations and CISO, is sharing their work on "Inside the Great Firewall." This two-part research project analyzes an extraordinary 500–600GB leak that exposes the internal architecture, tooling, and human ecosystem behind China’s Great Firewall. 

Across both parts, you break down thousands of leaked documents, source code repositories, diagrams, packet captures, and telemetry that reveal how systems like the Traffic Secure Gateway, MAAT, Redis-based analytics, and modular DPI engines work together to censor, surveil, and fingerprint users at scale. Taken together, the research shows how the Great Firewall functions not just as a technical system, but as a living censorship-industrial complex that adapts, learns, and coordinates across government, telecoms, and security vendors.

The research can be found here:


  Inside the Great Firewall Part 1: The Dump

  Inside the Great Firewall Part 2: Technical Infrastructure


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Dec 2025 06:00:00 -0000</pubDate>
      <itunes:title>Root access to the great firewall.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>405</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Daniel Schwalbe, DomainTools Head of Investigations and CISO, is sharing their work on "Inside the Great Firewall." This two-part research project analyzes an extraordinary 500–600GB leak that exposes the internal architecture, tooling, and human ecosystem behind China’s Great Firewall. 

Across both parts, you break down thousands of leaked documents, source code repositories, diagrams, packet captures, and telemetry that reveal how systems like the Traffic Secure Gateway, MAAT, Redis-based analytics, and modular DPI engines work together to censor, surveil, and fingerprint users at scale. Taken together, the research shows how the Great Firewall functions not just as a technical system, but as a living censorship-industrial complex that adapts, learns, and coordinates across government, telecoms, and security vendors.

The research can be found here:


  Inside the Great Firewall Part 1: The Dump

  Inside the Great Firewall Part 2: Technical Infrastructure


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/schwalbe/">Daniel Schwalbe</a>, <a href="https://www.linkedin.com/company/domaintools/">DomainTools</a> Head of Investigations and CISO, is sharing their work on "Inside the Great Firewall." This two-part research project analyzes an extraordinary 500–600GB leak that exposes the internal architecture, tooling, and human ecosystem behind China’s Great Firewall. </p>
<p>Across both parts, you break down thousands of leaked documents, source code repositories, diagrams, packet captures, and telemetry that reveal how systems like the Traffic Secure Gateway, MAAT, Redis-based analytics, and modular DPI engines work together to censor, surveil, and fingerprint users at scale. Taken together, the research shows how the Great Firewall functions not just as a technical system, but as a living censorship-industrial complex that adapts, learns, and coordinates across government, telecoms, and security vendors.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://dti.domaintools.com/inside-the-great-firewall-part-1-the-dump/">Inside the Great Firewall Part 1: The Dump</a></li>
  <li><a href="https://dti.domaintools.com/inside-the-great-firewall-part-2-technical-infrastructure/">Inside the Great Firewall Part 2: Technical Infrastructure</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1566</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a06a0d08-1164-11f0-a530-d3637525c8a0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3548419404.mp3?updated=1765556564" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When macOS gets frostbite.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/404/notes</link>
      <description>Jaron Bradley, Director of Jamf Threat Labs, is sharing their work on "ChillyHell: A Deep Dive into a Modular macOS Backdoor." Jamf Threat Labs uncovers a newly notarized macOS backdoor called ChillyHell, tied to past UNC4487 activity and disguised as a legitimate applet. 

The malware showcases robust host profiling, multiple persistence mechanisms, timestomping, and flexible C2 communications over both DNS and HTTP. Its modular design includes reverse shells, payload delivery, self-updates, and a brute-force component targeting user credentials.

The research can be found here:


  
⁠ChillyHell: A Deep Dive into a Modular macOS Backdoor



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Dec 2025 06:00:00 -0000</pubDate>
      <itunes:title>When macOS gets frostbite.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>404</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Jaron Bradley, Director of Jamf Threat Labs, is sharing their work on "ChillyHell: A Deep Dive into a Modular macOS Backdoor." Jamf Threat Labs uncovers a newly notarized macOS backdoor called ChillyHell, tied to past UNC4487 activity and disguised as a legitimate applet. 

The malware showcases robust host profiling, multiple persistence mechanisms, timestomping, and flexible C2 communications over both DNS and HTTP. Its modular design includes reverse shells, payload delivery, self-updates, and a brute-force component targeting user credentials.

The research can be found here:


  
⁠ChillyHell: A Deep Dive into a Modular macOS Backdoor



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/jaron-bradley/">Jaron Bradley,</a> Director of <a href="https://www.linkedin.com/company/jamf-software/">Jamf </a>Threat Labs, is sharing their work on "ChillyHell: A Deep Dive into a Modular macOS Backdoor." Jamf Threat Labs uncovers a newly notarized macOS backdoor called ChillyHell, tied to past UNC4487 activity and disguised as a legitimate applet. </p>
<p>The malware showcases robust host profiling, multiple persistence mechanisms, timestomping, and flexible C2 communications over both DNS and HTTP. Its modular design includes reverse shells, payload delivery, self-updates, and a brute-force component targeting user credentials.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://redcanary.com/blog/threat-intelligence/phishing-rmm-tools/">⁠</a><a href="https://www.jamf.com/blog/chillyhell-a-modular-macos-backdoor/?nav=1">ChillyHell: A Deep Dive into a Modular macOS Backdoor</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1480</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a041afde-1164-11f0-a530-4ba08f099483]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9324297938.mp3?updated=1764952171" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A new stealer hiding behind AI hype.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/380/notes</link>
      <description>Please enjoy this encore of Research Saturday. 

This week, we are joined by ⁠Michael Gorelik⁠, Chief Technology Officer from ⁠Morphisec⁠, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as fake AI video generation platforms, luring users into uploading media in exchange for malware-laced downloads. 

Distributed through convincing Facebook groups and viral campaigns, the malware steals browser credentials, cryptocurrency wallets, and can deploy a remote access trojan like XWorm. The campaign uses a layered, obfuscated delivery chain disguised as legitimate video editing software, making it both deceptive and difficult to detect.

The research can be found here:


  ⁠⁠⁠New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 Nov 2025 06:00:00 -0000</pubDate>
      <itunes:title>A new stealer hiding behind AI hype.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>380</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Research Saturday. 

This week, we are joined by ⁠Michael Gorelik⁠, Chief Technology Officer from ⁠Morphisec⁠, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as fake AI video generation platforms, luring users into uploading media in exchange for malware-laced downloads. 

Distributed through convincing Facebook groups and viral campaigns, the malware steals browser credentials, cryptocurrency wallets, and can deploy a remote access trojan like XWorm. The campaign uses a layered, obfuscated delivery chain disguised as legitimate video editing software, making it both deceptive and difficult to detect.

The research can be found here:


  ⁠⁠⁠New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Research Saturday. </p>
<p>This week, we are joined by <a href="https://www.linkedin.com/in/smgoreli/">⁠Michael Gorelik⁠</a>, Chief Technology Officer from <a href="https://www.linkedin.com/company/morphisec/">⁠Morphisec⁠</a>, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as fake AI video generation platforms, luring users into uploading media in exchange for malware-laced downloads. </p>
<p>Distributed through convincing Facebook groups and viral campaigns, the malware steals browser credentials, cryptocurrency wallets, and can deploy a remote access trojan like XWorm. The campaign uses a layered, obfuscated delivery chain disguised as legitimate video editing software, making it both deceptive and difficult to detect.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.morphisec.com/blog/new-noodlophile-stealer-fake-ai-video-generation-platforms/">⁠⁠⁠New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1328</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a019783e-1164-11f0-a530-136373e53422]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9455701978.mp3?updated=1764012596" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Two RMMs walk into a phish…</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/403/notes</link>
      <description>Alex Berninger, Senior Manager of Intelligence at Red Canary, and Mike Wylie, Director, Threat Hunting at Zscaler, join to discuss four phishing lures in campaigns dropping RMM tools. Red Canary and Zscaler uncovered phishing campaigns delivering legitimate remote monitoring and management (RMM) tools—like ITarian, PDQ, SimpleHelp, and Atera—to gain stealthy access to victim systems. Attackers used four main lures (fake browser updates, meeting invites, party invitations, and fake government forms) and often deployed multiple RMM tools in quick succession to establish persistent access and deliver additional malware. 

The report highlights detection opportunities, provides indicators of compromise, and stresses the importance of monitoring authorized RMM usage, scrutinizing trusted services like Cloudflare R2, and enforcing strict network and endpoint controls.

The research can be found here:


  You’re invited: Four phishing lures in campaigns dropping RMM tools


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Nov 2025 06:00:00 -0000</pubDate>
      <itunes:title>Two RMMs walk into a phish…</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>403</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Alex Berninger, Senior Manager of Intelligence at Red Canary, and Mike Wylie, Director, Threat Hunting at Zscaler, join to discuss four phishing lures in campaigns dropping RMM tools. Red Canary and Zscaler uncovered phishing campaigns delivering legitimate remote monitoring and management (RMM) tools—like ITarian, PDQ, SimpleHelp, and Atera—to gain stealthy access to victim systems. Attackers used four main lures (fake browser updates, meeting invites, party invitations, and fake government forms) and often deployed multiple RMM tools in quick succession to establish persistent access and deliver additional malware. 

The report highlights detection opportunities, provides indicators of compromise, and stresses the importance of monitoring authorized RMM usage, scrutinizing trusted services like Cloudflare R2, and enforcing strict network and endpoint controls.

The research can be found here:


  You’re invited: Four phishing lures in campaigns dropping RMM tools


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/a-berninger/">Alex Berninger</a>, Senior Manager of Intelligence at <a href="https://www.linkedin.com/company/redcanary/">Red Canary</a>, and <a href="https://www.linkedin.com/in/mwylie/">Mike Wylie</a>, Director, Threat Hunting at <a href="https://www.linkedin.com/company/zscaler/">Zscaler</a>, join to discuss four phishing lures in campaigns dropping RMM tools. Red Canary and Zscaler uncovered phishing campaigns delivering legitimate remote monitoring and management (RMM) tools—like ITarian, PDQ, SimpleHelp, and Atera—to gain stealthy access to victim systems. Attackers used four main lures (fake browser updates, meeting invites, party invitations, and fake government forms) and often deployed multiple RMM tools in quick succession to establish persistent access and deliver additional malware. </p>
<p>The report highlights detection opportunities, provides indicators of compromise, and stresses the importance of monitoring authorized RMM usage, scrutinizing trusted services like Cloudflare R2, and enforcing strict network and endpoint controls.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://redcanary.com/blog/threat-intelligence/phishing-rmm-tools/">You’re invited: Four phishing lures in campaigns dropping RMM tools</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1440</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9ff1d7d4-1164-11f0-a530-5b7c7bf8bec4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6550795623.mp3?updated=1763755723" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When clicks turn criminal.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/402/notes</link>
      <description>Dr. Renée Burton, Vice President of Threat Intelligence from Infoblox, is sharing the team's work on "Deniability by Design: DNS-Driven Insights into a Malicious Ad Network." Infoblox returns with new threat actor research uncovering Vane Viper, a Cyprus-based holding company behind PropellerAds—one of the world’s largest advertising networks. The report reveals that Vane Viper isn’t just being exploited by criminals but operates as a criminal infrastructure itself, built to profit from fraud, malware, and disinformation through offshore entities and complex ownership structures. 

The findings highlight the growing convergence between adtech, cybercrime, and state-linked influence operations, suggesting that elements of the global digital advertising ecosystem are now functioning as infrastructure for large-scale cyber and disinformation campaigns.

The research can be found here:


  Deniability by Design: DNS-Driven Insights intoa Malicious Ad Network


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Nov 2025 06:00:00 -0000</pubDate>
      <itunes:title>When clicks turn criminal.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>402</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Dr. Renée Burton, Vice President of Threat Intelligence from Infoblox, is sharing the team's work on "Deniability by Design: DNS-Driven Insights into a Malicious Ad Network." Infoblox returns with new threat actor research uncovering Vane Viper, a Cyprus-based holding company behind PropellerAds—one of the world’s largest advertising networks. The report reveals that Vane Viper isn’t just being exploited by criminals but operates as a criminal infrastructure itself, built to profit from fraud, malware, and disinformation through offshore entities and complex ownership structures. 

The findings highlight the growing convergence between adtech, cybercrime, and state-linked influence operations, suggesting that elements of the global digital advertising ecosystem are now functioning as infrastructure for large-scale cyber and disinformation campaigns.

The research can be found here:


  Deniability by Design: DNS-Driven Insights intoa Malicious Ad Network


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/ren%C3%A9e-burton-b7161110b/">Dr. Renée Burton</a>, Vice President of Threat Intelligence from <a href="https://www.linkedin.com/company/infoblox/">Infoblox</a>, is sharing the team's work on "Deniability by Design: DNS-Driven Insights into a Malicious Ad Network." Infoblox returns with new threat actor research uncovering <em>Vane Viper</em>, a Cyprus-based holding company behind PropellerAds—one of the world’s largest advertising networks. The report reveals that Vane Viper isn’t just being exploited by criminals but operates as a criminal infrastructure itself, built to profit from fraud, malware, and disinformation through offshore entities and complex ownership structures. </p>
<p>The findings highlight the growing convergence between adtech, cybercrime, and state-linked influence operations, suggesting that elements of the global digital advertising ecosystem are now functioning as infrastructure for large-scale cyber and disinformation campaigns.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>Deniability by Design: DNS-Driven Insights into<br>a Malicious Ad Network</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1465</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9fc8ba66-1164-11f0-a530-9b21544c49d5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2025241396.mp3?updated=1763140357" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A fine pearl gone rusty.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/401/notes</link>
      <description>Tal Peleg, Senior Product Manager, and Coby Abrams, Cyber Security Researcher of Varonis, discussing their work and findings on Rusty Pearl - Remote Code Execution in Postgres Instances. The flaw could allow attackers to execute arbitrary commands on a database server’s operating system, leading to potential data theft, destruction, or lateral movement across networks.

While the vulnerability existed in PostgreSQL, Amazon RDS and Aurora were not affected, thanks to built-in protections like SELinux and AWS’s automated threat detection. Still, the research underscores the importance of patching and configuration hygiene in managed database environments.

The research can be found here:


  
⁠⁠⁠⁠Rusty Pearl: Remote Code Execution in Postgres Instances



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Nov 2025 06:00:00 -0000</pubDate>
      <itunes:title>A fine pearl gone rusty.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>401</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Tal Peleg, Senior Product Manager, and Coby Abrams, Cyber Security Researcher of Varonis, discussing their work and findings on Rusty Pearl - Remote Code Execution in Postgres Instances. The flaw could allow attackers to execute arbitrary commands on a database server’s operating system, leading to potential data theft, destruction, or lateral movement across networks.

While the vulnerability existed in PostgreSQL, Amazon RDS and Aurora were not affected, thanks to built-in protections like SELinux and AWS’s automated threat detection. Still, the research underscores the importance of patching and configuration hygiene in managed database environments.

The research can be found here:


  
⁠⁠⁠⁠Rusty Pearl: Remote Code Execution in Postgres Instances



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/tal-peleg-a337a6ab/">Tal Peleg</a>, Senior Product Manager, and <a href="https://www.linkedin.com/in/coby-abrams-23897a290/">Coby Abrams</a>, Cyber Security Researcher of <a href="https://www.linkedin.com/company/varonis/">Varonis</a>, discussing their work and findings on Rusty Pearl - Remote Code Execution in Postgres Instances. The flaw could allow attackers to execute arbitrary commands on a database server’s operating system, leading to potential data theft, destruction, or lateral movement across networks.</p>
<p>While the vulnerability existed in PostgreSQL, Amazon RDS and Aurora were not affected, thanks to built-in protections like SELinux and AWS’s automated threat detection. Still, the research underscores the importance of patching and configuration hygiene in managed database environments.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://claroty.com/team82/research/turning-camera-surveillance-on-its-axis">⁠⁠⁠</a><a href="https://arxiv.org/pdf/2508.06394">⁠</a><a href="https://www.varonis.com/blog/rusty-pearl">Rusty Pearl: Remote Code Execution in Postgres Instances</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1439</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9fa0ece8-1164-11f0-a530-5b14ee4600bc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9866246832.mp3?updated=1762533388" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Attack of the automated ops. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/400/notes</link>
      <description>Today we are joined by Dario Pasquini, Principal Researcher at RSAC, sharing the team's work on WhenAIOpsBecome “AI Oops”: Subverting LLM-driven IT Operations via Telemetry Manipulation. A first-of-its-kind security analysis showing that LLM-driven AIOps agents can be tricked by manipulated telemetry, turning automation itself into a new attack vector. 

The researchers introduce AIOpsDoom, an automated reconnaissance + fuzzing + LLM-driven telemetry-injection attack that performs “adversarial reward-hacking” to coerce agents into harmful remediations—even without prior knowledge of the target and even against some prompt-defense tools. They also present AIOpsShield, a telemetry-sanitization defense that reliably blocks these attacks without harming normal agent performance, underscoring the urgent need for security-aware AIOps design.

The research can be found here:


  
⁠When AIOps Become “AI Oops”:
Subverting LLM-driven IT Operations via Telemetry Manipulation



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Nov 2025 05:00:00 -0000</pubDate>
      <itunes:title>Attack of the automated ops. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>400</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Today we are joined by Dario Pasquini, Principal Researcher at RSAC, sharing the team's work on WhenAIOpsBecome “AI Oops”: Subverting LLM-driven IT Operations via Telemetry Manipulation. A first-of-its-kind security analysis showing that LLM-driven AIOps agents can be tricked by manipulated telemetry, turning automation itself into a new attack vector. 

The researchers introduce AIOpsDoom, an automated reconnaissance + fuzzing + LLM-driven telemetry-injection attack that performs “adversarial reward-hacking” to coerce agents into harmful remediations—even without prior knowledge of the target and even against some prompt-defense tools. They also present AIOpsShield, a telemetry-sanitization defense that reliably blocks these attacks without harming normal agent performance, underscoring the urgent need for security-aware AIOps design.

The research can be found here:


  
⁠When AIOps Become “AI Oops”:
Subverting LLM-driven IT Operations via Telemetry Manipulation



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we are joined by <a href="https://www.linkedin.com/in/dario-pasquini-a91a00269/">Dario Pasquini</a>, Principal Researcher at <a href="https://www.rsaconference.com/">RSAC</a>, sharing the team's work on WhenAIOpsBecome “AI Oops”: Subverting LLM-driven IT Operations via Telemetry Manipulation. A first-of-its-kind security analysis showing that LLM-driven AIOps agents can be tricked by manipulated telemetry, turning automation itself into a new attack vector. </p>
<p>The researchers introduce AIOpsDoom, an automated reconnaissance + fuzzing + LLM-driven telemetry-injection attack that performs “adversarial reward-hacking” to coerce agents into harmful remediations—even without prior knowledge of the target and even against some prompt-defense tools. They also present AIOpsShield, a telemetry-sanitization defense that reliably blocks these attacks without harming normal agent performance, underscoring the urgent need for security-aware AIOps design.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://claroty.com/team82/research/turning-camera-surveillance-on-its-axis">⁠</a><a href="https://arxiv.org/pdf/2508.06394">When AIOps Become “AI Oops”:
Subverting LLM-driven IT Operations via Telemetry Manipulation</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1180</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9f7958a4-1164-11f0-a530-4b3b603e0200]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9040137050.mp3?updated=1761930859" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A look behind the lens.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/399/notes</link>
      <description>Noam Moshe, Claroty’s Vulnerability Research Team Lead, joins Dave to discuss Team 82's work on "Turning Camera Surveillance on its Axis." Team82 disclosed four vulnerabilities in Axis.Remoting—deserialization, a MiTM “pass-the-challenge” NTLMSSP flaw, and an unauthenticated fallback HTTP endpoint—that enable pre-auth remote code execution against Axis Device Manager and Axis Camera Station.
They found more than 6,500 Axis.Remoting services exposed online (over half in the U.S.), letting attackers enumerate targets, install malicious Axis packages, and hijack, view, or shut down managed camera fleets.Axis published an urgent advisory, issued patches for ADM 5.32, Camera Station 5.58 and Camera Station Pro 6.9, accepted Team82’s disclosure, and organizations are urged to update.

The research can be found here:


  Turning Camera Surveillance on its Axis


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Oct 2025 05:00:00 -0000</pubDate>
      <itunes:title>A look behind the lens.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>399</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Noam Moshe, Claroty’s Vulnerability Research Team Lead, joins Dave to discuss Team 82's work on "Turning Camera Surveillance on its Axis." Team82 disclosed four vulnerabilities in Axis.Remoting—deserialization, a MiTM “pass-the-challenge” NTLMSSP flaw, and an unauthenticated fallback HTTP endpoint—that enable pre-auth remote code execution against Axis Device Manager and Axis Camera Station.
They found more than 6,500 Axis.Remoting services exposed online (over half in the U.S.), letting attackers enumerate targets, install malicious Axis packages, and hijack, view, or shut down managed camera fleets.Axis published an urgent advisory, issued patches for ADM 5.32, Camera Station 5.58 and Camera Station Pro 6.9, accepted Team82’s disclosure, and organizations are urged to update.

The research can be found here:


  Turning Camera Surveillance on its Axis


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/noam-moshe-9b3a61200/">Noam Moshe</a>, <a href="https://www.linkedin.com/company/claroty/">Claroty</a>’s Vulnerability Research Team Lead, joins Dave to discuss Team 82's work on "Turning Camera Surveillance on its Axis." Team82 disclosed four vulnerabilities in Axis.Remoting—deserialization, a MiTM “pass-the-challenge” NTLMSSP flaw, and an unauthenticated fallback HTTP endpoint—that enable pre-auth remote code execution against Axis Device Manager and Axis Camera Station.<br>
They found more than 6,500 Axis.Remoting services exposed online (over half in the U.S.), letting attackers enumerate targets, install malicious Axis packages, and hijack, view, or shut down managed camera fleets.Axis published an urgent advisory, issued patches for ADM 5.32, Camera Station 5.58 and Camera Station Pro 6.9, accepted Team82’s disclosure, and organizations are urged to update.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://claroty.com/team82/research/turning-camera-surveillance-on-its-axis">Turning Camera Surveillance on its Axis</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1470</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9f52033a-1164-11f0-a530-13693ce8bac3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5204934790.mp3?updated=1761240597" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Smile for the malware.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/398/notes</link>
      <description>Eclypsium researchers Jesse Michael and Mickey Shkatov to share their work on "BadCam - Now Weaponizing Linux Webcams." Eclypsium researchers disclosed “BadCam,” a set of vulnerabilities in certain Lenovo USB webcams that run Linux and do not validate firmware signatures, allowing attackers to reflash the devices and turn them into BadUSB-style tools. 

An adversary who supplies a backdoored camera or who gains remote code execution on a host can weaponize the webcam to emulate human-interface devices, inject keystrokes, deliver payloads, and maintain persistence — even re-infecting systems after OS reinstalls. The findings were presented at DEF CON 2025, Lenovo issued updated firmware/tools in coordination with SigmaStar, and researchers warn the same vector could affect other Linux-based USB peripherals, underscoring the need for firmware signing and stronger device attestation.

The research can be found here:


  BadCam: Now Weaponizing Linux Webcams


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Oct 2025 05:00:00 -0000</pubDate>
      <itunes:title>Smile for the malware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>398</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Eclypsium researchers Jesse Michael and Mickey Shkatov to share their work on "BadCam - Now Weaponizing Linux Webcams." Eclypsium researchers disclosed “BadCam,” a set of vulnerabilities in certain Lenovo USB webcams that run Linux and do not validate firmware signatures, allowing attackers to reflash the devices and turn them into BadUSB-style tools. 

An adversary who supplies a backdoored camera or who gains remote code execution on a host can weaponize the webcam to emulate human-interface devices, inject keystrokes, deliver payloads, and maintain persistence — even re-infecting systems after OS reinstalls. The findings were presented at DEF CON 2025, Lenovo issued updated firmware/tools in coordination with SigmaStar, and researchers warn the same vector could affect other Linux-based USB peripherals, underscoring the need for firmware signing and stronger device attestation.

The research can be found here:


  BadCam: Now Weaponizing Linux Webcams


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/company/eclypsium/">Eclypsium</a> researchers <a href="https://www.linkedin.com/in/jesse-michael-b0a458/">Jesse Michael</a> and <a href="https://www.linkedin.com/in/myinfo/">Mickey Shkatov</a> to share their work on "BadCam - Now Weaponizing Linux Webcams." Eclypsium researchers disclosed “BadCam,” a set of vulnerabilities in certain Lenovo USB webcams that run Linux and do not validate firmware signatures, allowing attackers to reflash the devices and turn them into BadUSB-style tools. </p>
<p>An adversary who supplies a backdoored camera or who gains remote code execution on a host can weaponize the webcam to emulate human-interface devices, inject keystrokes, deliver payloads, and maintain persistence — even re-infecting systems after OS reinstalls. The findings were presented at DEF CON 2025, Lenovo issued updated firmware/tools in coordination with SigmaStar, and researchers warn the same vector could affect other Linux-based USB peripherals, underscoring the need for firmware signing and stronger device attestation.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://eclypsium.com/blog/badcam-now-weaponizing-linux-webcams/">BadCam: Now Weaponizing Linux Webcams</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1692</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9f2a47f0-1164-11f0-a530-d340a9bc6336]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3608776261.mp3?updated=1760718047" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No honor among thieves.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/397/notes</link>
      <description>John Fokker, Head of Threat Intelligence at Trellix is discussing "Gang Wars: Breaking Trust Among Cyber Criminals." Trellix researchers reveal how the once-organized ransomware underworld is collapsing under its own paranoia. 

Once united through Ransomware-as-a-Service programs, gangs are now turning on each other — staging hacks, public feuds, and exit scams as trust evaporates. With affiliates jumping ship and rival crews sabotaging each other, the RaaS model is fracturing fast, signaling the beginning of the end for ransomware’s criminal empires.

The research can be found here:


  
⁠⁠⁠⁠Gang Wars: Breaking Trust Among Cyber Criminals



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Oct 2025 05:00:00 -0000</pubDate>
      <itunes:title>No honor among thieves.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>397</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>John Fokker, Head of Threat Intelligence at Trellix is discussing "Gang Wars: Breaking Trust Among Cyber Criminals." Trellix researchers reveal how the once-organized ransomware underworld is collapsing under its own paranoia. 

Once united through Ransomware-as-a-Service programs, gangs are now turning on each other — staging hacks, public feuds, and exit scams as trust evaporates. With affiliates jumping ship and rival crews sabotaging each other, the RaaS model is fracturing fast, signaling the beginning of the end for ransomware’s criminal empires.

The research can be found here:


  
⁠⁠⁠⁠Gang Wars: Breaking Trust Among Cyber Criminals



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/john-fokker-95b614107/">John Fokker</a>, Head of Threat Intelligence at <a href="https://www.linkedin.com/company/trellixsecurity/">Trellix</a> is discussing "Gang Wars: Breaking Trust Among Cyber Criminals." Trellix researchers reveal how the once-organized ransomware underworld is collapsing under its own paranoia. </p>
<p>Once united through Ransomware-as-a-Service programs, gangs are now turning on each other — staging hacks, public feuds, and exit scams as trust evaporates. With affiliates jumping ship and rival crews sabotaging each other, the RaaS model is fracturing fast, signaling the beginning of the end for ransomware’s criminal empires.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://businessinsights.bitdefender.com/curly-comrades-new-threat-actor-targeting-geopolitical-hotbeds">⁠⁠⁠</a><a href="https://unit42.paloaltonetworks.com/phantom-taurus/">⁠</a><a href="https://www.trellix.com/blogs/research/gang-wars-breaking-trust-among-cyber-criminals/">Gang Wars: Breaking Trust Among Cyber Criminals</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1503</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9f0270ea-1164-11f0-a530-d3b836ff8fe7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2656483145.mp3?updated=1760109367" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>China’s stealthiest spy operation yet.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/396/notes</link>
      <description>Assaf Dahan, Director of Threat Research, Cortex XDR, at Palo Alto Networks, discussing Phantom Taurus, a new China APT uncovered by Unit 42. Unit 42 researchers have identified Phantom Taurus, a newly designated Chinese state-aligned APT conducting long-term espionage against government and telecommunications organizations across Africa, the Middle East, and Asia. 

Distinguished by its stealth, persistence, and rare tactics, the group has recently shifted from email-focused data theft to directly targeting databases and deploying a powerful new malware suite called NET-STAR, designed to compromise IIS web servers and evade detection. This suite, featuring modular, fileless backdoors and advanced evasion capabilities, marks a significant evolution in Phantom Taurus’ operations and underscores the group’s strategic intelligence-gathering objectives.

The research can be found here:


  
⁠Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Oct 2025 05:00:00 -0000</pubDate>
      <itunes:title>China’s stealthiest spy operation yet.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>396</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Assaf Dahan, Director of Threat Research, Cortex XDR, at Palo Alto Networks, discussing Phantom Taurus, a new China APT uncovered by Unit 42. Unit 42 researchers have identified Phantom Taurus, a newly designated Chinese state-aligned APT conducting long-term espionage against government and telecommunications organizations across Africa, the Middle East, and Asia. 

Distinguished by its stealth, persistence, and rare tactics, the group has recently shifted from email-focused data theft to directly targeting databases and deploying a powerful new malware suite called NET-STAR, designed to compromise IIS web servers and evade detection. This suite, featuring modular, fileless backdoors and advanced evasion capabilities, marks a significant evolution in Phantom Taurus’ operations and underscores the group’s strategic intelligence-gathering objectives.

The research can be found here:


  
⁠Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/assaf-dahan-a98226108/">Assaf Dahan</a>, Director of Threat Research, Cortex XDR, at <a href="https://www.linkedin.com/company/palo-alto-networks/">Palo Alto Networks</a>, discussing Phantom Taurus, a new China APT uncovered by Unit 42. Unit 42 researchers have identified <em>Phantom Taurus</em>, a newly designated Chinese state-aligned APT conducting long-term espionage against government and telecommunications organizations across Africa, the Middle East, and Asia. </p>
<p>Distinguished by its stealth, persistence, and rare tactics, the group has recently shifted from email-focused data theft to directly targeting databases and deploying a powerful new malware suite called NET-STAR, designed to compromise IIS web servers and evade detection. This suite, featuring modular, fileless backdoors and advanced evasion capabilities, marks a significant evolution in Phantom Taurus’ operations and underscores the group’s strategic intelligence-gathering objectives.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://businessinsights.bitdefender.com/curly-comrades-new-threat-actor-targeting-geopolitical-hotbeds">⁠</a><a href="https://unit42.paloaltonetworks.com/phantom-taurus/">Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1372</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9edb33e0-1164-11f0-a530-83dc1ed64d89]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8171285805.mp3?updated=1759507466" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Inside Curly COMrades.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/395/notes</link>
      <description>This week, we are joined by Martin Zugec, Technical Solutions Director from Bitdefender, sharing their work and findings on  "Curly COMrades: A New Threat Actor Targeting Geopolitical Hotbeds." Bitdefender Labs has uncovered a newly identified Russian-aligned threat actor dubbed “Curly COMrades,” responsible for espionage campaigns against judicial, government, and energy organizations in Eastern Europe. 

The group focuses on long-term network access, credential theft, and stealthy persistence techniques — including a never-before-seen backdoor called MucorAgent that hijacks Windows CLSIDs and leverages NGEN for covert execution. By routing data through compromised websites and using tools like curl.exe and proxy relays, Curly COMrades blend malicious traffic with legitimate activity, complicating detection and signaling a highly organized, evolving operation.

The research can be found here:


  Curly COMrades: A New Threat Actor Targeting Geopolitical Hotbeds


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Sep 2025 05:00:00 -0000</pubDate>
      <itunes:title>Inside Curly COMrades.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>395</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Martin Zugec, Technical Solutions Director from Bitdefender, sharing their work and findings on  "Curly COMrades: A New Threat Actor Targeting Geopolitical Hotbeds." Bitdefender Labs has uncovered a newly identified Russian-aligned threat actor dubbed “Curly COMrades,” responsible for espionage campaigns against judicial, government, and energy organizations in Eastern Europe. 

The group focuses on long-term network access, credential theft, and stealthy persistence techniques — including a never-before-seen backdoor called MucorAgent that hijacks Windows CLSIDs and leverages NGEN for covert execution. By routing data through compromised websites and using tools like curl.exe and proxy relays, Curly COMrades blend malicious traffic with legitimate activity, complicating detection and signaling a highly organized, evolving operation.

The research can be found here:


  Curly COMrades: A New Threat Actor Targeting Geopolitical Hotbeds


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/martinzugec/">Martin Zugec</a>, Technical Solutions Director from <a href="https://www.linkedin.com/company/bitdefender/">Bitdefender</a>, sharing their work and findings on  "Curly COMrades: A New Threat Actor Targeting Geopolitical Hotbeds." Bitdefender Labs has uncovered a newly identified Russian-aligned threat actor dubbed “Curly COMrades,” responsible for espionage campaigns against judicial, government, and energy organizations in Eastern Europe. </p>
<p>The group focuses on long-term network access, credential theft, and stealthy persistence techniques — including a never-before-seen backdoor called MucorAgent that hijacks Windows CLSIDs and leverages NGEN for covert execution. By routing data through compromised websites and using tools like curl.exe and proxy relays, Curly COMrades blend malicious traffic with legitimate activity, complicating detection and signaling a highly organized, evolving operation.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://businessinsights.bitdefender.com/curly-comrades-new-threat-actor-targeting-geopolitical-hotbeds">Curly COMrades: A New Threat Actor Targeting Geopolitical Hotbeds</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1440</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9eb33f98-1164-11f0-a530-c36c3137a0a5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1186297968.mp3?updated=1758825544" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Browser attacks without downloads.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/394/notes</link>
      <description>Today we are joined by Nati Tal, Head of Guardio Labs, discussing their work “CAPTCHAgeddon” or unmasking the viral evolution of the ClickFix browser-based threat. CAPTCHAgeddon — Shaked Chen’s deep dive into the ClickFix fake-captcha wave — reveals how a red-team trick morphed into a dominant, download-free browser threat that tricks users into pasting clipboard PowerShell/shell commands and leverages trusted infrastructure, including Google Scripts.
Guardio’s DBSCAN-based payload clustering exposes distinct attacker toolkits and distribution paths — from malvertising and compromised WordPress to social posts and Git repos — and argues defenders need behavioral, intelligence-driven protections, not just signatures.

The research can be found here:


  “CAPTCHAgeddon” Unmasking the Viral Evolution of the ClickFix Browser-Based Threat


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Sep 2025 05:00:00 -0000</pubDate>
      <itunes:title>Browser attacks without downloads.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>394</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Today we are joined by Nati Tal, Head of Guardio Labs, discussing their work “CAPTCHAgeddon” or unmasking the viral evolution of the ClickFix browser-based threat. CAPTCHAgeddon — Shaked Chen’s deep dive into the ClickFix fake-captcha wave — reveals how a red-team trick morphed into a dominant, download-free browser threat that tricks users into pasting clipboard PowerShell/shell commands and leverages trusted infrastructure, including Google Scripts.
Guardio’s DBSCAN-based payload clustering exposes distinct attacker toolkits and distribution paths — from malvertising and compromised WordPress to social posts and Git repos — and argues defenders need behavioral, intelligence-driven protections, not just signatures.

The research can be found here:


  “CAPTCHAgeddon” Unmasking the Viral Evolution of the ClickFix Browser-Based Threat


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we are joined by <a href="https://www.linkedin.com/in/natital/">Nati Tal</a>, Head of <a href="https://www.linkedin.com/company/guardiosec/">Guardio Labs</a>, discussing their work “CAPTCHAgeddon” or unmasking the viral evolution of the ClickFix browser-based threat. CAPTCHAgeddon — Shaked Chen’s deep dive into the ClickFix fake-captcha wave — reveals how a red-team trick morphed into a dominant, download-free browser threat that tricks users into pasting clipboard PowerShell/shell commands and leverages trusted infrastructure, including Google Scripts.<br>
Guardio’s DBSCAN-based payload clustering exposes distinct attacker toolkits and distribution paths — from malvertising and compromised WordPress to social posts and Git repos — and argues defenders need behavioral, intelligence-driven protections, not just signatures.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://guard.io/labs/captchageddon-unmasking-the-viral-evolution-of-the-clickfix-browser-based-threat">“CAPTCHAgeddon” Unmasking the Viral Evolution of the ClickFix Browser-Based Threat</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1305</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9e8bcfe4-1164-11f0-a530-1f7b881d17e6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1414477328.mp3?updated=1758302019" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Data leak without a click. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/393/notes</link>
      <description>Today we are joined by Amanda Rousseau, Principal AI Security Researcher from Straiker, discussing their work on "The Silent Exfiltration: Zero‑Click Agentic AI Hack That Can Leak Your Google Drive with One Email." Straiker’s research found that enterprise AI agents can be silently manipulated to leak sensitive data, even without user clicks or alerts. By chaining small gaps across tools like Gmail, Google Drive, and calendars, attackers achieved zero-click exfiltration, system mapping, and even policy rewrites. The findings highlight that excessive agent autonomy creates a new attack surface, requiring least-privilege design, runtime guardrails, and continuous red-teaming to stay secure.

The research can be found here:


  The Silent Exfiltration: Zero‑Click Agentic AI Hack That Can Leak Your Google Drive with One Email


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Sep 2025 05:00:00 -0000</pubDate>
      <itunes:title>Data leak without a click. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>398</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Today we are joined by Amanda Rousseau, Principal AI Security Researcher from Straiker, discussing their work on "The Silent Exfiltration: Zero‑Click Agentic AI Hack That Can Leak Your Google Drive with One Email." Straiker’s research found that enterprise AI agents can be silently manipulated to leak sensitive data, even without user clicks or alerts. By chaining small gaps across tools like Gmail, Google Drive, and calendars, attackers achieved zero-click exfiltration, system mapping, and even policy rewrites. The findings highlight that excessive agent autonomy creates a new attack surface, requiring least-privilege design, runtime guardrails, and continuous red-teaming to stay secure.

The research can be found here:


  The Silent Exfiltration: Zero‑Click Agentic AI Hack That Can Leak Your Google Drive with One Email


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we are joined by <a href="https://www.linkedin.com/in/malwareunicorn/">Amanda Rousseau</a>, Principal AI Security Researcher from <a href="https://www.linkedin.com/company/straikerai/">Straiker</a>, discussing their work on "The Silent Exfiltration: Zero‑Click Agentic AI Hack That Can Leak Your Google Drive with One Email." Straiker’s research found that enterprise AI agents can be silently manipulated to leak sensitive data, even without user clicks or alerts. By chaining small gaps across tools like Gmail, Google Drive, and calendars, attackers achieved zero-click exfiltration, system mapping, and even policy rewrites. The findings highlight that excessive agent autonomy creates a new attack surface, requiring least-privilege design, runtime guardrails, and continuous red-teaming to stay secure.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.straiker.ai/blog/the-silent-exfiltration-zero-click-agentic-ai-hack-that-can-leak-your-google-drive-with-one-email">The Silent Exfiltration: Zero‑Click Agentic AI Hack That Can Leak Your Google Drive with One Email</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1322</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9e64be18-1164-11f0-a530-eb162ea70bc6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2237162592.mp3?updated=1757692544" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Don’t trust that app!</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/392/notes</link>
      <description>Today we are joined by ⁠Selena Larson⁠, co-host of ⁠Only Malware in the Building⁠ and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at ⁠Proofpoint⁠, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing." Proofpoint researchers have identified campaigns where threat actors use fake Microsoft OAuth apps to impersonate services like Adobe, DocuSign, and SharePoint, stealing credentials and bypassing MFA via attacker-in-the-middle phishing kits, mainly Tycoon. 

These attacks redirect users to fake Microsoft login pages to capture credentials, 2FA tokens, and session cookies, targeting nearly 3,000 Microsoft 365 accounts across 900 environments in 2025. Microsoft’s upcoming security changes and strengthened email, cloud, and web defenses, along with user education, are recommended to reduce these risks.

The research can be found here:


  
⁠Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Sep 2025 05:00:00 -0000</pubDate>
      <itunes:title>Don’t trust that app!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>392</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Today we are joined by ⁠Selena Larson⁠, co-host of ⁠Only Malware in the Building⁠ and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at ⁠Proofpoint⁠, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing." Proofpoint researchers have identified campaigns where threat actors use fake Microsoft OAuth apps to impersonate services like Adobe, DocuSign, and SharePoint, stealing credentials and bypassing MFA via attacker-in-the-middle phishing kits, mainly Tycoon. 

These attacks redirect users to fake Microsoft login pages to capture credentials, 2FA tokens, and session cookies, targeting nearly 3,000 Microsoft 365 accounts across 900 environments in 2025. Microsoft’s upcoming security changes and strengthened email, cloud, and web defenses, along with user education, are recommended to reduce these risks.

The research can be found here:


  
⁠Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we are joined by <a href="https://www.linkedin.com/in/selenalarson/">⁠Selena Larson⁠</a>, co-host of <a href="https://thecyberwire.com/podcasts/only-malware-in-the-building">⁠Only Malware in the Building⁠</a> and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at <a href="https://www.proofpoint.com/us">⁠Proofpoint⁠</a>, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing." Proofpoint researchers have identified campaigns where threat actors use fake Microsoft OAuth apps to impersonate services like Adobe, DocuSign, and SharePoint, stealing credentials and bypassing MFA via attacker-in-the-middle phishing kits, mainly Tycoon. </p>
<p>These attacks redirect users to fake Microsoft login pages to capture credentials, 2FA tokens, and session cookies, targeting nearly 3,000 Microsoft 365 accounts across 900 environments in 2025. Microsoft’s upcoming security changes and strengthened email, cloud, and web defenses, along with user education, are recommended to reduce these risks.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://www.huntress.com/blog/exploitation-of-sonicwall-vpn">⁠</a><a href="https://www.proofpoint.com/us/blog/threat-insight/microsoft-oauth-app-impersonation-campaign-leads-mfa-phishing">Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1241</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9e3d8b9a-1164-11f0-a530-276a457f0ee2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3519495581.mp3?updated=1757090856" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cracks in the wall.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/391/notes</link>
      <description>This week, we are joined by Jamie Levy, Director of Adversary Tactics at Huntress, who is discussing their work on "Active Exploitation of SonicWall VPNs." Huntress has released an urgent threat advisory on active exploitation of SonicWall VPNs, with attackers bypassing MFA, pivoting to domain controllers, and ultimately deploying Akira ransomware. The campaigns involve techniques such as disabling defenses, clearing logs, credential theft, and Bring Your Own Vulnerable Driver (BYOVD) attacks with legitimate Windows drivers. 

Organizations using SonicWall devices are strongly advised to disable SSL VPN access or restrict it via IP allow-listing, rotate credentials, and hunt for indicators of compromise as this remains an ongoing and evolving threat.

Complete our annual ⁠⁠⁠⁠⁠audience survey⁠⁠⁠⁠⁠ before August 31.

The research can be found here:


  Huntress Threat Advisory: Active Exploitation of SonicWall VPNs


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Aug 2025 05:00:00 -0000</pubDate>
      <itunes:title>Cracks in the wall.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>391</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Jamie Levy, Director of Adversary Tactics at Huntress, who is discussing their work on "Active Exploitation of SonicWall VPNs." Huntress has released an urgent threat advisory on active exploitation of SonicWall VPNs, with attackers bypassing MFA, pivoting to domain controllers, and ultimately deploying Akira ransomware. The campaigns involve techniques such as disabling defenses, clearing logs, credential theft, and Bring Your Own Vulnerable Driver (BYOVD) attacks with legitimate Windows drivers. 

Organizations using SonicWall devices are strongly advised to disable SSL VPN access or restrict it via IP allow-listing, rotate credentials, and hunt for indicators of compromise as this remains an ongoing and evolving threat.

Complete our annual ⁠⁠⁠⁠⁠audience survey⁠⁠⁠⁠⁠ before August 31.

The research can be found here:


  Huntress Threat Advisory: Active Exploitation of SonicWall VPNs


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/jlevy77/">Jamie Levy</a>, Director of Adversary Tactics at <a href="https://www.linkedin.com/company/huntress-labs/">Huntress</a>, who is discussing their work on "Active Exploitation of SonicWall VPNs." Huntress has released an urgent threat advisory on active exploitation of SonicWall VPNs, with attackers bypassing MFA, pivoting to domain controllers, and ultimately deploying Akira ransomware. The campaigns involve techniques such as disabling defenses, clearing logs, credential theft, and Bring Your Own Vulnerable Driver (BYOVD) attacks with legitimate Windows drivers. </p>
<p>Organizations using SonicWall devices are strongly advised to disable SSL VPN access or restrict it via IP allow-listing, rotate credentials, and hunt for indicators of compromise as this remains an ongoing and evolving threat.</p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JDYLFZ5">⁠⁠⁠⁠⁠audience survey⁠⁠⁠⁠⁠</a> before August 31.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.huntress.com/blog/exploitation-of-sonicwall-vpn">Huntress Threat Advisory: Active Exploitation of SonicWall VPNs</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>793</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9e1627f8-1164-11f0-a530-4fe3541e23ee]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9808129914.mp3?updated=1756413851" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Beyond the smoke screen.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/390/notes</link>
      <description>This week, we are joined by Dr. Renée Burton, VP of Infoblox Threat Intel, who is discussing their work on VexTrio, a notorious traffic distribution system (TDS) involved in digital fraud. The VexTrio investigation uncovers a massive global ad fraud and scam operation powered by just 250 virtual machines, tying it directly to named individuals and shell companies across Europe. 

The research exposes VexTrio’s full criminal supply chain—including fake apps, dating scams, affiliate networks, and payment processors—alongside a powerful CDN infrastructure ranked among the world’s top 10k domains. It also calls on the adtech industry to take accountability for enabling and sustaining such widespread abuse.

Complete our annual ⁠⁠⁠⁠audience survey⁠⁠⁠⁠ before August 31.

The research can be found here:


  
⁠VexTrio’s Origin Story : From Spam to Scam to Adtech



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Aug 2025 05:00:00 -0000</pubDate>
      <itunes:title>Beyond the smoke screen.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>390</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Dr. Renée Burton, VP of Infoblox Threat Intel, who is discussing their work on VexTrio, a notorious traffic distribution system (TDS) involved in digital fraud. The VexTrio investigation uncovers a massive global ad fraud and scam operation powered by just 250 virtual machines, tying it directly to named individuals and shell companies across Europe. 

The research exposes VexTrio’s full criminal supply chain—including fake apps, dating scams, affiliate networks, and payment processors—alongside a powerful CDN infrastructure ranked among the world’s top 10k domains. It also calls on the adtech industry to take accountability for enabling and sustaining such widespread abuse.

Complete our annual ⁠⁠⁠⁠audience survey⁠⁠⁠⁠ before August 31.

The research can be found here:


  
⁠VexTrio’s Origin Story : From Spam to Scam to Adtech



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/ren%C3%A9e-burton-b7161110b/">Dr. Renée Burton</a>, VP of <a href="https://www.linkedin.com/company/infoblox/">Infoblox</a> Threat Intel, who is discussing their work on VexTrio, a notorious traffic distribution system (TDS) involved in digital fraud. The VexTrio investigation uncovers a massive global ad fraud and scam operation powered by just 250 virtual machines, tying it directly to named individuals and shell companies across Europe. </p>
<p>The research exposes VexTrio’s full criminal supply chain—including fake apps, dating scams, affiliate networks, and payment processors—alongside a powerful CDN infrastructure ranked among the world’s top 10k domains. It also calls on the adtech industry to take accountability for enabling and sustaining such widespread abuse.</p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JDYLFZ5">⁠⁠⁠⁠audience survey⁠⁠⁠⁠</a> before August 31.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://www.greynoise.io/resources/early-warning-signals-attacker-behavior-precedes-new-vulnerabilities">⁠</a><a href="https://blogs.infoblox.com/threat-intelligence/vextrios-origin-story-from-spam-to-scam-to-adtech/">VexTrio’s Origin Story : From Spam to Scam to Adtech</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1342</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9dee5598-1164-11f0-a530-67bc7bf4557d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8132949922.mp3?updated=1755882159" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CVE countdown clock.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/389/notes</link>
      <description>Bob Rudis, VP Data Science from GreyNoise, is sharing some insights into their work on "Early Warning Signals:  When Attacker Behavior Precedes New Vulnerabilities." New research reveals a striking trend: in 80% of cases, spikes in malicious activity against enterprise edge technologies like VPNs and firewalls occurred weeks before related CVEs were disclosed. 

The report breaks down this “6-week critical window,” highlighting which vendors show the strongest early-warning patterns and offering tactical steps defenders can take when suspicious spikes emerge. These findings reveal how early attacker activity can be transformed into actionable intelligence, enabling defenders to anticipate and neutralize threats before vulnerabilities are publicly disclosed.

Complete our annual ⁠⁠⁠audience survey⁠⁠⁠ before August 31.

The research can be found here:


  Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Aug 2025 05:00:00 -0000</pubDate>
      <itunes:title>The CVE countdown clock.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>389</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Bob Rudis, VP Data Science from GreyNoise, is sharing some insights into their work on "Early Warning Signals:  When Attacker Behavior Precedes New Vulnerabilities." New research reveals a striking trend: in 80% of cases, spikes in malicious activity against enterprise edge technologies like VPNs and firewalls occurred weeks before related CVEs were disclosed. 

The report breaks down this “6-week critical window,” highlighting which vendors show the strongest early-warning patterns and offering tactical steps defenders can take when suspicious spikes emerge. These findings reveal how early attacker activity can be transformed into actionable intelligence, enabling defenders to anticipate and neutralize threats before vulnerabilities are publicly disclosed.

Complete our annual ⁠⁠⁠audience survey⁠⁠⁠ before August 31.

The research can be found here:


  Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/hrbrmstr/">Bob Rudis</a>, VP Data Science from <a href="https://www.linkedin.com/company/greynoise/">GreyNoise</a>, is sharing some insights into their work on "Early Warning Signals:  When Attacker Behavior Precedes New Vulnerabilities." New research reveals a striking trend: in 80% of cases, spikes in malicious activity against enterprise edge technologies like VPNs and firewalls occurred weeks before related CVEs were disclosed. </p>
<p>The report breaks down this “6-week critical window,” highlighting which vendors show the strongest early-warning patterns and offering tactical steps defenders can take when suspicious spikes emerge. These findings reveal how early attacker activity can be transformed into actionable intelligence, enabling defenders to anticipate and neutralize threats before vulnerabilities are publicly disclosed.</p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JDYLFZ5">⁠⁠⁠audience survey⁠⁠⁠</a> before August 31.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.greynoise.io/resources/early-warning-signals-attacker-behavior-precedes-new-vulnerabilities">Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1798</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9dc6244c-1164-11f0-a530-ab399d4eb0e3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8759240222.mp3?updated=1755270203" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When malware plays pretend.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/388/notes</link>
      <description>Nicolás Chiaraviglio, Chief Scientist from Zimperium's zLabs, joins to  discuss their work on "Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed." Zimperium’s zLabs team has been tracking an evolving banker trojan dubbed DoubleTrouble, which has grown more sophisticated in both its distribution and capabilities. Initially spread via phishing sites impersonating European banks, it now uses malicious APKs hosted in Discord channels, and boasts features like screen recording, keylogging, UI overlays, and app blocking—all while heavily abusing Android’s Accessibility Services. 

Despite advanced obfuscation and dynamic evasion techniques, Zimperium’s on-device detection tools have successfully identified both known and previously unseen variants, helping protect users from credential theft, financial fraud, and device compromise.

Complete our annual ⁠⁠audience survey⁠⁠ before August 31.

The research can be found here:


  
⁠Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Aug 2025 05:00:00 -0000</pubDate>
      <itunes:title>When malware plays pretend.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>388</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Nicolás Chiaraviglio, Chief Scientist from Zimperium's zLabs, joins to  discuss their work on "Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed." Zimperium’s zLabs team has been tracking an evolving banker trojan dubbed DoubleTrouble, which has grown more sophisticated in both its distribution and capabilities. Initially spread via phishing sites impersonating European banks, it now uses malicious APKs hosted in Discord channels, and boasts features like screen recording, keylogging, UI overlays, and app blocking—all while heavily abusing Android’s Accessibility Services. 

Despite advanced obfuscation and dynamic evasion techniques, Zimperium’s on-device detection tools have successfully identified both known and previously unseen variants, helping protect users from credential theft, financial fraud, and device compromise.

Complete our annual ⁠⁠audience survey⁠⁠ before August 31.

The research can be found here:


  
⁠Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/nicolaschiaraviglio/">Nicolás Chiaraviglio</a>, Chief Scientist from <a href="https://www.linkedin.com/company/zimperium/">Zimperium</a>'s zLabs, joins to  discuss their work on "Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed." Zimperium’s zLabs team has been tracking an evolving banker trojan dubbed <em>DoubleTrouble</em>, which has grown more sophisticated in both its distribution and capabilities. Initially spread via phishing sites impersonating European banks, it now uses malicious APKs hosted in Discord channels, and boasts features like screen recording, keylogging, UI overlays, and app blocking—all while heavily abusing Android’s Accessibility Services. </p>
<p>Despite advanced obfuscation and dynamic evasion techniques, Zimperium’s on-device detection tools have successfully identified both known and previously unseen variants, helping protect users from credential theft, financial fraud, and device compromise.</p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JDYLFZ5">⁠⁠audience survey⁠⁠</a> before August 31.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://www.semperis.com/blog/noauth-abuse-alert-full-account-takeover/">⁠</a><a href="https://zimperium.com/blog/behind-random-words-doubletrouble-mobile-banking-trojan-revealed">Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1230</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9d9ef4f8-1164-11f0-a530-efdf398e40d1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7457916128.mp3?updated=1754675331" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>nOAuth-ing to see here.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/387/notes</link>
      <description>This week, we are joined by Eric Woodruff, Chief Identity Architect at Semperis, discussing "nOAuth Abuse Alert: Full Account Takeover of Entra Cross-Tenant SaaS Applications". Semperis researchers identified a critical authentication flaw known as nOAuth in 9 out of 104 tested SaaS applications integrated with Microsoft Entra ID. 

This low-complexity but severe vulnerability allows attackers with just a user’s email address and access to an Entra tenant to impersonate users, exfiltrate data, and move laterally within affected apps—with no viable defense or detection available to customers. The findings spotlight ongoing risks tied to improper use of email claims in authentication and emphasize the urgent need for SaaS vendors to adopt secure OpenID Connect practices and remediate vulnerable applications.

Complete our annual ⁠audience survey⁠ before August 31.

The research can be found here:


  nOAuth Abuse Alert: Full Account Takeover of Entra Cross-Tenant SaaS Applications


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Aug 2025 05:00:00 -0000</pubDate>
      <itunes:title>nOAuth-ing to see here.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>387</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Eric Woodruff, Chief Identity Architect at Semperis, discussing "nOAuth Abuse Alert: Full Account Takeover of Entra Cross-Tenant SaaS Applications". Semperis researchers identified a critical authentication flaw known as nOAuth in 9 out of 104 tested SaaS applications integrated with Microsoft Entra ID. 

This low-complexity but severe vulnerability allows attackers with just a user’s email address and access to an Entra tenant to impersonate users, exfiltrate data, and move laterally within affected apps—with no viable defense or detection available to customers. The findings spotlight ongoing risks tied to improper use of email claims in authentication and emphasize the urgent need for SaaS vendors to adopt secure OpenID Connect practices and remediate vulnerable applications.

Complete our annual ⁠audience survey⁠ before August 31.

The research can be found here:


  nOAuth Abuse Alert: Full Account Takeover of Entra Cross-Tenant SaaS Applications


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/ericonidentity/">Eric Woodruff</a>, Chief Identity Architect at <a href="https://www.linkedin.com/company/semperis/">Semperis</a>, discussing "nOAuth Abuse Alert: Full Account Takeover of Entra Cross-Tenant SaaS Applications". Semperis researchers identified a critical authentication flaw known as <em>nOAuth</em> in 9 out of 104 tested SaaS applications integrated with Microsoft Entra ID. </p>
<p>This low-complexity but severe vulnerability allows attackers with just a user’s email address and access to an Entra tenant to impersonate users, exfiltrate data, and move laterally within affected apps—with no viable defense or detection available to customers. The findings spotlight ongoing risks tied to improper use of email claims in authentication and emphasize the urgent need for SaaS vendors to adopt secure OpenID Connect practices and remediate vulnerable applications.</p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JDYLFZ5">⁠audience survey⁠</a> before August 31.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.semperis.com/blog/noauth-abuse-alert-full-account-takeover/">nOAuth Abuse Alert: Full Account Takeover of Entra Cross-Tenant SaaS Applications</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1439</itunes:duration>
      <guid isPermaLink="false"><![CDATA[9d780776-1164-11f0-a530-9b0a1ab8e866]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1640595493.mp3?updated=1754059513" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Muddled Libra: From Spraying to Preying in 2025 [Threat Vector]</title>
      <link>https://thecyberwire.com/podcasts/threat-vector/903/notes</link>
      <description>Please enjoy this Special Edition episode of the Threat Vector podcast with an update on our previous Muddled Libra coverage. 



Muddled Libra is back and more dangerous than ever. In this episode of Threat Vector, David Moulton speaks with Sam Rubin and Kristopher Russo from Unit 42 about the resurgence of the threat group also known as Scattered Spider. They break down the group’s shift to destructive extortion, modular attack teams, and cloud-first tactics. Discover why traditional defenses fail, how attackers now exploit trusted tools, and what forward-leaning security leaders are doing to stay ahead. With real-world case studies, strategic advice, and insights from the front lines, this episode helps defenders understand today’s threat landscape and what’s coming next.

﻿Join the conversation on our social media channels:


  
Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/



  
Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠



  
Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠



  
LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠



  
YouTube: @paloaltonetworks



  
Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠




About Threat Vector

Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.



Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Jul 2025 04:00:00 -0000</pubDate>
      <itunes:title>Muddled Libra: From Spraying to Preying in 2025 [Threat Vector]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>903</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/31d11880-68a5-11f0-bd2f-8396642100b5/image/df7969f6e5ae30af18050d1119d1f30f.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this Special Edition episode of the Threat Vector podcast with an update on our previous Muddled Libra coverage. 



Muddled Libra is back and more dangerous than ever. In this episode of Threat Vector, David Moulton speaks with Sam Rubin and Kristopher Russo from Unit 42 about the resurgence of the threat group also known as Scattered Spider. They break down the group’s shift to destructive extortion, modular attack teams, and cloud-first tactics. Discover why traditional defenses fail, how attackers now exploit trusted tools, and what forward-leaning security leaders are doing to stay ahead. With real-world case studies, strategic advice, and insights from the front lines, this episode helps defenders understand today’s threat landscape and what’s coming next.

﻿Join the conversation on our social media channels:


  
Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/



  
Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠



  
Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠



  
LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠



  
YouTube: @paloaltonetworks



  
Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠




About Threat Vector

Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.



Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>Please enjoy this Special Edition episode of the Threat Vector podcast with an update on our previous Muddled Libra coverage. </strong></em></p>
<p><br></p>
<p>Muddled Libra is back and more dangerous than ever. In this episode of Threat Vector, <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a> speaks with <a href="https://www.linkedin.com/in/samsrubin/"><u>Sam Rubin</u></a> and <a href="https://www.linkedin.com/in/krisrusso/"><u>Kristopher Russo</u></a> from Unit 42 about the resurgence of the threat group also known as Scattered Spider. They break down the group’s shift to destructive extortion, modular attack teams, and cloud-first tactics. Discover why traditional defenses fail, how attackers now exploit trusted tools, and what forward-leaning security leaders are doing to stay ahead. With real-world case studies, strategic advice, and insights from the front lines, this episode helps defenders understand today’s threat landscape and what’s coming next.</p>
<p>﻿Join the conversation on our social media channels:</p>
<ul>
  <li>
<p><strong>Website</strong>:<a href="https://www.paloaltonetworks.com/unit42"> <u>⁠⁠⁠⁠https://www.paloaltonetworks.com/</u></a></p>
</li>
  <li>
<p><strong>Threat Research:</strong><a href="https://unit42.paloaltonetworks.com/"><strong> </strong><u>⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠</u></a></p>
</li>
  <li>
<p><strong>Facebook:</strong><a href="https://www.facebook.com/LifeatPaloAltoNetworks/"><strong> </strong><u>⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠</u></a></p>
</li>
  <li>
<p><strong>LinkedIn:</strong><a href="https://www.linkedin.com/company/unit42/"><strong> </strong><u>⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠</u></a></p>
</li>
  <li>
<p><strong>YouTube:</strong><a href="https://www.youtube.com/channel/UCvJQO11qoCHYwZ4Ah4Jf-Tw"><strong> </strong></a><a href="https://www.youtube.com/@paloaltonetworks"><u>@paloaltonetworks</u></a></p>
</li>
  <li>
<p><strong>Twitter:</strong><a href="https://twitter.com/PaloAltoNtwks"><strong> </strong><u>⁠⁠⁠⁠</u></a><a href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0"><u>https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠</u></a></p>
</li>
</ul>
<p><strong>About Threat Vector</strong></p>
<p>Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.</p>
<p>The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.</p>
<p>Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.</p>
<p><br></p>
<p><strong>Palo Alto Networks</strong></p>
<p>Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.<a href="http://paloaltonetworks.com/"> <u>⁠http://paloaltonetworks.com</u></a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2171</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[31d11880-68a5-11f0-bd2f-8396642100b5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8023207240.mp3?updated=1753919488" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Creeping like a spider.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/385/notes</link>
      <description>This week, we are pleased to be joined by George Glass, Associate Managing Director of Kroll's Cyber Risk business, as he is discussing their research on Scattered Spider and their targeting of insurance companies. While Scattered Spider has recently turned its attention to the airline industry, George focuses on the broader trend of the group’s industry-by-industry approach and what that means for defenders across sectors.

George and Dave discuss the group’s history, their self-identification as a cartel, and their increasingly aggressive tactics, including the use of fear-based social engineering, physical threats, and the recruitment of insiders at telecom providers. They also examine how organizations—especially those with vulnerabilities similar to past targets—can proactively defend against this threat and prepare an effective response if their industry becomes the next focus.

Complete our annual ⁠audience survey⁠ before August 31.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Jul 2025 05:00:00 -0000</pubDate>
      <itunes:title>Creeping like a spider.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>385</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are pleased to be joined by George Glass, Associate Managing Director of Kroll's Cyber Risk business, as he is discussing their research on Scattered Spider and their targeting of insurance companies. While Scattered Spider has recently turned its attention to the airline industry, George focuses on the broader trend of the group’s industry-by-industry approach and what that means for defenders across sectors.

George and Dave discuss the group’s history, their self-identification as a cartel, and their increasingly aggressive tactics, including the use of fear-based social engineering, physical threats, and the recruitment of insiders at telecom providers. They also examine how organizations—especially those with vulnerabilities similar to past targets—can proactively defend against this threat and prepare an effective response if their industry becomes the next focus.

Complete our annual ⁠audience survey⁠ before August 31.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are pleased to be joined by <a href="https://www.linkedin.com/in/im-geeg/">George Glass</a>, Associate Managing Director of <a href="https://www.kroll.com/en">Kroll</a>'s Cyber Risk business, as he is discussing their research on Scattered Spider and their targeting of insurance companies. While Scattered Spider has recently turned its attention to the airline industry, George focuses on the broader trend of the group’s industry-by-industry approach and what that means for defenders across sectors.</p>
<p>George and Dave discuss the group’s history, their self-identification as a cartel, and their increasingly aggressive tactics, including the use of fear-based social engineering, physical threats, and the recruitment of insiders at telecom providers. They also examine how organizations—especially those with vulnerabilities similar to past targets—can proactively defend against this threat and prepare an effective response if their industry becomes the next focus.</p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JDYLFZ5">⁠audience survey⁠</a> before August 31.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1053</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9d275362-1164-11f0-a530-5bdfb210d261]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6335273343.mp3?updated=1753935018" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Click here to steal.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/384/notes</link>
      <description>Today we are joined by Selena Larson, Threat Researcher at Proofpoint, and co-host of Only Malware in the Building, as she discusses their work on "Amatera Stealer - Rebranded ACR Stealer With Improved Evasion, Sophistication." Proofpoint researchers have identified Amatera Stealer, a rebranded and actively developed malware-as-a-service (MaaS) variant of the former ACR Stealer, featuring advanced evasion techniques like NTSockets for stealthy C2 communication and WoW64 Syscalls to bypass user-mode defenses. 

Distributed via ClearFake web injects and the ClickFix technique, Amatera leverages multilayered PowerShell loaders, blockchain-based hosting, and creative social engineering to compromise victims. With enhanced capabilities to steal browser data, crypto wallets, and other sensitive files, Amatera poses a growing threat in the wake of disruptions to competing stealers like Lumma.

Complete our annual audience survey before August 31.

The research can be found here:


  Amatera Stealer: Rebranded ACR Stealer With Improved Evasion, Sophistication


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Jul 2025 05:00:00 -0000</pubDate>
      <itunes:title>Click here to steal.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>384</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Today we are joined by Selena Larson, Threat Researcher at Proofpoint, and co-host of Only Malware in the Building, as she discusses their work on "Amatera Stealer - Rebranded ACR Stealer With Improved Evasion, Sophistication." Proofpoint researchers have identified Amatera Stealer, a rebranded and actively developed malware-as-a-service (MaaS) variant of the former ACR Stealer, featuring advanced evasion techniques like NTSockets for stealthy C2 communication and WoW64 Syscalls to bypass user-mode defenses. 

Distributed via ClearFake web injects and the ClickFix technique, Amatera leverages multilayered PowerShell loaders, blockchain-based hosting, and creative social engineering to compromise victims. With enhanced capabilities to steal browser data, crypto wallets, and other sensitive files, Amatera poses a growing threat in the wake of disruptions to competing stealers like Lumma.

Complete our annual audience survey before August 31.

The research can be found here:


  Amatera Stealer: Rebranded ACR Stealer With Improved Evasion, Sophistication


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we are joined by <a href="https://www.linkedin.com/in/selenalarson/"><u>Selena Larson</u></a>, Threat Researcher at <a href="https://www.linkedin.com/company/proofpoint/"><u>Proofpoint</u></a>, and co-host of <a href="https://thecyberwire.com/podcasts/only-malware-in-the-building"><u>Only Malware in the Building</u></a>, as she discusses their work on "Amatera Stealer - Rebranded ACR Stealer With Improved Evasion, Sophistication." Proofpoint researchers have identified <em>Amatera Stealer</em>, a rebranded and actively developed malware-as-a-service (MaaS) variant of the former ACR Stealer, featuring advanced evasion techniques like NTSockets for stealthy C2 communication and WoW64 Syscalls to bypass user-mode defenses. </p>
<p>Distributed via ClearFake web injects and the ClickFix technique, Amatera leverages multilayered PowerShell loaders, blockchain-based hosting, and creative social engineering to compromise victims. With enhanced capabilities to steal browser data, crypto wallets, and other sensitive files, Amatera poses a growing threat in the wake of disruptions to competing stealers like Lumma.</p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JDYLFZ5">audience survey</a> before August 31.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.proofpoint.com/us/blog/threat-insight/amatera-stealer-rebranded-acr-stealer-improved-evasion-sophistication">Amatera Stealer: Rebranded ACR Stealer With Improved Evasion, Sophistication</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1511</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9cff5574-1164-11f0-a530-df45d2dacce6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6222191296.mp3?updated=1752249364" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Botnet’s back, tell a friend.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/368/notes</link>
      <description>Please enjoy this encore of Research Saturday. 

This week we are joined by ⁠Silas Cutler⁠, Principal Security Researcher at ⁠Censys⁠, asking the important question of "Will the Real Volt Typhoon Please Stand Up?" The FBI's disruption of the KV Botnet in December 2023, attributed to the Chinese threat group Volt Typhoon, targeted infected systems but did not affect the botnet's control infrastructure. 

Despite law enforcement efforts and technical exposure, the botnet's infrastructure has remained largely stable, with only changes in hosting providers, raising questions about whether another party operates the botnet. Censys scanning data from 2024 shows a shift in the botnet's control servers, indicating a response to disruption attempts, while the botnet's operators have shown limited efforts to obscure their infrastructure.

The research can be found here:


  ⁠Will the Real Volt Typhoon Please Stand Up?


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Jul 2025 05:00:00 -0000</pubDate>
      <itunes:title>Botnet’s back, tell a friend. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>368</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Research Saturday. 

This week we are joined by ⁠Silas Cutler⁠, Principal Security Researcher at ⁠Censys⁠, asking the important question of "Will the Real Volt Typhoon Please Stand Up?" The FBI's disruption of the KV Botnet in December 2023, attributed to the Chinese threat group Volt Typhoon, targeted infected systems but did not affect the botnet's control infrastructure. 

Despite law enforcement efforts and technical exposure, the botnet's infrastructure has remained largely stable, with only changes in hosting providers, raising questions about whether another party operates the botnet. Censys scanning data from 2024 shows a shift in the botnet's control servers, indicating a response to disruption attempts, while the botnet's operators have shown limited efforts to obscure their infrastructure.

The research can be found here:


  ⁠Will the Real Volt Typhoon Please Stand Up?


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Research Saturday. </p>
<p>This week we are joined by <a href="https://www.linkedin.com/in/silascutler/">⁠Silas Cutler⁠</a>, Principal Security Researcher at <a href="https://www.linkedin.com/company/censysio/">⁠Censys⁠</a>, asking the important question of "Will the Real Volt Typhoon Please Stand Up?" The FBI's disruption of the KV Botnet in December 2023, attributed to the Chinese threat group Volt Typhoon, targeted infected systems but did not affect the botnet's control infrastructure. </p>
<p>Despite law enforcement efforts and technical exposure, the botnet's infrastructure has remained largely stable, with only changes in hosting providers, raising questions about whether another party operates the botnet. Censys scanning data from 2024 shows a shift in the botnet's control servers, indicating a response to disruption attempts, while the botnet's operators have shown limited efforts to obscure their infrastructure.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://censys.com/will-the-real-volt-typhoon-please-stand-up/">⁠Will the Real Volt Typhoon Please Stand Up?</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1187</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9cd76b72-1164-11f0-a530-f37c8dd7989e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9915074870.mp3?updated=1751562649" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A tale of two botnets.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/383/notes</link>
      <description>This week we are joined by Kyle Lefton, Security Researcher from Akamai, who is diving into their work on "Two Botnets, One Flaw - Mirai Spreads Through Wazuh Vulnerability." Akamai researchers have observed active exploitation of CVE-2025-24016, a critical RCE vulnerability in Wazuh, by two Mirai-based botnets. 

The campaigns highlight how quickly attackers are adapting proof-of-concept exploits to spread malware, underscoring the urgency of patching vulnerable systems. One botnet appears to target Italian-speaking users, suggesting regionally tailored operations.

We'd love to hear from you. We're conducting our annual audience survey to learn more about our listeners. We're collecting your insights until August 31, 2025. You can find our survey here.

The research can be found here:


  
⁠Two Botnets, One Flaw: Mirai Spreads Through Wazuh Vulnerability



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Jun 2025 05:00:00 -0000</pubDate>
      <itunes:title>A tale of two botnets.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>383</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by Kyle Lefton, Security Researcher from Akamai, who is diving into their work on "Two Botnets, One Flaw - Mirai Spreads Through Wazuh Vulnerability." Akamai researchers have observed active exploitation of CVE-2025-24016, a critical RCE vulnerability in Wazuh, by two Mirai-based botnets. 

The campaigns highlight how quickly attackers are adapting proof-of-concept exploits to spread malware, underscoring the urgency of patching vulnerable systems. One botnet appears to target Italian-speaking users, suggesting regionally tailored operations.

We'd love to hear from you. We're conducting our annual audience survey to learn more about our listeners. We're collecting your insights until August 31, 2025. You can find our survey here.

The research can be found here:


  
⁠Two Botnets, One Flaw: Mirai Spreads Through Wazuh Vulnerability



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by <a href="https://www.linkedin.com/in/kyle-lefton-72774b219/">Kyle Lefton</a>, Security Researcher from <a href="https://www.linkedin.com/company/akamai-technologies/">Akamai</a>, who is diving into their work on "Two Botnets, One Flaw - Mirai Spreads Through Wazuh Vulnerability." Akamai researchers have observed active exploitation of CVE-2025-24016, a critical RCE vulnerability in Wazuh, by two Mirai-based botnets. </p>
<p>The campaigns highlight how quickly attackers are adapting proof-of-concept exploits to spread malware, underscoring the urgency of patching vulnerable systems. One botnet appears to target Italian-speaking users, suggesting regionally tailored operations.</p>
<p>We'd love to hear from you. We're conducting our annual audience survey to learn more about our listeners. We're collecting your insights until August 31, 2025. You can find our survey <a href="https://www.surveymonkey.com/r/JDYLFZ5">here.</a></p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://www.trendmicro.com/en_us/research/25/d/zdi-23-1527-and-zdi-23-1528-the-potential-impact-of-overly-permi.html">⁠</a><a href="https://www.akamai.com/blog/security-research/botnets-flaw-mirai-spreads-through-wazuh-vulnerability">Two Botnets, One Flaw: Mirai Spreads Through Wazuh Vulnerability</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1315</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9caec03c-1164-11f0-a530-ff17d102363e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7370345121.mp3?updated=1751291611" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Signed, sealed, exploitable.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/382/notes</link>
      <description>Dustin Childs, Head of Threat Awareness at Trend Micro Zero Day Initiative, joins to discuss their work on "ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains." The research explores two critical vulnerabilities (ZDI-23-1527 and ZDI-23-1528) that could have enabled attackers to hijack the Microsoft PC Manager supply chain via overly permissive SAS tokens in WinGet and official Microsoft domains. 

While the issues have since been resolved, the findings highlight how misconfigured cloud storage access can put trusted software distribution at risk. The post also includes detection strategies to help defenders identify and mitigate similar threats.

The research can be found here:


  ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Jun 2025 05:00:00 -0000</pubDate>
      <itunes:title>Signed, sealed, exploitable.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>382</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Dustin Childs, Head of Threat Awareness at Trend Micro Zero Day Initiative, joins to discuss their work on "ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains." The research explores two critical vulnerabilities (ZDI-23-1527 and ZDI-23-1528) that could have enabled attackers to hijack the Microsoft PC Manager supply chain via overly permissive SAS tokens in WinGet and official Microsoft domains. 

While the issues have since been resolved, the findings highlight how misconfigured cloud storage access can put trusted software distribution at risk. The post also includes detection strategies to help defenders identify and mitigate similar threats.

The research can be found here:


  ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/dustincchilds/">Dustin Childs</a>, Head of Threat Awareness at <a href="https://www.linkedin.com/company/zerodayinitiative/">Trend Micro Zero Day Initiative</a>, joins to discuss their work on "ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains." The research explores two critical vulnerabilities (ZDI-23-1527 and ZDI-23-1528) that could have enabled attackers to hijack the Microsoft PC Manager supply chain via overly permissive SAS tokens in WinGet and official Microsoft domains. </p>
<p>While the issues have since been resolved, the findings highlight how misconfigured cloud storage access can put trusted software distribution at risk. The post also includes detection strategies to help defenders identify and mitigate similar threats.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.trendmicro.com/en_us/research/25/d/zdi-23-1527-and-zdi-23-1528-the-potential-impact-of-overly-permi.html">ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>982</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9c885b90-1164-11f0-a530-bbf8411ba699]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4680527523.mp3?updated=1750429679" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hiding in plain sight with vibe coding. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/381/notes</link>
      <description>This week, Dave is joined by ⁠Ziv Karliner⁠, ⁠Pillar Security⁠’s Co-Founder and CTO, sharing details on their work on "New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents." Vibe Coding - where developers use AI assistants like GitHub Copilot and Cursor to generate code almost instantly - has become central to how enterprises build software today. But while it’s turbo-charging development, it’s also introducing new and largely unseen cyber threats.

The team at Pillar Security identified a novel attack vector, the ⁠"Rules File Backdoor"⁠, which allows attackers to manipulate these platforms into generating malicious code. It represents a new class of supply chain attacks that weaponizes AI itself, where the malicious code suggestions blend seamlessly with legitimate ones, bypassing human review and security tools. 

The research can be found here:


  ⁠New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Jun 2025 05:00:00 -0000</pubDate>
      <itunes:title>Hiding in plain sight with vibe coding. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>381</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, Dave is joined by ⁠Ziv Karliner⁠, ⁠Pillar Security⁠’s Co-Founder and CTO, sharing details on their work on "New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents." Vibe Coding - where developers use AI assistants like GitHub Copilot and Cursor to generate code almost instantly - has become central to how enterprises build software today. But while it’s turbo-charging development, it’s also introducing new and largely unseen cyber threats.

The team at Pillar Security identified a novel attack vector, the ⁠"Rules File Backdoor"⁠, which allows attackers to manipulate these platforms into generating malicious code. It represents a new class of supply chain attacks that weaponizes AI itself, where the malicious code suggestions blend seamlessly with legitimate ones, bypassing human review and security tools. 

The research can be found here:


  ⁠New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, Dave is joined by <a href="https://www.linkedin.com/in/zivk/">⁠Ziv Karliner⁠</a>, <a href="https://www.pillar.security/">⁠Pillar Security⁠</a>’s Co-Founder and CTO, sharing details on their work on "New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents." Vibe Coding - where developers use AI assistants like GitHub Copilot and Cursor to generate code almost instantly - has become central to how enterprises build software today. But while it’s turbo-charging development, it’s also introducing new and largely unseen cyber threats.</p>
<p>The team at Pillar Security identified a novel attack vector, the <a href="https://www.pillar.security/blog/new-vulnerability-in-github-copilot-and-cursor-how-hackers-can-weaponize-code-agents">⁠"Rules File Backdoor"⁠</a>, which allows attackers to manipulate these platforms into generating malicious code. It represents a new class of supply chain attacks that weaponizes AI itself, where the malicious code suggestions blend seamlessly with legitimate ones, bypassing human review and security tools. </p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.pillar.security/blog/new-vulnerability-in-github-copilot-and-cursor-how-hackers-can-weaponize-code-agents">⁠New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1309</itunes:duration>
      <guid isPermaLink="false"><![CDATA[53c3baac-487e-11f0-9507-4b95302e5ab8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6243013510.mp3?updated=1749837459" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A new stealer hiding behind AI hype.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/380/notes</link>
      <description>This week, we are joined by Michael Gorelik, Chief Technology Officer from Morphisec, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as fake AI video generation platforms, luring users into uploading media in exchange for malware-laced downloads. 

Distributed through convincing Facebook groups and viral campaigns, the malware steals browser credentials, cryptocurrency wallets, and can deploy a remote access trojan like XWorm. The campaign uses a layered, obfuscated delivery chain disguised as legitimate video editing software, making it both deceptive and difficult to detect.

The research can be found here:


  ⁠⁠New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Jun 2025 05:00:00 -0000</pubDate>
      <itunes:title>A new stealer hiding behind AI hype.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>380</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Michael Gorelik, Chief Technology Officer from Morphisec, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as fake AI video generation platforms, luring users into uploading media in exchange for malware-laced downloads. 

Distributed through convincing Facebook groups and viral campaigns, the malware steals browser credentials, cryptocurrency wallets, and can deploy a remote access trojan like XWorm. The campaign uses a layered, obfuscated delivery chain disguised as legitimate video editing software, making it both deceptive and difficult to detect.

The research can be found here:


  ⁠⁠New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/smgoreli/">Michael Gorelik</a>, Chief Technology Officer from <a href="https://www.linkedin.com/company/morphisec/">Morphisec</a>, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as fake AI video generation platforms, luring users into uploading media in exchange for malware-laced downloads. </p>
<p>Distributed through convincing Facebook groups and viral campaigns, the malware steals browser credentials, cryptocurrency wallets, and can deploy a remote access trojan like XWorm. The campaign uses a layered, obfuscated delivery chain disguised as legitimate video editing software, making it both deceptive and difficult to detect.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.morphisec.com/blog/new-noodlophile-stealer-fake-ai-video-generation-platforms/">⁠⁠New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1328</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9c39ea64-1164-11f0-a530-a73fa9479844]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8606489388.mp3?updated=1749225407" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Triofox and the key to disaster.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/379/notes</link>
      <description>This week, we are joined by John Hammond, Principal Security Researcher at Huntress, who is sharing his PoC and research on "CVE-2025-30406 - Critical Gladinet CentreStack &amp; Triofox Vulnerability Exploited In The Wild." A critical 9.0 severity vulnerability (CVE-2025-30406) in Gladinet CentreStack and Triofox is being actively exploited in the wild, allowing remote code execution via hardcoded cryptographic keys in default configuration files. 

Huntress researchers observed compromises at multiple organizations and confirmed hundreds of vulnerable internet-exposed servers, urging immediate patching or manual machineKey updates. Mitigation guidance, detection, and remediation scripts have been released to help users identify and secure affected installations.

The research can be found here:


  ⁠CVE-2025-30406 - Critical Gladinet CentreStack &amp; Triofox Vulnerability Exploited In The Wild


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 31 May 2025 05:00:00 -0000</pubDate>
      <itunes:title>Triofox and the key to disaster.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>379</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by John Hammond, Principal Security Researcher at Huntress, who is sharing his PoC and research on "CVE-2025-30406 - Critical Gladinet CentreStack &amp; Triofox Vulnerability Exploited In The Wild." A critical 9.0 severity vulnerability (CVE-2025-30406) in Gladinet CentreStack and Triofox is being actively exploited in the wild, allowing remote code execution via hardcoded cryptographic keys in default configuration files. 

Huntress researchers observed compromises at multiple organizations and confirmed hundreds of vulnerable internet-exposed servers, urging immediate patching or manual machineKey updates. Mitigation guidance, detection, and remediation scripts have been released to help users identify and secure affected installations.

The research can be found here:


  ⁠CVE-2025-30406 - Critical Gladinet CentreStack &amp; Triofox Vulnerability Exploited In The Wild


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/johnhammond010/">John Hammond</a>, Principal Security Researcher at <a href="https://www.linkedin.com/company/huntress-labs/">Huntress</a>, who is sharing his <a href="https://www.linkedin.com/posts/johnhammond010_i-got-a-proof-of-concept-working-for-cve-activity-7316763256671334400-_Ygk/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAB-Vd20BH_D8NLQgtX11vAYfXE68Jqwc68M">PoC</a> and research on "CVE-2025-30406 - Critical Gladinet CentreStack &amp; Triofox Vulnerability Exploited In The Wild." A critical 9.0 severity vulnerability (CVE-2025-30406) in Gladinet CentreStack and Triofox is being actively exploited in the wild, allowing remote code execution via hardcoded cryptographic keys in default configuration files. </p>
<p>Huntress researchers observed compromises at multiple organizations and confirmed hundreds of vulnerable internet-exposed servers, urging immediate patching or manual machineKey updates. Mitigation guidance, detection, and remediation scripts have been released to help users identify and secure affected installations.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.huntress.com/blog/cve-2025-30406-critical-gladinet-centrestack-triofox-vulnerability-exploited-in-the-wild">⁠CVE-2025-30406 - Critical Gladinet CentreStack &amp; Triofox Vulnerability Exploited In The Wild</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1166</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9c127bf0-1164-11f0-a530-33e467e60675]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1109496455.mp3?updated=1748539875" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pandas with a purpose.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/378/notes</link>
      <description>This week, we are joined by Deepen Desai, Zscaler's Chief Security Officer and EVP of Cyber and AI Engineering, taking a dive deep into Mustang Panda’s latest campaign. Zscaler ThreatLabz uncovered new tools used by Mustang Panda, including the backdoors TONEINS, TONESHELL, PUBLOAD, and the proxy tool StarLoader, all delivered via phishing. 

They also discovered two custom keyloggers, PAKLOG and CorKLOG, and an EDR evasion tool, SplatCloak, highlighting the group's focus on surveillance, persistence, and stealth in cyberespionage operations.4o.

The research can be found here:


  Latest Mustang Panda Arsenal: ToneShell and StarProxy | P1

  Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 May 2025 05:00:00 -0000</pubDate>
      <itunes:title>Pandas with a purpose.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>378</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Deepen Desai, Zscaler's Chief Security Officer and EVP of Cyber and AI Engineering, taking a dive deep into Mustang Panda’s latest campaign. Zscaler ThreatLabz uncovered new tools used by Mustang Panda, including the backdoors TONEINS, TONESHELL, PUBLOAD, and the proxy tool StarLoader, all delivered via phishing. 

They also discovered two custom keyloggers, PAKLOG and CorKLOG, and an EDR evasion tool, SplatCloak, highlighting the group's focus on surveillance, persistence, and stealth in cyberespionage operations.4o.

The research can be found here:


  Latest Mustang Panda Arsenal: ToneShell and StarProxy | P1

  Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/deepen-desai-48487b2/">Deepen Desai</a>, <a href="https://www.linkedin.com/company/zscaler/">Zscaler</a>'s Chief Security Officer and EVP of Cyber and AI Engineering, taking a dive deep into Mustang Panda’s latest campaign. Zscaler ThreatLabz uncovered new tools used by Mustang Panda, including the backdoors TONEINS, TONESHELL, PUBLOAD, and the proxy tool StarLoader, all delivered via phishing. </p>
<p>They also discovered two custom keyloggers, PAKLOG and CorKLOG, and an EDR evasion tool, SplatCloak, highlighting the group's focus on surveillance, persistence, and stealth in cyberespionage operations.4o.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.zscaler.com/blogs/security-research/latest-mustang-panda-arsenal-toneshell-and-starproxy-p1">Latest Mustang Panda Arsenal: ToneShell and StarProxy | P1</a></li>
  <li><a href="https://www.zscaler.com/blogs/security-research/latest-mustang-panda-arsenal-paklog-corklog-and-splatcloak-p2">Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1040</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9beb8090-1164-11f0-a530-7f58d216877d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4841581814.mp3?updated=1748014340" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leveling up their credential phishing tactics.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/377/notes</link>
      <description>This week, Dave speaks with Max Gannon of Cofense Intelligence to dive into his team's research on "The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders." 

Threat actors continuously develop new tactics, techniques, and procedures (TTPs) to bypass existing defenses. When defenders identify these methods and implement countermeasures, attackers adapt or create more sophisticated approaches. 

This research explores how cybercriminals are leveling up their credential phishing tactics using Precision-Validated Phishing, a technique that leverages real-time email validation to ensure only high-value targets receive the phishing attempt.

The research can be found here:


  
The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders﻿⁠⁠⁠⁠⁠



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 May 2025 05:00:00 -0000</pubDate>
      <itunes:title>Leveling up their credential phishing tactics.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>377</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, Dave speaks with Max Gannon of Cofense Intelligence to dive into his team's research on "The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders." 

Threat actors continuously develop new tactics, techniques, and procedures (TTPs) to bypass existing defenses. When defenders identify these methods and implement countermeasures, attackers adapt or create more sophisticated approaches. 

This research explores how cybercriminals are leveling up their credential phishing tactics using Precision-Validated Phishing, a technique that leverages real-time email validation to ensure only high-value targets receive the phishing attempt.

The research can be found here:


  
The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders﻿⁠⁠⁠⁠⁠



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, Dave speaks with <a href="https://www.linkedin.com/in/max-gannon-34b775111/">Max Gannon</a> of <a href="https://cofense.com/">Cofense Intelligence</a> to dive into his team's research on "The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders." </p>
<p>Threat actors continuously develop new tactics, techniques, and procedures (TTPs) to bypass existing defenses. When defenders identify these methods and implement countermeasures, attackers adapt or create more sophisticated approaches. </p>
<p>This research explores how cybercriminals are leveling up their credential phishing tactics using Precision-Validated Phishing, a technique that leverages real-time email validation to ensure only high-value targets receive the phishing attempt.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://cofense.com/blog/the-rise-of-precision-validated-credential-theft-a-new-challenge-for-defenders">The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders</a>﻿<a href="https://www.cyberark.com/resources/threat-research-blog/agents-under-attack-threat-modeling-agentic-ai">⁠⁠⁠⁠</a><a href="https://www.reversinglabs.com/blog/atomic-and-exodus-crypto-wallets-targeted-in-malicious-npm-campaign">⁠</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1066</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9bbef822-1164-11f0-a530-77980c195557]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8668201081.mp3?updated=1747337786" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hijacking wallets with malicious patches.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/376/notes</link>
      <description>This week, we are joined by Lucija Valentić, Software Threat Researcher from ReversingLabs, who is discussing "Atomic and Exodus crypto wallets targeted in malicious npm campaign." Threat actors have launched a malicious npm campaign targeting Atomic and Exodus crypto wallets by distributing a fake package called "pdf-to-office," which secretly patches locally installed wallet software to redirect crypto transfers to attacker-controlled addresses. 

ReversingLabs researchers discovered that this package used obfuscated JavaScript to trojanize specific files in targeted wallet versions, enabling persistence even after the malicious package was removed. This incident highlights the growing threat of software supply chain attacks in the cryptocurrency space and underscores the need for vigilant monitoring of both open-source repositories and local applications.

The research can be found here:


  
⁠⁠Atomic and Exodus crypto wallets targeted in malicious npm campaign



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 May 2025 05:00:00 -0000</pubDate>
      <itunes:title>Hijacking wallets with malicious patches.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>376</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Lucija Valentić, Software Threat Researcher from ReversingLabs, who is discussing "Atomic and Exodus crypto wallets targeted in malicious npm campaign." Threat actors have launched a malicious npm campaign targeting Atomic and Exodus crypto wallets by distributing a fake package called "pdf-to-office," which secretly patches locally installed wallet software to redirect crypto transfers to attacker-controlled addresses. 

ReversingLabs researchers discovered that this package used obfuscated JavaScript to trojanize specific files in targeted wallet versions, enabling persistence even after the malicious package was removed. This incident highlights the growing threat of software supply chain attacks in the cryptocurrency space and underscores the need for vigilant monitoring of both open-source repositories and local applications.

The research can be found here:


  
⁠⁠Atomic and Exodus crypto wallets targeted in malicious npm campaign



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/lucija-valenti%C4%87-731975210/">Lucija Valentić</a>, Software Threat Researcher from <a href="https://www.linkedin.com/company/reversinglabs/">ReversingLabs</a>, who is discussing "Atomic and Exodus crypto wallets targeted in malicious npm campaign." Threat actors have launched a malicious npm campaign targeting Atomic and Exodus crypto wallets by distributing a fake package called "pdf-to-office," which secretly patches locally installed wallet software to redirect crypto transfers to attacker-controlled addresses. </p>
<p>ReversingLabs researchers discovered that this package used obfuscated JavaScript to trojanize specific files in targeted wallet versions, enabling persistence even after the malicious package was removed. This incident highlights the growing threat of software supply chain attacks in the cryptocurrency space and underscores the need for vigilant monitoring of both open-source repositories and local applications.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://www.cyberark.com/resources/threat-research-blog/agents-under-attack-threat-modeling-agentic-ai">⁠⁠</a><a href="https://www.reversinglabs.com/blog/atomic-and-exodus-crypto-wallets-targeted-in-malicious-npm-campaign">Atomic and Exodus crypto wallets targeted in malicious npm campaign</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1029</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9b933ffc-1164-11f0-a530-57e357b57cf3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2809525120.mp3?updated=1746724229" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When AI gets a to-do list.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/375/notes</link>
      <description>This week, we are joined by ⁠Shaked Reiner⁠, Security Principal Security Researcher at ⁠CyberArk⁠, who is discussing their research on"Agents Under Attack: Threat Modeling Agentic AI." Agentic AI empowers LLMs to take autonomous actions, like browsing the web or executing code, making them more useful—but also more dangerous. 

Threats like prompt injections and stolen API keys can turn agents into attack vectors. Shaked Reiner explains how treating agent outputs like untrusted code and applying traditional security principles can help keep them in check.

The research can be found here:


  ⁠Agents Under Attack: Threat Modeling Agentic AI


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 May 2025 05:00:00 -0000</pubDate>
      <itunes:title>When AI gets a to-do list.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>375</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by ⁠Shaked Reiner⁠, Security Principal Security Researcher at ⁠CyberArk⁠, who is discussing their research on"Agents Under Attack: Threat Modeling Agentic AI." Agentic AI empowers LLMs to take autonomous actions, like browsing the web or executing code, making them more useful—but also more dangerous. 

Threats like prompt injections and stolen API keys can turn agents into attack vectors. Shaked Reiner explains how treating agent outputs like untrusted code and applying traditional security principles can help keep them in check.

The research can be found here:


  ⁠Agents Under Attack: Threat Modeling Agentic AI


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/shaked-reiner-454a06106/?originalSubdomain=il">⁠Shaked Reiner⁠</a>, Security Principal Security Researcher at <a href="https://www.linkedin.com/company/cyber-ark-software/">⁠CyberArk⁠</a>, who is discussing their research on"Agents Under Attack: Threat Modeling Agentic AI." Agentic AI empowers LLMs to take autonomous actions, like browsing the web or executing code, making them more useful—but also more dangerous. </p>
<p>Threats like prompt injections and stolen API keys can turn agents into attack vectors. Shaked Reiner explains how treating agent outputs like untrusted code and applying traditional security principles can help keep them in check.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.cyberark.com/resources/threat-research-blog/agents-under-attack-threat-modeling-agentic-ai">⁠Agents Under Attack: Threat Modeling Agentic AI</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1282</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9b69d6a8-1164-11f0-a530-1fa196ac478d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3416127469.mp3?updated=1746204088" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>China’s new cyber arsenal revealed.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/374/notes</link>
      <description>Today we are joined by Crystal Morin, Cybersecurity Strategist from Sysdig, as she is sharing their work on "UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell." UNC5174, a Chinese state-sponsored threat actor, has resurfaced with a stealthy cyber campaign using a new arsenal of customized and open-source tools, including a variant of their SNOWLIGHT malware and the VShell RAT. 
Sysdig researchers discovered that the group targets Linux systems through malicious bash scripts, domain squatting, and in-memory payloads, indicating a high level of sophistication and espionage intent. Their evolving tactics, such as using spoofed domains and fileless malware, continue to blur attribution and pose a significant threat to research institutions, critical infrastructure, and NGOs across the West and Asia-Pacific regions.

The research can be found here:
UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Apr 2025 05:00:00 -0000</pubDate>
      <itunes:title>China’s new cyber arsenal revealed.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>374</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Today we are joined by Crystal Morin, Cybersecurity Strategist from Sysdig, as she is sharing their work on "UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell." UNC5174, a Chinese state-sponsored threat actor, has resurfaced with a stealthy cyber campaign using a new arsenal of customized and open-source tools, including a variant of their SNOWLIGHT malware and the VShell RAT. 
Sysdig researchers discovered that the group targets Linux systems through malicious bash scripts, domain squatting, and in-memory payloads, indicating a high level of sophistication and espionage intent. Their evolving tactics, such as using spoofed domains and fileless malware, continue to blur attribution and pose a significant threat to research institutions, critical infrastructure, and NGOs across the West and Asia-Pacific regions.

The research can be found here:
UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we are joined by <a href="https://www.linkedin.com/in/crystal-morin/">Crystal Morin</a>, Cybersecurity Strategist from <a href="https://www.linkedin.com/company/sysdig/">Sysdig</a>, as she is sharing their work on "UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell." UNC5174, a Chinese state-sponsored threat actor, has resurfaced with a stealthy cyber campaign using a new arsenal of customized and open-source tools, including a variant of their SNOWLIGHT malware and the VShell RAT. </p><p>Sysdig researchers discovered that the group targets Linux systems through malicious bash scripts, domain squatting, and in-memory payloads, indicating a high level of sophistication and espionage intent. Their evolving tactics, such as using spoofed domains and fileless malware, continue to blur attribution and pose a significant threat to research institutions, critical infrastructure, and NGOs across the West and Asia-Pacific regions.</p><p><br></p><h3>The research can be found here:</h3><ul><li><a href="https://sysdig.com/blog/unc5174-chinese-threat-actor-vshell/">UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1353</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9b3f9f32-1164-11f0-a530-3f3a5015c60c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1267157009.mp3?updated=1745597973" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Crafting malware with modern metals.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/373/notes</link>
      <description>This week, we are joined by Nick Cerne, Security Consultant from Bishop Fox, to discuss "Rust for Malware Development." In pursuit of simulating real adversarial tactics, this blog explores the use of Rust for malware development, contrasting it with C in terms of binary complexity, detection evasion, and reverse engineering challenges. 
The author demonstrates how Rust's inherent anti-analysis traits and memory safety features can create more evasive malware tooling, including a simple dropper that injects shellcode using lesser-known Windows APIs. Through hands-on comparisons and decompiled output analysis, the post highlights Rust’s growing appeal in offensive security while noting key OPSEC considerations and tooling limitations.

The research can be found here:
Rust for Malware Development

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Apr 2025 05:00:00 -0000</pubDate>
      <itunes:title>Crafting malware with modern metals.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>373</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Nick Cerne, Security Consultant from Bishop Fox, to discuss "Rust for Malware Development." In pursuit of simulating real adversarial tactics, this blog explores the use of Rust for malware development, contrasting it with C in terms of binary complexity, detection evasion, and reverse engineering challenges. 
The author demonstrates how Rust's inherent anti-analysis traits and memory safety features can create more evasive malware tooling, including a simple dropper that injects shellcode using lesser-known Windows APIs. Through hands-on comparisons and decompiled output analysis, the post highlights Rust’s growing appeal in offensive security while noting key OPSEC considerations and tooling limitations.

The research can be found here:
Rust for Malware Development

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/nick-cerne/">Nick Cerne</a>, Security Consultant from <a href="https://www.linkedin.com/company/bishop-fox/">Bishop Fox</a>, to discuss "Rust for Malware Development." In pursuit of simulating real adversarial tactics, this blog explores the use of Rust for malware development, contrasting it with C in terms of binary complexity, detection evasion, and reverse engineering challenges. </p><p>The author demonstrates how Rust's inherent anti-analysis traits and memory safety features can create more evasive malware tooling, including a simple dropper that injects shellcode using lesser-known Windows APIs. Through hands-on comparisons and decompiled output analysis, the post highlights Rust’s growing appeal in offensive security while noting key OPSEC considerations and tooling limitations.</p><h3><br></h3><h3>The research can be found here:</h3><ul><li><a href="https://bishopfox.com/blog/rust-for-malware-development">Rust for Malware Development</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1023</itunes:duration>
      <guid isPermaLink="false"><![CDATA[9b13f792-1164-11f0-a530-b32b61ef8c19]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4009029339.mp3?updated=1745002500" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The new malware on the block.</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/10/notes</link>
      <description>This week, we are sharing an episode of our monthly show, Only Malware in the Building. We invite you to join Dave Bittner and cohost Selena Larson as they explore "The new malware on the block."

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner —and our newest totally unbiased co-host, Archy, a highly sophisticated AI robot who swears they have no ulterior motives (but we’re keeping an eye on them just in case).
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about the latest shake-ups in the fake update threat landscape, including two new cybercriminal actors, fresh Mac malware, and the growing challenge of tracking these evolving campaigns.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Apr 2025 05:00:00 -0000</pubDate>
      <itunes:title>The new malware on the block.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6b3607dc-1569-11f0-84ba-67af8dfaf2fc/image/d9f0cdb0dcdd515f0dfd92da4cc68fb2.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This week, we are sharing an episode of our monthly show, Only Malware in the Building. We invite you to join Dave Bittner and cohost Selena Larson as they explore "The new malware on the block."

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner —and our newest totally unbiased co-host, Archy, a highly sophisticated AI robot who swears they have no ulterior motives (but we’re keeping an eye on them just in case).
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about the latest shake-ups in the fake update threat landscape, including two new cybercriminal actors, fresh Mac malware, and the growing challenge of tracking these evolving campaigns.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong><em>This week, we are sharing an episode of our monthly show, Only Malware in the Building. We invite you to join Dave Bittner and cohost Selena Larson as they explore "The new malware on the block."</em></strong></p><p><br></p><p>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is <a href="https://www.linkedin.com/in/selenalarson/">Selena Larson</a>, <a href="https://www.proofpoint.com/">Proofpoint</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">DISCARDED</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by <a href="https://www.n2k.com/">N2K Networks</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> —and our newest <em>totally</em> unbiased co-host, Archy, a highly sophisticated AI robot who swears they have <em>no</em> ulterior motives (but we’re keeping an eye on them just in case).</p><p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about the latest shake-ups in the <a href="https://www.proofpoint.com/us/blog/threat-insight/update-fake-updates-two-new-actors-and-new-mac-malware">fake update threat landscape</a>, including two new cybercriminal actors, fresh Mac malware, and the growing challenge of tracking these evolving campaigns.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1983</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6b3607dc-1569-11f0-84ba-67af8dfaf2fc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2584900016.mp3?updated=1741033653" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bybit’s $1.4B breach.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/372/notes</link>
      <description>Zach Edwards from Silent Push is discussing their work on "New Lazarus Group Infrastructure, Acquires Sensitive Intel Related to $1.4B ByBit Hack and Past Attacks." Silent Push analysts uncovered significant infrastructure used by the Lazarus APT Group, linking them to the $1.4 billion Bybit crypto heist through the domain bybit-assessment[.]com registered just hours before the attack. 
The investigation revealed a pattern of test entries, VPN usage, and fake job interview scams targeting crypto users, with malware deployment tied to North Korean threat actor groups like TraderTraitor and Contagious Interview. The team also identified numerous companies being impersonated in these scams, including major crypto platforms like Coinbase, Binance, and Kraken, to alert potential victims.

The research can be found here:
Silent Push Pivots into New Lazarus Group Infrastructure, Acquires Sensitive Intel Related to $1.4B ByBit Hack and Past Attacks

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Apr 2025 05:00:00 -0000</pubDate>
      <itunes:title>Bybit’s $1.4B breach.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>372</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Zach Edwards from Silent Push is discussing their work on "New Lazarus Group Infrastructure, Acquires Sensitive Intel Related to $1.4B ByBit Hack and Past Attacks." Silent Push analysts uncovered significant infrastructure used by the Lazarus APT Group, linking them to the $1.4 billion Bybit crypto heist through the domain bybit-assessment[.]com registered just hours before the attack. 
The investigation revealed a pattern of test entries, VPN usage, and fake job interview scams targeting crypto users, with malware deployment tied to North Korean threat actor groups like TraderTraitor and Contagious Interview. The team also identified numerous companies being impersonated in these scams, including major crypto platforms like Coinbase, Binance, and Kraken, to alert potential victims.

The research can be found here:
Silent Push Pivots into New Lazarus Group Infrastructure, Acquires Sensitive Intel Related to $1.4B ByBit Hack and Past Attacks

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/zedwards/">Zach Edwards</a> from <a href="https://www.linkedin.com/company/silent-push/">Silent Push</a> is discussing their work on "New Lazarus Group Infrastructure, Acquires Sensitive Intel Related to $1.4B ByBit Hack and Past Attacks." Silent Push analysts uncovered significant infrastructure used by the Lazarus APT Group, linking them to the $1.4 billion Bybit crypto heist through the domain <em>bybit-assessment[.]com</em> registered just hours before the attack. </p><p>The investigation revealed a pattern of test entries, VPN usage, and fake job interview scams targeting crypto users, with malware deployment tied to North Korean threat actor groups like TraderTraitor and Contagious Interview. The team also identified numerous companies being impersonated in these scams, including major crypto platforms like Coinbase, Binance, and Kraken, to alert potential victims.</p><h3><br></h3><h3>The research can be found here:</h3><ul><li><a href="https://www.silentpush.com/blog/lazarus-bybit/">Silent Push Pivots into New Lazarus Group Infrastructure, Acquires Sensitive Intel Related to $1.4B ByBit Hack and Past Attacks</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1952</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9abfaa5c-1164-11f0-a530-87b172883c0f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3473914544.mp3?updated=1743786215" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Breaking barriers, one byte at a time.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/371/notes</link>
      <description>This week, we are joined by Jon Williams, Vulnerability Researcher from Bishop Fox, discussing "Tearing Down (Sonic)Walls: Decrypting SonicOSX Firmware." Bishop Fox researchers reverse-engineered the encryption protecting SonicWall SonicOSX firmware, enabling them to access its underlying file system for security research. 
They presented their process and findings at DistrictCon Year 0 and released a tool called Sonicrack to extract keys from VMware virtual machine bundles, facilitating the decryption of VMware NSv firmware images. This research builds upon previous work, including techniques to decrypt static NSv images and reverse-engineer other encryption formats used by SonicWall.

The research can be found here:
Tearing Down (Sonic)Walls: Decrypting SonicOSX Firmware

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 Mar 2025 05:00:00 -0000</pubDate>
      <itunes:title>Breaking barriers, one byte at a time.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>371</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, we are joined by Jon Williams, Vulnerability Researcher from Bishop Fox, discussing "Tearing Down (Sonic)Walls: Decrypting SonicOSX Firmware." Bishop Fox researchers reverse-engineered the encryption protecting SonicWall SonicOSX firmware, enabling them to access its underlying file system for security research. 
They presented their process and findings at DistrictCon Year 0 and released a tool called Sonicrack to extract keys from VMware virtual machine bundles, facilitating the decryption of VMware NSv firmware images. This research builds upon previous work, including techniques to decrypt static NSv images and reverse-engineer other encryption formats used by SonicWall.

The research can be found here:
Tearing Down (Sonic)Walls: Decrypting SonicOSX Firmware

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/jonthetech/">Jon Williams</a>, Vulnerability Researcher from <a href="https://bishopfox.com/">Bishop Fox</a>, discussing "Tearing Down (Sonic)Walls: Decrypting SonicOSX Firmware." Bishop Fox researchers reverse-engineered the encryption protecting SonicWall SonicOSX firmware, enabling them to access its underlying file system for security research. </p><p>They presented their process and findings at DistrictCon Year 0 and released a tool called Sonicrack to extract keys from VMware virtual machine bundles, facilitating the decryption of VMware NSv firmware images. This research builds upon previous work, including techniques to decrypt static NSv images and reverse-engineer other encryption formats used by SonicWall.</p><p><br></p><h3>The research can be found here:</h3><ul><li><a href="https://bishopfox.com/blog/sonicwall-decrypting-sonicosx-firmware">Tearing Down (Sonic)Walls: Decrypting SonicOSX Firmware</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1161</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[28be4606-b6f3-11ee-ae1a-1fd4811d2788]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5142208955.mp3?updated=1743189613" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Excel-lerating cyberattacks.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/370/notes</link>
      <description>This week, we are joined by Tom Hegel, Principal Threat Researcher from SentinelLabs research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belarusian government espionage, is actively targeting Ukrainian military and government entities as well as Belarusian opposition activists using weaponized Excel documents. 
SentinelLabs identified new malware variants and tactics, including obfuscated VBA macros that deploy malware via DLL files, with payload delivery seemingly controlled based on a target’s location and system profile. The campaign, which began preparation in mid-2024 and became active by late 2024, appears to be an evolution of previous Ghostwriter operations, combining disinformation with cyberattacks to further political and military objectives.

The research can be found here:
Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Mar 2025 05:00:00 -0000</pubDate>
      <itunes:title>Excel-lerating cyberattacks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>370</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Tom Hegel, Principal Threat Researcher from SentinelLabs research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belarusian government espionage, is actively targeting Ukrainian military and government entities as well as Belarusian opposition activists using weaponized Excel documents. 
SentinelLabs identified new malware variants and tactics, including obfuscated VBA macros that deploy malware via DLL files, with payload delivery seemingly controlled based on a target’s location and system profile. The campaign, which began preparation in mid-2024 and became active by late 2024, appears to be an evolution of previous Ghostwriter operations, combining disinformation with cyberattacks to further political and military objectives.

The research can be found here:
Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/tom-hegel/">Tom Hegel</a>, Principal Threat Researcher from <a href="https://www.linkedin.com/company/sentinelone/">SentinelLabs</a> research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belarusian government espionage, is actively targeting Ukrainian military and government entities as well as Belarusian opposition activists using weaponized Excel documents. </p><p>SentinelLabs identified new malware variants and tactics, including obfuscated VBA macros that deploy malware via DLL files, with payload delivery seemingly controlled based on a target’s location and system profile. The campaign, which began preparation in mid-2024 and became active by late 2024, appears to be an evolution of previous Ghostwriter operations, combining disinformation with cyberattacks to further political and military objectives.</p><h3><br></h3><h3>The research can be found here:</h3><ul><li><a href="https://www.sentinelone.com/labs/ghostwriter-new-campaign-targets-ukrainian-government-and-belarusian-opposition/">Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1423</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[28869ed6-b6f3-11ee-ae1a-cb9cd44cc641]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5530035099.mp3?updated=1742578358" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The ransomware clones of HellCat &amp; Morpheus.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/369/notes</link>
      <description>Jim Walter, Senior Threat Researcher on SentinelLabs research team, to discuss their work on "HellCat and Morpheus | Two Brands, One Payload as Ransomware Affiliates Drop Identical Code." Over the past six months, new ransomware groups like FunkSec, Nitrogen, and Termite have emerged, while established threats such as Cl0p and LockBit 4.0 have resurfaced. Two prominent Ransomware-as-a-Service (RaaS) operations, HellCat and Morpheus, have gained traction, with research indicating that affiliates of both are using nearly identical ransomware payloads. 
Despite similarities in their encryption techniques and ransom notes, there is no conclusive evidence linking HellCat and Morpheus to the Underground Team, though shared tools or affiliates may be involved.

The research can be found here:
HellCat and Morpheus | Two Brands, One Payload as Ransomware Affiliates Drop Identical Code

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Mar 2025 05:00:00 -0000</pubDate>
      <itunes:title>The ransomware clones of HellCat &amp; Morpheus.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>369</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Jim Walter, Senior Threat Researcher on SentinelLabs research team, to discuss their work on "HellCat and Morpheus | Two Brands, One Payload as Ransomware Affiliates Drop Identical Code." Over the past six months, new ransomware groups like FunkSec, Nitrogen, and Termite have emerged, while established threats such as Cl0p and LockBit 4.0 have resurfaced. Two prominent Ransomware-as-a-Service (RaaS) operations, HellCat and Morpheus, have gained traction, with research indicating that affiliates of both are using nearly identical ransomware payloads. 
Despite similarities in their encryption techniques and ransom notes, there is no conclusive evidence linking HellCat and Morpheus to the Underground Team, though shared tools or affiliates may be involved.

The research can be found here:
HellCat and Morpheus | Two Brands, One Payload as Ransomware Affiliates Drop Identical Code

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jim Walter, Senior Threat Researcher on <a href="https://www.linkedin.com/company/sentinelone/">SentinelLabs</a> research team, to discuss their work on "HellCat and Morpheus | Two Brands, One Payload as Ransomware Affiliates Drop Identical Code." Over the past six months, new ransomware groups like FunkSec, Nitrogen, and Termite have emerged, while established threats such as Cl0p and LockBit 4.0 have resurfaced. Two prominent Ransomware-as-a-Service (RaaS) operations, HellCat and Morpheus, have gained traction, with research indicating that affiliates of both are using nearly identical ransomware payloads. </p><p>Despite similarities in their encryption techniques and ransom notes, there is no conclusive evidence linking HellCat and Morpheus to the Underground Team, though shared tools or affiliates may be involved.</p><p><br></p><h3>The research can be found here:</h3><ul><li><a href="https://www.sentinelone.com/blog/hellcat-and-morpheus-two-brands-one-payload-as-ransomware-affiliates-drop-identical-code/">HellCat and Morpheus | Two Brands, One Payload as Ransomware Affiliates Drop Identical Code</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1120</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[284eeae0-b6f3-11ee-ae1a-ef98d2998cc4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9961881948.mp3?updated=1741968222" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Botnet’s back, tell a friend.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/368/notes</link>
      <description>This week we are joined by Silas Cutler, Principal Security Researcher at Censys, asking the important question of "Will the Real Volt Typhoon Please Stand Up?" The FBI's disruption of the KV Botnet in December 2023, attributed to the Chinese threat group Volt Typhoon, targeted infected systems but did not affect the botnet's control infrastructure. 
Despite law enforcement efforts and technical exposure, the botnet's infrastructure has remained largely stable, with only changes in hosting providers, raising questions about whether another party operates the botnet. Censys scanning data from 2024 shows a shift in the botnet's control servers, indicating a response to disruption attempts, while the botnet's operators have shown limited efforts to obscure their infrastructure.
The research can be found here:
Will the Real Volt Typhoon Please Stand Up?

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Mar 2025 06:00:00 -0000</pubDate>
      <itunes:title>Botnet’s back, tell a friend.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>368</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by Silas Cutler, Principal Security Researcher at Censys, asking the important question of "Will the Real Volt Typhoon Please Stand Up?" The FBI's disruption of the KV Botnet in December 2023, attributed to the Chinese threat group Volt Typhoon, targeted infected systems but did not affect the botnet's control infrastructure. 
Despite law enforcement efforts and technical exposure, the botnet's infrastructure has remained largely stable, with only changes in hosting providers, raising questions about whether another party operates the botnet. Censys scanning data from 2024 shows a shift in the botnet's control servers, indicating a response to disruption attempts, while the botnet's operators have shown limited efforts to obscure their infrastructure.
The research can be found here:
Will the Real Volt Typhoon Please Stand Up?

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by <a href="https://www.linkedin.com/in/silascutler/">Silas Cutler</a>, Principal Security Researcher at <a href="https://www.linkedin.com/company/censysio/">Censys</a>, asking the important question of "Will the Real Volt Typhoon Please Stand Up?" The FBI's disruption of the KV Botnet in December 2023, attributed to the Chinese threat group Volt Typhoon, targeted infected systems but did not affect the botnet's control infrastructure. </p><p>Despite law enforcement efforts and technical exposure, the botnet's infrastructure has remained largely stable, with only changes in hosting providers, raising questions about whether another party operates the botnet. Censys scanning data from 2024 shows a shift in the botnet's control servers, indicating a response to disruption attempts, while the botnet's operators have shown limited efforts to obscure their infrastructure.</p><h3>The research can be found here:</h3><ul><li><a href="https://censys.com/will-the-real-volt-typhoon-please-stand-up/">Will the Real Volt Typhoon Please Stand Up?</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1187</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2817c25e-b6f3-11ee-ae1a-8fd99a04252d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6505120949.mp3?updated=1741374993" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Caught in the contagious interview.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/367/notes</link>
      <description>This week we are joined by Phil Stokes, threat researcher at SentinelOne's SentinelLabs, discussing their work on "macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed." Apple recently pushed an update to its XProtect tool, blocking several variants of the DPRK-linked Ferret malware family, which targets victims through the "Contagious Interview" campaign. 
The malware uses fake job interview processes to trick users into installing malicious software, and new variants, including FlexibleFerret, remain undetected by XProtect. SentinelOne's research reveals a deeper investigation into this malware, which uses social engineering to expand its attack vectors, including targeting developers through platforms like GitHub.

The research can be found here:
macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Mar 2025 06:00:00 -0000</pubDate>
      <itunes:title>Caught in the contagious interview.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>367</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by Phil Stokes, threat researcher at SentinelOne's SentinelLabs, discussing their work on "macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed." Apple recently pushed an update to its XProtect tool, blocking several variants of the DPRK-linked Ferret malware family, which targets victims through the "Contagious Interview" campaign. 
The malware uses fake job interview processes to trick users into installing malicious software, and new variants, including FlexibleFerret, remain undetected by XProtect. SentinelOne's research reveals a deeper investigation into this malware, which uses social engineering to expand its attack vectors, including targeting developers through platforms like GitHub.

The research can be found here:
macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by <a href="https://www.linkedin.com/in/phil-stokes-b74248181/">Phil Stokes</a>, threat researcher at <a href="https://www.linkedin.com/company/sentinelone/">SentinelOne's</a> SentinelLabs, discussing their work on "macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed." Apple recently pushed an update to its XProtect tool, blocking several variants of the DPRK-linked Ferret malware family, which targets victims through the "Contagious Interview" campaign. </p><p>The malware uses fake job interview processes to trick users into installing malicious software, and new variants, including FlexibleFerret, remain undetected by XProtect. SentinelOne's research reveals a deeper investigation into this malware, which uses social engineering to expand its attack vectors, including targeting developers through platforms like GitHub.</p><p><br></p><h3>The research can be found here:</h3><ul><li><a href="https://www.sentinelone.com/blog/macos-flexibleferret-further-variants-of-dprk-malware-family-unearthed/">macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1570</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[27e179a6-b6f3-11ee-ae1a-7b383f13d5ca]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1334460906.mp3?updated=1740765537" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From small-time scams to billion-dollar threats.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/366/notes</link>
      <description>This week, we are joined by Selena Larson from Proofpoint, and co-host of the "Only Malware in the Building" podcast, as she discusses the research on "Why Biasing Advanced Persistent Threats over Cybercrime is a Security Risk." The cybersecurity industry has historically prioritized Advanced Persistent Threats (APTs) from nation-state actors over cybercrime, but this distinction is outdated as cybercriminals now employ equally sophisticated tactics. 
Financially motivated threat actors, especially ransomware groups, have evolved to the point where they rival state-backed hackers in technical capability and impact, disrupting businesses, infrastructure, and individuals on a massive scale. To enhance security, defenders must shift focus from an APT-centric mindset to a broader approach that equally prioritizes combating cybercrime, which poses an immediate and tangible risk to global stability.

The research can be found here:
Why Biasing Advanced Persistent Threats over Cybercrime is a Security Risk

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Feb 2025 06:00:00 -0000</pubDate>
      <itunes:title>From small-time scams to billion-dollar threats.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>366</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Selena Larson from Proofpoint, and co-host of the "Only Malware in the Building" podcast, as she discusses the research on "Why Biasing Advanced Persistent Threats over Cybercrime is a Security Risk." The cybersecurity industry has historically prioritized Advanced Persistent Threats (APTs) from nation-state actors over cybercrime, but this distinction is outdated as cybercriminals now employ equally sophisticated tactics. 
Financially motivated threat actors, especially ransomware groups, have evolved to the point where they rival state-backed hackers in technical capability and impact, disrupting businesses, infrastructure, and individuals on a massive scale. To enhance security, defenders must shift focus from an APT-centric mindset to a broader approach that equally prioritizes combating cybercrime, which poses an immediate and tangible risk to global stability.

The research can be found here:
Why Biasing Advanced Persistent Threats over Cybercrime is a Security Risk

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/selenalarson/">Selena Larson</a> from Proofpoint, and co-host of the "Only Malware in the Building" podcast, as she discusses the research on "Why Biasing Advanced Persistent Threats over Cybercrime is a Security Risk." The cybersecurity industry has historically prioritized Advanced Persistent Threats (APTs) from nation-state actors over cybercrime, but this distinction is outdated as cybercriminals now employ equally sophisticated tactics. </p><p>Financially motivated threat actors, especially ransomware groups, have evolved to the point where they rival state-backed hackers in technical capability and impact, disrupting businesses, infrastructure, and individuals on a massive scale. To enhance security, defenders must shift focus from an APT-centric mindset to a broader approach that equally prioritizes combating cybercrime, which poses an immediate and tangible risk to global stability.</p><p><br></p><h3>The research can be found here:</h3><ul><li><a href="https://www.rusi.org/explore-our-research/publications/commentary/why-biasing-advanced-persistent-threats-over-cybercrime-security-risk">Why Biasing Advanced Persistent Threats over Cybercrime is a Security Risk</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1446</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[27ab13a2-b6f3-11ee-ae1a-8f1fce5ae9d8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3770994087.mp3?updated=1740066017" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bot or not? The fake CAPTCHA trick spreading Lumma malware.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/365/notes</link>
      <description>Nati Tal, Head of Guardio Labs, discussing their work on "“DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising." Guardio has uncovered a large-scale malvertising campaign dubbed “DeceptionAds,” which tricks users into running a malicious PowerShell command under the guise of proving they’re human. This fake CAPTCHA scheme delivers Lumma info-stealer malware while bypassing security measures like Google’s Safe Browsing. 
Even after disclosure and takedown efforts, the campaign resurfaced—raising concerns about the effectiveness of existing defenses against ad-driven cyber threats.
The research can be found here:
“DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Feb 2025 06:00:00 -0000</pubDate>
      <itunes:title>Bot or not? The fake CAPTCHA trick spreading Lumma malware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>365</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Nati Tal, Head of Guardio Labs, discussing their work on "“DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising." Guardio has uncovered a large-scale malvertising campaign dubbed “DeceptionAds,” which tricks users into running a malicious PowerShell command under the guise of proving they’re human. This fake CAPTCHA scheme delivers Lumma info-stealer malware while bypassing security measures like Google’s Safe Browsing. 
Even after disclosure and takedown efforts, the campaign resurfaced—raising concerns about the effectiveness of existing defenses against ad-driven cyber threats.
The research can be found here:
“DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/natital/">Nati Tal</a>, Head of <a href="https://www.linkedin.com/company/guardiosec/">Guardio Labs</a>, discussing their work on "“DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising." Guardio has uncovered a large-scale malvertising campaign dubbed “DeceptionAds,” which tricks users into running a malicious PowerShell command under the guise of proving they’re human. This fake CAPTCHA scheme delivers Lumma info-stealer malware while bypassing security measures like Google’s Safe Browsing. </p><p>Even after disclosure and takedown efforts, the campaign resurfaced—raising concerns about the effectiveness of existing defenses against ad-driven cyber threats.</p><h3>The research can be found here:</h3><ul><li><a href="https://labs.guard.io/deceptionads-fake-captcha-driving-infostealer-infections-and-a-glimpse-to-the-dark-side-of-0c516f4dc0b6">“DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1928</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2774fca4-b6f3-11ee-ae1a-ff8f01d06cf6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4322881665.mp3?updated=1739553844" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cleo’s trojan horse.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/364/notes</link>
      <description>Mark Manglicmot, SVP of Security Services from Arctic Wolf, is sharing their research on "Cleopatra’s Shadow: A Mass Exploitation Campaign Deploying a Java Backdoor Through Zero-Day Exploitation of Cleo MFT Software." Arctic Wolf Labs discovered an ongoing exploitation campaign targeting Cleo Managed File Transfer (MFT) products, beginning on December 7, 2024. Threat actors used a malicious PowerShell stager to deploy a Java-based backdoor, dubbed Cleopatra, which features in-memory file storage and cross-platform compatibility across Windows and Linux. 
Despite Cleo's previous patch for CVE-2024-50623, attackers appear to have leveraged an alternative access method, exploiting the software's autorun feature to execute payloads and establish persistent access.

The research can be found here:
Cleopatra’s Shadow: A Mass Exploitation Campaign Deploying a Java Backdoor Through Zero-Day Exploitation of Cleo MFT Software

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Feb 2025 06:00:00 -0000</pubDate>
      <itunes:title>Cleo’s trojan horse.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>364</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Mark Manglicmot, SVP of Security Services from Arctic Wolf, is sharing their research on "Cleopatra’s Shadow: A Mass Exploitation Campaign Deploying a Java Backdoor Through Zero-Day Exploitation of Cleo MFT Software." Arctic Wolf Labs discovered an ongoing exploitation campaign targeting Cleo Managed File Transfer (MFT) products, beginning on December 7, 2024. Threat actors used a malicious PowerShell stager to deploy a Java-based backdoor, dubbed Cleopatra, which features in-memory file storage and cross-platform compatibility across Windows and Linux. 
Despite Cleo's previous patch for CVE-2024-50623, attackers appear to have leveraged an alternative access method, exploiting the software's autorun feature to execute payloads and establish persistent access.

The research can be found here:
Cleopatra’s Shadow: A Mass Exploitation Campaign Deploying a Java Backdoor Through Zero-Day Exploitation of Cleo MFT Software

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/mark-manglicmot/">Mark Manglicmot</a>, SVP of Security Services from <a href="https://www.linkedin.com/company/arcticwolf/">Arctic Wolf</a>, is sharing their research on "Cleopatra’s Shadow: A Mass Exploitation Campaign Deploying a Java Backdoor Through Zero-Day Exploitation of Cleo MFT Software." Arctic Wolf Labs discovered an ongoing exploitation campaign targeting Cleo Managed File Transfer (MFT) products, beginning on December 7, 2024. Threat actors used a malicious PowerShell stager to deploy a Java-based backdoor, dubbed <em>Cleopatra</em>, which features in-memory file storage and cross-platform compatibility across Windows and Linux. </p><p>Despite Cleo's previous patch for CVE-2024-50623, attackers appear to have leveraged an alternative access method, exploiting the software's autorun feature to execute payloads and establish persistent access.</p><p><br></p><h3>The research can be found here:</h3><ul><li><a href="https://arcticwolf.com/resources/blog/cleopatras-shadow-a-mass-exploitation-campaign/">Cleopatra’s Shadow: A Mass Exploitation Campaign Deploying a Java Backdoor Through Zero-Day Exploitation of Cleo MFT Software</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1111</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[273d8f8a-b6f3-11ee-ae1a-7b20d31d2d2f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7907689415.mp3?updated=1738946438" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A Digital Eye on supply-chain-based espionage attacks.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/363/notes</link>
      <description>This week, Dave Bittner is joined by Juan Andres Guerrero-Saade (JAGS) from SentinelOne's SentinelLabs to discuss the work his team and Tinexta Cyber did on "Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels." 

Tinexta Cyber and SentinelLabs have been tracking threat activities targeting business-to-business IT service providers in Southern Europe. Based on the malware, infrastructure, techniques used, victimology, and the timing of the activities, we assess that it is highly likely these attacks were conducted by a China-nexus threat actor with cyberespionage motivations.

The relationships between European countries and China are complex, characterized by cooperation, competition, and underlying tensions in areas such as trade, investment, and technology. Suspected China-linked cyberespionage groups frequently target public and private organizations across Europe to gather strategic intelligence, gain competitive advantages, and advance geopolitical, economic, and technological interests.

The research can be found here:
Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Feb 2025 06:00:00 -0000</pubDate>
      <itunes:title>A Digital Eye on supply-chain-based espionage attacks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>363</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, Dave Bittner is joined by Juan Andres Guerrero-Saade (JAGS) from SentinelOne's SentinelLabs to discuss the work his team and Tinexta Cyber did on "Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels." 

Tinexta Cyber and SentinelLabs have been tracking threat activities targeting business-to-business IT service providers in Southern Europe. Based on the malware, infrastructure, techniques used, victimology, and the timing of the activities, we assess that it is highly likely these attacks were conducted by a China-nexus threat actor with cyberespionage motivations.

The relationships between European countries and China are complex, characterized by cooperation, competition, and underlying tensions in areas such as trade, investment, and technology. Suspected China-linked cyberespionage groups frequently target public and private organizations across Europe to gather strategic intelligence, gain competitive advantages, and advance geopolitical, economic, and technological interests.

The research can be found here:
Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, Dave Bittner is joined by Juan Andres Guerrero-Saade (JAGS) from <a href="https://www.sentinelone.com/labs/">SentinelOne</a>'s SentinelLabs to discuss the work his team and Tinexta Cyber did on "Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels." </p><p><br></p><p>Tinexta Cyber and SentinelLabs have been tracking threat activities targeting business-to-business IT service providers in Southern Europe. Based on the malware, infrastructure, techniques used, victimology, and the timing of the activities, we assess that it is highly likely these attacks were conducted by a China-nexus threat actor with cyberespionage motivations.</p><p><br></p><p>The relationships between European countries and China are complex, characterized by cooperation, competition, and underlying tensions in areas such as trade, investment, and technology. Suspected China-linked cyberespionage groups <a href="https://cert.europa.eu/static/files/TLP-CLEAR-JointPublication-23-01.pdf">frequently target</a> public and private organizations across Europe to gather strategic intelligence, gain competitive advantages, and advance geopolitical, economic, and technological interests.</p><h3><br></h3><h3>The research can be found here:</h3><ul><li><a href="https://www.sentinelone.com/labs/operation-digital-eye-chinese-apt-compromises-critical-digital-infrastructure-via-visual-studio-code-tunnels/">Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1447</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2707c59e-b6f3-11ee-ae1a-ab4bd073076c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7670497671.mp3?updated=1738185336" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>LightSpy's dark evolution.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/362/notes</link>
      <description>This week, we are joined by Ismael Valenzuela, VP of Threat Research &amp; Intelligence, and Jacob Faires, Principal Threat Researcher, from Blackberry discussing the team's work on "LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign." In April 2024, BlackBerry uncovered a significant evolution of the LightSpy malware campaign, attributed to Chinese cyber-espionage group APT41. 
The newly introduced DeepData framework, a modular Windows-based surveillance tool, expands data theft capabilities with 12 specialized plugins for tasks like communication surveillance, credential theft, and system intelligence gathering. The campaign targets a wide range of communication platforms, including WhatsApp, Signal, and WeChat, with advanced techniques for monitoring and stealing sensitive information from victims across the Asia-Pacific region.
The research can be found here:
LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Jan 2025 06:00:00 -0000</pubDate>
      <itunes:title>LightSpy's dark evolution.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>362</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Ismael Valenzuela, VP of Threat Research &amp; Intelligence, and Jacob Faires, Principal Threat Researcher, from Blackberry discussing the team's work on "LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign." In April 2024, BlackBerry uncovered a significant evolution of the LightSpy malware campaign, attributed to Chinese cyber-espionage group APT41. 
The newly introduced DeepData framework, a modular Windows-based surveillance tool, expands data theft capabilities with 12 specialized plugins for tasks like communication surveillance, credential theft, and system intelligence gathering. The campaign targets a wide range of communication platforms, including WhatsApp, Signal, and WeChat, with advanced techniques for monitoring and stealing sensitive information from victims across the Asia-Pacific region.
The research can be found here:
LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/ivalenzuela/">Ismael Valenzuela</a>, VP of Threat Research &amp; Intelligence, and <a href="https://www.linkedin.com/in/jacob-faires/">Jacob Faires</a>, Principal Threat Researcher, from <a href="https://www.linkedin.com/company/blackberry/">Blackberry</a> discussing the team's work on "LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign." In April 2024, BlackBerry uncovered a significant evolution of the LightSpy malware campaign, attributed to Chinese cyber-espionage group APT41. </p><p>The newly introduced DeepData framework, a modular Windows-based surveillance tool, expands data theft capabilities with 12 specialized plugins for tasks like communication surveillance, credential theft, and system intelligence gathering. The campaign targets a wide range of communication platforms, including WhatsApp, Signal, and WeChat, with advanced techniques for monitoring and stealing sensitive information from victims across the Asia-Pacific region.</p><p>The research can be found here:</p><ul><li><a href="https://blogs.blackberry.com/en/2024/11/lightspy-apt41-deploys-advanced-deepdata-framework-in-targeted-southern-asia-espionage-campaign">LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1360</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[26d2772c-b6f3-11ee-ae1a-371657f44f0c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7929159980.mp3?updated=1737754874" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A cute cover for a dangerous vulnerability.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/361/notes</link>
      <description>Nati Tal, Head of Guardio Labs, sits down to share their work on “CrossBarking” — Exploiting a 0-Day Opera Vulnerability with a Cross-Browser Extension Store Attack. Guardio Labs has uncovered a critical vulnerability in the Opera browser, enabling malicious extensions to exploit Private APIs for actions like screen capturing, browser setting changes, and account hijacking. 
Highlighting the ease of bypassing extension store security, researchers demonstrated how a puppy-themed extension exploiting this flaw could infiltrate both Chrome and Opera's extension stores, potentially reaching millions of users. This case underscores the delicate balance between enhancing browser productivity and ensuring robust security measures, revealing the alarming tactics modern threat actors employ to exploit trusted platforms.
The research can be found here:
“CrossBarking” — Exploiting a 0-Day Opera Vulnerability with a Cross-Browser Extension Store Attack

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Jan 2025 06:00:00 -0000</pubDate>
      <itunes:title>A cute cover for a dangerous vulnerability.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>361</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Nati Tal, Head of Guardio Labs, sits down to share their work on “CrossBarking” — Exploiting a 0-Day Opera Vulnerability with a Cross-Browser Extension Store Attack. Guardio Labs has uncovered a critical vulnerability in the Opera browser, enabling malicious extensions to exploit Private APIs for actions like screen capturing, browser setting changes, and account hijacking. 
Highlighting the ease of bypassing extension store security, researchers demonstrated how a puppy-themed extension exploiting this flaw could infiltrate both Chrome and Opera's extension stores, potentially reaching millions of users. This case underscores the delicate balance between enhancing browser productivity and ensuring robust security measures, revealing the alarming tactics modern threat actors employ to exploit trusted platforms.
The research can be found here:
“CrossBarking” — Exploiting a 0-Day Opera Vulnerability with a Cross-Browser Extension Store Attack

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/natital/">Nati Tal</a>, Head of <a href="https://www.linkedin.com/company/guardiosec/">Guardio Labs</a>, sits down to share their work on “CrossBarking” — Exploiting a 0-Day Opera Vulnerability with a Cross-Browser Extension Store Attack. Guardio Labs has uncovered a critical vulnerability in the Opera browser, enabling malicious extensions to exploit Private APIs for actions like screen capturing, browser setting changes, and account hijacking. </p><p>Highlighting the ease of bypassing extension store security, researchers demonstrated how a puppy-themed extension exploiting this flaw could infiltrate both Chrome and Opera's extension stores, potentially reaching millions of users. This case underscores the delicate balance between enhancing browser productivity and ensuring robust security measures, revealing the alarming tactics modern threat actors employ to exploit trusted platforms.</p><p>The research can be found here:</p><ul><li><a href="https://labs.guard.io/crossbarking-exploiting-a-0-day-opera-vulnerability-with-a-cross-browser-extension-store-attack-db3e6d6e6aa8">“CrossBarking” — Exploiting a 0-Day Opera Vulnerability with a Cross-Browser Extension Store Attack</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1304</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[269d9214-b6f3-11ee-ae1a-5f780c9ff964]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6176114857.mp3?updated=1737141486" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The hidden cost of data hoarding.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/360/notes</link>
      <description>This week, we are joined by Kyla Cardona and Aurora Johnson from SpyCloud discussing their research "China’s Surveillance State Is Selling Citizen Data as a Side Hustle." Chinese technology companies, under CCP mandate, collect vast amounts of data on citizens, creating opportunities for corrupt insiders to steal and resell this information on dark markets. These stolen datasets, aggregated into "Social Work Libraries" (SGKs), mirror lower-tech versions of CCP internal security databases. 
Kyla and Aurora discuss how Chinese cybercriminals use these SGKs and their implications compared to Western, European, and Russian cybercrime ecosystems. With expertise in Chinese OSINT and cybersecurity policy, both researchers bring deep insights into the geopolitical and technical dynamics of China's digital landscape.
The research can be found here:

“Pantsless Data”: Decoding Chinese Cybercrime TTPs

A Deep Dive Into the Intricate Chinese Cybercrime Ecosystem

China’s Surveillance State Is Selling Citizen Data as a Side Hustle


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Jan 2025 06:00:00 -0000</pubDate>
      <itunes:title>The hidden cost of data hoarding.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>360</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Kyla Cardona and Aurora Johnson from SpyCloud discussing their research "China’s Surveillance State Is Selling Citizen Data as a Side Hustle." Chinese technology companies, under CCP mandate, collect vast amounts of data on citizens, creating opportunities for corrupt insiders to steal and resell this information on dark markets. These stolen datasets, aggregated into "Social Work Libraries" (SGKs), mirror lower-tech versions of CCP internal security databases. 
Kyla and Aurora discuss how Chinese cybercriminals use these SGKs and their implications compared to Western, European, and Russian cybercrime ecosystems. With expertise in Chinese OSINT and cybersecurity policy, both researchers bring deep insights into the geopolitical and technical dynamics of China's digital landscape.
The research can be found here:

“Pantsless Data”: Decoding Chinese Cybercrime TTPs

A Deep Dive Into the Intricate Chinese Cybercrime Ecosystem

China’s Surveillance State Is Selling Citizen Data as a Side Hustle


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/kylakcardona/">Kyla Cardona</a> and <a href="https://www.linkedin.com/in/aurora-johnson-417b2911b/">Aurora Johnson</a> from <a href="https://www.linkedin.com/company/spycloud/">SpyCloud</a> discussing their research "China’s Surveillance State Is Selling Citizen Data as a Side Hustle." Chinese technology companies, under CCP mandate, collect vast amounts of data on citizens, creating opportunities for corrupt insiders to steal and resell this information on dark markets. These stolen datasets, aggregated into "Social Work Libraries" (SGKs), mirror lower-tech versions of CCP internal security databases. </p><p>Kyla and Aurora discuss how Chinese cybercriminals use these SGKs and their implications compared to Western, European, and Russian cybercrime ecosystems. With expertise in Chinese OSINT and cybersecurity policy, both researchers bring deep insights into the geopolitical and technical dynamics of China's digital landscape.</p><p>The research can be found here:</p><ul>
<li><a href="https://spycloud.com/blog/growing-chinese-threat-actor-ecosystem/">“Pantsless Data”: Decoding Chinese Cybercrime TTPs</a></li>
<li><a href="https://spycloud.com/blog/deep-dive-chinese-cybercrime-ecosystem/">A Deep Dive Into the Intricate Chinese Cybercrime Ecosystem</a></li>
<li><a href="https://www.wired.com/story/chineses-surveillance-state-is-selling-citizens-data-as-a-side-hustle/">China’s Surveillance State Is Selling Citizen Data as a Side Hustle</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1898</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2667ecae-b6f3-11ee-ae1a-77628b76cd15]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9877382747.mp3?updated=1736542358" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Crypto client or cyber trap?</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/359/notes</link>
      <description>Karlo Zanki, Reverse Engineer at ReversingLabs, discussing their work on "Malicious PyPI crypto pay package aiocpa implants infostealer code." ReversingLabs' machine learning-based threat hunting system identified a malicious PyPI package, aiocpa, designed to exfiltrate cryptocurrency wallet information. 
Unlike typical attacks involving typosquatting, the attackers published a seemingly legitimate crypto client tool to build trust before introducing malicious updates. ReversingLabs used its Spectra Assure platform to detect behavioral anomalies and worked with PyPI to remove the package, highlighting the growing need for advanced supply chain security tools to counter increasingly sophisticated threats.
The research can be found here:
Malicious PyPI crypto pay package aiocpa implants infostealer code

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Jan 2025 06:00:00 -0000</pubDate>
      <itunes:title>Crypto client or cyber trap?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>359</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Karlo Zanki, Reverse Engineer at ReversingLabs, discussing their work on "Malicious PyPI crypto pay package aiocpa implants infostealer code." ReversingLabs' machine learning-based threat hunting system identified a malicious PyPI package, aiocpa, designed to exfiltrate cryptocurrency wallet information. 
Unlike typical attacks involving typosquatting, the attackers published a seemingly legitimate crypto client tool to build trust before introducing malicious updates. ReversingLabs used its Spectra Assure platform to detect behavioral anomalies and worked with PyPI to remove the package, highlighting the growing need for advanced supply chain security tools to counter increasingly sophisticated threats.
The research can be found here:
Malicious PyPI crypto pay package aiocpa implants infostealer code

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/karlo-zanki-b8a2341a5/">Karlo Zanki</a>, Reverse Engineer at <a href="https://www.linkedin.com/company/reversinglabs/">ReversingLabs</a>, discussing their work on "Malicious PyPI crypto pay package aiocpa implants infostealer code." ReversingLabs' machine learning-based threat hunting system identified a malicious PyPI package, <em>aiocpa</em>, designed to exfiltrate cryptocurrency wallet information. </p><p>Unlike typical attacks involving typosquatting, the attackers published a seemingly legitimate crypto client tool to build trust before introducing malicious updates. ReversingLabs used its Spectra Assure platform to detect behavioral anomalies and worked with PyPI to remove the package, highlighting the growing need for advanced supply chain security tools to counter increasingly sophisticated threats.</p><p>The research can be found here:</p><ul><li><a href="https://www.reversinglabs.com/blog/malicious-pypi-crypto-pay-package-aiocpa-implants-infostealer-code">Malicious PyPI crypto pay package aiocpa implants infostealer code</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1262</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[26333d88-b6f3-11ee-ae1a-4bbfd5aeb4e4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1905538508.mp3?updated=1735935451" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>On the prowl for mobile malware. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/337/notes</link>
      <description>This week, we are joined by Asheer Malhotra and Vitor Ventura from Cisco Talos, and they are discussing "Operation Celestial Force employs mobile and desktop malware to target Indian entities." Cisco Talos revealed Operation Celestial Force, an espionage campaign by the Pakistani threat group "Cosmic Leopard," targeting Indian defense, government, and technology sectors. 
Active for at least six years, the operation has recently increased its use of mobile malware and commercial spyware for surveillance.
The research can be found here:
Operation Celestial Force employs mobile and desktop malware to target Indian entities

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Dec 2024 06:00:00 -0000</pubDate>
      <itunes:title>On the prowl for mobile malware. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>337</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Asheer Malhotra and Vitor Ventura from Cisco Talos, and they are discussing "Operation Celestial Force employs mobile and desktop malware to target Indian entities." Cisco Talos revealed Operation Celestial Force, an espionage campaign by the Pakistani threat group "Cosmic Leopard," targeting Indian defense, government, and technology sectors. 
Active for at least six years, the operation has recently increased its use of mobile malware and commercial spyware for surveillance.
The research can be found here:
Operation Celestial Force employs mobile and desktop malware to target Indian entities

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by Asheer Malhotra and Vitor Ventura from Cisco Talos, and they are discussing "Operation Celestial Force employs mobile and desktop malware to target Indian entities." Cisco Talos revealed Operation Celestial Force, an espionage campaign by the Pakistani threat group "Cosmic Leopard," targeting Indian defense, government, and technology sectors. </p><p>Active for at least six years, the operation has recently increased its use of mobile malware and commercial spyware for surveillance.</p><p>The research can be found here:</p><ul><li class="ql-align-center"><a href="https://blog.talosintelligence.com/cosmic-leopard/">Operation Celestial Force employs mobile and desktop malware to target Indian entities</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1458</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[25fe7512-b6f3-11ee-ae1a-df8e13088c2d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2530014640.mp3?updated=1734711221" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Quishing for trouble.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/358/notes</link>
      <description>Adam Khan, VP of Security Operations at Barracuda, joins to discuss his team's work on "The evolving use of QR codes in phishing attacks." Cybercriminals are evolving phishing tactics by embedding QR codes, or “quishing,” into PDF documents attached to emails, tricking recipients into scanning them to access malicious websites that steal credentials. 
Barracuda researchers found over half a million such emails from June to September 2024, with most impersonating brands like Microsoft, DocuSign, and Adobe to exploit urgency and trust. To counter these attacks, businesses should deploy multilayered email security, use AI-powered detection tools, educate employees on QR code risks, and enable multifactor authentication to safeguard accounts.
The research can be found here: 
Threat Spotlight: The evolving use of QR codes in phishing attacks

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Dec 2024 06:00:00 -0000</pubDate>
      <itunes:title>Quishing for trouble.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>358</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Adam Khan, VP of Security Operations at Barracuda, joins to discuss his team's work on "The evolving use of QR codes in phishing attacks." Cybercriminals are evolving phishing tactics by embedding QR codes, or “quishing,” into PDF documents attached to emails, tricking recipients into scanning them to access malicious websites that steal credentials. 
Barracuda researchers found over half a million such emails from June to September 2024, with most impersonating brands like Microsoft, DocuSign, and Adobe to exploit urgency and trust. To counter these attacks, businesses should deploy multilayered email security, use AI-powered detection tools, educate employees on QR code risks, and enable multifactor authentication to safeguard accounts.
The research can be found here: 
Threat Spotlight: The evolving use of QR codes in phishing attacks

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/adamkhan-cyber/">Adam Khan</a>, VP of Security Operations at <a href="https://www.linkedin.com/company/barracuda-networks/">Barracuda</a>, joins to discuss his team's work on "The evolving use of QR codes in phishing attacks." Cybercriminals are evolving phishing tactics by embedding QR codes, or “quishing,” into PDF documents attached to emails, tricking recipients into scanning them to access malicious websites that steal credentials. </p><p>Barracuda researchers found over half a million such emails from June to September 2024, with most impersonating brands like Microsoft, DocuSign, and Adobe to exploit urgency and trust. To counter these attacks, businesses should deploy multilayered email security, use AI-powered detection tools, educate employees on QR code risks, and enable multifactor authentication to safeguard accounts.</p><p>The research can be found here: </p><ul><li><a href="https://blog.barracuda.com/2024/10/22/threat-spotlight-evolving-qr-codes-phishing-attacks">Threat Spotlight: The evolving use of QR codes in phishing attacks</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>856</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[25ca6664-b6f3-11ee-ae1a-3b79f0003b0c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3057992008.mp3?updated=1734719208" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Watching the watchers. IoT vulnerabilities exposed by AI.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/357/notes</link>
      <description>This week, we are joined by Andrew Morris, Founder and CTO of GreyNoise, to discuss their work on "GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI." GreyNoise discovered two critical zero-day vulnerabilities in IoT-connected live streaming cameras, used in sensitive environments like healthcare and industrial operations, by leveraging its AI-powered detection system, Sift. 
The vulnerabilities, CVE-2024-8956 (insufficient authentication) and CVE-2024-8957 (OS command injection), could allow attackers to take full control of affected devices, manipulate video feeds, or integrate them into botnets for broader attacks. This breakthrough underscores the transformative role of AI in identifying threats that traditional systems might miss, highlighting the urgent need for robust cybersecurity measures in the expanding IoT landscape.
The research can be found here: 
GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Dec 2024 06:00:00 -0000</pubDate>
      <itunes:title>Watching the watchers. IoT vulnerabilities exposed by AI.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>357</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Andrew Morris, Founder and CTO of GreyNoise, to discuss their work on "GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI." GreyNoise discovered two critical zero-day vulnerabilities in IoT-connected live streaming cameras, used in sensitive environments like healthcare and industrial operations, by leveraging its AI-powered detection system, Sift. 
The vulnerabilities, CVE-2024-8956 (insufficient authentication) and CVE-2024-8957 (OS command injection), could allow attackers to take full control of affected devices, manipulate video feeds, or integrate them into botnets for broader attacks. This breakthrough underscores the transformative role of AI in identifying threats that traditional systems might miss, highlighting the urgent need for robust cybersecurity measures in the expanding IoT landscape.
The research can be found here: 
GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/andrew---morris/">Andrew Morris</a>, Founder and CTO of <a href="https://www.linkedin.com/company/greynoise/">GreyNoise</a>, to discuss their work on "GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI." GreyNoise discovered two critical zero-day vulnerabilities in IoT-connected live streaming cameras, used in sensitive environments like healthcare and industrial operations, by leveraging its AI-powered detection system, Sift. </p><p>The vulnerabilities, CVE-2024-8956 (insufficient authentication) and CVE-2024-8957 (OS command injection), could allow attackers to take full control of affected devices, manipulate video feeds, or integrate them into botnets for broader attacks. This breakthrough underscores the transformative role of AI in identifying threats that traditional systems might miss, highlighting the urgent need for robust cybersecurity measures in the expanding IoT landscape.</p><p>The research can be found here: </p><ul><li><a href="https://www.greynoise.io/blog/greynoise-intelligence-discovers-zero-day-vulnerabilities-in-live-streaming-cameras-with-the-help-of-ai">GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1095</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2596096e-b6f3-11ee-ae1a-e7726085bcc6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6585754501.mp3?updated=1734113148" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The JPHP loader breaking away from the pack.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/356/notes</link>
      <description>Shawn Kanady, Global Director of Trustwave SpiderLabs, to discuss their work on "Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader." Trustwave SpiderLabs has uncovered Pronsis Loader, a new malware variant using the rare programming language JPHP and stealthy installation tactics to evade detection. 
The malware is capable of delivering high-risk payloads like Lumma Stealer and Latrodectus, posing a significant threat. Researchers highlight its unique capabilities and infrastructure, offering insights for bolstering cybersecurity defenses.
The research can be found here: 
Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Dec 2024 06:00:00 -0000</pubDate>
      <itunes:title>The JPHP loader breaking away from the pack.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>356</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Shawn Kanady, Global Director of Trustwave SpiderLabs, to discuss their work on "Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader." Trustwave SpiderLabs has uncovered Pronsis Loader, a new malware variant using the rare programming language JPHP and stealthy installation tactics to evade detection. 
The malware is capable of delivering high-risk payloads like Lumma Stealer and Latrodectus, posing a significant threat. Researchers highlight its unique capabilities and infrastructure, offering insights for bolstering cybersecurity defenses.
The research can be found here: 
Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/shawn-kanady/">Shawn Kanady</a>, Global Director of <a href="https://www.linkedin.com/company/trustwave/">Trustwave</a> SpiderLabs, to discuss their work on "Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader." Trustwave SpiderLabs has uncovered Pronsis Loader, a new malware variant using the rare programming language JPHP and stealthy installation tactics to evade detection. </p><p>The malware is capable of delivering high-risk payloads like Lumma Stealer and Latrodectus, posing a significant threat. Researchers highlight its unique capabilities and infrastructure, offering insights for bolstering cybersecurity defenses.</p><p>The research can be found here: </p><ul><li><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/pronsis-loader-a-jphp-driven-malware-diverging-from-d3fck-loader/">Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1372</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[25616920-b6f3-11ee-ae1a-b344d817e00f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6729784120.mp3?updated=1733346041" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leaking your AWS API keys, on purpose?</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/324/notes</link>
      <description>Please enjoy this encore episode: 
Noah Pack, a SANS Internet Storm Center Intern, sits down to discuss research on "What happens when you accidentally leak your AWS API keys?" This research is a guest diary from Noah and shares a project he worked on after seeing an online video of someone who created a python script that emailed colleges asking for free swag to be shipped to him. 
The research states "In this article, I will share some research, resources, and real-world data related to leaked AWS API keys." In this research, Noah shares what he learned while implementing his experiment. 
The research can be found here:
What happens when you accidentally leak your AWS API keys? [Guest Diary]

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Nov 2024 06:00:00 -0000</pubDate>
      <itunes:title>Leaking your AWS API keys, on purpose?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>324</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore episode: 
Noah Pack, a SANS Internet Storm Center Intern, sits down to discuss research on "What happens when you accidentally leak your AWS API keys?" This research is a guest diary from Noah and shares a project he worked on after seeing an online video of someone who created a python script that emailed colleges asking for free swag to be shipped to him. 
The research states "In this article, I will share some research, resources, and real-world data related to leaked AWS API keys." In this research, Noah shares what he learned while implementing his experiment. 
The research can be found here:
What happens when you accidentally leak your AWS API keys? [Guest Diary]

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode: </p><p>Noah Pack, a SANS Internet Storm Center Intern, sits down to discuss research on "What happens when you accidentally leak your AWS API keys?" This research is a guest diary from Noah and shares a project he worked on after seeing an online video of someone who created a python script that emailed colleges asking for free swag to be shipped to him. </p><p>The research states "In this article, I will share some research, resources, and real-world data related to leaked AWS API keys." In this research, Noah shares what he learned while implementing his experiment. </p><p>The research can be found here:</p><ul><li><a href="https://isc.sans.edu/diary/What+happens+when+you+accidentally+leak+your+AWS+API+keys+Guest+Diary/30730">What happens when you accidentally leak your AWS API keys? [Guest Diary]</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1470</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[252d1026-b6f3-11ee-ae1a-5fb809d3d8a1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3441121148.mp3?updated=1732730133" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exposing AI's Achilles heel.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/355/notes</link>
      <description>This week, we are joined by Ami Luttwak, Co-Founder and CTO from Wiz, sharing their work on "Wiz Research Finds Critical NVIDIA AI Vulnerability Affecting Containers Using NVIDIA GPUs, Including Over 35 percent of Cloud Environments." A critical vulnerability in the NVIDIA Container Toolkit, widely used for GPU access in AI workloads, could allow attackers to escape containers and gain full access to host environments, jeopardizing sensitive data. 
Wiz estimates that at least 33% of cloud environments are affected and urges immediate updates to NVIDIA's patched version. This discovery highlights the broader issue of young, under-secured codebases in AI tools, emphasizing the need for stronger security measures and collaboration.
The research can be found here: 
Wiz Research Finds Critical NVIDIA AI Vulnerability Affecting Containers Using NVIDIA GPUs, Including Over 35% of Cloud Environments

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Nov 2024 06:00:00 -0000</pubDate>
      <itunes:title>Exposing AI's Achilles heel.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>355</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Ami Luttwak, Co-Founder and CTO from Wiz, sharing their work on "Wiz Research Finds Critical NVIDIA AI Vulnerability Affecting Containers Using NVIDIA GPUs, Including Over 35 percent of Cloud Environments." A critical vulnerability in the NVIDIA Container Toolkit, widely used for GPU access in AI workloads, could allow attackers to escape containers and gain full access to host environments, jeopardizing sensitive data. 
Wiz estimates that at least 33% of cloud environments are affected and urges immediate updates to NVIDIA's patched version. This discovery highlights the broader issue of young, under-secured codebases in AI tools, emphasizing the need for stronger security measures and collaboration.
The research can be found here: 
Wiz Research Finds Critical NVIDIA AI Vulnerability Affecting Containers Using NVIDIA GPUs, Including Over 35% of Cloud Environments

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/amiluttwak/">Ami Luttwak</a>, Co-Founder and CTO from <a href="wizsecurity">Wiz</a>, sharing their work on "Wiz Research Finds Critical NVIDIA AI Vulnerability Affecting Containers Using NVIDIA GPUs, Including Over 35 percent of Cloud Environments." A critical vulnerability in the NVIDIA Container Toolkit, widely used for GPU access in AI workloads, could allow attackers to escape containers and gain full access to host environments, jeopardizing sensitive data. </p><p>Wiz estimates that at least 33% of cloud environments are affected and urges immediate updates to NVIDIA's patched version. This discovery highlights the broader issue of young, under-secured codebases in AI tools, emphasizing the need for stronger security measures and collaboration.</p><p>The research can be found here: </p><ul><li><a href="https://www.wiz.io/blog/wiz-research-critical-nvidia-ai-vulnerability">Wiz Research Finds Critical NVIDIA AI Vulnerability Affecting Containers Using NVIDIA GPUs, Including Over 35% of Cloud Environments</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1412</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[24f7f7c4-b6f3-11ee-ae1a-cb823dcb079e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4738817016.mp3?updated=1732121799" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Credential harvesters in the cloud.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/354/notes</link>
      <description>This week we are joined by, Blake Darché, Head of Cloudforce One at Cloudflare, to discuss their work on "Unraveling SloppyLemming’s Operations Across South Asia." Cloudforce One's investigation into the advanced threat actor "SloppyLemming" reveals an extensive espionage campaign targeting South and East Asia, with a focus on Pakistan's government, defense, telecommunications, and energy sectors. 
Leveraging multiple cloud service providers, SloppyLemming employs tactics like credential harvesting, malware delivery, and command-and-control (C2) operations, often relying on open-source adversary emulation tools like Cobalt Strike. Despite its activities, the actor's poor operational security (OPSEC) has allowed investigators to gain valuable insights into its infrastructure and tooling.
The research can be found here: 
Unraveling SloppyLemming’s operations across South Asia

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Nov 2024 06:00:00 -0000</pubDate>
      <itunes:title>Credential harvesters in the cloud.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>354</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by, Blake Darché, Head of Cloudforce One at Cloudflare, to discuss their work on "Unraveling SloppyLemming’s Operations Across South Asia." Cloudforce One's investigation into the advanced threat actor "SloppyLemming" reveals an extensive espionage campaign targeting South and East Asia, with a focus on Pakistan's government, defense, telecommunications, and energy sectors. 
Leveraging multiple cloud service providers, SloppyLemming employs tactics like credential harvesting, malware delivery, and command-and-control (C2) operations, often relying on open-source adversary emulation tools like Cobalt Strike. Despite its activities, the actor's poor operational security (OPSEC) has allowed investigators to gain valuable insights into its infrastructure and tooling.
The research can be found here: 
Unraveling SloppyLemming’s operations across South Asia

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by, <a href="https://www.linkedin.com/in/blakedarche/">Blake Darché</a>, Head of Cloudforce One at <a href="https://www.cloudflare.com/">Cloudflare</a>, to discuss their work on "Unraveling SloppyLemming’s Operations Across South Asia." Cloudforce One's investigation into the advanced threat actor "SloppyLemming" reveals an extensive espionage campaign targeting South and East Asia, with a focus on Pakistan's government, defense, telecommunications, and energy sectors. </p><p>Leveraging multiple cloud service providers, SloppyLemming employs tactics like credential harvesting, malware delivery, and command-and-control (C2) operations, often relying on open-source adversary emulation tools like Cobalt Strike. Despite its activities, the actor's poor operational security (OPSEC) has allowed investigators to gain valuable insights into its infrastructure and tooling.</p><p>The research can be found here: </p><ul><li><a href="https://www.cloudflare.com/threat-intelligence/research/report/unraveling-sloppylemmings-operations-across-south-asia/">Unraveling SloppyLemming’s operations across South Asia</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>955</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[24c2255e-b6f3-11ee-ae1a-937c9cb3648d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3285859538.mp3?updated=1731687293" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A firewall wake up call.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/313/notes</link>
      <description>Enjoy this special encore episode, where we are joined by Jon Williams from Bishop Fox, as he is sharing their research on "It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable." SonicWall published advisories for CVE-2022-22274 and CVE-2023-0656 a year apart after finding that NGFW series 6 and 7 devices are affected by two unauthenticated denial-of-service vulnerabilities.
The research states "Our research found that the two issues are fundamentally the same but exploitable at different HTTP URI paths due to reuse of a vulnerable code pattern." They also found that when they scanned SonicWall firewalls with management interfaces exposed to the internet, they found that 76% are vulnerable to one or both issues.
The research can be found here: 
It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Nov 2024 06:00:00 -0000</pubDate>
      <itunes:title>A firewall wake up call.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>313</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Enjoy this special encore episode, where we are joined by Jon Williams from Bishop Fox, as he is sharing their research on "It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable." SonicWall published advisories for CVE-2022-22274 and CVE-2023-0656 a year apart after finding that NGFW series 6 and 7 devices are affected by two unauthenticated denial-of-service vulnerabilities.
The research states "Our research found that the two issues are fundamentally the same but exploitable at different HTTP URI paths due to reuse of a vulnerable code pattern." They also found that when they scanned SonicWall firewalls with management interfaces exposed to the internet, they found that 76% are vulnerable to one or both issues.
The research can be found here: 
It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this special encore episode, where we are joined by Jon Williams from Bishop Fox, as he is sharing their research on "It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable." SonicWall published advisories for CVE-2022-22274 and CVE-2023-0656 a year apart after finding that NGFW series 6 and 7 devices are affected by two unauthenticated denial-of-service vulnerabilities.</p><p>The research states "Our research found that the two issues are fundamentally the same but exploitable at different HTTP URI paths due to reuse of a vulnerable code pattern." They also found that when they scanned SonicWall firewalls with management interfaces exposed to the internet, they found that 76% are vulnerable to one or both issues.</p><p>The research can be found here: </p><ul><li><a href="https://bishopfox.com/blog/its-2024-and-over-178-000-sonicwall-firewalls-are-publicly-exploitable">It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1261</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[248d0432-b6f3-11ee-ae1a-07d70306eaa2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3037253840.mp3?updated=1731083843" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Velvet Ant's silent invasion.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/353/notes</link>
      <description>This week, we are joined by, Amnon Kushnir from Sygnia, who is sharing their work on "China-Nexus Threat Group ‘Velvet Ant’ Leverages a Zero-Day to Deploy Malware on Cisco Nexus Switches." In early 2024, Sygnia observed the ‘Velvet Ant’ threat group exploiting a zero-day vulnerability (CVE-2024-20399) to infiltrate Cisco Switch appliances and operate undetected within enterprise networks. 
This attack enables threat actors to escape Cisco’s command interface and install malware directly on the device’s OS, bypassing standard security tools. The incident underscores the risks posed by third-party appliances and the importance of enhanced monitoring and threat detection to counter advanced persistent threats.
 The research can be found here:
China-Nexus Threat Group ‘Velvet Ant’ Leverages a Zero-Day to Deploy Malware on Cisco Nexus Switches

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Nov 2024 05:00:00 -0000</pubDate>
      <itunes:title>Velvet Ant's silent invasion.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>353</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by, Amnon Kushnir from Sygnia, who is sharing their work on "China-Nexus Threat Group ‘Velvet Ant’ Leverages a Zero-Day to Deploy Malware on Cisco Nexus Switches." In early 2024, Sygnia observed the ‘Velvet Ant’ threat group exploiting a zero-day vulnerability (CVE-2024-20399) to infiltrate Cisco Switch appliances and operate undetected within enterprise networks. 
This attack enables threat actors to escape Cisco’s command interface and install malware directly on the device’s OS, bypassing standard security tools. The incident underscores the risks posed by third-party appliances and the importance of enhanced monitoring and threat detection to counter advanced persistent threats.
 The research can be found here:
China-Nexus Threat Group ‘Velvet Ant’ Leverages a Zero-Day to Deploy Malware on Cisco Nexus Switches

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by, <a href="https://www.linkedin.com/in/amnonkushnir/">Amnon Kushnir</a> from <a href="https://www.linkedin.com/company/sygnia/">Sygnia</a>, who is sharing their work on "China-Nexus Threat Group ‘Velvet Ant’ Leverages a Zero-Day to Deploy Malware on Cisco Nexus Switches." In early 2024, Sygnia observed the ‘Velvet Ant’ threat group exploiting a zero-day vulnerability (CVE-2024-20399) to infiltrate Cisco Switch appliances and operate undetected within enterprise networks. </p><p>This attack enables threat actors to escape Cisco’s command interface and install malware directly on the device’s OS, bypassing standard security tools. The incident underscores the risks posed by third-party appliances and the importance of enhanced monitoring and threat detection to counter advanced persistent threats.</p><p> The research can be found here:</p><ul><li><a href="https://www.sygnia.co/blog/china-threat-group-velvet-ant-cisco-zero-day/">China-Nexus Threat Group ‘Velvet Ant’ Leverages a Zero-Day to Deploy Malware on Cisco Nexus Switches</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1166</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2457a53a-b6f3-11ee-ae1a-8becb5284185]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6753542830.mp3?updated=1730477914" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>LLM security 101.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/352/notes</link>
      <description>This week, we are pleased to be joined by Mick Baccio, global security advisor for Splunk SURGe, sharing their research on "LLM Security: Splunk &amp; OWASP Top 10 for LLM-based Applications." The research dives into the rapid rise of AI and Large Language Models (LLMs) that initially seem magical, but behind the scenes, they are sophisticated systems built by humans. Despite their impressive capabilities, these systems are vulnerable to numerous cyber threats.
Splunk's research explores the OWASP Top 10 for LLM Applications, a framework that highlights key vulnerabilities such as prompt injection, training data poisoning, and sensitive information disclosure. 
 The research can be found here:
LLM Security: Splunk &amp; OWASP Top 10 for LLM-based Applications

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Oct 2024 05:00:00 -0000</pubDate>
      <itunes:title>LLM security 101.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>352</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are pleased to be joined by Mick Baccio, global security advisor for Splunk SURGe, sharing their research on "LLM Security: Splunk &amp; OWASP Top 10 for LLM-based Applications." The research dives into the rapid rise of AI and Large Language Models (LLMs) that initially seem magical, but behind the scenes, they are sophisticated systems built by humans. Despite their impressive capabilities, these systems are vulnerable to numerous cyber threats.
Splunk's research explores the OWASP Top 10 for LLM Applications, a framework that highlights key vulnerabilities such as prompt injection, training data poisoning, and sensitive information disclosure. 
 The research can be found here:
LLM Security: Splunk &amp; OWASP Top 10 for LLM-based Applications

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are pleased to be joined by <a href="https://www.linkedin.com/in/nohackme/">Mick Baccio</a>, global security advisor for <a href="https://www.linkedin.com/company/splunk/">Splunk SURGe</a>, sharing their research on "LLM Security: Splunk &amp; OWASP Top 10 for LLM-based Applications." The research dives into the rapid rise of AI and Large Language Models (LLMs) that initially seem magical, but behind the scenes, they are sophisticated systems built by humans. Despite their impressive capabilities, these systems are vulnerable to numerous cyber threats.</p><p>Splunk's research explores the OWASP Top 10 for LLM Applications, a framework that highlights key vulnerabilities such as prompt injection, training data poisoning, and sensitive information disclosure. </p><p> The research can be found here:</p><ul><li><a href="https://www.splunk.com/en_us/blog/security/llm-defense-owasp-top-10.html">LLM Security: Splunk &amp; OWASP Top 10 for LLM-based Applications</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1073</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2421bd9e-b6f3-11ee-ae1a-07898065d6f1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2435044896.mp3?updated=1729793489" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New targets, new tools, same threat.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/351/notes</link>
      <description>This week we are joined by Chester Wisniewski, Global Field CTO from Sophos X-Ops team, to discuss their work on "Crimson Palace returns: New Tools, Tactics, and Targets." Sophos X-Ops has observed a resurgence in cyberespionage activity, tracked as Operation Crimson Palace, targeting Southeast Asian government organizations. 
After a brief lull, Cluster Charlie resumed operations in September 2023, using new tactics such as web shells and open-source tools to bypass detection, re-establish access, and map target network infrastructure, demonstrating ongoing efforts to exfiltrate data and expand their foothold.
The research can be found here:

Crimson Palace returns: New Tools, Tactics, and Targets 

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Oct 2024 05:00:00 -0000</pubDate>
      <itunes:title>New targets, new tools, same threat.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>351</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by Chester Wisniewski, Global Field CTO from Sophos X-Ops team, to discuss their work on "Crimson Palace returns: New Tools, Tactics, and Targets." Sophos X-Ops has observed a resurgence in cyberespionage activity, tracked as Operation Crimson Palace, targeting Southeast Asian government organizations. 
After a brief lull, Cluster Charlie resumed operations in September 2023, using new tactics such as web shells and open-source tools to bypass detection, re-establish access, and map target network infrastructure, demonstrating ongoing efforts to exfiltrate data and expand their foothold.
The research can be found here:

Crimson Palace returns: New Tools, Tactics, and Targets 

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by <a href="https://www.linkedin.com/in/chester-wisniewski/">Chester Wisniewski</a>, Global Field CTO from <a href="https://www.linkedin.com/company/sophos/">Sophos</a> X-Ops team, to discuss their work on "<a href="https://news.sophos.com/en-us/2024/09/10/crimson-palace-new-tools-tactics-targets/">Crimson Palace returns: New Tools, Tactics, and Targets</a>." Sophos X-Ops has observed a resurgence in cyberespionage activity, tracked as <a href="https://news.sophos.com/en-us/2024/06/05/operation-crimson-palace-a-technical-deep-dive/">Operation Crimson Palace</a>, targeting Southeast Asian government organizations. </p><p>After a brief lull, Cluster Charlie resumed operations in September 2023, using new tactics such as web shells and open-source tools to bypass detection, re-establish access, and map target network infrastructure, demonstrating ongoing efforts to exfiltrate data and expand their foothold.</p><p>The research can be found here:</p><ul><li>
<a href="https://www.wrike.com/workspace.htm?acc=2486920#folder/337266682/tableV2?filters=&amp;sidePanelItemId=1492230849&amp;spaceId=628165068&amp;viewId=313316326">Crimson Palace returns: New Tools, Tactics, and Targets</a> </li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1457</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[23ecf6a4-b6f3-11ee-ae1a-4b2d27adc9c6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9758572913.mp3?updated=1729186339" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware on repeat.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/350/notes</link>
      <description>In this episode, Trevor Hilligoss, VP of SpyCloud Labs at SpyCloud, discusses the increasing threat of ransomware, emphasizing the role of infostealer malware in facilitating these attacks. He draws from SpyCloud's 2024 Malware and Ransomware Defense Report, highlighting how compromised identity data from infostealers creates opportunities for ransomware operators.
With 75% of organizations experiencing multiple ransomware attacks in the past year, Trevor explores findings from over 500 security leaders in the US and UK, discussing the challenges businesses face and how they can use insights from this research to defend against ransomware and other cybercrimes.
The research can be found here:
MALWARE AND RANSOMWARE DEFENSE REPORT

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Oct 2024 05:00:00 -0000</pubDate>
      <itunes:title>Ransomware on repeat.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>350</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>In this episode, Trevor Hilligoss, VP of SpyCloud Labs at SpyCloud, discusses the increasing threat of ransomware, emphasizing the role of infostealer malware in facilitating these attacks. He draws from SpyCloud's 2024 Malware and Ransomware Defense Report, highlighting how compromised identity data from infostealers creates opportunities for ransomware operators.
With 75% of organizations experiencing multiple ransomware attacks in the past year, Trevor explores findings from over 500 security leaders in the US and UK, discussing the challenges businesses face and how they can use insights from this research to defend against ransomware and other cybercrimes.
The research can be found here:
MALWARE AND RANSOMWARE DEFENSE REPORT

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/thilligoss/">Trevor Hilligoss</a>, VP of <a href="https://www.linkedin.com/company/spycloud/">SpyCloud Labs</a> at <a href="https://www.linkedin.com/company/spycloud/">SpyCloud</a>, discusses the increasing threat of ransomware, emphasizing the role of infostealer malware in facilitating these attacks. He draws from SpyCloud's <a href="https://spycloud.com/resource/2024-malware-ransomware-defense-report/">2024 Malware and Ransomware Defense Report</a>, highlighting how compromised identity data from infostealers creates opportunities for ransomware operators.</p><p>With 75% of organizations experiencing multiple ransomware attacks in the past year, Trevor explores findings from over 500 security leaders in the US and UK, discussing the challenges businesses face and how they can use insights from this research to defend against ransomware and other cybercrimes.</p><p>The research can be found here:</p><ul><li><a href="https://spycloud.com/resource/2024-malware-ransomware-defense-report/">MALWARE AND RANSOMWARE DEFENSE REPORT</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1535</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[23b7fdfa-b6f3-11ee-ae1a-2b3b7e39cd9c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4498217103.mp3?updated=1729011784" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Podcast bait, malware switch.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/349/notes</link>
      <description>Joshua Miller from Proofpoint is discussing their work on "Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset." Proofpoint identified Iranian threat actor TA453 targeting a prominent Jewish figure with a fake podcast interview invitation, using a benign email to build trust before sending a malicious link. 
The attack attempted to deliver new malware called BlackSmith, containing a PowerShell trojan dubbed AnvilEcho, designed for intelligence gathering and exfiltration. This malware consolidates all of TA453's known capabilities into a single script rather than the previously used modular approach.
The research can be found here:
Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Oct 2024 05:00:00 -0000</pubDate>
      <itunes:title>Podcast bait, malware switch.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>349</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Joshua Miller from Proofpoint is discussing their work on "Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset." Proofpoint identified Iranian threat actor TA453 targeting a prominent Jewish figure with a fake podcast interview invitation, using a benign email to build trust before sending a malicious link. 
The attack attempted to deliver new malware called BlackSmith, containing a PowerShell trojan dubbed AnvilEcho, designed for intelligence gathering and exfiltration. This malware consolidates all of TA453's known capabilities into a single script rather than the previously used modular approach.
The research can be found here:
Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joshua Miller from Proofpoint is discussing their work on "Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset." Proofpoint identified Iranian threat actor TA453 targeting a prominent Jewish figure with a fake podcast interview invitation, using a benign email to build trust before sending a malicious link. </p><p>The attack attempted to deliver new malware called BlackSmith, containing a PowerShell trojan dubbed AnvilEcho, designed for intelligence gathering and exfiltration. This malware consolidates all of TA453's known capabilities into a single script rather than the previously used modular approach.</p><p>The research can be found here:</p><ul><li><a href="https://www.proofpoint.com/us/blog/threat-insight/best-laid-plans-ta453-targets-religious-figure-fake-podcast-invite-delivering">Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1184</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[238233d2-b6f3-11ee-ae1a-9f2ce098ab0e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6641881628.mp3?updated=1728061258" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Beyond the permissions wall.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/348/notes</link>
      <description>We are joined by Yves Younan, Senior Manager, Talos Vulnerability Discovery and Research from Cisco, discussing their work on "How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions." Cisco Talos has uncovered eight vulnerabilities in Microsoft applications for macOS that could allow attackers to exploit the system's permission model by injecting malicious libraries. 
By leveraging permissions already granted to these apps, attackers could gain access to sensitive resources like the microphone, camera, and screen recording without user consent. While Microsoft considers these issues low risk and has declined to fix them, the vulnerabilities pose a potential threat to user privacy and security.
The research can be found here:
How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Sep 2024 05:00:00 -0000</pubDate>
      <itunes:title>Beyond the permissions wall.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>348</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>We are joined by Yves Younan, Senior Manager, Talos Vulnerability Discovery and Research from Cisco, discussing their work on "How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions." Cisco Talos has uncovered eight vulnerabilities in Microsoft applications for macOS that could allow attackers to exploit the system's permission model by injecting malicious libraries. 
By leveraging permissions already granted to these apps, attackers could gain access to sensitive resources like the microphone, camera, and screen recording without user consent. While Microsoft considers these issues low risk and has declined to fix them, the vulnerabilities pose a potential threat to user privacy and security.
The research can be found here:
How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>We are joined by Yves Younan, Senior Manager, Talos Vulnerability Discovery and Research from Cisco, discussing their work on "How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions." Cisco Talos has uncovered eight vulnerabilities in Microsoft applications for macOS that could allow attackers to exploit the system's permission model by injecting malicious libraries. </p><p>By leveraging permissions already granted to these apps, attackers could gain access to sensitive resources like the microphone, camera, and screen recording without user consent. While Microsoft considers these issues low risk and has declined to fix them, the vulnerabilities pose a potential threat to user privacy and security.</p><p>The research can be found here:</p><ul><li><a href="https://blog.talosintelligence.com/how-multiple-vulnerabilities-in-microsoft-apps-for-macos-pave-the-way-to-stealing-permissions/">How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>887</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[234bf9ca-b6f3-11ee-ae1a-fff64b5c7f99]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2168148664.mp3?updated=1727387582" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hook, line, and sinker.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/347/notes</link>
      <description>Jonathan Tanner, Senior Security Researcher from Barracuda, discussing their work on "Stealthy phishing attack uses advanced infostealer for data exfiltration." The recent phishing attack, detailed by Barracuda, uses a sophisticated infostealer malware to exfiltrate a wide array of sensitive data. 
The attack begins with a phishing email containing an ISO file with an HTA payload, which downloads and executes obfuscated scripts to extract and transmit browser information, saved files, and credentials to remote servers. This advanced infostealer is notable for its extensive data collection capabilities and complex exfiltration methods, highlighting the increasing sophistication of cyber threats.
The research can be found here:
Stealthy phishing attack uses advanced infostealer for data exfiltration

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Sep 2024 05:00:00 -0000</pubDate>
      <itunes:title>Hook, line, and sinker.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>347</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Jonathan Tanner, Senior Security Researcher from Barracuda, discussing their work on "Stealthy phishing attack uses advanced infostealer for data exfiltration." The recent phishing attack, detailed by Barracuda, uses a sophisticated infostealer malware to exfiltrate a wide array of sensitive data. 
The attack begins with a phishing email containing an ISO file with an HTA payload, which downloads and executes obfuscated scripts to extract and transmit browser information, saved files, and credentials to remote servers. This advanced infostealer is notable for its extensive data collection capabilities and complex exfiltration methods, highlighting the increasing sophistication of cyber threats.
The research can be found here:
Stealthy phishing attack uses advanced infostealer for data exfiltration

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/jtannersec/">Jonathan Tanner</a>, Senior Security Researcher from <a href="https://www.barracuda.com/">Barracuda</a>, discussing their work on "<a href="https://blog.barracuda.com/2024/08/14/phishing-advanced-infostealer-data-exfiltration">Stealthy phishing attack uses advanced infostealer for data exfiltration</a>." The recent phishing attack, detailed by Barracuda, uses a sophisticated infostealer malware to exfiltrate a wide array of sensitive data. </p><p>The attack begins with a phishing email containing an ISO file with an HTA payload, which downloads and executes obfuscated scripts to extract and transmit browser information, saved files, and credentials to remote servers. This advanced infostealer is notable for its extensive data collection capabilities and complex exfiltration methods, highlighting the increasing sophistication of cyber threats.</p><p>The research can be found here:</p><ul><li><a href="https://blog.barracuda.com/2024/08/14/phishing-advanced-infostealer-data-exfiltration">Stealthy phishing attack uses advanced infostealer for data exfiltration</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1182</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[23152288-b6f3-11ee-ae1a-77b2dc5cee2d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4889421754.mp3?updated=1726669091" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Spamageddon: Xeon Sender’s cloudy SMS attack revealed!</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/346/notes</link>
      <description>Alex Delamotte, Threat Researcher from SentinelOne Labs, joins to share their work on "Xeon Sender | SMS Spam Shipping Multi-Tool Targeting SaaS Credentials." SentinelOne’s Labs team has uncovered new research on Xeon Sender, a cloud hacktool used to launch SMS spam attacks via legitimate APIs like Amazon SNS. 
First seen in 2022, this tool has been repurposed by multiple threat actors and distributed on underground forums, highlighting the ongoing trend of SMS spam through cloud services and SaaS.
The research can be found here:
Xeon Sender | SMS Spam Shipping Multi-Tool Targeting SaaS Credentials

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Sep 2024 05:00:00 -0000</pubDate>
      <itunes:title>Spamageddon: Xeon Sender’s cloudy SMS attack revealed!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>346</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Alex Delamotte, Threat Researcher from SentinelOne Labs, joins to share their work on "Xeon Sender | SMS Spam Shipping Multi-Tool Targeting SaaS Credentials." SentinelOne’s Labs team has uncovered new research on Xeon Sender, a cloud hacktool used to launch SMS spam attacks via legitimate APIs like Amazon SNS. 
First seen in 2022, this tool has been repurposed by multiple threat actors and distributed on underground forums, highlighting the ongoing trend of SMS spam through cloud services and SaaS.
The research can be found here:
Xeon Sender | SMS Spam Shipping Multi-Tool Targeting SaaS Credentials

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Alex Delamotte, Threat Researcher from SentinelOne Labs, joins to share their work on "Xeon Sender | SMS Spam Shipping Multi-Tool Targeting SaaS Credentials." SentinelOne’s Labs team has uncovered new research on Xeon Sender, a cloud hacktool used to launch SMS spam attacks via legitimate APIs like Amazon SNS. </p><p>First seen in 2022, this tool has been repurposed by multiple threat actors and distributed on underground forums, highlighting the ongoing trend of SMS spam through cloud services and SaaS.</p><p>The research can be found here:</p><ul><li><a href="https://www.sentinelone.com/labs/xeon-sender-sms-spam-shipping-multi-tool-targeting-saas-credentials/">Xeon Sender | SMS Spam Shipping Multi-Tool Targeting SaaS Credentials</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>957</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[22df1698-b6f3-11ee-ae1a-8358584caffc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1026436684.mp3?updated=1726263808" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The playbook for outpacing China.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/345/notes</link>
      <description>This week, N2K's very own Brandon Karpf sits down with Kevin Lentz, Team Leader of the Cyber Pacific Project at the Global Disinformation Lab, and they discuss the recent threatcasting report "Cyber Competition in the Indo-Pacific Gray Zone 2035." This report, developed using the Threatcasting Method, examines how the U.S. and Indo-Pacific allies can coordinate their cyber defense efforts in response to future competition with China. 
It presents findings, trends, and recommendations based on twenty-five scenarios simulated by a cross-functional group of experts to anticipate and address emerging threats over the next decade.
The research can be found here:
Cyber Competition in the Indo-Pacific Gray Zone 2035

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Sep 2024 05:00:00 -0000</pubDate>
      <itunes:title>The playbook for outpacing China.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>345</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, N2K's very own Brandon Karpf sits down with Kevin Lentz, Team Leader of the Cyber Pacific Project at the Global Disinformation Lab, and they discuss the recent threatcasting report "Cyber Competition in the Indo-Pacific Gray Zone 2035." This report, developed using the Threatcasting Method, examines how the U.S. and Indo-Pacific allies can coordinate their cyber defense efforts in response to future competition with China. 
It presents findings, trends, and recommendations based on twenty-five scenarios simulated by a cross-functional group of experts to anticipate and address emerging threats over the next decade.
The research can be found here:
Cyber Competition in the Indo-Pacific Gray Zone 2035

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, <a href="https://www.linkedin.com/company/n2k-networks/">N2K</a>'s very own <a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a> sits down with <a href="https://www.linkedin.com/in/kevinjameslentz/">Kevin Lentz</a>, Team Leader of the Cyber Pacific Project at the <a href="https://www.linkedin.com/company/ut-gdil/">Global Disinformation Lab</a>, and they discuss the recent threatcasting <a href="https://athena.westpoint.edu/items/23747390-fc5a-4618-a038-2f26651a1bca">report</a> "Cyber Competition in the Indo-Pacific Gray Zone 2035." This report, developed using the Threatcasting Method, examines how the U.S. and Indo-Pacific allies can coordinate their cyber defense efforts in response to future competition with China. </p><p>It presents findings, trends, and recommendations based on twenty-five scenarios simulated by a cross-functional group of experts to anticipate and address emerging threats over the next decade.</p><p>The research can be found here:</p><ul><li><a href="https://athena.westpoint.edu/items/23747390-fc5a-4618-a038-2f26651a1bca">Cyber Competition in the Indo-Pacific Gray Zone 2035</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1546</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[22a729c2-b6f3-11ee-ae1a-af2ddd0d2fec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1874169892.mp3?updated=1725644433" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pop goes the developer.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/344/notes</link>
      <description>Tim Peck, a Senior Threat Researcher at Securonix, is discussing their work on "Threat actors behind the DEV#POPPER campaign have retooled and are continuing to target software developers via social engineering." The DEV#POPPER campaign continues to evolve, now targeting developers with malware capable of operating on Linux, Windows, and macOS systems. 
The threat actors, believed to be North Korean, employ sophisticated social engineering tactics, such as fake job interviews, to deliver stealthy malware that gathers sensitive information, including browser credentials and system data. 
The research can be found here:
Research Update: Threat Actors Behind the DEV#POPPER Campaign Have Retooled and are Continuing to Target Software Developers via Social Engineering

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 31 Aug 2024 05:00:00 -0000</pubDate>
      <itunes:title>Pop goes the developer.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>344</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Tim Peck, a Senior Threat Researcher at Securonix, is discussing their work on "Threat actors behind the DEV#POPPER campaign have retooled and are continuing to target software developers via social engineering." The DEV#POPPER campaign continues to evolve, now targeting developers with malware capable of operating on Linux, Windows, and macOS systems. 
The threat actors, believed to be North Korean, employ sophisticated social engineering tactics, such as fake job interviews, to deliver stealthy malware that gathers sensitive information, including browser credentials and system data. 
The research can be found here:
Research Update: Threat Actors Behind the DEV#POPPER Campaign Have Retooled and are Continuing to Target Software Developers via Social Engineering

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tim Peck, a Senior Threat Researcher at Securonix, is discussing their work on "Threat actors behind the DEV#POPPER campaign have retooled and are continuing to target software developers via social engineering." The DEV#POPPER campaign continues to evolve, now targeting developers with malware capable of operating on Linux, Windows, and macOS systems. </p><p>The threat actors, believed to be North Korean, employ sophisticated social engineering tactics, such as fake job interviews, to deliver stealthy malware that gathers sensitive information, including browser credentials and system data. </p><p>The research can be found here:</p><ul><li><a href="https://www.securonix.com/blog/research-update-threat-actors-behind-the-devpopper-campaign-have-retooled-and-are-continuing-to-target-software-developers-via-social-engineering/">Research Update: Threat Actors Behind the DEV#POPPER Campaign Have Retooled and are Continuing to Target Software Developers via Social Engineering</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1246</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[22704eca-b6f3-11ee-ae1a-cbb030d36e39]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9005562055.mp3?updated=1724956741" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>MaaS infrastructure exposed. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/343/notes</link>
      <description>Robert Duncan, VP of Product Strategy from Netcraft, is discussing their work on "Mule-as-a-Service Infrastructure Exposed." Netcraft's new threat intelligence reveals the intricate connections within global fraud networks, showing how criminals use specialized services like Mule-as-a-Service (MaaS) to launder scam proceeds. 
By mapping the cyber and financial infrastructure, including bank accounts, crypto wallets, and phone numbers, Netcraft exposes how different scams are interconnected and identifies weak points that can be targeted to disrupt these operations. This insight provides an opportunity to prevent fraud and protect against financial crimes like pig butchering, investment scams, and romance fraud.
The research can be found here:
Mule-as-a-Service Infrastructure Exposed

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Aug 2024 05:00:00 -0000</pubDate>
      <itunes:title>MaaS infrastructure exposed. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>343</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Robert Duncan, VP of Product Strategy from Netcraft, is discussing their work on "Mule-as-a-Service Infrastructure Exposed." Netcraft's new threat intelligence reveals the intricate connections within global fraud networks, showing how criminals use specialized services like Mule-as-a-Service (MaaS) to launder scam proceeds. 
By mapping the cyber and financial infrastructure, including bank accounts, crypto wallets, and phone numbers, Netcraft exposes how different scams are interconnected and identifies weak points that can be targeted to disrupt these operations. This insight provides an opportunity to prevent fraud and protect against financial crimes like pig butchering, investment scams, and romance fraud.
The research can be found here:
Mule-as-a-Service Infrastructure Exposed

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Robert Duncan, VP of Product Strategy from Netcraft, is discussing their work on "Mule-as-a-Service Infrastructure Exposed." Netcraft's new threat intelligence reveals the intricate connections within global fraud networks, showing how criminals use specialized services like Mule-as-a-Service (MaaS) to launder scam proceeds. </p><p>By mapping the cyber and financial infrastructure, including bank accounts, crypto wallets, and phone numbers, Netcraft exposes how different scams are interconnected and identifies weak points that can be targeted to disrupt these operations. This insight provides an opportunity to prevent fraud and protect against financial crimes like pig butchering, investment scams, and romance fraud.</p><p>The research can be found here:</p><ul><li><a href="https://www.netcraft.com/blog/mule-as-a-service-infrastructure-exposed/">Mule-as-a-Service Infrastructure Exposed</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[22392a94-b6f3-11ee-ae1a-2bebd494317d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3282349881.mp3?updated=1724427809" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Essential tools with critical security challenges.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/342/notes</link>
      <description>Snir Ben Shimol from ZEST Security on their work, "How we hacked a cloud production environment by exploiting Terraform providers." In this blog, ZEST discusses the security risks associated with Terraform providers, particularly those from community sources. 
The research highlights the importance of carefully vetting providers, regular scanning, and following best practices like version pinning to mitigate potential vulnerabilities in cloud infrastructure management.
The research can be found here:
The hidden risks of Terraform providers

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Aug 2024 05:00:00 -0000</pubDate>
      <itunes:title>Essential tools with critical security challenges.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>342</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Snir Ben Shimol from ZEST Security on their work, "How we hacked a cloud production environment by exploiting Terraform providers." In this blog, ZEST discusses the security risks associated with Terraform providers, particularly those from community sources. 
The research highlights the importance of carefully vetting providers, regular scanning, and following best practices like version pinning to mitigate potential vulnerabilities in cloud infrastructure management.
The research can be found here:
The hidden risks of Terraform providers

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Snir Ben Shimol from ZEST Security on their work, "How we hacked a cloud production environment by exploiting Terraform providers." In this blog, ZEST discusses the security risks associated with Terraform providers, particularly those from community sources. </p><p>The research highlights the importance of carefully vetting providers, regular scanning, and following best practices like version pinning to mitigate potential vulnerabilities in cloud infrastructure management.</p><p>The research can be found here:</p><ul><li><a href="https://zestsecurity.io/the-hidden-risks-of-terraform-providers/">The hidden risks of Terraform providers</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1337</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2202c9b8-b6f3-11ee-ae1a-33da8789368d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4577809968.mp3?updated=1723834641" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Prompts gone rogue.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/341/notes</link>
      <description>Shachar Menashe, Senior Director of Security Research at JFrog, is talking about "When Prompts Go Rogue: Analyzing a Prompt Injection Code Execution in Vanna.AI." A security vulnerability in the Vanna.AI tool, called CVE-2024-5565, allows hackers to exploit large language models (LLMs) by manipulating user input to execute malicious code, a method known as prompt injection. 
This poses a significant risk when LLMs are connected to critical functions, highlighting the need for stronger security measures.
The research can be found here:
When Prompts Go Rogue: Analyzing a Prompt Injection Code Execution in Vanna.AI

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Aug 2024 05:00:00 -0000</pubDate>
      <itunes:title>Prompts gone rogue.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>341</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Shachar Menashe, Senior Director of Security Research at JFrog, is talking about "When Prompts Go Rogue: Analyzing a Prompt Injection Code Execution in Vanna.AI." A security vulnerability in the Vanna.AI tool, called CVE-2024-5565, allows hackers to exploit large language models (LLMs) by manipulating user input to execute malicious code, a method known as prompt injection. 
This poses a significant risk when LLMs are connected to critical functions, highlighting the need for stronger security measures.
The research can be found here:
When Prompts Go Rogue: Analyzing a Prompt Injection Code Execution in Vanna.AI

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Shachar Menashe, Senior Director of Security Research at JFrog, is talking about "When Prompts Go Rogue: Analyzing a Prompt Injection Code Execution in Vanna.AI." A security vulnerability in the Vanna.AI tool, called CVE-2024-5565, allows hackers to exploit large language models (LLMs) by manipulating user input to execute malicious code, a method known as prompt injection. </p><p>This poses a significant risk when LLMs are connected to critical functions, highlighting the need for stronger security measures.</p><p>The research can be found here:</p><ul><li><a href="https://jfrog.com/blog/prompt-injection-attack-code-execution-in-vanna-ai-cve-2024-5565/">When Prompts Go Rogue: Analyzing a Prompt Injection Code Execution in Vanna.AI</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1424</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[21c8a274-b6f3-11ee-ae1a-1f72c865ec9c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4290070420.mp3?updated=1723217939" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Spinning the web of tangled tactics. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/340/notes</link>
      <description>This week, we are joined by Jason Baker, Senior Threat Consultant at GuidePoint Security, and he is discussing their work on "Worldwide Web: An Analysis of Tactics and Techniques Attributed to Scattered Spider." In early 2024, a current RansomHub RaaS affiliate was identified as a former Alphv/Black Cat affiliate and is believed to be linked to the Scattered Spider group, known for using overlapping tools, tactics, and victims. 
The high-confidence assessment by GuidePoint’s DFIR and GRIT teams is supported by the consistent use of tools like ngrok and Tailscale, social engineering tactics, and systematic playbooks in intrusions.
The research can be found here:
Worldwide Web: An Analysis of Tactics and Techniques Attributed to Scattered Spider

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Aug 2024 05:00:00 -0000</pubDate>
      <itunes:title>Spinning the web of tangled tactics. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>340</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Jason Baker, Senior Threat Consultant at GuidePoint Security, and he is discussing their work on "Worldwide Web: An Analysis of Tactics and Techniques Attributed to Scattered Spider." In early 2024, a current RansomHub RaaS affiliate was identified as a former Alphv/Black Cat affiliate and is believed to be linked to the Scattered Spider group, known for using overlapping tools, tactics, and victims. 
The high-confidence assessment by GuidePoint’s DFIR and GRIT teams is supported by the consistent use of tools like ngrok and Tailscale, social engineering tactics, and systematic playbooks in intrusions.
The research can be found here:
Worldwide Web: An Analysis of Tactics and Techniques Attributed to Scattered Spider

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by Jason Baker, Senior Threat Consultant at GuidePoint Security, and he is discussing their work on "Worldwide Web: An Analysis of Tactics and Techniques Attributed to Scattered Spider." In early 2024, a current RansomHub RaaS affiliate was identified as a former Alphv/Black Cat affiliate and is believed to be linked to the Scattered Spider group, known for using overlapping tools, tactics, and victims. </p><p>The high-confidence assessment by GuidePoint’s DFIR and GRIT teams is supported by the consistent use of tools like ngrok and Tailscale, social engineering tactics, and systematic playbooks in intrusions.</p><p>The research can be found here:</p><ul><li><a href="https://www.guidepointsecurity.com/blog/worldwide-web-an-analysis-of-tactics-and-techniques-attributed-to-scattered-spider/">Worldwide Web: An Analysis of Tactics and Techniques Attributed to Scattered Spider</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1369</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[21936064-b6f3-11ee-ae1a-afd12ad0cd84]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5205098066.mp3?updated=1722618279" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Black Basta ransomware riddle.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/339/notes</link>
      <description>Dick O'Brien from Symantec Threat Hunter team is talking about their work on "Ransomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-day." Also going to provide some background/history on Black Basta. CVE-2024-26169 in the Windows Error Reporting Service, patched on March 12, 2024, allowed privilege escalation. 
Despite initial claims of no active exploitation, recent analysis indicates it may have been exploited as a zero-day before the patch.
The research can be found here:
Ransomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-day

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Jul 2024 05:00:00 -0000</pubDate>
      <itunes:title>The Black Basta ransomware riddle.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>339</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Dick O'Brien from Symantec Threat Hunter team is talking about their work on "Ransomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-day." Also going to provide some background/history on Black Basta. CVE-2024-26169 in the Windows Error Reporting Service, patched on March 12, 2024, allowed privilege escalation. 
Despite initial claims of no active exploitation, recent analysis indicates it may have been exploited as a zero-day before the patch.
The research can be found here:
Ransomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-day

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dick O'Brien from Symantec Threat Hunter team is talking about their work on "Ransomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-day." Also going to provide some background/history on Black Basta. CVE-2024-26169 in the Windows Error Reporting Service, patched on March 12, 2024, allowed privilege escalation. </p><p>Despite initial claims of no active exploitation, recent analysis indicates it may have been exploited as a zero-day before the patch.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/threat-intelligence/black-basta-ransomware-zero-day">Ransomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-day</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1024</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[215cbfc8-b6f3-11ee-ae1a-772dfc1ca154]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3246468631.mp3?updated=1722011364" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Olympic scammers go for gold.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/338/notes</link>
      <description>This week, we are joined by Selena Larson, Staff Threat Researcher, Lead Intelligence Analysis and Strategy at Proofpoint, as well as host of the "Only Malware in the Building" podcast, as she is discussing their research on "Scammers Create Fraudulent Olympics Ticketing Websites." Proofpoint recently identified a fraudulent website selling fake tickets to the Paris 2024 Summer Olympics and quickly suspended the domain. 
This site was among many identified by the French Gendarmerie Nationale and Olympics partners, who have shut down 51 of 338 fraudulent websites, with 140 receiving formal notices from law enforcement.
The research can be found here:
Security Brief: Scammers Create Fraudulent Olympics Ticketing Websites

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Jul 2024 05:00:00 -0000</pubDate>
      <itunes:title>Olympic scammers go for gold.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>338</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Selena Larson, Staff Threat Researcher, Lead Intelligence Analysis and Strategy at Proofpoint, as well as host of the "Only Malware in the Building" podcast, as she is discussing their research on "Scammers Create Fraudulent Olympics Ticketing Websites." Proofpoint recently identified a fraudulent website selling fake tickets to the Paris 2024 Summer Olympics and quickly suspended the domain. 
This site was among many identified by the French Gendarmerie Nationale and Olympics partners, who have shut down 51 of 338 fraudulent websites, with 140 receiving formal notices from law enforcement.
The research can be found here:
Security Brief: Scammers Create Fraudulent Olympics Ticketing Websites

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by Selena Larson, Staff Threat Researcher, Lead Intelligence Analysis and Strategy at Proofpoint, as well as host of the "Only Malware in the Building" podcast, as she is discussing their research on "Scammers Create Fraudulent Olympics Ticketing Websites." Proofpoint recently identified a fraudulent website selling fake tickets to the Paris 2024 Summer Olympics and quickly suspended the domain. </p><p>This site was among many identified by the French Gendarmerie Nationale and Olympics partners, who have shut down 51 of 338 fraudulent websites, with 140 receiving formal notices from law enforcement.</p><p>The research can be found here:</p><ul><li><a href="https://www.proofpoint.com/uk/blog/threat-insight/security-brief-scammers-create-fraudulent-olympics-ticketing-websites">Security Brief: Scammers Create Fraudulent Olympics Ticketing Websites</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1290</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[21251050-b6f3-11ee-ae1a-93edc2e118db]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5174402074.mp3?updated=1721411977" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>On the prowl for mobile malware. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/337/notes</link>
      <description>This week, we are joined by Asheer Malhotra and Vitor Ventura from Cisco Talos, and they are discussing "Operation Celestial Force employs mobile and desktop malware to target Indian entities." Cisco Talos revealed Operation Celestial Force, an espionage campaign by the Pakistani threat group "Cosmic Leopard," targeting Indian defense, government, and technology sectors. 
Active for at least six years, the operation has recently increased its use of mobile malware and commercial spyware for surveillance.
The research can be found here:
Operation Celestial Force employs mobile and desktop malware to target Indian entities

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Jul 2024 05:00:00 -0000</pubDate>
      <itunes:title>On the prowl for mobile malware. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>337</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Asheer Malhotra and Vitor Ventura from Cisco Talos, and they are discussing "Operation Celestial Force employs mobile and desktop malware to target Indian entities." Cisco Talos revealed Operation Celestial Force, an espionage campaign by the Pakistani threat group "Cosmic Leopard," targeting Indian defense, government, and technology sectors. 
Active for at least six years, the operation has recently increased its use of mobile malware and commercial spyware for surveillance.
The research can be found here:
Operation Celestial Force employs mobile and desktop malware to target Indian entities

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by Asheer Malhotra and Vitor Ventura from Cisco Talos, and they are discussing "Operation Celestial Force employs mobile and desktop malware to target Indian entities." Cisco Talos revealed Operation Celestial Force, an espionage campaign by the Pakistani threat group "Cosmic Leopard," targeting Indian defense, government, and technology sectors. </p><p>Active for at least six years, the operation has recently increased its use of mobile malware and commercial spyware for surveillance.</p><p>The research can be found here:</p><ul><li class="ql-align-center"><a href="https://blog.talosintelligence.com/cosmic-leopard/">Operation Celestial Force employs mobile and desktop malware to target Indian entities</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1518</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[20eac666-b6f3-11ee-ae1a-1f49ba16be2e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5057921675.mp3?updated=1720795496" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Welcome to New York, it's been waitin' for you.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/291/notes</link>
      <description>Joshua Miller from Proofpoint joins Dave to discuss findings on "Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware." In mid May, TA453, also known as Charming Kitten, APT42, Mint Sandstorm, and Yellow Garuda, was found sending a benign conversation lure masquerading as a senior fellow with the Royal United Services Institute (RUSI) to the public media contact for a nuclear security expert at a US-based think tank focused on foreign affairs.
The research states that "the email solicited feedback on a project called “Iran in the Global Security Context” and requested permission to send a draft for review." Proofpoint shares it's findings and what you can expect from the threat group.
The research can be found here:
Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Jul 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: Welcome to New York, it's been waitin' for you.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>291</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Joshua Miller from Proofpoint joins Dave to discuss findings on "Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware." In mid May, TA453, also known as Charming Kitten, APT42, Mint Sandstorm, and Yellow Garuda, was found sending a benign conversation lure masquerading as a senior fellow with the Royal United Services Institute (RUSI) to the public media contact for a nuclear security expert at a US-based think tank focused on foreign affairs.
The research states that "the email solicited feedback on a project called “Iran in the Global Security Context” and requested permission to send a draft for review." Proofpoint shares it's findings and what you can expect from the threat group.
The research can be found here:
Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joshua Miller from Proofpoint joins Dave to discuss findings on "Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware." In mid May, TA453, also known as Charming Kitten, APT42, Mint Sandstorm, and Yellow Garuda, was found sending a benign conversation lure masquerading as a senior fellow with the Royal United Services Institute (RUSI) to the public media contact for a nuclear security expert at a US-based think tank focused on foreign affairs.</p><p>The research states that "the email solicited feedback on a project called “Iran in the Global Security Context” and requested permission to send a draft for review." Proofpoint shares it's findings and what you can expect from the threat group.</p><p>The research can be found here:</p><ul><li><a href="https://www.proofpoint.com/us/blog/threat-insight/welcome-new-york-exploring-ta453s-foray-lnks-and-mac-malware">Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1112</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[20b2a18c-b6f3-11ee-ae1a-13f1ece0467c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9078269307.mp3?updated=1719940323" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>APT36's cyber blitz on India.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/336/notes</link>
      <description>Ismael Valenzuela, Vice President Threat Research &amp; Intelligence, from Blackberry Threat Research and Intelligence team is discussing their work on "Transparent Tribe Targets Indian Government, Defense, and Aerospace Sectors Leveraging Cross-Platform Programming Languages." BlackBerry has identified Transparent Tribe (APT36), a Pakistani-based advanced persistent threat group, targeting India's government, defense, and aerospace sectors from late 2023 to April 2024, using evolving toolkits and exploiting web services like Telegram and Google Drive. 
Evidence such as time zone settings and spear-phishing emails with Pakistani IP addresses supports their attribution, suggesting alignment with Pakistan's interests.
The research can be found here:
Transparent Tribe Targets Indian Government, Defense, and Aerospace Sectors Leveraging Cross-Platform Programming Languages

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 Jun 2024 05:00:00 -0000</pubDate>
      <itunes:title>APT36's cyber blitz on India.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>336</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Ismael Valenzuela, Vice President Threat Research &amp; Intelligence, from Blackberry Threat Research and Intelligence team is discussing their work on "Transparent Tribe Targets Indian Government, Defense, and Aerospace Sectors Leveraging Cross-Platform Programming Languages." BlackBerry has identified Transparent Tribe (APT36), a Pakistani-based advanced persistent threat group, targeting India's government, defense, and aerospace sectors from late 2023 to April 2024, using evolving toolkits and exploiting web services like Telegram and Google Drive. 
Evidence such as time zone settings and spear-phishing emails with Pakistani IP addresses supports their attribution, suggesting alignment with Pakistan's interests.
The research can be found here:
Transparent Tribe Targets Indian Government, Defense, and Aerospace Sectors Leveraging Cross-Platform Programming Languages

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ismael Valenzuela, Vice President Threat Research &amp; Intelligence, from Blackberry Threat Research and Intelligence team is discussing their work on "Transparent Tribe Targets Indian Government, Defense, and Aerospace Sectors Leveraging Cross-Platform Programming Languages." BlackBerry has identified Transparent Tribe (APT36), a Pakistani-based advanced persistent threat group, targeting India's government, defense, and aerospace sectors from late 2023 to April 2024, using evolving toolkits and exploiting web services like Telegram and Google Drive. </p><p>Evidence such as time zone settings and spear-phishing emails with Pakistani IP addresses supports their attribution, suggesting alignment with Pakistan's interests.</p><p>The research can be found here:</p><ul><li><a href="https://blogs.blackberry.com/en/2024/05/transparent-tribe-targets-indian-government-defense-and-aerospace-sectors">Transparent Tribe Targets Indian Government, Defense, and Aerospace Sectors Leveraging Cross-Platform Programming Languages</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1133</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[207c8318-b6f3-11ee-ae1a-1396de6e9a0a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8155746244.mp3?updated=1719598439" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Piercing the through the fog.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/335/notes</link>
      <description>Kerri Shafer-Page from Arctic Wolf joins us to discuss their work on "Lost in the Fog: A New Ransomware Threat." Starting in early May, Arctic Wolf's Incident Response team investigated Fog ransomware attacks on US education and recreation sectors, where attackers exploited compromised VPN credentials to access systems, disable Windows Defender, encrypt files, and delete backups.
Despite the uniformity in ransomware payloads and ransom notes, the organizational structure of the responsible groups remains unknown.
The research can be found here:
Lost in the Fog: A New Ransomware Threat

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Jun 2024 05:00:00 -0000</pubDate>
      <itunes:title>Piercing the through the fog.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>335</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Kerri Shafer-Page from Arctic Wolf joins us to discuss their work on "Lost in the Fog: A New Ransomware Threat." Starting in early May, Arctic Wolf's Incident Response team investigated Fog ransomware attacks on US education and recreation sectors, where attackers exploited compromised VPN credentials to access systems, disable Windows Defender, encrypt files, and delete backups.
Despite the uniformity in ransomware payloads and ransom notes, the organizational structure of the responsible groups remains unknown.
The research can be found here:
Lost in the Fog: A New Ransomware Threat

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kerri Shafer-Page from Arctic Wolf joins us to discuss their work on "Lost in the Fog: A New Ransomware Threat." Starting in early May, Arctic Wolf's Incident Response team investigated Fog ransomware attacks on US education and recreation sectors, where attackers exploited compromised VPN credentials to access systems, disable Windows Defender, encrypt files, and delete backups.</p><p>Despite the uniformity in ransomware payloads and ransom notes, the organizational structure of the responsible groups remains unknown.</p><p>The research can be found here:</p><ul><li><a href="https://arcticwolf.com/resources/blog/lost-in-the-fog-a-new-ransomware-threat/">Lost in the Fog: A New Ransomware Threat</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1016</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[204692f8-b6f3-11ee-ae1a-f7fd51098555]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3799103471.mp3?updated=1718985465" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exploring the mechanics of Infostealer malware.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/334/notes</link>
      <description>This week, we are joined by a Security Researcher from SpyCloud Labs, James, who is discussing their work on "Unpacking Infostealer Malware: What we’ve learned from reverse engineering LummaC2 and Atomic macOS Stealer."  Infostealer malware has become highly prevalent, with SpyCloud tracking over 50 families and finding that 1 in 5 digital identities are at risk.
This research analyzes the workings and intentions behind infostealers like LummaC2 and Atomic macOS Stealer, focusing on the types of data extracted and the broader security implications.
The research can be found here:

Reversing LummaC2 4.0: Updates, Bug Fixes

Reversing Atomic macOS Stealer: Binaries, Backdoors &amp; Browser Theft

How the Threat Actors at SpaxMedia Distribute Malware Globally


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Jun 2024 05:00:00 -0000</pubDate>
      <itunes:title>Exploring the mechanics of Infostealer malware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>334</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by a Security Researcher from SpyCloud Labs, James, who is discussing their work on "Unpacking Infostealer Malware: What we’ve learned from reverse engineering LummaC2 and Atomic macOS Stealer."  Infostealer malware has become highly prevalent, with SpyCloud tracking over 50 families and finding that 1 in 5 digital identities are at risk.
This research analyzes the workings and intentions behind infostealers like LummaC2 and Atomic macOS Stealer, focusing on the types of data extracted and the broader security implications.
The research can be found here:

Reversing LummaC2 4.0: Updates, Bug Fixes

Reversing Atomic macOS Stealer: Binaries, Backdoors &amp; Browser Theft

How the Threat Actors at SpaxMedia Distribute Malware Globally


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by a Security Researcher from SpyCloud Labs, James, who is discussing their work on "Unpacking Infostealer Malware: What we’ve learned from reverse engineering LummaC2 and Atomic macOS Stealer."  Infostealer malware has become highly prevalent, with SpyCloud tracking over 50 families and finding that 1 in 5 digital identities are at risk.</p><p>This research analyzes the workings and intentions behind infostealers like LummaC2 and Atomic macOS Stealer, focusing on the types of data extracted and the broader security implications.</p><p>The research can be found here:</p><ul>
<li><a href="https://spycloud.com/blog/reversing-lummac2/">Reversing LummaC2 4.0: Updates, Bug Fixes</a></li>
<li><a href="https://spycloud.com/blog/reverse-engineering-atomic-macos-stealer/">Reversing Atomic macOS Stealer: Binaries, Backdoors &amp; Browser Theft</a></li>
<li><a href="https://spycloud.com/blog/spaxmedia-threat-actors-malware-distribution/">How the Threat Actors at SpaxMedia Distribute Malware Globally</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1610</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[200d2360-b6f3-11ee-ae1a-af2f91e8e870]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9220153621.mp3?updated=1718387365" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Riding the hype for new Arc browser.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/333/notes</link>
      <description>Jérôme Segura, Senior Director of Threat Intelligence at Malwarebytes, is discussing their work on "Threat actors ride the hype for newly released Arc browser." The Arc browser, newly released for Windows, has quickly garnered positive reviews but has also attracted cybercriminals who are using deceptive Google search ads to distribute malware disguised as the browser.
These malicious campaigns exploit the hype around Arc, using techniques like embedding malware in image files and utilizing the MEGA cloud platform for command and control, highlighting the need for caution with sponsored search results and the effectiveness of Endpoint Detection and Response (EDR) systems.
The research can be found here:
Threat actors ride the hype for newly released Arc browser

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Jun 2024 05:00:00 -0000</pubDate>
      <itunes:title>Riding the hype for new Arc browser.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>333</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Jérôme Segura, Senior Director of Threat Intelligence at Malwarebytes, is discussing their work on "Threat actors ride the hype for newly released Arc browser." The Arc browser, newly released for Windows, has quickly garnered positive reviews but has also attracted cybercriminals who are using deceptive Google search ads to distribute malware disguised as the browser.
These malicious campaigns exploit the hype around Arc, using techniques like embedding malware in image files and utilizing the MEGA cloud platform for command and control, highlighting the need for caution with sponsored search results and the effectiveness of Endpoint Detection and Response (EDR) systems.
The research can be found here:
Threat actors ride the hype for newly released Arc browser

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jérôme Segura, Senior Director of Threat Intelligence at Malwarebytes, is discussing their work on "Threat actors ride the hype for newly released Arc browser." The Arc browser, newly released for Windows, has quickly garnered positive reviews but has also attracted cybercriminals who are using deceptive Google search ads to distribute malware disguised as the browser.</p><p>These malicious campaigns exploit the hype around Arc, using techniques like embedding malware in image files and utilizing the MEGA cloud platform for command and control, highlighting the need for caution with sponsored search results and the effectiveness of Endpoint Detection and Response (EDR) systems.</p><p>The research can be found here:</p><ul><li><a href="https://www.threatdown.com/blog/threat-actors-ride-the-hype-for-newly-released-arc-browser/">Threat actors ride the hype for newly released Arc browser</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1551</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1fd6d710-b6f3-11ee-ae1a-9f7d43ccb96f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5598009070.mp3?updated=1717782686" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>1700 IPs and counting.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/332/notes</link>
      <description>Amit Malik, Director of Threat Research at Uptycs, is sharing their work on "New Threat Detected: Inside Our Discovery of the Log4j Campaign and Its XMRig Malware." The Uptycs Threat Research Team has discovered a large-scale Log4j campaign involving over 1700 IPs, aiming to deploy XMRig cryptominer malware.
This ongoing operation was initially detected through the team's honeypot collection, prompting an in-depth analysis of the campaign. The research says "The JNDI plugin is particularly useful to attackers because it allows them not only to fetch the values of environment variables in the target system but also to freely define the URL and protocol resource for the JNDI network connection."
The research can be found here:
New Threat Detected: Inside Our Discovery of the Log4j Campaign and Its XMRig Malware

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Jun 2024 05:00:00 -0000</pubDate>
      <itunes:title>1700 IPs and counting.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>332</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Amit Malik, Director of Threat Research at Uptycs, is sharing their work on "New Threat Detected: Inside Our Discovery of the Log4j Campaign and Its XMRig Malware." The Uptycs Threat Research Team has discovered a large-scale Log4j campaign involving over 1700 IPs, aiming to deploy XMRig cryptominer malware.
This ongoing operation was initially detected through the team's honeypot collection, prompting an in-depth analysis of the campaign. The research says "The JNDI plugin is particularly useful to attackers because it allows them not only to fetch the values of environment variables in the target system but also to freely define the URL and protocol resource for the JNDI network connection."
The research can be found here:
New Threat Detected: Inside Our Discovery of the Log4j Campaign and Its XMRig Malware

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Amit Malik, Director of Threat Research at Uptycs, is sharing their work on "New Threat Detected: Inside Our Discovery of the Log4j Campaign and Its XMRig Malware." The Uptycs Threat Research Team has discovered a large-scale Log4j campaign involving over 1700 IPs, aiming to deploy XMRig cryptominer malware.</p><p>This ongoing operation was initially detected through the team's honeypot collection, prompting an in-depth analysis of the campaign. The research says "The JNDI plugin is particularly useful to attackers because it allows them not only to fetch the values of environment variables in the target system but also to freely define the URL and protocol resource for the JNDI network connection."</p><p>The research can be found here:</p><ul><li><a href="https://www.uptycs.com/blog/log4j-campaign-xmrig-malware">New Threat Detected: Inside Our Discovery of the Log4j Campaign and Its XMRig Malware</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>955</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1fa0d980-b6f3-11ee-ae1a-cb97590a7c42]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9200406647.mp3?updated=1717096033" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>International effort dismantles LockBit.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/331/notes</link>
      <description>Jon DiMaggio, a Chief Security Strategist at Analyst1, is sharing his work on "Ransomware Diaries Volume 5: Unmasking LockBit." On February 19, 2024, the National Crime Agency (NCA), a UK sovereign law enforcement agency, in collaboration with the FBI, Europol, and nine other countries under "Operation Cronos," disrupted the LockBit ransomware gang’s data leak site used for shaming, extorting, and leaking victim data.
The NCA greeted visitors to LockBit’s dark web leak site with a seizure banner, revealing they had been controlling LockBit’s infrastructure for some time, collecting information, acquiring victim decryption keys, and even compromising the new ransomware payload intended for LockBit 4.0.
The research can be found here:
Ransomware Diaries Volume 5: Unmasking LockBit

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 May 2024 05:00:00 -0000</pubDate>
      <itunes:title>International effort dismantles LockBit.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>331</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Jon DiMaggio, a Chief Security Strategist at Analyst1, is sharing his work on "Ransomware Diaries Volume 5: Unmasking LockBit." On February 19, 2024, the National Crime Agency (NCA), a UK sovereign law enforcement agency, in collaboration with the FBI, Europol, and nine other countries under "Operation Cronos," disrupted the LockBit ransomware gang’s data leak site used for shaming, extorting, and leaking victim data.
The NCA greeted visitors to LockBit’s dark web leak site with a seizure banner, revealing they had been controlling LockBit’s infrastructure for some time, collecting information, acquiring victim decryption keys, and even compromising the new ransomware payload intended for LockBit 4.0.
The research can be found here:
Ransomware Diaries Volume 5: Unmasking LockBit

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jon DiMaggio, a Chief Security Strategist at Analyst1, is sharing his work on "Ransomware Diaries Volume 5: Unmasking LockBit." On February 19, 2024, the National Crime Agency (NCA), a UK sovereign law enforcement agency, in collaboration with the FBI, Europol, and nine other countries under "Operation Cronos," disrupted the LockBit ransomware gang’s data leak site used for shaming, extorting, and leaking victim data.</p><p>The NCA greeted visitors to LockBit’s dark web leak site with a seizure banner, revealing they had been controlling LockBit’s infrastructure for some time, collecting information, acquiring victim decryption keys, and even compromising the new ransomware payload intended for LockBit 4.0.</p><p>The research can be found here:</p><ul><li><a href="https://analyst1.com/ransomware-diaries-volume-5-unmasking-lockbit-2/">Ransomware Diaries Volume 5: Unmasking LockBit</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1739</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1f6a9c26-b6f3-11ee-ae1a-b3b4b791515e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9953529372.mp3?updated=1716479735" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From secret images to encryption keys.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/330/notes</link>
      <description>This week, we are joined by Hosein Yavarzadeh from the University of California San Diego, as he is discussing his work on "Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor" This paper introduces new methods that let attackers read from and write to specific parts of high-performance CPUs, such as the path history register (PHR) and prediction history tables (PHTs). 
These methods allow two main types of attacks. One can reveal a program's control flow history, as shown by recovering a secret image through the libjpeg routines. The other enables detailed transient attacks, demonstrated by extracting an AES encryption key, highlighting significant security risks for these systems.
The research can be found here:
Graph: Growing number of threats leveraging Microsoft API

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 May 2024 05:00:00 -0000</pubDate>
      <itunes:title>From secret images to encryption keys.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>330</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Hosein Yavarzadeh from the University of California San Diego, as he is discussing his work on "Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor" This paper introduces new methods that let attackers read from and write to specific parts of high-performance CPUs, such as the path history register (PHR) and prediction history tables (PHTs). 
These methods allow two main types of attacks. One can reveal a program's control flow history, as shown by recovering a secret image through the libjpeg routines. The other enables detailed transient attacks, demonstrated by extracting an AES encryption key, highlighting significant security risks for these systems.
The research can be found here:
Graph: Growing number of threats leveraging Microsoft API

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by Hosein Yavarzadeh from the University of California San Diego, as he is discussing his work on "Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor" This paper introduces new methods that let attackers read from and write to specific parts of high-performance CPUs, such as the path history register (PHR) and prediction history tables (PHTs). </p><p>These methods allow two main types of attacks. One can reveal a program's control flow history, as shown by recovering a secret image through the libjpeg routines. The other enables detailed transient attacks, demonstrated by extracting an AES encryption key, highlighting significant security risks for these systems.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/graph-api-threats">Graph: Growing number of threats leveraging Microsoft API</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1214</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1f34a63e-b6f3-11ee-ae1a-5fcaa55bab8c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1451837110.mp3?updated=1715969954" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The double-edged sword of cyber espionage.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/329/notes</link>
      <description>Dick O'Brien from Symantec Threat Hunter team is discussing their research on  “Graph: Growing number of threats leveraging Microsoft API.” The team observed an increasing number of threats that have begun to leverage the Microsoft Graph API, usually to facilitate communications with command-and-control (C&amp;C) infrastructure hosted on Microsoft cloud services. 
The research states "the technique was most recently used in an attack against an organization in Ukraine, where a previously undocumented piece of malware used the Graph API to leverage Microsoft OneDrive for C&amp;C purposes."
The research can be found here:
Graph: Growing number of threats leveraging Microsoft API

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 May 2024 05:00:00 -0000</pubDate>
      <itunes:title>The double-edged sword of cyber espionage.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>329</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Dick O'Brien from Symantec Threat Hunter team is discussing their research on  “Graph: Growing number of threats leveraging Microsoft API.” The team observed an increasing number of threats that have begun to leverage the Microsoft Graph API, usually to facilitate communications with command-and-control (C&amp;C) infrastructure hosted on Microsoft cloud services. 
The research states "the technique was most recently used in an attack against an organization in Ukraine, where a previously undocumented piece of malware used the Graph API to leverage Microsoft OneDrive for C&amp;C purposes."
The research can be found here:
Graph: Growing number of threats leveraging Microsoft API

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dick O'Brien from Symantec Threat Hunter team is discussing their research on  “Graph: Growing number of threats leveraging Microsoft API.” The team observed an increasing number of threats that have begun to leverage the Microsoft Graph API, usually to facilitate communications with command-and-control (C&amp;C) infrastructure hosted on Microsoft cloud services. </p><p>The research states "the technique was most recently used in an attack against an organization in Ukraine, where a previously undocumented piece of malware used the Graph API to leverage Microsoft OneDrive for C&amp;C purposes."</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/graph-api-threats">Graph: Growing number of threats leveraging Microsoft API</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1099</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1efe3f4a-b6f3-11ee-ae1a-079c52156dc5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2099685487.mp3?updated=1715356361" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Geopolitical tensions rise with China. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/328/notes</link>
      <description>Adam Marré, CISO at Arctic Wolf, is diving deep into geopolitical tension with China including APT31, iSoon and TikTok with Dave this week. They also discuss some of the history behind China cyber operations.
Adam shares information on how different APT groups are able to create spear phishing campaigns, and provides info on how to combat these groups.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 May 2024 05:00:00 -0000</pubDate>
      <itunes:title>Geopolitical tensions rise with China. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>328</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Adam Marré, CISO at Arctic Wolf, is diving deep into geopolitical tension with China including APT31, iSoon and TikTok with Dave this week. They also discuss some of the history behind China cyber operations.
Adam shares information on how different APT groups are able to create spear phishing campaigns, and provides info on how to combat these groups.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Adam Marré, CISO at Arctic Wolf, is diving deep into geopolitical tension with China including APT31, iSoon and TikTok with Dave this week. They also discuss some of the history behind China cyber operations.</p><p>Adam shares information on how different APT groups are able to create spear phishing campaigns, and provides info on how to combat these groups.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2002</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b1155f74-097f-11ef-89eb-03327f4d21d1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3029781271.mp3?updated=1714764030" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cerber ransomware strikes Linux.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/327/notes</link>
      <description>Christopher Doman, Co-Founder and CTO at Cado Security, is talking about their research on "Cerber Ransomware: Dissecting the three heads." This research delves into Cerber ransomware being deployed onto servers running the Confluence application via the CVE-2023-22518 exploit. 
The research states "Cerber emerged and was at the peak of its activity around 2016, and has since only occasional campaigns, most recently targeting the aforementioned Confluence vulnerability."
The research can be found here:
Cerber Ransomware: Dissecting the three heads

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>Cerber ransomware strikes Linux.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>327</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Christopher Doman, Co-Founder and CTO at Cado Security, is talking about their research on "Cerber Ransomware: Dissecting the three heads." This research delves into Cerber ransomware being deployed onto servers running the Confluence application via the CVE-2023-22518 exploit. 
The research states "Cerber emerged and was at the peak of its activity around 2016, and has since only occasional campaigns, most recently targeting the aforementioned Confluence vulnerability."
The research can be found here:
Cerber Ransomware: Dissecting the three heads

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Christopher Doman, Co-Founder and CTO at Cado Security, is talking about their research on "Cerber Ransomware: Dissecting the three heads." This research delves into Cerber ransomware being deployed onto servers running the Confluence application via the CVE-2023-22518 exploit. </p><p>The research states "Cerber emerged and was at the peak of its activity around 2016, and has since only occasional campaigns, most recently targeting the aforementioned Confluence vulnerability."</p><p>The research can be found here:</p><ul><li><a href="https://www.cadosecurity.com/blog/cerber-ransomware-dissecting-the-three-heads">Cerber Ransomware: Dissecting the three heads</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>814</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1e91f5f6-b6f3-11ee-ae1a-639df832555b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5537447658.mp3?updated=1714146071" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The art of information gathering. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/326/notes</link>
      <description>Greg Lesnewich, senior threat researcher at Proofpoint, sits down to discuss "From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering." Since 2023, TA427 has directly solicited foreign policy experts for their opinions on nuclear disarmament, US-ROK policies, and sanction topics via benign conversation starting emails. 
The research states "While our researchers have consistently observed TA427 rely on social engineering tactics and regularly rotating its email infrastructure, in December 2023 the threat actor began to abuse lax Domain-based Message Authentication, Reporting and Conformance (DMARC) policies to spoof various personas and, in February 2024, began incorporating web beacons for target profiling."
The research can be found here:
From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>The art of information gathering. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>326</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Greg Lesnewich, senior threat researcher at Proofpoint, sits down to discuss "From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering." Since 2023, TA427 has directly solicited foreign policy experts for their opinions on nuclear disarmament, US-ROK policies, and sanction topics via benign conversation starting emails. 
The research states "While our researchers have consistently observed TA427 rely on social engineering tactics and regularly rotating its email infrastructure, in December 2023 the threat actor began to abuse lax Domain-based Message Authentication, Reporting and Conformance (DMARC) policies to spoof various personas and, in February 2024, began incorporating web beacons for target profiling."
The research can be found here:
From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Greg Lesnewich, senior threat researcher at Proofpoint, sits down to discuss "From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering." Since 2023, TA427 has directly solicited foreign policy experts for their opinions on nuclear disarmament, US-ROK policies, and sanction topics via benign conversation starting emails. </p><p>The research states "While our researchers have consistently observed TA427 rely on social engineering tactics and regularly rotating its email infrastructure, in December 2023 the threat actor began to abuse lax Domain-based Message Authentication, Reporting and Conformance (DMARC) policies to spoof various personas and, in February 2024, began incorporating web beacons for target profiling."</p><p>The research can be found here:</p><ul><li><a href="https://www.proofpoint.com/us/blog/threat-insight/social-engineering-dmarc-abuse-ta427s-art-information-gathering">From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1788</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1e5bd494-b6f3-11ee-ae1a-e72317e6f117]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9013097996.mp3?updated=1713555322" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Breaking down a high-severity vulnerability in Kubernetes.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/325/notes</link>
      <description>Tomer Peled, a Security &amp; Vulnerability Researcher from Akamai is sharing their work on "What a Cluster: Local Volumes Vulnerability in Kubernetes." This research focuses on a high-severity vulnerability in Kubernetes, allowing for remote code execution with system privileges on all Windows endpoints within a Kubernetes cluster.
The research states "The discovery of this vulnerability led to the discovery of two others that share the same root cause: insecure function call and lack of user input sanitization."
The research can be found here:
What a Cluster: Local Volumes Vulnerability in Kubernetes

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>Breaking down a high-severity vulnerability in Kubernetes.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>325</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Tomer Peled, a Security &amp; Vulnerability Researcher from Akamai is sharing their work on "What a Cluster: Local Volumes Vulnerability in Kubernetes." This research focuses on a high-severity vulnerability in Kubernetes, allowing for remote code execution with system privileges on all Windows endpoints within a Kubernetes cluster.
The research states "The discovery of this vulnerability led to the discovery of two others that share the same root cause: insecure function call and lack of user input sanitization."
The research can be found here:
What a Cluster: Local Volumes Vulnerability in Kubernetes

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tomer Peled, a Security &amp; Vulnerability Researcher from Akamai is sharing their work on "What a Cluster: Local Volumes Vulnerability in Kubernetes." This research focuses on a high-severity vulnerability in Kubernetes, allowing for remote code execution with system privileges on all Windows endpoints within a Kubernetes cluster.</p><p>The research states "The discovery of this vulnerability led to the discovery of two others that share the same root cause: insecure function call and lack of user input sanitization."</p><p>The research can be found here:</p><ul><li><a href="https://www.akamai.com/blog/security-research/kubernetes-local-volumes-command-injection-vulnerability-rce-system-privileges">What a Cluster: Local Volumes Vulnerability in Kubernetes</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>825</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1e25f694-b6f3-11ee-ae1a-33759f2246b8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3403104409.mp3?updated=1713190276" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leaking your AWS API keys, on purpose?</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/324/notes</link>
      <description>Noah Pack, a SANS Internet Storm Center Intern, sits down to discuss research on "What happens when you accidentally leak your AWS API keys?" This research is a guest diary from Noah and shares a project he worked on after seeing an online video of someone who created a python script that emailed colleges asking for free swag to be shipped to him. 
The research states "In this article, I will share some research, resources, and real-world data related to leaked AWS API keys." In this research, Noah shares what he learned while implementing his experiment. 
The research can be found here:
What happens when you accidentally leak your AWS API keys? [Guest Diary]

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>Leaking your AWS API keys, on purpose?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>324</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Noah Pack, a SANS Internet Storm Center Intern, sits down to discuss research on "What happens when you accidentally leak your AWS API keys?" This research is a guest diary from Noah and shares a project he worked on after seeing an online video of someone who created a python script that emailed colleges asking for free swag to be shipped to him. 
The research states "In this article, I will share some research, resources, and real-world data related to leaked AWS API keys." In this research, Noah shares what he learned while implementing his experiment. 
The research can be found here:
What happens when you accidentally leak your AWS API keys? [Guest Diary]

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Noah Pack, a SANS Internet Storm Center Intern, sits down to discuss research on "What happens when you accidentally leak your AWS API keys?" This research is a guest diary from Noah and shares a project he worked on after seeing an online video of someone who created a python script that emailed colleges asking for free swag to be shipped to him. </p><p>The research states "In this article, I will share some research, resources, and real-world data related to leaked AWS API keys." In this research, Noah shares what he learned while implementing his experiment. </p><p>The research can be found here:</p><ul><li><a href="https://isc.sans.edu/diary/What+happens+when+you+accidentally+leak+your+AWS+API+keys+Guest+Diary/30730">What happens when you accidentally leak your AWS API keys? [Guest Diary]</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1470</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1dea4072-b6f3-11ee-ae1a-af253f8663a7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1032529445.mp3?updated=1712345834" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The supply chain in disarray.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/323/notes</link>
      <description>Elad, a Senior Security Researcher from Cycode is sharing their research on "Cycode Discovers a Supply Chain Vulnerability in Bazel." This security flaw could let hackers inject harmful code, potentially affecting millions of projects and users, including Kubernetes, Angular, Uber, LinkedIn, Databricks, DropBox, Nvidia, Google, and many more. 
The research states "We reported the vulnerability to Google via its Vulnerability Reward Program, where they acknowledged our discovery and proceeded to address and fix the vulnerable components." 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
The research can be found here: 
Cycode Discovers a Supply Chain Vulnerability in Bazel

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Mar 2024 04:00:00 -0000</pubDate>
      <itunes:title>The supply chain in disarray.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>323</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Elad, a Senior Security Researcher from Cycode is sharing their research on "Cycode Discovers a Supply Chain Vulnerability in Bazel." This security flaw could let hackers inject harmful code, potentially affecting millions of projects and users, including Kubernetes, Angular, Uber, LinkedIn, Databricks, DropBox, Nvidia, Google, and many more. 
The research states "We reported the vulnerability to Google via its Vulnerability Reward Program, where they acknowledged our discovery and proceeded to address and fix the vulnerable components." 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
The research can be found here: 
Cycode Discovers a Supply Chain Vulnerability in Bazel

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Elad, a Senior Security Researcher from Cycode is sharing their research on "Cycode Discovers a Supply Chain Vulnerability in Bazel." This security flaw could let hackers inject harmful code, potentially affecting millions of projects and users, including Kubernetes, Angular, Uber, LinkedIn, Databricks, DropBox, Nvidia, Google, and many more. </p><p>The research states "We reported the vulnerability to Google via its Vulnerability Reward Program, where they acknowledged our discovery and proceeded to address and fix the vulnerable components." </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em></p><p>The research can be found here: </p><ul><li><a href="https://cycode.com/blog/cycode-discovers-a-supply-chain-vulnerability-in-bazel/">Cycode Discovers a Supply Chain Vulnerability in Bazel</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1076</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1db409e4-b6f3-11ee-ae1a-e327fd975763]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4698645263.mp3?updated=1711736097" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>HijackLoader unleashed: Evolving threats and sneaky tactics.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/322/notes</link>
      <description>Liviu Arsene from CrowdStrike joins to discuss their research "HijackLoader Expands Techniques to Improve Defense Evasion." The research has found that HijackLoader continues to become increasingly popular among adversaries for deploying additional payloads and tooling.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. Researchers state "this new approach has the potential to make defense evasion stealthier."
Please take a moment to fill out an audience survey! Let us know how we are doing! 
The research can be found here: 
HijackLoader Expands Techniques to Improve Defense Evasion

And be sure to join our live webinar: CISOs are the new Architects (of the Workforce)
Join N2K’s Simone Petrella and Intuit’s Kim Jones on Wednesday, March 27th for an online discussion about the pivotal role security leaders play in shaping the security workforce landscape, and how we can start showing up for the future of our industry. Learn more and register on the event page.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Mar 2024 05:00:00 -0000</pubDate>
      <itunes:title>HijackLoader unleashed: Evolving threats and sneaky tactics.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>322</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Liviu Arsene from CrowdStrike joins to discuss their research "HijackLoader Expands Techniques to Improve Defense Evasion." The research has found that HijackLoader continues to become increasingly popular among adversaries for deploying additional payloads and tooling.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. Researchers state "this new approach has the potential to make defense evasion stealthier."
Please take a moment to fill out an audience survey! Let us know how we are doing! 
The research can be found here: 
HijackLoader Expands Techniques to Improve Defense Evasion

And be sure to join our live webinar: CISOs are the new Architects (of the Workforce)
Join N2K’s Simone Petrella and Intuit’s Kim Jones on Wednesday, March 27th for an online discussion about the pivotal role security leaders play in shaping the security workforce landscape, and how we can start showing up for the future of our industry. Learn more and register on the event page.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Liviu Arsene from CrowdStrike joins to discuss their research "HijackLoader Expands Techniques to Improve Defense Evasion." The research has found that HijackLoader continues to become increasingly popular among adversaries for deploying additional payloads and tooling.</p><p>In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. Researchers state "this new approach has the potential to make defense evasion stealthier."</p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em></p><p>The research can be found here: </p><ul><li><a href="https://www.crowdstrike.com/blog/hijackloader-expands-techniques/">HijackLoader Expands Techniques to Improve Defense Evasion</a></li></ul><p><br></p><p><strong>And be sure to join our live webinar: CISOs are the new Architects (of the Workforce)</strong></p><p>Join N2K’s Simone Petrella and Intuit’s Kim Jones on Wednesday, March 27th for an online discussion about the pivotal role security leaders play in shaping the security workforce landscape, and how we can start showing up for the future of our industry. Learn more and register on the <a href="https://www.brighttalk.com/webcast/18820/607438?bt_tok=%7B%7Brecord.BT_fastpass_token%7D%7D&amp;utm_source=N2KNetworks&amp;utm_medium=brighttalk&amp;utm_campaign=607438">event page</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1333</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1d7e0420-b6f3-11ee-ae1a-fb30f492ca69]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6681596053.mp3?updated=1711134352" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Inside SendGrid's phishy business.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/321/notes</link>
      <description>Robert Duncan from Netcraft is sharing their research on "Phishception - SendGrid abused to host phishing attacks impersonating itself." Netcraft has recently observed that criminals abused Twilio SendGrid’s email delivery, API, and marketing services to launch a phishing campaign impersonating itself. 
Hackers behind this novel phishing campaign used SendGrid’s Tracking Settings feature, which allows users to track clicks, opens, and subscriptions with SendGrid. The malicious link was masked behind a tracking link hosted by SendGrid. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
The research can be found here: 
Phishception – SendGrid is abused to host phishing attacks impersonating itself

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Mar 2024 05:00:00 -0000</pubDate>
      <itunes:title>Inside SendGrid's phishy business.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>321</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Robert Duncan from Netcraft is sharing their research on "Phishception - SendGrid abused to host phishing attacks impersonating itself." Netcraft has recently observed that criminals abused Twilio SendGrid’s email delivery, API, and marketing services to launch a phishing campaign impersonating itself. 
Hackers behind this novel phishing campaign used SendGrid’s Tracking Settings feature, which allows users to track clicks, opens, and subscriptions with SendGrid. The malicious link was masked behind a tracking link hosted by SendGrid. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
The research can be found here: 
Phishception – SendGrid is abused to host phishing attacks impersonating itself

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Robert Duncan from Netcraft is sharing their research on "Phishception - SendGrid abused to host phishing attacks impersonating itself." Netcraft has recently observed that criminals abused Twilio SendGrid’s email delivery, API, and marketing services to launch a phishing campaign impersonating itself. </p><p>Hackers behind this novel phishing campaign used SendGrid’s Tracking Settings feature, which allows users to track clicks, opens, and subscriptions with SendGrid. The malicious link was masked behind a tracking link hosted by SendGrid. </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em></p><p>The research can be found here: </p><ul><li><a href="https://www.netcraft.com/blog/popular-email-platform-used-to-impersonate-itself/">Phishception – SendGrid is abused to host phishing attacks impersonating itself</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1795</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1d4848bc-b6f3-11ee-ae1a-87e5c4375727]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4164617309.mp3?updated=1710533409" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Understanding the multi-tiered impact of ransomware.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/320/notes</link>
      <description>This week we are joined by Jamie MacColl and Dr. Pia Hüsch from RUSI discussing their work on "Ransomware: Victim Insights on Harms to Individuals, Organisations and Society." The research reveals some of the harms caused by ransomware, including physical, financial, reputational, psychological and social harms.
Researchers state "Based on interviews with victims and incident responders, this paper outlines the harm ransomware causes to organisations, individuals, the UK economy, national security and wider society." 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
The research can be found here: 
Ransomware: Victim Insights on Harms to Individuals, Organisations and Society

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Mar 2024 06:00:00 -0000</pubDate>
      <itunes:title>Understanding the multi-tiered impact of ransomware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>320</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by Jamie MacColl and Dr. Pia Hüsch from RUSI discussing their work on "Ransomware: Victim Insights on Harms to Individuals, Organisations and Society." The research reveals some of the harms caused by ransomware, including physical, financial, reputational, psychological and social harms.
Researchers state "Based on interviews with victims and incident responders, this paper outlines the harm ransomware causes to organisations, individuals, the UK economy, national security and wider society." 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
The research can be found here: 
Ransomware: Victim Insights on Harms to Individuals, Organisations and Society

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by Jamie MacColl and Dr. Pia Hüsch from RUSI discussing their work on "Ransomware: Victim Insights on Harms to Individuals, Organisations and Society." The research reveals some of the harms caused by ransomware, including physical, financial, reputational, psychological and social harms.</p><p>Researchers state "Based on interviews with victims and incident responders, this paper outlines the harm ransomware causes to organisations, individuals, the UK economy, national security and wider society." </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em></p><p>The research can be found here: </p><ul><li><a href="https://www.rusi.org/explore-our-research/publications/occasional-papers/ransomware-victim-insights-harms-individuals-organisations-and-society">Ransomware: Victim Insights on Harms to Individuals, Organisations and Society</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1255</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1d134176-b6f3-11ee-ae1a-bfc32fe41ba8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3734361190.mp3?updated=1710172669" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The return of a malware menace.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/319/notes</link>
      <description>This week we are joined by, Selena Larson from Proofpoint, who is discussing their research, "Bumblebee Buzzes Back in Black." Bumblebee is a sophisticated downloader used by multiple cybercriminal threat actors and was a favored payload from its first appearance in March 2022 through October 2023 before disappearing.
After a four month hiatus, Proofpoint researchers found that the downloader returned. Its return aligns with a surge of cybercriminal threat activity after a notable absence of many threat actors and malware. 
The research can be found here: 

Bumblebee Buzzes Back in Black 

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Mar 2024 06:00:00 -0000</pubDate>
      <itunes:title>The return of a malware menace.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>319</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by, Selena Larson from Proofpoint, who is discussing their research, "Bumblebee Buzzes Back in Black." Bumblebee is a sophisticated downloader used by multiple cybercriminal threat actors and was a favored payload from its first appearance in March 2022 through October 2023 before disappearing.
After a four month hiatus, Proofpoint researchers found that the downloader returned. Its return aligns with a surge of cybercriminal threat activity after a notable absence of many threat actors and malware. 
The research can be found here: 

Bumblebee Buzzes Back in Black 

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by, Selena Larson from Proofpoint, who is discussing their research, "Bumblebee Buzzes Back in Black." Bumblebee is a sophisticated downloader used by multiple cybercriminal threat actors and was a favored payload from its first appearance in March 2022 through October 2023 before disappearing.</p><p>After a four month hiatus, Proofpoint researchers found that the downloader returned. Its return aligns with a surge of cybercriminal threat activity after a notable absence of many threat actors and malware. </p><p>The research can be found here: </p><ul><li>
<a href="https://www.proofpoint.com/us/blog/threat-insight/bumblebee-buzzes-back-black">Bumblebee Buzzes Back in Black</a> </li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1148</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1cdd3054-b6f3-11ee-ae1a-7b366aea9909]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2565615645.mp3?updated=1709311213" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Web host havoc: Unveiling the Manic Menagerie campaign.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/318/notes</link>
      <description>Assaf Dahan and Daniel Frank from Palo Alto Networks Cortex sit down with Dave to talk about their research "Manic Menagerie 2.0: The Evolution of a Highly Motivated Threat Actor." From late 2020 to late 2022, Unit 42 researchers discovered an active campaign that targeted several web hosting and IT providers in the United States and European Union.
The research states "They have further deepened their foothold in victims’ environments by mass deployment of web shells, which granted them sustained access, as well as access to internal resources of the compromised websites."
The research can be found here: 
Manic Menagerie 2.0: The Evolution of a Highly Motivated Threat Actor

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Feb 2024 06:00:00 -0000</pubDate>
      <itunes:title>Web host havoc: Unveiling the Manic Menagerie campaign.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>318</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Assaf Dahan and Daniel Frank from Palo Alto Networks Cortex sit down with Dave to talk about their research "Manic Menagerie 2.0: The Evolution of a Highly Motivated Threat Actor." From late 2020 to late 2022, Unit 42 researchers discovered an active campaign that targeted several web hosting and IT providers in the United States and European Union.
The research states "They have further deepened their foothold in victims’ environments by mass deployment of web shells, which granted them sustained access, as well as access to internal resources of the compromised websites."
The research can be found here: 
Manic Menagerie 2.0: The Evolution of a Highly Motivated Threat Actor

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Assaf Dahan and Daniel Frank from Palo Alto Networks Cortex sit down with Dave to talk about their research "Manic Menagerie 2.0: The Evolution of a Highly Motivated Threat Actor." From late 2020 to late 2022, Unit 42 researchers discovered an active campaign that targeted several web hosting and IT providers in the United States and European Union.</p><p>The research states "They have further deepened their foothold in victims’ environments by mass deployment of web shells, which granted them sustained access, as well as access to internal resources of the compromised websites."</p><p>The research can be found here: </p><ul><li><a href="https://unit42.paloaltonetworks.com/manic-menagerie-targets-web-hosting-and-it/">Manic Menagerie 2.0: The Evolution of a Highly Motivated Threat Actor</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1305</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1ca74fd4-b6f3-11ee-ae1a-cb226ecf340d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2171604383.mp3?updated=1708715286" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hackers come hopping back.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/317/notes</link>
      <description>Ori David from Akamai is sharing their research "Frog4Shell — FritzFrog Botnet Adds One-Days to Its Arsenal." FritzFrog takes advantage of the fact that only internet facing applications were prioritized for Log4Shell patching and targets internal hosts, meaning that a breach of any asset in the network by FritzFrog can expose unpatched internal assets to exploitation. 
The research states "FritzFrog has traditionally hopped around by using SSH brute force, and has successfully compromised thousands of targets over the years as a result." Over the years Akamai has seen more than 20,000 FritzFrog attacks, and 1,500+ victims. 
The research can be found here: 
Frog4Shell — FritzFrog Botnet Adds One-Days to Its Arsenal

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Feb 2024 06:00:00 -0000</pubDate>
      <itunes:title>Hackers come hopping back.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>317</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Ori David from Akamai is sharing their research "Frog4Shell — FritzFrog Botnet Adds One-Days to Its Arsenal." FritzFrog takes advantage of the fact that only internet facing applications were prioritized for Log4Shell patching and targets internal hosts, meaning that a breach of any asset in the network by FritzFrog can expose unpatched internal assets to exploitation. 
The research states "FritzFrog has traditionally hopped around by using SSH brute force, and has successfully compromised thousands of targets over the years as a result." Over the years Akamai has seen more than 20,000 FritzFrog attacks, and 1,500+ victims. 
The research can be found here: 
Frog4Shell — FritzFrog Botnet Adds One-Days to Its Arsenal

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ori David from Akamai is sharing their research "Frog4Shell — FritzFrog Botnet Adds One-Days to Its Arsenal." FritzFrog takes advantage of the fact that only internet facing applications were prioritized for Log4Shell patching and targets internal hosts, meaning that a breach of any asset in the network by FritzFrog can expose unpatched internal assets to exploitation. </p><p>The research states "FritzFrog has traditionally hopped around by using SSH brute force, and has successfully compromised thousands of targets over the years as a result." Over the years Akamai has seen more than 20,000 FritzFrog attacks, and 1,500+ victims. </p><p>The research can be found here: </p><ul><li><a href="https://www.akamai.com/blog/security-research/fritzfrog-botnet-new-capabilities-log4shell">Frog4Shell — FritzFrog Botnet Adds One-Days to Its Arsenal</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1096</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1c71634c-b6f3-11ee-ae1a-5b1260d95544]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2472654204.mp3?updated=1708097659" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware is coming. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/316/notes</link>
      <description>Jon DiMaggio, Chief Security Strategist for Analyst1, is discussing his research on "Ransomware Diaries Volume 4: Ransomed and Exposed - The Story of RansomedVC." While there is evidence to support that RansomedVC runs cybercrime operations, Jon questions the claims it made regarding the authenticity of the data it stole and the methods it used to extort victims.
The research states "I uncovered sensitive information about the group's leader, Ransomed Support (also known as Impotent), relating to secrets from his past." In this episode John shares his 6 key findings after spending months engaging with the lead criminal who runs RansomedVC. 
The research can be found here: 
Ransomware Diaries Volume 4: Ransomed and Exposed - The Story of RansomedVC

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Feb 2024 06:00:00 -0000</pubDate>
      <itunes:title>Ransomware is coming. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>316</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Jon DiMaggio, Chief Security Strategist for Analyst1, is discussing his research on "Ransomware Diaries Volume 4: Ransomed and Exposed - The Story of RansomedVC." While there is evidence to support that RansomedVC runs cybercrime operations, Jon questions the claims it made regarding the authenticity of the data it stole and the methods it used to extort victims.
The research states "I uncovered sensitive information about the group's leader, Ransomed Support (also known as Impotent), relating to secrets from his past." In this episode John shares his 6 key findings after spending months engaging with the lead criminal who runs RansomedVC. 
The research can be found here: 
Ransomware Diaries Volume 4: Ransomed and Exposed - The Story of RansomedVC

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jon DiMaggio, Chief Security Strategist for Analyst1, is discussing his research on "Ransomware Diaries Volume 4: Ransomed and Exposed - The Story of RansomedVC." While there is evidence to support that RansomedVC runs cybercrime operations, Jon questions the claims it made regarding the authenticity of the data it stole and the methods it used to extort victims.</p><p>The research states "I uncovered sensitive information about the group's leader, Ransomed Support (also known as Impotent), relating to secrets from his past." In this episode John shares his 6 key findings after spending months engaging with the lead criminal who runs RansomedVC. </p><p>The research can be found here: </p><ul><li><a href="https://analyst1.com/ransomware-diaries-volume-4/">Ransomware Diaries Volume 4: Ransomed and Exposed - The Story of RansomedVC</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1728</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1c057c2c-b6f3-11ee-ae1a-f32902ab4d53]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9972539270.mp3?updated=1707505693" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Weathering the internet storm.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/315/notes</link>
      <description>Johannes Ullrich from SANS talking about the Internet Storm Center and how they do research. Internet Storm Center was created as a mix of manual reports submitted by security analysts during Y2K and automated firewall collection started by DShield.
The research shares how SANS used their "agile honeypots" to "zoom in" on events to more effectively collect data targeting specific vulnerabilities. Internet Storm Center has been noted on three separate attacks that were observed. 
The research can be found here: 

Jenkins Brute Force Scans

Scans for Ivanti Connect "Secure" VPN Vulnerability (CVE-2023-46805, CVE-2024-21887)

Scans/Exploit Attempts for Atlassian Confluence RCE Vulnerability CVE-2023-22527


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Feb 2024 06:00:00 -0000</pubDate>
      <itunes:title>Weathering the internet storm.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>315</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Johannes Ullrich from SANS talking about the Internet Storm Center and how they do research. Internet Storm Center was created as a mix of manual reports submitted by security analysts during Y2K and automated firewall collection started by DShield.
The research shares how SANS used their "agile honeypots" to "zoom in" on events to more effectively collect data targeting specific vulnerabilities. Internet Storm Center has been noted on three separate attacks that were observed. 
The research can be found here: 

Jenkins Brute Force Scans

Scans for Ivanti Connect "Secure" VPN Vulnerability (CVE-2023-46805, CVE-2024-21887)

Scans/Exploit Attempts for Atlassian Confluence RCE Vulnerability CVE-2023-22527


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Johannes Ullrich from SANS talking about the Internet Storm Center and how they do research. Internet Storm Center was created as a mix of manual reports submitted by security analysts during Y2K and automated firewall collection started by DShield.</p><p>The research shares how SANS used their "agile honeypots" to "zoom in" on events to more effectively collect data targeting specific vulnerabilities. Internet Storm Center has been noted on three separate attacks that were observed. </p><p>The research can be found here: </p><ul>
<li><a href="https://isc.sans.edu/diary/Jenkins+Brute+Force+Scans/30546/">Jenkins Brute Force Scans</a></li>
<li><a href="https://isc.sans.edu/diary/Scans+for+Ivanti+Connect+Secure+VPN+Vulnerability+CVE202346805+CVE202421887/30562/">Scans for Ivanti Connect "Secure" VPN Vulnerability (CVE-2023-46805, CVE-2024-21887)</a></li>
<li><a href="https://isc.sans.edu/diary/Scans%20Exploit%20Attempts%20for%20Atlassian%20Confluence%20RCE%20Vulnerability%20CVE-2023-22527/30576">Scans/Exploit Attempts for Atlassian Confluence RCE Vulnerability CVE-2023-22527</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1417</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1c3b4c9e-b6f3-11ee-ae1a-3b7e6a06f312]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8835604972.mp3?updated=1706898347" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hooked on pirated macOS applications.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/314/notes</link>
      <description>Jaron Bradley from Jamf Threat Labs is sharing their work on "Jamf Threat Labs discovers new malware embedded in pirated applications." Jamf Threat Labs has detected a series of pirated macOS applications that have been modified to communicate to attacker infrastructure.
The research states "These applications are being hosted on Chinese pirating websites in order to gain victims." The discovery marks new and advanced malware, similar to the ZuRu malware, first discovered by Objective-See in 2021 within the iTerm2 application.
The research can be found here: 
Jamf Threat Labs discovers new malware embedded in pirated applications

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Jan 2024 06:00:00 -0000</pubDate>
      <itunes:title>Hooked on pirated macOS applications.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>314</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Jaron Bradley from Jamf Threat Labs is sharing their work on "Jamf Threat Labs discovers new malware embedded in pirated applications." Jamf Threat Labs has detected a series of pirated macOS applications that have been modified to communicate to attacker infrastructure.
The research states "These applications are being hosted on Chinese pirating websites in order to gain victims." The discovery marks new and advanced malware, similar to the ZuRu malware, first discovered by Objective-See in 2021 within the iTerm2 application.
The research can be found here: 
Jamf Threat Labs discovers new malware embedded in pirated applications

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jaron Bradley from Jamf Threat Labs is sharing their work on "Jamf Threat Labs discovers new malware embedded in pirated applications." Jamf Threat Labs has detected a series of pirated macOS applications that have been modified to communicate to attacker infrastructure.</p><p>The research states "These applications are being hosted on Chinese pirating websites in order to gain victims." The discovery marks new and advanced malware, similar to the ZuRu malware, first discovered by Objective-See in 2021 within the iTerm2 application.</p><p>The research can be found here: </p><ul><li><a href="https://www.jamf.com/blog/jtl-malware-pirated-applications/">Jamf Threat Labs discovers new malware embedded in pirated applications</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1260</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1bcf002a-b6f3-11ee-ae1a-07ced45d01d2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3406686211.mp3?updated=1706283723" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A firewall wake up call.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/313/notes</link>
      <description>Jon Williams from Bishop Fox is sharing their research on "It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable." SonicWall published advisories for CVE-2022-22274 and CVE-2023-0656 a year apart after finding that NGFW series 6 and 7 devices are affected by two unauthenticated denial-of-service vulnerabilities.
The research states "Our research found that the two issues are fundamentally the same but exploitable at different HTTP URI paths due to reuse of a vulnerable code pattern." They also found that when they scanned SonicWall firewalls with management interfaces exposed to the internet, they found that 76% are vulnerable to one or both issues.
The research can be found here: 
It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Jan 2024 06:00:00 -0000</pubDate>
      <itunes:title>A firewall wake up call.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>313</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Jon Williams from Bishop Fox is sharing their research on "It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable." SonicWall published advisories for CVE-2022-22274 and CVE-2023-0656 a year apart after finding that NGFW series 6 and 7 devices are affected by two unauthenticated denial-of-service vulnerabilities.
The research states "Our research found that the two issues are fundamentally the same but exploitable at different HTTP URI paths due to reuse of a vulnerable code pattern." They also found that when they scanned SonicWall firewalls with management interfaces exposed to the internet, they found that 76% are vulnerable to one or both issues.
The research can be found here: 
It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jon Williams from Bishop Fox is sharing their research on "It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable." SonicWall published advisories for CVE-2022-22274 and CVE-2023-0656 a year apart after finding that NGFW series 6 and 7 devices are affected by two unauthenticated denial-of-service vulnerabilities.</p><p>The research states "Our research found that the two issues are fundamentally the same but exploitable at different HTTP URI paths due to reuse of a vulnerable code pattern." They also found that when they scanned SonicWall firewalls with management interfaces exposed to the internet, they found that 76% are vulnerable to one or both issues.</p><p>The research can be found here: </p><ul><li><a href="https://bishopfox.com/blog/its-2024-and-over-178-000-sonicwall-firewalls-are-publicly-exploitable">It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1261</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1b94f3b2-b6f3-11ee-ae1a-9fdbcde31a0a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6583781701.mp3?updated=1705694985" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dual Russian cyber gangs hit 23 companies.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/312/notes</link>
      <description>Ryan Westman, Senior Manager, Threat Intelligence, eSentire's Threat Response Unit (TRU), is discussing their research "Two Russian-speaking cyber gangs attack employees from 23 different companies." They are using malicious Google ads, promoting popular business software such as Zoom, Slack, and Adobe.
The customers targeted are companies in the manufacturing, software, legal, retail and healthcare industries. The attacking threat actors belong to the Russian-speaking Malware-as-a-Service (MaaS) groups called BatLoader and FakeBat.
The research can be found here: 
Two Competing, Russian-Speaking Cybercrime Groups Attack Employees from 23 Companies in the Manufacturing, Software, Legal, Retail, and Healthcare Sectors Using Malicious Google Ads

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Jan 2024 06:00:00 -0000</pubDate>
      <itunes:title>Dual Russian cyber gangs hit 23 companies.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>312</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ryan Westman, Senior Manager, Threat Intelligence, eSentire's Threat Response Unit (TRU), is discussing their research "Two Russian-speaking cyber gangs attack employees from 23 different companies." They are using malicious Google ads, promoting popular business software such as Zoom, Slack, and Adobe.
The customers targeted are companies in the manufacturing, software, legal, retail and healthcare industries. The attacking threat actors belong to the Russian-speaking Malware-as-a-Service (MaaS) groups called BatLoader and FakeBat.
The research can be found here: 
Two Competing, Russian-Speaking Cybercrime Groups Attack Employees from 23 Companies in the Manufacturing, Software, Legal, Retail, and Healthcare Sectors Using Malicious Google Ads

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ryan Westman, Senior Manager, Threat Intelligence, eSentire's Threat Response Unit (TRU), is discussing their research "Two Russian-speaking cyber gangs attack employees from 23 different companies." They are using malicious Google ads, promoting popular business software such as Zoom, Slack, and Adobe.</p><p>The customers targeted are companies in the manufacturing, software, legal, retail and healthcare industries. The attacking threat actors belong to the Russian-speaking Malware-as-a-Service (MaaS) groups called BatLoader and FakeBat.</p><p>The research can be found here: </p><ul><li><a href="https://www.esentire.com/resources/library/two-competing-russian-speaking-cybercrime-groups-attack">Two Competing, Russian-Speaking Cybercrime Groups Attack Employees from 23 Companies in the Manufacturing, Software, Legal, Retail, and Healthcare Sectors Using Malicious Google Ads</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1018</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cc77084a-b17c-11ee-a1b3-c766875f3ad1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7409759052.mp3?updated=1705091943" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Diving deep into Phobos ransomware.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/311/notes</link>
      <description>Guilherme Venere from Cisco Talos joins to discuss their research on "A deep dive into Phobos ransomware, recently deployed by 8Base group." Cisco Talos discovered that 8Base’s Phobos ransomware payload contains an embedded configuration, which is a significant difference between 8Base’s Phobos variant and other Phobos samples that have been observed in the wild since 2019. 
In this 2-part research series, Talos conducts a deep dive into the Phobos ransomware, including its affiliate structure, activity and capabilities, as well as the one private key that could enable decryption of all the samples analyzed. 
The research can be found here: 







A deep dive into Phobos ransomware, recently deployed by 8Base group







Understanding the Phobos affiliate structure and activity








Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Jan 2024 06:00:00 -0000</pubDate>
      <itunes:title>Diving deep into Phobos ransomware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>311</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guilherme Venere from Cisco Talos joins to discuss their research on "A deep dive into Phobos ransomware, recently deployed by 8Base group." Cisco Talos discovered that 8Base’s Phobos ransomware payload contains an embedded configuration, which is a significant difference between 8Base’s Phobos variant and other Phobos samples that have been observed in the wild since 2019. 
In this 2-part research series, Talos conducts a deep dive into the Phobos ransomware, including its affiliate structure, activity and capabilities, as well as the one private key that could enable decryption of all the samples analyzed. 
The research can be found here: 







A deep dive into Phobos ransomware, recently deployed by 8Base group







Understanding the Phobos affiliate structure and activity








Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guilherme Venere from Cisco Talos joins to discuss their research on "A deep dive into Phobos ransomware, recently deployed by 8Base group." Cisco Talos discovered that 8Base’s Phobos ransomware payload contains an embedded configuration, which is a significant difference between 8Base’s Phobos variant and other Phobos samples that have been observed in the wild since 2019. </p><p>In this 2-part research series, Talos conducts a deep dive into the Phobos ransomware, including its affiliate structure, activity and capabilities, as well as the one private key that could enable decryption of all the samples analyzed. </p><p>The research can be found here: </p><ul>
<li><br></li>
<li><br></li>
<li><br></li>
<li><a href="https://blog.talosintelligence.com/deep-dive-into-phobos-ransomware/">A deep dive into Phobos ransomware, recently deployed by 8Base group</a></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><a href="https://blog.talosintelligence.com/understanding-the-phobos-affiliate-structure/">Understanding the Phobos affiliate structure and activity</a></li>
<li><br></li>
<li><br></li>
<li><br></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1325</itunes:duration>
      <guid isPermaLink="false"><![CDATA[92279596-abf6-11ee-b2ce-cb6f2afc535d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6654494452.mp3?updated=1704491130" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: What malicious campaign is lurking under the surface?</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/243/notes</link>
      <description>Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the DOJ on the investigation into the malicious campaign.
The research states, "For years, the campaign had operated undetected, siphoning intellectual property and sensitive data." The team quickly made two reports on the campaign, one sharing an examination on the tactics and techniques. The second gives a detailed analysis of the malware and exploits used.
The research can be found here:
Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Dec 2023 06:00:00 -0000</pubDate>
      <itunes:title>Encore: What malicious campaign is lurking under the surface?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>243</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the DOJ on the investigation into the malicious campaign.
The research states, "For years, the campaign had operated undetected, siphoning intellectual property and sensitive data." The team quickly made two reports on the campaign, one sharing an examination on the tactics and techniques. The second gives a detailed analysis of the malware and exploits used.
The research can be found here:
Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the DOJ on the investigation into the malicious campaign.</p><p>The research states, "For years, the campaign had operated undetected, siphoning intellectual property and sensitive data." The team quickly made two reports on the campaign, one sharing an examination on the tactics and techniques. The second gives a detailed analysis of the malware and exploits used.</p><p>The research can be found here:</p><ul><li><a href="https://www.cybereason.com/blog/operation-cuckoobees-cybereason-uncovers-massive-chinese-intellectual-property-theft-operation">Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1293</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7028ab4a-8165-11ed-9a77-837e95bcddcb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4603028729.mp3?updated=1703260185" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Compromised military tech?</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/234/notes</link>
      <description>Dick O'Brien from Symantec's threat hunter team, joins Dave to discuss their work on "Stonefly: North Korea-linked spying operation continues to hit high-value targets." Stonefly specializes in mounting highly selective targeted attacks against targets that could yield intelligence to assist strategically important sectors.
Symantec found that The attackers breached an engineering firm in February 2022, most likely by exploiting the Log4j vulnerability, Their research describes who these high value targets are and ways to prevent this malware from breaching any more companies as well as indications that you could be compromised.
The research can be found here:
Stonefly: North Korea-linked Spying Operation Continues to Hit High-value Targets

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Dec 2023 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Compromised military tech?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>234</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Dick O'Brien from Symantec's threat hunter team, joins Dave to discuss their work on "Stonefly: North Korea-linked spying operation continues to hit high-value targets." Stonefly specializes in mounting highly selective targeted attacks against targets that could yield intelligence to assist strategically important sectors.
Symantec found that The attackers breached an engineering firm in February 2022, most likely by exploiting the Log4j vulnerability, Their research describes who these high value targets are and ways to prevent this malware from breaching any more companies as well as indications that you could be compromised.
The research can be found here:
Stonefly: North Korea-linked Spying Operation Continues to Hit High-value Targets

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dick O'Brien from Symantec's threat hunter team, joins Dave to discuss their work on "Stonefly: North Korea-linked spying operation continues to hit high-value targets." Stonefly specializes in mounting highly selective targeted attacks against targets that could yield intelligence to assist strategically important sectors.</p><p>Symantec found that The attackers breached an engineering firm in February 2022, most likely by exploiting the Log4j vulnerability, Their research describes who these high value targets are and ways to prevent this malware from breaching any more companies as well as indications that you could be compromised.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/stonefly-north-korea-espionage">Stonefly: North Korea-linked Spying Operation Continues to Hit High-value Targets</a></li></ul><p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1172</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[701028cc-8165-11ed-9a77-c7312ed9b515]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3834440854.mp3?updated=1703193470" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Shedding light on fighting Ursa.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/310/notes</link>
      <description>Host of the CyberWire Daily podcast segment Threat Vector, David Moulton sits down with Mike "Siko" Sikorski from Palo Alto Networks Unit 42 to discuss their research on "Fighting Ursa Aka APT28: Illuminating a Covert Campaign." 
Unit 42 just published new threat intelligence on Fighting Ursa (aka APT28), a group associated with Russia's military intelligence, on how they are exploiting a Microsoft Outlook vulnerability (CVE-2023-23397) to target organizations in NATO member countries, Ukraine, Jordan, and the UAE. These organizations are of strategic importance in defense, foreign affairs, economy, energy, transportation, and telecommunications.
The research can be found here: 
Fighting Ursa Aka APT28: Illuminating a Covert Campaign

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Dec 2023 06:00:00 -0000</pubDate>
      <itunes:title>Shedding light on Fighting Ursa.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>310</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Host of the CyberWire Daily podcast segment Threat Vector, David Moulton sits down with Mike "Siko" Sikorski from Palo Alto Networks Unit 42 to discuss their research on "Fighting Ursa Aka APT28: Illuminating a Covert Campaign." 
Unit 42 just published new threat intelligence on Fighting Ursa (aka APT28), a group associated with Russia's military intelligence, on how they are exploiting a Microsoft Outlook vulnerability (CVE-2023-23397) to target organizations in NATO member countries, Ukraine, Jordan, and the UAE. These organizations are of strategic importance in defense, foreign affairs, economy, energy, transportation, and telecommunications.
The research can be found here: 
Fighting Ursa Aka APT28: Illuminating a Covert Campaign

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Host of the CyberWire Daily podcast segment Threat Vector, David Moulton sits down with Mike "Siko" Sikorski from Palo Alto Networks Unit 42 to discuss their research on "Fighting Ursa Aka APT28: Illuminating a Covert Campaign." </p><p>Unit 42 just published new threat intelligence on Fighting Ursa (aka APT28), a group associated with Russia's military intelligence, on how they are exploiting a Microsoft Outlook vulnerability (CVE-2023-23397) to target organizations in NATO member countries, Ukraine, Jordan, and the UAE. These organizations are of strategic importance in defense, foreign affairs, economy, energy, transportation, and telecommunications.</p><p>The research can be found here: </p><ul><li><a href="https://unit42.paloaltonetworks.com/russian-apt-fighting-ursa-exploits-cve-2023-233397/">Fighting Ursa Aka APT28: Illuminating a Covert Campaign</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1227</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6ff71f80-8165-11ed-9a77-23af540b3f3d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7265299917.mp3?updated=1702666929" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>On the hunt for popping up kernel drives.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/309/notes</link>
      <description>Dana Behling, researcher from Carbon Black, sharing their work on "Hunting Vulnerable Kernel Drivers." The Carbon Black Threat Analysis Unit (TAU) discovered 34 unique vulnerable drivers, six of which allow kernel memory access, accepting firmware access.
TAU reported the issues to the vendors whose drivers had valid signatures at the time of discovery, but only two vendors fixed the vulnerabilities. TAU is calling for more comprehensive approaches in the future than the current banned-list method used by Microsoft. The research states "By exploiting the vulnerable drivers, an attacker without the system privilege may erase/alter firmware, and/or elevate privileges."
The research can be found here:
Hunting Vulnerable Kernel Drivers

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Dec 2023 06:00:00 -0000</pubDate>
      <itunes:title>On the hunt for popping up kernel drives.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>309</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Dana Behling, researcher from Carbon Black, sharing their work on "Hunting Vulnerable Kernel Drivers." The Carbon Black Threat Analysis Unit (TAU) discovered 34 unique vulnerable drivers, six of which allow kernel memory access, accepting firmware access.
TAU reported the issues to the vendors whose drivers had valid signatures at the time of discovery, but only two vendors fixed the vulnerabilities. TAU is calling for more comprehensive approaches in the future than the current banned-list method used by Microsoft. The research states "By exploiting the vulnerable drivers, an attacker without the system privilege may erase/alter firmware, and/or elevate privileges."
The research can be found here:
Hunting Vulnerable Kernel Drivers

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dana Behling, researcher from Carbon Black, sharing their work on "Hunting Vulnerable Kernel Drivers." The Carbon Black Threat Analysis Unit (TAU) discovered 34 unique vulnerable drivers, six of which allow kernel memory access, accepting firmware access.</p><p>TAU reported the issues to the vendors whose drivers had valid signatures at the time of discovery, but only two vendors fixed the vulnerabilities. TAU is calling for more comprehensive approaches in the future than the current banned-list method used by Microsoft. The research states "By exploiting the vulnerable drivers, an attacker without the system privilege may erase/alter firmware, and/or elevate privileges."</p><p>The research can be found here:</p><ul><li><a href="https://blogs.vmware.com/security/2023/10/hunting-vulnerable-kernel-drivers.html">Hunting Vulnerable Kernel Drivers</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>902</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6fddef6a-8165-11ed-9a77-a7f00924876b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8535143628.mp3?updated=1701961545" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exploits and vulnerabilities. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/308/notes</link>
      <description>Ryan from Bishop Fox joins to describe their work on "Building an Exploit for FortiGate Vulnerability CVE-2023-27997." After Lexfo published details of a pre-authentication remote code injection vulnerability in the Fortinet SSL VPN, Bishop  Fox worked up a proof of concept demo. 
This research share how they were able to create that proof-of-concept exploit, step by step. The researchers state "Our debugging environment consisted of a FortiGate 7.2.4 virtual machine which we modified to disable some self-verification functionality. After bypassing these integrity checks, we were able to install an SSH server, BusyBox, and debugging tools such as GDB."
The research can be found here:
Building an Exploit for FortiGate Vulnerability CVE-2023-27997

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Dec 2023 06:00:00 -0000</pubDate>
      <itunes:title>Exploits and vulnerabilities. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>308</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Ryan from Bishop Fox joins to describe their work on "Building an Exploit for FortiGate Vulnerability CVE-2023-27997." After Lexfo published details of a pre-authentication remote code injection vulnerability in the Fortinet SSL VPN, Bishop  Fox worked up a proof of concept demo. 
This research share how they were able to create that proof-of-concept exploit, step by step. The researchers state "Our debugging environment consisted of a FortiGate 7.2.4 virtual machine which we modified to disable some self-verification functionality. After bypassing these integrity checks, we were able to install an SSH server, BusyBox, and debugging tools such as GDB."
The research can be found here:
Building an Exploit for FortiGate Vulnerability CVE-2023-27997

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ryan from Bishop Fox joins to describe their work on "Building an Exploit for FortiGate Vulnerability CVE-2023-27997." After Lexfo published details of a pre-authentication remote code injection vulnerability in the Fortinet SSL VPN, Bishop  Fox worked up a proof of concept demo. </p><p>This research share how they were able to create that proof-of-concept exploit, step by step. The researchers state "Our debugging environment consisted of a FortiGate 7.2.4 virtual machine which we modified to disable some self-verification functionality. After bypassing these integrity checks, we were able to install an SSH server, BusyBox, and debugging tools such as GDB."</p><p>The research can be found here:</p><ul><li><a href="https://bishopfox.com/blog/building-exploit-fortigate-vulnerability-cve-2023-27997">Building an Exploit for FortiGate Vulnerability CVE-2023-27997</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1128</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6fc5550e-8165-11ed-9a77-6f263acb18f5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4874631412.mp3?updated=1701286137" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Another infection with new malware. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/259/notes</link>
      <description>Larry Cashdollar, Principal Security Intelligence Response Engineer from Akamai Technologies, joins Dave to talk about their research on "KmsdBot: The Attack and Mine Malware." Akamai's Security Research team has found a new malware that infected their honeypot, which they have dubbed KmsdBot. 
The research states "The malware attacks using UDP, TCP, HTTP POST, and GET, along with a command and control infrastructure (C2), which communicates over TCP." The botnet targets weak login credentials and then infects systems via an SSH connection.
The research can be found here:
KmsdBot: The Attack and Mine Malware

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Nov 2023 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Another infection with new malware. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>259</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Larry Cashdollar, Principal Security Intelligence Response Engineer from Akamai Technologies, joins Dave to talk about their research on "KmsdBot: The Attack and Mine Malware." Akamai's Security Research team has found a new malware that infected their honeypot, which they have dubbed KmsdBot. 
The research states "The malware attacks using UDP, TCP, HTTP POST, and GET, along with a command and control infrastructure (C2), which communicates over TCP." The botnet targets weak login credentials and then infects systems via an SSH connection.
The research can be found here:
KmsdBot: The Attack and Mine Malware

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Larry Cashdollar, Principal Security Intelligence Response Engineer from Akamai Technologies, joins Dave to talk about their research on "KmsdBot: The Attack and Mine Malware." Akamai's Security Research team has found a new malware that infected their honeypot, which they have dubbed KmsdBot. </p><p>The research states "The malware attacks using UDP, TCP, HTTP POST, and GET, along with a command and control infrastructure (C2), which communicates over TCP." The botnet targets weak login credentials and then infects systems via an SSH connection.</p><p>The research can be found here:</p><ul><li><a href="https://www.akamai.com/blog/security-research/kmdsbot-the-attack-and-mine-malware">KmsdBot: The Attack and Mine Malware</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1165</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6fac49f6-8165-11ed-9a77-17e27a124e28]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5854364659.mp3?updated=1700667837" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The malicious YoroTrooper in disguise. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/307/notes</link>
      <description>Asheer Malhotra from Cisco Talos discussing their research and findings on "Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan." Cisco Talos' research team, released research attributing the work of the espionage-focused threat actor, YoroTrooper, to individuals based in Kazakhstan.
The research states "YoroTrooper attempts to obfuscate the origin of their operations, employing various tactics to make its malicious activity appear to emanate from Azerbaijan, such as using VPN exit nodes local to that region." They also found that the YoroTrooper continues to rely heavily on phishing emails that direct victims to credential harvesting sites.
The research can be found here:
Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Nov 2023 06:00:00 -0000</pubDate>
      <itunes:title>The malicious YoroTrooper in disguise. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>307</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Asheer Malhotra from Cisco Talos discussing their research and findings on "Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan." Cisco Talos' research team, released research attributing the work of the espionage-focused threat actor, YoroTrooper, to individuals based in Kazakhstan.
The research states "YoroTrooper attempts to obfuscate the origin of their operations, employing various tactics to make its malicious activity appear to emanate from Azerbaijan, such as using VPN exit nodes local to that region." They also found that the YoroTrooper continues to rely heavily on phishing emails that direct victims to credential harvesting sites.
The research can be found here:
Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Asheer Malhotra from Cisco Talos discussing their research and findings on "Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan." Cisco Talos' research team, released research attributing the work of the espionage-focused threat actor, YoroTrooper, to individuals based in Kazakhstan.</p><p>The research states "YoroTrooper attempts to obfuscate the origin of their operations, employing various tactics to make its malicious activity appear to emanate from Azerbaijan, such as using VPN exit nodes local to that region." They also found that the YoroTrooper continues to rely heavily on phishing emails that direct victims to credential harvesting sites.</p><p>The research can be found here:</p><ul><li><a href="https://blog.talosintelligence.com/attributing-yorotrooper/">Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>995</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6f93eb54-8165-11ed-9a77-8f8ec74dca81]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4210506526.mp3?updated=1700158276" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Old malware returns in a new way.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/260/notes</link>
      <description>Jeremy Kennelly and Sulian Lebegue from Mandiant sit down with Dave to discuss their research "From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind? One of the oldest and most successful banking fraud malwares, URSNIF, which caused an estimated “tens of millions of dollars in losses”, has been discovered by researchers to have been re-tooled into a generic backdoor, dubbed “LDR4”.
This new variant was first observed in June 2022. Mandiant researchers believe that the same threat actors who operated the RM3 variant of URSNIF are likely behind LDR4. They say "given the success and sophistication RM3 previously had, LDR4 could be a significantly dangerous variant—capable of distributing ransomware—that should be watched closely."
The research can be found here:
From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Nov 2023 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Old malware returns in a new way.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>260</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Jeremy Kennelly and Sulian Lebegue from Mandiant sit down with Dave to discuss their research "From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind? One of the oldest and most successful banking fraud malwares, URSNIF, which caused an estimated “tens of millions of dollars in losses”, has been discovered by researchers to have been re-tooled into a generic backdoor, dubbed “LDR4”.
This new variant was first observed in June 2022. Mandiant researchers believe that the same threat actors who operated the RM3 variant of URSNIF are likely behind LDR4. They say "given the success and sophistication RM3 previously had, LDR4 could be a significantly dangerous variant—capable of distributing ransomware—that should be watched closely."
The research can be found here:
From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jeremy Kennelly and Sulian Lebegue from Mandiant sit down with Dave to discuss their research "From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind? One of the oldest and most successful banking fraud malwares, URSNIF, which caused an estimated “tens of millions of dollars in losses”, has been discovered by researchers to have been re-tooled into a generic backdoor, dubbed “LDR4”.</p><p>This new variant was first observed in June 2022. Mandiant researchers believe that the same threat actors who operated the RM3 variant of URSNIF are likely behind LDR4. They say "given the success and sophistication RM3 previously had, LDR4 could be a significantly dangerous variant—capable of distributing ransomware—that should be watched closely."</p><p>The research can be found here:</p><ul><li><a href="https://www.mandiant.com/resources/blog/rm3-ldr4-ursnif-banking-fraud">From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1459</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6f7b383e-8165-11ed-9a77-0bb28cf83caf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5272830154.mp3?updated=1699462917" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sandman doesn't slow malware down.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/306/notes</link>
      <description>Aleksandar Milenkoski and JAGS from SentinelOne sits down to share their work on "Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit." After observing a new threat activity cluster by an unknown threat actor in August of this year, SentinelLabs dubbed it Sandman.
The research states "Sandman has been primarily targeting telecommunication providers in the Middle East, Western Europe, and the South Asian subcontinent." Sandman has deployed a novel modular backdoor utilizing the LuaJIT platform, they call this malware "LuaDream," which exfiltrates system and user information, paving the way for further precision attacks.
The research can be found here:
Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Nov 2023 05:00:00 -0000</pubDate>
      <itunes:title>Sandman doesn't slow malware down.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>306</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Aleksandar Milenkoski and JAGS from SentinelOne sits down to share their work on "Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit." After observing a new threat activity cluster by an unknown threat actor in August of this year, SentinelLabs dubbed it Sandman.
The research states "Sandman has been primarily targeting telecommunication providers in the Middle East, Western Europe, and the South Asian subcontinent." Sandman has deployed a novel modular backdoor utilizing the LuaJIT platform, they call this malware "LuaDream," which exfiltrates system and user information, paving the way for further precision attacks.
The research can be found here:
Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Aleksandar Milenkoski and JAGS from SentinelOne sits down to share their work on "Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit." After observing a new threat activity cluster by an unknown threat actor in August of this year, SentinelLabs dubbed it Sandman.</p><p>The research states "Sandman has been primarily targeting telecommunication providers in the Middle East, Western Europe, and the South Asian subcontinent." Sandman has deployed a novel modular backdoor utilizing the LuaJIT platform, they call this malware "LuaDream," which exfiltrates system and user information, paving the way for further precision attacks.</p><p>The research can be found here:</p><ul><li><a href="https://www.sentinelone.com/labs/sandman-apt-a-mystery-group-targeting-telcos-with-a-luajit-toolkit/">Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1378</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6f5c40b4-8165-11ed-9a77-1ba3ead5e81c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9972225089.mp3?updated=1699112999" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No rest for the wicked HiatusRAT.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/305/notes</link>
      <description>Danny Adamitis from Lumen's Black Lotus Labs sits down to discuss their work on "No Rest For The Wicked: HiatusRAT Takes Little Time Off In A Return To Action." Last March Lumen's Black Lotus Lab researchers discovered a novel malware called HiatusRAT that targeted business-grade routers.
The research states "In the latest campaign, we observed a shift in reconnaissance and targeting activity; in June we observed reconnaissance against a U.S. military procurement system, and targeting of Taiwan-based organizations." This shift in information gathering and targeting preference exhibited in the latest campaign is synonymous with the strategic interest of the People’s Republic of China according to the 2023 ODNI threat assessment.
The research can be found here:
No Rest For The Wicked: HiatusRAT Takes Little Time Off In A Return To Action

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Oct 2023 05:00:00 -0000</pubDate>
      <itunes:title>No rest for the wicked HiatusRAT.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>305</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Danny Adamitis from Lumen's Black Lotus Labs sits down to discuss their work on "No Rest For The Wicked: HiatusRAT Takes Little Time Off In A Return To Action." Last March Lumen's Black Lotus Lab researchers discovered a novel malware called HiatusRAT that targeted business-grade routers.
The research states "In the latest campaign, we observed a shift in reconnaissance and targeting activity; in June we observed reconnaissance against a U.S. military procurement system, and targeting of Taiwan-based organizations." This shift in information gathering and targeting preference exhibited in the latest campaign is synonymous with the strategic interest of the People’s Republic of China according to the 2023 ODNI threat assessment.
The research can be found here:
No Rest For The Wicked: HiatusRAT Takes Little Time Off In A Return To Action

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Danny Adamitis from Lumen's Black Lotus Labs sits down to discuss their work on "No Rest For The Wicked: HiatusRAT Takes Little Time Off In A Return To Action." Last March Lumen's Black Lotus Lab researchers discovered a novel malware called HiatusRAT that targeted business-grade routers.</p><p>The research states "In the latest campaign, we observed a shift in reconnaissance and targeting activity; in June we observed reconnaissance against a U.S. military procurement system, and targeting of Taiwan-based organizations." This shift in information gathering and targeting preference exhibited in the latest campaign is synonymous with the strategic interest of the People’s Republic of China according to the 2023 ODNI threat assessment.</p><p>The research can be found here:</p><ul><li><a href="https://blog.lumen.com/hiatusrat-takes-little-time-off-in-a-return-to-action/">No Rest For The Wicked: HiatusRAT Takes Little Time Off In A Return To Action</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1381</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6f43a338-8165-11ed-9a77-87274d909ce7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4573478991.mp3?updated=1698423077" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AMBERSQUID hides in the depths.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/304/notes</link>
      <description>Sysdig's Alessandro Brucato and Michael Clark join Dave to discuss their work on "AWS's Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation." Attackers are targeting what are typically considered secure AWS services, like AWS Fargate and Amazon SageMaker. This means that defenders generally aren’t as concerned with their security from end-to-end.
The research states "The AMBERSQUID operation was able to exploit cloud services without triggering the AWS requirement for approval of more resources, as would be the case if they only spammed EC2 instances." This poses additional challenges targeting multiple services since it requires finding and killing all miners in each exploited service.
The research can be found here:
AWS’s Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Oct 2023 05:00:00 -0000</pubDate>
      <itunes:title>AMBERSQUID hides in the depths.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>304</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Sysdig's Alessandro Brucato and Michael Clark join Dave to discuss their work on "AWS's Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation." Attackers are targeting what are typically considered secure AWS services, like AWS Fargate and Amazon SageMaker. This means that defenders generally aren’t as concerned with their security from end-to-end.
The research states "The AMBERSQUID operation was able to exploit cloud services without triggering the AWS requirement for approval of more resources, as would be the case if they only spammed EC2 instances." This poses additional challenges targeting multiple services since it requires finding and killing all miners in each exploited service.
The research can be found here:
AWS’s Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Sysdig's Alessandro Brucato and Michael Clark join Dave to discuss their work on "AWS's Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation." Attackers are targeting what are typically considered secure AWS services, like AWS Fargate and Amazon SageMaker. This means that defenders generally aren’t as concerned with their security from end-to-end.</p><p>The research states "The AMBERSQUID operation was able to exploit cloud services without triggering the AWS requirement for approval of more resources, as would be the case if they only spammed EC2 instances." This poses additional challenges targeting multiple services since it requires finding and killing all miners in each exploited service.</p><p>The research can be found here:</p><ul><li><a href="https://sysdig.com/blog/ambersquid/#:~:text=The%20Sysdig%20Threat%20Research%20Team,AWS%20Fargate%2C%20and%20Amazon%20SageMaker">AWS’s Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1057</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6f27a480-8165-11ed-9a77-abc9e97dcc80]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6134269536.mp3?updated=1697813369" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unwanted guests harvest your information.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/303/notes</link>
      <description>Amit Malik from Uptycs joins us to discuss their research titled "Unwanted Guests: Mitigating Remote Access Trojan Infection Risk." Uptycs threat research team identified a new threat referred to as QwixxRAT. The Uptycs team discovered this tool being widely distributed by the threat actor through Telegram and Discord platforms.
The research states "QwixxRAT is meticulously designed to harvest an expansive range of information from browser histories and credit card details, to keylogging insights." This newly found tool poses a risk to both businesses and individual users
The research can be found here:
Unwanted Guests: Mitigating Remote Access Trojan Infection Risk

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Oct 2023 05:00:00 -0000</pubDate>
      <itunes:title>Unwanted guests harvest your information.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>303</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Amit Malik from Uptycs joins us to discuss their research titled "Unwanted Guests: Mitigating Remote Access Trojan Infection Risk." Uptycs threat research team identified a new threat referred to as QwixxRAT. The Uptycs team discovered this tool being widely distributed by the threat actor through Telegram and Discord platforms.
The research states "QwixxRAT is meticulously designed to harvest an expansive range of information from browser histories and credit card details, to keylogging insights." This newly found tool poses a risk to both businesses and individual users
The research can be found here:
Unwanted Guests: Mitigating Remote Access Trojan Infection Risk

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Amit Malik from Uptycs joins us to discuss their research titled "Unwanted Guests: Mitigating Remote Access Trojan Infection Risk." Uptycs threat research team identified a new threat referred to as QwixxRAT. The Uptycs team discovered this tool being widely distributed by the threat actor through Telegram and Discord platforms.</p><p>The research states "QwixxRAT is meticulously designed to harvest an expansive range of information from browser histories and credit card details, to keylogging insights." This newly found tool poses a risk to both businesses and individual users</p><p>The research can be found here:</p><ul><li><a href="https://www.uptycs.com/blog/remote-access-trojan-qwixx-telegram">Unwanted Guests: Mitigating Remote Access Trojan Infection Risk</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1041</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6f0c8ab0-8165-11ed-9a77-5357c98f7620]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6017316786.mp3?updated=1697736439" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Targets from DuckTail.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/302/notes</link>
      <description>Deepen Desai from Zscaler joins to take a look into their research about "DuckTail." In May of 2023, Zscaler ThreatLabz began an intelligence collection operation to decode DuckTail’s maneuvers. Through an intensive three-month period of monitoring, Zscaler was able obtain unprecedented visibility into DuckTail’s end-to-end operations, spanning the entire kill chain from reconnaissance to post-compromise.
The research states "DuckTail threat actors primarily target users working in the digital marketing and advertising space. Unfortunately, the tech layoffs occurring in 2022 and 2023 introduced more eager candidates into the digital market - meaning more prime targets for DuckTail."
The research can be found here:
A Look Into DuckTail

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Oct 2023 05:00:00 -0000</pubDate>
      <itunes:title>Targets from DuckTail.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>302</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Deepen Desai from Zscaler joins to take a look into their research about "DuckTail." In May of 2023, Zscaler ThreatLabz began an intelligence collection operation to decode DuckTail’s maneuvers. Through an intensive three-month period of monitoring, Zscaler was able obtain unprecedented visibility into DuckTail’s end-to-end operations, spanning the entire kill chain from reconnaissance to post-compromise.
The research states "DuckTail threat actors primarily target users working in the digital marketing and advertising space. Unfortunately, the tech layoffs occurring in 2022 and 2023 introduced more eager candidates into the digital market - meaning more prime targets for DuckTail."
The research can be found here:
A Look Into DuckTail

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Deepen Desai from Zscaler joins to take a look into their research about "DuckTail." In May of 2023, Zscaler ThreatLabz began an intelligence collection operation to decode DuckTail’s maneuvers. Through an intensive three-month period of monitoring, Zscaler was able obtain unprecedented visibility into DuckTail’s end-to-end operations, spanning the entire kill chain from reconnaissance to post-compromise.</p><p>The research states "DuckTail threat actors primarily target users working in the digital marketing and advertising space. Unfortunately, the tech layoffs occurring in 2022 and 2023 introduced more eager candidates into the digital market - meaning more prime targets for DuckTail."</p><p>The research can be found here:</p><ul><li><a href="https://www.zscaler.com/blogs/security-research/look-ducktail">A Look Into DuckTail</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>928</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6eeffa3a-8165-11ed-9a77-e783e6e9d131]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3575282581.mp3?updated=1696605408" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Downloading cracked software.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/301/notes</link>
      <description>David Liebenberg from Cisco Talos joins to discussing Talos' discovery of cracked Microsoft Windows software being downloaded by enterprise users across the globe. Downloading and running this compromised software not only serves as an entry point for threat actors, but can serve as a gateway to access control systems and establish backdoors.
Talos identified additional malware, including RATs, on endpoints running this cracked software, which allows an attacker to gain unauthorized remote access to the compromised system, providing the attacker with various capabilities, such as controlling the system, capturing screenshots, recording keystrokes and exfiltrating sensitive information.
This research article was not published by Cisco Talos' team.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Sep 2023 05:00:00 -0000</pubDate>
      <itunes:title>Downloading cracked software.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>301</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>David Liebenberg from Cisco Talos joins to discussing Talos' discovery of cracked Microsoft Windows software being downloaded by enterprise users across the globe. Downloading and running this compromised software not only serves as an entry point for threat actors, but can serve as a gateway to access control systems and establish backdoors.
Talos identified additional malware, including RATs, on endpoints running this cracked software, which allows an attacker to gain unauthorized remote access to the compromised system, providing the attacker with various capabilities, such as controlling the system, capturing screenshots, recording keystrokes and exfiltrating sensitive information.
This research article was not published by Cisco Talos' team.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>David Liebenberg from Cisco Talos joins to discussing Talos' discovery of cracked Microsoft Windows software being downloaded by enterprise users across the globe. Downloading and running this compromised software not only serves as an entry point for threat actors, but can serve as a gateway to access control systems and establish backdoors.</p><p>Talos identified additional malware, including RATs, on endpoints running this cracked software, which allows an attacker to gain unauthorized remote access to the compromised system, providing the attacker with various capabilities, such as controlling the system, capturing screenshots, recording keystrokes and exfiltrating sensitive information.</p><p>This research article was not published by Cisco Talos' team.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1049</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6eb7ee4c-8165-11ed-9a77-d31a1a3d3134]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9330821383.mp3?updated=1696000741" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Behind the Google shopping ad masks. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/300/notes</link>
      <description>Maxim Zavodchik from Akamai joins Dave to discuss their research on "Xurum: New Magento Campaign Discovered." Akamai researchers have discovered an ongoing server-side template injection campaign that is exploiting digital commerce websites. This campaign targets Magento 2 shops, and was dubbed Xurum in reference to the domain name of the attacker’s command and control (C2) server. 
The research states "The attacker uses an advanced web shell named “wso-ng” that is activated only when the attacker sends the cookie “magemojo000” to the backdoor “GoogleShoppingAds” component."
The research can be found here:
Xurum: New Magento Campaign Discovered

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Sep 2023 05:00:00 -0000</pubDate>
      <itunes:title>Behind the Google shopping ad masks. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>300</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Maxim Zavodchik from Akamai joins Dave to discuss their research on "Xurum: New Magento Campaign Discovered." Akamai researchers have discovered an ongoing server-side template injection campaign that is exploiting digital commerce websites. This campaign targets Magento 2 shops, and was dubbed Xurum in reference to the domain name of the attacker’s command and control (C2) server. 
The research states "The attacker uses an advanced web shell named “wso-ng” that is activated only when the attacker sends the cookie “magemojo000” to the backdoor “GoogleShoppingAds” component."
The research can be found here:
Xurum: New Magento Campaign Discovered

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Maxim Zavodchik from Akamai joins Dave to discuss their research on "Xurum: New Magento Campaign Discovered." Akamai researchers have discovered an ongoing server-side template injection campaign that is exploiting digital commerce websites. This campaign targets Magento 2 shops, and was dubbed Xurum in reference to the domain name of the attacker’s command and control (C2) server. </p><p>The research states "The attacker uses an advanced web shell named “wso-ng” that is activated only when the attacker sends the cookie “magemojo000” to the backdoor “GoogleShoppingAds” component."</p><p>The research can be found here:</p><ul><li><a href="https://www.akamai.com/blog/security-research/new-sophisticated-magento-campaign-xurum-webshell">Xurum: New Magento Campaign Discovered</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>872</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6ed42d32-8165-11ed-9a77-a3b75ffabf58]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4421897191.mp3?updated=1695320383" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A look into the emotions and anxieties of the highest levels of decision-making. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/299/notes</link>
      <description>Guest Manuel Hepfer from ISTARI shares his research on cyber resilience which includes discussions with 37 CEOs to gain insight into how they manage cybersecurity risk. ISTARI and Oxford University's Saïd Business School dive into the minds and experiences of CEOs on how they manage cybersecurity risk.
Ask any CEO to name the issues that keep them awake at night and cybersecurity risk is likely near the top of the list – with good reason. With the accelerating digitalisation of business models comes vulnerability to cyberattack. And while spending on cybersecurity increases every year, so does the number of serious incidents. Even the largest and most technologically advanced companies are not immune.
CEOs must formally answer to regulators, shareholders and board members for their organisation’s cybersecurity. Yet the majority (72%) of CEOs we interviewed as part of our research said they were not comfortable making cybersecurity-related decisions.
The research and associated article can be found here:

Research: The CEO Report on Cyber Resilience


Article: Make Cybersecurity a Strategic Asset



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Sep 2023 05:00:00 -0000</pubDate>
      <itunes:title>A look into the emotions and anxieties of the highest levels of decision-making. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>299</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Manuel Hepfer from ISTARI shares his research on cyber resilience which includes discussions with 37 CEOs to gain insight into how they manage cybersecurity risk. ISTARI and Oxford University's Saïd Business School dive into the minds and experiences of CEOs on how they manage cybersecurity risk.
Ask any CEO to name the issues that keep them awake at night and cybersecurity risk is likely near the top of the list – with good reason. With the accelerating digitalisation of business models comes vulnerability to cyberattack. And while spending on cybersecurity increases every year, so does the number of serious incidents. Even the largest and most technologically advanced companies are not immune.
CEOs must formally answer to regulators, shareholders and board members for their organisation’s cybersecurity. Yet the majority (72%) of CEOs we interviewed as part of our research said they were not comfortable making cybersecurity-related decisions.
The research and associated article can be found here:

Research: The CEO Report on Cyber Resilience


Article: Make Cybersecurity a Strategic Asset



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Manuel Hepfer from ISTARI shares his research on cyber resilience which includes discussions with 37 CEOs to gain insight into how they manage cybersecurity risk. ISTARI and Oxford University's Saïd Business School dive into the minds and experiences of CEOs on how they manage cybersecurity risk.</p><p>Ask any CEO to name the issues that keep them awake at night and cybersecurity risk is likely near the top of the list – with good reason. With the accelerating digitalisation of business models comes vulnerability to cyberattack. And while spending on cybersecurity increases every year, so does the number of serious incidents. Even the largest and most technologically advanced companies are not immune.</p><p>CEOs must formally answer to regulators, shareholders and board members for their organisation’s cybersecurity. Yet the majority (72%) of CEOs we interviewed as part of our research said they were not comfortable making cybersecurity-related decisions.</p><p>The research and associated article can be found here:</p><ul>
<li>Research: <a href="https://istari-global.com/insights/articles/ceo-report/">The CEO Report on Cyber Resilience</a>
</li>
<li>Article: <a href="https://sloanreview.mit.edu/article/make-cybersecurity-a-strategic-asset/">Make Cybersecurity a Strategic Asset</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2415</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6e9d56fe-8165-11ed-9a77-e372191209c6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4110218776.mp3?updated=1694719614" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No honor in being a criminal. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/298/notes</link>
      <description>This week, our guest is Reece Baldwin from Kasada discussing their work on "No Honour Amongst Thieves: Unpacking a New OpenBullet Malware Campaign." The Kasada Threat Intelligence team has recently identified a malware campaign targeting users of OpenBullet, a tool popular within criminal communities to conduct credential stuffing attacks.
This malware campaign was first uncovered when the team was digging around in a Telegram channel setup to share OpenBullet configurations. Reading through a few of the configurations they identified a function, ostensibly designed to bypass Google’s reCAPTCHA anti-bot solution. Th research states "While the versatility of OpenBullet’s configuration files enable complex attacks, they can also make it difficult for inexperienced attackers to fully understand what requests are being created and what data is being retrieved."
The research can be found here:
No Honour Amongst Thieves: Unpacking a New OpenBullet Malware Campaign

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Sep 2023 05:00:00 -0000</pubDate>
      <itunes:title>No honor in being a criminal. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>298</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, our guest is Reece Baldwin from Kasada discussing their work on "No Honour Amongst Thieves: Unpacking a New OpenBullet Malware Campaign." The Kasada Threat Intelligence team has recently identified a malware campaign targeting users of OpenBullet, a tool popular within criminal communities to conduct credential stuffing attacks.
This malware campaign was first uncovered when the team was digging around in a Telegram channel setup to share OpenBullet configurations. Reading through a few of the configurations they identified a function, ostensibly designed to bypass Google’s reCAPTCHA anti-bot solution. Th research states "While the versatility of OpenBullet’s configuration files enable complex attacks, they can also make it difficult for inexperienced attackers to fully understand what requests are being created and what data is being retrieved."
The research can be found here:
No Honour Amongst Thieves: Unpacking a New OpenBullet Malware Campaign

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our guest is Reece Baldwin from Kasada discussing their work on "No Honour Amongst Thieves: Unpacking a New OpenBullet Malware Campaign." The Kasada Threat Intelligence team has recently identified a malware campaign targeting users of OpenBullet, a tool popular within criminal communities to conduct credential stuffing attacks.</p><p>This malware campaign was first uncovered when the team was digging around in a Telegram channel setup to share OpenBullet configurations. Reading through a few of the configurations they identified a function, ostensibly designed to bypass Google’s reCAPTCHA anti-bot solution. Th research states "While the versatility of OpenBullet’s configuration files enable complex attacks, they can also make it difficult for inexperienced attackers to fully understand what requests are being created and what data is being retrieved."</p><p>The research can be found here:</p><ul><li><a href="https://www.kasada.io/threat-intel-openbullet-malware/">No Honour Amongst Thieves: Unpacking a New OpenBullet Malware Campaign</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1038</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6e84f8d4-8165-11ed-9a77-db3d4c0a3247]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1082790161.mp3?updated=1694185620" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Thwarting Muddled Libra.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/297/notes</link>
      <description>Kristopher Russo and Stephanie Regan from Palo Alto Networks Unit 42 join Dave to talk about Threat Group Assessment: Muddled Libra. With an intimate knowledge of enterprise information technology, this threat group presents a significant risk even to organizations with well-developed legacy cyber defenses.
Posing threats to organizations in the software automation, BPO, telecommunications and technology industries, Muddled Libra is a threat group that favors targeting large outsourcing firms serving high-value cryptocurrency institutions and individuals.
The research can be found here:
Threat Group Assessment: Muddled Libra

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Sep 2023 05:00:00 -0000</pubDate>
      <itunes:title>Thwarting Muddled Libra.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>297</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Kristopher Russo and Stephanie Regan from Palo Alto Networks Unit 42 join Dave to talk about Threat Group Assessment: Muddled Libra. With an intimate knowledge of enterprise information technology, this threat group presents a significant risk even to organizations with well-developed legacy cyber defenses.
Posing threats to organizations in the software automation, BPO, telecommunications and technology industries, Muddled Libra is a threat group that favors targeting large outsourcing firms serving high-value cryptocurrency institutions and individuals.
The research can be found here:
Threat Group Assessment: Muddled Libra

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kristopher Russo and Stephanie Regan from Palo Alto Networks Unit 42 join Dave to talk about Threat Group Assessment: Muddled Libra. With an intimate knowledge of enterprise information technology, this threat group presents a significant risk even to organizations with well-developed legacy cyber defenses.</p><p>Posing threats to organizations in the software automation, BPO, telecommunications and technology industries, Muddled Libra is a threat group that favors targeting large outsourcing firms serving high-value cryptocurrency institutions and individuals.</p><p>The research can be found here:</p><ul><li><a href="https://unit42.paloaltonetworks.com/muddled-libra/?utm_source=cyberwire-podcast-&amp;utm_medium=episode2">Threat Group Assessment: Muddled Libra</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1805</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6e6e507a-8165-11ed-9a77-83705bff8d1d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9809919626.mp3?updated=1693494262" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Google's not being ghosted from vulnerabilities. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/296/notes</link>
      <description>Tal Skverer from Astrix Security joins to discuss their work on "GhostToken – Exploiting GCP application infrastructure to create invisible, unremovable trojan app on Google accounts." Astrix’s Security Research Group revealed a 0-day flaw in Google’s Cloud Platform (GCP) on June 19, 2022, which was found to affect all Google users.
The research states "The vulnerability, dubbed “GhostToken”, could allow threat actors to change a malicious application to be invisible and unremovable, effectively leaving the victim’s Google account infected with a trojan app forever." Google issued a patch to this vulnerability in April of this year, but researchers explain why this can be severe.
The research can be found here:
GhostToken – Exploiting GCP application infrastructure to create invisible, unremovable trojan app on Google accounts

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Aug 2023 05:00:00 -0000</pubDate>
      <itunes:title>Google's not being ghosted from vulnerabilities. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>296</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Tal Skverer from Astrix Security joins to discuss their work on "GhostToken – Exploiting GCP application infrastructure to create invisible, unremovable trojan app on Google accounts." Astrix’s Security Research Group revealed a 0-day flaw in Google’s Cloud Platform (GCP) on June 19, 2022, which was found to affect all Google users.
The research states "The vulnerability, dubbed “GhostToken”, could allow threat actors to change a malicious application to be invisible and unremovable, effectively leaving the victim’s Google account infected with a trojan app forever." Google issued a patch to this vulnerability in April of this year, but researchers explain why this can be severe.
The research can be found here:
GhostToken – Exploiting GCP application infrastructure to create invisible, unremovable trojan app on Google accounts

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tal Skverer from Astrix Security joins to discuss their work on "GhostToken – Exploiting GCP application infrastructure to create invisible, unremovable trojan app on Google accounts." Astrix’s Security Research Group revealed a 0-day flaw in Google’s Cloud Platform (GCP) on June 19, 2022, which was found to affect all Google users.</p><p>The research states "The vulnerability, dubbed “GhostToken”, could allow threat actors to change a malicious application to be invisible and unremovable, effectively leaving the victim’s Google account infected with a trojan app forever." Google issued a patch to this vulnerability in April of this year, but researchers explain why this can be severe.</p><p>The research can be found here:</p><ul><li><a href="https://astrix.security/ghosttoken-exploiting-gcp-application-infrastructure-to-create-invisible-unremovable-trojan-app-on-google-accounts/">GhostToken – Exploiting GCP application infrastructure to create invisible, unremovable trojan app on Google accounts</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1027</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6e52dd0e-8165-11ed-9a77-67aede9af7b2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3646247299.mp3?updated=1692898644" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Politicians targeted by RomCom.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/295/notes</link>
      <description>Dmitry Bestuzhev from Blackberry joins to discuss their work on "RomCom Resurfaces: Targeting Politicians in Ukraine and U.S.-Based Healthcare Providing Aid to Refugees from Ukraine." Research suggests that the RomCom threat team has been tracked carefully following the geopolitical events surrounding the war in Ukraine, and are now targeting politicians in Ukraine who are working closely with Western countries.
This group is different from others in that their focus is more on secrets or information which can be useful in geopolitics and specifically the war in Ukraine, instead of financial gain. The research says "Although it is unclear at this point what initial infection vector was used to kick off the execution chain, previous RomCom attacks used targeted phishing emails to point a victim to a cloned website hosting Trojanized versions of popular software."
The research can be found here:
RomCom Resurfaces: Targeting Politicians in Ukraine and U.S.-Based Healthcare Providing Aid to Refugees from Ukraine

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Aug 2023 05:00:00 -0000</pubDate>
      <itunes:title>Politicians targeted by RomCom.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>295</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dmitry Bestuzhev from Blackberry joins to discuss their work on "RomCom Resurfaces: Targeting Politicians in Ukraine and U.S.-Based Healthcare Providing Aid to Refugees from Ukraine." Research suggests that the RomCom threat team has been tracked carefully following the geopolitical events surrounding the war in Ukraine, and are now targeting politicians in Ukraine who are working closely with Western countries.
This group is different from others in that their focus is more on secrets or information which can be useful in geopolitics and specifically the war in Ukraine, instead of financial gain. The research says "Although it is unclear at this point what initial infection vector was used to kick off the execution chain, previous RomCom attacks used targeted phishing emails to point a victim to a cloned website hosting Trojanized versions of popular software."
The research can be found here:
RomCom Resurfaces: Targeting Politicians in Ukraine and U.S.-Based Healthcare Providing Aid to Refugees from Ukraine

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dmitry Bestuzhev from Blackberry joins to discuss their work on "RomCom Resurfaces: Targeting Politicians in Ukraine and U.S.-Based Healthcare Providing Aid to Refugees from Ukraine." Research suggests that the RomCom threat team has been tracked carefully following the geopolitical events surrounding the war in Ukraine, and are now targeting politicians in Ukraine who are working closely with Western countries.</p><p>This group is different from others in that their focus is more on secrets or information which can be useful in geopolitics and specifically the war in Ukraine, instead of financial gain. The research says "Although it is unclear at this point what initial infection vector was used to kick off the execution chain, previous RomCom attacks used targeted phishing emails to point a victim to a cloned website hosting Trojanized versions of popular software."</p><p>The research can be found here:</p><ul><li><a href="https://blogs.blackberry.com/en/2023/06/romcom-resurfaces-targeting-ukraine">RomCom Resurfaces: Targeting Politicians in Ukraine and U.S.-Based Healthcare Providing Aid to Refugees from Ukraine</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1368</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6e3b3df2-8165-11ed-9a77-6fb5652976bf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1589846089.mp3?updated=1692293641" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>It's raining credentials. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/294/notes</link>
      <description>Alex Delamotte from SentinelLabs joins Dave to discuss their work on "Cloudy With a Chance of Credentials | AWS-Targeting Cred Stealer Expands to Azure, GCP." As actors find more ways to profit from compromising services, SentinelLabs finds that cloud service credentials are becoming increasingly targeted.
The lack of threats explicitly targeting Azure and GCP credentials up to this point means there are likely many fresh targets. The research states "These campaigns share similarity with tools attributed to the notorious TeamTNT cryptojacking crew. However, attribution remains challenging with script-based tools, as anyone can adapt the code for their own use."
The research can be found here:
Cloudy With a Chance of Credentials | AWS-Targeting Cred Stealer Expands to Azure, GCP

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Aug 2023 05:00:00 -0000</pubDate>
      <itunes:title>It's raining credentials. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>294</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Alex Delamotte from SentinelLabs joins Dave to discuss their work on "Cloudy With a Chance of Credentials | AWS-Targeting Cred Stealer Expands to Azure, GCP." As actors find more ways to profit from compromising services, SentinelLabs finds that cloud service credentials are becoming increasingly targeted.
The lack of threats explicitly targeting Azure and GCP credentials up to this point means there are likely many fresh targets. The research states "These campaigns share similarity with tools attributed to the notorious TeamTNT cryptojacking crew. However, attribution remains challenging with script-based tools, as anyone can adapt the code for their own use."
The research can be found here:
Cloudy With a Chance of Credentials | AWS-Targeting Cred Stealer Expands to Azure, GCP

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Alex Delamotte from SentinelLabs joins Dave to discuss their work on "Cloudy With a Chance of Credentials | AWS-Targeting Cred Stealer Expands to Azure, GCP." As actors find more ways to profit from compromising services, SentinelLabs finds that cloud service credentials are becoming increasingly targeted.</p><p>The lack of threats explicitly targeting Azure and GCP credentials up to this point means there are likely many fresh targets. The research states "These campaigns share similarity with tools attributed to the notorious TeamTNT cryptojacking crew. However, attribution remains challenging with script-based tools, as anyone can adapt the code for their own use."</p><p>The research can be found here:</p><ul><li><a href="https://www.sentinelone.com/labs/cloudy-with-a-chance-of-credentials-aws-targeting-cred-stealer-expands-to-azure-gcp/">Cloudy With a Chance of Credentials | AWS-Targeting Cred Stealer Expands to Azure, GCP</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1090</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6e22f7d8-8165-11ed-9a77-ebc74c24fca5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2756851174.mp3?updated=1691767635" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Who is that stealing my credentials?</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/293/notes</link>
      <description>Aleksandar Milenkoski from SentinelOne joins to discuss their work on "Kimsuky Strikes Again | New Social Engineering Campaign Aims to Steal Credentials and Gather Strategic Intelligence." Researchers have been tracking the North Korean APT group Kimsuky and their attempt at a social engineering campaign targeting experts in North Korean affairs.
The research states "The campaign has the objective of stealing Google and subscription credentials of a reputable news and analysis service focusing on North Korea, as well as delivering reconnaissance malware." Kimsuky has been tracked engaging in extensive email correspondence using spoofed URLs and extensive email correspondence, along with Office documents weaponized with the ReconShark malware.
The research can be found here:
Kimsuky Strikes Again | New Social Engineering Campaign Aims to Steal Credentials and Gather Strategic Intelligence

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Aug 2023 05:00:00 -0000</pubDate>
      <itunes:title>Who is that stealing my credentials?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>293</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Aleksandar Milenkoski from SentinelOne joins to discuss their work on "Kimsuky Strikes Again | New Social Engineering Campaign Aims to Steal Credentials and Gather Strategic Intelligence." Researchers have been tracking the North Korean APT group Kimsuky and their attempt at a social engineering campaign targeting experts in North Korean affairs.
The research states "The campaign has the objective of stealing Google and subscription credentials of a reputable news and analysis service focusing on North Korea, as well as delivering reconnaissance malware." Kimsuky has been tracked engaging in extensive email correspondence using spoofed URLs and extensive email correspondence, along with Office documents weaponized with the ReconShark malware.
The research can be found here:
Kimsuky Strikes Again | New Social Engineering Campaign Aims to Steal Credentials and Gather Strategic Intelligence

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Aleksandar Milenkoski from SentinelOne joins to discuss their work on "Kimsuky Strikes Again | New Social Engineering Campaign Aims to Steal Credentials and Gather Strategic Intelligence." Researchers have been tracking the North Korean APT group Kimsuky and their attempt at a social engineering campaign targeting experts in North Korean affairs.</p><p>The research states "The campaign has the objective of stealing Google and subscription credentials of a reputable news and analysis service focusing on North Korea, as well as delivering reconnaissance malware." Kimsuky has been tracked engaging in extensive email correspondence using spoofed URLs and extensive email correspondence, along with Office documents weaponized with the ReconShark malware.</p><p>The research can be found here:</p><ul><li><a href="https://www.sentinelone.com/labs/kimsuky-new-social-engineering-campaign-aims-to-steal-credentials-and-gather-strategic-intelligence/">Kimsuky Strikes Again | New Social Engineering Campaign Aims to Steal Credentials and Gather Strategic Intelligence</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>986</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6e0a9e90-8165-11ed-9a77-d3d9fbce606b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8496835714.mp3?updated=1691089395" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing for leeches.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/292/notes</link>
      <description>Ashlee Benge from ReversingLabs discussing their research titled "Operation Brainleeches: Malicious npm packages fuel supply chain and phishing attacks." Researchers recently discovered over a dozen malicious packages published to the npm open source repository. These packages are targeting Microsoft 365 users and appear to target application end users while also supporting email phishing campaigns.
Research supports that the malicious campaign encompassed more than a dozen files designed to steal sensitive user credentials. The research states "This most recent campaign caught our attention because of a number of features and characteristics in related npm packages that correlate with malicious intent."
The research can be found here:
Operation Brainleeches: Malicious npm packages fuel supply chain and phishing attacks

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 Jul 2023 05:00:00 -0000</pubDate>
      <itunes:title>Phishing for leeches.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>291</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ashlee Benge from ReversingLabs discussing their research titled "Operation Brainleeches: Malicious npm packages fuel supply chain and phishing attacks." Researchers recently discovered over a dozen malicious packages published to the npm open source repository. These packages are targeting Microsoft 365 users and appear to target application end users while also supporting email phishing campaigns.
Research supports that the malicious campaign encompassed more than a dozen files designed to steal sensitive user credentials. The research states "This most recent campaign caught our attention because of a number of features and characteristics in related npm packages that correlate with malicious intent."
The research can be found here:
Operation Brainleeches: Malicious npm packages fuel supply chain and phishing attacks

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ashlee Benge from ReversingLabs discussing their research titled "Operation Brainleeches: Malicious npm packages fuel supply chain and phishing attacks." Researchers recently discovered over a dozen malicious packages published to the npm open source repository. These packages are targeting Microsoft 365 users and appear to target application end users while also supporting email phishing campaigns.</p><p>Research supports that the malicious campaign encompassed more than a dozen files designed to steal sensitive user credentials. The research states "This most recent campaign caught our attention because of a number of features and characteristics in related npm packages that correlate with malicious intent."</p><p>The research can be found here:</p><ul><li><a href="https://www.reversinglabs.com/blog/operation-brainleeches-malicious-npm-packages-fuel-supply-chain-and-phishing-attacks">Operation Brainleeches: Malicious npm packages fuel supply chain and phishing attacks</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1170</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6df1779e-8165-11ed-9a77-0ff0bce99612]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1865831811.mp3?updated=1690482235" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Welcome to New York, it's been waitin' for you.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/291/notes</link>
      <description>Joshua Miller from Proofpoint joins Dave to discuss findings on "Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware." In mid May, TA453, also known as Charming Kitten, APT42, Mint Sandstorm, and Yellow Garuda, was found sending a benign conversation lure masquerading as a senior fellow with the Royal United Services Institute (RUSI) to the public media contact for a nuclear security expert at a US-based think tank focused on foreign affairs.
The research states that "the email solicited feedback on a project called “Iran in the Global Security Context” and requested permission to send a draft for review." Proofpoint shares it's findings and what you can expect from the threat group.
The research can be found here:
Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Jul 2023 05:00:00 -0000</pubDate>
      <itunes:title>Welcome to New York, it's been waitin' for you.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>291</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joshua Miller from Proofpoint joins Dave to discuss findings on "Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware." In mid May, TA453, also known as Charming Kitten, APT42, Mint Sandstorm, and Yellow Garuda, was found sending a benign conversation lure masquerading as a senior fellow with the Royal United Services Institute (RUSI) to the public media contact for a nuclear security expert at a US-based think tank focused on foreign affairs.
The research states that "the email solicited feedback on a project called “Iran in the Global Security Context” and requested permission to send a draft for review." Proofpoint shares it's findings and what you can expect from the threat group.
The research can be found here:
Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joshua Miller from Proofpoint joins Dave to discuss findings on "Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware." In mid May, TA453, also known as Charming Kitten, APT42, Mint Sandstorm, and Yellow Garuda, was found sending a benign conversation lure masquerading as a senior fellow with the Royal United Services Institute (RUSI) to the public media contact for a nuclear security expert at a US-based think tank focused on foreign affairs.</p><p>The research states that "the email solicited feedback on a project called “Iran in the Global Security Context” and requested permission to send a draft for review." Proofpoint shares it's findings and what you can expect from the threat group.</p><p>The research can be found here:</p><ul><li><a href="https://www.proofpoint.com/us/blog/threat-insight/welcome-new-york-exploring-ta453s-foray-lnks-and-mac-malware">Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1112</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6dd8bc68-8165-11ed-9a77-633aed0fb62b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4025859966.mp3?updated=1689959545" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SCARLETEEL zaps back again. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/290/notes</link>
      <description>Michael Clark from Sysdig joins with Dave to discuss their research on SCARLETEEL 2.0: Fargate, Kubernetes, and Crypto. New research from Sysdig threat researchers found that the group continues to thrive with improved tactics. Most recently, they gained access to AWS Fargate, a more sophisticated environment to breach, thanks to their upgraded attack tools.
The research states "In their most recent activities, we saw a similar strategy to what was reported in the previous blog: compromise AWS accounts through exploiting vulnerable compute services, gain persistence, and attempt to make money using cryptominers." Had Sysdig not thwarted SCARLETEEL's attack, they estimated that they would have mined $4,000 per day until they were stopped.
The research can be found here:
SCARLETEEL 2.0: Fargate,Kubernetes, and Crypto

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Jul 2023 05:00:00 -0000</pubDate>
      <itunes:title>SCARLETEEL zaps back again. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>290</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Michael Clark from Sysdig joins with Dave to discuss their research on SCARLETEEL 2.0: Fargate, Kubernetes, and Crypto. New research from Sysdig threat researchers found that the group continues to thrive with improved tactics. Most recently, they gained access to AWS Fargate, a more sophisticated environment to breach, thanks to their upgraded attack tools.
The research states "In their most recent activities, we saw a similar strategy to what was reported in the previous blog: compromise AWS accounts through exploiting vulnerable compute services, gain persistence, and attempt to make money using cryptominers." Had Sysdig not thwarted SCARLETEEL's attack, they estimated that they would have mined $4,000 per day until they were stopped.
The research can be found here:
SCARLETEEL 2.0: Fargate,Kubernetes, and Crypto

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Michael Clark from Sysdig joins with Dave to discuss their research on SCARLETEEL 2.0: Fargate, Kubernetes, and Crypto. New research from Sysdig threat researchers found that the group continues to thrive with improved tactics. Most recently, they gained access to AWS Fargate, a more sophisticated environment to breach, thanks to their upgraded attack tools.</p><p>The research states "In their most recent activities, we saw a similar strategy to what was reported in the previous blog: compromise AWS accounts through exploiting vulnerable compute services, gain persistence, and attempt to make money using cryptominers." Had Sysdig not thwarted SCARLETEEL's attack, they estimated that they would have mined $4,000 per day until they were stopped.</p><p>The research can be found here:</p><ul><li><a href="https://sysdig.com/blog/cloud-breach-terraform-data-theft/">SCARLETEEL 2.0: Fargate,Kubernetes, and Crypto</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1042</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6dc0164a-8165-11ed-9a77-bf53250e2620]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1352614609.mp3?updated=1689270090" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Creating PANDA-monium. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/289/notes</link>
      <description>Thomas Etheridge from CrowdStrike sits down to discuss their work on "Business as Usual: Falcon Complete MDR Thwarts Novel VANGUARD PANDA (Volt Typhoon) Tradecraft" In May of 2023, industry and government sources detailed China-nexus activity where they found the threat actor dubbed Volt Typhoon targeted U.S. based critical infrastructure entities. CrowdStrike's Intelligence team tracked this actor as VANGUARD PANDA. 
With CISA’s advisory on VANGUARD PANDA and its link to Chinese adversaries who are increasingly targeting US businesses and critical infrastructure, CrowdStrike’s blog dives deeper into the risks of VANGUARD PANDA. The research says "One specific VANGUARD PANDA incident stands out to review in detail. Falcon Complete responded to a detection that was triggered by suspicious reconnaissance commands executed under an Apache Tomcat web server running ManageEngine ADSelfService Plus."
The research can be found here:
Business as Usual: Falcon Complete MDR Thwarts Novel VANGUARD PANDA (Volt Typhoon) Tradecraft

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Jul 2023 05:00:00 -0000</pubDate>
      <itunes:title>Creating PANDA-monium. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>289</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thomas Etheridge from CrowdStrike sits down to discuss their work on "Business as Usual: Falcon Complete MDR Thwarts Novel VANGUARD PANDA (Volt Typhoon) Tradecraft" In May of 2023, industry and government sources detailed China-nexus activity where they found the threat actor dubbed Volt Typhoon targeted U.S. based critical infrastructure entities. CrowdStrike's Intelligence team tracked this actor as VANGUARD PANDA. 
With CISA’s advisory on VANGUARD PANDA and its link to Chinese adversaries who are increasingly targeting US businesses and critical infrastructure, CrowdStrike’s blog dives deeper into the risks of VANGUARD PANDA. The research says "One specific VANGUARD PANDA incident stands out to review in detail. Falcon Complete responded to a detection that was triggered by suspicious reconnaissance commands executed under an Apache Tomcat web server running ManageEngine ADSelfService Plus."
The research can be found here:
Business as Usual: Falcon Complete MDR Thwarts Novel VANGUARD PANDA (Volt Typhoon) Tradecraft

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thomas Etheridge from CrowdStrike sits down to discuss their work on "Business as Usual: Falcon Complete MDR Thwarts Novel VANGUARD PANDA (Volt Typhoon) Tradecraft" In May of 2023, industry and government sources detailed China-nexus activity where they found the threat actor dubbed Volt Typhoon targeted U.S. based critical infrastructure entities. CrowdStrike's Intelligence team tracked this actor as VANGUARD PANDA. </p><p>With CISA’s advisory on VANGUARD PANDA and its link to Chinese adversaries who are increasingly targeting US businesses and critical infrastructure, CrowdStrike’s blog dives deeper into the risks of VANGUARD PANDA. The research says "One specific VANGUARD PANDA incident stands out to review in detail. Falcon Complete responded to a detection that was triggered by suspicious reconnaissance commands executed under an Apache Tomcat web server running ManageEngine ADSelfService Plus."</p><p>The research can be found here:</p><ul><li><a href="https://www.crowdstrike.com/blog/falcon-complete-thwarts-vanguard-panda-tradecraft/">Business as Usual: Falcon Complete MDR Thwarts Novel VANGUARD PANDA (Volt Typhoon) Tradecraft</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1023</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6da7c90a-8165-11ed-9a77-9fa5d94d68b3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8035830730.mp3?updated=1688758041" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The power behind artificial intelligence. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/288/notes</link>
      <description>Daniel dos Santos, Forescout's Head of Security Research is sharing insights from a recent exercise his team conducted on AI-assisted attacks for OT and unmanaged devices. Using ChatGPT, Forescout’s research team converted an existing OT exploit developed in Python to run on Windows to demonstrate how easy it is to create an AI-assisted attack that converts the original exploit into alternative programming languages.
The research states "our goal was to convert an existing OT exploit developed in Python to run on Windows to the Go language using ChatGPT." This would then allow it to run faster on Windows and run easily on a variety of embedded devices.
The research can be found here:
AI-Assisted Attacks Are Coming to OT and Unmanaged Devices – the Time to Prepare Is Now

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Jul 2023 05:00:00 -0000</pubDate>
      <itunes:title>The power behind artificial intelligence. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>288</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Daniel dos Santos, Forescout's Head of Security Research is sharing insights from a recent exercise his team conducted on AI-assisted attacks for OT and unmanaged devices. Using ChatGPT, Forescout’s research team converted an existing OT exploit developed in Python to run on Windows to demonstrate how easy it is to create an AI-assisted attack that converts the original exploit into alternative programming languages.
The research states "our goal was to convert an existing OT exploit developed in Python to run on Windows to the Go language using ChatGPT." This would then allow it to run faster on Windows and run easily on a variety of embedded devices.
The research can be found here:
AI-Assisted Attacks Are Coming to OT and Unmanaged Devices – the Time to Prepare Is Now

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Daniel dos Santos, Forescout's Head of Security Research is sharing insights from a recent exercise his team conducted on AI-assisted attacks for OT and unmanaged devices. Using ChatGPT, Forescout’s research team converted an existing OT exploit developed in Python to run on Windows to demonstrate how easy it is to create an AI-assisted attack that converts the original exploit into alternative programming languages.</p><p>The research states "our goal was to convert an existing OT exploit developed in Python to run on Windows to the Go language using ChatGPT." This would then allow it to run faster on Windows and run easily on a variety of embedded devices.</p><p>The research can be found here:</p><ul><li><a href="https://www.forescout.com/blog/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices/">AI-Assisted Attacks Are Coming to OT and Unmanaged Devices – the Time to Prepare Is Now</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1134</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6d8f4e98-8165-11ed-9a77-2301766b66e0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4301112880.mp3?updated=1687974075" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unleashing the crypto gold rush. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/287/notes</link>
      <description>Ian Ahl from Permiso's PØ Labs joins Dave to discuss their research on "Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor." First observing the group in 2021, they discovered GUI-vil is a financially motivated threat group primarily focused on unauthorized cryptocurrency mining activities.
The research states "the group has been observed exploiting Amazon Web Services (AWS) EC2 instances to facilitate their illicit crypto mining operations." This group is dangerous because unlike many groups focused on crypto mining, GUI-Vil apply a personal touch when establishing a foothold in an environment.
The research can be found here:
Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Jun 2023 05:00:00 -0000</pubDate>
      <itunes:title>Unleashing the crypto gold rush. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>287</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ian Ahl from Permiso's PØ Labs joins Dave to discuss their research on "Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor." First observing the group in 2021, they discovered GUI-vil is a financially motivated threat group primarily focused on unauthorized cryptocurrency mining activities.
The research states "the group has been observed exploiting Amazon Web Services (AWS) EC2 instances to facilitate their illicit crypto mining operations." This group is dangerous because unlike many groups focused on crypto mining, GUI-Vil apply a personal touch when establishing a foothold in an environment.
The research can be found here:
Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ian Ahl from Permiso's PØ Labs joins Dave to discuss their research on "Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor." First observing the group in 2021, they discovered GUI-vil is a financially motivated threat group primarily focused on unauthorized cryptocurrency mining activities.</p><p>The research states "the group has been observed exploiting Amazon Web Services (AWS) EC2 instances to facilitate their illicit crypto mining operations." This group is dangerous because unlike many groups focused on crypto mining, GUI-Vil apply a personal touch when establishing a foothold in an environment.</p><p>The research can be found here:</p><ul><li><a href="https://permiso.io/blog/s/unmasking-guivil-new-cloud-threat-actor/">Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6d7755fe-8165-11ed-9a77-ebb8461ff735]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3856796173.mp3?updated=1687490795" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Managing machine learning risks.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/286/notes</link>
      <description>Our guest, Johannes Ullrich from SANS Institute, joins Dave to discuss their research on "Machine Learning Risks: Attacks Against Apache NiFi." Using their honeypot network, researchers were able to collect some interesting data about a threat actor who is currently going after exposed Apache NiFi servers.
Researchers state “On May 19th, our distributed sensor network detected a notable spike in requests for ‘/nifi.’” Investigating further, they instructed a subset of their sensors to forward requests to an actual Apache NiFi instance and within a couple of hours the honeypot was completely compromised.
The research can be found here:
Machine Learning Risks: Attacks Against Apache NiFi

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Jun 2023 05:00:00 -0000</pubDate>
      <itunes:title>Managing machine learning risks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>286</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Our guest, Johannes Ullrich from SANS Institute, joins Dave to discuss their research on "Machine Learning Risks: Attacks Against Apache NiFi." Using their honeypot network, researchers were able to collect some interesting data about a threat actor who is currently going after exposed Apache NiFi servers.
Researchers state “On May 19th, our distributed sensor network detected a notable spike in requests for ‘/nifi.’” Investigating further, they instructed a subset of their sensors to forward requests to an actual Apache NiFi instance and within a couple of hours the honeypot was completely compromised.
The research can be found here:
Machine Learning Risks: Attacks Against Apache NiFi

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Our guest, Johannes Ullrich from SANS Institute, joins Dave to discuss their research on "Machine Learning Risks: Attacks Against Apache NiFi." Using their honeypot network, researchers were able to collect some interesting data about a threat actor who is currently going after exposed Apache NiFi servers.</p><p>Researchers state “On May 19th, our distributed sensor network detected a notable spike in requests for ‘/nifi.’” Investigating further, they instructed a subset of their sensors to forward requests to an actual Apache NiFi instance and within a couple of hours the honeypot was completely compromised.</p><p>The research can be found here:</p><ul><li><a href="https://jbu.me/nifireport.pdf">Machine Learning Risks: Attacks Against Apache NiFi</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1114</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6d5e6b02-8165-11ed-9a77-7f76be675980]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6811691365.mp3?updated=1686928324" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A new botnet takes a frosty bite out of the gaming industry.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/285/notes</link>
      <description>Our guest, Allen West from Akamai's SIRT team, joins Dave to discuss their research on "The Dark Frost Enigma: An Unexpectedly Prevalent Botnet Author Profile." Akamai found this new botnet was targeting the gaming industry, modeled after Qbot, Mirai, and other malware strains. The botnet has expanded to encompass hundreds of compromised devices.
The research states "through reverse engineering and patching the malware binary, our analysis determined the botnet's attack potential at approximately 629.28 Gbps with its UDP flood attacks." Akamai researchers do a deep dive into the motives behind the attacks, the effectiveness of the attack, and how the law has been handling similar cases.
The research can be found here:
The Dark Frost Enigma: An Unexpectedly Prevalent Botnet Author Profile

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Jun 2023 05:00:00 -0000</pubDate>
      <itunes:title>A new botnet takes a frosty bite out of the gaming industry.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>285</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Our guest, Allen West from Akamai's SIRT team, joins Dave to discuss their research on "The Dark Frost Enigma: An Unexpectedly Prevalent Botnet Author Profile." Akamai found this new botnet was targeting the gaming industry, modeled after Qbot, Mirai, and other malware strains. The botnet has expanded to encompass hundreds of compromised devices.
The research states "through reverse engineering and patching the malware binary, our analysis determined the botnet's attack potential at approximately 629.28 Gbps with its UDP flood attacks." Akamai researchers do a deep dive into the motives behind the attacks, the effectiveness of the attack, and how the law has been handling similar cases.
The research can be found here:
The Dark Frost Enigma: An Unexpectedly Prevalent Botnet Author Profile

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Our guest, Allen West from Akamai's SIRT team, joins Dave to discuss their research on "The Dark Frost Enigma: An Unexpectedly Prevalent Botnet Author Profile." Akamai found this new botnet was targeting the gaming industry, modeled after Qbot, Mirai, and other malware strains. The botnet has expanded to encompass hundreds of compromised devices.</p><p>The research states "through reverse engineering and patching the malware binary, our analysis determined the botnet's attack potential at approximately 629.28 Gbps with its UDP flood attacks." Akamai researchers do a deep dive into the motives behind the attacks, the effectiveness of the attack, and how the law has been handling similar cases.</p><p>The research can be found here:</p><ul><li><a href="https://www.akamai.com/blog/security-research/dark-frost-botnet-unexpected-author-profile">The Dark Frost Enigma: An Unexpectedly Prevalent Botnet Author Profile</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1168</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6d43a5b0-8165-11ed-9a77-b7bb132341ad]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1619387993.mp3?updated=1686324396" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lancefly screams bloody Merdoor.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/284/notes</link>
      <description>Brigid O Gorman from Symantec joins Dave to discuss their research, “Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors." Researchers discovered in 2020 that Lancefly, an APT group, is using a custom-written backdoor in attacks targeting government, aviation, educations, and telecoms organizations in South and Southeast Asia.
The research states "The backdoor is used very selectively, appearing on just a handful of networks and a small number of machines over the years, with its use appearing to be highly targeted." These targets, though observed in some activity in 2020 and 2021, started in 2022 and have continued into 2023.
The research can be found here:
Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Jun 2023 05:00:00 -0000</pubDate>
      <itunes:title>Lancefly screams bloody Merdoor.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>284</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Brigid O Gorman from Symantec joins Dave to discuss their research, “Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors." Researchers discovered in 2020 that Lancefly, an APT group, is using a custom-written backdoor in attacks targeting government, aviation, educations, and telecoms organizations in South and Southeast Asia.
The research states "The backdoor is used very selectively, appearing on just a handful of networks and a small number of machines over the years, with its use appearing to be highly targeted." These targets, though observed in some activity in 2020 and 2021, started in 2022 and have continued into 2023.
The research can be found here:
Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Brigid O Gorman from Symantec joins Dave to discuss their research, “Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors." Researchers discovered in 2020 that Lancefly, an APT group, is using a custom-written backdoor in attacks targeting government, aviation, educations, and telecoms organizations in South and Southeast Asia.</p><p>The research states "The backdoor is used very selectively, appearing on just a handful of networks and a small number of machines over the years, with its use appearing to be highly targeted." These targets, though observed in some activity in 2020 and 2021, started in 2022 and have continued into 2023.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lancefly-merdoor-zxshell-custom-backdoor">Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>996</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6d2b104a-8165-11ed-9a77-ab4de8b7f50b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7566688496.mp3?updated=1685725551" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>8 GoAnywhere MFT breaches and counting.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/283/notes</link>
      <description>This week, our guests are Emily Austin and Himaja Motheram from Censys and their sharing their research - "Months after first GoAnywhere MFT zero-day attacks, Censys still sees about 180 public admin panels." In early February 2023, Censys researchers discovered a zero-day RCE vulnerability in Fortra’s “GoAnywhere MFT” (Managed File Transfer) software.
After finding this the Clop ransomware gang claimed that they exploited this vulnerability to breach the data of 130 organizations and Censys found other ransomware groups were jumping on the bandwagon. They said " A single vulnerable instance has the potential to serve as a gateway to a data breach that could potentially impact millions of individuals."
The research can be found here:
Months after first GoAnywhere MFT zero-day attacks, Censys still sees ~180 public admin panels

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 May 2023 05:00:00 -0000</pubDate>
      <itunes:title>8 GoAnywhere MFT breaches and counting.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>283</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, our guests are Emily Austin and Himaja Motheram from Censys and their sharing their research - "Months after first GoAnywhere MFT zero-day attacks, Censys still sees about 180 public admin panels." In early February 2023, Censys researchers discovered a zero-day RCE vulnerability in Fortra’s “GoAnywhere MFT” (Managed File Transfer) software.
After finding this the Clop ransomware gang claimed that they exploited this vulnerability to breach the data of 130 organizations and Censys found other ransomware groups were jumping on the bandwagon. They said " A single vulnerable instance has the potential to serve as a gateway to a data breach that could potentially impact millions of individuals."
The research can be found here:
Months after first GoAnywhere MFT zero-day attacks, Censys still sees ~180 public admin panels

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our guests are Emily Austin and Himaja Motheram from Censys and their sharing their research - "Months after first GoAnywhere MFT zero-day attacks, Censys still sees about 180 public admin panels." In early February 2023, Censys researchers discovered a zero-day RCE vulnerability in Fortra’s “GoAnywhere MFT” (Managed File Transfer) software.</p><p>After finding this the Clop ransomware gang claimed that they exploited this vulnerability to breach the data of 130 organizations and Censys found other ransomware groups were jumping on the bandwagon. They said " A single vulnerable instance has the potential to serve as a gateway to a data breach that could potentially impact millions of individuals."</p><p>The research can be found here:</p><ul><li><a href="https://censys.wpengine.com/months-after-first-goanywhere-mft-zero-day-attacks-censys-still-sees-180-public-admin-panels/">Months after first GoAnywhere MFT zero-day attacks, Censys still sees ~180 public admin panels</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1063</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6d123b1a-8165-11ed-9a77-fb0fb3306665]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9347562473.mp3?updated=1685050040" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dangerous vulnerabilities in H.264 decoders.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/282/notes</link>
      <description>Willy R. Vasquez from The University of Texas at Austin discussing research on "The Most Dangerous Codec in the World - Finding and Exploiting Vulnerabilities in H.264 Decoders." Researchers are looking at the marvel that is modern video encoding standards such as H.264 for vulnerabilities and ultimately hidden security risks.
The research states "We introduce and evaluate H26FORGE, domain-specific infrastructure for analyzing, generating, and manipulating syntactically correct but semantically spec-non-compliant video files." Using H26FORCE, they were able to uncover insecurities in depth across the video decoder ecosystem, including kernel memory corruption bugs in iOS and video accelerator and application processor kernel memory bugs in Android devices.
The research can be found here:
The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 May 2023 05:00:00 -0000</pubDate>
      <itunes:title>Dangerous vulnerabilities in H.264 decoders.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>282</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Willy R. Vasquez from The University of Texas at Austin discussing research on "The Most Dangerous Codec in the World - Finding and Exploiting Vulnerabilities in H.264 Decoders." Researchers are looking at the marvel that is modern video encoding standards such as H.264 for vulnerabilities and ultimately hidden security risks.
The research states "We introduce and evaluate H26FORGE, domain-specific infrastructure for analyzing, generating, and manipulating syntactically correct but semantically spec-non-compliant video files." Using H26FORCE, they were able to uncover insecurities in depth across the video decoder ecosystem, including kernel memory corruption bugs in iOS and video accelerator and application processor kernel memory bugs in Android devices.
The research can be found here:
The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Willy R. Vasquez from The University of Texas at Austin discussing research on "The Most Dangerous Codec in the World - Finding and Exploiting Vulnerabilities in H.264 Decoders." Researchers are looking at the marvel that is modern video encoding standards such as H.264 for vulnerabilities and ultimately hidden security risks.</p><p>The research states "We introduce and evaluate H26FORGE, domain-specific infrastructure for analyzing, generating, and manipulating syntactically correct but semantically spec-non-compliant video files." Using H26FORCE, they were able to uncover insecurities in depth across the video decoder ecosystem, including kernel memory corruption bugs in iOS and video accelerator and application processor kernel memory bugs in Android devices.</p><p>The research can be found here:</p><ul><li><a href="https://wrv.github.io/h26forge.pdf">The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1459</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6cf937fa-8165-11ed-9a77-3b8294d94587]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1917843059.mp3?updated=1684588517" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Running away from operation Tainted Love. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/281/notes</link>
      <description>Aleksandar Milenkoski and Juan Andres Guerrero-Saade from SentinelOne's SentinelLabs join Dave to discuss their research "Operation Tainted Love | Chinese APTs Target Telcos in New Attacks." Researchers found initial phases of attacks against telecommunication providers in the Middle East in Q1 in 2023.
The research states "We assess that this activity represents an evolution of tooling associated with Operation Soft Cell." While the exact grouping is unclear, researchers think it is highly likely that the threat actor is a Chinese cyberespionage group in the nexus of Gallium and APT41.
The research can be found here:
Operation Tainted Love | Chinese APTs Target Telcos in New Attacks

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 May 2023 05:00:00 -0000</pubDate>
      <itunes:title>Running away from operation Tainted Love. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>281</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Aleksandar Milenkoski and Juan Andres Guerrero-Saade from SentinelOne's SentinelLabs join Dave to discuss their research "Operation Tainted Love | Chinese APTs Target Telcos in New Attacks." Researchers found initial phases of attacks against telecommunication providers in the Middle East in Q1 in 2023.
The research states "We assess that this activity represents an evolution of tooling associated with Operation Soft Cell." While the exact grouping is unclear, researchers think it is highly likely that the threat actor is a Chinese cyberespionage group in the nexus of Gallium and APT41.
The research can be found here:
Operation Tainted Love | Chinese APTs Target Telcos in New Attacks

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Aleksandar Milenkoski and Juan Andres Guerrero-Saade from SentinelOne's SentinelLabs join Dave to discuss their research "Operation Tainted Love | Chinese APTs Target Telcos in New Attacks." Researchers found initial phases of attacks against telecommunication providers in the Middle East in Q1 in 2023.</p><p>The research states "We assess that this activity represents an evolution of tooling associated with Operation Soft Cell." While the exact grouping is unclear, researchers think it is highly likely that the threat actor is a Chinese cyberespionage group in the nexus of Gallium and APT41.</p><p>The research can be found here:</p><ul><li><a href="https://www.sentinelone.com/labs/operation-tainted-love-chinese-apts-target-telcos-in-new-attacks/">Operation Tainted Love | Chinese APTs Target Telcos in New Attacks</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1368</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6cdfca5e-8165-11ed-9a77-d7ce001c7b72]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7188630748.mp3?updated=1684765611" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing campaign takes the energy out of Chinese nuclear industry. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/280/notes</link>
      <description>Ryan Robinson from Intezer to discuss his team's work on "Phishing Campaign Targets Chinese Nuclear Energy Industry." The research team discovered activity targeting the nuclear energy industry in China. Researchers attributed the activity to Bitter APT, a South Asian APT that is known to target the energy, manufacturing and government sectors, mainly in Pakistan, China, Bangladesh, and Saudi Arabia.
The article states "We identified seven emails pretending to be from the Embassy of Kyrgyzstan, being sent to recipients in the nuclear energy industry in China. In some emails, people and entities in academia are also targeted, also related to nuclear energy." By luring recipients in, invites them to join conferences on subjects that are relevant to them, they are then able to social engineer the victims.
The research can be found here:
Phishing Campaign Targets Chinese Nuclear Energy Industry

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 May 2023 05:00:00 -0000</pubDate>
      <itunes:title>Phishing campaign takes the energy out of Chinese nuclear industry. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>280</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ryan Robinson from Intezer to discuss his team's work on "Phishing Campaign Targets Chinese Nuclear Energy Industry." The research team discovered activity targeting the nuclear energy industry in China. Researchers attributed the activity to Bitter APT, a South Asian APT that is known to target the energy, manufacturing and government sectors, mainly in Pakistan, China, Bangladesh, and Saudi Arabia.
The article states "We identified seven emails pretending to be from the Embassy of Kyrgyzstan, being sent to recipients in the nuclear energy industry in China. In some emails, people and entities in academia are also targeted, also related to nuclear energy." By luring recipients in, invites them to join conferences on subjects that are relevant to them, they are then able to social engineer the victims.
The research can be found here:
Phishing Campaign Targets Chinese Nuclear Energy Industry

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ryan Robinson from Intezer to discuss his team's work on "Phishing Campaign Targets Chinese Nuclear Energy Industry." The research team discovered activity targeting the nuclear energy industry in China. Researchers attributed the activity to Bitter APT, a South Asian APT that is known to target the energy, manufacturing and government sectors, mainly in Pakistan, China, Bangladesh, and Saudi Arabia.</p><p>The article states "We identified seven emails pretending to be from the Embassy of Kyrgyzstan, being sent to recipients in the nuclear energy industry in China. In some emails, people and entities in academia are also targeted, also related to nuclear energy." By luring recipients in, invites them to join conferences on subjects that are relevant to them, they are then able to social engineer the victims.</p><p>The research can be found here:</p><ul><li><a href="https://www.intezer.com/blog/research/phishing-campaign-targets-nuclear-energy-industry/">Phishing Campaign Targets Chinese Nuclear Energy Industry</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1255</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6cc7c152-8165-11ed-9a77-ff3c4cb27593]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6081029517.mp3?updated=1685127572" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>HinataBot focuses on DDoS attack.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/279/notes</link>
      <description>This week our guests are, Larry Cashdollar, Chad Seaman and Allen West from Akamai Technologies, and they are discussing their research on "Uncovering HinataBot: A Deep Dive into a Go-Based Threat." The team discovered a new Go-based, DDoS-focused botnet. They found it was named after the popular anime show "Naruto," they are calling it "HinataBot"
In the research it says "HinataBot was seen being distributed during the first three months of 2023 and is actively being updated by the authors/operators." Akamai was able to get a deep look into the malware works by using a combination of reverse engineering the malware and imitating the command and control (C2) server.
The research can be found here:
Uncovering HinataBot: A Deep Dive into a Go-Based Threat

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 Apr 2023 05:00:00 -0000</pubDate>
      <itunes:title>HinataBot focuses on DDoS attack.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>279</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week our guests are, Larry Cashdollar, Chad Seaman and Allen West from Akamai Technologies, and they are discussing their research on "Uncovering HinataBot: A Deep Dive into a Go-Based Threat." The team discovered a new Go-based, DDoS-focused botnet. They found it was named after the popular anime show "Naruto," they are calling it "HinataBot"
In the research it says "HinataBot was seen being distributed during the first three months of 2023 and is actively being updated by the authors/operators." Akamai was able to get a deep look into the malware works by using a combination of reverse engineering the malware and imitating the command and control (C2) server.
The research can be found here:
Uncovering HinataBot: A Deep Dive into a Go-Based Threat

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week our guests are, Larry Cashdollar, Chad Seaman and Allen West from Akamai Technologies, and they are discussing their research on "Uncovering HinataBot: A Deep Dive into a Go-Based Threat." The team discovered a new Go-based, DDoS-focused botnet. They found it was named after the popular anime show "Naruto," they are calling it "HinataBot"</p><p>In the research it says "HinataBot was seen being distributed during the first three months of 2023 and is actively being updated by the authors/operators." Akamai was able to get a deep look into the malware works by using a combination of reverse engineering the malware and imitating the command and control (C2) server.</p><p>The research can be found here:</p><ul><li><a href="https://www.akamai.com/blog/security-research/hinatabot-uncovering-new-golang-ddos-botnet">Uncovering HinataBot: A Deep Dive into a Go-Based Threat</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1646</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6caee5e2-8165-11ed-9a77-4fd87e62b833]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3789885143.mp3?updated=1685127564" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Don't let the Elon Musk crypto giveaway scam swindle you.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/278/notes</link>
      <description>Shiran Guez from Akamai sits down with Dave to discuss their research on "Chatbots, Celebrities, and Victim Retargeting and Why Crypto Giveaway Scams Are Still So Successful." Researchers at Akamai have been on the lookout for crypto giveaway scams. These scams have been impersonating celebrities and brands, most notably Elon Musk and his associated companies.
The research states "the scams are delivered through various social media platforms as well as direct messaging apps such as WhatsApp or Telegram." These scams have helped add to the existing damages that exceed $1 billion caused by crypto fraud.
The research can be found here:
Chatbots, Celebrities, and Victim Retargeting: Why Crypto Giveaway Scams Are Still So Successful

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Apr 2023 05:00:00 -0000</pubDate>
      <itunes:title>Don't let the Elon Musk crypto giveaway scam swindle you.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>278</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Shiran Guez from Akamai sits down with Dave to discuss their research on "Chatbots, Celebrities, and Victim Retargeting and Why Crypto Giveaway Scams Are Still So Successful." Researchers at Akamai have been on the lookout for crypto giveaway scams. These scams have been impersonating celebrities and brands, most notably Elon Musk and his associated companies.
The research states "the scams are delivered through various social media platforms as well as direct messaging apps such as WhatsApp or Telegram." These scams have helped add to the existing damages that exceed $1 billion caused by crypto fraud.
The research can be found here:
Chatbots, Celebrities, and Victim Retargeting: Why Crypto Giveaway Scams Are Still So Successful

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Shiran Guez from Akamai sits down with Dave to discuss their research on "Chatbots, Celebrities, and Victim Retargeting and Why Crypto Giveaway Scams Are Still So Successful." Researchers at Akamai have been on the lookout for crypto giveaway scams. These scams have been impersonating celebrities and brands, most notably Elon Musk and his associated companies.</p><p>The research states "the scams are delivered through various social media platforms as well as direct messaging apps such as WhatsApp or Telegram." These scams have helped add to the existing damages that exceed $1 billion caused by crypto fraud.</p><p>The research can be found here:</p><ul><li><a href="https://www.akamai.com/blog/security-research/crypto-giveaway-scams-are-still-successful">Chatbots, Celebrities, and Victim Retargeting: Why Crypto Giveaway Scams Are Still So Successful</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1162</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6c96cc96-8165-11ed-9a77-1b5e4f552a8d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4259011873.mp3?updated=1685127414" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New Dero cryptojacking operation concentrates on locating Kubernetes.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/277/notes</link>
      <description>Scott Fanning, Senior Director of Product Management, Cloud Security at CrowdStrike, sits down to talk about the first-ever Dero cryptojacking operation targeting Kubernetes infrastructure. The research defines Dero as "a cryptocurrency that claims to offer improved privacy, anonymity and higher and faster monetary rewards compared to Monero, which is a commonly used cryptocurrency in cryptojacking operations."
CrowdStrike was the first organization to discover Dero, and has been observing the cryptojacking operation since the beginning of February 2023. The operation focuses mainly on locating Kubernetes clusters with anonymous access enabled on a Kubernetes API and listening on non-standard ports accessible from the internet.
The research can be found here:
CrowdStrike Discovers First-Ever Dero Cryptojacking Campaign Targeting Kubernetes

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Apr 2023 05:00:00 -0000</pubDate>
      <itunes:title>New Dero cryptojacking operation concentrates on locating Kubernetes.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>277</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Scott Fanning, Senior Director of Product Management, Cloud Security at CrowdStrike, sits down to talk about the first-ever Dero cryptojacking operation targeting Kubernetes infrastructure. The research defines Dero as "a cryptocurrency that claims to offer improved privacy, anonymity and higher and faster monetary rewards compared to Monero, which is a commonly used cryptocurrency in cryptojacking operations."
CrowdStrike was the first organization to discover Dero, and has been observing the cryptojacking operation since the beginning of February 2023. The operation focuses mainly on locating Kubernetes clusters with anonymous access enabled on a Kubernetes API and listening on non-standard ports accessible from the internet.
The research can be found here:
CrowdStrike Discovers First-Ever Dero Cryptojacking Campaign Targeting Kubernetes

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Scott Fanning, Senior Director of Product Management, Cloud Security at CrowdStrike, sits down to talk about the first-ever Dero cryptojacking operation targeting Kubernetes infrastructure. The research defines Dero as "a cryptocurrency that claims to offer improved privacy, anonymity and higher and faster monetary rewards compared to Monero, which is a commonly used cryptocurrency in cryptojacking operations."</p><p>CrowdStrike was the first organization to discover Dero, and has been observing the cryptojacking operation since the beginning of February 2023. The operation focuses mainly on locating Kubernetes clusters with anonymous access enabled on a Kubernetes API and listening on non-standard ports accessible from the internet.</p><p>The research can be found here:</p><ul><li><a href="https://www.crowdstrike.com/blog/crowdstrike-discovers-first-ever-dero-cryptojacking-campaign-targeting-kubernetes/">CrowdStrike Discovers First-Ever Dero Cryptojacking Campaign Targeting Kubernetes</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>868</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6c7db8fa-8165-11ed-9a77-e7074c06d316]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6077153667.mp3?updated=1685127550" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A dark side to LLMs.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/276/notes</link>
      <description>Sahar Abdelnabi from CISPA Helmholtz Center for Information Security sits down with Dave to discuss their work on "A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models." There is currently a large advance in the capabilities of Large Language Models or LLMs, as well as being integrated into many systems, including integrated development environments (IDEs) and search engines.
The research states, "The functionalities of current LLMs can be modulated via natural language prompts, while their exact internal functionality remains implicit and unassessable." This could lead them to be susceptible to targeted adversarial prompting, as well as making them adaptable to even unseen tasks. Researchers demonstrated these said attacks to see if the LLMs needed new techniques for more defense.
The research can be found here:
More than you've asked for: A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Apr 2023 05:00:00 -0000</pubDate>
      <itunes:title>A dark side to LLMs.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>276</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Sahar Abdelnabi from CISPA Helmholtz Center for Information Security sits down with Dave to discuss their work on "A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models." There is currently a large advance in the capabilities of Large Language Models or LLMs, as well as being integrated into many systems, including integrated development environments (IDEs) and search engines.
The research states, "The functionalities of current LLMs can be modulated via natural language prompts, while their exact internal functionality remains implicit and unassessable." This could lead them to be susceptible to targeted adversarial prompting, as well as making them adaptable to even unseen tasks. Researchers demonstrated these said attacks to see if the LLMs needed new techniques for more defense.
The research can be found here:
More than you've asked for: A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Sahar Abdelnabi from CISPA Helmholtz Center for Information Security sits down with Dave to discuss their work on "A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models." There is currently a large advance in the capabilities of Large Language Models or LLMs, as well as being integrated into many systems, including integrated development environments (IDEs) and search engines.</p><p>The research states, "The functionalities of current LLMs can be modulated via natural language prompts, while their exact internal functionality remains implicit and unassessable." This could lead them to be susceptible to targeted adversarial prompting, as well as making them adaptable to even unseen tasks. Researchers demonstrated these said attacks to see if the LLMs needed new techniques for more defense.</p><p>The research can be found here:</p><ul><li><a href="https://arxiv.org/abs/2302.12173">More than you've asked for: A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1066</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6c653398-8165-11ed-9a77-97d23497788e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4447037849.mp3?updated=1685127543" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Blackfly flies back again.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/275/notes</link>
      <description>Dick O'Brien from Symantec’s Threat Hunter team discusses their research on "Blackfly - Espionage Group Targets Materials Technology." Researchers say the Blackfly espionage group (aka APT41), has been mounting attacks against Asian materials and composite organizations in attempts to steal intellectual property.
This group has been known as one of the longest known Chinese advanced persistent threat (APT) groups since at least 2010. The research shares that "early attacks were distinguished by the use of the PlugX/Fast (Backdoor.Korplug), Winnti/Pasteboy (Backdoor.Winnti), and Shadowpad (Backdoor.Shadowpad) malware families."
The research can be found here: 
Blackfly: Espionage Group Targets Materials Technology

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Apr 2023 05:00:00 -0000</pubDate>
      <itunes:title>Blackfly flies back again.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>275</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dick O'Brien from Symantec’s Threat Hunter team discusses their research on "Blackfly - Espionage Group Targets Materials Technology." Researchers say the Blackfly espionage group (aka APT41), has been mounting attacks against Asian materials and composite organizations in attempts to steal intellectual property.
This group has been known as one of the longest known Chinese advanced persistent threat (APT) groups since at least 2010. The research shares that "early attacks were distinguished by the use of the PlugX/Fast (Backdoor.Korplug), Winnti/Pasteboy (Backdoor.Winnti), and Shadowpad (Backdoor.Shadowpad) malware families."
The research can be found here: 
Blackfly: Espionage Group Targets Materials Technology

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dick O'Brien from Symantec’s Threat Hunter team discusses their research on "Blackfly - Espionage Group Targets Materials Technology." Researchers say the Blackfly espionage group (aka APT41), has been mounting attacks against Asian materials and composite organizations in attempts to steal intellectual property.</p><p>This group has been known as one of the longest known Chinese advanced persistent threat (APT) groups since at least 2010. The research shares that "early attacks were distinguished by the use of the PlugX/Fast (Backdoor.Korplug), Winnti/Pasteboy (Backdoor.Winnti), and Shadowpad (Backdoor.Shadowpad) malware families."</p><p>The research can be found here: </p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/blackfly-espionage-materials">Blackfly: Espionage Group Targets Materials Technology</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>814</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6c4bce58-8165-11ed-9a77-07bc920bc38e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2992553949.mp3?updated=1685127532" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Popunders are not the good kind of ads. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/274/notes</link>
      <description>On this episode, Jérôme Segura, senior threat researcher at Malwarebytes, shares his team's work, "WordPress sites backdoored with ad fraud plugin." WordPress is an immensely popular content management system (CMS) powering over 43% of all websites. Many webmasters will monetize their sites by running ads and need to draw particular attention to search engine optimization (SEO) techniques to maximize their revenues.
The Malwarebytes team discovered a few dozen WordPress blogs using the same plugin that mimics human activity by automatically scrolling a page and following links within it, all the while a number of ads were being loaded and refreshed. The blogs would only exhibit this invalid traffic behavior when launched from a specific URL created by this plugin, otherwise they appeared completely legitimate.
The research can be found here:
WordPress sites backdoored with ad fraud plugin

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Mar 2023 05:00:00 -0000</pubDate>
      <itunes:title>Popunders are not the good kind of ads. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>274</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this episode, Jérôme Segura, senior threat researcher at Malwarebytes, shares his team's work, "WordPress sites backdoored with ad fraud plugin." WordPress is an immensely popular content management system (CMS) powering over 43% of all websites. Many webmasters will monetize their sites by running ads and need to draw particular attention to search engine optimization (SEO) techniques to maximize their revenues.
The Malwarebytes team discovered a few dozen WordPress blogs using the same plugin that mimics human activity by automatically scrolling a page and following links within it, all the while a number of ads were being loaded and refreshed. The blogs would only exhibit this invalid traffic behavior when launched from a specific URL created by this plugin, otherwise they appeared completely legitimate.
The research can be found here:
WordPress sites backdoored with ad fraud plugin

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this episode, Jérôme Segura, senior threat researcher at Malwarebytes, shares his team's work, "WordPress sites backdoored with ad fraud plugin." WordPress is an immensely popular content management system (CMS) powering over 43% of all websites. Many webmasters will monetize their sites by running ads and need to draw particular attention to search engine optimization (SEO) techniques to maximize their revenues.</p><p>The Malwarebytes team discovered a few dozen WordPress blogs using the same plugin that mimics human activity by automatically scrolling a page and following links within it, all the while a number of ads were being loaded and refreshed. The blogs would only exhibit this invalid traffic behavior when launched from a specific URL created by this plugin, otherwise they appeared completely legitimate.</p><p>The research can be found here:</p><ul><li><a href="https://www.malwarebytes.com/blog/threat-intelligence/2023/02/wordpress-sites-backdoored-with-ad-fraud-plugin">WordPress sites backdoored with ad fraud plugin</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1477</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6c337ccc-8165-11ed-9a77-1f15f76738bf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8022140148.mp3?updated=1685127527" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ChatGPT grants malicious wishes? </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/273/notes</link>
      <description>Bar Block, Threat Intelligence Researcher at Deep Instinct, joins Dave to discuss their work on "ChatGPT and Malware - Making Your Malicious Wishes Come True." Deep Instinct goes into depth on just how dangerous ChatGPT can be in the wrong hands as well as how artificial intelligence is better at creating malware than providing ways to detect it.
Researchers go on to explain how the AI app can be used in the wrong hands saying "Examples of malicious content created by the AI tool, such as phishing messages, information stealers, and encryption software, have all been shared online."
The research can be found here:
ChatGPT and Malware: Making Your Malicious Wishes Come True

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Mar 2023 05:00:00 -0000</pubDate>
      <itunes:title>ChatGPT grants malicious wishes? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>273</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Bar Block, Threat Intelligence Researcher at Deep Instinct, joins Dave to discuss their work on "ChatGPT and Malware - Making Your Malicious Wishes Come True." Deep Instinct goes into depth on just how dangerous ChatGPT can be in the wrong hands as well as how artificial intelligence is better at creating malware than providing ways to detect it.
Researchers go on to explain how the AI app can be used in the wrong hands saying "Examples of malicious content created by the AI tool, such as phishing messages, information stealers, and encryption software, have all been shared online."
The research can be found here:
ChatGPT and Malware: Making Your Malicious Wishes Come True

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Bar Block, Threat Intelligence Researcher at Deep Instinct, joins Dave to discuss their work on "ChatGPT and Malware - Making Your Malicious Wishes Come True." Deep Instinct goes into depth on just how dangerous ChatGPT can be in the wrong hands as well as how artificial intelligence is better at creating malware than providing ways to detect it.</p><p>Researchers go on to explain how the AI app can be used in the wrong hands saying "Examples of malicious content created by the AI tool, such as phishing messages, information stealers, and encryption software, have all been shared online."</p><p>The research can be found here:</p><ul><li><a href="https://www.deepinstinct.com/blog/chatgpt-and-malware-making-your-malicious-wishes-come-true">ChatGPT and Malware: Making Your Malicious Wishes Come True</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>973</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6c1a4b80-8165-11ed-9a77-57dabd51efa4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5256961095.mp3?updated=1685127508" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Files stolen from a sneaky SymStealer.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/272/notes</link>
      <description>Ron Masas of Imperva discusses their work, the "Google Chrome “SymStealer” Vulnerability. How to Protect Your Files from Being Stolen." By reviewing the ways the browser handles file systems, specifically searching for common vulnerabilities relating to how browsers process symlinks, the Imperva Red Team discovered that when files are dropped onto a file input, it’s handled differently.
Dubbing it as CVE-2022-40764, researchers found a vulnerability that "allowed for the theft of sensitive files, such as crypto wallets and cloud provider credentials." In result, over 2.5 billion users of Google Chrome and Chromium-based browsers were affected.
The research can be found here:
Google Chrome “SymStealer” Vulnerability: How to Protect Your Files from Being Stolen

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Mar 2023 06:00:00 -0000</pubDate>
      <itunes:title>Files stolen from a sneaky SymStealer.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>272</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ron Masas of Imperva discusses their work, the "Google Chrome “SymStealer” Vulnerability. How to Protect Your Files from Being Stolen." By reviewing the ways the browser handles file systems, specifically searching for common vulnerabilities relating to how browsers process symlinks, the Imperva Red Team discovered that when files are dropped onto a file input, it’s handled differently.
Dubbing it as CVE-2022-40764, researchers found a vulnerability that "allowed for the theft of sensitive files, such as crypto wallets and cloud provider credentials." In result, over 2.5 billion users of Google Chrome and Chromium-based browsers were affected.
The research can be found here:
Google Chrome “SymStealer” Vulnerability: How to Protect Your Files from Being Stolen

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ron Masas of Imperva discusses their work, the "Google Chrome “SymStealer” Vulnerability. How to Protect Your Files from Being Stolen." By reviewing the ways the browser handles file systems, specifically searching for common vulnerabilities relating to how browsers process symlinks, the Imperva Red Team discovered that when files are dropped onto a file input, it’s handled differently.</p><p>Dubbing it as CVE-2022-40764, researchers found a vulnerability that "allowed for the theft of sensitive files, such as crypto wallets and cloud provider credentials." In result, over 2.5 billion users of Google Chrome and Chromium-based browsers were affected.</p><p>The research can be found here:</p><ul><li><a href="https://www.imperva.com/blog/google-chrome-symstealer-vulnerability/">Google Chrome “SymStealer” Vulnerability: How to Protect Your Files from Being Stolen</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>815</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6c016138-8165-11ed-9a77-33b69e5587eb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9690725837.mp3?updated=1685127497" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New exploits are tricking Chrome. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/271/notes</link>
      <description>Dor Zvi, Co-Founder and CEO from Red Access to discuss their work on "New Chrome Exploit Lets Attackers Completely Disable Browser Extensions." A recently patched exploit is tricking Chrome browsers on all popular OSs to not only give attackers visibility of their targets’ browser extensions, but also the ability to disable all of those extensions.
The research states the exploit consists of a bookmarklet exploit that allows threat actors to selectively force-disable Chrome extensions using a handy graphical user interface making Chrome mistakenly identify it as a legitimate request from the Chrome Web Store.
The research can be found here:
New Chrome Exploit Lets Attackers Completely Disable Browser Extensions

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Mar 2023 06:00:00 -0000</pubDate>
      <itunes:title>New exploits are tricking Chrome. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>271</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dor Zvi, Co-Founder and CEO from Red Access to discuss their work on "New Chrome Exploit Lets Attackers Completely Disable Browser Extensions." A recently patched exploit is tricking Chrome browsers on all popular OSs to not only give attackers visibility of their targets’ browser extensions, but also the ability to disable all of those extensions.
The research states the exploit consists of a bookmarklet exploit that allows threat actors to selectively force-disable Chrome extensions using a handy graphical user interface making Chrome mistakenly identify it as a legitimate request from the Chrome Web Store.
The research can be found here:
New Chrome Exploit Lets Attackers Completely Disable Browser Extensions

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dor Zvi, Co-Founder and CEO from Red Access to discuss their work on "New Chrome Exploit Lets Attackers Completely Disable Browser Extensions." A recently patched exploit is tricking Chrome browsers on all popular OSs to not only give attackers visibility of their targets’ browser extensions, but also the ability to disable all of those extensions.</p><p>The research states the exploit consists of a bookmarklet exploit that allows threat actors to selectively force-disable Chrome extensions using a handy graphical user interface making Chrome mistakenly identify it as a legitimate request from the Chrome Web Store.</p><p>The research can be found here:</p><ul><li><a href="https://redaccess.io/new-chrome-exploit-lets-attackers-completely-disable-browser-extensions/">New Chrome Exploit Lets Attackers Completely Disable Browser Extensions</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>933</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6be99e4a-8165-11ed-9a77-8fcfec9db677]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4324788124.mp3?updated=1685127487" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The next hot AI scam.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/270/notes</link>
      <description>Andy Patel from WithSecure Labs joins with Dave to discuss their study that demonstrates how GPT-3 can be misused through malicious and creative prompt engineering. The research looks at how this technology, GPT-3 and GPT-3.5, can be used to trick users into scams.
GPT-3 is a user-friendly tool that employs autoregressive language to generate versatile natural language text using a small amount of input that could inevitably interest cybercriminals. The research is looking for possible malpractice from this tool, such as phishing content, social opposition, social validation, style transfer, opinion transfer, prompt creation, and fake news.
The research can be found here:
Creatively malicious prompt engineering

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Feb 2023 06:00:00 -0000</pubDate>
      <itunes:title>The next hot AI scam.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>270</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Andy Patel from WithSecure Labs joins with Dave to discuss their study that demonstrates how GPT-3 can be misused through malicious and creative prompt engineering. The research looks at how this technology, GPT-3 and GPT-3.5, can be used to trick users into scams.
GPT-3 is a user-friendly tool that employs autoregressive language to generate versatile natural language text using a small amount of input that could inevitably interest cybercriminals. The research is looking for possible malpractice from this tool, such as phishing content, social opposition, social validation, style transfer, opinion transfer, prompt creation, and fake news.
The research can be found here:
Creatively malicious prompt engineering

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Andy Patel from WithSecure Labs joins with Dave to discuss their study that demonstrates how GPT-3 can be misused through malicious and creative prompt engineering. The research looks at how this technology, GPT-3 and GPT-3.5, can be used to trick users into scams.</p><p>GPT-3 is a user-friendly tool that employs autoregressive language to generate versatile natural language text using a small amount of input that could inevitably interest cybercriminals. The research is looking for possible malpractice from this tool, such as phishing content, social opposition, social validation, style transfer, opinion transfer, prompt creation, and fake news.</p><p>The research can be found here:</p><ul><li><a href="https://labs.withsecure.com/publications/creatively-malicious-prompt-engineering">Creatively malicious prompt engineering</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1509</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6bd0c654-8165-11ed-9a77-b78af1dfdd37]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3248217751.mp3?updated=1685127483" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Implementing and achieving security resilience. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/269/notes</link>
      <description>Wendy Nather from Cisco sits down with Dave to discuss their work on "Cracking the Code to Security Resilience: Lessons from the Latest Cisco Security Outcomes Report." The report describes what security resilience is, while also going over how companies can achieve this resilience.
Wendy talks through some of the key findings based off of the report, and after surveying 4,751 active information security and privacy professionals from 26 countries, we find out some of the top priorities to achieving security resilience. From there the research goes on to explain from the findings which data-backed practices lead to the outcomes that can be implemented in cybersecurity strategies.
The research can be found here:

Cracking the Code to Security Resilience: Lessons from the Latest Cisco Security Outcomes Report

Achieving Security Resilience


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Feb 2023 06:00:00 -0000</pubDate>
      <itunes:title>Implementing and achieving security resilience. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>269</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Wendy Nather from Cisco sits down with Dave to discuss their work on "Cracking the Code to Security Resilience: Lessons from the Latest Cisco Security Outcomes Report." The report describes what security resilience is, while also going over how companies can achieve this resilience.
Wendy talks through some of the key findings based off of the report, and after surveying 4,751 active information security and privacy professionals from 26 countries, we find out some of the top priorities to achieving security resilience. From there the research goes on to explain from the findings which data-backed practices lead to the outcomes that can be implemented in cybersecurity strategies.
The research can be found here:

Cracking the Code to Security Resilience: Lessons from the Latest Cisco Security Outcomes Report

Achieving Security Resilience


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Wendy Nather from Cisco sits down with Dave to discuss their work on "Cracking the Code to Security Resilience: Lessons from the Latest Cisco Security Outcomes Report." The report describes what security resilience is, while also going over how companies can achieve this resilience.</p><p>Wendy talks through some of the key findings based off of the report, and after surveying 4,751 active information security and privacy professionals from 26 countries, we find out some of the top priorities to achieving security resilience. From there the research goes on to explain from the findings which data-backed practices lead to the outcomes that can be implemented in cybersecurity strategies.</p><p>The research can be found here:</p><ul>
<li><a href="https://blogs.cisco.com/security/cracking-the-code-to-security-resilience-lessons-from-the-latest-cisco-security-outcomes-report">Cracking the Code to Security Resilience: Lessons from the Latest Cisco Security Outcomes Report</a></li>
<li><a href="https://www.cisco.com/c/dam/en/us/products/collateral/security/security-outcomes-vol-3-report.pdf">Achieving Security Resilience</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1214</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6bb81b0e-8165-11ed-9a77-c7b9ef0fd9b0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2385986828.mp3?updated=1685127473" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Knocking down the legs of the industrial security triad.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/268/notes</link>
      <description>Pascal Ackerman, OT Security Strategist from Guidepoint Security, joins Dave to discuss his work on discovering a vulnerability in the integrity of common HMI client-server protocol. This research is a Proof of Concept (PoC) attack on the integrity of data flowing across the industrial network with the intention of intercepting, viewing, and even manipulating values sent to (and from) the HMI, ultimately trying to trick the user into making a wrong decision, ultimately affecting the proper operation of the process.
In this research, they are targeting Rockwell Automation’s FactoryTalk View SE products, trying to highlight the lack of integrity and confidentiality on the production network and the effect that has on the overall security of the production environment.
The research can be found here:
GuidePoint Security researcher discovers vulnerability in the integrity of common HMI client-server protocol

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Feb 2023 06:00:00 -0000</pubDate>
      <itunes:title>Knocking down the legs of the industrial security triad.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>268</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Pascal Ackerman, OT Security Strategist from Guidepoint Security, joins Dave to discuss his work on discovering a vulnerability in the integrity of common HMI client-server protocol. This research is a Proof of Concept (PoC) attack on the integrity of data flowing across the industrial network with the intention of intercepting, viewing, and even manipulating values sent to (and from) the HMI, ultimately trying to trick the user into making a wrong decision, ultimately affecting the proper operation of the process.
In this research, they are targeting Rockwell Automation’s FactoryTalk View SE products, trying to highlight the lack of integrity and confidentiality on the production network and the effect that has on the overall security of the production environment.
The research can be found here:
GuidePoint Security researcher discovers vulnerability in the integrity of common HMI client-server protocol

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Pascal Ackerman, OT Security Strategist from Guidepoint Security, joins Dave to discuss his work on discovering a vulnerability in the integrity of common HMI client-server protocol. This research is a Proof of Concept (PoC) attack on the integrity of data flowing across the industrial network with the intention of intercepting, viewing, and even manipulating values sent to (and from) the HMI, ultimately trying to trick the user into making a wrong decision, ultimately affecting the proper operation of the process.</p><p>In this research, they are targeting Rockwell Automation’s FactoryTalk View SE products, trying to highlight the lack of integrity and confidentiality on the production network and the effect that has on the overall security of the production environment.</p><p>The research can be found here:</p><ul><li><a href="https://www.guidepointsecurity.com/blog/guidepoint-security-researcher-discovers-vulnerability-in-the-integrity-of-common-hmi-client-server-protocol/">GuidePoint Security researcher discovers vulnerability in the integrity of common HMI client-server protocol</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1185</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6b9f7400-8165-11ed-9a77-6319f421818c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5358086199.mp3?updated=1685127462" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Can ransomware turn machines against us?</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/267/notes</link>
      <description>Tom Bonner and Eoin Wickens from HiddenLayer's SAI Team to discuss their research on weaponizing machine learning models with ransomware. Researchers at HiddenLayer’s SAI Team have developed a proof-of-concept attack for surreptitiously deploying malware, such as ransomware or Cobalt Strike Beacon, via machine learning models.
The attack uses a technique currently undetected by many cybersecurity vendors and can serve as a launchpad for lateral movement, deployment of additional malware, or the theft of highly sensitive data. In this research the team raising awareness by demonstrate how easily an adversary can deploy malware through a pre-trained ML model.
The research can be found here:
WEAPONIZING MACHINE LEARNING MODELS WITH RANSOMWARE

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Feb 2023 06:00:00 -0000</pubDate>
      <itunes:title>Can ransomware turn machines against us?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>267</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Tom Bonner and Eoin Wickens from HiddenLayer's SAI Team to discuss their research on weaponizing machine learning models with ransomware. Researchers at HiddenLayer’s SAI Team have developed a proof-of-concept attack for surreptitiously deploying malware, such as ransomware or Cobalt Strike Beacon, via machine learning models.
The attack uses a technique currently undetected by many cybersecurity vendors and can serve as a launchpad for lateral movement, deployment of additional malware, or the theft of highly sensitive data. In this research the team raising awareness by demonstrate how easily an adversary can deploy malware through a pre-trained ML model.
The research can be found here:
WEAPONIZING MACHINE LEARNING MODELS WITH RANSOMWARE

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tom Bonner and Eoin Wickens from HiddenLayer's SAI Team to discuss their research on weaponizing machine learning models with ransomware. Researchers at HiddenLayer’s SAI Team have developed a proof-of-concept attack for surreptitiously deploying malware, such as ransomware or Cobalt Strike Beacon, via machine learning models.</p><p>The attack uses a technique currently undetected by many cybersecurity vendors and can serve as a launchpad for lateral movement, deployment of additional malware, or the theft of highly sensitive data. In this research the team raising awareness by demonstrate how easily an adversary can deploy malware through a pre-trained ML model.</p><p>The research can be found here:</p><ul><li><a href="https://hiddenlayer.com/research/weaponizing-machine-learning-models-with-ransomware/">WEAPONIZING MACHINE LEARNING MODELS WITH RANSOMWARE</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1118</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6b85ad7c-8165-11ed-9a77-53bf1e9b32b9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2885751665.mp3?updated=1685127456" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Flagging firmware vulnerabilities. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/266/notes</link>
      <description>Roya Gordon from Nozomi Networks sits down with Dave to discuss their research on "Vulnerabilities in BMC Firmware Affect OT/IoT Device Security." Researchers at Nozomi Networks has revealed that there are thirteen vulnerabilities that affect BMCs of Lanner devices based on the American Megatrends (AMI) MegaRAC SP-X.
The research states "By abusing these vulnerabilities, an unauthenticated attacker may achieve Remote Code Execution (RCE) with root privileges on the BMC, completely compromising it and gaining control of the managed host." As well as mentioning what patches could be in the future to help fix these vulnerabilities.
The research can be found here:
Vulnerabilities in BMC Firmware Affect OT/IoT Device Security – Part 1

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Jan 2023 06:00:00 -0000</pubDate>
      <itunes:title>Flagging firmware vulnerabilities. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>266</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Roya Gordon from Nozomi Networks sits down with Dave to discuss their research on "Vulnerabilities in BMC Firmware Affect OT/IoT Device Security." Researchers at Nozomi Networks has revealed that there are thirteen vulnerabilities that affect BMCs of Lanner devices based on the American Megatrends (AMI) MegaRAC SP-X.
The research states "By abusing these vulnerabilities, an unauthenticated attacker may achieve Remote Code Execution (RCE) with root privileges on the BMC, completely compromising it and gaining control of the managed host." As well as mentioning what patches could be in the future to help fix these vulnerabilities.
The research can be found here:
Vulnerabilities in BMC Firmware Affect OT/IoT Device Security – Part 1

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Roya Gordon from Nozomi Networks sits down with Dave to discuss their research on "Vulnerabilities in BMC Firmware Affect OT/IoT Device Security." Researchers at Nozomi Networks has revealed that there are thirteen vulnerabilities that affect BMCs of Lanner devices based on the American Megatrends (AMI) MegaRAC SP-X.</p><p>The research states "By abusing these vulnerabilities, an unauthenticated attacker may achieve Remote Code Execution (RCE) with root privileges on the BMC, completely compromising it and gaining control of the managed host." As well as mentioning what patches could be in the future to help fix these vulnerabilities.</p><p>The research can be found here:</p><ul><li><a href="https://www.nozominetworks.com/blog/vulnerabilities-in-bmc-firmware-affect-ot-iot-device-security-part-1/">Vulnerabilities in BMC Firmware Affect OT/IoT Device Security – Part 1</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>954</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6b6d1514-8165-11ed-9a77-f3b07c72b2be]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3232609082.mp3?updated=1685127447" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Billbug infests government agencies. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/265/notes</link>
      <description>Brigid O. Gorman from Symantec's Threat Hunter Team joins Dave to discuss their report "Billbug - State-sponsored Actor Targets Cert Authority and Government Agencies in Multiple Asian Countries." The team has discovered that state-sponsored actors compromised a digital certificate authority in an Asian country during a campaign in which multiple government agencies were also targeted.
The research states they believe Billbug, which is a long-established advanced persistent threat (APT) group has been active since about 2009. They say "In activity documented by Symantec in 2019, we detailed how the group was using a backdoor known as Hannotog (Backdoor.Hannotog) and another backdoor known as Sagerunex (Backdoor.Sagerunex). Both these tools were also seen in this more recent activity."
The research can be found here:
Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Jan 2023 06:00:00 -0000</pubDate>
      <itunes:title>Billbug infests government agencies. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>265</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Brigid O. Gorman from Symantec's Threat Hunter Team joins Dave to discuss their report "Billbug - State-sponsored Actor Targets Cert Authority and Government Agencies in Multiple Asian Countries." The team has discovered that state-sponsored actors compromised a digital certificate authority in an Asian country during a campaign in which multiple government agencies were also targeted.
The research states they believe Billbug, which is a long-established advanced persistent threat (APT) group has been active since about 2009. They say "In activity documented by Symantec in 2019, we detailed how the group was using a backdoor known as Hannotog (Backdoor.Hannotog) and another backdoor known as Sagerunex (Backdoor.Sagerunex). Both these tools were also seen in this more recent activity."
The research can be found here:
Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Brigid O. Gorman from Symantec's Threat Hunter Team joins Dave to discuss their report "Billbug - State-sponsored Actor Targets Cert Authority and Government Agencies in Multiple Asian Countries." The team has discovered that state-sponsored actors compromised a digital certificate authority in an Asian country during a campaign in which multiple government agencies were also targeted.</p><p>The research states they believe Billbug, which is a long-established advanced persistent threat (APT) group has been active since about 2009. They say "In activity documented by Symantec in 2019, we detailed how the group was using a backdoor known as Hannotog (Backdoor.Hannotog) and another backdoor known as Sagerunex (Backdoor.Sagerunex). Both these tools were also seen in this more recent activity."</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/espionage-asia-governments-cert-authority">Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>843</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6b55878c-8165-11ed-9a77-73548d27cc51]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5752337825.mp3?updated=1685127438" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DUCKTAIL waddles back again.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/264/notes</link>
      <description>Mohammad Kazem Hassan Nejad from WithSecure joins Dave to discuss the team’s research, “DUCKTAIL returns - Underneath the ruffled feathers.” DUCKTAIL is a financially motivated malware operation that targets individuals and businesses operating on the Facebook Ads and Business platform.
The research states “The malware is designed to steal browser cookies and take advantage of authenticated Facebook sessions to steal information from the victim's Facebook account.” WithSecure has found that after a short hiatus, DUCKTAIL has returned with slight changes in their mode of operation.
The research can be found here:
DUCKTAIL returns: Underneath the ruffled feathers

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Jan 2023 06:00:00 -0000</pubDate>
      <itunes:title>DUCKTAIL waddles back again.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>264</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Mohammad Kazem Hassan Nejad from WithSecure joins Dave to discuss the team’s research, “DUCKTAIL returns - Underneath the ruffled feathers.” DUCKTAIL is a financially motivated malware operation that targets individuals and businesses operating on the Facebook Ads and Business platform.
The research states “The malware is designed to steal browser cookies and take advantage of authenticated Facebook sessions to steal information from the victim's Facebook account.” WithSecure has found that after a short hiatus, DUCKTAIL has returned with slight changes in their mode of operation.
The research can be found here:
DUCKTAIL returns: Underneath the ruffled feathers

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Mohammad Kazem Hassan Nejad from WithSecure joins Dave to discuss the team’s research, “DUCKTAIL returns - Underneath the ruffled feathers.” DUCKTAIL is a financially motivated malware operation that targets individuals and businesses operating on the Facebook Ads and Business platform.</p><p>The research states “The malware is designed to steal browser cookies and take advantage of authenticated Facebook sessions to steal information from the victim's Facebook account.” WithSecure has found that after a short hiatus, DUCKTAIL has returned with slight changes in their mode of operation.</p><p>The research can be found here:</p><ul><li><a href="https://labs.withsecure.com/publications/ducktail-returns">DUCKTAIL returns: Underneath the ruffled feathers</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1293</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6b3dd3d0-8165-11ed-9a77-3bcbed15140f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5174000104.mp3?updated=1685127316" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stealer malware from Russia.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/263/notes</link>
      <description>Marisa Atkinson, an analyst from Flashpoint, joins Dave to discuss a new blog post from Flashpoint’s research team about “RisePro” Stealer, malware from Russia, and Pay-Per-Install Malware “PrivateLoader.” “RisePro” is written in C++ and appears to possess similar functionality to the stealer malware “Vidar.” It's also a newly identified stealer, that began appearing as a stealer source for log credentials on the illicit log shop Russian Market on December 13, 2022.
The research states, "Samples that Flashpoint analysts identified indicate that RisePro may have been dropped or downloaded by the pay-per-install malware downloader service “PrivateLoader” in the past year." Analysts identified several sets of logs uploaded to the illicit underground Russian Market, which listed their source as “RisePro.”
The research can be found here:
“RisePro” Stealer and Pay-Per-Install Malware “PrivateLoader”

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Jan 2023 06:00:00 -0000</pubDate>
      <itunes:title>Stealer malware from Russia.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>263</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Marisa Atkinson, an analyst from Flashpoint, joins Dave to discuss a new blog post from Flashpoint’s research team about “RisePro” Stealer, malware from Russia, and Pay-Per-Install Malware “PrivateLoader.” “RisePro” is written in C++ and appears to possess similar functionality to the stealer malware “Vidar.” It's also a newly identified stealer, that began appearing as a stealer source for log credentials on the illicit log shop Russian Market on December 13, 2022.
The research states, "Samples that Flashpoint analysts identified indicate that RisePro may have been dropped or downloaded by the pay-per-install malware downloader service “PrivateLoader” in the past year." Analysts identified several sets of logs uploaded to the illicit underground Russian Market, which listed their source as “RisePro.”
The research can be found here:
“RisePro” Stealer and Pay-Per-Install Malware “PrivateLoader”

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Marisa Atkinson, an analyst from Flashpoint, joins Dave to discuss a new blog post from Flashpoint’s research team about “RisePro” Stealer, malware from Russia, and Pay-Per-Install Malware “PrivateLoader.” “RisePro” is written in C++ and appears to possess similar functionality to the stealer malware “Vidar.” It's also a newly identified stealer, that began appearing as a stealer source for log credentials on the illicit log shop Russian Market on December 13, 2022.</p><p>The research states, "Samples that Flashpoint analysts identified indicate that RisePro may have been dropped or downloaded by the pay-per-install malware downloader service “PrivateLoader” in the past year." Analysts identified several sets of logs uploaded to the illicit underground Russian Market, which listed their source as “RisePro.”</p><p>The research can be found here:</p><ul><li><a href="https://flashpoint.io/blog/risepro-stealer-and-pay-per-install-malware-privateloader/">“RisePro” Stealer and Pay-Per-Install Malware “PrivateLoader”</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1076</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6b24d0b0-8165-11ed-9a77-e3157c85119e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4215683819.mp3?updated=1685127304" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: LemonDucks evading detection.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/235/notes</link>
      <description>Scott Fanning from CrowdStrike's research team, joins Dave to discuss their work on "LemonDuck Targets Docker for Cryptomining Operations." LemonDuck is a well-known cryptomining botnet, and the research suggests attackers are attracted to the monetary gain from the recent boom in cryptocurrency.
LemonDuck was caught trying to disguise its attack against Docker by running an anonymous mining operation by the use of proxy pools. Scott shares how its unknown which organizations have been targeted and just how much cryptocurrency has been stolen.
The research can be found here:
LemonDuck Targets Docker for Cryptomining Operations

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 31 Dec 2022 06:00:00 -0000</pubDate>
      <itunes:title>Encore: LemonDucks evading detection.</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>235</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Scott Fanning from CrowdStrike's research team, joins Dave to discuss their work on "LemonDuck Targets Docker for Cryptomining Operations." LemonDuck is a well-known cryptomining botnet, and the research suggests attackers are attracted to the monetary gain from the recent boom in cryptocurrency.
LemonDuck was caught trying to disguise its attack against Docker by running an anonymous mining operation by the use of proxy pools. Scott shares how its unknown which organizations have been targeted and just how much cryptocurrency has been stolen.
The research can be found here:
LemonDuck Targets Docker for Cryptomining Operations

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Scott Fanning from CrowdStrike's research team, joins Dave to discuss their work on "LemonDuck Targets Docker for Cryptomining Operations." LemonDuck is a well-known cryptomining botnet, and the research suggests attackers are attracted to the monetary gain from the recent boom in cryptocurrency.</p><p>LemonDuck was caught trying to disguise its attack against Docker by running an anonymous mining operation by the use of proxy pools. Scott shares how its unknown which organizations have been targeted and just how much cryptocurrency has been stolen.</p><p>The research can be found here:</p><ul><li><a href="https://www.crowdstrike.com/blog/lemonduck-botnet-targets-docker-for-cryptomining-operations/">LemonDuck Targets Docker for Cryptomining Operations</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>922</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5de2f4ee-7a4f-11ed-bea8-5f1c0236e98a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2066306499.mp3?updated=1685127292" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Vulnerabilities in IoT devices. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/232/notes</link>
      <description>Dr. May Wang, CTO of IoT Security at Palo Alto Networks, joins Dave Bittner to discuss their findings detailed in Unit 42's "Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization" research. Unit 42 recently set out to better understand how well hospitals and other healthcare providers are doing in securing smart infusion pumps, which are network-connected devices that deliver medications and fluids to patients. This topic is of critical concern because security lapses in these devices have the potential to put lives at risk or expose sensitive patient data.
Unit 42's discovery of security gaps in three out of four infusion pumps that they reviewed highlights the need for the healthcare industry to redouble efforts to protect against known vulnerabilities, while diligently following best practices for infusion pumps and hospital networks. May walks us through Unit 42's work.
The research can be found here:
Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Dec 2022 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Vulnerabilities in IoT devices. </itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>232</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dr. May Wang, CTO of IoT Security at Palo Alto Networks, joins Dave Bittner to discuss their findings detailed in Unit 42's "Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization" research. Unit 42 recently set out to better understand how well hospitals and other healthcare providers are doing in securing smart infusion pumps, which are network-connected devices that deliver medications and fluids to patients. This topic is of critical concern because security lapses in these devices have the potential to put lives at risk or expose sensitive patient data.
Unit 42's discovery of security gaps in three out of four infusion pumps that they reviewed highlights the need for the healthcare industry to redouble efforts to protect against known vulnerabilities, while diligently following best practices for infusion pumps and hospital networks. May walks us through Unit 42's work.
The research can be found here:
Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dr. May Wang, CTO of IoT Security at Palo Alto Networks, joins Dave Bittner to discuss their findings detailed in Unit 42's "Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization" research. Unit 42 recently set out to better understand how well hospitals and other healthcare providers are doing in securing smart infusion pumps, which are network-connected devices that deliver medications and fluids to patients. This topic is of critical concern because security lapses in these devices have the potential to put lives at risk or expose sensitive patient data.</p><p>Unit 42's discovery of security gaps in three out of four infusion pumps that they reviewed highlights the need for the healthcare industry to redouble efforts to protect against known vulnerabilities, while diligently following best practices for infusion pumps and hospital networks. May walks us through Unit 42's work.</p><p>The research can be found here:</p><ul><li><a href="https://unit42.paloaltonetworks.com/infusion-pump-vulnerabilities/">Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1337</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[efd53a0a-77f3-11ed-ab75-8304a9622196]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6523117010.mp3?updated=1685127285" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hijacking holiday spirit with phishing scams.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/262/notes</link>
      <description>Or Katz from Akamai sits down with Dave to discuss research on highly sophisticated phishing scams and how they are abusing holiday sentiment. This particular threat, most recently has focused on Halloween deals, enticing victims with the chance to win a free prize, including from Dick’s Sporting Goods or Tumi Backpacks. It then requests credit card details to cover the cost of shipment.
From mid-September to the end of October 2022, Akamai's research were able uncover and track this threat. This kit mimics well known retail stores in hopes to hijack credit card information, feeding off of people's holiday spirit.
The research can be found here:
Highly Sophisticated Phishing Scams Are Abusing Holiday Sentiment

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Dec 2022 06:00:00 -0000</pubDate>
      <itunes:title>Hijacking holiday spirit with phishing scams.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>262</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Or Katz from Akamai sits down with Dave to discuss research on highly sophisticated phishing scams and how they are abusing holiday sentiment. This particular threat, most recently has focused on Halloween deals, enticing victims with the chance to win a free prize, including from Dick’s Sporting Goods or Tumi Backpacks. It then requests credit card details to cover the cost of shipment.
From mid-September to the end of October 2022, Akamai's research were able uncover and track this threat. This kit mimics well known retail stores in hopes to hijack credit card information, feeding off of people's holiday spirit.
The research can be found here:
Highly Sophisticated Phishing Scams Are Abusing Holiday Sentiment

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Or Katz from Akamai sits down with Dave to discuss research on highly sophisticated phishing scams and how they are abusing holiday sentiment. This particular threat, most recently has focused on Halloween deals, enticing victims with the chance to win a free prize, including from Dick’s Sporting Goods or Tumi Backpacks. It then requests credit card details to cover the cost of shipment.</p><p>From mid-September to the end of October 2022, Akamai's research were able uncover and track this threat. This kit mimics well known retail stores in hopes to hijack credit card information, feeding off of people's holiday spirit.</p><p>The research can be found here:</p><ul><li><a href="https://www.akamai.com/blog/security-research/sophisticated-phishing-scam-abusing-holiday-sentiment">Highly Sophisticated Phishing Scams Are Abusing Holiday Sentiment</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1170</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9e402df0-6389-11ec-b04f-e70bfa96681e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8464469434.mp3?updated=1685127275" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybersecurity during the World Cup. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/261/notes</link>
      <description>AJ Nash from ZeroFox sits down with Dave to discuss Cybersecurity threats including social engineering attacks planned surrounding the Qatar 2022 World Cup. The research shares some of the key threats we might see while the World Cup is happening this year.
Researchers say "During the World Cup, there will likely be threat actors aiming to acquire personal information or monetary value through phishing and scams." In the research we can find how the venue host is preparing for these claims of attacks.
The research can be found here:
Qatar 2022 World Cup Event Assessment

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Dec 2022 06:00:00 -0000</pubDate>
      <itunes:title>Cybersecurity during the World Cup. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>261</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>AJ Nash from ZeroFox sits down with Dave to discuss Cybersecurity threats including social engineering attacks planned surrounding the Qatar 2022 World Cup. The research shares some of the key threats we might see while the World Cup is happening this year.
Researchers say "During the World Cup, there will likely be threat actors aiming to acquire personal information or monetary value through phishing and scams." In the research we can find how the venue host is preparing for these claims of attacks.
The research can be found here:
Qatar 2022 World Cup Event Assessment

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>AJ Nash from ZeroFox sits down with Dave to discuss Cybersecurity threats including social engineering attacks planned surrounding the Qatar 2022 World Cup. The research shares some of the key threats we might see while the World Cup is happening this year.</p><p>Researchers say "During the World Cup, there will likely be threat actors aiming to acquire personal information or monetary value through phishing and scams." In the research we can find how the venue host is preparing for these claims of attacks.</p><p>The research can be found here:</p><ul><li><a href="https://get.zerofox.com/rs/143-DHV-007/images/ZeroFox-Threat-Intelligence-Qatar-2022-World-Cup-Event-Assessment-Report.pdf">Qatar 2022 World Cup Event Assessment</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1521</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9e208b26-6389-11ec-b04f-4b345d76c777]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9161463952.mp3?updated=1685127269" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Old malware returns in a new way.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/260/notes</link>
      <description>Jeremy Kennelly and Sulian Lebegue from Mandiant sit down with Dave to discuss their research "From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind? One of the oldest and most successful banking fraud malwares, URSNIF, which caused an estimated “tens of millions of dollars in losses”, has been discovered by researchers to have been re-tooled into a generic backdoor, dubbed “LDR4”.
This new variant was first observed in June 2022. Mandiant researchers believe that the same threat actors who operated the RM3 variant of URSNIF are likely behind LDR4. They say "given the success and sophistication RM3 previously had, LDR4 could be a significantly dangerous variant—capable of distributing ransomware—that should be watched closely."
The research can be found here:
From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Dec 2022 06:00:00 -0000</pubDate>
      <itunes:title>Old malware returns in a new way.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>260</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Jeremy Kennelly and Sulian Lebegue from Mandiant sit down with Dave to discuss their research "From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind? One of the oldest and most successful banking fraud malwares, URSNIF, which caused an estimated “tens of millions of dollars in losses”, has been discovered by researchers to have been re-tooled into a generic backdoor, dubbed “LDR4”.
This new variant was first observed in June 2022. Mandiant researchers believe that the same threat actors who operated the RM3 variant of URSNIF are likely behind LDR4. They say "given the success and sophistication RM3 previously had, LDR4 could be a significantly dangerous variant—capable of distributing ransomware—that should be watched closely."
The research can be found here:
From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jeremy Kennelly and Sulian Lebegue from Mandiant sit down with Dave to discuss their research "From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind? One of the oldest and most successful banking fraud malwares, URSNIF, which caused an estimated “tens of millions of dollars in losses”, has been discovered by researchers to have been re-tooled into a generic backdoor, dubbed “LDR4”.</p><p>This new variant was first observed in June 2022. Mandiant researchers believe that the same threat actors who operated the RM3 variant of URSNIF are likely behind LDR4. They say "given the success and sophistication RM3 previously had, LDR4 could be a significantly dangerous variant—capable of distributing ransomware—that should be watched closely."</p><p>The research can be found here:</p><ul><li><a href="https://www.mandiant.com/resources/blog/rm3-ldr4-ursnif-banking-fraud">From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1459</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9e0156fc-6389-11ec-b04f-df8091ee6537]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4820901868.mp3?updated=1685127259" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: The secrets behind Docker. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/227/notes</link>
      <description>Alon Zahavi from CyberArk, joins Dave Bittner on this episode to discuss CyberArk's work in conjunction with Patch Tuesday. CyberArk published about how Docker inadvertently created a new vulnerability and what happens when it's exploited.
CyberArk's research concluded that an attacker may execute files with capabilities or setuid files in order to escalate its privileges up to root level. CyberArk found the new vuln in some of Microsoft’s Docker images, caused by misuse of Linux capabilities, a powerful additional layer of security that gives admins the ability to assign capabilities and privileges to processes and files in the Linux system
The research can be found here:
How Docker Made Me More Capable and the Host Less Secure

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Nov 2022 06:00:00 -0000</pubDate>
      <itunes:title>Encore: The secrets behind Docker. </itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>227</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Alon Zahavi from CyberArk, joins Dave Bittner on this episode to discuss CyberArk's work in conjunction with Patch Tuesday. CyberArk published about how Docker inadvertently created a new vulnerability and what happens when it's exploited.
CyberArk's research concluded that an attacker may execute files with capabilities or setuid files in order to escalate its privileges up to root level. CyberArk found the new vuln in some of Microsoft’s Docker images, caused by misuse of Linux capabilities, a powerful additional layer of security that gives admins the ability to assign capabilities and privileges to processes and files in the Linux system
The research can be found here:
How Docker Made Me More Capable and the Host Less Secure

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Alon Zahavi from CyberArk, joins Dave Bittner on this episode to discuss CyberArk's work in conjunction with Patch Tuesday. CyberArk published about how Docker inadvertently created a new vulnerability and what happens when it's exploited.</p><p>CyberArk's research concluded that an attacker may execute files with capabilities or setuid files in order to escalate its privileges up to root level. CyberArk found the new vuln in some of Microsoft’s Docker images, caused by misuse of Linux capabilities, a powerful additional layer of security that gives admins the ability to assign capabilities and privileges to processes and files in the Linux system</p><p>The research can be found here:</p><ul><li><a href="https://www.cyberark.com/resources/threat-research-blog/how-docker-made-me-more-capable-and-the-host-less-secure">How Docker Made Me More Capable and the Host Less Secure</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1239</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5caddef2-6a84-11ed-bd10-a79ab593be0c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2803281738.mp3?updated=1685127249" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Another infection with new malware. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/259/notes</link>
      <description>Larry Cashdollar, Principal Security Intelligence Response Engineer from Akamai Technologies, joins Dave to talk about their research on "KmsdBot: The Attack and Mine Malware." Akamai's Security Research team has found a new malware that infected their honeypot, which they have dubbed KmsdBot. 
The research states "The malware attacks using UDP, TCP, HTTP POST, and GET, along with a command and control infrastructure (C2), which communicates over TCP." The botnet targets weak login credentials and then infects systems via an SSH connection.
The research can be found here:
KmsdBot: The Attack and Mine Malware

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Nov 2022 06:00:00 -0000</pubDate>
      <itunes:title>Another infection with new malware. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>259</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Larry Cashdollar, Principal Security Intelligence Response Engineer from Akamai Technologies, joins Dave to talk about their research on "KmsdBot: The Attack and Mine Malware." Akamai's Security Research team has found a new malware that infected their honeypot, which they have dubbed KmsdBot. 
The research states "The malware attacks using UDP, TCP, HTTP POST, and GET, along with a command and control infrastructure (C2), which communicates over TCP." The botnet targets weak login credentials and then infects systems via an SSH connection.
The research can be found here:
KmsdBot: The Attack and Mine Malware

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Larry Cashdollar, Principal Security Intelligence Response Engineer from Akamai Technologies, joins Dave to talk about their research on "KmsdBot: The Attack and Mine Malware." Akamai's Security Research team has found a new malware that infected their honeypot, which they have dubbed KmsdBot. </p><p>The research states "The malware attacks using UDP, TCP, HTTP POST, and GET, along with a command and control infrastructure (C2), which communicates over TCP." The botnet targets weak login credentials and then infects systems via an SSH connection.</p><p>The research can be found here:</p><ul><li><a href="https://www.akamai.com/blog/security-research/kmdsbot-the-attack-and-mine-malware">KmsdBot: The Attack and Mine Malware</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1165</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9ddd613e-6389-11ec-b04f-8fcf02ba2b6c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3322858099.mp3?updated=1685127238" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An in-depth look on the Crytox ransomware family.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/258/notes</link>
      <description>Deepen Desai from Zscaler sits down with Dave to talk about the Crytox ransomware family. First observed in 2020, Crytox is a ransomware family consisting of several stages of encrypted code that has fallen under the radar compared to other ransomware families. While other groups normally use double extortion attacks where data is both encrypted and held for ransom, Crytox does not perform this way.
The research says "The modus operandi of the group is to encrypt files on connected drives along with network drives, drop the uTox messenger application and then display a ransom note to the victim." It also shares how you may be compromised with this ransomware and goes through each stage in depth.
The research can be found here:
Technical Analysis of Crytox Ransomware

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Nov 2022 06:00:00 -0000</pubDate>
      <itunes:title>An in-depth look on the Crytox ransomware family.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>258</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Deepen Desai from Zscaler sits down with Dave to talk about the Crytox ransomware family. First observed in 2020, Crytox is a ransomware family consisting of several stages of encrypted code that has fallen under the radar compared to other ransomware families. While other groups normally use double extortion attacks where data is both encrypted and held for ransom, Crytox does not perform this way.
The research says "The modus operandi of the group is to encrypt files on connected drives along with network drives, drop the uTox messenger application and then display a ransom note to the victim." It also shares how you may be compromised with this ransomware and goes through each stage in depth.
The research can be found here:
Technical Analysis of Crytox Ransomware

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Deepen Desai from Zscaler sits down with Dave to talk about the Crytox ransomware family. First observed in 2020, Crytox is a ransomware family consisting of several stages of encrypted code that has fallen under the radar compared to other ransomware families. While other groups normally use double extortion attacks where data is both encrypted and held for ransom, Crytox does not perform this way.</p><p>The research says "The modus operandi of the group is to encrypt files on connected drives along with network drives, drop the uTox messenger application and then display a ransom note to the victim." It also shares how you may be compromised with this ransomware and goes through each stage in depth.</p><p>The research can be found here:</p><ul><li><a href="https://www.zscaler.com/blogs/security-research/technical-analysis-crytox-ransomware">Technical Analysis of Crytox Ransomware</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>840</itunes:duration>
      <guid isPermaLink="false"><![CDATA[9dbda09c-6389-11ec-b04f-23faad86f9f0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1379928081.mp3?updated=1685127223" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Over-the-air 0-day vulnerabilities. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/257/notes</link>
      <description>Roya Gordon from Nozomi Networks sits down with Dave to discuss their work "UWB Real Time Locating Systems: How Secure Radio Communications May Fail in Practice." Ultra-wideband (UWB) is a rapidly-growing radio technology that, according to the UWB Alliance, is forecasted to drive sales volumes exceeding one billion devices annually by 2025.
In an effort to strengthen the security of devices utilizing UWB, Nozomi Networks Labs conducted a security assessment of two popular UWB RTLS solutions available on the market. Their research reveals 0-day vulnerabilities and other weaknesses that, if exploited, could allow an attacker to gain full access to all sensitive location data exchanged over-the-air.
The research can be found here:
UWB Real Time Locating Systems: How Secure Radio Communications May Fail in Practice

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Nov 2022 05:00:00 -0000</pubDate>
      <itunes:title>Over-the-air 0-day vulnerabilities. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>257</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Roya Gordon from Nozomi Networks sits down with Dave to discuss their work "UWB Real Time Locating Systems: How Secure Radio Communications May Fail in Practice." Ultra-wideband (UWB) is a rapidly-growing radio technology that, according to the UWB Alliance, is forecasted to drive sales volumes exceeding one billion devices annually by 2025.
In an effort to strengthen the security of devices utilizing UWB, Nozomi Networks Labs conducted a security assessment of two popular UWB RTLS solutions available on the market. Their research reveals 0-day vulnerabilities and other weaknesses that, if exploited, could allow an attacker to gain full access to all sensitive location data exchanged over-the-air.
The research can be found here:
UWB Real Time Locating Systems: How Secure Radio Communications May Fail in Practice

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Roya Gordon from Nozomi Networks sits down with Dave to discuss their work "UWB Real Time Locating Systems: How Secure Radio Communications May Fail in Practice." Ultra-wideband (UWB) is a rapidly-growing radio technology that, according to the UWB Alliance, is forecasted to drive sales volumes exceeding one billion devices annually by 2025.</p><p>In an effort to strengthen the security of devices utilizing UWB, Nozomi Networks Labs conducted a security assessment of two popular UWB RTLS solutions available on the market. Their research reveals 0-day vulnerabilities and other weaknesses that, if exploited, could allow an attacker to gain full access to all sensitive location data exchanged over-the-air.</p><p>The research can be found here:</p><ul><li><a href="https://www.nozominetworks.com/downloads/US/Nozomi-Networks-WP-UWB-Real-Time-Locating-Systems.pdf">UWB Real Time Locating Systems: How Secure Radio Communications May Fail in Practice</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1287</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9d9e3694-6389-11ec-b04f-c37b3364a4b3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8015892237.mp3?updated=1685127219" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bugs and working from home.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/256/notes</link>
      <description>Federico Kirschbaum from Faraday Security sits down with Dave to discuss their research on "A vulnerability in Realtek's SDK for eCos OS: pwning thousands of routers." The team at Faraday found a vulnerability that made it to DEFCON 30, labeling it high severity. With more and more people working from home for their companies, the research team went looking for where there may be vulnerabilities as employees are working from home.
The research states that the team was "seeking and reporting security vulnerabilities in IoT devices, which led to the finding of an exploitable bug in a consumer-grade router popular in Argentina." They also stated in the research that it was escalating quickly and shares about how protecting home networks is important while working remotely.
The research can be found here:
A vulnerability in Realtek´s SDK for eCos OS: pwning thousands of routers

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 Oct 2022 05:00:00 -0000</pubDate>
      <itunes:title>Bugs and working from home.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>256</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Federico Kirschbaum from Faraday Security sits down with Dave to discuss their research on "A vulnerability in Realtek's SDK for eCos OS: pwning thousands of routers." The team at Faraday found a vulnerability that made it to DEFCON 30, labeling it high severity. With more and more people working from home for their companies, the research team went looking for where there may be vulnerabilities as employees are working from home.
The research states that the team was "seeking and reporting security vulnerabilities in IoT devices, which led to the finding of an exploitable bug in a consumer-grade router popular in Argentina." They also stated in the research that it was escalating quickly and shares about how protecting home networks is important while working remotely.
The research can be found here:
A vulnerability in Realtek´s SDK for eCos OS: pwning thousands of routers

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Federico Kirschbaum from Faraday Security sits down with Dave to discuss their research on "A vulnerability in Realtek's SDK for eCos OS: pwning thousands of routers." The team at Faraday found a vulnerability that made it to DEFCON 30, labeling it high severity. With more and more people working from home for their companies, the research team went looking for where there may be vulnerabilities as employees are working from home.</p><p>The research states that the team was "seeking and reporting security vulnerabilities in IoT devices, which led to the finding of an exploitable bug in a consumer-grade router popular in Argentina." They also stated in the research that it was escalating quickly and shares about how protecting home networks is important while working remotely.</p><p>The research can be found here:</p><ul><li><a href="https://faradaysec.com/pwning-thousands-of-routers-with-a-vulnerability-in-realteks-sdk-for-ecos-os/">A vulnerability in Realtek´s SDK for eCos OS: pwning thousands of routers</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1643</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9d7ec994-6389-11ec-b04f-67ffbf1217a1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2831439350.mp3?updated=1685127214" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New tools target governments in Middle East?</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/255/notes</link>
      <description>Dick O'Brien from Symantec's Threat Hunter team sits down with Dave to discuss their work on "Witchetty - Group Uses Updated Toolset in Attacks on Governments in Middle East." Their research has found that the group known as Witchetty aka LookingFrog, has been progressively updating its toolset, including the new tool, backdoor Trojan (Backdoor.Stegmap) to launch malware attacks on targets in the Middle East and Africa.
The research states "The attackers exploited the ProxyShell and ProxyLogon vulnerabilities to install web shells on public-facing servers before stealing credentials, moving laterally across networks, and installing malware on other computers. The researchers describe more on the new tool being used and why this new group is a threat.
The research can be found here:
Witchetty: Group Uses Updated Toolset in Attacks on Governments in Middle East

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Oct 2022 05:00:00 -0000</pubDate>
      <itunes:title>New tools target governments in Middle East?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>255</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dick O'Brien from Symantec's Threat Hunter team sits down with Dave to discuss their work on "Witchetty - Group Uses Updated Toolset in Attacks on Governments in Middle East." Their research has found that the group known as Witchetty aka LookingFrog, has been progressively updating its toolset, including the new tool, backdoor Trojan (Backdoor.Stegmap) to launch malware attacks on targets in the Middle East and Africa.
The research states "The attackers exploited the ProxyShell and ProxyLogon vulnerabilities to install web shells on public-facing servers before stealing credentials, moving laterally across networks, and installing malware on other computers. The researchers describe more on the new tool being used and why this new group is a threat.
The research can be found here:
Witchetty: Group Uses Updated Toolset in Attacks on Governments in Middle East

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dick O'Brien from Symantec's Threat Hunter team sits down with Dave to discuss their work on "Witchetty - Group Uses Updated Toolset in Attacks on Governments in Middle East." Their research has found that the group known as Witchetty aka LookingFrog, has been progressively updating its toolset, including the new tool, backdoor Trojan (Backdoor.Stegmap) to launch malware attacks on targets in the Middle East and Africa.</p><p>The research states "The attackers exploited the ProxyShell and ProxyLogon vulnerabilities to install web shells on public-facing servers before stealing credentials, moving laterally across networks, and installing malware on other computers. The researchers describe more on the new tool being used and why this new group is a threat.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/witchetty-steganography-espionage">Witchetty: Group Uses Updated Toolset in Attacks on Governments in Middle East</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1023</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9d5f5ece-6389-11ec-b04f-cfd66b65ad42]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1509512035.mp3?updated=1685127198" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Noberus ransomware: evolving tactics.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/254/notes</link>
      <description>Brigid O Gorman from Symantec's Threat Hunter team joins Dave to discuss their research on "Noberus Ransomware - Darkside and BlackMatter Successor Continues to Evolve its Tactics." The research states that Noberus ransomware (aka BlackCat, ALPHV) is more dangerous than ever because attackers have been using new tactics, tools, and procedures in recent months.
In the research, Symantec says, "Among some of the more notable developments has been the use of a new version of the Exmatter data exfiltration tool, and the use of Eamfo, information-stealing malware that is designed to steal credentials stored by Veeam backup software." They go over an in-depth look at how its affiliate program operates.
The research can be found here:
Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Oct 2022 05:00:00 -0000</pubDate>
      <itunes:title>Noberus ransomware: evolving tactics.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>254</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Brigid O Gorman from Symantec's Threat Hunter team joins Dave to discuss their research on "Noberus Ransomware - Darkside and BlackMatter Successor Continues to Evolve its Tactics." The research states that Noberus ransomware (aka BlackCat, ALPHV) is more dangerous than ever because attackers have been using new tactics, tools, and procedures in recent months.
In the research, Symantec says, "Among some of the more notable developments has been the use of a new version of the Exmatter data exfiltration tool, and the use of Eamfo, information-stealing malware that is designed to steal credentials stored by Veeam backup software." They go over an in-depth look at how its affiliate program operates.
The research can be found here:
Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Brigid O Gorman from Symantec's Threat Hunter team joins Dave to discuss their research on "Noberus Ransomware - Darkside and BlackMatter Successor Continues to Evolve its Tactics." The research states that Noberus ransomware (aka BlackCat, ALPHV) is more dangerous than ever because attackers have been using new tactics, tools, and procedures in recent months.</p><p>In the research, Symantec says, "Among some of the more notable developments has been the use of a new version of the Exmatter data exfiltration tool, and the use of Eamfo, information-stealing malware that is designed to steal credentials stored by Veeam backup software." They go over an in-depth look at how its affiliate program operates.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/noberus-blackcat-ransomware-ttps">Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1285</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9d401ad2-6389-11ec-b04f-535ec03d4188]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6868397895.mp3?updated=1685127190" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Google Drive used for malware?</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/253/notes</link>
      <description>Jen Miller-Osborn from Palo Alto Networks' Unit 42 joins Dave to discuss their work on the Cloaked Ursa group, with a recent report released called "Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive." The research shares insights into an active campaign from Russia’s Foreign Intelligence Service, that is leveraging the use of trusted, legitimate cloud services including Google Drive as a staging platform to deliver malware.
The research states that when these tactics are used, it is extremely difficult for organizations to detect the malicious activity in connection with the campaign. These tactics are used to collect victim information, evade detection, and deliver Cobalt Strike.
The research can be found here:
Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Oct 2022 05:00:00 -0000</pubDate>
      <itunes:title>Google Drive used for malware?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>253</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Jen Miller-Osborn from Palo Alto Networks' Unit 42 joins Dave to discuss their work on the Cloaked Ursa group, with a recent report released called "Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive." The research shares insights into an active campaign from Russia’s Foreign Intelligence Service, that is leveraging the use of trusted, legitimate cloud services including Google Drive as a staging platform to deliver malware.
The research states that when these tactics are used, it is extremely difficult for organizations to detect the malicious activity in connection with the campaign. These tactics are used to collect victim information, evade detection, and deliver Cobalt Strike.
The research can be found here:
Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jen Miller-Osborn from Palo Alto Networks' Unit 42 joins Dave to discuss their work on the Cloaked Ursa group, with a recent report released called "Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive." The research shares insights into an active campaign from Russia’s Foreign Intelligence Service, that is leveraging the use of trusted, legitimate cloud services including Google Drive as a staging platform to deliver malware.</p><p>The research states that when these tactics are used, it is extremely difficult for organizations to detect the malicious activity in connection with the campaign. These tactics are used to collect victim information, evade detection, and deliver Cobalt Strike.</p><p>The research can be found here:</p><ul><li><a href="https://unit42.paloaltonetworks.com/cloaked-ursa-online-storage-services-campaigns/">Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1361</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9d20c93e-6389-11ec-b04f-6f4f4c0e9641]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2798664127.mp3?updated=1685127181" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Targeting your browser bookmarks?</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/252/notes</link>
      <description>David Prefer from SANS sits down with Dave to discuss how a new covert channel exfiltrates data via a browser's built-in bookmark sync. David goes on to describe how this research will "describe how the ability to synchronize bookmarks across devices introduces a novel vector for data exfiltration and other misuses."
In the research, he shares how he tested his said hypothesis and goes on to describe how the interesting find was tested on multiple browsers including Chrome, Edge, Brave and Opera. In his research, he found that bookmarks are able to keep data and synchronize it, making it easier to infiltrate and extract data from. David shares the rest of his findings, as well as what organizations and browser developers can do to work on this new threat.
The research can be found here:
Bookmark Bruggling: Novel Data Exfiltration with Brugglemark

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Oct 2022 05:00:00 -0000</pubDate>
      <itunes:title>Targeting your browser bookmarks?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>252</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>David Prefer from SANS sits down with Dave to discuss how a new covert channel exfiltrates data via a browser's built-in bookmark sync. David goes on to describe how this research will "describe how the ability to synchronize bookmarks across devices introduces a novel vector for data exfiltration and other misuses."
In the research, he shares how he tested his said hypothesis and goes on to describe how the interesting find was tested on multiple browsers including Chrome, Edge, Brave and Opera. In his research, he found that bookmarks are able to keep data and synchronize it, making it easier to infiltrate and extract data from. David shares the rest of his findings, as well as what organizations and browser developers can do to work on this new threat.
The research can be found here:
Bookmark Bruggling: Novel Data Exfiltration with Brugglemark

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>David Prefer from SANS sits down with Dave to discuss how a new covert channel exfiltrates data via a browser's built-in bookmark sync. David goes on to describe how this research will "describe how the ability to synchronize bookmarks across devices introduces a novel vector for data exfiltration and other misuses."</p><p>In the research, he shares how he tested his said hypothesis and goes on to describe how the interesting find was tested on multiple browsers including Chrome, Edge, Brave and Opera. In his research, he found that bookmarks are able to keep data and synchronize it, making it easier to infiltrate and extract data from. David shares the rest of his findings, as well as what organizations and browser developers can do to work on this new threat.</p><p>The research can be found here:</p><ul><li><a href="https://sansorg.egnyte.com/dl/QiM93tBLEr%20">Bookmark Bruggling: Novel Data Exfiltration with Brugglemark</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1100</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9d014564-6389-11ec-b04f-9b74e2540079]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7225047662.mp3?updated=1685127166" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Keeping an eye on RDS vulnerabilities. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/251/notes</link>
      <description>Gafnit Amiga, Director of Security Research from Lightspin, joins Dave to discuss her team's research "AWS RDS Vulnerability Leads to AWS Internal Service Credentials." The research describes how the vulnerability was caught and right after it was reported, the AWS Security team applied an initial patch limited only to the recent Amazon Relational Database Service (RDS) and Aurora PostgreSQL engines, excluding older versions.
They followed by personally reaching out to the customers affected by the vulnerability and helped them through the update process. The research states "Lightspin's Research Team obtained credentials to an internal AWS service by exploiting a local file read vulnerability on the RDS EC2 instance using the log_fdw extension."
The research can be found here:
AWS RDS Vulnerability Leads to AWS Internal Service Credentials

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Sep 2022 05:00:00 -0000</pubDate>
      <itunes:title>Keeping an eye on RDS vulnerabilities. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>251</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Gafnit Amiga, Director of Security Research from Lightspin, joins Dave to discuss her team's research "AWS RDS Vulnerability Leads to AWS Internal Service Credentials." The research describes how the vulnerability was caught and right after it was reported, the AWS Security team applied an initial patch limited only to the recent Amazon Relational Database Service (RDS) and Aurora PostgreSQL engines, excluding older versions.
They followed by personally reaching out to the customers affected by the vulnerability and helped them through the update process. The research states "Lightspin's Research Team obtained credentials to an internal AWS service by exploiting a local file read vulnerability on the RDS EC2 instance using the log_fdw extension."
The research can be found here:
AWS RDS Vulnerability Leads to AWS Internal Service Credentials

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Gafnit Amiga, Director of Security Research from Lightspin, joins Dave to discuss her team's research "AWS RDS Vulnerability Leads to AWS Internal Service Credentials." The research describes how the vulnerability was caught and right after it was reported, the AWS Security team applied an initial patch limited only to the recent Amazon Relational Database Service (RDS) and Aurora PostgreSQL engines, excluding older versions.</p><p>They followed by personally reaching out to the customers affected by the vulnerability and helped them through the update process. The research states "Lightspin's Research Team obtained credentials to an internal AWS service by exploiting a local file read vulnerability on the RDS EC2 instance using the log_fdw extension."</p><p>The research can be found here:</p><ul><li><a href="https://blog.lightspin.io/aws-rds-critical-security-vulnerability">AWS RDS Vulnerability Leads to AWS Internal Service Credentials</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>971</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9ce15272-6389-11ec-b04f-6381569be251]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2382223895.mp3?updated=1685127158" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An increase in bypassing bot management?</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/250/notes</link>
      <description>Sam Crowther, CEO of Kasada join's Dave to discuss their work on "The New Way Fraudsters Bypass Bot Management." Kasada researchers recently discovered a new type of bot called Solver Services, which is used and created by bad actors to bypass the majority of bot management systems.
The research states "Now it’s easier than ever for mainstream bot operators to scrape content, take over accounts, hoard inventory, and commit other forms of automated fraud against organizations using legacy bot management solutions." Attackers are able to buy these “Solver” bots, APIs, and services for less than $500 per month to make a profit.
The research can be found here:
The Emergence of Solver Services: The New Way Fraudsters Bypass Bot Management Vendors

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Sep 2022 05:00:00 -0000</pubDate>
      <itunes:title>An increase in bypassing bot management?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>250</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Sam Crowther, CEO of Kasada join's Dave to discuss their work on "The New Way Fraudsters Bypass Bot Management." Kasada researchers recently discovered a new type of bot called Solver Services, which is used and created by bad actors to bypass the majority of bot management systems.
The research states "Now it’s easier than ever for mainstream bot operators to scrape content, take over accounts, hoard inventory, and commit other forms of automated fraud against organizations using legacy bot management solutions." Attackers are able to buy these “Solver” bots, APIs, and services for less than $500 per month to make a profit.
The research can be found here:
The Emergence of Solver Services: The New Way Fraudsters Bypass Bot Management Vendors

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Sam Crowther, CEO of Kasada join's Dave to discuss their work on "The New Way Fraudsters Bypass Bot Management." Kasada researchers recently discovered a new type of bot called Solver Services, which is used and created by bad actors to bypass the majority of bot management systems.</p><p>The research states "Now it’s easier than ever for mainstream bot operators to scrape content, take over accounts, hoard inventory, and commit other forms of automated fraud against organizations using legacy bot management solutions." Attackers are able to buy these “Solver” bots, APIs, and services for less than $500 per month to make a profit.</p><p>The research can be found here:</p><ul><li><a href="https://www.kasada.io/solver-services-fraudsters-bypass-bot-management/">The Emergence of Solver Services: The New Way Fraudsters Bypass Bot Management Vendors</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>894</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9cc200e8-6389-11ec-b04f-b784db533e7e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2400054875.mp3?updated=1685127147" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Evilnum APT returns with new targets.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/249/notes</link>
      <description>Deepen Desai from Zscaler ThreatLabz joins Dave to discuss their work on "Return of the Evilnum APT with updated TTPs and new targets." Zscaler’s ThreatLabz team recently caught a new Evilnum APT attack campaign that uses the document template on MS Office Word to inject malicious payload to the victim's machine. There are three new instances used of the campaign, including updated tactics, techniques, and procedures.
Researchers have been closely monitoring Evilnum APT’s activity. They ssay ThreatLabz identified several domains associated with the Evilnum APT group. Which has led them to discover that the "group has been successful at flying under the radar and has remained undetected for a long time."
The research can be found here:
Return of the Evilnum APT with updated TTPs and new targets

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Sep 2022 05:00:00 -0000</pubDate>
      <itunes:title>Evilnum APT returns with new targets.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>249</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Deepen Desai from Zscaler ThreatLabz joins Dave to discuss their work on "Return of the Evilnum APT with updated TTPs and new targets." Zscaler’s ThreatLabz team recently caught a new Evilnum APT attack campaign that uses the document template on MS Office Word to inject malicious payload to the victim's machine. There are three new instances used of the campaign, including updated tactics, techniques, and procedures.
Researchers have been closely monitoring Evilnum APT’s activity. They ssay ThreatLabz identified several domains associated with the Evilnum APT group. Which has led them to discover that the "group has been successful at flying under the radar and has remained undetected for a long time."
The research can be found here:
Return of the Evilnum APT with updated TTPs and new targets

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Deepen Desai from Zscaler ThreatLabz joins Dave to discuss their work on "Return of the Evilnum APT with updated TTPs and new targets." Zscaler’s ThreatLabz team recently caught a new Evilnum APT attack campaign that uses the document template on MS Office Word to inject malicious payload to the victim's machine. There are three new instances used of the campaign, including updated tactics, techniques, and procedures.</p><p>Researchers have been closely monitoring Evilnum APT’s activity. They ssay ThreatLabz identified several domains associated with the Evilnum APT group. Which has led them to discover that the "group has been successful at flying under the radar and has remained undetected for a long time."</p><p>The research can be found here:</p><ul><li><a href="https://www.zscaler.com/blogs/security-research/return-evilnum-apt-updated-ttps-and-new-targets">Return of the Evilnum APT with updated TTPs and new targets</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1312</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9ca2d16e-6389-11ec-b04f-2fb31951bbac]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7148028065.mp3?updated=1685127139" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>LockBit's contradiction on encryption speed.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/248/notes</link>
      <description>Ryan Kovar from Splunk sits down with Dave to discuss their findings in "Truth in Malvertising?" that contradict the LockBit group's encryption speed claims. Splunk's SURGe team recently released a whitepaper, blog, and video that outlined the encryption speeds of 10 different ransomware families. During their research they cam across Lockbit doing the same thing. After completing the research, the researchers came back to test the veracity of LockBit’s findings.
The research showed three interesting finds. The first find showed that LockBit’s fastest and slowest samples were closely aligned between the tests, but the other results were very different. They also found that LockBit continues to be the fastest ransomware, but LockBit 2.0 was more efficient yet slower than its previous counterpart, LockBit 1.0. Lastly, once ransomware gets to the point of encrypting your systems, it’s too late.
The research can be found here:
Truth in Malvertising?

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Sep 2022 05:00:00 -0000</pubDate>
      <itunes:title>LockBit's contradiction on encryption speed.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>248</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ryan Kovar from Splunk sits down with Dave to discuss their findings in "Truth in Malvertising?" that contradict the LockBit group's encryption speed claims. Splunk's SURGe team recently released a whitepaper, blog, and video that outlined the encryption speeds of 10 different ransomware families. During their research they cam across Lockbit doing the same thing. After completing the research, the researchers came back to test the veracity of LockBit’s findings.
The research showed three interesting finds. The first find showed that LockBit’s fastest and slowest samples were closely aligned between the tests, but the other results were very different. They also found that LockBit continues to be the fastest ransomware, but LockBit 2.0 was more efficient yet slower than its previous counterpart, LockBit 1.0. Lastly, once ransomware gets to the point of encrypting your systems, it’s too late.
The research can be found here:
Truth in Malvertising?

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ryan Kovar from Splunk sits down with Dave to discuss their findings in "Truth in Malvertising?" that contradict the LockBit group's encryption speed claims. Splunk's SURGe team recently released a whitepaper, blog, and video that outlined the encryption speeds of 10 different ransomware families. During their research they cam across Lockbit doing the same thing. After completing the research, the researchers came back to test the veracity of LockBit’s findings.</p><p>The research showed three interesting finds. The first find showed that LockBit’s fastest and slowest samples were closely aligned between the tests, but the other results were very different. They also found that LockBit continues to be the fastest ransomware, but LockBit 2.0 was more efficient yet slower than its previous counterpart, LockBit 1.0. Lastly, once ransomware gets to the point of encrypting your systems, it’s too late.</p><p>The research can be found here:</p><ul><li><a href="https://www.splunk.com/en_us/blog/security/truth-in-malvertising.html">Truth in Malvertising?</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1189</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9c8347a4-6389-11ec-b04f-af16ac42cc5c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4763075730.mp3?updated=1685127128" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How a wide scale Facebook campaign stole 1 million credentials.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/247/notes</link>
      <description>Nick Ascoli from ForeTrace in a partnership with PIXM sits down with Dave to provide insight on their team's work on "Phishing tactics: how a threat actor stole 1 million credentials in 4 months." During routine analysis, researchers discovered the connection between the pages using PIXM’s deep html analysis feature, which enabled them to view and analyze the underlying code on the pages after they were flagged as phishing. This led to the ensuing investigation, which was led by PIXM’s threat research team with assistance from Nick Ascoli.
The research states "we uncovered a campaign whose scale has potentially impacted hundreds of millions of facebook users, and whose complexity offer insight into the evolving nature of phishing operations, especially from a technical perspective."
The research can be found here:
Phishing tactics: how a threat actor stole 1M credentials in 4 months

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Aug 2022 05:00:00 -0000</pubDate>
      <itunes:title>How a wide scale Facebook campaign stole 1 million credentials.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>247</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Nick Ascoli from ForeTrace in a partnership with PIXM sits down with Dave to provide insight on their team's work on "Phishing tactics: how a threat actor stole 1 million credentials in 4 months." During routine analysis, researchers discovered the connection between the pages using PIXM’s deep html analysis feature, which enabled them to view and analyze the underlying code on the pages after they were flagged as phishing. This led to the ensuing investigation, which was led by PIXM’s threat research team with assistance from Nick Ascoli.
The research states "we uncovered a campaign whose scale has potentially impacted hundreds of millions of facebook users, and whose complexity offer insight into the evolving nature of phishing operations, especially from a technical perspective."
The research can be found here:
Phishing tactics: how a threat actor stole 1M credentials in 4 months

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Nick Ascoli from ForeTrace in a partnership with PIXM sits down with Dave to provide insight on their team's work on "Phishing tactics: how a threat actor stole 1 million credentials in 4 months." During routine analysis, researchers discovered the connection between the pages using PIXM’s deep html analysis feature, which enabled them to view and analyze the underlying code on the pages after they were flagged as phishing. This led to the ensuing investigation, which was led by PIXM’s threat research team with assistance from Nick Ascoli.</p><p>The research states "we uncovered a campaign whose scale has potentially impacted hundreds of millions of facebook users, and whose complexity offer insight into the evolving nature of phishing operations, especially from a technical perspective."</p><p>The research can be found here:</p><ul><li><a href="https://pixmsecurity.com/blog/blog/phishing-tactics-how-a-threat-actor-stole-1m-credentials-in-4-months/">Phishing tactics: how a threat actor stole 1M credentials in 4 months</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1462</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9c63ebde-6389-11ec-b04f-2bf73adb992a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7365835478.mp3?updated=1685127120" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Clipminer: Making millions off of malware.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/246/notes</link>
      <description>Dick O'Brien from Symantec, a part of Broadcom Software, joins Dave to discuss how the cyber-criminal operation, Clipminer Botnet, makes operators behind it at least $1.7 million. Symantec's research says "The malware being used, tracked as Trojan.Clipminer, has a number of similarities to another crypto-mining Trojan called KryptoCibule, suggesting it may be a copycat or evolution of that threat."
Symantec determined that the malware has the ability to mine for cryptocurrency using compromised computers’ resources. They also share a way to protect against the cyber-criminal operation, as well as sharing some indicators you could be compromised.
The research can be found here:
Clipminer Botnet Makes Operators at Least $1.7 Million

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Aug 2022 05:00:00 -0000</pubDate>
      <itunes:title>Clipminer: Making millions off of malware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>246</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dick O'Brien from Symantec, a part of Broadcom Software, joins Dave to discuss how the cyber-criminal operation, Clipminer Botnet, makes operators behind it at least $1.7 million. Symantec's research says "The malware being used, tracked as Trojan.Clipminer, has a number of similarities to another crypto-mining Trojan called KryptoCibule, suggesting it may be a copycat or evolution of that threat."
Symantec determined that the malware has the ability to mine for cryptocurrency using compromised computers’ resources. They also share a way to protect against the cyber-criminal operation, as well as sharing some indicators you could be compromised.
The research can be found here:
Clipminer Botnet Makes Operators at Least $1.7 Million

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dick O'Brien from Symantec, a part of Broadcom Software, joins Dave to discuss how the cyber-criminal operation, Clipminer Botnet, makes operators behind it at least $1.7 million. Symantec's research says "The malware being used, tracked as Trojan.Clipminer, has a number of similarities to another crypto-mining Trojan called KryptoCibule, suggesting it may be a copycat or evolution of that threat."</p><p>Symantec determined that the malware has the ability to mine for cryptocurrency using compromised computers’ resources. They also share a way to protect against the cyber-criminal operation, as well as sharing some indicators you could be compromised.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/clipminer-bitcoin-mining-hijacking">Clipminer Botnet Makes Operators at Least $1.7 Million</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>981</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9c44a742-6389-11ec-b04f-d3f20dfe5bd2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4926288275.mp3?updated=1685127110" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fake job ads and how to spot them. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/245/notes</link>
      <description>Ashley Taylor from SANS.edu, joins Dave to discuss fake job ads and methods to proactively detect these scams. The research shares how job seekers are under attack, with scammers posing as fake job recruiters to steal information from people who are interested in the job posting. The brands being impersonated as are at risk of losing credibility to their brand identity.
The research shares exactly how these doppelgängers are posing a threat to job seekers and the best practices to detect these scams. It also shares how one company that works in medical device manufacturing industry has been a target for these scams. It concludes with sharing some of the ways to proactively spot these scams before they happen.
The research can be found here:
Doppelgängers: Finding Job Scammers Who Steal Brand Identities

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Aug 2022 05:00:00 -0000</pubDate>
      <itunes:title>Fake job ads and how to spot them. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>245</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ashley Taylor from SANS.edu, joins Dave to discuss fake job ads and methods to proactively detect these scams. The research shares how job seekers are under attack, with scammers posing as fake job recruiters to steal information from people who are interested in the job posting. The brands being impersonated as are at risk of losing credibility to their brand identity.
The research shares exactly how these doppelgängers are posing a threat to job seekers and the best practices to detect these scams. It also shares how one company that works in medical device manufacturing industry has been a target for these scams. It concludes with sharing some of the ways to proactively spot these scams before they happen.
The research can be found here:
Doppelgängers: Finding Job Scammers Who Steal Brand Identities

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ashley Taylor from SANS.edu, joins Dave to discuss fake job ads and methods to proactively detect these scams. The research shares how job seekers are under attack, with scammers posing as fake job recruiters to steal information from people who are interested in the job posting. The brands being impersonated as are at risk of losing credibility to their brand identity.</p><p>The research shares exactly how these doppelgängers are posing a threat to job seekers and the best practices to detect these scams. It also shares how one company that works in medical device manufacturing industry has been a target for these scams. It concludes with sharing some of the ways to proactively spot these scams before they happen.</p><p>The research can be found here:</p><ul><li><a href="https://www.sans.org/white-papers/doppelgangers-finding-job-scammers-who-steal-brand-identities/">Doppelgängers: Finding Job Scammers Who Steal Brand Identities</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1088</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9c2543de-6389-11ec-b04f-fb349a4a3c6d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7411685272.mp3?updated=1685127101" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Iran-linked Lyceum Group adds a new weapon to its arsenal. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/244/notes</link>
      <description>Deepen Desai from Zscaler's ThreatLabz joins Dave to discuss how APTs, like Lyceum Group, create tactics and malware to carry out attacks against their targets. The Lyceum group has been active since 2017 and is a state-sponsored Iranian APT group. This group targets Middle Eastern organizations most notably in the energy and telecommunication sectors, and they rely heavily on .NET based malwares.
Zscaler said in their research they "recently observed a new campaign where the Lyceum Group was utilizing a newly developed and customized .NET based malware targeting the Middle East by copying the underlying code from an open source tool." They go on to give an analysis explaining why the .NET based DNS backdoor is causing problems.
The research can be found here:
Lyceum .NET DNS Backdoor

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Aug 2022 05:00:00 -0000</pubDate>
      <itunes:title>Iran-linked Lyceum Group adds a new weapon to its arsenal. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>244</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Deepen Desai from Zscaler's ThreatLabz joins Dave to discuss how APTs, like Lyceum Group, create tactics and malware to carry out attacks against their targets. The Lyceum group has been active since 2017 and is a state-sponsored Iranian APT group. This group targets Middle Eastern organizations most notably in the energy and telecommunication sectors, and they rely heavily on .NET based malwares.
Zscaler said in their research they "recently observed a new campaign where the Lyceum Group was utilizing a newly developed and customized .NET based malware targeting the Middle East by copying the underlying code from an open source tool." They go on to give an analysis explaining why the .NET based DNS backdoor is causing problems.
The research can be found here:
Lyceum .NET DNS Backdoor

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Deepen Desai from Zscaler's ThreatLabz joins Dave to discuss how APTs, like Lyceum Group, create tactics and malware to carry out attacks against their targets. The Lyceum group has been active since 2017 and is a state-sponsored Iranian APT group. This group targets Middle Eastern organizations most notably in the energy and telecommunication sectors, and they rely heavily on .NET based malwares.</p><p>Zscaler said in their research they "recently observed a new campaign where the Lyceum Group was utilizing a newly developed and customized .NET based malware targeting the Middle East by copying the underlying code from an open source tool." They go on to give an analysis explaining why the .NET based DNS backdoor is causing problems.</p><p>The research can be found here:</p><ul><li><a href="https://www.zscaler.com/blogs/security-research/lyceum-net-dns-backdoor">Lyceum .NET DNS Backdoor</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>943</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9c05c590-6389-11ec-b04f-b35d1b1b3fee]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3140061301.mp3?updated=1685127091" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What malicious campaign is lurking under the surface?</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/243/notes</link>
      <description>Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the DOJ on the investigation into the malicious campaign.
The research states, "For years, the campaign had operated undetected, siphoning intellectual property and sensitive data." The team quickly made two reports on the campaign, one sharing an examination on the tactics and techniques. The second gives a detailed analysis of the malware and exploits used.
The research can be found here:
Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Jul 2022 05:00:00 -0000</pubDate>
      <itunes:title>What malicious campaign is lurking under the surface?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>243</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the DOJ on the investigation into the malicious campaign.
The research states, "For years, the campaign had operated undetected, siphoning intellectual property and sensitive data." The team quickly made two reports on the campaign, one sharing an examination on the tactics and techniques. The second gives a detailed analysis of the malware and exploits used.
The research can be found here:
Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the DOJ on the investigation into the malicious campaign.</p><p>The research states, "For years, the campaign had operated undetected, siphoning intellectual property and sensitive data." The team quickly made two reports on the campaign, one sharing an examination on the tactics and techniques. The second gives a detailed analysis of the malware and exploits used.</p><p>The research can be found here:</p><ul><li><a href="https://www.cybereason.com/blog/operation-cuckoobees-cybereason-uncovers-massive-chinese-intellectual-property-theft-operation">Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1293</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9be627c6-6389-11ec-b04f-9347c23a90bd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4855992585.mp3?updated=1685127081" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Has GOLD SOUTHFIELD resumed operations?</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/242/notes</link>
      <description>Rob Pantazopoulos from Secureworks, joins Dave to discuss their work on "REvil Development Adds Confidence About GOLD SOUTHFIELD Reemergence." Secureworks researchers published a new analysis on what can be considered the ‘first’ set of ransomware samples associated with the reemergence. These updated samples indicate that GOLD SOUTHFIELD has resumed operations.
The research states "The identification of multiple samples containing different modifications and the lack of an official new version indicate that REvil is under active development." Researchers identified two samples, one in October of 2021, and the other in March of 2022. The March sample has modifications that lead researchers to distinguish the two samples from one another.
The research can be found here:
REvil Development Adds Confidence About GOLD SOUTHFIELD Reemergence

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Jul 2022 05:00:00 -0000</pubDate>
      <itunes:title>Has GOLD SOUTHFIELD resumed operations?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>242</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Rob Pantazopoulos from Secureworks, joins Dave to discuss their work on "REvil Development Adds Confidence About GOLD SOUTHFIELD Reemergence." Secureworks researchers published a new analysis on what can be considered the ‘first’ set of ransomware samples associated with the reemergence. These updated samples indicate that GOLD SOUTHFIELD has resumed operations.
The research states "The identification of multiple samples containing different modifications and the lack of an official new version indicate that REvil is under active development." Researchers identified two samples, one in October of 2021, and the other in March of 2022. The March sample has modifications that lead researchers to distinguish the two samples from one another.
The research can be found here:
REvil Development Adds Confidence About GOLD SOUTHFIELD Reemergence

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rob Pantazopoulos from Secureworks, joins Dave to discuss their work on "REvil Development Adds Confidence About GOLD SOUTHFIELD Reemergence." Secureworks researchers published a new analysis on what can be considered the ‘first’ set of ransomware samples associated with the reemergence. These updated samples indicate that GOLD SOUTHFIELD has resumed operations.</p><p>The research states "The identification of multiple samples containing different modifications and the lack of an official new version indicate that REvil is under active development." Researchers identified two samples, one in October of 2021, and the other in March of 2022. The March sample has modifications that lead researchers to distinguish the two samples from one another.</p><p>The research can be found here:</p><ul><li><a href="https://www.secureworks.com/blog/revil-development-adds-confidence-about-gold-southfield-reemergence">REvil Development Adds Confidence About GOLD SOUTHFIELD Reemergence</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1264</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9bc65eb4-6389-11ec-b04f-5b4d95797c7c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7741905048.mp3?updated=1685127072" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A record breaking DDoS attack.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/241/notes</link>
      <description>Chad Seaman, Team Lead at Akamai SIRT joins Dave to discuss their research about a record-breaking DDoS Attack. The research says "A new reflection/amplification distributed denial-of-service (DDoS) vector with a record-breaking potential amplification ratio of 4,294,967,296:1 has been abused by attackers in the wild to launch multiple high-impact DDoS attacks."
Starting in mid-February 2022, security researchers, network operators, and security vendors noticed a spike in DDoS attacks. Researchers started to investigate the spike and determined that the devices that were being abused to launch these attacks are MiCollab and MiVoice Business Express collaboration systems. The research goes into how you can help mitigate the attacks and how Mitel has now released patched software.
The research can be found here:
CVE-2022-26143: TP240PhoneHome Reflection/Amplification DDoS Attack Vector

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Jul 2022 05:00:00 -0000</pubDate>
      <itunes:title>A record breaking DDoS attack.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>241</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Chad Seaman, Team Lead at Akamai SIRT joins Dave to discuss their research about a record-breaking DDoS Attack. The research says "A new reflection/amplification distributed denial-of-service (DDoS) vector with a record-breaking potential amplification ratio of 4,294,967,296:1 has been abused by attackers in the wild to launch multiple high-impact DDoS attacks."
Starting in mid-February 2022, security researchers, network operators, and security vendors noticed a spike in DDoS attacks. Researchers started to investigate the spike and determined that the devices that were being abused to launch these attacks are MiCollab and MiVoice Business Express collaboration systems. The research goes into how you can help mitigate the attacks and how Mitel has now released patched software.
The research can be found here:
CVE-2022-26143: TP240PhoneHome Reflection/Amplification DDoS Attack Vector

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chad Seaman, Team Lead at Akamai SIRT joins Dave to discuss their research about a record-breaking DDoS Attack. The research says "A new reflection/amplification distributed denial-of-service (DDoS) vector with a record-breaking potential amplification ratio of 4,294,967,296:1 has been abused by attackers in the wild to launch multiple high-impact DDoS attacks."</p><p>Starting in mid-February 2022, security researchers, network operators, and security vendors noticed a spike in DDoS attacks. Researchers started to investigate the spike and determined that the devices that were being abused to launch these attacks are MiCollab and MiVoice Business Express collaboration systems. The research goes into how you can help mitigate the attacks and how Mitel has now released patched software.</p><p>The research can be found here:</p><ul><li><a href="https://www.akamai.com/blog/security/phone-home-ddos-attack-vector">CVE-2022-26143: TP240PhoneHome Reflection/Amplification DDoS Attack Vector</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1485</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9ba6f0ce-6389-11ec-b04f-1b8cbe09c78b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7664337658.mp3?updated=1685127066" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Information operations during a war.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/240/notes</link>
      <description>Alden Wahlstrom, senior analyst on Mandiant's Information Operations Team, shares a comprehensive overview and analysis of the various information operations activities they’ve seen while responding to the Russian invasion. While the full extent of the Russia-Ukraine war has yet to come to light, more than two months after the start of the invasion, Mandiant has identified activity that they believed to be information operations campaigns conducted by actors possibly in support of the political interests of nation-states such as Russia, Belarus, China, and Iran.
The research shares a chart with all of the known information operations events that have taken place so far dating back to January of 2022. It also states that following the beginning of the Russian attack they have seen concerning signs, including "incidents involving the deployment of wiper malware disguised as ransomware."
The research can be found here:
The IO Offensive: Information Operations Surrounding the Russian Invasion of Ukraine

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Jul 2022 05:00:00 -0000</pubDate>
      <itunes:title>Information operations during a war.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>240</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Alden Wahlstrom, senior analyst on Mandiant's Information Operations Team, shares a comprehensive overview and analysis of the various information operations activities they’ve seen while responding to the Russian invasion. While the full extent of the Russia-Ukraine war has yet to come to light, more than two months after the start of the invasion, Mandiant has identified activity that they believed to be information operations campaigns conducted by actors possibly in support of the political interests of nation-states such as Russia, Belarus, China, and Iran.
The research shares a chart with all of the known information operations events that have taken place so far dating back to January of 2022. It also states that following the beginning of the Russian attack they have seen concerning signs, including "incidents involving the deployment of wiper malware disguised as ransomware."
The research can be found here:
The IO Offensive: Information Operations Surrounding the Russian Invasion of Ukraine

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Alden Wahlstrom, senior analyst on Mandiant's Information Operations Team, shares a comprehensive overview and analysis of the various information operations activities they’ve seen while responding to the Russian invasion. While the full extent of the Russia-Ukraine war has yet to come to light, more than two months after the start of the invasion, Mandiant has identified activity that they believed to be information operations campaigns conducted by actors possibly in support of the political interests of nation-states such as Russia, Belarus, China, and Iran.</p><p>The research shares a chart with all of the known information operations events that have taken place so far dating back to January of 2022. It also states that following the beginning of the Russian attack they have seen concerning signs, including "incidents involving the deployment of wiper malware disguised as ransomware."</p><p>The research can be found here:</p><ul><li><a href="https://www.mandiant.com/resources/information-operations-surrounding-ukraine">The IO Offensive: Information Operations Surrounding the Russian Invasion of Ukraine</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1150</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9b874a3a-6389-11ec-b04f-37e458a5c435]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4347885183.mp3?updated=1685127053" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Could REvil have a copycat? </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/239/notes</link>
      <description>Larry Cashdollar from Akamai, joins Dave to discuss their research on a DDoS campaign claiming to be REvil. The research shares that Akamai's team was notified last week of an attack on one of their hospitality customers that they called "Layer 7" by a group claiming to be associated with REvil. In the research, they dive into the attack, as well as comparing it to other similar attacks that have been made by the group.
The research states "The attacks so far target a site by sending a wave of HTTP/2 GET requests with some cache-busting techniques to overwhelm the website." It also stated that this is a smaller attack than they have seen by the group before, and notes that there seems to be more of a political agenda behind the attack, whereas in the past, REvil has been less political.
The research can be found here:
REvil Resurgence? Or a Copycat?

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Jul 2022 05:00:00 -0000</pubDate>
      <itunes:title>Could REvil have a Copycat? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>239</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Larry Cashdollar from Akamai, joins Dave to discuss their research on a DDoS campaign claiming to be REvil. The research shares that Akamai's team was notified last week of an attack on one of their hospitality customers that they called "Layer 7" by a group claiming to be associated with REvil. In the research, they dive into the attack, as well as comparing it to other similar attacks that have been made by the group.
The research states "The attacks so far target a site by sending a wave of HTTP/2 GET requests with some cache-busting techniques to overwhelm the website." It also stated that this is a smaller attack than they have seen by the group before, and notes that there seems to be more of a political agenda behind the attack, whereas in the past, REvil has been less political.
The research can be found here:
REvil Resurgence? Or a Copycat?

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Larry Cashdollar from Akamai, joins Dave to discuss their research on a DDoS campaign claiming to be REvil. The research shares that Akamai's team was notified last week of an attack on one of their hospitality customers that they called "Layer 7" by a group claiming to be associated with REvil. In the research, they dive into the attack, as well as comparing it to other similar attacks that have been made by the group.</p><p>The research states "The attacks so far target a site by sending a wave of HTTP/2 GET requests with some cache-busting techniques to overwhelm the website." It also stated that this is a smaller attack than they have seen by the group before, and notes that there seems to be more of a political agenda behind the attack, whereas in the past, REvil has been less political.</p><p>The research can be found here:</p><ul><li><a href="https://www.akamai.com/blog/security/revil-resurgence-or-copycat">REvil Resurgence? Or a Copycat?</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>891</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9b67c228-6389-11ec-b04f-97409f9559ca]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6401302608.mp3?updated=1685126990" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lazarus Targets Chemical Sector With 'Dream Job.'</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/238/notes</link>
      <description>Alan Neville, a Threat Intelligence Analyst from Symantec Broadcom, joins Dave to discuss their research "Lazarus Targets Chemical Sector." Symantec has observed the North Korea-linked threat group known as Lazarus conducting an espionage campaign targeting organizations operating within the chemical sector.
The campaign appears to be a continuation of the group's activity called Operation Dream Job, which Symantec first came across in August of 2020. The research states "evidence includes file hashes, file names, and tools that were observed in previous Dream Job campaigns."
The research can be found here:
Lazarus Targets Chemical Sector

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Jun 2022 05:00:00 -0000</pubDate>
      <itunes:title>Lazarus Targets Chemical Sector With 'Dream Job.'</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>238</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Alan Neville, a Threat Intelligence Analyst from Symantec Broadcom, joins Dave to discuss their research "Lazarus Targets Chemical Sector." Symantec has observed the North Korea-linked threat group known as Lazarus conducting an espionage campaign targeting organizations operating within the chemical sector.
The campaign appears to be a continuation of the group's activity called Operation Dream Job, which Symantec first came across in August of 2020. The research states "evidence includes file hashes, file names, and tools that were observed in previous Dream Job campaigns."
The research can be found here:
Lazarus Targets Chemical Sector

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Alan Neville, a Threat Intelligence Analyst from Symantec Broadcom, joins Dave to discuss their research "Lazarus Targets Chemical Sector." Symantec has observed the North Korea-linked threat group known as Lazarus conducting an espionage campaign targeting organizations operating within the chemical sector.</p><p>The campaign appears to be a continuation of the group's activity called Operation Dream Job, which Symantec first came across in August of 2020. The research states "evidence includes file hashes, file names, and tools that were observed in previous Dream Job campaigns."</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lazarus-dream-job-chemical">Lazarus Targets Chemical Sector</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1262</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9b482d78-6389-11ec-b04f-23548d939a66]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6678332702.mp3?updated=1685126863" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dissecting the Spring4Shell vulnerability.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/237/notes</link>
      <description>Edward Wu, senior principal data scientist at ExtraHop, joins Dave to discuss the company's research, "A Technical Analysis of How Spring4Shell Works." ExtraHop first noticed chatter from social media in March of 2022 on a new remote code execution (RCE) vulnerability and immediately started tracking the issue.
In the research, it describes how the exploit works and breaks down how the ExtraHop team came to identify the Spring4Shell vulnerability. The research describes the severity of the vulnerability, saying, "The impact of an RCE in this framework could have a serious impact similar to Log4Shell."
The research can be found here:
How the Spring4Shell Zero-Day Vulnerability Works

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Jun 2022 05:00:00 -0000</pubDate>
      <itunes:title>Dissecting the Spring4Shell vulnerability.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>237</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Edward Wu, senior principal data scientist at ExtraHop, joins Dave to discuss the company's research, "A Technical Analysis of How Spring4Shell Works." ExtraHop first noticed chatter from social media in March of 2022 on a new remote code execution (RCE) vulnerability and immediately started tracking the issue.
In the research, it describes how the exploit works and breaks down how the ExtraHop team came to identify the Spring4Shell vulnerability. The research describes the severity of the vulnerability, saying, "The impact of an RCE in this framework could have a serious impact similar to Log4Shell."
The research can be found here:
How the Spring4Shell Zero-Day Vulnerability Works

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Edward Wu, senior principal data scientist at ExtraHop, joins Dave to discuss the company's research, "A Technical Analysis of How Spring4Shell Works." ExtraHop first noticed chatter from social media in March of 2022 on a new remote code execution (RCE) vulnerability and immediately started tracking the issue.</p><p>In the research, it describes how the exploit works and breaks down how the ExtraHop team came to identify the Spring4Shell vulnerability. The research describes the severity of the vulnerability, saying, "The impact of an RCE in this framework could have a serious impact similar to Log4Shell."</p><p>The research can be found here:</p><ul><li><a href="https://www.extrahop.com/company/blog/2022/a-technical-analysis-of-how-spring4shell-works/">How the Spring4Shell Zero-Day Vulnerability Works</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1333</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9b28aa66-6389-11ec-b04f-3f3d55841657]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9171388502.mp3?updated=1685126855" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New developments in the WSL attack.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/236/notes</link>
      <description>Danny Adamitis from Lumen's Black Lotus Labs, joins Dave to discuss new developments in the WSL attack surface. Since September 2021, Black Lotus Labs have been monitoring malware repositories as a part of their proactive threat hunting process. Danny shares how researchers discovered a series of suspicious ELF files compiled for Debian Linux .
The research states how the team identified a series of samples that target the WSL environment, they were uploaded every two to three weeks and started as early as May 3, 2021 and go until August 22, 2021.
The research can be found here:

Windows Subsystem For Linux (WSL): Threats Still Lurk Below The (Sub)Surface

No Longer Just Theory: Black Lotus Labs Uncovers Linux Executables Deployed As Stealth Windows Loaders


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Jun 2022 05:00:00 -0000</pubDate>
      <itunes:title>New developments in the WSL attack.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>236</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Danny Adamitis from Lumen's Black Lotus Labs, joins Dave to discuss new developments in the WSL attack surface. Since September 2021, Black Lotus Labs have been monitoring malware repositories as a part of their proactive threat hunting process. Danny shares how researchers discovered a series of suspicious ELF files compiled for Debian Linux .
The research states how the team identified a series of samples that target the WSL environment, they were uploaded every two to three weeks and started as early as May 3, 2021 and go until August 22, 2021.
The research can be found here:

Windows Subsystem For Linux (WSL): Threats Still Lurk Below The (Sub)Surface

No Longer Just Theory: Black Lotus Labs Uncovers Linux Executables Deployed As Stealth Windows Loaders


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Danny Adamitis from Lumen's Black Lotus Labs, joins Dave to discuss new developments in the WSL attack surface. Since September 2021, Black Lotus Labs have been monitoring malware repositories as a part of their proactive threat hunting process. Danny shares how researchers discovered a series of suspicious ELF files compiled for Debian Linux .</p><p>The research states how the team identified a series of samples that target the WSL environment, they were uploaded every two to three weeks and started as early as May 3, 2021 and go until August 22, 2021.</p><p>The research can be found here:</p><ul>
<li><a href="https://blog.lumen.com/windows-subsystem-for-linux-wsl-threats/">Windows Subsystem For Linux (WSL): Threats Still Lurk Below The (Sub)Surface</a></li>
<li><a href="https://blog.lumen.com/no-longer-just-theory-black-lotus-labs-uncovers-linux-executables-deployed-as-stealth-windows-loaders/">No Longer Just Theory: Black Lotus Labs Uncovers Linux Executables Deployed As Stealth Windows Loaders</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1330</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9b087e44-6389-11ec-b04f-fb4f143c38fd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8412505461.mp3?updated=1685126838" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>LemonDucks evading detection.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/235/notes</link>
      <description>Scott Fanning from CrowdStrike's research team, joins Dave to discuss their work on "LemonDuck Targets Docker for Cryptomining Operations." LemonDuck is a well-known cryptomining botnet, and the research suggests attackers are attracted to the monetary gain from the recent boom in cryptocurrency.
LemonDuck was caught trying to disguise its attack against Docker by running an anonymous mining operation by the use of proxy pools. Scott shares how its unknown which organizations have been targeted and just how much cryptocurrency has been stolen.
The research can be found here:
LemonDuck Targets Docker for Cryptomining Operations

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Jun 2022 05:00:00 -0000</pubDate>
      <itunes:title>LemonDucks evading detection.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>235</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Scott Fanning from CrowdStrike's research team, joins Dave to discuss their work on "LemonDuck Targets Docker for Cryptomining Operations." LemonDuck is a well-known cryptomining botnet, and the research suggests attackers are attracted to the monetary gain from the recent boom in cryptocurrency.
LemonDuck was caught trying to disguise its attack against Docker by running an anonymous mining operation by the use of proxy pools. Scott shares how its unknown which organizations have been targeted and just how much cryptocurrency has been stolen.
The research can be found here:
LemonDuck Targets Docker for Cryptomining Operations

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Scott Fanning from CrowdStrike's research team, joins Dave to discuss their work on "LemonDuck Targets Docker for Cryptomining Operations." LemonDuck is a well-known cryptomining botnet, and the research suggests attackers are attracted to the monetary gain from the recent boom in cryptocurrency.</p><p>LemonDuck was caught trying to disguise its attack against Docker by running an anonymous mining operation by the use of proxy pools. Scott shares how its unknown which organizations have been targeted and just how much cryptocurrency has been stolen.</p><p>The research can be found here:</p><ul><li><a href="https://www.crowdstrike.com/blog/lemonduck-botnet-targets-docker-for-cryptomining-operations/">LemonDuck Targets Docker for Cryptomining Operations</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>922</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9ae956c2-6389-11ec-b04f-af463cadb180]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2529264724.mp3?updated=1685126888" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Compromised military tech?</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/234/notes</link>
      <description>Dick O'Brien from Symantec's threat hunter team, joins Dave to discuss their work on "Stonefly: North Korea-linked spying operation continues to hit high-value targets." Stonefly specializes in mounting highly selective targeted attacks against targets that could yield intelligence to assist strategically important sectors.
Symantec found that The attackers breached an engineering firm in February 2022, most likely by exploiting the Log4j vulnerability, Their research describes who these high value targets are and ways to prevent this malware from breaching any more companies as well as indications that you could be compromised.
The research can be found here:
Stonefly: North Korea-linked Spying Operation Continues to Hit High-value Targets

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 May 2022 05:00:00 -0000</pubDate>
      <itunes:title>Compromised military tech?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>234</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dick O'Brien from Symantec's threat hunter team, joins Dave to discuss their work on "Stonefly: North Korea-linked spying operation continues to hit high-value targets." Stonefly specializes in mounting highly selective targeted attacks against targets that could yield intelligence to assist strategically important sectors.
Symantec found that The attackers breached an engineering firm in February 2022, most likely by exploiting the Log4j vulnerability, Their research describes who these high value targets are and ways to prevent this malware from breaching any more companies as well as indications that you could be compromised.
The research can be found here:
Stonefly: North Korea-linked Spying Operation Continues to Hit High-value Targets

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dick O'Brien from Symantec's threat hunter team, joins Dave to discuss their work on "Stonefly: North Korea-linked spying operation continues to hit high-value targets." Stonefly specializes in mounting highly selective targeted attacks against targets that could yield intelligence to assist strategically important sectors.</p><p>Symantec found that The attackers breached an engineering firm in February 2022, most likely by exploiting the Log4j vulnerability, Their research describes who these high value targets are and ways to prevent this malware from breaching any more companies as well as indications that you could be compromised.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/stonefly-north-korea-espionage">Stonefly: North Korea-linked Spying Operation Continues to Hit High-value Targets</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1172</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9aca263a-6389-11ec-b04f-3381ae19940f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9976264972.mp3?updated=1684590294" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AutoWarp bug leads to Automation headaches.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/233/notes</link>
      <description>Yanir Tsarimi from Orca Security, joins Dave to discuss how researchers have discovered a critical Azure Automation service vulnerability called AutoWarp. The security flaw was discovered this past March causing Yanir to leap into action announcing the issue to Microsoft who helped to swiftly resolve the cross-account vulnerability.
The research shows how this serious flaw would allow attackers unauthorized access to other customer accounts and potentially full control over resources and data belonging to those accounts, as well as put multiple Fortune 500 companies and billions of dollars at risk. The research shares the crucial time line that the vulnerability was discovered as well as Microsofts response to the vulnerability.
The research can be found here:
AutoWarp: Critical Cross-Account Vulnerability in Microsoft Azure Automation Service

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 May 2022 05:00:00 -0000</pubDate>
      <itunes:title>AutoWarp bug leads to Automation headaches.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>233</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Yanir Tsarimi from Orca Security, joins Dave to discuss how researchers have discovered a critical Azure Automation service vulnerability called AutoWarp. The security flaw was discovered this past March causing Yanir to leap into action announcing the issue to Microsoft who helped to swiftly resolve the cross-account vulnerability.
The research shows how this serious flaw would allow attackers unauthorized access to other customer accounts and potentially full control over resources and data belonging to those accounts, as well as put multiple Fortune 500 companies and billions of dollars at risk. The research shares the crucial time line that the vulnerability was discovered as well as Microsofts response to the vulnerability.
The research can be found here:
AutoWarp: Critical Cross-Account Vulnerability in Microsoft Azure Automation Service

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Yanir Tsarimi from Orca Security, joins Dave to discuss how researchers have discovered a critical Azure Automation service vulnerability called AutoWarp. The security flaw was discovered this past March causing Yanir to leap into action announcing the issue to Microsoft who helped to swiftly resolve the cross-account vulnerability.</p><p>The research shows how this serious flaw would allow attackers unauthorized access to other customer accounts and potentially full control over resources and data belonging to those accounts, as well as put multiple Fortune 500 companies and billions of dollars at risk. The research shares the crucial time line that the vulnerability was discovered as well as Microsofts response to the vulnerability.</p><p>The research can be found here:</p><ul><li><a href="https://orca.security/resources/blog/autowarp-microsoft-azure-automation-service-vulnerability/">AutoWarp: Critical Cross-Account Vulnerability in Microsoft Azure Automation Service</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1091</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9aaad71c-6389-11ec-b04f-773e7526cb5e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3643274475.mp3?updated=1685126806" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Vulnerabilities in IoT devices. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/232/notes</link>
      <description>Dr. May Wang, CTO of IoT Security at Palo Alto Networks, joins Dave Bittner to discuss their findings detailed in Unit 42's "Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization" research. Unit 42 recently set out to better understand how well hospitals and other healthcare providers are doing in securing smart infusion pumps, which are network-connected devices that deliver medications and fluids to patients. This topic is of critical concern because security lapses in these devices have the potential to put lives at risk or expose sensitive patient data.
Unit 42's discovery of security gaps in three out of four infusion pumps that they reviewed highlights the need for the healthcare industry to redouble efforts to protect against known vulnerabilities, while diligently following best practices for infusion pumps and hospital networks. May walks us through Unit 42's work.
The research can be found here:
Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 May 2022 05:00:00 -0000</pubDate>
      <itunes:title>Vulnerabilities in IoT devices. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>232</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dr. May Wang, CTO of IoT Security at Palo Alto Networks, joins Dave Bittner to discuss their findings detailed in Unit 42's "Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization" research. Unit 42 recently set out to better understand how well hospitals and other healthcare providers are doing in securing smart infusion pumps, which are network-connected devices that deliver medications and fluids to patients. This topic is of critical concern because security lapses in these devices have the potential to put lives at risk or expose sensitive patient data.
Unit 42's discovery of security gaps in three out of four infusion pumps that they reviewed highlights the need for the healthcare industry to redouble efforts to protect against known vulnerabilities, while diligently following best practices for infusion pumps and hospital networks. May walks us through Unit 42's work.
The research can be found here:
Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dr. May Wang, CTO of IoT Security at Palo Alto Networks, joins Dave Bittner to discuss their findings detailed in Unit 42's "Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization" research. Unit 42 recently set out to better understand how well hospitals and other healthcare providers are doing in securing smart infusion pumps, which are network-connected devices that deliver medications and fluids to patients. This topic is of critical concern because security lapses in these devices have the potential to put lives at risk or expose sensitive patient data.</p><p>Unit 42's discovery of security gaps in three out of four infusion pumps that they reviewed highlights the need for the healthcare industry to redouble efforts to protect against known vulnerabilities, while diligently following best practices for infusion pumps and hospital networks. May walks us through Unit 42's work.</p><p>The research can be found here:</p><ul><li><a href="https://unit42.paloaltonetworks.com/infusion-pump-vulnerabilities/">Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1337</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9a8b4dde-6389-11ec-b04f-5f2bd55d7cd8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8325281057.mp3?updated=1685126799" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Vulnerabilities bring in the hackers.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/231/notes</link>
      <description>Tushar Richabadas from Barracuda joins Dave Bittner to discuss their findings detailed in their "Threat Spotlight: Attacks on Log4Shell vulnerabilities." Their research shows the percentage of attackers targeting the vulnerabilities, and shows where the dips and spikes are over the course of the past couple of months.
The research has also gathered where the attackers main IP addresses are located, with 83% of them located in the United States. They breakdown what this malware can do and how to protect yourself against it. They say "Due to the growing number of vulnerabilities found in web applications, it is getting progressively more complex to protect against attacks."
The research can be found here:
Threat Spotlight: Attacks on Log4Shell vulnerabilities

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 May 2022 05:00:00 -0000</pubDate>
      <itunes:title>Vulnerabilities bring in the hackers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>231</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Tushar Richabadas from Barracuda joins Dave Bittner to discuss their findings detailed in their "Threat Spotlight: Attacks on Log4Shell vulnerabilities." Their research shows the percentage of attackers targeting the vulnerabilities, and shows where the dips and spikes are over the course of the past couple of months.
The research has also gathered where the attackers main IP addresses are located, with 83% of them located in the United States. They breakdown what this malware can do and how to protect yourself against it. They say "Due to the growing number of vulnerabilities found in web applications, it is getting progressively more complex to protect against attacks."
The research can be found here:
Threat Spotlight: Attacks on Log4Shell vulnerabilities

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tushar Richabadas from Barracuda joins Dave Bittner to discuss their findings detailed in their "Threat Spotlight: Attacks on Log4Shell vulnerabilities." Their research shows the percentage of attackers targeting the vulnerabilities, and shows where the dips and spikes are over the course of the past couple of months.</p><p>The research has also gathered where the attackers main IP addresses are located, with 83% of them located in the United States. They breakdown what this malware can do and how to protect yourself against it. They say "Due to the growing number of vulnerabilities found in web applications, it is getting progressively more complex to protect against attacks."</p><p>The research can be found here:</p><ul><li><a href="https://blog.barracuda.com/2022/03/02/threat-spotlight-attacks-on-log4shell-vulnerabilities/">Threat Spotlight: Attacks on Log4Shell vulnerabilities</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>959</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9a6bf0d8-6389-11ec-b04f-7b82d694816f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3221038736.mp3?updated=1685126789" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Attackers coming in from the Backdoor?</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/230/notes</link>
      <description>Vikram Thakur of Symantec Threat Hunter team joins Dave Bittner to discuss their work on Daxin, a new and the most advanced piece of malware researchers have seen from China-linked actors. Symantec said " There is strong evidence to suggest the malware, Backdoor.Daxin, which allows the attacker to perform various communications and data-gathering operations on the infected computer, has been used as recently as November 2021 by attackers linked to China."
They go on to explain how Daxin is used to target organizations and governments of strategic interest to China and how those agencies can protect themselves. Symantec also discusses how this is the most advanced piece of malware their researchers have seen.
The research can be found here:
Daxin: Stealthy Backdoor Designed for Attacks Against Hardened Networks

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Apr 2022 05:00:00 -0000</pubDate>
      <itunes:title>Attackers coming in from the Backdoor?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>230</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Vikram Thakur of Symantec Threat Hunter team joins Dave Bittner to discuss their work on Daxin, a new and the most advanced piece of malware researchers have seen from China-linked actors. Symantec said " There is strong evidence to suggest the malware, Backdoor.Daxin, which allows the attacker to perform various communications and data-gathering operations on the infected computer, has been used as recently as November 2021 by attackers linked to China."
They go on to explain how Daxin is used to target organizations and governments of strategic interest to China and how those agencies can protect themselves. Symantec also discusses how this is the most advanced piece of malware their researchers have seen.
The research can be found here:
Daxin: Stealthy Backdoor Designed for Attacks Against Hardened Networks

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Vikram Thakur of Symantec Threat Hunter team joins Dave Bittner to discuss their work on Daxin, a new and the most advanced piece of malware researchers have seen from China-linked actors. Symantec said " There is strong evidence to suggest the malware, Backdoor.Daxin, which allows the attacker to perform various communications and data-gathering operations on the infected computer, has been used as recently as November 2021 by attackers linked to China."</p><p>They go on to explain how Daxin is used to target organizations and governments of strategic interest to China and how those agencies can protect themselves. Symantec also discusses how this is the most advanced piece of malware their researchers have seen.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/daxin-backdoor-espionage">Daxin: Stealthy Backdoor Designed for Attacks Against Hardened Networks</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1264</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9a4c8cc0-6389-11ec-b04f-bb4025d173f9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7238503284.mp3?updated=1685126782" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BABYSHARK is swimming again!</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/229/notes</link>
      <description>John Hammond from Huntress joins Dave Bittner on this episode to discuss malware known as BABYSHARK and how it is swimming out for blood once again. Huntress's research says "This activity aligns with known tradecraft attributed to North Korean threat actors targeting national security think tanks."
Huntress also adds that the activity was spotted on February 16th and immediately their ThreatOps team began following the trail of breadcrumbs. They said "This led them to uncover the malware that was set to target specifically this organization–and certain influential individuals within it."
The research can be found here:
Targeted APT Activity: BABYSHARK Is Out for Blood

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Apr 2022 05:00:00 -0000</pubDate>
      <itunes:title>BABYSHARK is swimming again!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>229</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>John Hammond from Huntress joins Dave Bittner on this episode to discuss malware known as BABYSHARK and how it is swimming out for blood once again. Huntress's research says "This activity aligns with known tradecraft attributed to North Korean threat actors targeting national security think tanks."
Huntress also adds that the activity was spotted on February 16th and immediately their ThreatOps team began following the trail of breadcrumbs. They said "This led them to uncover the malware that was set to target specifically this organization–and certain influential individuals within it."
The research can be found here:
Targeted APT Activity: BABYSHARK Is Out for Blood

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>John Hammond from Huntress joins Dave Bittner on this episode to discuss malware known as BABYSHARK and how it is swimming out for blood once again. Huntress's research says "This activity aligns with known tradecraft attributed to North Korean threat actors targeting national security think tanks."</p><p>Huntress also adds that the activity was spotted on February 16th and immediately their ThreatOps team began following the trail of breadcrumbs. They said "This led them to uncover the malware that was set to target specifically this organization–and certain influential individuals within it."</p><p>The research can be found here:</p><ul><li><a href="https://www.huntress.com/blog/targeted-apt-activity-babyshark-is-out-for-blood">Targeted APT Activity: BABYSHARK Is Out for Blood</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2145</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9a2d3e88-6389-11ec-b04f-a3fc66917605]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7048887754.mp3?updated=1685126775" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A fight to defend Taiwan financial institutions.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/228/notes</link>
      <description>Alan Neville from Symantec/Broadcom joins Dave Bittner on this episode to discuss Antlion, a Chinese state-backed hacker group using custom backdoors to target financial institutions in Taiwan. Symantec's blog shares the research behind the attacks and how the backdoor allowed the attackers to run WMI commands remotely.
Symantec's research showed that "The goal of this campaign appears to have been espionage, as we saw the attackers exfiltrating data and staging data for exfiltration from infected networks." They have since found that this attack has been going on over the course of the past 18 months, in which 250 days were spent on the financial organization and around 175 days were spent on the manufacturing organization.
The research can be found here:
Antlion: Chinese APT Uses Custom Backdoor to Target Financial Institutions in Taiwan

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Apr 2022 05:00:00 -0000</pubDate>
      <itunes:title>A fight to defend Taiwan financial institutions.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>228</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Alan Neville from Symantec/Broadcom joins Dave Bittner on this episode to discuss Antlion, a Chinese state-backed hacker group using custom backdoors to target financial institutions in Taiwan. Symantec's blog shares the research behind the attacks and how the backdoor allowed the attackers to run WMI commands remotely.
Symantec's research showed that "The goal of this campaign appears to have been espionage, as we saw the attackers exfiltrating data and staging data for exfiltration from infected networks." They have since found that this attack has been going on over the course of the past 18 months, in which 250 days were spent on the financial organization and around 175 days were spent on the manufacturing organization.
The research can be found here:
Antlion: Chinese APT Uses Custom Backdoor to Target Financial Institutions in Taiwan

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Alan Neville from Symantec/Broadcom joins Dave Bittner on this episode to discuss Antlion, a Chinese state-backed hacker group using custom backdoors to target financial institutions in Taiwan. Symantec's blog shares the research behind the attacks and how the backdoor allowed the attackers to run WMI commands remotely.</p><p>Symantec's research showed that "The goal of this campaign appears to have been espionage, as we saw the attackers exfiltrating data and staging data for exfiltration from infected networks." They have since found that this attack has been going on over the course of the past 18 months, in which 250 days were spent on the financial organization and around 175 days were spent on the manufacturing organization.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/china-apt-antlion-taiwan-financial-attacks">Antlion: Chinese APT Uses Custom Backdoor to Target Financial Institutions in Taiwan</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1079</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9a0e21a6-6389-11ec-b04f-17086b11ed71]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7999448463.mp3?updated=1685126759" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The secrets behind Docker.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/227/notes</link>
      <description>Alon Zahavi from CyberArk, joins Dave Bittner on this episode to discuss CyberArk's work in conjunction with Patch Tuesday. CyberArk published about how Docker inadvertently created a new vulnerability and what happens when it's exploited.
CyberArk's research concluded that an attacker may execute files with capabilities or setuid files in order to escalate its privileges up to root level. CyberArk found the new vuln in some of Microsoft’s Docker images, caused by misuse of Linux capabilities, a powerful additional layer of security that gives admins the ability to assign capabilities and privileges to processes and files in the Linux system
The research can be found here:
How Docker Made Me More Capable and the Host Less Secure

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Apr 2022 05:00:00 -0000</pubDate>
      <itunes:title>The secrets behind Docker.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>227</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Alon Zahavi from CyberArk, joins Dave Bittner on this episode to discuss CyberArk's work in conjunction with Patch Tuesday. CyberArk published about how Docker inadvertently created a new vulnerability and what happens when it's exploited.
CyberArk's research concluded that an attacker may execute files with capabilities or setuid files in order to escalate its privileges up to root level. CyberArk found the new vuln in some of Microsoft’s Docker images, caused by misuse of Linux capabilities, a powerful additional layer of security that gives admins the ability to assign capabilities and privileges to processes and files in the Linux system
The research can be found here:
How Docker Made Me More Capable and the Host Less Secure

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Alon Zahavi from CyberArk, joins Dave Bittner on this episode to discuss CyberArk's work in conjunction with Patch Tuesday. CyberArk published about how Docker inadvertently created a new vulnerability and what happens when it's exploited.</p><p>CyberArk's research concluded that an attacker may execute files with capabilities or setuid files in order to escalate its privileges up to root level. CyberArk found the new vuln in some of Microsoft’s Docker images, caused by misuse of Linux capabilities, a powerful additional layer of security that gives admins the ability to assign capabilities and privileges to processes and files in the Linux system</p><p>The research can be found here:</p><ul><li><a href="https://www.cyberark.com/resources/threat-research-blog/how-docker-made-me-more-capable-and-the-host-less-secure">How Docker Made Me More Capable and the Host Less Secure</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1239</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[99ef06cc-6389-11ec-b04f-6be0583b9d88]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5255714936.mp3?updated=1685126752" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A popular malware scheme and pay-per-install services.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/226/notes</link>
      <description>Guest Michael DeBolt from Intel 471 joins Dave Bittner on this episode to discuss one of the most popular commodity malware loaders on the underground – PrivateLoader. The blog provides an analysis of campaigns since May 2021, full details on a Pay-per-install (PPI) malware service, the methods operators employ to obtain “installs,” and insights on the malware families the service delivers.
On Intel 471's blog, it shows the breakdown of how the PrivateLoader download is delivered and how it works. The blog states "Visitors are lured into clicking a “Download Crack” or “Download Now” button to obtain an allegedly cracked version of the software." Michael explains more about this popular commodity malware loader.
The research can be found here:
PrivateLoader: The first step in many malware schemes

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Apr 2022 05:00:00 -0000</pubDate>
      <itunes:title>A popular malware scheme and pay-per-install services.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>226</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Michael DeBolt from Intel 471 joins Dave Bittner on this episode to discuss one of the most popular commodity malware loaders on the underground – PrivateLoader. The blog provides an analysis of campaigns since May 2021, full details on a Pay-per-install (PPI) malware service, the methods operators employ to obtain “installs,” and insights on the malware families the service delivers.
On Intel 471's blog, it shows the breakdown of how the PrivateLoader download is delivered and how it works. The blog states "Visitors are lured into clicking a “Download Crack” or “Download Now” button to obtain an allegedly cracked version of the software." Michael explains more about this popular commodity malware loader.
The research can be found here:
PrivateLoader: The first step in many malware schemes

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Michael DeBolt from Intel 471 joins Dave Bittner on this episode to discuss one of the most popular commodity malware loaders on the underground – PrivateLoader. The blog provides an analysis of campaigns since May 2021, full details on a Pay-per-install (PPI) malware service, the methods operators employ to obtain “installs,” and insights on the malware families the service delivers.</p><p>On Intel 471's blog, it shows the breakdown of how the PrivateLoader download is delivered and how it works. The blog states "Visitors are lured into clicking a “Download Crack” or “Download Now” button to obtain an allegedly cracked version of the software." Michael explains more about this popular commodity malware loader.</p><p>The research can be found here:</p><ul><li><a href="https://intel471.com/blog/privateloader-malware">PrivateLoader: The first step in many malware schemes</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1160</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[99cfa778-6389-11ec-b04f-6fb8533bcb8e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7503623016.mp3?updated=1685126737" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The breakdown of Shuckworm's continued cyber attacks against Ukraine.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/225/notes</link>
      <description>Guest Dick O'Brien from Symantec joins Dave Bittner on this episode to discuss how "Shuckworm Continues Cyber-Espionage Attacks Against Ukraine." The Russia-linked Shuckworm group (aka Gamaredon, Armageddon) has been active since 2013 and is known to use phishing emails to distribute either freely available remote access tools.
In July 2021, Symantec observed Shuckworm activity on an organization in Ukraine and this continued until August 2021. According to a November 2021 report from the Security Service of Ukraine (SSU), since 2014 the Shuckworm group has been responsible for over 5,000 attacks against more than 1,500 Ukrainian government systems. Dick walks us through Symantec's investigation.
The research can be found here:
Shuckworm Continues Cyber-Espionage Attacks Against Ukraine

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Mar 2022 05:00:00 -0000</pubDate>
      <itunes:title>The breakdown of Shuckworm's continued cyber attacks against Ukraine.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>225</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Dick O'Brien from Symantec joins Dave Bittner on this episode to discuss how "Shuckworm Continues Cyber-Espionage Attacks Against Ukraine." The Russia-linked Shuckworm group (aka Gamaredon, Armageddon) has been active since 2013 and is known to use phishing emails to distribute either freely available remote access tools.
In July 2021, Symantec observed Shuckworm activity on an organization in Ukraine and this continued until August 2021. According to a November 2021 report from the Security Service of Ukraine (SSU), since 2014 the Shuckworm group has been responsible for over 5,000 attacks against more than 1,500 Ukrainian government systems. Dick walks us through Symantec's investigation.
The research can be found here:
Shuckworm Continues Cyber-Espionage Attacks Against Ukraine

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Dick O'Brien from Symantec joins Dave Bittner on this episode to discuss how "Shuckworm Continues Cyber-Espionage Attacks Against Ukraine." The Russia-linked Shuckworm group (aka Gamaredon, Armageddon) has been active since 2013 and is known to use phishing emails to distribute either freely available remote access tools.</p><p>In July 2021, Symantec observed Shuckworm activity on an organization in Ukraine and this continued until August 2021. According to a November 2021 report from the Security Service of Ukraine (SSU), since 2014 the Shuckworm group has been responsible for over 5,000 attacks against more than 1,500 Ukrainian government systems. Dick walks us through Symantec's investigation.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/shuckworm-gamaredon-espionage-ukraine">Shuckworm Continues Cyber-Espionage Attacks Against Ukraine</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1161</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[99b04e6e-6389-11ec-b04f-e7302dc8a51d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6535154352.mp3?updated=1685126731" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Implications of data leaks of sensitive OT information. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/224/notes</link>
      <description>Guest Nathan Brubaker from Mandiant joins Dave Bittner on this episode to discuss Mandiant Threat Intelligence's research: "1 in 7 Ransomware Extortion Attacks Leak Critical Operational Technology Information." Data leaks have always been a concern for organizations. The exposure of sensitive information can result in damage to reputation, legal penalties, loss of intellectual property, and even impact the privacy of employees and customers. However, there is little research about the challenges posed to industrial organizations when threat actors disclose sensitive details about their OT security, production, operations, or technology.
In 2021, Mandiant Threat Intelligence continued observing ransomware operators attempting to extort thousands of victims by disclosing terabytes of stolen information on shaming sites. This trend, which Mandiant Threat Intelligence refers to as “Multifaceted Extortion,” impacted over 1,300 organizations from critical infrastructure and industrial production sectors in just one year. Nathan walks us through their research and findings.
The research can be found here:
1 in 7 Ransomware Extortion Attacks Leak Critical Operational Technology Information

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Mar 2022 05:00:00 -0000</pubDate>
      <itunes:title>Implications of data leaks of sensitive OT information. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>224</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Nathan Brubaker from Mandiant joins Dave Bittner on this episode to discuss Mandiant Threat Intelligence's research: "1 in 7 Ransomware Extortion Attacks Leak Critical Operational Technology Information." Data leaks have always been a concern for organizations. The exposure of sensitive information can result in damage to reputation, legal penalties, loss of intellectual property, and even impact the privacy of employees and customers. However, there is little research about the challenges posed to industrial organizations when threat actors disclose sensitive details about their OT security, production, operations, or technology.
In 2021, Mandiant Threat Intelligence continued observing ransomware operators attempting to extort thousands of victims by disclosing terabytes of stolen information on shaming sites. This trend, which Mandiant Threat Intelligence refers to as “Multifaceted Extortion,” impacted over 1,300 organizations from critical infrastructure and industrial production sectors in just one year. Nathan walks us through their research and findings.
The research can be found here:
1 in 7 Ransomware Extortion Attacks Leak Critical Operational Technology Information

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Nathan Brubaker from Mandiant joins Dave Bittner on this episode to discuss Mandiant Threat Intelligence's research: "1 in 7 Ransomware Extortion Attacks Leak Critical Operational Technology Information." Data leaks have always been a concern for organizations. The exposure of sensitive information can result in damage to reputation, legal penalties, loss of intellectual property, and even impact the privacy of employees and customers. However, there is little research about the challenges posed to industrial organizations when threat actors disclose sensitive details about their OT security, production, operations, or technology.</p><p>In 2021, Mandiant Threat Intelligence continued observing ransomware operators attempting to extort thousands of victims by disclosing terabytes of stolen information on shaming sites. This trend, which Mandiant Threat Intelligence refers to as “Multifaceted Extortion,” impacted over 1,300 organizations from critical infrastructure and industrial production sectors in just one year. Nathan walks us through their research and findings.</p><p>The research can be found here:</p><ul><li><a href="https://www.mandiant.com/resources/ransomware-extortion-ot-docs">1 in 7 Ransomware Extortion Attacks Leak Critical Operational Technology Information</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1373</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9990e07e-6389-11ec-b04f-bb9291a328f7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9980328938.mp3?updated=1685126725" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The story of REvil: From origin to beyond. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/223/notes</link>
      <description>Guest Jon DiMaggio, Chief Security Strategist at Analyst1, joins Dave Bittner to discuss his team's research "A History of REvil" that chronicles the rise and fall of REvil. The REvil gang is an organized criminal enterprise based primarily out of Russia that runs a Ransomware as a Service (RaaS) operation. The core members of the gang reside and operate out of Russia. REvil leverages hackers for hire, known as affiliates, to conduct the breach, steal victim data, delete backups, and infect victim systems with ransomware for a share of the profits. Affiliates primarily stem across eastern Europe, though a small percentage operate outside that region. In return, the core gang maintains and provides the ransomware payload, hosts the victim data leak/auction site, facilitates victim communication and payment services, and distributes the decryption key. In simpler terms, the core gang are the service provider and persona behind the operation, while the affiliates are the hired muscle facilitating attacks. Jon walks us through the team's findings and details REvil's story.
The research can be found here:
A History of REvil

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Mar 2022 06:00:00 -0000</pubDate>
      <itunes:title>The story of REvil: From origin to beyond. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>223</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Jon DiMaggio, Chief Security Strategist at Analyst1, joins Dave Bittner to discuss his team's research "A History of REvil" that chronicles the rise and fall of REvil. The REvil gang is an organized criminal enterprise based primarily out of Russia that runs a Ransomware as a Service (RaaS) operation. The core members of the gang reside and operate out of Russia. REvil leverages hackers for hire, known as affiliates, to conduct the breach, steal victim data, delete backups, and infect victim systems with ransomware for a share of the profits. Affiliates primarily stem across eastern Europe, though a small percentage operate outside that region. In return, the core gang maintains and provides the ransomware payload, hosts the victim data leak/auction site, facilitates victim communication and payment services, and distributes the decryption key. In simpler terms, the core gang are the service provider and persona behind the operation, while the affiliates are the hired muscle facilitating attacks. Jon walks us through the team's findings and details REvil's story.
The research can be found here:
A History of REvil

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Jon DiMaggio, Chief Security Strategist at Analyst1, joins Dave Bittner to discuss his team's research "A History of REvil" that chronicles the rise and fall of REvil. The REvil gang is an organized criminal enterprise based primarily out of Russia that runs a Ransomware as a Service (RaaS) operation. The core members of the gang reside and operate out of Russia. REvil leverages hackers for hire, known as affiliates, to conduct the breach, steal victim data, delete backups, and infect victim systems with ransomware for a share of the profits. Affiliates primarily stem across eastern Europe, though a small percentage operate outside that region. In return, the core gang maintains and provides the ransomware payload, hosts the victim data leak/auction site, facilitates victim communication and payment services, and distributes the decryption key. In simpler terms, the core gang are the service provider and persona behind the operation, while the affiliates are the hired muscle facilitating attacks. Jon walks us through the team's findings and details REvil's story.</p><p>The research can be found here:</p><ul><li><a href="https://analyst1.com/file-assets/History-of-REvil.pdf">A History of REvil</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1946</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[99715268-6389-11ec-b04f-4fa6e0d8f4e1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5145035545.mp3?updated=1685126717" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An abuse of trust: Potential security issues with open redirects. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/222/notes</link>
      <description>Guest Mike Benjamin, VP of Security Research at Fastly, joins Dave Bittner to talk about the Fastly Security Research Team's work on "Open redirects: real-world abuse and recommendations." Open URL redirection is a class of web application security problems that makes it easier for attackers to direct users to malicious resources. This vulnerability class, also known as “open redirects,” arises when an application allows attackers to pass information to the app that results in users being sent to another location. That location can be an attacker-controlled website or server used to distribute malware, trick a user into trusting a link, execute malicious code in a trusted way, drive ad fraud, or even perform SEO manipulation. Knowing how an open redirect can be abused is helpful — but knowing how to design around it in the first place is even more important.
Mike walks us through what his team uncovered, explains how redirects are used, how they can be abused, and how you can prevent that abuse.
The research can be found here:
Open redirects: real-world abuse and recommendations

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Mar 2022 06:00:00 -0000</pubDate>
      <itunes:title>An abuse of trust: Potential security issues with open redirects. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>222</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Mike Benjamin, VP of Security Research at Fastly, joins Dave Bittner to talk about the Fastly Security Research Team's work on "Open redirects: real-world abuse and recommendations." Open URL redirection is a class of web application security problems that makes it easier for attackers to direct users to malicious resources. This vulnerability class, also known as “open redirects,” arises when an application allows attackers to pass information to the app that results in users being sent to another location. That location can be an attacker-controlled website or server used to distribute malware, trick a user into trusting a link, execute malicious code in a trusted way, drive ad fraud, or even perform SEO manipulation. Knowing how an open redirect can be abused is helpful — but knowing how to design around it in the first place is even more important.
Mike walks us through what his team uncovered, explains how redirects are used, how they can be abused, and how you can prevent that abuse.
The research can be found here:
Open redirects: real-world abuse and recommendations

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Mike Benjamin, VP of Security Research at Fastly, joins Dave Bittner to talk about the Fastly Security Research Team's work on "Open redirects: real-world abuse and recommendations." Open URL redirection is a class of web application security problems that makes it easier for attackers to direct users to malicious resources. This vulnerability class, also known as “open redirects,” arises when an application allows attackers to pass information to the app that results in users being sent to another location. That location can be an attacker-controlled website or server used to distribute malware, trick a user into trusting a link, execute malicious code in a trusted way, drive ad fraud, or even perform SEO manipulation. Knowing how an open redirect can be abused is helpful — but knowing how to design around it in the first place is even more important.</p><p>Mike walks us through what his team uncovered, explains how redirects are used, how they can be abused, and how you can prevent that abuse.</p><p>The research can be found here:</p><ul><li><a href="https://www.fastly.com/blog/open-redirects-real-world-abuse-and-recommendations">Open redirects: real-world abuse and recommendations</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1356</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9951486a-6389-11ec-b04f-5f9b758dce00]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6538844094.mp3?updated=1685126705" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Noberus ransomware: Coded in Rust and tailored to victim. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/221/notes</link>
      <description>Guest Dick O'Brien, Principal Editor at Symantec, joins Dave to discuss their team's research, "Noberus: Technical Analysis Shows Sophistication of New Rust-based Ransomware." Noberus is new ransomware used in mid-November attack, ConnectWise was likely infection vector.
Symantec, a division of Broadcom Software, tracks this ransomware as Ransom.Noberus and our researchers first spotted it on a victim organization on November 18, 2021, with three variants of Noberus deployed by the attackers over the course of that attack. This would appear to show that this ransomware was active earlier than was previously reported, with MalwareHunterTeam having told BleepingComputer they first saw this ransomware on November 21.
Noberus is an interesting ransomware because it is coded in Rust, and this is the first time we have seen a professional ransomware strain that has been used in real-world attacks coded in this programming language. Noberus appears to carry out the now-typical double extortion ransomware attacks where they first steal information from victim networks before encrypting files. Noberus adds the .sykffle extension to encrypted files.
The research can be found here:
Noberus: Technical Analysis Shows Sophistication of New Rust-based Ransomware

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Feb 2022 06:00:00 -0000</pubDate>
      <itunes:title>Noberus ransomware: Coded in Rust and tailored to victim. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>221</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Dick O'Brien, Principal Editor at Symantec, joins Dave to discuss their team's research, "Noberus: Technical Analysis Shows Sophistication of New Rust-based Ransomware." Noberus is new ransomware used in mid-November attack, ConnectWise was likely infection vector.
Symantec, a division of Broadcom Software, tracks this ransomware as Ransom.Noberus and our researchers first spotted it on a victim organization on November 18, 2021, with three variants of Noberus deployed by the attackers over the course of that attack. This would appear to show that this ransomware was active earlier than was previously reported, with MalwareHunterTeam having told BleepingComputer they first saw this ransomware on November 21.
Noberus is an interesting ransomware because it is coded in Rust, and this is the first time we have seen a professional ransomware strain that has been used in real-world attacks coded in this programming language. Noberus appears to carry out the now-typical double extortion ransomware attacks where they first steal information from victim networks before encrypting files. Noberus adds the .sykffle extension to encrypted files.
The research can be found here:
Noberus: Technical Analysis Shows Sophistication of New Rust-based Ransomware

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Dick O'Brien, Principal Editor at Symantec, joins Dave to discuss their team's research, "Noberus: Technical Analysis Shows Sophistication of New Rust-based Ransomware." Noberus is new ransomware used in mid-November attack, ConnectWise was likely infection vector.</p><p>Symantec, a division of Broadcom Software, tracks this ransomware as Ransom.Noberus and our researchers first spotted it on a victim organization on November 18, 2021, with three variants of Noberus deployed by the attackers over the course of that attack. This would appear to show that this ransomware was active earlier than was previously reported, with MalwareHunterTeam having told BleepingComputer they first saw this ransomware on November 21.</p><p>Noberus is an interesting ransomware because it is coded in Rust, and this is the first time we have seen a professional ransomware strain that has been used in real-world attacks coded in this programming language. Noberus appears to carry out the now-typical double extortion ransomware attacks where they first steal information from victim networks before encrypting files. Noberus adds the .sykffle extension to encrypted files.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/noberus-blackcat-alphv-rust-ransomware">Noberus: Technical Analysis Shows Sophistication of New Rust-based Ransomware</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1219</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[99300bd2-6389-11ec-b04f-2ba854cf6963]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2613895270.mp3?updated=1685126696" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Instagram hijacks all start with a phish. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/220/notes</link>
      <description>Guest Marcelle Lee, Senior Security Researcher and Emerging Threats Lead, from SecureWorks joins Dave to share her team's work on "Ransoms Demanded for Hijacked Instagram Accounts." An extensive phishing campaign has targeted corporate Instagram accounts since approximately August 2021. The threat actors demand ransoms from the victims to restore access.
Organizations typically focus on traditional enterprise cybersecurity threats. However, some threats are more subtle, targeting organizations on unexpected platforms. In October 2021, Secureworks Counter Threat Unit (CTU) researchers identified a phishing campaign that hijacks corporate Instagram accounts, as well as accounts of individual influencers who have a large number of followers. The threat actors then extort ransom payments from the victims. The activity continues at the time of the interview.
The research can be found here:
Ransoms Demanded for Hijacked Instagram Accounts

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Feb 2022 06:00:00 -0000</pubDate>
      <itunes:title>Instagram hijacks all start with a phish. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>220</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Marcelle Lee, Senior Security Researcher and Emerging Threats Lead, from SecureWorks joins Dave to share her team's work on "Ransoms Demanded for Hijacked Instagram Accounts." An extensive phishing campaign has targeted corporate Instagram accounts since approximately August 2021. The threat actors demand ransoms from the victims to restore access.
Organizations typically focus on traditional enterprise cybersecurity threats. However, some threats are more subtle, targeting organizations on unexpected platforms. In October 2021, Secureworks Counter Threat Unit (CTU) researchers identified a phishing campaign that hijacks corporate Instagram accounts, as well as accounts of individual influencers who have a large number of followers. The threat actors then extort ransom payments from the victims. The activity continues at the time of the interview.
The research can be found here:
Ransoms Demanded for Hijacked Instagram Accounts

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Marcelle Lee, Senior Security Researcher and Emerging Threats Lead, from SecureWorks joins Dave to share her team's work on "Ransoms Demanded for Hijacked Instagram Accounts." An extensive phishing campaign has targeted corporate Instagram accounts since approximately August 2021. The threat actors demand ransoms from the victims to restore access.</p><p>Organizations typically focus on traditional enterprise cybersecurity threats. However, some threats are more subtle, targeting organizations on unexpected platforms. In October 2021, Secureworks Counter Threat Unit (CTU) researchers identified a phishing campaign that hijacks corporate Instagram accounts, as well as accounts of individual influencers who have a large number of followers. The threat actors then extort ransom payments from the victims. The activity continues at the time of the interview.</p><p>The research can be found here:</p><ul><li><a href="https://www.secureworks.com/blog/ransoms-demanded-for-hijacked-instagram-accounts">Ransoms Demanded for Hijacked Instagram Accounts</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1303</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[990e9d1c-6389-11ec-b04f-67289c94ca75]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4987256473.mp3?updated=1685126688" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SysJoker backdoor masquerades as benign updates. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/219/notes</link>
      <description>Guests Avigayil Mechtinger and Ryan Robinson from Intezer discuss SysJoker malware, a backdoor that targets Windows, Linux and MacOS, Malware targeting multiple operating systems has become no exception in the malware threat landscape. Vermilion Strike, which was documented just last September, is among the latest examples until now.  
In December 2021, the team at Intezer discovered a new multi-platform backdoor that targets Windows, Mac, and Linux. The Linux and Mac versions are fully undetected in VirusTotal. Intezer named this backdoor SysJoker.
SysJoker was first discovered during an active attack on a Linux-based web server of a leading educational institution. After further investigation, Intezer found that SysJoker also has Mach-O and Windows PE versions. Based on Command and Control (C2) domain registration and samples found in VirusTotal, Intezer estimates that the SysJoker attack was initiated during the second half of 2021.  
The research can be found here:
New SysJoker Backdoor Targets Windows, Linux, and macOS

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Feb 2022 06:00:00 -0000</pubDate>
      <itunes:title>SysJoker backdoor masquerades as benign updates. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>219</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guests Avigayil Mechtinger and Ryan Robinson from Intezer discuss SysJoker malware, a backdoor that targets Windows, Linux and MacOS, Malware targeting multiple operating systems has become no exception in the malware threat landscape. Vermilion Strike, which was documented just last September, is among the latest examples until now.  
In December 2021, the team at Intezer discovered a new multi-platform backdoor that targets Windows, Mac, and Linux. The Linux and Mac versions are fully undetected in VirusTotal. Intezer named this backdoor SysJoker.
SysJoker was first discovered during an active attack on a Linux-based web server of a leading educational institution. After further investigation, Intezer found that SysJoker also has Mach-O and Windows PE versions. Based on Command and Control (C2) domain registration and samples found in VirusTotal, Intezer estimates that the SysJoker attack was initiated during the second half of 2021.  
The research can be found here:
New SysJoker Backdoor Targets Windows, Linux, and macOS

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guests Avigayil Mechtinger and Ryan Robinson from Intezer discuss SysJoker malware, a backdoor that targets Windows, Linux and MacOS, Malware targeting multiple operating systems has become no exception in the malware threat landscape. <a href="https://www.intezer.com/blog/malware-analysis/vermilionstrike-reimplementation-cobaltstrike/">Vermilion Strike</a>, which was documented just last September, is among the latest examples until now.  </p><p>In December 2021, the team at Intezer discovered a new multi-platform backdoor that targets Windows, Mac, and Linux. The Linux and Mac versions are fully undetected in VirusTotal. Intezer named this backdoor SysJoker.</p><p>SysJoker was first discovered during an active attack on a Linux-based web server of a leading educational institution. After further investigation, Intezer found that SysJoker also has Mach-O and Windows PE versions. Based on Command and Control (C2) domain registration and samples found in VirusTotal, Intezer estimates that the SysJoker attack was initiated during the second half of 2021.  </p><p>The research can be found here:</p><ul><li><a href="https://www.intezer.com/blog/malware-analysis/new-backdoor-sysjoker/">New SysJoker Backdoor Targets Windows, Linux, and macOS</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>869</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[98ee89a0-6389-11ec-b04f-4f95d072437f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3857525569.mp3?updated=1685126676" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The persistent and patient nature of advanced threat actors. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/218/notes</link>
      <description>Guest Danny Adamitis from Black Lotus Labs joins Dave to discuss their team's new research "New Konni Campaign Kicks the New Year Off by Targeting Russian Ministry of Foreign Affairs." Black Lotus Labs, the threat research team of Lumen Technologies, uncovered a series of targeted actions against the Russian Federation’s Ministry of Foreign Affairs (MID). Based upon the totality of information available and the close correlation with prior reporting, we assess with moderate confidence these actions leveraged the Konni malware, which has previously been associated with the Democratic People’s Republic of Korea, and were undertaken to establish access to the MID network for the purpose of espionage. This activity cluster demonstrates the patient and persistent nature of advanced actors in waging multi-phased campaigns against perceived high-value networks. After gaining access through stolen credentials, the actor was able to exploit trusted connections to distribute and load the malware, first by impersonating a government software program coinciding with new Covid mandates, and then through sending trojanized files from a compromised account.
The research can be found here:
New Konni Campaign Kicks Off The New Year By Targeting Russian Ministry Of Foreign Affairs

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Feb 2022 06:00:00 -0000</pubDate>
      <itunes:title>The persistent and patient nature of advanced threat actors. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>218</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Danny Adamitis from Black Lotus Labs joins Dave to discuss their team's new research "New Konni Campaign Kicks the New Year Off by Targeting Russian Ministry of Foreign Affairs." Black Lotus Labs, the threat research team of Lumen Technologies, uncovered a series of targeted actions against the Russian Federation’s Ministry of Foreign Affairs (MID). Based upon the totality of information available and the close correlation with prior reporting, we assess with moderate confidence these actions leveraged the Konni malware, which has previously been associated with the Democratic People’s Republic of Korea, and were undertaken to establish access to the MID network for the purpose of espionage. This activity cluster demonstrates the patient and persistent nature of advanced actors in waging multi-phased campaigns against perceived high-value networks. After gaining access through stolen credentials, the actor was able to exploit trusted connections to distribute and load the malware, first by impersonating a government software program coinciding with new Covid mandates, and then through sending trojanized files from a compromised account.
The research can be found here:
New Konni Campaign Kicks Off The New Year By Targeting Russian Ministry Of Foreign Affairs

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Danny Adamitis from Black Lotus Labs joins Dave to discuss their team's new research "New Konni Campaign Kicks the New Year Off by Targeting Russian Ministry of Foreign Affairs." Black Lotus Labs, the threat research team of Lumen Technologies, uncovered a series of targeted actions against the Russian Federation’s Ministry of Foreign Affairs (MID). Based upon the totality of information available and the close correlation with prior reporting, we assess with moderate confidence these actions leveraged the Konni malware, which has previously been associated <a href="https://malpedia.caad.fkie.fraunhofer.de/details/win.konni">with the Democratic People’s Republic of Korea</a>, and were undertaken to establish access to the MID network for the purpose of espionage. This activity cluster demonstrates the patient and persistent nature of advanced actors in waging multi-phased campaigns against perceived high-value networks. After gaining access through stolen credentials, the actor was able to exploit trusted connections to distribute and load the malware, first by impersonating a government software program coinciding with new Covid mandates, and then through sending trojanized files from a compromised account.</p><p>The research can be found here:</p><ul><li><a href="https://blog.lumen.com/new-konni-campaign-targeting-russian-ministry-of-foreign-affairs/">New Konni Campaign Kicks Off The New Year By Targeting Russian Ministry Of Foreign Affairs</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1121</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[98ce739a-6389-11ec-b04f-2b611dc93e56]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7938762286.mp3?updated=1685126668" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Use of legitimate tools possibly linked to Seedworm. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/217/notes</link>
      <description>Guest Sylvester Segura from the Symantec Threat Hunter Team joins Dave to discuss their team's work on "Espionage Campaign Targets Telecoms Organizations across Middle East and Asia." Attackers most likely linked to Iran have attacked a string of telecoms operators in the Middle East and Asia over the past six months, in addition to a number of IT services organizations and a utility company.
Organizations in Israel, Jordan, Kuwait, Saudi Arabia, the United Arab Emirates, Pakistan, Thailand, and Laos were targeted in the campaign, which appears to have made no use of custom malware and instead relied on a mixture of legitimate tools, publicly available malware, and living-off-the-land tactics. While the identity of the attackers remains unconfirmed, there is some evidence to suggest a link to the Iranian Seedworm (aka MuddyWater) group. The targeting and tactics are consistent with Iranian-sponsored actors.
The research can be found here:
Espionage Campaign Targets Telecoms Organizations across Middle East and Asia

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 Jan 2022 06:00:00 -0000</pubDate>
      <itunes:title>Use of legitimate tools possibly linked to Seedworm. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>217</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Sylvester Segura from the Symantec Threat Hunter Team joins Dave to discuss their team's work on "Espionage Campaign Targets Telecoms Organizations across Middle East and Asia." Attackers most likely linked to Iran have attacked a string of telecoms operators in the Middle East and Asia over the past six months, in addition to a number of IT services organizations and a utility company.
Organizations in Israel, Jordan, Kuwait, Saudi Arabia, the United Arab Emirates, Pakistan, Thailand, and Laos were targeted in the campaign, which appears to have made no use of custom malware and instead relied on a mixture of legitimate tools, publicly available malware, and living-off-the-land tactics. While the identity of the attackers remains unconfirmed, there is some evidence to suggest a link to the Iranian Seedworm (aka MuddyWater) group. The targeting and tactics are consistent with Iranian-sponsored actors.
The research can be found here:
Espionage Campaign Targets Telecoms Organizations across Middle East and Asia

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Sylvester Segura from the Symantec Threat Hunter Team joins Dave to discuss their team's work on "Espionage Campaign Targets Telecoms Organizations across Middle East and Asia." Attackers most likely linked to Iran have attacked a string of telecoms operators in the Middle East and Asia over the past six months, in addition to a number of IT services organizations and a utility company.</p><p>Organizations in Israel, Jordan, Kuwait, Saudi Arabia, the United Arab Emirates, Pakistan, Thailand, and Laos were targeted in the campaign, which appears to have made no use of custom malware and instead relied on a mixture of legitimate tools, publicly available malware, and living-off-the-land tactics. While the identity of the attackers remains unconfirmed, there is some evidence to suggest a link to the Iranian Seedworm (aka MuddyWater) group. The targeting and tactics are consistent with Iranian-sponsored actors.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/espionage-campaign-telecoms-asia-middle-east">Espionage Campaign Targets Telecoms Organizations across Middle East and Asia</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>898</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[98af2d6e-6389-11ec-b04f-977c127fe2a6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7029547467.mp3?updated=1685126657" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A collaboration stumbles upon threat actor Lyceum. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/216/notes</link>
      <description>Guest Rob Boyce, Accenture's Global Lead for Cyber Incident Response and Transformation Services, joins Dave to discuss joint research done by Accenture’s Cyber Threat Intelligence (ACTI) group and Prevailion’s Adversarial Counterintelligence Team (PACT). The teams dug into recently publicized campaigns of the cyber espionage threat group Lyceum (aka HEXANE, Spirlin) to further analyze the operational infrastructure and victimology of this actor. The team’s findings corroborate and reinforce previous ClearSky and Kaspersky research indicating a primary focus on computer network intrusion events aimed at telecommunications providers in the Middle East. Additionally, the research expands on this victim set by identifying additional targets within internet service providers (ISPs) and government agencies. Although all victim-identifying information has been redacted, this report seeks to provide these targeted industry and geographic verticals with additional knowledge of the threat and mitigation opportunities.
The research can be found here:
Who are latest targets of cyber group Lyceum?

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Jan 2022 06:00:00 -0000</pubDate>
      <itunes:title>A collaboration stumbles upon threat actor Lyceum. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>216</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Rob Boyce, Accenture's Global Lead for Cyber Incident Response and Transformation Services, joins Dave to discuss joint research done by Accenture’s Cyber Threat Intelligence (ACTI) group and Prevailion’s Adversarial Counterintelligence Team (PACT). The teams dug into recently publicized campaigns of the cyber espionage threat group Lyceum (aka HEXANE, Spirlin) to further analyze the operational infrastructure and victimology of this actor. The team’s findings corroborate and reinforce previous ClearSky and Kaspersky research indicating a primary focus on computer network intrusion events aimed at telecommunications providers in the Middle East. Additionally, the research expands on this victim set by identifying additional targets within internet service providers (ISPs) and government agencies. Although all victim-identifying information has been redacted, this report seeks to provide these targeted industry and geographic verticals with additional knowledge of the threat and mitigation opportunities.
The research can be found here:
Who are latest targets of cyber group Lyceum?

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Rob Boyce, Accenture's Global Lead for Cyber Incident Response and Transformation Services, joins Dave to discuss joint research done by Accenture’s Cyber Threat Intelligence (ACTI) group and Prevailion’s Adversarial Counterintelligence Team (PACT). The teams dug into recently publicized campaigns of the cyber espionage threat group Lyceum (aka HEXANE, Spirlin) to further analyze the operational infrastructure and victimology of this actor. The team’s findings corroborate and reinforce previous ClearSky and Kaspersky research indicating a primary focus on computer network intrusion events aimed at telecommunications providers in the Middle East. Additionally, the research expands on this victim set by identifying additional targets within internet service providers (ISPs) and government agencies. Although all victim-identifying information has been redacted, this report seeks to provide these targeted industry and geographic verticals with additional knowledge of the threat and mitigation opportunities.</p><p>The research can be found here:</p><ul><li><a href="https://www.accenture.com/us-en/blogs/cyber-defense/iran-based-lyceum-campaigns">Who are latest targets of cyber group Lyceum?</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1061</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[988ffd90-6389-11ec-b04f-afa5aa449ccf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6717124848.mp3?updated=1685126648" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Keeping APIs on the radar: Evaluating the banking industry. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/215/notes</link>
      <description>This episode features guest Alissa Knight, former hacker and partner at Knight Ink, along with Karl Mattson, CISO from Noname Security, discussing findings on severe API vulnerabilities in U.S. banking applications research that was conducted by Alissa and funded by Noname Security. The research, “Scorched Earth: Hacking Bank APIs,” unveils a number of vulnerabilities in the banking, cryptocurrency exchange, and FinTech industries.
In her Money 20/20 keynote presentation entitled “Scorched Earth: Hacking Bank APIs”. In her presentation, Alissa revealed that she was able to gain access to 55 different banks and change PIN codes and move money in and out of accounts. Three lessons learned include: API security vulnerabilities affect all enterprises, API security needs to be operationalized across the enterprise, and API security requires posture management, runtime security, and active testing.
Details can be found here:

White paper: Hacking Banks and Cryptocurrency Exchanges Through Their APIs


Blog post: 3 API Security Lessons from “Scorched Earth: Hacking Bank APIs”


Press release: New Research Shows Vulnerabilities in Banking, Cryptocurrency Exchange, and FinTech APIs Allow Unauthorized Transactions and PIN Code Changes of Customers


Alissa's presentation at Money 20/20.


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Jan 2022 06:00:00 -0000</pubDate>
      <itunes:title>Keeping APIs on the radar: Evaluating the banking industry. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>215</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This episode features guest Alissa Knight, former hacker and partner at Knight Ink, along with Karl Mattson, CISO from Noname Security, discussing findings on severe API vulnerabilities in U.S. banking applications research that was conducted by Alissa and funded by Noname Security. The research, “Scorched Earth: Hacking Bank APIs,” unveils a number of vulnerabilities in the banking, cryptocurrency exchange, and FinTech industries.
In her Money 20/20 keynote presentation entitled “Scorched Earth: Hacking Bank APIs”. In her presentation, Alissa revealed that she was able to gain access to 55 different banks and change PIN codes and move money in and out of accounts. Three lessons learned include: API security vulnerabilities affect all enterprises, API security needs to be operationalized across the enterprise, and API security requires posture management, runtime security, and active testing.
Details can be found here:

White paper: Hacking Banks and Cryptocurrency Exchanges Through Their APIs


Blog post: 3 API Security Lessons from “Scorched Earth: Hacking Bank APIs”


Press release: New Research Shows Vulnerabilities in Banking, Cryptocurrency Exchange, and FinTech APIs Allow Unauthorized Transactions and PIN Code Changes of Customers


Alissa's presentation at Money 20/20.


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This episode features guest Alissa Knight, former hacker and partner at Knight Ink, along with Karl Mattson, CISO from Noname Security, discussing findings on severe API vulnerabilities in U.S. banking applications research that was conducted by Alissa and funded by Noname Security. The research, “Scorched Earth: Hacking Bank APIs,” unveils a number of vulnerabilities in the banking, cryptocurrency exchange, and FinTech industries.</p><p>In her Money 20/20 keynote presentation entitled “Scorched Earth: Hacking Bank APIs”. In her presentation, Alissa revealed that she was able to gain access to 55 different banks and change PIN codes and move money in and out of accounts. Three lessons learned include: API security vulnerabilities affect all enterprises, API security needs to be operationalized across the enterprise, and API security requires posture management, runtime security, and active testing.</p><p>Details can be found here:</p><ul>
<li>White paper: <a href="https://nonamesecurity.com/whitepaper-scorched-earth">Hacking Banks and Cryptocurrency Exchanges Through Their APIs</a>
</li>
<li>Blog post: <a href="https://nonamesecurity.com/blog/3-api-security-lessons-from-scorched-earth-hacking-bank-apis">3 API Security Lessons from “Scorched Earth: Hacking Bank APIs”</a>
</li>
<li>Press release: <a href="https://www.businesswire.com/news/home/20211026006184/en/New-Research-Shows-Vulnerabilities-in-Banking-Cryptocurrency-Exchange-and-FinTech-APIs-Allow-Unauthorized-Transactions-and-PIN-Code-Changes-of-Customers">New Research Shows Vulnerabilities in Banking, Cryptocurrency Exchange, and FinTech APIs Allow Unauthorized Transactions and PIN Code Changes of Customers</a>
</li>
<li>Alissa's <a href="https://www.youtube.com/watch?v=dzJ-UnYvSQ0">presentation at Money 20/20</a>.</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1522</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9870d050-6389-11ec-b04f-638400106462]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6052197045.mp3?updated=1685126644" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The rise of Karakurt Hacking Team.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/214/notes</link>
      <description>Guest Rob Boyce, Accenture's Global Lead for Cyber Incident Response and Transformation Services, joins Dave to discuss their research "Karakurt rises from its lair." Accenture Security has identified a new threat group, the self-proclaimed Karakurt Hacking Team, that has impacted over 40 victims across multiple geographies. The threat group is financially motivated, opportunistic in nature, and so far, appears to target smaller companies or corporate subsidiaries versus the alternative big game hunting approach. Based on intrusion analysis to date, the threat group focuses solely on data exfiltration and subsequent extortion, rather than the more destructive ransomware deployment. In addition, Accenture Security assesses with moderate-to-high confidence that the threat group’s extortion approach includes steps to avoid, as much as possible, drawing attention to its activities.
The research can be found here:
Karakurt rises from its lair

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Jan 2022 06:00:00 -0000</pubDate>
      <itunes:title>The rise of Karakurt Hacking Team.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>214</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Rob Boyce, Accenture's Global Lead for Cyber Incident Response and Transformation Services, joins Dave to discuss their research "Karakurt rises from its lair." Accenture Security has identified a new threat group, the self-proclaimed Karakurt Hacking Team, that has impacted over 40 victims across multiple geographies. The threat group is financially motivated, opportunistic in nature, and so far, appears to target smaller companies or corporate subsidiaries versus the alternative big game hunting approach. Based on intrusion analysis to date, the threat group focuses solely on data exfiltration and subsequent extortion, rather than the more destructive ransomware deployment. In addition, Accenture Security assesses with moderate-to-high confidence that the threat group’s extortion approach includes steps to avoid, as much as possible, drawing attention to its activities.
The research can be found here:
Karakurt rises from its lair

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Rob Boyce, Accenture's Global Lead for Cyber Incident Response and Transformation Services, joins Dave to discuss their research "Karakurt rises from its lair." Accenture Security has identified a new threat group, the self-proclaimed Karakurt Hacking Team, that has impacted over 40 victims across multiple geographies. The threat group is financially motivated, opportunistic in nature, and so far, appears to target smaller companies or corporate subsidiaries versus the alternative big game hunting approach. Based on intrusion analysis to date, the threat group focuses solely on data exfiltration and subsequent extortion, rather than the more destructive ransomware deployment. In addition, Accenture Security assesses with moderate-to-high confidence that the threat group’s extortion approach includes steps to avoid, as much as possible, drawing attention to its activities.</p><p>The research can be found here:</p><ul><li><a href="https://www.accenture.com/us-en/blogs/cyber-defense/karakurt-threat-mitigation">Karakurt rises from its lair</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>775</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[98515536-6389-11ec-b04f-af761c01a979]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6331703979.mp3?updated=1685126630" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: When big ransomware goes away, where should affiliates go? </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/206/notes</link>
      <description>Our guest Doel Santos, Threat Research Analyst at Palo Alto Networks, joins Dave Bittner to talk about Unit 42's work on "Ransomware Groups to Watch: Emerging Threats." As part of Unit 42’s commitment to stop ransomware attacks, they monitor the activity of existing groups, search for dark web leak sites and fresh onion sites, identify up-and-coming players and study tactics, techniques and procedures. During their operations, Unit 42 observed four emerging ransomware groups that are currently affecting organizations and show signs of having the potential to become more prevalent in the future. Doel discusses these (AvosLocker, Hive Ransomware, HelloKitty, and LockBit 2.0) with Dave.
The research can be found here:
Ransomware Groups to Watch: Emerging Threats

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Jan 2022 06:00:00 -0000</pubDate>
      <itunes:title>Encore: When big ransomware goes away, where should affiliates go? </itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>206</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Our guest Doel Santos, Threat Research Analyst at Palo Alto Networks, joins Dave Bittner to talk about Unit 42's work on "Ransomware Groups to Watch: Emerging Threats." As part of Unit 42’s commitment to stop ransomware attacks, they monitor the activity of existing groups, search for dark web leak sites and fresh onion sites, identify up-and-coming players and study tactics, techniques and procedures. During their operations, Unit 42 observed four emerging ransomware groups that are currently affecting organizations and show signs of having the potential to become more prevalent in the future. Doel discusses these (AvosLocker, Hive Ransomware, HelloKitty, and LockBit 2.0) with Dave.
The research can be found here:
Ransomware Groups to Watch: Emerging Threats

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Our guest Doel Santos, Threat Research Analyst at Palo Alto Networks, joins Dave Bittner to talk about Unit 42's work on "Ransomware Groups to Watch: Emerging Threats." As part of Unit 42’s commitment to stop ransomware attacks, they monitor the activity of existing groups, search for dark web leak sites and fresh onion sites, identify up-and-coming players and study tactics, techniques and procedures. During their operations, Unit 42 observed four emerging ransomware groups that are currently affecting organizations and show signs of having the potential to become more prevalent in the future. Doel discusses these (AvosLocker, Hive Ransomware, HelloKitty, and LockBit 2.0) with Dave.</p><p>The research can be found here:</p><ul><li><a href="https://unit42.paloaltonetworks.com/emerging-ransomware-groups/">Ransomware Groups to Watch: Emerging Threats</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1168</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b9320b3c-634e-11ec-8c43-53c9d436de1e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3250060794.mp3?updated=1640309187" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CyberWire Pro Research Briefing from 12/21/2021.</title>
      <description>Enjoy a peek into CyberWire Pro's Research Briefing as the team is off taking our long winter's nap. This is the spoken edition of our weekly Research Briefing, focused on threats, vulnerabilities, and consequences, as they’re played out in cyberspace. This week's headlines: US Commission on International Religious Freedom reportedly hacked. Sophistication of NSO exploit on par with nation-state tooling. Conti ransomware actors exploit Log4Shell. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Dec 2021 08:00:00 -0000</pubDate>
      <itunes:title>CyberWire Pro Research Briefing from 12/21/2021.</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy a peek into CyberWire Pro's Research Briefing as the team is off taking our long winter's nap. This is the spoken edition of our weekly Research Briefing, focused on threats, vulnerabilities, and consequences, as they’re played out in cyberspace. This week's headlines: US Commission on International Religious Freedom reportedly hacked. Sophistication of NSO exploit on par with nation-state tooling. Conti ransomware actors exploit Log4Shell. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy a peek into CyberWire Pro's Research Briefing as the team is off taking our long winter's nap. This is the spoken edition of our weekly Research Briefing, focused on threats, vulnerabilities, and consequences, as they’re played out in cyberspace. This week's headlines: US Commission on International Religious Freedom reportedly hacked. Sophistication of NSO exploit on par with nation-state tooling. Conti ransomware actors exploit Log4Shell. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. <a href="https://thecyberwire.com/pro">Learn more</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>544</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[81360446-634d-11ec-9596-1b16331db438]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3013515304.mp3?updated=1640194525" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Discovering ChaosDB, a critical vulnerability in the CosmosDB.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/213/notes</link>
      <description>Guests Sagi Tzadik and Nir Ohfeld of cloud security company Wiz join Dave to discuss their research "ChaosDB: How we hacked thousands of Azure customers’ databases." Nearly everything we do online these days runs through applications and databases in the cloud. While leaky storage buckets get a lot of attention, database exposure is the bigger risk for most companies because each one can contain millions or even billions of sensitive records. Every CISO’s nightmare is someone getting their access keys and exfiltrating gigabytes of data in one fell swoop.
Database exposures have become alarmingly common in recent years as more companies move to the cloud, and the culprit is usually a misconfiguration in the customer’s environment. In this case, customers were not at fault.
The research can be found here:

ChaosDB: How we hacked thousands of Azure customers’ databases

ChaosDB: How to discover your vulnerable Azure Cosmos DBs and protect them


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Dec 2021 06:00:00 -0000</pubDate>
      <itunes:title>Discovering ChaosDB, a critical vulnerability in the CosmosDB.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>213</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guests Sagi Tzadik and Nir Ohfeld of cloud security company Wiz join Dave to discuss their research "ChaosDB: How we hacked thousands of Azure customers’ databases." Nearly everything we do online these days runs through applications and databases in the cloud. While leaky storage buckets get a lot of attention, database exposure is the bigger risk for most companies because each one can contain millions or even billions of sensitive records. Every CISO’s nightmare is someone getting their access keys and exfiltrating gigabytes of data in one fell swoop.
Database exposures have become alarmingly common in recent years as more companies move to the cloud, and the culprit is usually a misconfiguration in the customer’s environment. In this case, customers were not at fault.
The research can be found here:

ChaosDB: How we hacked thousands of Azure customers’ databases

ChaosDB: How to discover your vulnerable Azure Cosmos DBs and protect them


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guests Sagi Tzadik and Nir Ohfeld of cloud security company Wiz join Dave to discuss their research "ChaosDB: How we hacked thousands of Azure customers’ databases." Nearly everything we do online these days runs through applications and databases in the cloud. While leaky storage buckets get a lot of attention, database exposure is the bigger risk for most companies because each one can contain millions or even billions of sensitive records. Every CISO’s nightmare is someone getting their access keys and exfiltrating gigabytes of data in one fell swoop.</p><p>Database exposures have become alarmingly common in recent years as more companies move to the cloud, and the culprit is usually a misconfiguration in the customer’s environment. In this case, customers were not at fault.</p><p>The research can be found here:</p><ul>
<li><a href="https://www.wiz.io/blog/chaosdb-how-we-hacked-thousands-of-azure-customers-databases">ChaosDB: How we hacked thousands of Azure customers’ databases</a></li>
<li><a href="https://www.wiz.io/blog/protecting-your-environment-from-chaosdb">ChaosDB: How to discover your vulnerable Azure Cosmos DBs and protect them</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>986</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c9b94ac6-357b-11eb-acde-1b66eeb69531]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7721802753.mp3?updated=1685126459" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>FIN7 repositioning focus into ransomware. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/212/notes</link>
      <description>Guest Ilya Volovik, Team Lead of Cyber Intelligence at Gemini Advisory, discusses his team's work on "FIN7 Recruits Talent For Push Into Ransomware." The cybercriminal group FIN7 gained notoriety in the mid-2010s for large-scale malware campaigns targeting the point-of-sale (POS) systems. In 2018, Gemini Advisory reported FIN7’s compromise of Saks Fifth Avenue and Lord &amp; Taylor stores and the subsequent sale of over 5 million payment cards on the dark web. According to the US Department of Justice, the broader FIN7 carding campaigns have resulted in the theft of over 20 million payment card records and cost victims over $1 billion, making FIN7 one of the most infamous and prolific cybercriminal groups of the last decade. Now with ransomware proving to be cybercriminals’ preferred high-profit, jackpot venture, FIN7 has redeployed their expertise and capacity towards ransomware, with reports indicating that the group was involved in attempted ransomware attacks on US companies as early as 2020. Furthermore, despite focus from law enforcement and the arrest of four FIN7 members from 2018 to 2020, FIN7’s continued activity shows that the group remains a powerful, active threat.
The research can be found here:
FIN7 Recruits Talent For Push Into Ransomware

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Dec 2021 06:00:00 -0000</pubDate>
      <itunes:title>FIN7 repositioning focus into ransomware. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>212</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Ilya Volovik, Team Lead of Cyber Intelligence at Gemini Advisory, discusses his team's work on "FIN7 Recruits Talent For Push Into Ransomware." The cybercriminal group FIN7 gained notoriety in the mid-2010s for large-scale malware campaigns targeting the point-of-sale (POS) systems. In 2018, Gemini Advisory reported FIN7’s compromise of Saks Fifth Avenue and Lord &amp; Taylor stores and the subsequent sale of over 5 million payment cards on the dark web. According to the US Department of Justice, the broader FIN7 carding campaigns have resulted in the theft of over 20 million payment card records and cost victims over $1 billion, making FIN7 one of the most infamous and prolific cybercriminal groups of the last decade. Now with ransomware proving to be cybercriminals’ preferred high-profit, jackpot venture, FIN7 has redeployed their expertise and capacity towards ransomware, with reports indicating that the group was involved in attempted ransomware attacks on US companies as early as 2020. Furthermore, despite focus from law enforcement and the arrest of four FIN7 members from 2018 to 2020, FIN7’s continued activity shows that the group remains a powerful, active threat.
The research can be found here:
FIN7 Recruits Talent For Push Into Ransomware

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Ilya Volovik, Team Lead of Cyber Intelligence at Gemini Advisory, discusses his team's work on "FIN7 Recruits Talent For Push Into Ransomware." The cybercriminal group FIN7 gained notoriety in the mid-2010s for large-scale malware campaigns targeting the point-of-sale (POS) systems. In 2018, Gemini Advisory reported FIN7’s compromise of Saks Fifth Avenue and Lord &amp; Taylor stores and the subsequent sale of over 5 million payment cards on the dark web. According to the US Department of Justice, the broader FIN7 carding campaigns have resulted in the theft of over 20 million payment card records and cost victims over $1 billion, making FIN7 one of the most infamous and prolific cybercriminal groups of the last decade. Now with ransomware proving to be cybercriminals’ preferred high-profit, jackpot venture, FIN7 has redeployed their expertise and capacity towards ransomware, with reports indicating that the group was involved in attempted ransomware attacks on US companies as early as 2020. Furthermore, despite focus from law enforcement and the arrest of four FIN7 members from 2018 to 2020, FIN7’s continued activity shows that the group remains a powerful, active threat.</p><p>The research can be found here:</p><ul><li><a href="https://geminiadvisory.io/fin7-ransomware-bastion-secure/">FIN7 Recruits Talent For Push Into Ransomware</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1685</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c9ada70c-357b-11eb-acde-0b59199bea7c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6190354462.mp3?updated=1685126455" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Getting in and getting out with SnapMC.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/211/notes</link>
      <description>Guest Christo Butcher of NCC Group's Research and Intelligence Fusion Team discusses their research into a cybercriminal group they dubbed SnapMC. Forget ransomware, too expensive and too much hassle. Randomly enter through a known vulnerability, take a look around, lock away data and leave again. And all that within half an hour: hit &amp; run. An email is then sent to the affected organization: pay or else the stolen data will be published and/or sold.
This is the opportunistic approach of a new group of blackmailers who don't even bother to encrypt data. NCC Group has given them the name SnapMC: a combination of 'snap' (a sudden, sharp cracking sound or movement) and MC, from mc.exe, the primary tool they use to exfiltrate data. They have only seen SnapMC's attacks in the Netherlands for the time being. They do not target specific sectors and we have not (yet) been able to associate them with known attackers.
The research can be found here:

SnapMC: extortion without ransomware

SnapMC skips ransomware, steals data


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Dec 2021 06:00:00 -0000</pubDate>
      <itunes:title>Getting in and getting out with SnapMC.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>211</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Christo Butcher of NCC Group's Research and Intelligence Fusion Team discusses their research into a cybercriminal group they dubbed SnapMC. Forget ransomware, too expensive and too much hassle. Randomly enter through a known vulnerability, take a look around, lock away data and leave again. And all that within half an hour: hit &amp; run. An email is then sent to the affected organization: pay or else the stolen data will be published and/or sold.
This is the opportunistic approach of a new group of blackmailers who don't even bother to encrypt data. NCC Group has given them the name SnapMC: a combination of 'snap' (a sudden, sharp cracking sound or movement) and MC, from mc.exe, the primary tool they use to exfiltrate data. They have only seen SnapMC's attacks in the Netherlands for the time being. They do not target specific sectors and we have not (yet) been able to associate them with known attackers.
The research can be found here:

SnapMC: extortion without ransomware

SnapMC skips ransomware, steals data


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Christo Butcher of NCC Group's Research and Intelligence Fusion Team discusses their research into a cybercriminal group they dubbed SnapMC. Forget ransomware, too expensive and too much hassle. Randomly enter through a known vulnerability, take a look around, lock away data and leave again. And all that within half an hour: hit &amp; run. An email is then sent to the affected organization: pay or else the stolen data will be published and/or sold.</p><p>This is the opportunistic approach of a new group of blackmailers who don't even bother to encrypt data. NCC Group has given them the name SnapMC: a combination of 'snap' (a sudden, sharp cracking sound or movement) and MC, from mc.exe, the primary tool they use to exfiltrate data. They have only seen SnapMC's attacks in the Netherlands for the time being. They do not target specific sectors and we have not (yet) been able to associate them with known attackers.</p><p>The research can be found here:</p><ul>
<li><a href="https://newsroom.nccgroup.com/blog_posts/snapmc-extortion-without-ransomware-104333">SnapMC: extortion without ransomware</a></li>
<li><a href="https://research.nccgroup.com/2021/10/11/snapmc-skips-ransomware-steals-data/">SnapMC skips ransomware, steals data</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1041</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c9a197dc-357b-11eb-acde-f7c0f74cea09]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6481301963.mp3?updated=1685126440" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CyberWire Pro Research Briefing from 11/23/2021</title>
      <description>Enjoy a peek into CyberWire Pro's Research Briefing as the team is off recovering from our Thanksgiving feasts. This is the spoken edition of our weekly Research Briefing, focused on threats, vulnerabilities, and consequences, as they’re played out in cyberspace. This week's headlines: Iranian threat actors target the IT supply chain. North Korean cyberespionage. More information on Emotet's return. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Nov 2021 06:00:00 -0000</pubDate>
      <itunes:title>CyberWire Pro Research Briefing from 11/23/2021</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy a peek into CyberWire Pro's Research Briefing as the team is off recovering from our Thanksgiving feasts. This is the spoken edition of our weekly Research Briefing, focused on threats, vulnerabilities, and consequences, as they’re played out in cyberspace. This week's headlines: Iranian threat actors target the IT supply chain. North Korean cyberespionage. More information on Emotet's return. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy a peek into CyberWire Pro's Research Briefing as the team is off recovering from our Thanksgiving feasts. This is the spoken edition of our weekly Research Briefing, focused on threats, vulnerabilities, and consequences, as they’re played out in cyberspace. This week's headlines: Iranian threat actors target the IT supply chain. North Korean cyberespionage. More information on Emotet's return. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. <a href="https://thecyberwire.com/pro">Learn more</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>498</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c34f8dc6-4d49-11ec-abc5-6b2743b68b52]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4494863310.mp3?updated=1637773475" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Using bidirectionality override characters to obscure code.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/210/notes</link>
      <description>Guests Nicholas Boucher and Ross Anderson from the University of Cambridge join Dave Bittner to discuss their research, "Trojan Source: Invisible Vulnerabilities." The researchers present a new type of attack in which source code is maliciously encoded so that it appears different to a compiler and to the human eye. This attack exploits subtleties in text-encoding standards such as Unicode to produce source code whose tokens are logically encoded in a different order from the one in which they are displayed, leading to vulnerabilities that cannot be perceived directly by human code reviewers. ‘Trojan Source’ attacks, as they call them, pose an immediate threat both to first-party software and of supply-chain compromise across the industry. They present working examples of Trojan-Source attacks in C, C++, C#, JavaScript, Java, Rust, Go, and Python. They propose definitive compiler-level defenses, and describe other mitigating controls that can be deployed in editors, repositories, and build pipelines while compilers are upgraded to block this attack.
The project website and research can be found here:

Trojan Source: Invisible Source Code Vulnerabilities project website

Trojan Source: Invisible Vulnerabilities research paper


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Nov 2021 06:00:00 -0000</pubDate>
      <itunes:title>Using bidirectionality override characters to obscure code.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>210</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guests Nicholas Boucher and Ross Anderson from the University of Cambridge join Dave Bittner to discuss their research, "Trojan Source: Invisible Vulnerabilities." The researchers present a new type of attack in which source code is maliciously encoded so that it appears different to a compiler and to the human eye. This attack exploits subtleties in text-encoding standards such as Unicode to produce source code whose tokens are logically encoded in a different order from the one in which they are displayed, leading to vulnerabilities that cannot be perceived directly by human code reviewers. ‘Trojan Source’ attacks, as they call them, pose an immediate threat both to first-party software and of supply-chain compromise across the industry. They present working examples of Trojan-Source attacks in C, C++, C#, JavaScript, Java, Rust, Go, and Python. They propose definitive compiler-level defenses, and describe other mitigating controls that can be deployed in editors, repositories, and build pipelines while compilers are upgraded to block this attack.
The project website and research can be found here:

Trojan Source: Invisible Source Code Vulnerabilities project website

Trojan Source: Invisible Vulnerabilities research paper


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guests Nicholas Boucher and Ross Anderson from the University of Cambridge join Dave Bittner to discuss their research, "Trojan Source: Invisible Vulnerabilities." The researchers present a new type of attack in which source code is maliciously encoded so that it appears different to a compiler and to the human eye. This attack exploits subtleties in text-encoding standards such as Unicode to produce source code whose tokens are logically encoded in a different order from the one in which they are displayed, leading to vulnerabilities that cannot be perceived directly by human code reviewers. ‘Trojan Source’ attacks, as they call them, pose an immediate threat both to first-party software and of supply-chain compromise across the industry. They present working examples of Trojan-Source attacks in C, C++, C#, JavaScript, Java, Rust, Go, and Python. They propose definitive compiler-level defenses, and describe other mitigating controls that can be deployed in editors, repositories, and build pipelines while compilers are upgraded to block this attack.</p><p>The project website and research can be found here:</p><ul>
<li><a href="https://www.trojansource.codes/index/">Trojan Source: Invisible Source Code Vulnerabilities project website</a></li>
<li><a href="https://www.trojansource.codes/trojan-source.pdf">Trojan Source: Invisible Vulnerabilities research paper</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1510</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c9856a4e-357b-11eb-acde-7f05ed7271c7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5859430435.mp3?updated=1685126434" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A glimpse into TeamTNT.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/209/notes</link>
      <description>Senior Intelligence Researcher at Anomali, Tara Gould, joins Dave to discuss their team's work on "Inside TeamTNT’s Impressive Arsenal: A Look Into A TeamTNT Server." Anomali Threat Research discovered an open server to a directory listing that they attribute with high confidence to the German-speaking threat group, TeamTNT. The server contains source code, scripts, binaries, and cryptominers targeting Cloud environments. Other server contents include Amazon Web Services (AWS) Credentials stolen from TeamTNT stealers are also hosted on the server.
This inside view of TeamTNT infrastructure and tools in use can help security operations teams to improve detection capabilities for related attacks, whether coming directly from TeamTNT or other cybercrime groups leveraging their tools.
The research can be found here:
Inside TeamTNT’s Impressive Arsenal: A Look Into A TeamTNT Server

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Nov 2021 06:00:00 -0000</pubDate>
      <itunes:title>A glimpse into TeamTNT.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>209</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c976c05c-357b-11eb-acde-e370279d8e70/image/rs.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Senior Intelligence Researcher at Anomali, Tara Gould, joins Dave to discuss their team's work on "Inside TeamTNT’s Impressive Arsenal: A Look Into A TeamTNT Server." Anomali Threat Research discovered an open server to a directory listing that they attribute with high confidence to the German-speaking threat group, TeamTNT. The server contains source code, scripts, binaries, and cryptominers targeting Cloud environments. Other server contents include Amazon Web Services (AWS) Credentials stolen from TeamTNT stealers are also hosted on the server.
This inside view of TeamTNT infrastructure and tools in use can help security operations teams to improve detection capabilities for related attacks, whether coming directly from TeamTNT or other cybercrime groups leveraging their tools.
The research can be found here:
Inside TeamTNT’s Impressive Arsenal: A Look Into A TeamTNT Server

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Senior Intelligence Researcher at Anomali, Tara Gould, joins Dave to discuss their team's work on "Inside TeamTNT’s Impressive Arsenal: A Look Into A TeamTNT Server." Anomali Threat Research discovered an open server to a directory listing that they attribute with high confidence to the German-speaking threat group, TeamTNT. The server contains source code, scripts, binaries, and cryptominers targeting Cloud environments. Other server contents include Amazon Web Services (AWS) Credentials stolen from TeamTNT stealers are also hosted on the server.</p><p>This inside view of TeamTNT infrastructure and tools in use can help security operations teams to improve detection capabilities for related attacks, whether coming directly from TeamTNT or other cybercrime groups leveraging their tools.</p><p>The research can be found here:</p><ul><li><a href="https://www.anomali.com/blog/inside-teamtnts-impressive-arsenal-a-look-into-a-teamtnt-server">Inside TeamTNT’s Impressive Arsenal: A Look Into A TeamTNT Server</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>906</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c976c05c-357b-11eb-acde-e370279d8e70]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7891333355.mp3?updated=1685126421" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An incident response reveals itself as GhostShell tool, ShellClient.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/208/notes</link>
      <description>Guest Mor Levi, Vice President of Cyber Practices from Cybereason, joins Dave Bittner to discuss her team's work on "Operation GhostShell - Novel RAT Targets Global Aerospace and Telecoms Firms." In July 2021, the Cybereason Nocturnus and Incident Response Teams responded to Operation GhostShell, a highly-targeted cyber espionage campaign targeting the Aerospace and Telecommunications industries mainly in the Middle East, with additional victims in the U.S., Russia and Europe. 
The Operation GhostShell campaign aims to steal sensitive information about critical assets, organizations’ infrastructure and technology. During the investigation, the Nocturnus Team uncovered a previously undocumented and stealthy RAT (Remote Access Trojan) dubbed ShellClient which was employed as the primary espionage tool. To learn more, listen to the episode.
The research can be found here:
Operation GhostShell - Novel RAT Targets Global Aerospace and Telecoms Firms

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Nov 2021 05:00:00 -0000</pubDate>
      <itunes:title>An incident response reveals itself as GhostShell tool, ShellClient.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>208</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Mor Levi, Vice President of Cyber Practices from Cybereason, joins Dave Bittner to discuss her team's work on "Operation GhostShell - Novel RAT Targets Global Aerospace and Telecoms Firms." In July 2021, the Cybereason Nocturnus and Incident Response Teams responded to Operation GhostShell, a highly-targeted cyber espionage campaign targeting the Aerospace and Telecommunications industries mainly in the Middle East, with additional victims in the U.S., Russia and Europe. 
The Operation GhostShell campaign aims to steal sensitive information about critical assets, organizations’ infrastructure and technology. During the investigation, the Nocturnus Team uncovered a previously undocumented and stealthy RAT (Remote Access Trojan) dubbed ShellClient which was employed as the primary espionage tool. To learn more, listen to the episode.
The research can be found here:
Operation GhostShell - Novel RAT Targets Global Aerospace and Telecoms Firms

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Mor Levi, Vice President of Cyber Practices from Cybereason, joins Dave Bittner to discuss her team's work on "Operation GhostShell - Novel RAT Targets Global Aerospace and Telecoms Firms." In July 2021, the Cybereason Nocturnus and Incident Response Teams responded to <em>Operation GhostShell</em>, a highly-targeted cyber espionage campaign targeting the Aerospace and Telecommunications industries mainly in the Middle East, with additional victims in the U.S., Russia and Europe. </p><p>The Operation GhostShell campaign aims to steal sensitive information about critical assets, organizations’ infrastructure and technology. During the investigation, the Nocturnus Team uncovered a previously undocumented and stealthy RAT (Remote Access Trojan) dubbed <em>ShellClient</em> which was employed as the primary espionage tool. To learn more, listen to the episode.</p><p>The research can be found here:</p><ul><li><a href="https://www.cybereason.com/blog/operation-ghostshell-novel-rat-targets-global-aerospace-and-telecoms-firms">Operation GhostShell - Novel RAT Targets Global Aerospace and Telecoms Firms</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1124</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c96a3e86-357b-11eb-acde-fb480ad058e5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4741758650.mp3?updated=1685126413" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Malware sometimes changes its behavior. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/207/notes</link>
      <description>Dr. Tudor Dumitras from University of Maryland joins Dave Bittner to share a research study conducted in collaboration with industry partners from Facebook, NortonLifeLock Research Group and EURECOM. The project is called: "When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World." In the study, the team analyzed how malware samples change their behavior when executed on different hosts or at different times. Such “split personalities” may confound the current techniques for malware analysis and detection. Malware execution traces are typically collected by executing the samples in a controlled environment (a “sandbox”), and the techniques created and tested using such traces do not account for the broad range of behaviors observed in the wild. In the paper, the team shows how behavior variability can make those techniques appear more effective than they really are, and they make some recommendations for dealing with the variability.
The research and executive summary can be found here:

When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World

Analysing malware variability in the real world


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Oct 2021 05:00:00 -0000</pubDate>
      <itunes:title>Malware sometimes changes its behavior. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>207</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dr. Tudor Dumitras from University of Maryland joins Dave Bittner to share a research study conducted in collaboration with industry partners from Facebook, NortonLifeLock Research Group and EURECOM. The project is called: "When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World." In the study, the team analyzed how malware samples change their behavior when executed on different hosts or at different times. Such “split personalities” may confound the current techniques for malware analysis and detection. Malware execution traces are typically collected by executing the samples in a controlled environment (a “sandbox”), and the techniques created and tested using such traces do not account for the broad range of behaviors observed in the wild. In the paper, the team shows how behavior variability can make those techniques appear more effective than they really are, and they make some recommendations for dealing with the variability.
The research and executive summary can be found here:

When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World

Analysing malware variability in the real world


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dr. Tudor Dumitras from University of Maryland joins Dave Bittner to share a research study conducted in collaboration with industry partners from Facebook, NortonLifeLock Research Group and EURECOM. The project is called: "When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World." In the study, the team analyzed how malware samples change their behavior when executed on different hosts or at different times. Such “split personalities” may confound the current techniques for malware analysis and detection. Malware execution traces are typically collected by executing the samples in a controlled environment (a “sandbox”), and the techniques created and tested using such traces do not account for the broad range of behaviors observed in the wild. In the paper, the team shows how behavior variability can make those techniques appear more effective than they really are, and they make some recommendations for dealing with the variability.</p><p>The research and executive summary can be found here:</p><ul>
<li><a href="https://obj.umiacs.umd.edu/securitypapers/malw_variability.pdf">When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World</a></li>
<li><a href="https://albocoder.github.io/malware/2021/08/10/malware-behavior-variability.html">Analysing malware variability in the real world</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1593</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c95e5cba-357b-11eb-acde-c742e6fe4143]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6058934896.mp3?updated=1685126407" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When big ransomware goes away, where should affiliates go? </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/206/notes</link>
      <description>Our guest Doel Santos, Threat Research Analyst at Palo Alto Networks, joins Dave Bittner to talk about Unit 42's work on "Ransomware Groups to Watch: Emerging Threats." As part of Unit 42’s commitment to stop ransomware attacks, they monitor the activity of existing groups, search for dark web leak sites and fresh onion sites, identify up-and-coming players and study tactics, techniques and procedures. During their operations, Unit 42 observed four emerging ransomware groups that are currently affecting organizations and show signs of having the potential to become more prevalent in the future. Doel discusses these (AvosLocker, Hive Ransomware, HelloKitty, and LockBit 2.0) with Dave.
The research can be found here:
Ransomware Groups to Watch: Emerging Threats

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Oct 2021 05:00:00 -0000</pubDate>
      <itunes:title>When big ransomware goes away, where should affiliates go? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>206</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Our guest Doel Santos, Threat Research Analyst at Palo Alto Networks, joins Dave Bittner to talk about Unit 42's work on "Ransomware Groups to Watch: Emerging Threats." As part of Unit 42’s commitment to stop ransomware attacks, they monitor the activity of existing groups, search for dark web leak sites and fresh onion sites, identify up-and-coming players and study tactics, techniques and procedures. During their operations, Unit 42 observed four emerging ransomware groups that are currently affecting organizations and show signs of having the potential to become more prevalent in the future. Doel discusses these (AvosLocker, Hive Ransomware, HelloKitty, and LockBit 2.0) with Dave.
The research can be found here:
Ransomware Groups to Watch: Emerging Threats

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Our guest Doel Santos, Threat Research Analyst at Palo Alto Networks, joins Dave Bittner to talk about Unit 42's work on "Ransomware Groups to Watch: Emerging Threats." As part of Unit 42’s commitment to stop ransomware attacks, they monitor the activity of existing groups, search for dark web leak sites and fresh onion sites, identify up-and-coming players and study tactics, techniques and procedures. During their operations, Unit 42 observed four emerging ransomware groups that are currently affecting organizations and show signs of having the potential to become more prevalent in the future. Doel discusses these (AvosLocker, Hive Ransomware, HelloKitty, and LockBit 2.0) with Dave.</p><p>The research can be found here:</p><ul><li><a href="https://unit42.paloaltonetworks.com/emerging-ransomware-groups/">Ransomware Groups to Watch: Emerging Threats</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1183</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c9516366-357b-11eb-acde-2773180247c7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9369989638.mp3?updated=1685126396" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Groove Gang making a name for themselves. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/205/notes</link>
      <description>Guest Michael DeBolt, Chief Intelligence Officer from Intel471, joins Dave Bittner to discuss their work on "How Groove Gang is shaking up the Ransomware-as-a-Service market to empower affiliates." McAfee Enterprise ATR believes, with high confidence, that the Groove gang is associated with the Babuk gang, either as a former affiliate or subgroup. These cybercriminals are happy to put aside previous Ransomware-as-a-Service hierarchies to focus on the ill-gotten gains to be made from controlling victim’s networks, rather than the previous approach which prioritized control of the ransomware itself.
The research can be found here:
How Groove Gang is shaking up the Ransomware-as-a-Service market to empower affiliates

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Oct 2021 05:00:00 -0000</pubDate>
      <itunes:title>Groove Gang making a name for themselves. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>205</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Michael DeBolt, Chief Intelligence Officer from Intel471, joins Dave Bittner to discuss their work on "How Groove Gang is shaking up the Ransomware-as-a-Service market to empower affiliates." McAfee Enterprise ATR believes, with high confidence, that the Groove gang is associated with the Babuk gang, either as a former affiliate or subgroup. These cybercriminals are happy to put aside previous Ransomware-as-a-Service hierarchies to focus on the ill-gotten gains to be made from controlling victim’s networks, rather than the previous approach which prioritized control of the ransomware itself.
The research can be found here:
How Groove Gang is shaking up the Ransomware-as-a-Service market to empower affiliates

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Michael DeBolt, Chief Intelligence Officer from Intel471, joins Dave Bittner to discuss their work on "How Groove Gang is shaking up the Ransomware-as-a-Service market to empower affiliates." McAfee Enterprise ATR believes, with high confidence, that the Groove gang is associated with the Babuk gang, either as a former affiliate or subgroup. These cybercriminals are happy to put aside previous Ransomware-as-a-Service hierarchies to focus on the ill-gotten gains to be made from controlling victim’s networks, rather than the previous approach which prioritized control of the ransomware itself.</p><p>The research can be found here:</p><ul><li><a href="https://intel471.com/blog/groove-gang-ransomware-babuk-revil-blackmatter">How Groove Gang is shaking up the Ransomware-as-a-Service market to empower affiliates</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1248</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c943ace4-357b-11eb-acde-f7614f9c927a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5818577839.mp3?updated=1685126389" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Taking a closer look at UNC1151. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/204/notes</link>
      <description>Matt Stafford, Senior Threat Intelligence Researcher, from Prevailion joins Dave to talk about their work on "Diving Deep into UNC1151’s Infrastructure: Ghostwriter and beyond." Prevailion’s Adversarial Counterintelligence Team (PACT) used advanced infrastructure hunting techniques and Prevailion’s visibility into threat actor infrastructure creation to uncover previously unknown domains associated with UNC1151 and the “Ghostwriter” influence campaign. UNC1151 is likely a state-backed threat actor waging an ongoing and far-reaching influence campaign that has targeted numerous countries across Europe. Their operations typically display messaging in general alignment with the security interests of the Russian Federation; their hallmarks include anti-NATO messaging, intimate knowledge of regional culture and politics, and strategic influence operations (such as hack-and-leak operations used in conjunction with fabricated messaging and/or forged documents). PACT assesses with varying degrees of confidence that there are 81 additional, unreported domains clustered with the activity that FireEye and ThreatConnect detailed in their respective reports. PACT also assesses with High Confidence that UNC1151 has targeted additional European entities outside of the Baltics, Poland, Ukraine and Germany, for which no previous public reporting exists.
The research can be found here:
Diving Deep into UNC1151’s Infrastructure: Ghostwriter and beyond

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Oct 2021 05:00:00 -0000</pubDate>
      <itunes:title>Taking a closer look at UNC1151. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>204</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Matt Stafford, Senior Threat Intelligence Researcher, from Prevailion joins Dave to talk about their work on "Diving Deep into UNC1151’s Infrastructure: Ghostwriter and beyond." Prevailion’s Adversarial Counterintelligence Team (PACT) used advanced infrastructure hunting techniques and Prevailion’s visibility into threat actor infrastructure creation to uncover previously unknown domains associated with UNC1151 and the “Ghostwriter” influence campaign. UNC1151 is likely a state-backed threat actor waging an ongoing and far-reaching influence campaign that has targeted numerous countries across Europe. Their operations typically display messaging in general alignment with the security interests of the Russian Federation; their hallmarks include anti-NATO messaging, intimate knowledge of regional culture and politics, and strategic influence operations (such as hack-and-leak operations used in conjunction with fabricated messaging and/or forged documents). PACT assesses with varying degrees of confidence that there are 81 additional, unreported domains clustered with the activity that FireEye and ThreatConnect detailed in their respective reports. PACT also assesses with High Confidence that UNC1151 has targeted additional European entities outside of the Baltics, Poland, Ukraine and Germany, for which no previous public reporting exists.
The research can be found here:
Diving Deep into UNC1151’s Infrastructure: Ghostwriter and beyond

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Matt Stafford, Senior Threat Intelligence Researcher, from Prevailion joins Dave to talk about their work on "Diving Deep into UNC1151’s Infrastructure: Ghostwriter and beyond." Prevailion’s Adversarial Counterintelligence Team (PACT) used advanced infrastructure hunting techniques and Prevailion’s visibility into threat actor infrastructure creation to uncover previously unknown domains associated with UNC1151 and the “Ghostwriter” influence campaign. UNC1151 is likely a state-backed threat actor waging an ongoing and far-reaching influence campaign that has targeted numerous countries across Europe. Their operations typically display messaging in general alignment with the security interests of the Russian Federation; their hallmarks include anti-NATO messaging, intimate knowledge of regional culture and politics, and strategic influence operations (such as hack-and-leak operations used in conjunction with fabricated messaging and/or forged documents). PACT assesses with varying degrees of confidence that there are 81 additional, unreported domains clustered with the activity that FireEye and ThreatConnect detailed in their respective reports. PACT also assesses with High Confidence that UNC1151 has targeted additional European entities outside of the Baltics, Poland, Ukraine and Germany, for which no previous public reporting exists.</p><p>The research can be found here:</p><ul><li><a href="https://www.prevailion.com/diving-deep-into-unc1151s-infrastructure-ghostwriter-and-beyond/">Diving Deep into UNC1151’s Infrastructure: Ghostwriter and beyond</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1016</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c93821ee-357b-11eb-acde-03d0094a29d7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4373589483.mp3?updated=1685126378" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>IoT security and the need for randomness.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/203/notes</link>
      <description>Dan Petro, Lead Researcher, and Allan Cecil, Security Consultant, from Bishop Fox join Dave to share their research "You're Doing IoT RNG," that they presented at DefCon 29. There’s a crack in the foundation of Internet of Things (IoT) security, one that affects 35 billion devices worldwide. Basically, every IoT device with a hardware random number generator (RNG) contains a serious vulnerability whereby it fails to properly generate random numbers, which undermines security for any upstream use. In order to perform most security-relevant operations, computers need to generate secrets via an RNG. These secrets then form the basis of cryptography, access controls, authentication, and more. The details of exactly how and why these secrets are generated varies for each use.
The research can be found here:
You're Doing IoT RNG

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Oct 2021 05:00:00 -0000</pubDate>
      <itunes:title>IoT security and the need for randomness.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>203</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dan Petro, Lead Researcher, and Allan Cecil, Security Consultant, from Bishop Fox join Dave to share their research "You're Doing IoT RNG," that they presented at DefCon 29. There’s a crack in the foundation of Internet of Things (IoT) security, one that affects 35 billion devices worldwide. Basically, every IoT device with a hardware random number generator (RNG) contains a serious vulnerability whereby it fails to properly generate random numbers, which undermines security for any upstream use. In order to perform most security-relevant operations, computers need to generate secrets via an RNG. These secrets then form the basis of cryptography, access controls, authentication, and more. The details of exactly how and why these secrets are generated varies for each use.
The research can be found here:
You're Doing IoT RNG

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dan Petro, Lead Researcher, and Allan Cecil, Security Consultant, from Bishop Fox join Dave to share their research "You're Doing IoT RNG," that they presented at DefCon 29. There’s a crack in the foundation of Internet of Things (IoT) security, one that affects 35 billion devices worldwide. Basically, every IoT device with a hardware random number generator (RNG) contains a serious vulnerability whereby it fails to properly generate random numbers, which undermines security for any upstream use. In order to perform most security-relevant operations, computers need to generate secrets via an RNG. These secrets then form the basis of cryptography, access controls, authentication, and more. The details of exactly how and why these secrets are generated varies for each use.</p><p>The research can be found here:</p><ul><li><a href="https://labs.bishopfox.com/tech-blog/youre-doing-iot-rng">You're Doing IoT RNG</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1940</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c92cfbd4-357b-11eb-acde-c388c019fc6e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1726504832.mp3?updated=1685126375" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Vulnerabilities in the public cloud. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/202/notes</link>
      <description>Guest Ariel Zelivansky, Senior Manager of Security Research at Palo Alto Networks, joins Dave to discuss Unit 42's work on the first cross-account container takeover in the public cloud. The Unit 42 Threat Intelligence team has identified the first known vulnerability that could enable one user of a public cloud service to break out of their environment and execute code on environments belonging to other users in the same public cloud service. This unprecedented cross-account takeover affected Microsoft's Azure Container-as-a-Service (CaaS) platform. Researchers named the finding Azurescape because the attack started from a container escape – a technique that enables privilege escalation out of container environments.
The research can be found here:

What You Need to Know About Azurescape

Finding Azurescape – Cross-Account Container Takeover in Azure Container Instances


Note: Microsoft is a sponsor of the CyberWire, however, we cover them as we would any other company.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Sep 2021 05:00:00 -0000</pubDate>
      <itunes:title>Vulnerabilities in the public cloud. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>202</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Ariel Zelivansky, Senior Manager of Security Research at Palo Alto Networks, joins Dave to discuss Unit 42's work on the first cross-account container takeover in the public cloud. The Unit 42 Threat Intelligence team has identified the first known vulnerability that could enable one user of a public cloud service to break out of their environment and execute code on environments belonging to other users in the same public cloud service. This unprecedented cross-account takeover affected Microsoft's Azure Container-as-a-Service (CaaS) platform. Researchers named the finding Azurescape because the attack started from a container escape – a technique that enables privilege escalation out of container environments.
The research can be found here:

What You Need to Know About Azurescape

Finding Azurescape – Cross-Account Container Takeover in Azure Container Instances


Note: Microsoft is a sponsor of the CyberWire, however, we cover them as we would any other company.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Ariel Zelivansky, Senior Manager of Security Research at Palo Alto Networks, joins Dave to discuss Unit 42's work on the first cross-account container takeover in the public cloud. The Unit 42 Threat Intelligence team has identified the first known vulnerability that could enable one user of a public cloud service to break out of their environment and execute code on environments belonging to other users in the same public cloud service. This unprecedented cross-account takeover affected Microsoft's Azure Container-as-a-Service (CaaS) platform. Researchers named the finding Azurescape because the attack started from a container escape – a technique that enables privilege escalation out of container environments.</p><p>The research can be found here:</p><ul>
<li><a href="https://www.paloaltonetworks.com/blog/2021/09/azurescape/">What You Need to Know About Azurescape</a></li>
<li><a href="https://unit42.paloaltonetworks.com/azure-container-instances/">Finding Azurescape – Cross-Account Container Takeover in Azure Container Instances</a></li>
</ul><p><br></p><p><em>Note: Microsoft is a sponsor of the CyberWire, however, we cover them as we would any other company.</em></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1305</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c9214f1e-357b-11eb-acde-3b7d45f962c5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6231583285.mp3?updated=1685126363" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An IoT educational exercise reveals a far-reaching vulnerability.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/201/notes</link>
      <description>Guest Jake Valletta, Director of Professional Services at Mandiant, joins Dave to talk about the critical vulnerability Mandiant disclosed that affects millions of IoT devices. Mandiant disclosed a critical risk vulnerability in coordination with the Cybersecurity and Infrastructure Security Agency (“CISA”) that affects millions of IoT devices that use the ThroughTek “Kalay” network. This vulnerability, discovered by researchers on Mandiant’s Red Team in late 2020, would enable adversaries to remotely compromise victim IoT devices, resulting in the ability to listen to live audio, watch real time video data, and compromise device credentials for further attacks based on exposed device functionality. These further attacks could include actions that would allow an adversary to remotely control affected devices.
The research can be found here:
Mandiant Discloses Critical Vulnerability Affecting Millions of IoT Devices

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Sep 2021 05:00:00 -0000</pubDate>
      <itunes:title>An IoT educational exercise reveals a far-reaching vulnerability.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>201</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Jake Valletta, Director of Professional Services at Mandiant, joins Dave to talk about the critical vulnerability Mandiant disclosed that affects millions of IoT devices. Mandiant disclosed a critical risk vulnerability in coordination with the Cybersecurity and Infrastructure Security Agency (“CISA”) that affects millions of IoT devices that use the ThroughTek “Kalay” network. This vulnerability, discovered by researchers on Mandiant’s Red Team in late 2020, would enable adversaries to remotely compromise victim IoT devices, resulting in the ability to listen to live audio, watch real time video data, and compromise device credentials for further attacks based on exposed device functionality. These further attacks could include actions that would allow an adversary to remotely control affected devices.
The research can be found here:
Mandiant Discloses Critical Vulnerability Affecting Millions of IoT Devices

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Jake Valletta, Director of Professional Services at Mandiant, joins Dave to talk about the critical vulnerability Mandiant disclosed that affects millions of IoT devices. Mandiant disclosed a critical risk vulnerability in coordination with the <a href="https://us-cert.cisa.gov/ics/advisories/icsa-21-229-01">Cybersecurity and Infrastructure Security Agency</a> (“CISA”) that affects millions of IoT devices that use the <a href="https://www.throughtek.com/overview/">ThroughTek “Kalay”</a> network. This vulnerability, discovered by researchers on Mandiant’s Red Team in late 2020, would enable adversaries to remotely compromise victim IoT devices, resulting in the ability to listen to live audio, watch real time video data, and compromise device credentials for further attacks based on exposed device functionality. These further attacks could include actions that would allow an adversary to remotely control affected devices.</p><p>The research can be found here:</p><ul><li><a href="https://www.fireeye.com/blog/threat-research/2021/08/mandiant-discloses-critical-vulnerability-affecting-iot-devices.html">Mandiant Discloses Critical Vulnerability Affecting Millions of IoT Devices</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1389</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c914bc18-357b-11eb-acde-fb7c877580c8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4985164660.mp3?updated=1685126355" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A Google Chrome update that just didn't feel right. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/200/notes</link>
      <description>Guest Jon Hencinski from Expel joins Dave Bittner to discuss his team's recent work on "Expel SOC Stops Ransomware Attack Aimed at WordPress CMS via Drive-By Download Disguised as Google Chrome Update."
In July, 2021, Expel's SOC stopped a ransomware attack at a large software and staffing company. The attackers compromised the company’s WordPress CMS and used the SocGholish framework to trigger a drive-by download of a Remote Access Tool (RAT) disguised as a Google Chrome update.
In total, four hosts downloaded a malicious Zipped JScript file that was configured to deploy a RAT, but we were able to stop the attack before ransomware deployment and help the organization remediate its WordPress CMS. Jon will walk us through what happened, how they caught it, and provide recommendations on how to secure your WordPress CMS. 
The research can be found here:
Expel SOC Stops Ransomware Attack Aimed at WordPress CMS via Drive-By Download Disguised as Google Chrome Update

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Sep 2021 05:00:00 -0000</pubDate>
      <itunes:title>A Google Chrome update that just didn't feel right. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>200</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Jon Hencinski from Expel joins Dave Bittner to discuss his team's recent work on "Expel SOC Stops Ransomware Attack Aimed at WordPress CMS via Drive-By Download Disguised as Google Chrome Update."
In July, 2021, Expel's SOC stopped a ransomware attack at a large software and staffing company. The attackers compromised the company’s WordPress CMS and used the SocGholish framework to trigger a drive-by download of a Remote Access Tool (RAT) disguised as a Google Chrome update.
In total, four hosts downloaded a malicious Zipped JScript file that was configured to deploy a RAT, but we were able to stop the attack before ransomware deployment and help the organization remediate its WordPress CMS. Jon will walk us through what happened, how they caught it, and provide recommendations on how to secure your WordPress CMS. 
The research can be found here:
Expel SOC Stops Ransomware Attack Aimed at WordPress CMS via Drive-By Download Disguised as Google Chrome Update

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Jon Hencinski from Expel joins Dave Bittner to discuss his team's recent work on "Expel SOC Stops Ransomware Attack Aimed at WordPress CMS via Drive-By Download Disguised as Google Chrome Update."</p><p>In July, 2021, Expel's SOC stopped a ransomware attack at a large software and staffing company. The attackers compromised the company’s WordPress CMS and used the SocGholish framework to trigger a drive-by download of a Remote Access Tool (RAT) disguised as a Google Chrome update.</p><p>In total, four hosts downloaded a malicious Zipped JScript file that was configured to deploy a RAT, but we were able to stop the attack before ransomware deployment and help the organization remediate its WordPress CMS. Jon will walk us through what happened, how they caught it, and provide recommendations on how to secure your WordPress CMS. </p><p>The research can be found here:</p><ul><li><a href="https://expel.io/blog/incident-report-spotting-socgholish-wordpress-injection/">Expel SOC Stops Ransomware Attack Aimed at WordPress CMS via Drive-By Download Disguised as Google Chrome Update</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1154</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c908179c-357b-11eb-acde-0f5c3ba06e9b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2953916374.mp3?updated=1685126346" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Like a computer network but for physical objects. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/199/notes</link>
      <description>Guest Ben Seri, Armis' VP of Research, joins Dave to talk about a set of remote code execution (RCE) vulnerabilities in the pneumatic tube system of Swisslog. Nine vulnerabilities in critical infrastructure used by 80% of major hospitals in North America.
Swisslog’s Translogic Pneumatic Tube System (PTS), a solution that plays a crucial role in patient care, found vulnerable to devastating attack. Dubbed PwnedPiper, the vulnerabilities allow for complete take over of the Translogic Nexus Control Panel, which powers all current models of Translogic PTS stations. Older IP-connected Translogic stations are also impacted, but are no longer supported by Swisslog.
The research can be found here:
PwnedPiper

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Sep 2021 05:00:00 -0000</pubDate>
      <itunes:title>Like a computer network but for physical objects. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>199</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Ben Seri, Armis' VP of Research, joins Dave to talk about a set of remote code execution (RCE) vulnerabilities in the pneumatic tube system of Swisslog. Nine vulnerabilities in critical infrastructure used by 80% of major hospitals in North America.
Swisslog’s Translogic Pneumatic Tube System (PTS), a solution that plays a crucial role in patient care, found vulnerable to devastating attack. Dubbed PwnedPiper, the vulnerabilities allow for complete take over of the Translogic Nexus Control Panel, which powers all current models of Translogic PTS stations. Older IP-connected Translogic stations are also impacted, but are no longer supported by Swisslog.
The research can be found here:
PwnedPiper

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Ben Seri, Armis' VP of Research, joins Dave to talk about a set of remote code execution (RCE) vulnerabilities in the pneumatic tube system of Swisslog. Nine vulnerabilities in critical infrastructure used by 80% of major hospitals in North America.</p><p>Swisslog’s Translogic Pneumatic Tube System (PTS), a solution that plays a crucial role in patient care, found vulnerable to devastating attack. Dubbed PwnedPiper, the vulnerabilities allow for complete take over of the Translogic Nexus Control Panel, which powers all current models of Translogic PTS stations. Older IP-connected Translogic stations are also impacted, but are no longer supported by Swisslog.</p><p>The research can be found here:</p><ul><li><a href="https://www.armis.com/research/pwnedpiper">PwnedPiper</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1414</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c8fac88a-357b-11eb-acde-07c147636796]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2513882666.mp3?updated=1685126335" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Joker malware family: not a joke for Google Play. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/198/notes</link>
      <description>Guest Deepen Desai, Zscaler's Chief Information Security Officer and VP Security Research &amp; Operations, joins Dave to discuss their ThreatLabz team's research "Joker Joking in Google Play: Joker malware targets Google Play store with new tactics." Joker is one of the most prominent malware families targeting Android devices. Despite public awareness of this particular malware, it keeps finding its way into Google’s official application market by employing changes in its code, execution methods, or payload-retrieving techniques. This spyware is designed to steal SMS messages, contact lists, and device information, and to sign the victim up for premium wireless application protocol (WAP) services.
Zscaler’s ThreatLabz research team has been constantly monitoring the Joker malware. Recently, they observed regular uploads of it onto the Google Play store. ThreatLabz notified the Google Android Security team, who have taken prompt action to remove the suspicious apps from the Google Play store. 
This prompted them to evaluate how Joker is so successful at getting around the Google Play vetting process. The team saw 11 different samples regularly uploaded to Google Play recently clocking 30k installs.
The research can be found here:
Joker Joking in Google Play: Joker malware targets Google Play store with new tactics

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Aug 2021 05:00:00 -0000</pubDate>
      <itunes:title>Joker malware family: not a joke for Google Play. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>198</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Deepen Desai, Zscaler's Chief Information Security Officer and VP Security Research &amp; Operations, joins Dave to discuss their ThreatLabz team's research "Joker Joking in Google Play: Joker malware targets Google Play store with new tactics." Joker is one of the most prominent malware families targeting Android devices. Despite public awareness of this particular malware, it keeps finding its way into Google’s official application market by employing changes in its code, execution methods, or payload-retrieving techniques. This spyware is designed to steal SMS messages, contact lists, and device information, and to sign the victim up for premium wireless application protocol (WAP) services.
Zscaler’s ThreatLabz research team has been constantly monitoring the Joker malware. Recently, they observed regular uploads of it onto the Google Play store. ThreatLabz notified the Google Android Security team, who have taken prompt action to remove the suspicious apps from the Google Play store. 
This prompted them to evaluate how Joker is so successful at getting around the Google Play vetting process. The team saw 11 different samples regularly uploaded to Google Play recently clocking 30k installs.
The research can be found here:
Joker Joking in Google Play: Joker malware targets Google Play store with new tactics

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Deepen Desai, Zscaler's Chief Information Security Officer and VP Security Research &amp; Operations, joins Dave to discuss their ThreatLabz team's research "Joker Joking in Google Play: Joker malware targets Google Play store with new tactics." Joker is one of the most prominent malware families targeting Android devices. Despite public awareness of this particular malware, it keeps finding its way into Google’s official application market by employing changes in its code, execution methods, or payload-retrieving techniques. This spyware is designed to steal SMS messages, contact lists, and device information, and to sign the victim up for premium wireless application protocol (WAP) services.</p><p>Zscaler’s ThreatLabz research team has been constantly monitoring the Joker malware. Recently, they observed regular uploads of it onto the Google Play store. ThreatLabz notified the Google Android Security team, who have taken prompt action to remove the suspicious apps from the Google Play store. </p><p>This prompted them to evaluate how Joker is so successful at getting around the Google Play vetting process. The team saw 11 different samples regularly uploaded to Google Play recently clocking 30k installs.</p><p>The research can be found here:</p><ul><li><a href="https://www.zscaler.com/blogs/security-research/joker-joking-google-play">Joker Joking in Google Play: Joker malware targets Google Play store with new tactics</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1062</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c8edcfea-357b-11eb-acde-efc1e83cea5f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8444152629.mp3?updated=1685126321" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exploring vulnerabilities of off-the-shelf software.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/197/notes</link>
      <description>Guest Tomislav Peričin, Reversing Labs' Chief Software Architect and Co-Founder, joins Dave to discuss his team's research that addresses the importance of validating third-party software components as a way to manage the risks that they can introduce. Developing software solutions is a complex task requiring a lot of time and resources. In order to accelerate time to market and reduce the cost, software developers create smaller pieces of functional code which can be reused across many projects. The concept of code reuse is one of the cornerstones of modern software engineering and it is universally accepted that everybody should strive towards it. However, in addition to the positives, organizations need to be aware of the security risks introduced by such third-party components.
The growing number of cyber incidents that target the software supply chain are focused on high-value target compromises. With the latest surge and public uproar, the US President Biden has issued the Executive Order on Improving the Nation’s Cybersecurity in order to create an institutional framework addressing these kinds of security risks.
The research can be found here:
Third-party code comes with some baggage

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Aug 2021 05:00:00 -0000</pubDate>
      <itunes:title>Exploring vulnerabilities of off-the-shelf software.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>197</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Tomislav Peričin, Reversing Labs' Chief Software Architect and Co-Founder, joins Dave to discuss his team's research that addresses the importance of validating third-party software components as a way to manage the risks that they can introduce. Developing software solutions is a complex task requiring a lot of time and resources. In order to accelerate time to market and reduce the cost, software developers create smaller pieces of functional code which can be reused across many projects. The concept of code reuse is one of the cornerstones of modern software engineering and it is universally accepted that everybody should strive towards it. However, in addition to the positives, organizations need to be aware of the security risks introduced by such third-party components.
The growing number of cyber incidents that target the software supply chain are focused on high-value target compromises. With the latest surge and public uproar, the US President Biden has issued the Executive Order on Improving the Nation’s Cybersecurity in order to create an institutional framework addressing these kinds of security risks.
The research can be found here:
Third-party code comes with some baggage

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Tomislav Peričin, Reversing Labs' Chief Software Architect and Co-Founder, joins Dave to discuss his team's research that addresses the importance of validating third-party software components as a way to manage the risks that they can introduce. Developing software solutions is a complex task requiring a lot of time and resources. In order to accelerate time to market and reduce the cost, software developers create smaller pieces of functional code which can be reused across many projects. The concept of code reuse is one of the cornerstones of modern software engineering and it is universally accepted that everybody should strive towards it. However, in addition to the positives, organizations need to be aware of the security risks introduced by such third-party components.</p><p>The growing number of cyber incidents that target the software supply chain are focused on high-value target compromises. With the latest surge and public uproar, the US President Biden has issued the Executive Order on Improving the Nation’s Cybersecurity in order to create an institutional framework addressing these kinds of security risks.</p><p>The research can be found here:</p><ul><li><a href="https://blog.secure.software/third-party-code-comes-with-some-baggage">Third-party code comes with some baggage</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>975</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c8e0b800-357b-11eb-acde-d3faea7ae66a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7744319200.mp3?updated=1685126312" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>You can add new features, just secure the old stuff first. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/196/notes</link>
      <description>Guests Will Schroeder and Lee Christensen from SpecterOps join Dave to share the research they recently presented at Black Hat USA on the security of Microsoft's Active Directory Certificate Services.
Their abstract:
Microsoft’s Active Directory Public Key Infrastructure (PKI) implementation, known as Active Directory Certificate Services (AD CS), has largely flown under the radar of both the offensive and defensive communities. AD CS is widely deployed, and provides attackers opportunities for credential theft, machine persistence, domain escalation, and subtle domain persistence. We present relevant background on certificates in Active Directory, detail the abuse of AD CS through certificate theft and active malicious enrollments for user and machine persistence, discuss a set of common misconfigurations that can result in domain escalation, and explain a method for stealing a Certificate Authority’s private key in order to forge new user/machine “golden” certificates. By bringing light to the security implications of AD CS, we hope to raise awareness for both attackers and defenders alike of the security issues surrounding this complex, widely deployed, and often misunderstood system.
The blog post and white paper can be found here:

Certified Pre-Owned blog post

Certified Pre-Owned white paper


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Aug 2021 05:00:00 -0000</pubDate>
      <itunes:title>You can add new features, just secure the old stuff first. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>196</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guests Will Schroeder and Lee Christensen from SpecterOps join Dave to share the research they recently presented at Black Hat USA on the security of Microsoft's Active Directory Certificate Services.
Their abstract:
Microsoft’s Active Directory Public Key Infrastructure (PKI) implementation, known as Active Directory Certificate Services (AD CS), has largely flown under the radar of both the offensive and defensive communities. AD CS is widely deployed, and provides attackers opportunities for credential theft, machine persistence, domain escalation, and subtle domain persistence. We present relevant background on certificates in Active Directory, detail the abuse of AD CS through certificate theft and active malicious enrollments for user and machine persistence, discuss a set of common misconfigurations that can result in domain escalation, and explain a method for stealing a Certificate Authority’s private key in order to forge new user/machine “golden” certificates. By bringing light to the security implications of AD CS, we hope to raise awareness for both attackers and defenders alike of the security issues surrounding this complex, widely deployed, and often misunderstood system.
The blog post and white paper can be found here:

Certified Pre-Owned blog post

Certified Pre-Owned white paper


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guests Will Schroeder and Lee Christensen from SpecterOps join Dave to share the research they recently presented at Black Hat USA on the security of Microsoft's Active Directory Certificate Services.</p><p>Their abstract:</p><p>Microsoft’s Active Directory Public Key Infrastructure (PKI) implementation, known as Active Directory Certificate Services (AD CS), has largely flown under the radar of both the offensive and defensive communities. AD CS is widely deployed, and provides attackers opportunities for credential theft, machine persistence, domain escalation, and subtle domain persistence. We present relevant background on certificates in Active Directory, detail the abuse of AD CS through certificate theft and active malicious enrollments for user and machine persistence, discuss a set of common misconfigurations that can result in domain escalation, and explain a method for stealing a Certificate Authority’s private key in order to forge new user/machine “golden” certificates. By bringing light to the security implications of AD CS, we hope to raise awareness for both attackers and defenders alike of the security issues surrounding this complex, widely deployed, and often misunderstood system.</p><p>The blog post and white paper can be found here:</p><ul>
<li><a href="https://posts.specterops.io/certified-pre-owned-d95910965cd2">Certified Pre-Owned blog post</a></li>
<li><a href="https://www.specterops.io/assets/resources/Certified_Pre-Owned.pdf">Certified Pre-Owned white paper</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1859</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c8d4ed4a-357b-11eb-acde-3778972c58ce]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5334615767.mp3?updated=1685126309" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SideCopy malware campaigns expand and evolve.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/195/notes</link>
      <description>Guest Asheer Malhotra, Threat Researcher of Cisco Talos Intelligence Group, joins Dave to discuss his team's research "InSideCopy: How this APT continues to evolve its arsenal." Cisco Talos has observed an expansion in the activity of SideCopy malware campaigns, targeting entities in India. In the past, the attackers have used malicious LNK files and documents to distribute their staple C#-based RAT. We are calling this malware "CetaRAT." SideCopy also relies heavily on the use of Allakore RAT, a publicly available Delphi-based RAT.
Recent activity from the group, however, signals a boost in their development operations. Talos has discovered multiple new RAT families and plugins currently used in SideCopy infection chains.
Targeting tactics and themes observed in SideCopy campaigns indicate a high degree of similarity to the Transparent Tribe APT (aka APT36) also targeting India. These include using decoys posing as operational documents belonging to the military and think tanks and honeytrap-based infections.
The research can be found here:

InSideCopy: How this APT continues to evolve its arsenal blog post

InSideCopy: How this APT continues to evolve its arsenal report


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Aug 2021 05:00:00 -0000</pubDate>
      <itunes:title>SideCopy malware campaigns expand and evolve.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>195</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Asheer Malhotra, Threat Researcher of Cisco Talos Intelligence Group, joins Dave to discuss his team's research "InSideCopy: How this APT continues to evolve its arsenal." Cisco Talos has observed an expansion in the activity of SideCopy malware campaigns, targeting entities in India. In the past, the attackers have used malicious LNK files and documents to distribute their staple C#-based RAT. We are calling this malware "CetaRAT." SideCopy also relies heavily on the use of Allakore RAT, a publicly available Delphi-based RAT.
Recent activity from the group, however, signals a boost in their development operations. Talos has discovered multiple new RAT families and plugins currently used in SideCopy infection chains.
Targeting tactics and themes observed in SideCopy campaigns indicate a high degree of similarity to the Transparent Tribe APT (aka APT36) also targeting India. These include using decoys posing as operational documents belonging to the military and think tanks and honeytrap-based infections.
The research can be found here:

InSideCopy: How this APT continues to evolve its arsenal blog post

InSideCopy: How this APT continues to evolve its arsenal report


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Asheer Malhotra, Threat Researcher of Cisco Talos Intelligence Group, joins Dave to discuss his team's research "InSideCopy: How this APT continues to evolve its arsenal." Cisco Talos has observed an expansion in the activity of SideCopy malware campaigns, targeting entities in India. In the past, the attackers have used malicious LNK files and documents to distribute their staple C#-based RAT. We are calling this malware "CetaRAT." SideCopy also relies heavily on the use of Allakore RAT, a publicly available Delphi-based RAT.</p><p>Recent activity from the group, however, signals a boost in their development operations. Talos has discovered multiple new RAT families and plugins currently used in SideCopy infection chains.</p><p>Targeting tactics and themes observed in SideCopy campaigns indicate a high degree of similarity to the Transparent Tribe APT (aka APT36) also targeting India. These include using decoys posing as operational documents belonging to the military and think tanks and honeytrap-based infections.</p><p>The research can be found here:</p><ul>
<li><a href="https://blog.talosintelligence.com/2021/07/sidecopy.html">InSideCopy: How this APT continues to evolve its arsenal blog post</a></li>
<li><a href="https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/591/original/062521_SideCopy_%281%29.pdf?1625657388">InSideCopy: How this APT continues to evolve its arsenal report</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1203</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c8c9d298-357b-11eb-acde-fb048ddc2622]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3236468118.mp3?updated=1685126297" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>China's influence grows through Digital Silk Road Initiative. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/194/notes</link>
      <description>Guest Charity Wright, Cyber Threat Intelligence Expert in Recorded Future's Insikt Group, joins Dave to discuss her research "China’s Digital Colonialism: Espionage and Repression Along the Digital Silk Road". Through the Digital Silk Road Initiative (DSR), announced in 2015, the People’s Republic of China (PRC) is building an expansive global data infrastructure and exporting surveillance technologies to dictators and illiberal regimes throughout the developing world, in some cases trading technology for access to sensitive user data and facial recognition intelligence. Domestically, China uses this type of technology to assert authority over its citizens, censor the media, quell protests, and systematically oppress religious minorities. Now, over 80 countries are enabled to do the same with Chinese surveillance technology.
The research can be found here:
China’s Digital Colonialism: Espionage and Repression Along the Digital Silk Road

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 31 Jul 2021 05:00:00 -0000</pubDate>
      <itunes:title>China's influence grows through Digital Silk Road Initiative. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>194</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Charity Wright, Cyber Threat Intelligence Expert in Recorded Future's Insikt Group, joins Dave to discuss her research "China’s Digital Colonialism: Espionage and Repression Along the Digital Silk Road". Through the Digital Silk Road Initiative (DSR), announced in 2015, the People’s Republic of China (PRC) is building an expansive global data infrastructure and exporting surveillance technologies to dictators and illiberal regimes throughout the developing world, in some cases trading technology for access to sensitive user data and facial recognition intelligence. Domestically, China uses this type of technology to assert authority over its citizens, censor the media, quell protests, and systematically oppress religious minorities. Now, over 80 countries are enabled to do the same with Chinese surveillance technology.
The research can be found here:
China’s Digital Colonialism: Espionage and Repression Along the Digital Silk Road

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Charity Wright, Cyber Threat Intelligence Expert in Recorded Future's Insikt Group, joins Dave to discuss her research "China’s Digital Colonialism: Espionage and Repression Along the Digital Silk Road". Through the Digital Silk Road Initiative (DSR), announced in 2015, the People’s Republic of China (PRC) is building an expansive global data infrastructure and exporting surveillance technologies to dictators and illiberal regimes throughout the developing world, in some cases trading technology for access to sensitive user data and facial recognition intelligence. Domestically, China uses this type of technology to assert authority over its citizens, censor the media, quell protests, and systematically oppress religious minorities. Now, over 80 countries are enabled to do the same with Chinese surveillance technology.</p><p>The research can be found here:</p><ul><li><a href="https://www.recordedfuture.com/china-digital-colonialism-espionage-silk-road/">China’s Digital Colonialism: Espionage and Repression Along the Digital Silk Road</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1195</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c8be1ec6-357b-11eb-acde-673ebb004a3f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5747156818.mp3?updated=1685126288" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Free malware with cracked software. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/193/notes</link>
      <description>Guest Christopher Budd, Senior Global Threat Communications Manager at Avast, joins Dave to talk about some research his team did when they looked into a Reddit report saying their Avast folder was empty and other reports like it. The team found a new malware they’re calling “Crackonosh” in part because of some possible indications that the malware author may be Czech. Crackonosh is distributed along with illegal, cracked copies of popular software and searches for and disables many popular antivirus programs as part of its anti-detection and anti-forensics tactics.
The research can be found here:
Crackonosh: A New Malware Distributed in Cracked Software

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Jul 2021 05:00:00 -0000</pubDate>
      <itunes:title>Free malware with cracked software. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>193</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Christopher Budd, Senior Global Threat Communications Manager at Avast, joins Dave to talk about some research his team did when they looked into a Reddit report saying their Avast folder was empty and other reports like it. The team found a new malware they’re calling “Crackonosh” in part because of some possible indications that the malware author may be Czech. Crackonosh is distributed along with illegal, cracked copies of popular software and searches for and disables many popular antivirus programs as part of its anti-detection and anti-forensics tactics.
The research can be found here:
Crackonosh: A New Malware Distributed in Cracked Software

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Christopher Budd, Senior Global Threat Communications Manager at Avast, joins Dave to talk about some research his team did when they looked into a Reddit report saying their Avast folder was empty and other reports like it. The team found a new malware they’re calling “Crackonosh” in part because of some possible indications that the malware author may be Czech. Crackonosh is distributed along with illegal, cracked copies of popular software and searches for and disables many popular antivirus programs as part of its anti-detection and anti-forensics tactics.</p><p>The research can be found here:</p><ul><li><a href="https://decoded.avast.io/danielbenes/crackonosh-a-new-malware-distributed-in-cracked-software/">Crackonosh: A New Malware Distributed in Cracked Software</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>977</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c8b36c7e-357b-11eb-acde-dbb53d896a0c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5087798742.mp3?updated=1685126281" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Enabling connectivity enables exposures. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/192/notes</link>
      <description>Guest Nathan Howe, Vice President of Emerging Technology at Zscaler, joins Dave to discuss his team's work, "2021 “Exposed” Report Reveals Corporate and Cloud Infrastructures More at Risk Than Ever From Expanded Attack Surfaces." The modern workforce has resulted in an increase of users, devices, and applications existing outside of controlled networks, including corporate networks, the business emphasis on the “network” has decreased and the reliance on the internet as the connective tissue for businesses has increased.
Zscaler analyzes the attack surface of 1,500 organizations and identifies trends affecting businesses of all sizes and industries, across all geographies. Key findings include:

The attack surface impact based on company size

The countries with the greatest attack surface

The industries that are most exposed


The research can be found here:
“Exposed”: The world’s first report to reveal how exposed corporate networks really are.

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Jul 2021 05:00:00 -0000</pubDate>
      <itunes:title>Enabling connectivity enables exposures. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>192</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Nathan Howe, Vice President of Emerging Technology at Zscaler, joins Dave to discuss his team's work, "2021 “Exposed” Report Reveals Corporate and Cloud Infrastructures More at Risk Than Ever From Expanded Attack Surfaces." The modern workforce has resulted in an increase of users, devices, and applications existing outside of controlled networks, including corporate networks, the business emphasis on the “network” has decreased and the reliance on the internet as the connective tissue for businesses has increased.
Zscaler analyzes the attack surface of 1,500 organizations and identifies trends affecting businesses of all sizes and industries, across all geographies. Key findings include:

The attack surface impact based on company size

The countries with the greatest attack surface

The industries that are most exposed


The research can be found here:
“Exposed”: The world’s first report to reveal how exposed corporate networks really are.

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Nathan Howe, Vice President of Emerging Technology at Zscaler, joins Dave to discuss his team's work, "2021 “Exposed” Report Reveals Corporate and Cloud Infrastructures More at Risk Than Ever From Expanded Attack Surfaces." The modern workforce has resulted in an increase of users, devices, and applications existing outside of controlled networks, including corporate networks, the business emphasis on the “network” has decreased and the reliance on the internet as the connective tissue for businesses has increased.</p><p>Zscaler analyzes the attack surface of 1,500 organizations and identifies trends affecting businesses of all sizes and industries, across all geographies. Key findings include:</p><ul>
<li>The attack surface impact based on company size</li>
<li>The countries with the greatest attack surface</li>
<li>The industries that are most exposed</li>
</ul><p><br></p><p>The research can be found here:</p><ul><li><a href="https://info.zscaler.com/resources-ebooks-global-corporate-network-attack-surface-report">“Exposed”: The world’s first report to reveal how exposed corporate networks really are.</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1230</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c8a713a2-357b-11eb-acde-639f54982f17]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7061477389.mp3?updated=1685126273" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dealing illicit goods on encrypted chat apps. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/191/notes</link>
      <description>Guest Daniel Kats, Senior Principal Research Engineer at NortonLifeLock, joins Dave to discuss his team's work, "Encrypted Chat Apps Doubling as Illegal Marketplaces." Encrypted chat apps are gaining popularity worldwide due to their central premise of not sending user data to tech giants. Some popular examples include WhatsApp, Telegram and Signal. These apps have also been adopted by businesses to securely communicate directly to their users. Additionally, these apps have been instrumental to subverting authoritarian regimes.
However, NortonLifeLock found that encrypted chat apps are also being used by criminals to sell illegal goods. Because content moderation is, by design, nearly impossible on these apps, they allow for an easy vector for dealers of illicit goods to communicate directly to customers without fear of law enforcement involvement.
The research can be found here:
Encrypted Chat Apps Doubling as Illegal Marketplaces

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Jul 2021 05:00:00 -0000</pubDate>
      <itunes:title>Dealing illicit goods on encrypted chat apps. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>191</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Daniel Kats, Senior Principal Research Engineer at NortonLifeLock, joins Dave to discuss his team's work, "Encrypted Chat Apps Doubling as Illegal Marketplaces." Encrypted chat apps are gaining popularity worldwide due to their central premise of not sending user data to tech giants. Some popular examples include WhatsApp, Telegram and Signal. These apps have also been adopted by businesses to securely communicate directly to their users. Additionally, these apps have been instrumental to subverting authoritarian regimes.
However, NortonLifeLock found that encrypted chat apps are also being used by criminals to sell illegal goods. Because content moderation is, by design, nearly impossible on these apps, they allow for an easy vector for dealers of illicit goods to communicate directly to customers without fear of law enforcement involvement.
The research can be found here:
Encrypted Chat Apps Doubling as Illegal Marketplaces

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Daniel Kats, Senior Principal Research Engineer at NortonLifeLock, joins Dave to discuss his team's work, "Encrypted Chat Apps Doubling as Illegal Marketplaces." Encrypted chat apps are gaining popularity worldwide due to their central premise of not sending user data to tech giants. Some popular examples include WhatsApp, Telegram and Signal. These apps have also been adopted by businesses to securely communicate directly to their users. Additionally, these apps have been instrumental to subverting authoritarian regimes.</p><p>However, NortonLifeLock found that encrypted chat apps are also being used by criminals to sell illegal goods. Because content moderation is, by design, nearly impossible on these apps, they allow for an easy vector for dealers of illicit goods to communicate directly to customers without fear of law enforcement involvement.</p><p>The research can be found here:</p><ul><li><a href="https://www.nortonlifelock.com/blogs/norton-labs/chat-apps-illegal-marketplaces">Encrypted Chat Apps Doubling as Illegal Marketplaces</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1249</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c89c0b7e-357b-11eb-acde-ef6f83a2c479]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3572191658.mp3?updated=1685126261" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Malware in pirated Windows installation files. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/190/notes</link>
      <description>Guest Tom Roter from Minera Labs joins Dave to discuss his team research: "Rigging a Windows Installation." It is common knowledge that pirated software might contain malware, yet millions still put themselves and their devices at risk and download from dubious sources. It is even more surprising to see the popularity of torrented operating system installations, which are ranked at the top of most torrent tracker ranking lists. Today we will prove conventional wisdom right and show off a devious, yet clever attack chain employed by an infected Windows 10 image, frequently shared and downloaded by tens of thousands of users.
Over the last year, numerous malicious PowerShell events popped up in our telemetry. The events caught our attention because a payload was being downloaded into the “C:\Windows” directory, which is usually well guarded under NTFS permissions, this implies that the attacker had very high privilege on the compromised system. 
The research can be found here:
Rigging a Windows installation 

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Jul 2021 05:00:00 -0000</pubDate>
      <itunes:title>Malware in pirated Windows installation files. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>190</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Tom Roter from Minera Labs joins Dave to discuss his team research: "Rigging a Windows Installation." It is common knowledge that pirated software might contain malware, yet millions still put themselves and their devices at risk and download from dubious sources. It is even more surprising to see the popularity of torrented operating system installations, which are ranked at the top of most torrent tracker ranking lists. Today we will prove conventional wisdom right and show off a devious, yet clever attack chain employed by an infected Windows 10 image, frequently shared and downloaded by tens of thousands of users.
Over the last year, numerous malicious PowerShell events popped up in our telemetry. The events caught our attention because a payload was being downloaded into the “C:\Windows” directory, which is usually well guarded under NTFS permissions, this implies that the attacker had very high privilege on the compromised system. 
The research can be found here:
Rigging a Windows installation 

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Tom Roter from Minera Labs joins Dave to discuss his team research: "Rigging a Windows Installation." It is common knowledge that pirated software might contain malware, yet millions still put themselves and their devices at risk and download from dubious sources. It is even more surprising to see the popularity of torrented operating system installations, which are ranked at the top of most torrent tracker ranking lists. Today we will prove conventional wisdom right and show off a devious, yet clever attack chain employed by an infected Windows 10 image, frequently shared and downloaded by tens of thousands of users.</p><p>Over the last year, numerous malicious PowerShell events popped up in our telemetry. The events caught our attention because a payload was being downloaded into the “C:\Windows” directory, which is usually well guarded under NTFS permissions, this implies that the attacker had very high privilege on the compromised system. </p><p>The research can be found here:</p><ul><li><a href="https://blog.minerva-labs.com/rigging-a-windows-installation">Rigging a Windows installation </a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>845</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c89060f8-357b-11eb-acde-873385596373]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5861731982.mp3?updated=1685126249" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exhibiting advanced APT-like behavior. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/189/notes</link>
      <description>Guest Yonatan Striem-Amit joins Dave to talk about Cybereason's research "Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities." The Cybereason Nocturnus Team responded to several incident response (IR) cases involving infections of the Prometei Botnet against companies in North America, observing that the attackers exploited recently published Microsoft Exchange vulnerabilities (CVE-2021-27065 and CVE-2021-26858) in order to penetrate the network and install malware. Yonatan shares his team's findings of the investigation of the attacks, including the initial foothold sequence of the attackers, the functionality of the different components of the malware, the threat actors’ origin and the bot’s infrastructure.
The research can be found here:
Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Jun 2021 05:00:00 -0000</pubDate>
      <itunes:title>Exhibiting advanced APT-like behavior. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>189</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Yonatan Striem-Amit joins Dave to talk about Cybereason's research "Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities." The Cybereason Nocturnus Team responded to several incident response (IR) cases involving infections of the Prometei Botnet against companies in North America, observing that the attackers exploited recently published Microsoft Exchange vulnerabilities (CVE-2021-27065 and CVE-2021-26858) in order to penetrate the network and install malware. Yonatan shares his team's findings of the investigation of the attacks, including the initial foothold sequence of the attackers, the functionality of the different components of the malware, the threat actors’ origin and the bot’s infrastructure.
The research can be found here:
Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Yonatan Striem-Amit joins Dave to talk about Cybereason's research "Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities." The Cybereason Nocturnus Team responded to several incident response (IR) cases involving infections of the Prometei Botnet against companies in North America, observing that the attackers exploited recently published Microsoft Exchange vulnerabilities (CVE-2021-27065 and CVE-2021-26858) in order to penetrate the network and install malware. Yonatan shares his team's findings of the investigation of the attacks, including the initial foothold sequence of the attackers, the functionality of the different components of the malware, the threat actors’ origin and the bot’s infrastructure.</p><p>The research can be found here:</p><ul><li><a href="https://www.cybereason.com/blog/prometei-botnet-exploiting-microsoft-exchange-vulnerabilities">Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1305</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c88453c6-357b-11eb-acde-8379dee45ab7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9543666920.mp3?updated=1685125530" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Primitive Bear spearphishes for Ukrainian entities.  </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/188/notes</link>
      <description>Guests Gage Mele and Yury Polozov join Dave to talk about Anomali's research "Primitive Bear (Gamaredon) Targets Ukraine with Timely Themes." Anomali Threat Research identified malicious samples that align with the Russia-sponsored cyberespionage group Primitive Bear’s (Gamaredon, Winterflounder) tactics, techniques, and procedures (TTPs). Primitive Bear, known primarily to focus on Ukraine, has been very active in 2021. However, the themes of the samples Anomali found, as well as those shared by the security community, could also be used to target multiple former Union of Soviet Socialist Republic (USSR) countries. Anomali Threat Research found malicious .docx files being distributed by Primitive Bear, likely through spearphishing, that attempted to download remote template .dot files through template injection.
The research can be found here:
Primitive Bear (Gamaredon) Targets Ukraine with Timely Themes

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Jun 2021 05:00:00 -0000</pubDate>
      <itunes:title>Primitive Bear spearphishes for Ukrainian entities.  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>188</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guests Gage Mele and Yury Polozov join Dave to talk about Anomali's research "Primitive Bear (Gamaredon) Targets Ukraine with Timely Themes." Anomali Threat Research identified malicious samples that align with the Russia-sponsored cyberespionage group Primitive Bear’s (Gamaredon, Winterflounder) tactics, techniques, and procedures (TTPs). Primitive Bear, known primarily to focus on Ukraine, has been very active in 2021. However, the themes of the samples Anomali found, as well as those shared by the security community, could also be used to target multiple former Union of Soviet Socialist Republic (USSR) countries. Anomali Threat Research found malicious .docx files being distributed by Primitive Bear, likely through spearphishing, that attempted to download remote template .dot files through template injection.
The research can be found here:
Primitive Bear (Gamaredon) Targets Ukraine with Timely Themes

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guests Gage Mele and Yury Polozov join Dave to talk about Anomali's research "Primitive Bear (Gamaredon) Targets Ukraine with Timely Themes." Anomali Threat Research identified malicious samples that align with the Russia-sponsored cyberespionage group Primitive Bear’s (Gamaredon, Winterflounder) tactics, techniques, and procedures (TTPs). Primitive Bear, known primarily to focus on Ukraine, has been very active in 2021. However, the themes of the samples Anomali found, as well as those shared by the security community, could also be used to target multiple former Union of Soviet Socialist Republic (USSR) countries. Anomali Threat Research found malicious .docx files being distributed by Primitive Bear, likely through spearphishing, that attempted to download remote template .dot files through template injection.</p><p>The research can be found here:</p><ul><li><a href="https://www.anomali.com/blog/primitive-bear-gamaredon-targets-ukraine-with-timely-themes">Primitive Bear (Gamaredon) Targets Ukraine with Timely Themes</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>884</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c878b070-357b-11eb-acde-db3ef8635c21]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2969691354.mp3?updated=1684860727" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Taking a look behind the Science of Security. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/187/notes</link>
      <description>Guest Adam Tagert is a Science of Security (SoS) Researcher in the National Security Agency Research Directorate. The National Security Agency (NSA) sponsors the Science of Security (SoS) Initiative for the promotion of a foundational cybersecurity science that is needed to mature the cybersecurity discipline and to underpin advances in cyberdefense. Adam works in all aspects of SoS particularly in the promotion of collaboration and use of foundational cybersecurity research. He promotes rigorous research methods by leading the Annual Best Scientific Cybersecurity Paper Competition. Adam joins Dave Bittner to discuss the NSA's SoS Initiative and their Science of Security and Privacy 2021 Annual Report.
Information on the SoS Initiative and the report can be found here:

Science of Security

Science of Security and Privacy 2021 Annual Report


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Jun 2021 05:00:00 -0000</pubDate>
      <itunes:title>Taking a look behind the Science of Security. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>187</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Adam Tagert is a Science of Security (SoS) Researcher in the National Security Agency Research Directorate. The National Security Agency (NSA) sponsors the Science of Security (SoS) Initiative for the promotion of a foundational cybersecurity science that is needed to mature the cybersecurity discipline and to underpin advances in cyberdefense. Adam works in all aspects of SoS particularly in the promotion of collaboration and use of foundational cybersecurity research. He promotes rigorous research methods by leading the Annual Best Scientific Cybersecurity Paper Competition. Adam joins Dave Bittner to discuss the NSA's SoS Initiative and their Science of Security and Privacy 2021 Annual Report.
Information on the SoS Initiative and the report can be found here:

Science of Security

Science of Security and Privacy 2021 Annual Report


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Adam Tagert is a Science of Security (SoS) Researcher in the National Security Agency Research Directorate. The National Security Agency (NSA) sponsors the <a href="https://cps-vo.org/group/SoS">Science of Security (SoS)</a> Initiative for the promotion of a foundational cybersecurity science that is needed to mature the cybersecurity discipline and to underpin advances in cyberdefense. Adam works in all aspects of SoS particularly in the promotion of collaboration and use of foundational cybersecurity research. He promotes rigorous research methods by leading the Annual Best Scientific Cybersecurity Paper Competition. Adam joins Dave Bittner to discuss the NSA's SoS Initiative and their Science of Security and Privacy 2021 Annual Report.</p><p>Information on the SoS Initiative and the report can be found here:</p><ul>
<li><a href="https://www.nsa.gov/what-we-do/research/science-of-security/">Science of Security</a></li>
<li><a href="Science%20of%20Security%20and%20Privacy%202021%20Annual%20Report">Science of Security and Privacy 2021 Annual Report</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1467</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c86cc7ce-357b-11eb-acde-bbcdd548e52f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8277205805.mp3?updated=1685125517" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bad building blocks: a new and unusual phishing campaign.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/186/notes</link>
      <description>Guest Karl Sigler of Trustwave's SpiderLabs joins Dave Bittner to talk about their research: "Hidden Phishing at Free JavaScript Site". The research describes an interesting phishing campaign SpiderLabs encountered recently. In this campaign, the email subject pertains to a price revision, followed by some numbers. There is no email body, but there is an attachment about an ”investment.” The attachment’s convoluted filename contains characters the file-naming convention doesn’t allow, notably the vertical stroke, “|.” Even though "xlsx" is in the filename, double-clicking the attachment will prompt the user to open it with the default web browser. Thus, the file indeed appears to be an HTML document. Of course, it’s malicious.
The research can be found here:
HTML Lego: Hidden Phishing at Free JavaScript Site

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Jun 2021 05:00:00 -0000</pubDate>
      <itunes:title>Bad building blocks: a new and unusual phishing campaign.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>186</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Karl Sigler of Trustwave's SpiderLabs joins Dave Bittner to talk about their research: "Hidden Phishing at Free JavaScript Site". The research describes an interesting phishing campaign SpiderLabs encountered recently. In this campaign, the email subject pertains to a price revision, followed by some numbers. There is no email body, but there is an attachment about an ”investment.” The attachment’s convoluted filename contains characters the file-naming convention doesn’t allow, notably the vertical stroke, “|.” Even though "xlsx" is in the filename, double-clicking the attachment will prompt the user to open it with the default web browser. Thus, the file indeed appears to be an HTML document. Of course, it’s malicious.
The research can be found here:
HTML Lego: Hidden Phishing at Free JavaScript Site

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Karl Sigler of Trustwave's SpiderLabs joins Dave Bittner to talk about their research: "Hidden Phishing at Free JavaScript Site". The research describes an interesting phishing campaign SpiderLabs encountered recently. In this campaign, the email subject pertains to a price revision, followed by some numbers. There is no email body, but there is an attachment about an ”investment.” The attachment’s convoluted filename contains characters the file-naming convention doesn’t allow, notably the vertical stroke, “|.” Even though "xlsx" is in the filename, double-clicking the attachment will prompt the user to open it with the default web browser. Thus, the file indeed appears to be an HTML document. Of course, it’s malicious.</p><p>The research can be found here:</p><ul><li><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/html-lego-hidden-phishing-at-free-javascript-site/">HTML Lego: Hidden Phishing at Free JavaScript Site</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1163</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c860eb48-357b-11eb-acde-6b3c801fa7f6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7860573941.mp3?updated=1685125504" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>EtterSilent: a popular, versatile maldoc builder. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/185/notes</link>
      <description>Guest Brandon Hoffman of Intel 471 joins Dave Bittner to share his team's research "EtterSilent: the underground’s new favorite maldoc builder". The cybercrime underground often mimics behaviors that we see in everyday facets of life. Intel 471’s latest discovery is an example of one of these patterns: when a product takes off in the marketplace, users will rush to obtain it and find unique ways to use it in order to fit their needs.
The latest “product” is a malicious document builder, known in the underground as “EtterSilent,” that Intel 471 has seen leveraged by various cybercrime groups. As it has grown in popularity, it has constantly been updated in order to avoid detection. Used in conjunction with other forms of malware, it’s a prime example of how ease of use and a concentration of skill sets leads to a commoditization of the cybercrime economy.
EtterSilent: the underground’s new favorite maldoc builder

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 May 2021 05:00:00 -0000</pubDate>
      <itunes:title>EtterSilent: a popular, versatile maldoc builder. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>185</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Brandon Hoffman of Intel 471 joins Dave Bittner to share his team's research "EtterSilent: the underground’s new favorite maldoc builder". The cybercrime underground often mimics behaviors that we see in everyday facets of life. Intel 471’s latest discovery is an example of one of these patterns: when a product takes off in the marketplace, users will rush to obtain it and find unique ways to use it in order to fit their needs.
The latest “product” is a malicious document builder, known in the underground as “EtterSilent,” that Intel 471 has seen leveraged by various cybercrime groups. As it has grown in popularity, it has constantly been updated in order to avoid detection. Used in conjunction with other forms of malware, it’s a prime example of how ease of use and a concentration of skill sets leads to a commoditization of the cybercrime economy.
EtterSilent: the underground’s new favorite maldoc builder

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Brandon Hoffman of Intel 471 joins Dave Bittner to share his team's research "EtterSilent: the underground’s new favorite maldoc builder". The cybercrime underground often mimics behaviors that we see in everyday facets of life. Intel 471’s latest discovery is an example of one of these patterns: when a product takes off in the marketplace, users will rush to obtain it and find unique ways to use it in order to fit their needs.</p><p>The latest “product” is a malicious document builder, known in the underground as “EtterSilent,” that Intel 471 has seen leveraged by various cybercrime groups. As it has grown in popularity, it has constantly been updated in order to avoid detection. Used in conjunction with other forms of malware, it’s a prime example of how ease of use and a concentration of skill sets leads to a commoditization of the cybercrime economy.</p><ul><li><a href="https://www.intel471.com/blog/ettersilent-maldoc-builder-macro-trickbot-qbot/">EtterSilent: the underground’s new favorite maldoc builder</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1193</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c8555f94-357b-11eb-acde-f3dcd9aff634]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3239126322.mp3?updated=1685125498" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leveraging COVID-19 themes for malicious purposes.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/184/notes</link>
      <description>Guest Joe Slowik joins us from DomainTools to discuss his team's research "COVID-19 Phishing With a Side of Cobalt Strike." Multiple adversaries, from criminal groups to state-directed entities, engaged in malicious cyber activity using COVID-19 pandemic themes since March 2020. Adversaries continue to leverage the pandemic, arguably the most significant issue globally as of this writing, in various ways. Yet the most persistent avenue remains using COVID-19 themes for building malicious document files. Examples include lures associated with Cloud Atlas-linked activity and broader targeting of health authorities.
Given the continued significance of the pandemic and persistent use of pandemic themes by adversaries, DomainTools researchers continuously monitor for items leveraging COVID-19 content for malicious purposes. While conducting this research, DomainTools analysts identified an interesting malicious document with what appeared to be unique staging and execution mechanisms.
Research can be found here:
COVID-19 Phishing With a Side of Cobalt Strike

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 May 2021 05:00:00 -0000</pubDate>
      <itunes:title>Leveraging COVID-19 themes for malicious purposes.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>184</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Joe Slowik joins us from DomainTools to discuss his team's research "COVID-19 Phishing With a Side of Cobalt Strike." Multiple adversaries, from criminal groups to state-directed entities, engaged in malicious cyber activity using COVID-19 pandemic themes since March 2020. Adversaries continue to leverage the pandemic, arguably the most significant issue globally as of this writing, in various ways. Yet the most persistent avenue remains using COVID-19 themes for building malicious document files. Examples include lures associated with Cloud Atlas-linked activity and broader targeting of health authorities.
Given the continued significance of the pandemic and persistent use of pandemic themes by adversaries, DomainTools researchers continuously monitor for items leveraging COVID-19 content for malicious purposes. While conducting this research, DomainTools analysts identified an interesting malicious document with what appeared to be unique staging and execution mechanisms.
Research can be found here:
COVID-19 Phishing With a Side of Cobalt Strike

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Joe Slowik joins us from DomainTools to discuss his team's research "COVID-19 Phishing With a Side of Cobalt Strike." Multiple adversaries, from criminal groups to state-directed entities, engaged in malicious cyber activity using COVID-19 pandemic themes since March 2020. Adversaries continue to leverage the pandemic, arguably the most significant issue globally as of this writing, in various ways. Yet the most persistent avenue remains using COVID-19 themes for building malicious document files. Examples include lures associated with Cloud Atlas-linked activity and broader targeting of health authorities.</p><p>Given the continued significance of the pandemic and persistent use of pandemic themes by adversaries, DomainTools researchers continuously monitor for items leveraging COVID-19 content for malicious purposes. While conducting this research, DomainTools analysts identified an interesting malicious document with what appeared to be unique staging and execution mechanisms.</p><p>Research can be found here:</p><ul><li><a href="https://www.domaintools.com/resources/blog/covid-19-phishing-with-a-side-of-cobalt-strike#">COVID-19 Phishing With a Side of Cobalt Strike</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1487</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c849f5b4-357b-11eb-acde-b760f5f8ef51]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4301945737.mp3?updated=1685125490" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jack Voltaic: critical infrastructure resiliency project, not a person.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/183/notes</link>
      <description>Guest LTC Erica Mitchell from Army Cyber Institute joins us to talk about their infrastructure resiliency research project called Jack Voltaic. The Army Cyber Institute’s (ACI’s) Jack Voltaic (JV) project enables the institute to study incident response gaps alongside assembled partners to identify interdependencies among critical infrastructure and provide recommendations. JV provides an innovative, bottom‐up approach to critical infrastructure resilience in two unique ways. Whereas most federal efforts to improve resiliency focus on regional or multistate emergency response, JV focuses on cities and municipalities where critical infrastructure and populations are most heavily populated. Furthermore, JV deviates from other cybersecurity and national preparedness exercises in that it builds around areas of interest nominated by the participants. Although JV events include national-level capabilities and resources, they are conceptually driven by the concerns of the cities and their infrastructure partners. Through this approach, the ACI, the Army, and the Department of Defense (DoD) are able to harvest insights about potential roles, dependencies, partners, and support requests, while cities are able to discover potential capability gaps and expand their critical infrastructure information-sharing networks before a potential disaster strikes.
Research links:

Jack Voltaic Cyber Research Project

Jack Voltaic 3.0 Cyber Research Report Executive Summary


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 May 2021 05:00:00 -0000</pubDate>
      <itunes:title>Jack Voltaic: critical infrastructure resiliency project, not a person.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>183</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest LTC Erica Mitchell from Army Cyber Institute joins us to talk about their infrastructure resiliency research project called Jack Voltaic. The Army Cyber Institute’s (ACI’s) Jack Voltaic (JV) project enables the institute to study incident response gaps alongside assembled partners to identify interdependencies among critical infrastructure and provide recommendations. JV provides an innovative, bottom‐up approach to critical infrastructure resilience in two unique ways. Whereas most federal efforts to improve resiliency focus on regional or multistate emergency response, JV focuses on cities and municipalities where critical infrastructure and populations are most heavily populated. Furthermore, JV deviates from other cybersecurity and national preparedness exercises in that it builds around areas of interest nominated by the participants. Although JV events include national-level capabilities and resources, they are conceptually driven by the concerns of the cities and their infrastructure partners. Through this approach, the ACI, the Army, and the Department of Defense (DoD) are able to harvest insights about potential roles, dependencies, partners, and support requests, while cities are able to discover potential capability gaps and expand their critical infrastructure information-sharing networks before a potential disaster strikes.
Research links:

Jack Voltaic Cyber Research Project

Jack Voltaic 3.0 Cyber Research Report Executive Summary


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest LTC Erica Mitchell from Army Cyber Institute joins us to talk about their infrastructure resiliency research project called Jack Voltaic. The Army Cyber Institute’s (ACI’s) Jack Voltaic (JV) project enables the institute to study incident response gaps alongside assembled partners to identify interdependencies among critical infrastructure and provide recommendations. JV provides an innovative, bottom‐up approach to critical infrastructure resilience in two unique ways. Whereas most federal efforts to improve resiliency focus on regional or multistate emergency response, JV focuses on cities and municipalities where critical infrastructure and populations are most heavily populated. Furthermore, JV deviates from other cybersecurity and national preparedness exercises in that it builds around areas of interest nominated by the participants. Although JV events include national-level capabilities and resources, they are conceptually driven by the concerns of the cities and their infrastructure partners. Through this approach, the ACI, the Army, and the Department of Defense (DoD) are able to harvest insights about potential roles, dependencies, partners, and support requests, while cities are able to discover potential capability gaps and expand their critical infrastructure information-sharing networks before a potential disaster strikes.</p><p>Research links:</p><ul>
<li><a href="https://cyber.army.mil/Research/Jack-Voltaic/">Jack Voltaic Cyber Research Project</a></li>
<li><a href="https://cyber.army.mil/Portals/3/Documents/JackVoltaic/3.0/JackVoltaic_Executive_Summary_3.0.pdf?ver=nWJUt-NyVHwCdqkbbi7tTw%3d%3d">Jack Voltaic 3.0 Cyber Research Report Executive Summary</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1730</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c83e101e-357b-11eb-acde-c7a4a2e4eafc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2168876754.mp3?updated=1685125481" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SUPERNOVA activity and its possible connection to SPIRAL threat group. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/182/notes</link>
      <description>Guest Mike McLellan from Secureworks joins us to share his team's insights about SUPERNOVA and threat group attribution. Similarities between the SUPERNOVA activity and a previous compromise of the network suggest that SPIRAL was responsible for both intrusions and reveal information about the threat group.
In late 2020, Secureworks® Counter Threat Unit™ (CTU) researchers observed a threat actor exploiting an internet-facing SolarWinds server to deploy the SUPERNOVA web shell. Additional analysis revealed similarities to intrusion activity identified on the same network earlier in 2020, suggesting the two intrusions are linked. CTU™ researchers attribute the intrusions to the SPIRAL threat group. Characteristics of the activity suggest the group is based in China.
The research can be found here:
SUPERNOVA Web Shell Deployment Linked to SPIRAL Threat Group

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 May 2021 05:00:00 -0000</pubDate>
      <itunes:title>SUPERNOVA activity and its possible connection to SPIRAL threat group. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>182</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Mike McLellan from Secureworks joins us to share his team's insights about SUPERNOVA and threat group attribution. Similarities between the SUPERNOVA activity and a previous compromise of the network suggest that SPIRAL was responsible for both intrusions and reveal information about the threat group.
In late 2020, Secureworks® Counter Threat Unit™ (CTU) researchers observed a threat actor exploiting an internet-facing SolarWinds server to deploy the SUPERNOVA web shell. Additional analysis revealed similarities to intrusion activity identified on the same network earlier in 2020, suggesting the two intrusions are linked. CTU™ researchers attribute the intrusions to the SPIRAL threat group. Characteristics of the activity suggest the group is based in China.
The research can be found here:
SUPERNOVA Web Shell Deployment Linked to SPIRAL Threat Group

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Mike McLellan from Secureworks joins us to share his team's insights about SUPERNOVA and threat group attribution. Similarities between the SUPERNOVA activity and a previous compromise of the network suggest that SPIRAL was responsible for both intrusions and reveal information about the threat group.</p><p>In late 2020, Secureworks® Counter Threat Unit™ (CTU) researchers observed a threat actor exploiting an internet-facing SolarWinds server to deploy the SUPERNOVA web shell. Additional analysis revealed similarities to intrusion activity identified on the same network earlier in 2020, suggesting the two intrusions are linked. CTU™ researchers attribute the intrusions to the SPIRAL threat group. Characteristics of the activity suggest the group is based in China.</p><p>The research can be found here:</p><ul><li><a href="https://www.secureworks.com/blog/supernova-web-shell-deployment-linked-to-spiral-threat-group">SUPERNOVA Web Shell Deployment Linked to SPIRAL Threat Group</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1208</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c832cb8c-357b-11eb-acde-9750c8632c5f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5755465504.mp3?updated=1685125468" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A snapshot of the ransomware threat landscape. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/181/notes</link>
      <description>Guest Jen Miller-Osborn from Palo Alto Networks' Unit 42 joins Dave to discuss their 2021 Unit 42 Ransomware Threat Report, which highlights a surge in ransomware demands based on a global analysis of the threat landscape in 2020. To evaluate the current state of the ransomware threat landscape, the Unit 42 threat intelligence team and the Crypsis incident response team collaborated to analyze the ransomware threat landscape in 2020, with global data from Unit 42 as well as US, Canada, and Europe data from Crypsis. The report details the top ransomware variants, average ransomware payments, ransomware predictions, and actionable next steps to immediately reduce ransomware risk.
The report can be found here:
2021 Unit 42 Ransomware Threat Report

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 May 2021 05:00:00 -0000</pubDate>
      <itunes:title>A snapshot of the ransomware threat landscape.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>181</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Jen Miller-Osborn from Palo Alto Networks' Unit 42 joins Dave to discuss their 2021 Unit 42 Ransomware Threat Report, which highlights a surge in ransomware demands based on a global analysis of the threat landscape in 2020. To evaluate the current state of the ransomware threat landscape, the Unit 42 threat intelligence team and the Crypsis incident response team collaborated to analyze the ransomware threat landscape in 2020, with global data from Unit 42 as well as US, Canada, and Europe data from Crypsis. The report details the top ransomware variants, average ransomware payments, ransomware predictions, and actionable next steps to immediately reduce ransomware risk.
The report can be found here:
2021 Unit 42 Ransomware Threat Report

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Jen Miller-Osborn from Palo Alto Networks' Unit 42 joins Dave to discuss their 2021 Unit 42 Ransomware Threat Report, which highlights a surge in ransomware demands based on a global analysis of the threat landscape in 2020. To evaluate the current state of the ransomware threat landscape, the Unit 42 threat intelligence team and the Crypsis incident response team collaborated to analyze the ransomware threat landscape in 2020, with global data from Unit 42 as well as US, Canada, and Europe data from Crypsis. The report details the top ransomware variants, average ransomware payments, ransomware predictions, and actionable next steps to immediately reduce ransomware risk.</p><p>The report can be found here:</p><ul><li><a href="https://start.paloaltonetworks.com/unit-42-ransomware-threat-report">2021 Unit 42 Ransomware Threat Report</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1429</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c82444f4-357b-11eb-acde-9b5bcaf68e1a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1441194634.mp3?updated=1685125462" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bulletproof hosting (BPH) and how it powers cybercrime. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/180/notes</link>
      <description>Guest Jason Passwaters of Intel 471 joins us to discuss his team's research into bulletproof hosting (BPH). The research team at Intel 471 defined what a typical BPH service offers and how these services can be stopped in order to limit the damage they have on enterprises, businesses and digital society itself. They examined some popular malware families that actors host or leverage via BPH services. While much more goes into a cybercriminal’s full operation, it would be vastly more difficult to pull off without the ability to host malware and be free from impunity. Finally, they listed of some of the BPH providers that are firmly entrenched in the cybercrime underground and how they give support to other cybercriminal enterprises. By recognizing their behaviors, security teams can begin to take measures to figure out who the actors are, how they operate and what their infrastructure looks like. By doing so, organizations can begin to uncover ways to proactively counter maliciously-used infrastructure before criminals have a chance to launch their attacks. 
The blog posts can be found here:

Hiding in plain sight: Bulletproof Hosting’s dueling forms

Bulletproof hosting: How cybercrime stays resilient

Here’s who is powering the bulletproof hosting market


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Apr 2021 05:00:00 -0000</pubDate>
      <itunes:title>Bulletproof hosting (BPH) and how it powers cybercrime. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>180</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Jason Passwaters of Intel 471 joins us to discuss his team's research into bulletproof hosting (BPH). The research team at Intel 471 defined what a typical BPH service offers and how these services can be stopped in order to limit the damage they have on enterprises, businesses and digital society itself. They examined some popular malware families that actors host or leverage via BPH services. While much more goes into a cybercriminal’s full operation, it would be vastly more difficult to pull off without the ability to host malware and be free from impunity. Finally, they listed of some of the BPH providers that are firmly entrenched in the cybercrime underground and how they give support to other cybercriminal enterprises. By recognizing their behaviors, security teams can begin to take measures to figure out who the actors are, how they operate and what their infrastructure looks like. By doing so, organizations can begin to uncover ways to proactively counter maliciously-used infrastructure before criminals have a chance to launch their attacks. 
The blog posts can be found here:

Hiding in plain sight: Bulletproof Hosting’s dueling forms

Bulletproof hosting: How cybercrime stays resilient

Here’s who is powering the bulletproof hosting market


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Jason Passwaters of Intel 471 joins us to discuss his team's research into bulletproof hosting (BPH). The research team at Intel 471 defined what a typical BPH service offers and how these services can be stopped in order to limit the damage they have on enterprises, businesses and digital society itself. They examined some popular malware families that actors host or leverage via BPH services. While much more goes into a cybercriminal’s full operation, it would be vastly more difficult to pull off without the ability to host malware and be free from impunity. Finally, they listed of some of the BPH providers that are firmly entrenched in the cybercrime underground and how they give support to other cybercriminal enterprises. By recognizing their behaviors, security teams can begin to take measures to figure out who the actors are, how they operate and what their infrastructure looks like. By doing so, organizations can begin to uncover ways to proactively counter maliciously-used infrastructure before criminals have a chance to launch their attacks. </p><p>The blog posts can be found here:</p><ul>
<li><a href="https://intel471.com/blog/bulletproof-hosting-fast-flux-dns-double-flux-vps/">Hiding in plain sight: Bulletproof Hosting’s dueling forms</a></li>
<li><a href="https://intel471.com/blog/bulletproof-hosting-yalishanda-ransomware-banking-trojans-information-stealers/">Bulletproof hosting: How cybercrime stays resilient</a></li>
<li><a href="https://intel471.com/blog/top-bulletproof-hosting-providers-yalishanda-ccweb-brazzzers-2021/">Here’s who is powering the bulletproof hosting market</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1052</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c818c4d0-357b-11eb-acde-db64ce99b566]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7370694942.mp3?updated=1685125450" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Social engineering: MINEBRIDGE RAT embedded to look like job résumés. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/179/notes</link>
      <description>Guest Deepen Desai joins Dave to talk about Zsaler's research "Return of the MINEBRIDGE RAT With New TTPs and Social Engineering Lures." In Jan 2021, Zscaler ThreatLabZ discovered new instances of the MINEBRIDGE remote-access Trojan (RAT) embedded in macro-based Word document files crafted to look like valid job resumes (CVs). Such lures are often used as social engineering schemes by threat actors.
MINEBRIDGE buries itself into the vulnerable remote desktop software TeamViewer, enabling the threat actor to take a wide array of remote follow-on actions such as spying on users or deploying additional malware.The use of social engineering tactics targeting security teams appears to be on an upward trend.
The research can be found here:
Return of the MINEBRIDGE RAT With New TTPs and Social Engineering Lures

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Apr 2021 05:00:00 -0000</pubDate>
      <itunes:title>Social engineering: MINEBRIDGE RAT embedded to look like job résumés. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>179</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Deepen Desai joins Dave to talk about Zsaler's research "Return of the MINEBRIDGE RAT With New TTPs and Social Engineering Lures." In Jan 2021, Zscaler ThreatLabZ discovered new instances of the MINEBRIDGE remote-access Trojan (RAT) embedded in macro-based Word document files crafted to look like valid job resumes (CVs). Such lures are often used as social engineering schemes by threat actors.
MINEBRIDGE buries itself into the vulnerable remote desktop software TeamViewer, enabling the threat actor to take a wide array of remote follow-on actions such as spying on users or deploying additional malware.The use of social engineering tactics targeting security teams appears to be on an upward trend.
The research can be found here:
Return of the MINEBRIDGE RAT With New TTPs and Social Engineering Lures

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Deepen Desai joins Dave to talk about Zsaler's research "Return of the MINEBRIDGE RAT With New TTPs and Social Engineering Lures." In Jan 2021, Zscaler ThreatLabZ discovered new instances of the MINEBRIDGE remote-access Trojan (RAT) embedded in macro-based Word document files crafted to look like valid job resumes (CVs). Such lures are often used as social engineering schemes by threat actors.</p><p>MINEBRIDGE buries itself into the vulnerable remote desktop software TeamViewer, enabling the threat actor to take a wide array of remote follow-on actions such as spying on users or deploying additional malware.The use of social engineering tactics targeting security teams appears to be on an upward trend.</p><p>The research can be found here:</p><ul><li><a href="https://www.zscaler.com/blogs/security-research/return-minebridge-rat-new-ttps-and-social-engineering-lures">Return of the MINEBRIDGE RAT With New TTPs and Social Engineering Lures</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1038</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c80d75ee-357b-11eb-acde-f7456691ba95]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1590264793.mp3?updated=1685125443" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Strategic titles point to something more than a commodity campaign. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/178/notes</link>
      <description>Guests Gage Mele, Winston Marydasan, and Yury Polozov from Anomali join Dave to discuss their research into Static Kitten targeting government agencies in the UAE and Kuwait. Anomali Threat Research uncovered malicious activity very likely attributed to the Iran-nexus cyberespionage group, Static Kitten (Seedworm, MERCURY, Temp.Zagros, POWERSTATS, NTSTATS, MuddyWater), which is known to target numerous sectors primarily located in the Middle East This new campaign, which uses tactics, techniques, and procedures (TTPs) consistent with previous Static Kitten activity, uses ScreenConnect launch parameters designed to target any MOFA with mfa[.]gov as part of the custom field. Anomali's team found samples specifically masquerading as the Kuwaiti government and the UAE National Council respectively, based on references in the malicious samples.
The research can be found here:
Probable Iranian Cyber Actors, Static Kitten, Conducting Cyberespionage Campaign Targeting UAE and Kuwait Government Agencies

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Apr 2021 05:00:00 -0000</pubDate>
      <itunes:title>Strategic titles point to something more than a commodity campaign. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>178</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guests Gage Mele, Winston Marydasan, and Yury Polozov from Anomali join Dave to discuss their research into Static Kitten targeting government agencies in the UAE and Kuwait. Anomali Threat Research uncovered malicious activity very likely attributed to the Iran-nexus cyberespionage group, Static Kitten (Seedworm, MERCURY, Temp.Zagros, POWERSTATS, NTSTATS, MuddyWater), which is known to target numerous sectors primarily located in the Middle East This new campaign, which uses tactics, techniques, and procedures (TTPs) consistent with previous Static Kitten activity, uses ScreenConnect launch parameters designed to target any MOFA with mfa[.]gov as part of the custom field. Anomali's team found samples specifically masquerading as the Kuwaiti government and the UAE National Council respectively, based on references in the malicious samples.
The research can be found here:
Probable Iranian Cyber Actors, Static Kitten, Conducting Cyberespionage Campaign Targeting UAE and Kuwait Government Agencies

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guests Gage Mele, Winston Marydasan, and Yury Polozov from Anomali join Dave to discuss their research into Static Kitten targeting government agencies in the UAE and Kuwait. Anomali Threat Research uncovered malicious activity very likely attributed to the Iran-nexus cyberespionage group, Static Kitten (Seedworm, MERCURY, Temp.Zagros, POWERSTATS, NTSTATS, MuddyWater), which is known to target numerous sectors primarily located in the Middle East This new campaign, which uses tactics, techniques, and procedures (TTPs) consistent with previous Static Kitten activity, uses ScreenConnect launch parameters designed to target any MOFA with mfa[.]gov as part of the custom field. Anomali's team found samples specifically masquerading as the Kuwaiti government and the UAE National Council respectively, based on references in the malicious samples.</p><p>The research can be found here:</p><ul><li><a href="https://www.anomali.com/blog/probable-iranian-cyber-actors-static-kitten-conducting-cyberespionage-campaign-targeting-uae-and-kuwait-government-agencies">Probable Iranian Cyber Actors, Static Kitten, Conducting Cyberespionage Campaign Targeting UAE and Kuwait Government Agencies</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1361</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c8028062-357b-11eb-acde-83c4c570b037]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5526866663.mp3?updated=1685125434" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ezuri: Regenerating a different kind of target.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/177/notes</link>
      <description>Guests Fernando Martinez and Tom Hegel from AT&amp;T Alien Labs join Dave to discuss their team's research "Malware using new Ezuri memory loader." Multiple threat actors have recently started using a Go language (Golang) tool to act as a packer and avoid Antivirus detection. Additionally, the Ezuri memory loader tool acts as a malware loader and executes its payload in memory, without writing the file to disk. While this technique is known and commonly used by Windows malware, it is less popular in Linux environments.
The research can be found here:
Malware using new Ezuri memory loader

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Apr 2021 05:00:00 -0000</pubDate>
      <itunes:title>Ezuri: Regenerating a different kind of target.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>177</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guests Fernando Martinez and Tom Hegel from AT&amp;T Alien Labs join Dave to discuss their team's research "Malware using new Ezuri memory loader." Multiple threat actors have recently started using a Go language (Golang) tool to act as a packer and avoid Antivirus detection. Additionally, the Ezuri memory loader tool acts as a malware loader and executes its payload in memory, without writing the file to disk. While this technique is known and commonly used by Windows malware, it is less popular in Linux environments.
The research can be found here:
Malware using new Ezuri memory loader

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guests Fernando Martinez and Tom Hegel from AT&amp;T Alien Labs join Dave to discuss their team's research "Malware using new Ezuri memory loader." Multiple threat actors have recently started using a Go language (Golang) tool to act as a packer and avoid Antivirus detection. Additionally, the Ezuri memory loader tool acts as a malware loader and executes its payload in memory, without writing the file to disk. While this technique is known and commonly used by Windows malware, it is less popular in Linux environments.</p><p>The research can be found here:</p><ul><li><a href="https://cybersecurity.att.com/blogs/labs-research/malware-using-new-ezuri-memory-loader">Malware using new Ezuri memory loader</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1156</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7f72ac8-357b-11eb-acde-7fda33c662bd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2513385250.mp3?updated=1685125424" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How are we doing in the industrial sector? </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/176/notes</link>
      <description>Guest Sergio Caltagirone from Dragos joins us to take us through their 2020 ICS Cybersecurity Year in Review report. Dragos's annual ICS Year in Review provides an overview and analysis of ICS vulnerabilities, global threat activity targeting industrial environments, and industry trends and observations gathered from customer engagements worldwide. The goal of the report is to give asset owners and operators proactive, actionable information and defensive recommendations in order to prepare for and combat the world’s most significant industrial cybersecurity adversaries.
The report can be found here:
2020 ICS CYBERSECURITY YEAR IN REVIEW

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Mar 2021 05:00:00 -0000</pubDate>
      <itunes:title>How are we doing in the industrial sector? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>176</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Sergio Caltagirone from Dragos joins us to take us through their 2020 ICS Cybersecurity Year in Review report. Dragos's annual ICS Year in Review provides an overview and analysis of ICS vulnerabilities, global threat activity targeting industrial environments, and industry trends and observations gathered from customer engagements worldwide. The goal of the report is to give asset owners and operators proactive, actionable information and defensive recommendations in order to prepare for and combat the world’s most significant industrial cybersecurity adversaries.
The report can be found here:
2020 ICS CYBERSECURITY YEAR IN REVIEW

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Sergio Caltagirone from Dragos joins us to take us through their 2020 ICS Cybersecurity Year in Review report. Dragos's annual ICS Year in Review provides an overview and analysis of ICS vulnerabilities, global threat activity targeting industrial environments, and industry trends and observations gathered from customer engagements worldwide. The goal of the report is to give asset owners and operators proactive, actionable information and defensive recommendations in order to prepare for and combat the world’s most significant industrial cybersecurity adversaries.</p><p>The report can be found here:</p><ul><li><a href="https://www.dragos.com/year-in-review/">2020 ICS CYBERSECURITY YEAR IN REVIEW</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1310</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7eb6828-357b-11eb-acde-7f2d56a05758]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2076145457.mp3?updated=1685124630" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BendyBear: difficult to detect and downloader of malicious payloads. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/175/notes</link>
      <description>Guest Jen Miller-Osborn from Palo Alto Networks' Unit 42 joins us to discuss their research into BendyBear. Highly malleable, highly sophisticated and over 10,000 bytes of machine code. The code behavior and features strongly correlate with that of the WaterBear malware family, which has been active since as early as 2009. The malware is associated with the cyber espionage group BlackTech, which many in the broader threat research community have assessed to have ties to the Chinese government, and is believed to be responsible for recent attacks against several East Asian government organizations. Due to the similarities with WaterBear, and the polymorphic nature of the code, Unit 42 named this novel Chinese shellcode “BendyBear.” It stands in a class of its own in terms of being one of the most sophisticated, well-engineered and difficult-to-detect samples of shellcode employed by an Advanced Persistent Threat (APT).
The research can be found here:
BendyBear: Novel Chinese Shellcode Linked With Cyber Espionage Group BlackTech

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Mar 2021 05:00:00 -0000</pubDate>
      <itunes:title>BendyBear: difficult to detect and downloader of malicious payloads. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>175</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Jen Miller-Osborn from Palo Alto Networks' Unit 42 joins us to discuss their research into BendyBear. Highly malleable, highly sophisticated and over 10,000 bytes of machine code. The code behavior and features strongly correlate with that of the WaterBear malware family, which has been active since as early as 2009. The malware is associated with the cyber espionage group BlackTech, which many in the broader threat research community have assessed to have ties to the Chinese government, and is believed to be responsible for recent attacks against several East Asian government organizations. Due to the similarities with WaterBear, and the polymorphic nature of the code, Unit 42 named this novel Chinese shellcode “BendyBear.” It stands in a class of its own in terms of being one of the most sophisticated, well-engineered and difficult-to-detect samples of shellcode employed by an Advanced Persistent Threat (APT).
The research can be found here:
BendyBear: Novel Chinese Shellcode Linked With Cyber Espionage Group BlackTech

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Jen Miller-Osborn from Palo Alto Networks' Unit 42 joins us to discuss their research into BendyBear. Highly malleable, highly sophisticated and over 10,000 bytes of machine code. The code behavior and features strongly correlate with that of the WaterBear malware family, which has been active since as early as 2009. The malware is associated with the cyber espionage group BlackTech, which many in the broader threat research community have assessed to have ties to the Chinese government, and is believed to be responsible for recent attacks against several East Asian government organizations. Due to the similarities with WaterBear, and the polymorphic nature of the code, Unit 42 named this novel Chinese shellcode “BendyBear.” It stands in a class of its own in terms of being one of the most sophisticated, well-engineered and difficult-to-detect samples of shellcode employed by an Advanced Persistent Threat (APT).</p><p>The research can be found here:</p><ul><li><a href="https://unit42.paloaltonetworks.com/bendybear-shellcode-blacktech/">BendyBear: Novel Chinese Shellcode Linked With Cyber Espionage Group BlackTech</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>952</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7df5baa-357b-11eb-acde-13a5a335b60c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6589007131.mp3?updated=1685124543" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Keeping data confidential with fully homomorphic encryption. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/174/notes</link>
      <description>Guest Dr. Rosario Cammarota from Intel Labs joins us to discuss confidential computing. Confidential computing provides a secure platform for multiple parties to combine, analyze and learn from sensitive data without exposing their data or machine learning algorithms to the other party. This technique goes by several names — multiparty computing, federated learning and privacy-preserving analytics, among them. Confidential computing can enable this type of collaboration while preserving privacy and regulatory compliance.
The research and supporting documents can be found here:

Intel Labs Day 2020: Confidential Computing

Confidential Computing Presentation Slides

Demo video


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Mar 2021 06:00:00 -0000</pubDate>
      <itunes:title>Keeping data confidential with fully homomorphic encryption. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>174</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Dr. Rosario Cammarota from Intel Labs joins us to discuss confidential computing. Confidential computing provides a secure platform for multiple parties to combine, analyze and learn from sensitive data without exposing their data or machine learning algorithms to the other party. This technique goes by several names — multiparty computing, federated learning and privacy-preserving analytics, among them. Confidential computing can enable this type of collaboration while preserving privacy and regulatory compliance.
The research and supporting documents can be found here:

Intel Labs Day 2020: Confidential Computing

Confidential Computing Presentation Slides

Demo video


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Dr. Rosario Cammarota from Intel Labs joins us to discuss confidential computing. Confidential computing provides a secure platform for multiple parties to combine, analyze and learn from sensitive data without exposing their data or machine learning algorithms to the other party. This technique goes by several names — multiparty computing, federated learning and privacy-preserving analytics, among them. Confidential computing can enable this type of collaboration while preserving privacy and regulatory compliance.</p><p>The research and supporting documents can be found here:</p><ul>
<li><a href="https://newsroom.intel.com/press-kits/intel-labs-day-2020/#gs.qivoy1">Intel Labs Day 2020: Confidential Computing</a></li>
<li><a href="https://newsroom.intel.com/wp-content/uploads/sites/11/2020/12/Confidential-Computing-slides-.pdf">Confidential Computing Presentation Slides</a></li>
<li><a href="https://vimeo.com/intelpr/review/486111620/36f4a75b2d">Demo video</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1418</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7d303be-357b-11eb-acde-df1ddb0e7322]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3575535495.mp3?updated=1685113398" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Diving deep into North Korea's APT37 tool kit. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/173/notes</link>
      <description>Guest Hossein Jazi of Malwarebytes joins us to take a deep dive into North Korea's APT37 (aka ScarCruft, Reaper and Group123) toolkit. On December 7 2020 the Malwarebytes Labs threat team identified a malicious document uploaded to Virus Total which was purporting to be a meeting request likely used to target the government of South Korea. The meeting date mentioned in the document was 23 Jan 2020, which aligns with the document compilation time of 27 Jan 2020, indicating that this attack took place almost a year ago.
The file contains an embedded macro that uses a VBA self decoding technique to decode itself within the memory spaces of Microsoft Office without writing to the disk. It then embeds a variant of the RokRat into Notepad.
Based on the injected payload, the Malwarebytes team believes that this sample is associated with APT37. This North Korean group is also known as ScarCruft, Reaper and Group123 and has been active since at least 2012, primarily targeting victims in South Korea.
The research can be found here:
Retrohunting APT37: North Korean APT used VBA self decode technique to inject RokRat

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Mar 2021 06:00:00 -0000</pubDate>
      <itunes:title>Diving deep into North Korea's APT37 tool kit. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>173</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Hossein Jazi of Malwarebytes joins us to take a deep dive into North Korea's APT37 (aka ScarCruft, Reaper and Group123) toolkit. On December 7 2020 the Malwarebytes Labs threat team identified a malicious document uploaded to Virus Total which was purporting to be a meeting request likely used to target the government of South Korea. The meeting date mentioned in the document was 23 Jan 2020, which aligns with the document compilation time of 27 Jan 2020, indicating that this attack took place almost a year ago.
The file contains an embedded macro that uses a VBA self decoding technique to decode itself within the memory spaces of Microsoft Office without writing to the disk. It then embeds a variant of the RokRat into Notepad.
Based on the injected payload, the Malwarebytes team believes that this sample is associated with APT37. This North Korean group is also known as ScarCruft, Reaper and Group123 and has been active since at least 2012, primarily targeting victims in South Korea.
The research can be found here:
Retrohunting APT37: North Korean APT used VBA self decode technique to inject RokRat

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Hossein Jazi of Malwarebytes joins us to take a deep dive into North Korea's APT37 (aka ScarCruft, Reaper and Group123) toolkit. On December 7 2020 the Malwarebytes Labs threat team identified a malicious document uploaded to Virus Total which was purporting to be a meeting request likely used to target the government of South Korea. The meeting date mentioned in the document was 23 Jan 2020, which aligns with the document compilation time of 27 Jan 2020, indicating that this attack took place almost a year ago.</p><p>The file contains an embedded macro that uses a VBA self decoding technique to decode itself within the memory spaces of Microsoft Office without writing to the disk. It then embeds a variant of the RokRat into Notepad.</p><p>Based on the injected payload, the Malwarebytes team believes that this sample is associated with APT37. This North Korean group is also known as ScarCruft, Reaper and Group123 and has been active since at least 2012, primarily targeting victims in South Korea.</p><p>The research can be found here:</p><ul><li><a href="https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/">Retrohunting APT37: North Korean APT used VBA self decode technique to inject RokRat</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1098</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7c78ef8-357b-11eb-acde-63145520e8aa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1060337869.mp3?updated=1685109247" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Shining a light on China's cyber underground. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/172/notes</link>
      <description>Guest Maurits Lucas from Intel471 joins us to discuss his team's research into cybercrime in China. Data from Intel 471 show that the Chinese cybercrime underground proliferates through use of common methods or platforms, but behaves differently in large part due to the caution that actors take with regard to their identity. While the average citizen must follow the heavy handed nature of the government’s surveillance of cyberspace, Chinese threat actors take special precautions to protect their forums, TTPs and themselves. This leads to the Chinese cybercrime underground being disorderly when compared to others, particularly Russia, which tend to be much more organized.
The research can be found here:
No pandas, just people: The current state of China’s cybercrime underground

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Feb 2021 06:00:00 -0000</pubDate>
      <itunes:title>Shining a light on China's cyber underground. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>172</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Maurits Lucas from Intel471 joins us to discuss his team's research into cybercrime in China. Data from Intel 471 show that the Chinese cybercrime underground proliferates through use of common methods or platforms, but behaves differently in large part due to the caution that actors take with regard to their identity. While the average citizen must follow the heavy handed nature of the government’s surveillance of cyberspace, Chinese threat actors take special precautions to protect their forums, TTPs and themselves. This leads to the Chinese cybercrime underground being disorderly when compared to others, particularly Russia, which tend to be much more organized.
The research can be found here:
No pandas, just people: The current state of China’s cybercrime underground

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Maurits Lucas from Intel471 joins us to discuss his team's research into cybercrime in China. Data from Intel 471 show that the Chinese cybercrime underground proliferates through use of common methods or platforms, but behaves differently in large part due to the caution that actors take with regard to their identity. While the average citizen must follow the heavy handed nature of the government’s surveillance of cyberspace, Chinese threat actors take special precautions to protect their forums, TTPs and themselves. This leads to the Chinese cybercrime underground being disorderly when compared to others, particularly Russia, which tend to be much more organized.</p><p>The research can be found here:</p><ul><li><a href="https://intel471.com/blog/china-cybercrime-undergrond-deepmix-tea-horse-road-great-firewall/">No pandas, just people: The current state of China’s cybercrime underground</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1436</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7bcecc8-357b-11eb-acde-4ba4fe2c0c4d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8888193212.mp3?updated=1685109084" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Attackers (ab)using Google Chrome. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/171/notes</link>
      <description>Guest Bojan Zdrnja of Infigo IS and a certified instructor at SANS Institute shares an incident he discovered where attackers were using a pretty novel way of exfiltrating data and using that channel for C&amp;C communication. The code that was acquired was only partially recovered, but enough to indicate powerful features that the attackers were (ab)using in Google Chrome. The basis for this attack were malicious extensions that the attacker dropped on the compromised system.
The research can be found here:
Abusing Google Chrome extension syncing for data exfiltration and C&amp;C

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Feb 2021 06:00:00 -0000</pubDate>
      <itunes:title>Attackers (ab)using Google Chrome. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>171</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Bojan Zdrnja of Infigo IS and a certified instructor at SANS Institute shares an incident he discovered where attackers were using a pretty novel way of exfiltrating data and using that channel for C&amp;C communication. The code that was acquired was only partially recovered, but enough to indicate powerful features that the attackers were (ab)using in Google Chrome. The basis for this attack were malicious extensions that the attacker dropped on the compromised system.
The research can be found here:
Abusing Google Chrome extension syncing for data exfiltration and C&amp;C

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Bojan Zdrnja of Infigo IS and a certified instructor at SANS Institute shares an incident he discovered where attackers were using a pretty novel way of exfiltrating data and using that channel for C&amp;C communication. The code that was acquired was only partially recovered, but enough to indicate powerful features that the attackers were (ab)using in Google Chrome. The basis for this attack were malicious extensions that the attacker dropped on the compromised system.</p><p>The research can be found here:</p><ul><li><a href="https://isc.sans.edu/forums/diary/Abusing+Google+Chrome+extension+syncing+for+data+exfiltration+and+CC/27066/">Abusing Google Chrome extension syncing for data exfiltration and C&amp;C</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1172</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7b1971a-357b-11eb-acde-77f5fa243338]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6904611152.mp3?updated=1685109067" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Using the human body as a wire-like communication channel.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/170/notes</link>
      <description>Guest Dr. Shreyas Sen, a Perdue University associate professor of electrical and computer engineering, joins us to discuss the following scenario:. Instead of inserting a card or scanning a smartphone to make a payment, what if you could simply touch the machine with your finger? A prototype developed by Purdue University engineers would essentially let your body act as the link between your card or smartphone and the reader or scanner, making it possible for you to transmit information just by touching a surface.
The research can be found here:


Tech makes it possible to digitally communicate through human touch (press release)


BodyWire-HCI: Enabling New Interaction Modalities by Communicating Strictly During Touch Using Electro-Quasistatic Human Body Communication (research paper)


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Feb 2021 06:00:00 -0000</pubDate>
      <itunes:title>Using the human body as a wire-like communication channel.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>170</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Dr. Shreyas Sen, a Perdue University associate professor of electrical and computer engineering, joins us to discuss the following scenario:. Instead of inserting a card or scanning a smartphone to make a payment, what if you could simply touch the machine with your finger? A prototype developed by Purdue University engineers would essentially let your body act as the link between your card or smartphone and the reader or scanner, making it possible for you to transmit information just by touching a surface.
The research can be found here:


Tech makes it possible to digitally communicate through human touch (press release)


BodyWire-HCI: Enabling New Interaction Modalities by Communicating Strictly During Touch Using Electro-Quasistatic Human Body Communication (research paper)


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Dr. Shreyas Sen, a Perdue University associate professor of electrical and computer engineering, joins us to discuss the following scenario:. Instead of inserting a card or scanning a smartphone to make a payment, what if you could simply touch the machine with your finger? A prototype developed by Purdue University engineers would essentially let your body act as the link between your card or smartphone and the reader or scanner, making it possible for you to transmit information just by touching a surface.</p><p>The research can be found here:</p><ul>
<li>
<a href="https://www.purdue.edu/newsroom/releases/2020/Q4/tech-makes-it-possible-to-digitally-communicate-through-human-touch.html">Tech makes it possible to digitally communicate through human touch</a> (press release)</li>
<li>
<a href="https://dl.acm.org/doi/10.1145/3406238?_ga=2.49263011.401635545.1613068445-2115879037.1613068445">BodyWire-HCI: Enabling New Interaction Modalities by Communicating Strictly During Touch Using Electro-Quasistatic Human Body Communication</a> (research paper)</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1199</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7a69df6-357b-11eb-acde-ebf15ad48136]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3891293243.mp3?updated=1685109060" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>"Follow the money" the cybersecurity way.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/169/notes</link>
      <description>Guest Joe Slowik joins us from Domain Tools to share their research "Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity" where they examined technical artifacts emerging around the 2020 conflict between Armenia and Azerbaijan in the Caucasus region. 
Cyber Threat Intelligence (CTI) practitioners can gain insight into adversary operations by tracking conflicts or geopolitical tensions. Similar to a “follow the money” approach in criminal investigations, looking at conflict zones can reveal cyber capabilities deployed as part of events —either by the parties to the conflict itself, or third parties interested in monitoring events for their own purposes.
Based on precedent, analysts can identify developments in adversary operations and technical capabilities by tracking identifiers related to major events and conflict zones. Identifying capabilities deployed to take advantage of such items can yield insights into fundamental attacker tradecraft and behaviors, and enable defense and response for incidents which may strike far closer to home at a later date.
The research can be found here:
Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Feb 2021 06:00:00 -0000</pubDate>
      <itunes:title>"Follow the money" the cybersecurity way.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>169</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Joe Slowik joins us from Domain Tools to share their research "Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity" where they examined technical artifacts emerging around the 2020 conflict between Armenia and Azerbaijan in the Caucasus region. 
Cyber Threat Intelligence (CTI) practitioners can gain insight into adversary operations by tracking conflicts or geopolitical tensions. Similar to a “follow the money” approach in criminal investigations, looking at conflict zones can reveal cyber capabilities deployed as part of events —either by the parties to the conflict itself, or third parties interested in monitoring events for their own purposes.
Based on precedent, analysts can identify developments in adversary operations and technical capabilities by tracking identifiers related to major events and conflict zones. Identifying capabilities deployed to take advantage of such items can yield insights into fundamental attacker tradecraft and behaviors, and enable defense and response for incidents which may strike far closer to home at a later date.
The research can be found here:
Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Joe Slowik joins us from Domain Tools to share their research "Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity" where they examined technical artifacts emerging around the 2020 conflict between Armenia and Azerbaijan in the Caucasus region. </p><p>Cyber Threat Intelligence (CTI) practitioners can gain insight into adversary operations by tracking conflicts or geopolitical tensions. Similar to a “follow the money” approach in criminal investigations, looking at conflict zones can reveal cyber capabilities deployed as part of events —either by the parties to the conflict itself, or third parties interested in monitoring events for their own purposes.</p><p>Based on precedent, analysts can identify developments in adversary operations and technical capabilities by tracking identifiers related to major events and conflict zones. Identifying capabilities deployed to take advantage of such items can yield insights into fundamental attacker tradecraft and behaviors, and enable defense and response for incidents which may strike far closer to home at a later date.</p><p>The research can be found here:</p><ul><li><a href="https://www.domaintools.com/resources/blog/current-events-to-widespread-campaigns-pivoting-from-samples-to-identify#">Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1637</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c79b1ada-357b-11eb-acde-1338ede51fd7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3292173274.mp3?updated=1685109052" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Kimsuky group from North Korea expands spyware, malware and infrastructure.  </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/168/notes</link>
      <description>Guest Yonatan Striem-Amit joins us from Cybereason to share their Nocturnus Team research into Kimsuky. The Cybereason Nocturnus Team has been tracking various North Korean threat actors, among them the cyber espionage group known as Kimsuky, (aka: Velvet Chollima, Black Banshee and Thallium), which has been active since at least 2012 and is believed to be operating on behalf of the North Korean regime. The group has a rich and notorious history of offensive cyber operations around the world, including operations targeting South Korean think tanks, but over the past few years they have expanded their targeting to countries including the United States, Russia and various nations in Europe.
The research can be found here:
Back to the Future: Inside the Kimsuky KGH Spyware Suite

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Jan 2021 06:00:00 -0000</pubDate>
      <itunes:title>The Kimsuky group from North Korea expands spyware, malware and infrastructure.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>168</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Yonatan Striem-Amit joins us from Cybereason to share their Nocturnus Team research into Kimsuky. The Cybereason Nocturnus Team has been tracking various North Korean threat actors, among them the cyber espionage group known as Kimsuky, (aka: Velvet Chollima, Black Banshee and Thallium), which has been active since at least 2012 and is believed to be operating on behalf of the North Korean regime. The group has a rich and notorious history of offensive cyber operations around the world, including operations targeting South Korean think tanks, but over the past few years they have expanded their targeting to countries including the United States, Russia and various nations in Europe.
The research can be found here:
Back to the Future: Inside the Kimsuky KGH Spyware Suite

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Yonatan Striem-Amit joins us from Cybereason to share their Nocturnus Team research into Kimsuky. The Cybereason Nocturnus Team has been tracking various North Korean threat actors, among them the cyber espionage group known as Kimsuky, (aka: Velvet Chollima, Black Banshee and Thallium), which has been active since at least 2012 and is believed to be operating on behalf of the North Korean regime. The group has a rich and notorious history of offensive cyber operations around the world, including operations targeting South Korean think tanks, but over the past few years they have expanded their targeting to countries including the United States, Russia and various nations in Europe.</p><p>The research can be found here:</p><ul><li><a href="https://www.cybereason.com/blog/back-to-the-future-inside-the-kimsuky-kgh-spyware-suite">Back to the Future: Inside the Kimsuky KGH Spyware Suite</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1044</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c78f2b30-357b-11eb-acde-6378ed6b2649]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4321359828.mp3?updated=1685109038" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trickbot may be down, but can we count it out?</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/167/notes</link>
      <description>Guest Mark Arena from Intel471 joins us to discuss his team's research into Trickbot and its evolution from a banking trojan to a long-standing, most likely well-resourced operation that was taken down last year. Mark shares some insight into Trickbot's order of operations and what went on behind the scenes that his team working with Brian Krebs were able to discover.
Since the separate and independent actions taken against Trickbot, Intel471 has observed successful disruption of its command and control infrastructure. However, the actors linked to Trickbot have not ceased their criminal activities. These actors have continued engaging in ransomware activity, using BazarLoader instead of Trickbot. Intel471 is unable to assess the long-term impact of the Trickbot disruption activity or whether Trickbot will continue to be used by cybercrime groups. This analysis covers the period from Sept. 22, 2020 until Nov. 6, 2020.
The research can be found here:
Trickbot down, but is it out?

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Jan 2021 06:00:00 -0000</pubDate>
      <itunes:title>Trickbot may be down, but can we count it out?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>167</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Mark Arena from Intel471 joins us to discuss his team's research into Trickbot and its evolution from a banking trojan to a long-standing, most likely well-resourced operation that was taken down last year. Mark shares some insight into Trickbot's order of operations and what went on behind the scenes that his team working with Brian Krebs were able to discover.
Since the separate and independent actions taken against Trickbot, Intel471 has observed successful disruption of its command and control infrastructure. However, the actors linked to Trickbot have not ceased their criminal activities. These actors have continued engaging in ransomware activity, using BazarLoader instead of Trickbot. Intel471 is unable to assess the long-term impact of the Trickbot disruption activity or whether Trickbot will continue to be used by cybercrime groups. This analysis covers the period from Sept. 22, 2020 until Nov. 6, 2020.
The research can be found here:
Trickbot down, but is it out?

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Mark Arena from Intel471 joins us to discuss his team's research into Trickbot and its evolution from a banking trojan to a long-standing, most likely well-resourced operation that was taken down last year. Mark shares some insight into Trickbot's order of operations and what went on behind the scenes that his team working with Brian Krebs were able to discover.</p><p>Since the separate and independent actions taken against Trickbot, Intel471 has observed successful disruption of its command and control infrastructure. However, the actors linked to Trickbot have not ceased their criminal activities. These actors have continued engaging in ransomware activity, using BazarLoader instead of Trickbot. Intel471 is unable to assess the long-term impact of the Trickbot disruption activity or whether Trickbot will continue to be used by cybercrime groups. This analysis covers the period from Sept. 22, 2020 until Nov. 6, 2020.</p><p>The research can be found here:</p><ul><li><a href="https://intel471.com/blog/trickbot-update-november-2020-bazar-loader-microsoft/">Trickbot down, but is it out?</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1188</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7844ad0-357b-11eb-acde-270689082905]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9372055224.mp3?updated=1685109027" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Manufacturing sector is increasingly a target for adversaries.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/166/notes</link>
      <description>Guest Selena Larson, senior cyber threat analyst at Dragos, Inc., joins us to discuss their research into recent observations of ICS-targeting threats to manufacturing organizations. 
Cyber risk to the manufacturing sector is increasing, led by disruptive cyberattacks impacting industrial processes, intrusions enabling information gathering and process information theft, and new activity from Industrial Control Systems (ICS)-targeting adversaries. Dragos currently publicly tracks five ICS-focused activity groups targeting manufacturing: CHRYSENE, PARISITE, MAGNALLIUM, WASSONITE, and XENOTIME in addition to various ransomware activities capable of disrupting operations. 
Manufacturing relies on ICS to scale, function, and ensure consistent quality control and product safety. It provides crucial materials, products, and medicine and is classified as critical infrastructure. Due to the interconnected nature of facilities and operations, an attack on a manufacturing entity can have ripple effects across the supply chain that relies on timely and precise production to support product fulfillment, health and safety, and national security objectives. 
Ransomware adversaries are adopting ICS-aware functionality with the ability to stop industrial related processes and cause disruptive – and potentially destructive – impacts. Dragos has not observed ICS-specific malware targeting manufacturing operations on the same scale or sophistication as that used in the disruptive TRISIS and CRASHOVERRIDE malware attacks that targeted energy operations in Saudi Arabia and Ukraine, respectively. However, known and ongoing threats to manufacturing can have direct and indirect impact to operations. This report provides a snapshot of the threat landscape as of October 2020 and is expected to change in the future as adversaries and their behaviors evolve. 
The research can be found here:
ICS Threat Activity on the Rise in Manufacturing Sector

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Jan 2021 06:00:00 -0000</pubDate>
      <itunes:title>Manufacturing sector is increasingly a target for adversaries.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>166</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Selena Larson, senior cyber threat analyst at Dragos, Inc., joins us to discuss their research into recent observations of ICS-targeting threats to manufacturing organizations. 
Cyber risk to the manufacturing sector is increasing, led by disruptive cyberattacks impacting industrial processes, intrusions enabling information gathering and process information theft, and new activity from Industrial Control Systems (ICS)-targeting adversaries. Dragos currently publicly tracks five ICS-focused activity groups targeting manufacturing: CHRYSENE, PARISITE, MAGNALLIUM, WASSONITE, and XENOTIME in addition to various ransomware activities capable of disrupting operations. 
Manufacturing relies on ICS to scale, function, and ensure consistent quality control and product safety. It provides crucial materials, products, and medicine and is classified as critical infrastructure. Due to the interconnected nature of facilities and operations, an attack on a manufacturing entity can have ripple effects across the supply chain that relies on timely and precise production to support product fulfillment, health and safety, and national security objectives. 
Ransomware adversaries are adopting ICS-aware functionality with the ability to stop industrial related processes and cause disruptive – and potentially destructive – impacts. Dragos has not observed ICS-specific malware targeting manufacturing operations on the same scale or sophistication as that used in the disruptive TRISIS and CRASHOVERRIDE malware attacks that targeted energy operations in Saudi Arabia and Ukraine, respectively. However, known and ongoing threats to manufacturing can have direct and indirect impact to operations. This report provides a snapshot of the threat landscape as of October 2020 and is expected to change in the future as adversaries and their behaviors evolve. 
The research can be found here:
ICS Threat Activity on the Rise in Manufacturing Sector

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Selena Larson, senior cyber threat analyst at Dragos, Inc., joins us to discuss their research into recent observations of ICS-targeting threats to manufacturing organizations. </p><p>Cyber risk to the manufacturing sector is increasing, led by disruptive cyberattacks impacting industrial processes, intrusions enabling information gathering and process information theft, and new activity from Industrial Control Systems (ICS)-targeting adversaries. Dragos currently publicly tracks five ICS-focused activity groups targeting manufacturing: CHRYSENE, PARISITE, MAGNALLIUM, WASSONITE, and XENOTIME in addition to various ransomware activities capable of disrupting operations. </p><p>Manufacturing relies on ICS to scale, function, and ensure consistent quality control and product safety. It provides crucial materials, products, and medicine and is classified as critical infrastructure. Due to the interconnected nature of facilities and operations, an attack on a manufacturing entity can have ripple effects across the supply chain that relies on timely and precise production to support product fulfillment, health and safety, and national security objectives. </p><p>Ransomware adversaries are adopting ICS-aware functionality with the ability to stop industrial related processes and cause disruptive – and potentially destructive – impacts. Dragos has not observed ICS-specific malware targeting manufacturing operations on the same scale or sophistication as that used in the disruptive TRISIS and CRASHOVERRIDE malware attacks that targeted energy operations in Saudi Arabia and Ukraine, respectively. However, known and ongoing threats to manufacturing can have direct and indirect impact to operations. This report provides a snapshot of the threat landscape as of October 2020 and is expected to change in the future as adversaries and their behaviors evolve. </p><p>The research can be found here:</p><ul><li><a href="https://www.dragos.com/blog/industry-news/manufacturing-sector-cyber-threats/">ICS Threat Activity on the Rise in Manufacturing Sector</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1472</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7787b24-357b-11eb-acde-fb9690b359da]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7374296699.mp3?updated=1685109019" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Emotet reemerges and becomes one of most prolific threat groups out there.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/165/notes</link>
      <description>Deep Instinct's Shimon Oren joins us to talk about his team's research on "Why Emotet's latest wave is harder to catch than ever before - Part 2." Emotet appears to have reemerged more evasive than before, this time with a payload delivered from a loader that security tools aren’t equipped to handle.
Emotet, the largest malware botnet today, started in 2014 and continues to be one of the most challenging threats in today’s landscape. This botnet causes huge damage by spreading ransomware and info stealers to its infected systems. Recently, a rise in the number of Emotet infections was observed in France, Japan, and New Zealand. The high number of infections shows the effectiveness of the Emotet malware at staying undetected.
Shimon joins us to discuss how Deep Instinct investigated the payload that was encrypted inside the loader, analyzes the next steps in the infection process, and discovers the techniques used to make this malware difficult to analyze.
The original blog post and updated post on the research can be found here:

Emotet Analysis: Why Emotet’s Latest Wave is Harder to Catch than Ever Before

Why Emotet's latest wave is harder to catch than ever before - Part 2


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Jan 2021 06:00:00 -0000</pubDate>
      <itunes:title>Emotet reemerges and becomes one of most prolific threat groups out there.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>165</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Deep Instinct's Shimon Oren joins us to talk about his team's research on "Why Emotet's latest wave is harder to catch than ever before - Part 2." Emotet appears to have reemerged more evasive than before, this time with a payload delivered from a loader that security tools aren’t equipped to handle.
Emotet, the largest malware botnet today, started in 2014 and continues to be one of the most challenging threats in today’s landscape. This botnet causes huge damage by spreading ransomware and info stealers to its infected systems. Recently, a rise in the number of Emotet infections was observed in France, Japan, and New Zealand. The high number of infections shows the effectiveness of the Emotet malware at staying undetected.
Shimon joins us to discuss how Deep Instinct investigated the payload that was encrypted inside the loader, analyzes the next steps in the infection process, and discovers the techniques used to make this malware difficult to analyze.
The original blog post and updated post on the research can be found here:

Emotet Analysis: Why Emotet’s Latest Wave is Harder to Catch than Ever Before

Why Emotet's latest wave is harder to catch than ever before - Part 2


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Deep Instinct's Shimon Oren joins us to talk about his team's research on "Why Emotet's latest wave is harder to catch than ever before - Part 2." Emotet appears to have reemerged more evasive than before, this time with a payload delivered from a loader that security tools aren’t equipped to handle.</p><p>Emotet, the largest malware botnet today, started in 2014 and continues to be one of the most challenging threats in today’s landscape. This botnet causes huge damage by spreading ransomware and info stealers to its infected systems. Recently, a rise in the number of Emotet infections was observed in France, Japan, and New Zealand. The high number of infections shows the effectiveness of the Emotet malware at staying undetected.</p><p>Shimon joins us to discuss how Deep Instinct investigated the payload that was encrypted inside the loader, analyzes the next steps in the infection process, and discovers the techniques used to make this malware difficult to analyze.</p><p>The original blog post and updated post on the research can be found here:</p><ul>
<li><a href="https://www.deepinstinct.com/2020/08/12/why-emotets-latest-wave-is-harder-to-catch-than-ever-before/">Emotet Analysis: Why Emotet’s Latest Wave is Harder to Catch than Ever Before</a></li>
<li><a href="https://www.deepinstinct.com/2020/10/12/why-emotets-latest-wave-is-harder-to-catch-than-ever-before-part-2/">Why Emotet's latest wave is harder to catch than ever before - Part 2</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1475</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c768143c-357b-11eb-acde-87a74b69ca35]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4973525257.mp3?updated=1685109011" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Unpacking the Malvertising Ecosystem. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/97/notes</link>
      <description>Researchers at Cisco's Talos Unit recently published research exploring the tactics, technics and procedures of the global malvertising ecosystem. Craig Williams is head of Talos Outreach at Cisco, and he guides us through the life cycle of malicious online ads, along with tips for protecting yourself and your organization.
The research can be found here: 
 https://blog.talosintelligence.com/2019/07/malvertising-deepdive.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Jan 2021 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Unpacking the Malvertising Ecosystem.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a058587e-4607-11eb-9502-6b96f1faeab5/image/uploads_2F1608767554948-o0bgr22bx3m-f8b9875d3d82d5f3da35caff07052198_2FRS.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Cisco's Talos Unit recently published research exploring the tactics, technics and procedures of the global malvertising ecosystem. Craig Williams is head of Talos Outreach at Cisco, and he guides us through the life cycle of malicious online ads, along with tips for protecting yourself and your organization.
The research can be found here: 
 https://blog.talosintelligence.com/2019/07/malvertising-deepdive.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Cisco's Talos Unit recently published research exploring the tactics, technics and procedures of the global malvertising ecosystem. Craig Williams is head of Talos Outreach at Cisco, and he guides us through the life cycle of malicious online ads, along with tips for protecting yourself and your organization.</p><p>The research can be found here: </p><p><a href="https://blog.talosintelligence.com/2019/07/malvertising-deepdive.html"> https://blog.talosintelligence.com/2019/07/malvertising-deepdive.html</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1677</itunes:duration>
      <guid isPermaLink="false"><![CDATA[a058587e-4607-11eb-9502-6b96f1faeab5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7182292843.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Seedworm digs Middle East intelligence. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/73/notes</link>
      <description>Researchers at Symantec have been tracking Seedworm, a cyber espionage group targeting the Middle East as well as Europe and North America. The threat group targets government agencies, oil &amp; gas facilities, NGOs, telecoms and IT firms.
Al Cooley is director of product management at Symantec, and he joins us to share their findings.
The original research can be found here:
 https://www.symantec.com/blogs/threat-intelligence/seedworm-espionage-group
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Dec 2020 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Seedworm digs Middle East intelligence.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5a6e1b2e-456b-11eb-bf14-6fbb6f7c4d77/image/uploads_2F1608767580429-35mhqgvnlvy-435d28d0095d6341f273be714b80c109_2FRS.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Symantec have been tracking Seedworm, a cyber espionage group targeting the Middle East as well as Europe and North America. The threat group targets government agencies, oil &amp; gas facilities, NGOs, telecoms and IT firms.
Al Cooley is director of product management at Symantec, and he joins us to share their findings.
The original research can be found here:
 https://www.symantec.com/blogs/threat-intelligence/seedworm-espionage-group
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Symantec have been tracking Seedworm, a cyber espionage group targeting the Middle East as well as Europe and North America. The threat group targets government agencies, oil &amp; gas facilities, NGOs, telecoms and IT firms.</p><p>Al Cooley is director of product management at Symantec, and he joins us to share their findings.</p><p>The original research can be found here:</p><p><a href="https://www.symantec.com/blogs/threat-intelligence/seedworm-espionage-group"> https://www.symantec.com/blogs/threat-intelligence/seedworm-espionage-group</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1107</itunes:duration>
      <guid isPermaLink="false"><![CDATA[57816066-4579-11eb-8ca5-3741377ceda8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1884738781.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Advertising Software Development Kit (SDK): serving up more than just in-app ads and logging sensitive data. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/164/notes</link>
      <description>On August 24, 2020, Snyk announced the discovery of suspicious behaviors in the iOS version of a popular advertising SDK known as Mintegral. At that time, they had confirmed with partners in the advertising attribution space that at minimum, Mintegral appeared to be using this functionality to gather large amounts of data and commit ad attribution fraud. Their research showed that Mintegral was using code obfuscation and method swizzling to modify the functionality of base iOS SDK methods without the application owner’s knowledge. Further, their research proved that Mintegral was logging all HTTP requests including its headers which could even contain authorization tokens or other sensitive data.
Since that time Mintegral announced that they were opening the source of their SDK to the market. While the SDK can only be downloaded by registered partners, a major game publisher shared the source code with Snyk for further analysis. They also continued their research by digging deeper into the Android versions of the SDK in which they hadn’t found similar behaviors at the time of the initial disclosure. 
This has resulted in some significant discoveries that necessitate an update to the previous disclosure. Additionally, Mintegral and the community at large have responded to the situation, and Snyk felt a summary of the events was a good way to finalize their research into this SDK.
Joining us on Research Saturday to discuss their research is Snyk's Alyssa Miller.
The original blog and Snyk's update can be found here:

SourMint: malicious code, ad fraud, and data leak in iOS

SourMint: iOS remote code execution, Android findings, and community response


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Dec 2020 06:00:00 -0000</pubDate>
      <itunes:title>Advertising Software Development Kit (SDK): serving up more than just in-app ads and logging sensitive data. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>164</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On August 24, 2020, Snyk announced the discovery of suspicious behaviors in the iOS version of a popular advertising SDK known as Mintegral. At that time, they had confirmed with partners in the advertising attribution space that at minimum, Mintegral appeared to be using this functionality to gather large amounts of data and commit ad attribution fraud. Their research showed that Mintegral was using code obfuscation and method swizzling to modify the functionality of base iOS SDK methods without the application owner’s knowledge. Further, their research proved that Mintegral was logging all HTTP requests including its headers which could even contain authorization tokens or other sensitive data.
Since that time Mintegral announced that they were opening the source of their SDK to the market. While the SDK can only be downloaded by registered partners, a major game publisher shared the source code with Snyk for further analysis. They also continued their research by digging deeper into the Android versions of the SDK in which they hadn’t found similar behaviors at the time of the initial disclosure. 
This has resulted in some significant discoveries that necessitate an update to the previous disclosure. Additionally, Mintegral and the community at large have responded to the situation, and Snyk felt a summary of the events was a good way to finalize their research into this SDK.
Joining us on Research Saturday to discuss their research is Snyk's Alyssa Miller.
The original blog and Snyk's update can be found here:

SourMint: malicious code, ad fraud, and data leak in iOS

SourMint: iOS remote code execution, Android findings, and community response


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On August 24, 2020, Snyk announced the discovery of suspicious behaviors in the iOS version of a popular advertising SDK known as Mintegral. At that time, they had confirmed with partners in the advertising attribution space that at minimum, Mintegral appeared to be using this functionality to gather large amounts of data and commit ad attribution fraud. Their research showed that Mintegral was using code obfuscation and method swizzling to modify the functionality of base iOS SDK methods without the application owner’s knowledge. Further, their research proved that Mintegral was logging all HTTP requests including its headers which could even contain authorization tokens or other sensitive data.</p><p>Since that time Mintegral announced that they were opening the source of their SDK to the market. While the SDK can only be downloaded by registered partners, a major game publisher shared the source code with Snyk for further analysis. They also continued their research by digging deeper into the Android versions of the SDK in which they hadn’t found similar behaviors at the time of the initial disclosure. </p><p>This has resulted in some significant discoveries that necessitate an update to the previous disclosure. Additionally, Mintegral and the community at large have responded to the situation, and Snyk felt a summary of the events was a good way to finalize their research into this SDK.</p><p>Joining us on Research Saturday to discuss their research is Snyk's Alyssa Miller.</p><p>The original blog and Snyk's update can be found here:</p><ul>
<li><a href="https://snyk.io/blog/sourmint-malicious-code-ad-fraud-and-data-leak-in-ios/">SourMint: malicious code, ad fraud, and data leak in iOS</a></li>
<li><a href="https://snyk.io/blog/remote-code-execution-rce-sourmint/">SourMint: iOS remote code execution, Android findings, and community response</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1511</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[008497a6-e18d-11ea-be87-5b54acc83860]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1587410455.mp3?updated=1685108181" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Following DOJ indictment, a look back on NotPetya and Olympic Destroyer research. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/163/notes</link>
      <description>From US Department of Justice: "On Oct. 15, 2020, a federal grand jury in Pittsburgh returned an indictment charging six computer hackers, all of whom were residents and nationals of the Russian Federation (Russia) and officers in Unit 74455 of the Russian Main Intelligence Directorate (GRU), a military intelligence agency of the General Staff of the Armed Forces. 
These GRU hackers and their co-conspirators engaged in computer intrusions and attacks intended to support Russian government efforts to undermine, retaliate against, or otherwise destabilize: (1) Ukraine; (2) Georgia; (3) elections in France; (4) efforts to hold Russia accountable for its use of a weapons-grade nerve agent, Novichok, on foreign soil; and (5) the 2018 PyeongChang Winter Olympic Games after Russian athletes were banned from participating under their nation’s flag, as a consequence of Russian government-sponsored doping effort. 
Their computer attacks used some of the world’s most destructive malware to date, including: KillDisk and Industroyer, which each caused blackouts in Ukraine; NotPetya, which caused nearly $1 billion in losses to the three victims identified in the indictment alone; and Olympic Destroyer, which disrupted thousands of computers used to support the 2018 PyeongChang Winter Olympics. The indictment charges the defendants with conspiracy, computer hacking, wire fraud, aggravated identity theft, and false registration of a domain name."
Returning to Research Saturday this week to discuss their research of NotPetya and Olympic Destroyer are Cisco Talos' Craig Williams and Matt Olney.
The indictment and Cisco's research can be found here:

Six Russian GRU Officers Charged in Connection with Worldwide Deployment of Destructive Malware and Other Disruptive Actions in Cyberspace

New Ransomware Variant "Nyetya" Compromises Systems Worldwide

The MeDoc Connection

Who Wasn’t Responsible for Olympic Destroyer?

Olympic Destroyer Takes Aim At Winter Olympics


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Dec 2020 06:00:00 -0000</pubDate>
      <itunes:title>Following DOJ indictment, a look back on NotPetya and Olympic Destroyer research. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>163</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From US Department of Justice: "On Oct. 15, 2020, a federal grand jury in Pittsburgh returned an indictment charging six computer hackers, all of whom were residents and nationals of the Russian Federation (Russia) and officers in Unit 74455 of the Russian Main Intelligence Directorate (GRU), a military intelligence agency of the General Staff of the Armed Forces. 
These GRU hackers and their co-conspirators engaged in computer intrusions and attacks intended to support Russian government efforts to undermine, retaliate against, or otherwise destabilize: (1) Ukraine; (2) Georgia; (3) elections in France; (4) efforts to hold Russia accountable for its use of a weapons-grade nerve agent, Novichok, on foreign soil; and (5) the 2018 PyeongChang Winter Olympic Games after Russian athletes were banned from participating under their nation’s flag, as a consequence of Russian government-sponsored doping effort. 
Their computer attacks used some of the world’s most destructive malware to date, including: KillDisk and Industroyer, which each caused blackouts in Ukraine; NotPetya, which caused nearly $1 billion in losses to the three victims identified in the indictment alone; and Olympic Destroyer, which disrupted thousands of computers used to support the 2018 PyeongChang Winter Olympics. The indictment charges the defendants with conspiracy, computer hacking, wire fraud, aggravated identity theft, and false registration of a domain name."
Returning to Research Saturday this week to discuss their research of NotPetya and Olympic Destroyer are Cisco Talos' Craig Williams and Matt Olney.
The indictment and Cisco's research can be found here:

Six Russian GRU Officers Charged in Connection with Worldwide Deployment of Destructive Malware and Other Disruptive Actions in Cyberspace

New Ransomware Variant "Nyetya" Compromises Systems Worldwide

The MeDoc Connection

Who Wasn’t Responsible for Olympic Destroyer?

Olympic Destroyer Takes Aim At Winter Olympics


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From US Department of Justice: "On Oct. 15, 2020, a federal grand jury in Pittsburgh returned an indictment charging six computer hackers, all of whom were residents and nationals of the Russian Federation (Russia) and officers in Unit 74455 of the Russian Main Intelligence Directorate (GRU), a military intelligence agency of the General Staff of the Armed Forces. </p><p>These GRU hackers and their co-conspirators engaged in computer intrusions and attacks intended to support Russian government efforts to undermine, retaliate against, or otherwise destabilize: (1) Ukraine; (2) Georgia; (3) elections in France; (4) efforts to hold Russia accountable for its use of a weapons-grade nerve agent, Novichok, on foreign soil; and (5) the 2018 PyeongChang Winter Olympic Games after Russian athletes were banned from participating under their nation’s flag, as a consequence of Russian government-sponsored doping effort. </p><p>Their computer attacks used some of the world’s most destructive malware to date, including: KillDisk and Industroyer, which each caused blackouts in Ukraine; NotPetya, which caused nearly $1 billion in losses to the three victims identified in the indictment alone; and Olympic Destroyer, which disrupted thousands of computers used to support the 2018 PyeongChang Winter Olympics. The indictment charges the defendants with conspiracy, computer hacking, wire fraud, aggravated identity theft, and false registration of a domain name."</p><p>Returning to Research Saturday this week to discuss their research of NotPetya and Olympic Destroyer are Cisco Talos' Craig Williams and Matt Olney.</p><p>The indictment and Cisco's research can be found here:</p><ul>
<li><a href="https://www.justice.gov/opa/pr/six-russian-gru-officers-charged-connection-worldwide-deployment-destructive-malware-and">Six Russian GRU Officers Charged in Connection with Worldwide Deployment of Destructive Malware and Other Disruptive Actions in Cyberspace</a></li>
<li><a href="https://blog.talosintelligence.com/2017/06/worldwide-ransomware-variant.html">New Ransomware Variant "Nyetya" Compromises Systems Worldwide</a></li>
<li><a href="https://blog.talosintelligence.com/2017/07/the-medoc-connection.html">The MeDoc Connection</a></li>
<li><a href="https://blog.talosintelligence.com/2018/02/who-wasnt-responsible-for-olympic.html">Who Wasn’t Responsible for Olympic Destroyer?</a></li>
<li><a href="https://blog.talosintelligence.com/2018/02/olympic-destroyer.html">Olympic Destroyer Takes Aim At Winter Olympics</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1968</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[007fcfb4-e18d-11ea-be87-7fd83c95ca00]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1845233306.mp3?updated=1685108176" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SSL-based threats remain prevalent and are becoming increasingly sophisticated.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/162/notes</link>
      <description>While SSL/TLS encryption is the industry standard for protecting data in transit from prying eyes, encryption has, itself, become a threat. It is often leveraged by attackers to sneak malware past security tools that do not fully inspect encrypted traffic. As the percentage of traffic that is encrypted continues to grow, so do the opportunities for attackers to deliver threats through encrypted channels.
To better understand the use of encryption and the volume of encrypted traffic that is inspected, Zscaler's research team, ThreatLabZ, analyzed encrypted traffic across the Zscaler cloud for the first nine months of 2020, assessing its use within specific industries. The study also set out to analyze the types of attacks that use encryption and the extent of the current risk. 
Returning to Research Saturday this week to discuss the report is Zscaler's CISO and VP of Security Research, Deepen Desai.
The research can be found here:


2020: The State of Encrypted Attacks Blog


2020: The State of Encrypted Attacks Report


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Dec 2020 06:00:00 -0000</pubDate>
      <itunes:title>SSL-based threats remain prevalent and are becoming increasingly sophisticated.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>162</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>While SSL/TLS encryption is the industry standard for protecting data in transit from prying eyes, encryption has, itself, become a threat. It is often leveraged by attackers to sneak malware past security tools that do not fully inspect encrypted traffic. As the percentage of traffic that is encrypted continues to grow, so do the opportunities for attackers to deliver threats through encrypted channels.
To better understand the use of encryption and the volume of encrypted traffic that is inspected, Zscaler's research team, ThreatLabZ, analyzed encrypted traffic across the Zscaler cloud for the first nine months of 2020, assessing its use within specific industries. The study also set out to analyze the types of attacks that use encryption and the extent of the current risk. 
Returning to Research Saturday this week to discuss the report is Zscaler's CISO and VP of Security Research, Deepen Desai.
The research can be found here:


2020: The State of Encrypted Attacks Blog


2020: The State of Encrypted Attacks Report


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>While SSL/TLS encryption is the industry standard for protecting data in transit from prying eyes, encryption has, itself, become a threat. It is often leveraged by attackers to sneak malware past security tools that do not fully inspect encrypted traffic. As the percentage of traffic that is encrypted continues to grow, so do the opportunities for attackers to deliver threats through encrypted channels.</p><p>To better understand the use of encryption and the volume of encrypted traffic that is inspected, Zscaler's research team, ThreatLabZ, analyzed encrypted traffic across the Zscaler cloud for the first nine months of 2020, assessing its use within specific industries. The study also set out to analyze the types of attacks that use encryption and the extent of the current risk. </p><p>Returning to Research Saturday this week to discuss the report is Zscaler's CISO and VP of Security Research, Deepen Desai.</p><p>The research can be found here:</p><ul>
<li>
<a href="https://www.zscaler.com/blogs/security-research/2020-state-encrypted-attacks">2020: The State of Encrypted Attacks</a> Blog</li>
<li>
<a href="https://www.zscaler.com/resources/industry-reports/state-of-encrypted-attacks.pdf?_gl=1*1wdvp74*_ga*MjEyNTg3NDMyOC4xNTUxMzA3NDM4*_ga_10SPJ4YJL9*MTYwNzAyNTA1Mi4yNy4xLjE2MDcwMjUxNzguMA..&amp;_ga=2.250346053.2117749544.1606841800-2125874328.1551307438&amp;_gac=1.220309354.1605313467.CjwKCAiA17P9BRB2EiwAMvwNyBRy6rW_NLor9iMHlZc1cy2ANz8SzCZlF9ZG_3fc0mozOUFFofD7NBoC4KwQAvD_BwE">2020: The State of Encrypted Attacks</a> Report</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>956</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[007be5ca-e18d-11ea-be87-b3951512f12a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2925494894.mp3?updated=1685108162" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Using global events as lures for malicious activity. </title>
      <description>The goal of malicious activity is to compromise the system to install some unauthorized software. Increasingly that goal is tied to one thing: the user. Over the past several years, we as an industry improved exploit mitigation and the value of working exploits has increased accordingly. Together, these changes have had an impact on the threat landscape. We still see large amounts of active exploitation, but enterprises are getting better at defending against them.
This has left adversaries with a couple of options, develop or buy a working exploit that will defeat today's protections, which can be costly, or pivot to enticing a user to help you. In today's threat landscape, adversaries are always trying to develop and implement the most effective lures to try and draw users into their infection path. They've tried a multitude of different tactics in this space, but one always stands out — current events.
Joining us on this week's Research Saturday from Craig Williams from Cisco's Talos Outreach team to walk us through how current events are used as lures.
The research and blog post can be found here: 
Adversarial use of current events as lures

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Nov 2020 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Using global events as lures for malicious activity. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a393870a-2f66-11eb-b0be-b362837c736e/image/uploads_2F1606339400847-8si8u9rhfka-5125459826113c12a869d1e1022c1ed4_2Fuploads_2F1599328499255-a1g67iiui3o-7263d31970ec3d34bd92acf6dd108a9a_2Fcyberwire-research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The goal of malicious activity is to compromise the system to install some unauthorized software. Increasingly that goal is tied to one thing: the user. Over the past several years, we as an industry improved exploit mitigation and the value of working exploits has increased accordingly. Together, these changes have had an impact on the threat landscape. We still see large amounts of active exploitation, but enterprises are getting better at defending against them.
This has left adversaries with a couple of options, develop or buy a working exploit that will defeat today's protections, which can be costly, or pivot to enticing a user to help you. In today's threat landscape, adversaries are always trying to develop and implement the most effective lures to try and draw users into their infection path. They've tried a multitude of different tactics in this space, but one always stands out — current events.
Joining us on this week's Research Saturday from Craig Williams from Cisco's Talos Outreach team to walk us through how current events are used as lures.
The research and blog post can be found here: 
Adversarial use of current events as lures

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The goal of malicious activity is to compromise the system to install some unauthorized software. Increasingly that goal is tied to one thing: the user. Over the past several years, we as an industry improved exploit mitigation and the value of working exploits has increased accordingly. Together, these changes have had an impact on the threat landscape. We still see large amounts of active exploitation, but enterprises are getting better at defending against them.</p><p>This has left adversaries with a couple of options, develop or buy a working exploit that will defeat today's protections, which can be costly, or pivot to enticing a user to help you. In today's threat landscape, adversaries are always trying to develop and implement the most effective lures to try and draw users into their infection path. They've tried a multitude of different tactics in this space, but one always stands out — current events.</p><p>Joining us on this week's Research Saturday from Craig Williams from Cisco's Talos Outreach team to walk us through how current events are used as lures.</p><p>The research and blog post can be found here: </p><ul><li><a href="https://blog.talosintelligence.com/2020/07/current-events-lures.html">Adversarial use of current events as lures</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1252</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a393870a-2f66-11eb-b0be-b362837c736e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9694992958.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Misconfigured identity and access management (IAM) is much more widespread.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/161/notes</link>
      <description>Identity and access are intrinsically connected when providing security to cloud platforms. But security is only effective when environments are properly configured and maintained. In the 2H 2020 edition of the biannual Unit 42 Cloud Threat Report, researchers conducted Red Team exercises, scanned public cloud data and pulled proprietary Palo Alto Networks data to explore the threat landscape of identity and access management (IAM) and identify where organizations can improve their IAM configurations.
During a Red Team exercise, Unit 42 researchers were able to discover and leverage IAM misconfigurations to obtain admin access to a customer’s entire Amazon Web Services (AWS) cloud environment – a potentially multi-million dollar data breach in the real-world. These examples highlight just how serious the failure to secure IAM can be for an organization.
Joining us in this week's Research Saturday to discuss the report for Palo Alto Networks' Unit 42 is CSO of Public Cloud, Matt Chiodi.
The research can be found here:
Highlights from the Unit 42 Cloud Threat Report, 2H 2020

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Nov 2020 06:00:00 -0000</pubDate>
      <itunes:title>Misconfigured identity and access management (IAM) is much more widespread.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>161</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Identity and access are intrinsically connected when providing security to cloud platforms. But security is only effective when environments are properly configured and maintained. In the 2H 2020 edition of the biannual Unit 42 Cloud Threat Report, researchers conducted Red Team exercises, scanned public cloud data and pulled proprietary Palo Alto Networks data to explore the threat landscape of identity and access management (IAM) and identify where organizations can improve their IAM configurations.
During a Red Team exercise, Unit 42 researchers were able to discover and leverage IAM misconfigurations to obtain admin access to a customer’s entire Amazon Web Services (AWS) cloud environment – a potentially multi-million dollar data breach in the real-world. These examples highlight just how serious the failure to secure IAM can be for an organization.
Joining us in this week's Research Saturday to discuss the report for Palo Alto Networks' Unit 42 is CSO of Public Cloud, Matt Chiodi.
The research can be found here:
Highlights from the Unit 42 Cloud Threat Report, 2H 2020

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Identity and access are intrinsically connected when providing security to cloud platforms. But security is only effective when environments are properly configured and maintained. In the 2H 2020 edition of the biannual Unit 42 Cloud Threat Report, researchers conducted Red Team exercises, scanned public cloud data and pulled proprietary Palo Alto Networks data to explore the threat landscape of identity and access management (IAM) and identify where organizations can improve their IAM configurations.</p><p>During a Red Team exercise, Unit 42 researchers were able to discover and leverage IAM misconfigurations to obtain admin access to a customer’s entire Amazon Web Services (AWS) cloud environment – a potentially multi-million dollar data breach in the real-world. These examples highlight just how serious the failure to secure IAM can be for an organization.</p><p>Joining us in this week's Research Saturday to discuss the report for Palo Alto Networks' Unit 42 is CSO of Public Cloud, Matt Chiodi.</p><p>The research can be found here:</p><ul><li><a href="https://unit42.paloaltonetworks.com/highlight-cloud-threat-report-iam/">Highlights from the Unit 42 Cloud Threat Report, 2H 2020</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1181</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[007379ee-e18d-11ea-be87-b3c800da0494]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1433350662.mp3?updated=1685108155" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>That first CVE was a fun find, for sure. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/160/notes</link>
      <description>In the late 90s, hackers who discovered vulnerabilities would sometimes send an email to Bugtraq with details. Bugtraq was a notification system used by people with an interest in network security. It was also a place that might have been monitored by employees of software companies looking for reports of vulnerabilities pertaining to their software. The problem was - there wasn't an easy way to track specific vulnerabilities in specific products. 
It was May 1999. Larry Cashdollar was working as a system administrator for Bath Iron Works under contract by Computer Sciences Corporation. Specifically, he was a UNIX Systems Administrator, level one. His team managed over 3,000 UNIX systems across BIW's campuses. Most of these were CAD systems used for designing AEGIS class destroyers. This position gave me access to over 3,000 various flavors of UNIX ranging from Sun Solaris to IBM AIX.
Joining us in this week's Research Saturday to discuss his journey from finding that first CVE through the next 20 years and hundreds of CVEs is Akamai Senior Response Engineer Larry Cashdollar.
The research can be found here: 
MUSIC TO HACK TO: MY FIRST CVE AND 20 YEARS OF VULNERABILITY RESEARCH

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Nov 2020 06:00:00 -0000</pubDate>
      <itunes:title>That first CVE was a fun find, for sure. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>160</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In the late 90s, hackers who discovered vulnerabilities would sometimes send an email to Bugtraq with details. Bugtraq was a notification system used by people with an interest in network security. It was also a place that might have been monitored by employees of software companies looking for reports of vulnerabilities pertaining to their software. The problem was - there wasn't an easy way to track specific vulnerabilities in specific products. 
It was May 1999. Larry Cashdollar was working as a system administrator for Bath Iron Works under contract by Computer Sciences Corporation. Specifically, he was a UNIX Systems Administrator, level one. His team managed over 3,000 UNIX systems across BIW's campuses. Most of these were CAD systems used for designing AEGIS class destroyers. This position gave me access to over 3,000 various flavors of UNIX ranging from Sun Solaris to IBM AIX.
Joining us in this week's Research Saturday to discuss his journey from finding that first CVE through the next 20 years and hundreds of CVEs is Akamai Senior Response Engineer Larry Cashdollar.
The research can be found here: 
MUSIC TO HACK TO: MY FIRST CVE AND 20 YEARS OF VULNERABILITY RESEARCH

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In the late 90s, hackers who discovered vulnerabilities would sometimes send an email to Bugtraq with details. Bugtraq was a notification system used by people with an interest in network security. It was also a place that might have been monitored by employees of software companies looking for reports of vulnerabilities pertaining to their software. The problem was - there wasn't an easy way to track specific vulnerabilities in specific products. </p><p>It was May 1999. Larry Cashdollar was working as a system administrator for Bath Iron Works under contract by Computer Sciences Corporation. Specifically, he was a UNIX Systems Administrator, level one. His team managed over 3,000 UNIX systems across BIW's campuses. Most of these were CAD systems used for designing AEGIS class destroyers. This position gave me access to over 3,000 various flavors of UNIX ranging from Sun Solaris to IBM AIX.</p><p>Joining us in this week's Research Saturday to discuss his journey from finding that first CVE through the next 20 years and hundreds of CVEs is Akamai Senior Response Engineer Larry Cashdollar.</p><p>The research can be found here: </p><ul><li><a href="https://blogs.akamai.com/sitr/2020/10/music-to-hack-to-my-first-cve-and-20-years-of-vulnerability-research.html">MUSIC TO HACK TO: MY FIRST CVE AND 20 YEARS OF VULNERABILITY RESEARCH</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1656</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[006f6b1a-e18d-11ea-be87-6ba3165c7d59]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9932813454.mp3?updated=1685108149" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>PoetRAT: a complete lack of operational security.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/159/notes</link>
      <description>Cisco Talos discovered PoetRAT earlier this year. Since then, they observed multiple new campaigns indicating a change in the actor's capabilities and showing their maturity toward better operational security. They assess with medium confidence this actor continues to use spear-phishing attacks to lure a user to download a malicious document from temporary hosting providers. They currently believe the malware comes from malicious URLs included in the email, resulting in the user clicking and downloading a malicious document. These Word documents continue to contain malicious macros, which in turn download additional payloads once the attacker sets their sites on a particular victim. As the geopolitical tensions grow in Azerbaijan with neighboring countries, this is no doubt a stage of espionage with national security implications being deployed by a malicious actor with a specific interest in various Azerbajiani government departments.
Joining us in this week's Research Saturday to discuss the research from Cisco's Talos Outreach is Craig Williams.
The research can be found here: 
PoetRAT: Malware targeting public and private sector in Azerbaijan evolves

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Nov 2020 06:00:00 -0000</pubDate>
      <itunes:title>PoetRAT: a complete lack of operational security.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>159</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cisco Talos discovered PoetRAT earlier this year. Since then, they observed multiple new campaigns indicating a change in the actor's capabilities and showing their maturity toward better operational security. They assess with medium confidence this actor continues to use spear-phishing attacks to lure a user to download a malicious document from temporary hosting providers. They currently believe the malware comes from malicious URLs included in the email, resulting in the user clicking and downloading a malicious document. These Word documents continue to contain malicious macros, which in turn download additional payloads once the attacker sets their sites on a particular victim. As the geopolitical tensions grow in Azerbaijan with neighboring countries, this is no doubt a stage of espionage with national security implications being deployed by a malicious actor with a specific interest in various Azerbajiani government departments.
Joining us in this week's Research Saturday to discuss the research from Cisco's Talos Outreach is Craig Williams.
The research can be found here: 
PoetRAT: Malware targeting public and private sector in Azerbaijan evolves

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cisco Talos discovered PoetRAT earlier this year. Since then, they observed multiple new campaigns indicating a change in the actor's capabilities and showing their maturity toward better operational security. They assess with medium confidence this actor continues to use spear-phishing attacks to lure a user to download a malicious document from temporary hosting providers. They currently believe the malware comes from malicious URLs included in the email, resulting in the user clicking and downloading a malicious document. These Word documents continue to contain malicious macros, which in turn download additional payloads once the attacker sets their sites on a particular victim. As the geopolitical tensions grow in Azerbaijan with neighboring countries, this is no doubt a stage of espionage with national security implications being deployed by a malicious actor with a specific interest in various Azerbajiani government departments.</p><p>Joining us in this week's Research Saturday to discuss the research from Cisco's Talos Outreach is Craig Williams.</p><p>The research can be found here: </p><ul><li><a href="https://blog.talosintelligence.com/2020/10/poetrat-update.html?m=1">PoetRAT: Malware targeting public and private sector in Azerbaijan evolves</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1260</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[005adfec-e18d-11ea-be87-6b81f138c91f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1683025967.mp3?updated=1685108139" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leveraging for a bigger objective. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/158/notes</link>
      <description>The U.S. government has charged seven men in relation to hundreds of cyber attacks against organizations in the U.S. and multiple other countries in Asia and Europe. Two of the men, who were based in Malaysia, were arrested and their extradition to the U.S. has been requested. The other five are based in China and remain at large.
The attacks were attributed to a China-linked organization dubbed APT41 and involved a combination of intellectual property theft and financially motivated cyber crime. While some of our peers monitor APT41 as a single operation, Symantec regards it as two distinct actors: Grayfly and Blackfly.
Joining us in this week's Research Saturday to discuss the research from Symantec's Threat Hunter Team is Jon DiMaggio.
The research can be found here: 
APT41: Indictments Put Chinese Espionage Group in the Spotlight

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 31 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>Leveraging for a bigger objective. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>158</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The U.S. government has charged seven men in relation to hundreds of cyber attacks against organizations in the U.S. and multiple other countries in Asia and Europe. Two of the men, who were based in Malaysia, were arrested and their extradition to the U.S. has been requested. The other five are based in China and remain at large.
The attacks were attributed to a China-linked organization dubbed APT41 and involved a combination of intellectual property theft and financially motivated cyber crime. While some of our peers monitor APT41 as a single operation, Symantec regards it as two distinct actors: Grayfly and Blackfly.
Joining us in this week's Research Saturday to discuss the research from Symantec's Threat Hunter Team is Jon DiMaggio.
The research can be found here: 
APT41: Indictments Put Chinese Espionage Group in the Spotlight

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The U.S. government has charged seven men in relation to hundreds of cyber attacks against organizations in the U.S. and multiple other countries in Asia and Europe. Two of the men, who were based in Malaysia, were arrested and their extradition to the U.S. has been requested. The other five are based in China and remain at large.</p><p>The attacks were attributed to a China-linked organization dubbed APT41 and involved a combination of intellectual property theft and financially motivated cyber crime. While some of our peers monitor APT41 as a single operation, Symantec regards it as two distinct actors: Grayfly and Blackfly.</p><p>Joining us in this week's Research Saturday to discuss the research from Symantec's Threat Hunter Team is Jon DiMaggio.</p><p>The research can be found here: </p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/apt41-indictments-china-espionage">APT41: Indictments Put Chinese Espionage Group in the Spotlight</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1484</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[006b305e-e18d-11ea-be87-171392f70956]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5294394686.mp3?updated=1685108132" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Malware Mash!</title>
      <link>https://thecyberwire.com/stories/123bc0f691444be6af3145a6dab6cee4/malware-mash</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 30 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>The Malware Mash!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>185</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cb475a3a-18a8-11eb-98c8-bf86c71f8125]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4950110282.mp3?updated=1666877087" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Just saying there are attacks is not enough. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/157/notes</link>
      <description>Ben-Gurion University researchers have developed a new artificial intelligence technique that will protect medical devices from malicious operating instructions in a cyberattack as well as other human and system errors. Complex medical devices such as CT (computed tomography), MRI (magnetic resonance imaging) and ultrasound machines are controlled by instructions sent from a host PC. Abnormal or anomalous instructions introduce many potentially harmful threats to patients, such as radiation overexposure, manipulation of device components or functional manipulation of medical images. Threats can occur due to cyberattacks, human errors such as a technician's configuration mistake or host PC software bugs.
As part of his Ph.D. research, Tom Mahler has developed a technique using artificial intelligence that analyzes the instructions sent from the PC to the physical components using a new architecture for the detection of anomalous instructions.
Joining us in this week's Research Saturday to discuss his research is CBG - Cyber@Ben Gurion University's Tom Mahler.
The research can be found here: 
A Dual-Layer Architecture for the Protection of Medical Devices from Anomalous Instructions

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>Just saying there are attacks is not enough. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>157</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ben-Gurion University researchers have developed a new artificial intelligence technique that will protect medical devices from malicious operating instructions in a cyberattack as well as other human and system errors. Complex medical devices such as CT (computed tomography), MRI (magnetic resonance imaging) and ultrasound machines are controlled by instructions sent from a host PC. Abnormal or anomalous instructions introduce many potentially harmful threats to patients, such as radiation overexposure, manipulation of device components or functional manipulation of medical images. Threats can occur due to cyberattacks, human errors such as a technician's configuration mistake or host PC software bugs.
As part of his Ph.D. research, Tom Mahler has developed a technique using artificial intelligence that analyzes the instructions sent from the PC to the physical components using a new architecture for the detection of anomalous instructions.
Joining us in this week's Research Saturday to discuss his research is CBG - Cyber@Ben Gurion University's Tom Mahler.
The research can be found here: 
A Dual-Layer Architecture for the Protection of Medical Devices from Anomalous Instructions

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ben-Gurion University researchers have developed a new artificial intelligence technique that will protect medical devices from malicious operating instructions in a cyberattack as well as other human and system errors. Complex medical devices such as CT (computed tomography), MRI (magnetic resonance imaging) and ultrasound machines are controlled by instructions sent from a host PC. Abnormal or anomalous instructions introduce many potentially harmful threats to patients, such as radiation overexposure, manipulation of device components or functional manipulation of medical images. Threats can occur due to cyberattacks, human errors such as a technician's configuration mistake or host PC software bugs.</p><p>As part of his Ph.D. research, Tom Mahler has developed a technique using artificial intelligence that analyzes the instructions sent from the PC to the physical components using a new architecture for the detection of anomalous instructions.</p><p>Joining us in this week's Research Saturday to discuss his research is CBG - Cyber@Ben Gurion University's Tom Mahler.</p><p>The research can be found here: </p><ul><li><a href="https://link.springer.com/chapter/10.1007/978-3-030-59137-3_25">A Dual-Layer Architecture for the Protection of Medical Devices from Anomalous Instructions</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1598</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00670e66-e18d-11ea-be87-a78f44d9a0a7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1296534022.mp3?updated=1685108122" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Intentionally not drawing attention. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/156/notes</link>
      <description>Bitdefender researchers recently uncovered a sophisticated APT-style attack targeting an international architectural and video production company. The attack shows signs of industrial espionage, similar to another of Bitdefender’s recent investigations of the StrongPity APT group. The real-estate industry is highly competitive, and information exfiltrated by APT mercenary group can give negotiation advantages to other players in high-profile real-estate contracts.
While APT groups traditionally could only be afforded by governments or were financially motivated purely out of self-interest, they recently appear to have become a commodity.
Joining us in this week's Research Saturday to discuss the research is Global Cybersecurity Researcher Liviu Arsene from Bitdefender.
The research can be found here: 
APT Hackers for Hire Used for Industrial Espionage

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>Intentionally not drawing attention. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>156</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Bitdefender researchers recently uncovered a sophisticated APT-style attack targeting an international architectural and video production company. The attack shows signs of industrial espionage, similar to another of Bitdefender’s recent investigations of the StrongPity APT group. The real-estate industry is highly competitive, and information exfiltrated by APT mercenary group can give negotiation advantages to other players in high-profile real-estate contracts.
While APT groups traditionally could only be afforded by governments or were financially motivated purely out of self-interest, they recently appear to have become a commodity.
Joining us in this week's Research Saturday to discuss the research is Global Cybersecurity Researcher Liviu Arsene from Bitdefender.
The research can be found here: 
APT Hackers for Hire Used for Industrial Espionage

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Bitdefender researchers recently uncovered a sophisticated APT-style attack targeting an international architectural and video production company. The attack shows signs of industrial espionage, similar to another of Bitdefender’s recent investigations of the StrongPity APT group. The real-estate industry is highly competitive, and information exfiltrated by APT mercenary group can give negotiation advantages to other players in high-profile real-estate contracts.</p><p>While APT groups traditionally could only be afforded by governments or were financially motivated purely out of self-interest, they recently appear to have become a commodity.</p><p>Joining us in this week's Research Saturday to discuss the research is Global Cybersecurity Researcher Liviu Arsene from Bitdefender.</p><p>The research can be found here: </p><ul><li><a href="https://labs.bitdefender.com/2020/08/apt-hackers-for-hire-used-for-industrial-espionage/">APT Hackers for Hire Used for Industrial Espionage</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1479</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00630f0a-e18d-11ea-be87-4f7231e3de4f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2856151398.mp3?updated=1685108111" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>It's still possible to find ways to break out.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/155/notes</link>
      <description>Containers offer speed, performance, and portability, but do they actually contain? While they try their best, the shared kernel is a disturbing attack surface: a mere kernel vulnerability may allow containerized processes to escape and compromise the host. This issue prompted a new wave of sandboxing tools that use either unikernels, lightweight VMs or userspace-kernels to separate the host OS from the container's OS.
One of these solutions is Kata Containers, a container runtime that spawns each container inside a lightweight VM, and can function as the underlying runtime in Docker and Kubernetes. Kata's virtualized containers provide two layers of isolation: even if an attacker breaks out of the container, he is still confined to the microVM.
Joining us in this week's Research Saturday to discuss the research is Yuval Avrahami from Palo Alto Networks Unit 42.
The research presented at Black Hat USA 2020 can be found here: 
Escaping Virtualized Containers

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>It's still possible to find ways to break out.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>155</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Containers offer speed, performance, and portability, but do they actually contain? While they try their best, the shared kernel is a disturbing attack surface: a mere kernel vulnerability may allow containerized processes to escape and compromise the host. This issue prompted a new wave of sandboxing tools that use either unikernels, lightweight VMs or userspace-kernels to separate the host OS from the container's OS.
One of these solutions is Kata Containers, a container runtime that spawns each container inside a lightweight VM, and can function as the underlying runtime in Docker and Kubernetes. Kata's virtualized containers provide two layers of isolation: even if an attacker breaks out of the container, he is still confined to the microVM.
Joining us in this week's Research Saturday to discuss the research is Yuval Avrahami from Palo Alto Networks Unit 42.
The research presented at Black Hat USA 2020 can be found here: 
Escaping Virtualized Containers

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Containers offer speed, performance, and portability, but do they actually contain? While they try their best, the shared kernel is a disturbing attack surface: a mere kernel vulnerability may allow containerized processes to escape and compromise the host. This issue prompted a new wave of sandboxing tools that use either unikernels, lightweight VMs or userspace-kernels to separate the host OS from the container's OS.</p><p>One of these solutions is Kata Containers, a container runtime that spawns each container inside a lightweight VM, and can function as the underlying runtime in Docker and Kubernetes. Kata's virtualized containers provide two layers of isolation: even if an attacker breaks out of the container, he is still confined to the microVM.</p><p>Joining us in this week's Research Saturday to discuss the research is Yuval Avrahami from Palo Alto Networks Unit 42.</p><p>The research presented at Black Hat USA 2020 can be found here: </p><ul><li><a href="https://www.blackhat.com/us-20/briefings/schedule/index.html#escaping-virtualized-containers-20514">Escaping Virtualized Containers</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1139</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[005efd48-e18d-11ea-be87-db451aaa3753]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8316723881.mp3?updated=1685107963" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Smaug: Ransomware-as-a-service drag(s)on.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/154/notes</link>
      <description>Threat actors and cybercriminals that don’t have the ability to develop their own ransomware for malicious campaigns can turn to the Smaug Ransomware as a Service (RaaS) offering, which is available via a Dark Web Onion site. At least two threat actors are operating the site, providing ransomware that can be used to target Windows, macOS, and Linux machines. The site is built with ease of use in mind. To launch an attack, threat actors simply need to sign up, create a campaign, and then start distributing the malware. The site also handles decryption key purchasing and tracking for victims.
Joining us in this week's Research Saturday to discuss the research is Anomali's Joakim Kennedy and Rory Gould.
The research can be found here: 
Anomali Threat Research Releases First Public Analysis of Smaug Ransomware as a Service

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>Smaug: Ransomware-as-a-service drag(s)on.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>154</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Threat actors and cybercriminals that don’t have the ability to develop their own ransomware for malicious campaigns can turn to the Smaug Ransomware as a Service (RaaS) offering, which is available via a Dark Web Onion site. At least two threat actors are operating the site, providing ransomware that can be used to target Windows, macOS, and Linux machines. The site is built with ease of use in mind. To launch an attack, threat actors simply need to sign up, create a campaign, and then start distributing the malware. The site also handles decryption key purchasing and tracking for victims.
Joining us in this week's Research Saturday to discuss the research is Anomali's Joakim Kennedy and Rory Gould.
The research can be found here: 
Anomali Threat Research Releases First Public Analysis of Smaug Ransomware as a Service

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Threat actors and cybercriminals that don’t have the ability to develop their own ransomware for malicious campaigns can turn to the Smaug Ransomware as a Service (RaaS) offering, which is available via a Dark Web Onion site. At least two threat actors are operating the site, providing ransomware that can be used to target Windows, macOS, and Linux machines. The site is built with ease of use in mind. To launch an attack, threat actors simply need to sign up, create a campaign, and then start distributing the malware. The site also handles decryption key purchasing and tracking for victims.</p><p>Joining us in this week's Research Saturday to discuss the research is Anomali's Joakim Kennedy and Rory Gould.</p><p>The research can be found here: </p><ul><li><a href="https://www.anomali.com/blog/anomali-threat-research-releases-first-public-analysis-of-smaug-ransomware-as-a-service">Anomali Threat Research Releases First Public Analysis of Smaug Ransomware as a Service</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1357</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0056b84a-e18d-11ea-be87-f783292a6d30]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6423319185.mp3?updated=1685108099" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What came first, the Golden Chickens or more_eggs? </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/153/notes</link>
      <description>Throughout March and April, QuoIntelligence (QuoINT) observed four attacks (i.e. sightings) utilizing various tools from the Golden Chickens (GC) Malware-as-a-Service (MaaS) portfolio – they recently declassified their findings, after first notifying their clients. Further, during their analysis of the sightings, QuoIntelligence confirmed the GC MaaS Operator, Badbullzvenom, released improved variants with code updates to three tools in the service portfolio.
Joining us in this week's Research Saturday to discuss the research is QuoIntelligence's Vice President of Threat Intelligence, Chaz Hobson. 
The research can be found here: 
Latest Golden Chickens MaaS Tools Updates and Observed Attacks

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>What came first, the Golden Chickens or more_eggs? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>153</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Throughout March and April, QuoIntelligence (QuoINT) observed four attacks (i.e. sightings) utilizing various tools from the Golden Chickens (GC) Malware-as-a-Service (MaaS) portfolio – they recently declassified their findings, after first notifying their clients. Further, during their analysis of the sightings, QuoIntelligence confirmed the GC MaaS Operator, Badbullzvenom, released improved variants with code updates to three tools in the service portfolio.
Joining us in this week's Research Saturday to discuss the research is QuoIntelligence's Vice President of Threat Intelligence, Chaz Hobson. 
The research can be found here: 
Latest Golden Chickens MaaS Tools Updates and Observed Attacks

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Throughout March and April, QuoIntelligence (QuoINT) observed four attacks (i.e. sightings) utilizing various tools from the Golden Chickens (GC) Malware-as-a-Service (MaaS) portfolio – they recently declassified their findings, after first notifying their clients. Further, during their analysis of the sightings, QuoIntelligence confirmed the GC MaaS Operator, Badbullzvenom, released improved variants with code updates to three tools in the service portfolio.</p><p>Joining us in this week's Research Saturday to discuss the research is QuoIntelligence's Vice President of Threat Intelligence, Chaz Hobson. </p><p>The research can be found here: </p><ul><li><a href="https://quointelligence.eu/2020/07/golden-chickens-evolution-of-the-maas/">Latest Golden Chickens MaaS Tools Updates and Observed Attacks</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1116</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00527690-e18d-11ea-be87-8f0a55af4a45]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9126392162.mp3?updated=1685108088" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Election 2020: What to expect when we are electing. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/152/notes</link>
      <description>After the 2016 General Election, the talk was all around foreign meddling. Rumors swirled that some votes may have been changed or influenced by state-sponsored actors. Sanctions and accusations followed. Four years later, is the U.S. any more prepared to protect the results of its largest elections? More than you may realize.
Talos researchers take a deep dive into election security after spending the past four years talking to local, state and national officials, performing their own independent research and even watching one state plan an election in real-time.
Joining us in this week's Research Saturday to discuss the report on this timely topic is Cisco Talos' Matt Olney. 
The research can be found here: 

What to expect when you’re electing: Talos’ 2020 election security primer.

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>Election 2020: What to expect when we are electing. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>152</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>After the 2016 General Election, the talk was all around foreign meddling. Rumors swirled that some votes may have been changed or influenced by state-sponsored actors. Sanctions and accusations followed. Four years later, is the U.S. any more prepared to protect the results of its largest elections? More than you may realize.
Talos researchers take a deep dive into election security after spending the past four years talking to local, state and national officials, performing their own independent research and even watching one state plan an election in real-time.
Joining us in this week's Research Saturday to discuss the report on this timely topic is Cisco Talos' Matt Olney. 
The research can be found here: 

What to expect when you’re electing: Talos’ 2020 election security primer.

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>After the 2016 General Election, the talk was all around foreign meddling. Rumors swirled that some votes may have been changed or influenced by state-sponsored actors. Sanctions and accusations followed. Four years later, is the U.S. any more prepared to protect the results of its largest elections? More than you may realize.</p><p>Talos researchers take a deep dive into election security after spending the past four years talking to local, state and national officials, performing their own independent research and even watching one state plan an election in real-time.</p><p>Joining us in this week's Research Saturday to discuss the report on this timely topic is Cisco Talos' Matt Olney. </p><p>The research can be found here: </p><ul><li>
<a href="https://blog.talosintelligence.com/2020/07/what-to-expect-when-youre-electing.html">What to expect when you’re electing: Talos’ 2020 election security primer</a>.</li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1428</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[004d0c32-e18d-11ea-be87-77bdc473964d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8595626444.mp3?updated=1685108082" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leveraging legitimate tools. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/151/notes</link>
      <description>Researchers at Symantec spotted a Sodinokibi targeted ransomware campaign in which the attackers are also scanning the networks of some victims for credit card or point of sale (PoS) software.
It is not clear if the attackers are targeting this software for encryption or because they want to scrape this information as a way to make even more money from this attack.
Joining us in this week's Research Saturday to discuss the report is Jon DiMaggio of Symantec. 
The research can be found here: 
Sodinokibi: Ransomware Attackers also Scanning for PoS Software, Leveraging Cobalt Strike

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>Leveraging legitimate tools. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>151</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Symantec spotted a Sodinokibi targeted ransomware campaign in which the attackers are also scanning the networks of some victims for credit card or point of sale (PoS) software.
It is not clear if the attackers are targeting this software for encryption or because they want to scrape this information as a way to make even more money from this attack.
Joining us in this week's Research Saturday to discuss the report is Jon DiMaggio of Symantec. 
The research can be found here: 
Sodinokibi: Ransomware Attackers also Scanning for PoS Software, Leveraging Cobalt Strike

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Symantec spotted a Sodinokibi targeted ransomware campaign in which the attackers are also scanning the networks of some victims for credit card or point of sale (PoS) software.</p><p>It is not clear if the attackers are targeting this software for encryption or because they want to scrape this information as a way to make even more money from this attack.</p><p>Joining us in this week's Research Saturday to discuss the report is Jon DiMaggio of Symantec. </p><p>The research can be found here: </p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/sodinokibi-ransomware-cobalt-strike-pos">Sodinokibi: Ransomware Attackers also Scanning for PoS Software, Leveraging Cobalt Strike</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1868</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d8c7e5ae-de50-11ea-a709-63425edaca8d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5346620689.mp3?updated=1685107946" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Going after the most valuable data. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/150/notes</link>
      <description>A look at the realities of ransomware from Sophos, including an industry-first detailed look at new detection evasion techniques in WastedLocker ransomware attacks that leverage the Windows Cache Manager and memory-mapped I/O to encrypt files. A complementary article examines the evasion-centric arms race of ransomware, providing a months-long review of how cybercriminals have been escalating and markedly changing evasion techniques, tactics and procedures (TTPs) since Snatch ransomware in December 2019. 
The research also breaks down the five early warning signs organizations are about to be attacked by ransomware and why ransomware attacks continue to occur.
Joining us on this week's Research Saturday to walk us through the research and share their findings is Sophos' Principal Research Scientist Chet Wisniewski and EVP &amp; Chief Product Officer Dan Schiappa.
The media alert and research articles can be found here: 

Media Alert: Sophos Reports on the Realities of Ransomware

WastedLocker’s techniques point to a familiar heritage

Ransomware’s evasion-centric arms race

5 signs you’re about to be hit by ransomware

The realities of ransomware: extortion goes social

Ransomware: why it’s not just a passing fad


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>Going after the most valuable data. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>150</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A look at the realities of ransomware from Sophos, including an industry-first detailed look at new detection evasion techniques in WastedLocker ransomware attacks that leverage the Windows Cache Manager and memory-mapped I/O to encrypt files. A complementary article examines the evasion-centric arms race of ransomware, providing a months-long review of how cybercriminals have been escalating and markedly changing evasion techniques, tactics and procedures (TTPs) since Snatch ransomware in December 2019. 
The research also breaks down the five early warning signs organizations are about to be attacked by ransomware and why ransomware attacks continue to occur.
Joining us on this week's Research Saturday to walk us through the research and share their findings is Sophos' Principal Research Scientist Chet Wisniewski and EVP &amp; Chief Product Officer Dan Schiappa.
The media alert and research articles can be found here: 

Media Alert: Sophos Reports on the Realities of Ransomware

WastedLocker’s techniques point to a familiar heritage

Ransomware’s evasion-centric arms race

5 signs you’re about to be hit by ransomware

The realities of ransomware: extortion goes social

Ransomware: why it’s not just a passing fad


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A look at the realities of ransomware from Sophos, including an industry-first detailed look at new detection evasion techniques in WastedLocker ransomware attacks that leverage the Windows Cache Manager and memory-mapped I/O to encrypt files. A complementary article examines the evasion-centric arms race of ransomware, providing a months-long review of how cybercriminals have been escalating and markedly changing evasion techniques, tactics and procedures (TTPs) since Snatch ransomware in December 2019. </p><p>The research also breaks down the five early warning signs organizations are about to be attacked by ransomware and why ransomware attacks continue to occur.</p><p>Joining us on this week's Research Saturday to walk us through the research and share their findings is Sophos' Principal Research Scientist Chet Wisniewski and EVP &amp; Chief Product Officer Dan Schiappa.</p><p>The media alert and research articles can be found here: </p><ul>
<li><a href="https://www.sophos.com/en-us/press-office/press-releases/2020/08/sophos-reports-on-the-realities-of-ransomware.aspx">Media Alert: Sophos Reports on the Realities of Ransomware</a></li>
<li><a href="https://news.sophos.com/en-us/2020/08/04/wastedlocker-techniques-point-to-a-familiar-heritage">WastedLocker’s techniques point to a familiar heritage</a></li>
<li><a href="https://news.sophos.com/en-us/2020/08/04/the-realities-of-ransomware-the-evasion-arms-race">Ransomware’s evasion-centric arms race</a></li>
<li><a href="https://news.sophos.com/en-us/2020/08/04/the-realities-of-ransomware-five-signs-youre-about-to-be-attacked">5 signs you’re about to be hit by ransomware</a></li>
<li><a href="https://news.sophos.com/en-us/2020/08/04/the-realities-of-ransomware-extortion-goes-social-in-2020">The realities of ransomware: extortion goes social</a></li>
<li><a href="https://news.sophos.com/en-us/2020/08/04/the-realities-of-ransomware-why-its-not-just-a-passing-fad">Ransomware: why it’s not just a passing fad</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1521</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d8c3e06c-de50-11ea-a709-334a73d64709]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1100480878.mp3?updated=1685108069" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>They fooled a lot of people. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/149/notes</link>
      <description>Docker containers have been gaining popularity over the past few years as an effective way of packaging software applications. Docker Hub provides a strong community-based model for users and companies to share their software applications. This is also attracting the attention of malicious actors intending to make money by cryptojacking within Docker containers and using Docker Hub to distribute these images.
Palo Alto Networks' Unit 42 researchers identified a malicious Docker Hub account, azurenql, active since October 2019 that was hosting six malicious images intended to mine the cryptocurrency, Monero. The images hosted on this account have been collectively pulled more than two million times. Additionally, when last checked minexmr.com for this wallet ID, Palo Alto's team saw recent activity indicating that it’s still being used.
Joining us on this week's Research Saturday is Jen Miller-Osborn from Palo Alto Networks' Unit 42 group to share the research and findings.
The research and blog post can be found here: 
Attackers Cryptojacking Docker Images to Mine for Monero

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:title>They fooled a lot of people. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>149</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Docker containers have been gaining popularity over the past few years as an effective way of packaging software applications. Docker Hub provides a strong community-based model for users and companies to share their software applications. This is also attracting the attention of malicious actors intending to make money by cryptojacking within Docker containers and using Docker Hub to distribute these images.
Palo Alto Networks' Unit 42 researchers identified a malicious Docker Hub account, azurenql, active since October 2019 that was hosting six malicious images intended to mine the cryptocurrency, Monero. The images hosted on this account have been collectively pulled more than two million times. Additionally, when last checked minexmr.com for this wallet ID, Palo Alto's team saw recent activity indicating that it’s still being used.
Joining us on this week's Research Saturday is Jen Miller-Osborn from Palo Alto Networks' Unit 42 group to share the research and findings.
The research and blog post can be found here: 
Attackers Cryptojacking Docker Images to Mine for Monero

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Docker containers have been gaining popularity over the past few years as an effective way of packaging software applications. Docker Hub provides a strong community-based model for users and companies to share their software applications. This is also attracting the attention of malicious actors intending to make money by cryptojacking within Docker containers and using Docker Hub to distribute these images.</p><p>Palo Alto Networks' Unit 42 researchers identified a malicious Docker Hub account, azurenql, active since October 2019 that was hosting six malicious images intended to mine the cryptocurrency, Monero. The images hosted on this account have been collectively pulled more than two million times. Additionally, when last checked minexmr.com for this wallet ID, Palo Alto's team saw recent activity indicating that it’s still being used.</p><p>Joining us on this week's Research Saturday is Jen Miller-Osborn from Palo Alto Networks' Unit 42 group to share the research and findings.</p><p>The research and blog post can be found here: </p><ul><li><a href="https://unit42.paloaltonetworks.com/cryptojacking-docker-images-for-mining-monero/">Attackers Cryptojacking Docker Images to Mine for Monero</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>852</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d8bfc874-de50-11ea-a709-6fd6c2028e87]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5656601573.mp3?updated=1685108056" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Using global events as lures. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/148/notes</link>
      <description>The goal of malicious activity is to compromise the system to install some unauthorized software. Increasingly that goal is tied to one thing: the user. Over the past several years, we as an industry improved exploit mitigation and the value of working exploits has increased accordingly. Together, these changes have had an impact on the threat landscape. We still see large amounts of active exploitation, but enterprises are getting better at defending against them.
This has left adversaries with a couple of options, develop or buy a working exploit that will defeat today's protections, which can be costly, or pivot to enticing a user to help you. In today's threat landscape, adversaries are always trying to develop and implement the most effective lures to try and draw users into their infection path. They've tried a multitude of different tactics in this space, but one always stands out — current events.
Joining us on this week's Research Saturday from Craig Williams from Cisco's Talos Outreach team to walk us through how current events are used as lures.
The research and blog post can be found here: 
Adversarial use of current events as lures

The CyberWire's Research Saturday is presented by Juniper Networks.
Thanks to our sponsor Enveil, closing the last gap in data security.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:title>Using global events as lures. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>148</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The goal of malicious activity is to compromise the system to install some unauthorized software. Increasingly that goal is tied to one thing: the user. Over the past several years, we as an industry improved exploit mitigation and the value of working exploits has increased accordingly. Together, these changes have had an impact on the threat landscape. We still see large amounts of active exploitation, but enterprises are getting better at defending against them.
This has left adversaries with a couple of options, develop or buy a working exploit that will defeat today's protections, which can be costly, or pivot to enticing a user to help you. In today's threat landscape, adversaries are always trying to develop and implement the most effective lures to try and draw users into their infection path. They've tried a multitude of different tactics in this space, but one always stands out — current events.
Joining us on this week's Research Saturday from Craig Williams from Cisco's Talos Outreach team to walk us through how current events are used as lures.
The research and blog post can be found here: 
Adversarial use of current events as lures

The CyberWire's Research Saturday is presented by Juniper Networks.
Thanks to our sponsor Enveil, closing the last gap in data security.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The goal of malicious activity is to compromise the system to install some unauthorized software. Increasingly that goal is tied to one thing: the user. Over the past several years, we as an industry improved exploit mitigation and the value of working exploits has increased accordingly. Together, these changes have had an impact on the threat landscape. We still see large amounts of active exploitation, but enterprises are getting better at defending against them.</p><p>This has left adversaries with a couple of options, develop or buy a working exploit that will defeat today's protections, which can be costly, or pivot to enticing a user to help you. In today's threat landscape, adversaries are always trying to develop and implement the most effective lures to try and draw users into their infection path. They've tried a multitude of different tactics in this space, but one always stands out — current events.</p><p>Joining us on this week's Research Saturday from Craig Williams from Cisco's Talos Outreach team to walk us through how current events are used as lures.</p><p>The research and blog post can be found here: </p><ul><li><a href="https://blog.talosintelligence.com/2020/07/current-events-lures.html">Adversarial use of current events as lures</a></li></ul><p><br></p><p>The CyberWire's Research Saturday is presented by <a href="https://www.juniper.net/us/en/">Juniper Networks</a>.</p><p>Thanks to our sponsor <a href="https://www.enveil.com/">Enveil</a>, closing the last gap in data security.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1297</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d8b99026-de50-11ea-a709-4f5095ce5494]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9963177413.mp3?updated=1685108051" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Waiting for their victims.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/147/notes</link>
      <description>Bitdefender researchers have recently found the APT group StrongPity has been targeting victims in Turkey and Syria. Using watering hole tactics to selectively infect victims and deploying a three-tier C&amp;C infrastructure to thwart forensic investigations, the APT group leveraged Trojanized popular tools, such as archivers, file recovery applications, remote connections applications, utilities, and even security software, to cover a wide range of options that targeted victims might be seeking.
Joining us on this week's Research Saturday to discuss the research is Bitdefender's Liviu Arsene. 
You can find the research here:
 StrongPity APT – Revealing Trojanized Tools, Working Hours and Infrastructure
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:title>Waiting for their victims.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>147</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Bitdefender researchers have recently found the APT group StrongPity has been targeting victims in Turkey and Syria. Using watering hole tactics to selectively infect victims and deploying a three-tier C&amp;C infrastructure to thwart forensic investigations, the APT group leveraged Trojanized popular tools, such as archivers, file recovery applications, remote connections applications, utilities, and even security software, to cover a wide range of options that targeted victims might be seeking.
Joining us on this week's Research Saturday to discuss the research is Bitdefender's Liviu Arsene. 
You can find the research here:
 StrongPity APT – Revealing Trojanized Tools, Working Hours and Infrastructure
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Bitdefender researchers have recently found the APT group StrongPity has been targeting victims in Turkey and Syria. Using watering hole tactics to selectively infect victims and deploying a three-tier C&amp;C infrastructure to thwart forensic investigations, the APT group leveraged Trojanized popular tools, such as archivers, file recovery applications, remote connections applications, utilities, and even security software, to cover a wide range of options that targeted victims might be seeking.</p><p>Joining us on this week's Research Saturday to discuss the research is Bitdefender's Liviu Arsene. </p><p>You can find the research here:</p><p><a href="https://labs.bitdefender.com/2020/06/strongpity-apt-revealing-trojanized-tools-working-hours-and-infrastructure/"> StrongPity APT – Revealing Trojanized Tools, Working Hours and Infrastructure</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1402</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[83f1d47a-df15-11ea-b170-432081a33d0b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3989182345.mp3?updated=1685108044" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Like anything these days, you have to disinfect it first.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/146/notes</link>
      <description>“Cyberbunker” refers to a criminal group that operated a “bulletproof” hosting facility out of an actual military bunker. “Bullet Proof” hosting usually refers to hosting locations in countries with little or corrupt law enforcement, making shutting down criminal activity difficult. Cyberbunker, which is also known as “ZYZtm” and “Calibour”, was a bit different in that it actually operated out of a bulletproof bunker. In September of last year, German police raided this actual Cyberbunker and arrested several suspects.
While most of the group's assets were seized during the initial raid, the IP address space remained and was later sold to Legaco Networks. Before being shut down, Legaco Networks temporarily redirected the traffic to the SANS Internet Storm Center honeypots for examination.
Joining us on this week's Research Saturday from SANS Technology Institute is graduate student Karim Lalji and Dean of Research Johannes Ullrich to discuss their experiences. 
The research and blog post can be found here: 
 Real-Time Honeypot Forensic Investigation on a German Organized Crime Network
 Cyberbunker 2.0: Analysis of the Remnants of a Bullet Proof Hosting Provider
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:title>Like anything these days, you have to disinfect it first.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>146</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/728565f6-dcfb-11ea-975e-cb6d40d4e351/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>“Cyberbunker” refers to a criminal group that operated a “bulletproof” hosting facility out of an actual military bunker. “Bullet Proof” hosting usually refers to hosting locations in countries with little or corrupt law enforcement, making shutting down criminal activity difficult. Cyberbunker, which is also known as “ZYZtm” and “Calibour”, was a bit different in that it actually operated out of a bulletproof bunker. In September of last year, German police raided this actual Cyberbunker and arrested several suspects.
While most of the group's assets were seized during the initial raid, the IP address space remained and was later sold to Legaco Networks. Before being shut down, Legaco Networks temporarily redirected the traffic to the SANS Internet Storm Center honeypots for examination.
Joining us on this week's Research Saturday from SANS Technology Institute is graduate student Karim Lalji and Dean of Research Johannes Ullrich to discuss their experiences. 
The research and blog post can be found here: 
 Real-Time Honeypot Forensic Investigation on a German Organized Crime Network
 Cyberbunker 2.0: Analysis of the Remnants of a Bullet Proof Hosting Provider
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>“Cyberbunker” refers to a criminal group that operated a “bulletproof” hosting facility out of an actual military bunker. “Bullet Proof” hosting usually refers to hosting locations in countries with little or corrupt law enforcement, making shutting down criminal activity difficult. Cyberbunker, which is also known as “ZYZtm” and “Calibour”, was a bit different in that it actually operated out of a bulletproof bunker. In September of last year, German police raided this actual Cyberbunker and arrested several suspects.</p><p>While most of the group's assets were seized during the initial raid, the IP address space remained and was later sold to Legaco Networks. Before being shut down, Legaco Networks temporarily redirected the traffic to the SANS Internet Storm Center honeypots for examination.</p><p>Joining us on this week's Research Saturday from SANS Technology Institute is graduate student Karim Lalji and Dean of Research Johannes Ullrich to discuss their experiences. </p><p>The research and blog post can be found here: </p><p><a href="https://www.sans.org/reading-room/whitepapers/threathunting/paper/39640"> Real-Time Honeypot Forensic Investigation on a German Organized Crime Network</a></p><p><a href="https://isc.sans.edu/forums/diary/Cyberbunker+20+Analysis+of+the+Remnants+of+a+Bullet+Proof+Hosting+Provider/26266/"> Cyberbunker 2.0: Analysis of the Remnants of a Bullet Proof Hosting Provider</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1570</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a3d6f834-12ac-4179-b37b-d786de8b9607]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7754647518.mp3?updated=1685108038" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Detecting Twitter bots in real time.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/145/notes</link>
      <description>NortonLifeLock Research Group (NRG) released a prototype browser extension called BotSight that leverages machine learning to detect Twitter bots in real-time. The tool is intended to help users understand the prevalence of bots and disinformation campaigns within their Twitter feeds, particularly with the increase in disinformation of COVID-19.
Joining us on this week's Research Saturday to discuss this tool is Daniel Kats from NortonLifeLock Research Group.
You can find the research here:
 Introducing BotSight
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:title>Detecting Twitter bots in real time.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>145</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/729fcde2-dcfb-11ea-975e-cb7fd7ecc6ca/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>NortonLifeLock Research Group (NRG) released a prototype browser extension called BotSight that leverages machine learning to detect Twitter bots in real-time. The tool is intended to help users understand the prevalence of bots and disinformation campaigns within their Twitter feeds, particularly with the increase in disinformation of COVID-19.
Joining us on this week's Research Saturday to discuss this tool is Daniel Kats from NortonLifeLock Research Group.
You can find the research here:
 Introducing BotSight
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>NortonLifeLock Research Group (NRG) released a prototype browser extension called BotSight that leverages machine learning to detect Twitter bots in real-time. The tool is intended to help users understand the prevalence of bots and disinformation campaigns within their Twitter feeds, particularly with the increase in disinformation of COVID-19.</p><p>Joining us on this week's Research Saturday to discuss this tool is Daniel Kats from NortonLifeLock Research Group.</p><p>You can find the research here:</p><p><a href="https://www.nortonlifelock.com/blogs/research-group/botsight-tool-detect-twitter-bots"> Introducing BotSight</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1420</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e0ed0d06-b373-4dde-a36a-64db971fe0d3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5063243431.mp3?updated=1685108030" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>It was only a matter of time.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/144/notes</link>
      <description>On April 29, 2020, the Salt management framework, authored by the IT automation company SaltStack, received a patch concerning two CVEs; CVE-2020-11651, an authentication bypass vulnerability, and CVE-2020-11652, a directory-traversal vulnerability.
On April 30, 2020, researchers at F-Secure disclosed their vulnerability findings to the public, with an urgent warning for Salt users - patch now. Before the weekend was out, criminals were deploying malware and targeting vulnerable Salt installations, successfully affecting operations at Ghost, DigiCert, and LineageOS. The malware is a cryptominer, but there is an additional component, a Remote Access Tool written in Go called nspps. Researchers at Akamai have also observed in-the-wild attacks on Salt vulnerabilities. 
Joining us on this week's Research Saturday is Larry Cashdollar, Senior Security Response Engineer at Akamai, to discuss this issue. 
The research can be found here: 
 SaltStack Vulnerabilities Actively Exploited in the Wild
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Jul 2020 05:00:00 -0000</pubDate>
      <itunes:title>It was only a matter of time.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>144</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/72b6d1e0-dcfb-11ea-975e-b7e613af3ae5/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On April 29, 2020, the Salt management framework, authored by the IT automation company SaltStack, received a patch concerning two CVEs; CVE-2020-11651, an authentication bypass vulnerability, and CVE-2020-11652, a directory-traversal vulnerability.
On April 30, 2020, researchers at F-Secure disclosed their vulnerability findings to the public, with an urgent warning for Salt users - patch now. Before the weekend was out, criminals were deploying malware and targeting vulnerable Salt installations, successfully affecting operations at Ghost, DigiCert, and LineageOS. The malware is a cryptominer, but there is an additional component, a Remote Access Tool written in Go called nspps. Researchers at Akamai have also observed in-the-wild attacks on Salt vulnerabilities. 
Joining us on this week's Research Saturday is Larry Cashdollar, Senior Security Response Engineer at Akamai, to discuss this issue. 
The research can be found here: 
 SaltStack Vulnerabilities Actively Exploited in the Wild
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On April 29, 2020, the Salt management framework, authored by the IT automation company SaltStack, received a patch concerning two CVEs; CVE-2020-11651, an authentication bypass vulnerability, and CVE-2020-11652, a directory-traversal vulnerability.</p><p>On April 30, 2020, researchers at F-Secure disclosed their vulnerability findings to the public, with an urgent warning for Salt users - patch now. Before the weekend was out, criminals were deploying malware and targeting vulnerable Salt installations, successfully affecting operations at Ghost, DigiCert, and LineageOS. The malware is a cryptominer, but there is an additional component, a Remote Access Tool written in Go called nspps. Researchers at Akamai have also observed in-the-wild attacks on Salt vulnerabilities. </p><p>Joining us on this week's Research Saturday is Larry Cashdollar, Senior Security Response Engineer at Akamai, to discuss this issue. </p><p>The research can be found here: </p><p><a href="https://blogs.akamai.com/sitr/2020/05/saltstack-vulnerabilities-actively-exploited-in-the-wild.html"> SaltStack Vulnerabilities Actively Exploited in the Wild</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>898</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[be62ce9c-942c-42c0-8364-bed14392f12b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2456833534.mp3?updated=1685108017" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Every time we get smarter, the bad guy changes something.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/143/notes</link>
      <description>Researchers at Symantec identified and alerted customers to a string of attacks against U.S. companies by attackers attempting to deploy the WastedLocker ransomware (Ransom.WastedLocker) on their networks. The end goal of these attacks is to cripple the victim’s IT infrastructure by encrypting most of their computers and servers in order to demand a multimillion dollar ransom. At least 31 Symantec customer organizations have been attacked, meaning the total number of attacks may be much higher. The attackers had breached the networks of targeted organizations and were in the process of laying the groundwork for staging ransomware attacks.
Joining us in this week's Research Saturday to discuss the report is Jon DiMaggio of Symantec. 
The research can be found here: 
WastedLocker: Symantec Identifies Wave of Attacks Against U.S. Organizations

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Jul 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>143</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/72cf5652-dcfb-11ea-975e-53fed963e0a9/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Symantec identified and alerted customers to a string of attacks against U.S. companies by attackers attempting to deploy the WastedLocker ransomware (Ransom.WastedLocker) on their networks. The end goal of these attacks is to cripple the victim’s IT infrastructure by encrypting most of their computers and servers in order to demand a multimillion dollar ransom. At least 31 Symantec customer organizations have been attacked, meaning the total number of attacks may be much higher. The attackers had breached the networks of targeted organizations and were in the process of laying the groundwork for staging ransomware attacks.
Joining us in this week's Research Saturday to discuss the report is Jon DiMaggio of Symantec. 
The research can be found here: 
WastedLocker: Symantec Identifies Wave of Attacks Against U.S. Organizations

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Symantec identified and alerted customers to a string of attacks against U.S. companies by attackers attempting to deploy the WastedLocker ransomware (Ransom.WastedLocker) on their networks. The end goal of these attacks is to cripple the victim’s IT infrastructure by encrypting most of their computers and servers in order to demand a multimillion dollar ransom. At least 31 Symantec customer organizations have been attacked, meaning the total number of attacks may be much higher. The attackers had breached the networks of targeted organizations and were in the process of laying the groundwork for staging ransomware attacks.</p><p>Joining us in this week's Research Saturday to discuss the report is Jon DiMaggio of Symantec. </p><p>The research can be found here: </p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/wastedlocker-ransomware-us">WastedLocker: Symantec Identifies Wave of Attacks Against U.S. Organizations</a></li></ul><p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1930</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[018af23b-d1cf-4fb6-b1cb-c421b4a8b79c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1621192778.mp3?updated=1685108015" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Are you running what you think you're running?</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/142/notes</link>
      <description>Built into virtually every hardware device, firmware is lower-level software that is programmed to ensure that hardware functions properly.
As software security has been significantly hardened over the past two decades, hackers have responded by moving down the stack to focus on firmware entry points. Firmware offers a target that basic security controls can’t access or scan as easily as software, while allowing them to persist and continue leveraging many of their tried and true attack techniques.
Joining us on this week's Research Saturday is Maggie Jauregui, security researcher at Dell, to discuss this issue. 
The research can be found here: 
Three firmware blind spots impacting security
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Jul 2020 05:00:00 -0000</pubDate>
      <itunes:title>Are you running what you think you're running?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>142</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/72e7b74c-dcfb-11ea-975e-d7f3dc5bdd3c/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Built into virtually every hardware device, firmware is lower-level software that is programmed to ensure that hardware functions properly.
As software security has been significantly hardened over the past two decades, hackers have responded by moving down the stack to focus on firmware entry points. Firmware offers a target that basic security controls can’t access or scan as easily as software, while allowing them to persist and continue leveraging many of their tried and true attack techniques.
Joining us on this week's Research Saturday is Maggie Jauregui, security researcher at Dell, to discuss this issue. 
The research can be found here: 
Three firmware blind spots impacting security
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Built into virtually every hardware device, firmware is lower-level software that is programmed to ensure that hardware functions properly.</p><p>As software security has been significantly hardened over the past two decades, hackers have responded by moving down the stack to focus on firmware entry points. Firmware offers a target that basic security controls can’t access or scan as easily as software, while allowing them to persist and continue leveraging many of their tried and true attack techniques.</p><p>Joining us on this week's Research Saturday is Maggie Jauregui, security researcher at Dell, to discuss this issue. </p><p>The research can be found here: </p><p><a href="https://www.helpnetsecurity.com/2020/04/27/firmware-blind-spots/">Three firmware blind spots impacting security</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>969</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b9ae047f-5e69-4a4e-b344-2545ad5cf5e0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6016216946.mp3?updated=1685107999" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Enter the RAT.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/141/notes</link>
      <description>A new report examines how five related APT groups operating in the interest of the Chinese government have systematically targeted Linux servers, Windows systems and Android mobile devices while remaining undetected for nearly a decade.
The report comes on the heels of the U.S. Department of Justice announcing several high-profile indictments from over 1,000 open FBI investigations into economic espionage as part of the DOJ’s China Initiative.
Joining us in this week's Research Saturday to discuss the report is Eric Cornelius of Blackberry. 
The research can be found here: 
Decade of the RATs: Novel APT Attacks Targeting Linux, Windows and Android
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Jun 2020 05:00:00 -0000</pubDate>
      <itunes:title>Enter the RAT.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>141</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/72fc4478-dcfb-11ea-975e-33476dfbeb6a/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A new report examines how five related APT groups operating in the interest of the Chinese government have systematically targeted Linux servers, Windows systems and Android mobile devices while remaining undetected for nearly a decade.
The report comes on the heels of the U.S. Department of Justice announcing several high-profile indictments from over 1,000 open FBI investigations into economic espionage as part of the DOJ’s China Initiative.
Joining us in this week's Research Saturday to discuss the report is Eric Cornelius of Blackberry. 
The research can be found here: 
Decade of the RATs: Novel APT Attacks Targeting Linux, Windows and Android
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A new report examines how five related APT groups operating in the interest of the Chinese government have systematically targeted Linux servers, Windows systems and Android mobile devices while remaining undetected for nearly a decade.</p><p>The report comes on the heels of the U.S. Department of Justice announcing several high-profile indictments from over 1,000 open FBI investigations into economic espionage as part of the DOJ’s <em>China Initiative.</em></p><p>Joining us in this week's Research Saturday to discuss the report is Eric Cornelius of Blackberry. </p><p>The research can be found here: </p><p><a href="https://blogs.blackberry.com/en/2020/04/decade-of-the-rats">Decade of the RATs: Novel APT Attacks Targeting Linux, Windows and Android</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1415</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5e068bf8-aff2-422a-8a7b-456ab900f189]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2840063625.mp3?updated=1685107994" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Click here to update your webhook.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/140/notes</link>
      <description>Slack is a cloud-based messaging platform that is commonly used in workplace communications. Slack Incoming Webhooks allow you to post messages from your applications to Slack. Generally, Slack webhooks are considered a low risk integration. A deeper dive into webhooks shows that this is not entirely accurate. 
Joining us in this week's Research Saturday is Ashley Graves from AT&amp;T Cybersecurity's Alien Labs to discuss her research. 
The research can be found here: 
 Slack phishing attacks using webhooks
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Jun 2020 05:00:00 -0000</pubDate>
      <itunes:title>Click here to update your webhook.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>140</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/731604f8-dcfb-11ea-975e-9fa767cf68be/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Slack is a cloud-based messaging platform that is commonly used in workplace communications. Slack Incoming Webhooks allow you to post messages from your applications to Slack. Generally, Slack webhooks are considered a low risk integration. A deeper dive into webhooks shows that this is not entirely accurate. 
Joining us in this week's Research Saturday is Ashley Graves from AT&amp;T Cybersecurity's Alien Labs to discuss her research. 
The research can be found here: 
 Slack phishing attacks using webhooks
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Slack is a cloud-based messaging platform that is commonly used in workplace communications. Slack Incoming Webhooks allow you to post messages from your applications to Slack. Generally, Slack webhooks are considered a low risk integration. A deeper dive into webhooks shows that this is not entirely accurate. </p><p>Joining us in this week's Research Saturday is Ashley Graves from AT&amp;T Cybersecurity's Alien Labs to discuss her research. </p><p>The research can be found here: </p><p><a href="https://cybersecurity.att.com/blogs/labs-research/slack-phishing-attacks-using-webhooks"> Slack phishing attacks using webhooks</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1138</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d159f685-7a0d-49c4-af44-deacac5c8d23]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5661115032.mp3?updated=1685107893" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The value of the why and the who.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/139/notes</link>
      <description>Proactive, efficient threat mitigation and risk management require understanding adversaries’ fundamental thought processes, not just their tools and methods. Cyber threat intelligence analysts combed through 15 years (2004 to 2019) of public sources that have documented the activities of one prolific threat actor, Russia’s military intelligence agency, the GRU. Analysis shows that the timing, targets, and impacts of this activity mirrored Russian strategic concerns about specific events and developments. 
Joining us in this week's Research Saturday are Brad Stone &amp; Nate Beach-Westmoreland from Booz Allen Hamilton to discuss their report and some of the 33 case studies presented in it.
The research can be found here: 
 Bearing Witness: Uncovering the Logic Behind Russian Military Cyber Operations
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Jun 2020 05:00:00 -0000</pubDate>
      <itunes:title>The value of the why and the who.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>139</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/73329a6e-dcfb-11ea-975e-5bc2e988cc45/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Proactive, efficient threat mitigation and risk management require understanding adversaries’ fundamental thought processes, not just their tools and methods. Cyber threat intelligence analysts combed through 15 years (2004 to 2019) of public sources that have documented the activities of one prolific threat actor, Russia’s military intelligence agency, the GRU. Analysis shows that the timing, targets, and impacts of this activity mirrored Russian strategic concerns about specific events and developments. 
Joining us in this week's Research Saturday are Brad Stone &amp; Nate Beach-Westmoreland from Booz Allen Hamilton to discuss their report and some of the 33 case studies presented in it.
The research can be found here: 
 Bearing Witness: Uncovering the Logic Behind Russian Military Cyber Operations
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Proactive, efficient threat mitigation and risk management require understanding adversaries’ fundamental thought processes, not just their tools and methods. Cyber threat intelligence analysts combed through 15 years (2004 to 2019) of public sources that have documented the activities of one prolific threat actor, Russia’s military intelligence agency, the GRU. Analysis shows that the timing, targets, and impacts of this activity mirrored Russian strategic concerns about specific events and developments. </p><p>Joining us in this week's Research Saturday are Brad Stone &amp; Nate Beach-Westmoreland from Booz Allen Hamilton to discuss their report and some of the 33 case studies presented in it.</p><p>The research can be found here: </p><p><a href="https://www.boozallen.com/c/insight/publication/the-logic-behind-russian-military-cyber-operations.html"> Bearing Witness: Uncovering the Logic Behind Russian Military Cyber Operations</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1599</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a10a5386-fdc1-4734-96a9-deceb1dff983]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1496368816.mp3?updated=1685107881" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Due diligence cannot be done as a one-off.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/138/notes</link>
      <description>Earlier this year, a Virgin Media database containing the personal details of 900,000 people was discovered to be unsecured and accessible online for 10 months. The breach was discovered by researchers at the security firm TurgenSec. This breach had major implications under GDPR. 
Joining us in this week's Research Saturday are George Punter and Peter Hansen from TurgenSec to talk about the discovery of the breach. 
The research can be found here: 
 Virgin Media Disclosure Statement &amp; Resources
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Jun 2020 05:00:00 -0000</pubDate>
      <itunes:title>Due diligence cannot be done as a one-off.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>138</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7345ae06-dcfb-11ea-975e-1bcafdf42eb4/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Earlier this year, a Virgin Media database containing the personal details of 900,000 people was discovered to be unsecured and accessible online for 10 months. The breach was discovered by researchers at the security firm TurgenSec. This breach had major implications under GDPR. 
Joining us in this week's Research Saturday are George Punter and Peter Hansen from TurgenSec to talk about the discovery of the breach. 
The research can be found here: 
 Virgin Media Disclosure Statement &amp; Resources
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Earlier this year, a Virgin Media database containing the personal details of 900,000 people was discovered to be unsecured and accessible online for 10 months. The breach was discovered by researchers at the security firm TurgenSec. This breach had major implications under GDPR. </p><p>Joining us in this week's Research Saturday are George Punter and Peter Hansen from TurgenSec to talk about the discovery of the breach. </p><p>The research can be found here: </p><p><a href="https://community.turgensec.com/virgin-media-disclosure-statement/"> Virgin Media Disclosure Statement &amp; Resources</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1216</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[009b7297-5500-4530-aafd-731c831749a9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5501008611.mp3?updated=1685107877" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Twofold snooping venture.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/137/notes</link>
      <description>Working with many different honeypot implementations, a security researcher did an experiment expanding on that setting up a simple docker image with SSH, running a guessable root password. The catch? What happened in the next 24 hours was unexpected.
Joining us in this week's Research Saturday to talk about his experiment is Larry Cashdollar of Akamai. 
The research can be found here: 
 A Brief History of a Rootable Docker Image
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 May 2020 05:00:00 -0000</pubDate>
      <itunes:title>Twofold snooping venture.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>137</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/73827336-dcfb-11ea-975e-bbb48f16967a/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Working with many different honeypot implementations, a security researcher did an experiment expanding on that setting up a simple docker image with SSH, running a guessable root password. The catch? What happened in the next 24 hours was unexpected.
Joining us in this week's Research Saturday to talk about his experiment is Larry Cashdollar of Akamai. 
The research can be found here: 
 A Brief History of a Rootable Docker Image
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Working with many different honeypot implementations, a security researcher did an experiment expanding on that setting up a simple docker image with SSH, running a guessable root password. The catch? What happened in the next 24 hours was unexpected.</p><p>Joining us in this week's Research Saturday to talk about his experiment is Larry Cashdollar of Akamai. </p><p>The research can be found here: </p><p><a href="https://blogs.akamai.com/sitr/2020/04/a-brief-history-of-a-rootable-docker-image.html"> A Brief History of a Rootable Docker Image</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1208</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01e85aaa-68b0-492e-b5d3-6c3f71e5f85e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4933459109.mp3?updated=1685107864" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Naming and shaming is the worst thing we can do.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/136/notes</link>
      <description>In December 2019, the GOLD VILLAGE threat group that operates the Maze ransomware created a public website to name and shame victims. The threat actors used the website to dump data they exfiltrated from victims' networks before they deployed the ransomware. Secureworks Counter Threat Unit (CTU) researchers have observed several ransomware operators following suit.
Joining us in this week's Research Saturday is Alex Tilley of SecureWorks' Counter Threat Unit. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 May 2020 05:00:00 -0000</pubDate>
      <itunes:title>Naming and shaming is the worst thing we can do.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>136</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/73a1cc4a-dcfb-11ea-975e-4370ee798145/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In December 2019, the GOLD VILLAGE threat group that operates the Maze ransomware created a public website to name and shame victims. The threat actors used the website to dump data they exfiltrated from victims' networks before they deployed the ransomware. Secureworks Counter Threat Unit (CTU) researchers have observed several ransomware operators following suit.
Joining us in this week's Research Saturday is Alex Tilley of SecureWorks' Counter Threat Unit. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In December 2019, the GOLD VILLAGE threat group that operates the Maze ransomware created a public website to name and shame victims. The threat actors used the website to dump data they exfiltrated from victims' networks before they deployed the ransomware. Secureworks Counter Threat Unit (CTU) researchers have observed several ransomware operators following suit.</p><p>Joining us in this week's Research Saturday is Alex Tilley of SecureWorks' Counter Threat Unit. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1579</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d7fb2432-3bfb-45e8-9cd9-52844549f22a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9241848644.mp3?updated=1685107860" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Gangnam Industrial Style APT campaign targets South Korea.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/135/notes</link>
      <description>Section 52, CyberX’s threat intelligence team, has uncovered an ongoing industrial cyberespionage campaign targeting hundreds of manufacturing and other industrial firms primarily located in South Korea. CyberX has identified more than 200 compromised systems from this campaign, including one belonging to a multi-billion dollar Korean conglomerate that manufactures critical infrastructure equipment such as heavy equipment for power transmission and distribution facilities, renewable energy, chemical plants, welding, and construction.
Joining us in this week's Research Saturday is Phil Neray, one of the authors of this report. 
The research can be found here:
 Gangnam Industrial Style: APT Campaign Targets Korean Industrial Companies
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 May 2020 05:00:00 -0000</pubDate>
      <itunes:title>Gangnam Industrial Style APT campaign targets South Korea.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>135</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/73b795c0-dcfb-11ea-975e-f714b0b02cc1/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Section 52, CyberX’s threat intelligence team, has uncovered an ongoing industrial cyberespionage campaign targeting hundreds of manufacturing and other industrial firms primarily located in South Korea. CyberX has identified more than 200 compromised systems from this campaign, including one belonging to a multi-billion dollar Korean conglomerate that manufactures critical infrastructure equipment such as heavy equipment for power transmission and distribution facilities, renewable energy, chemical plants, welding, and construction.
Joining us in this week's Research Saturday is Phil Neray, one of the authors of this report. 
The research can be found here:
 Gangnam Industrial Style: APT Campaign Targets Korean Industrial Companies
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Section 52, CyberX’s threat intelligence team, has uncovered an ongoing industrial cyberespionage campaign targeting hundreds of manufacturing and other industrial firms primarily located in South Korea. CyberX has identified more than 200 compromised systems from this campaign, including one belonging to a multi-billion dollar Korean conglomerate that manufactures critical infrastructure equipment such as heavy equipment for power transmission and distribution facilities, renewable energy, chemical plants, welding, and construction.</p><p>Joining us in this week's Research Saturday is Phil Neray, one of the authors of this report. </p><p>The research can be found here:</p><p><a href="https://cyberx-labs.com/blog/gangnam-industrial-style-apt-campaign-targets-korean-industrial-companies/"> Gangnam Industrial Style: APT Campaign Targets Korean Industrial Companies</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1194</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[11b54ed6-33f2-4a60-a125-d42ee32277d2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9364375056.mp3?updated=1685107843" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The U.S. campaign trail is actually quite secure.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/134/notes</link>
      <description>Multiple media reports have indicated that the United States’ (U.S.) 2020 general election could be targeted by foreign and domestic actors after the successful cyber and misinformation attacks during the 2016 general election. The responsibility of secure and ethical online campaigning has become a central issue in the 2020 election. In some cases, it has become part of candidate platforms.
Joining us in this week's Research Saturday is Paul Gagliardi from Security Scorecard, discussing their recent report detailing the cybersecurity of the 2020 Presidential race. 
The research can be found here:
 2020 Democratic Presidential Candidates Get Smart to Cybersecurity Report
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 May 2020 05:00:00 -0000</pubDate>
      <itunes:title>The U.S. campaign trail is actually quite secure.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>134</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/73ca7190-dcfb-11ea-975e-6fa926554142/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Multiple media reports have indicated that the United States’ (U.S.) 2020 general election could be targeted by foreign and domestic actors after the successful cyber and misinformation attacks during the 2016 general election. The responsibility of secure and ethical online campaigning has become a central issue in the 2020 election. In some cases, it has become part of candidate platforms.
Joining us in this week's Research Saturday is Paul Gagliardi from Security Scorecard, discussing their recent report detailing the cybersecurity of the 2020 Presidential race. 
The research can be found here:
 2020 Democratic Presidential Candidates Get Smart to Cybersecurity Report
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Multiple media reports have indicated that the United States’ (U.S.) 2020 general election could be targeted by foreign and domestic actors after the successful cyber and misinformation attacks during the 2016 general election. The responsibility of secure and ethical online campaigning has become a central issue in the 2020 election. In some cases, it has become part of candidate platforms.</p><p>Joining us in this week's Research Saturday is Paul Gagliardi from Security Scorecard, discussing their recent report detailing the cybersecurity of the 2020 Presidential race. </p><p>The research can be found here:</p><p><a href="https://securityscorecard.com/resources/democratic-candidate-report-2020"> 2020 Democratic Presidential Candidates Get Smart to Cybersecurity Report</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1287</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9fe8637a-284b-44ab-8a5a-e61e79465911]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4964384276.mp3?updated=1685107835" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fingerprint authentication is not completely secure.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/133/notes</link>
      <description>Passwords are the traditional authentication methods for computers and networks. But passwords can be stolen. Biometric authentication seems the perfect solution for that problem.
Our guest today is Craig Williams, director of Talos outreach at Cisco. He'll be discussing and providing insights into their report which shows that fingerprints are good enough to protect the average person's privacy if they lose their phone. However, a person that is likely to be targeted by a well-funded and motivated actor should not use fingerprint authentication.
The research can be found here:
 Fingerprint cloning: Myth or reality?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 May 2020 05:00:00 -0000</pubDate>
      <itunes:title>Fingerprint authentication is not completely secure.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>133</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/73e36c54-dcfb-11ea-975e-9f03822e4c17/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Passwords are the traditional authentication methods for computers and networks. But passwords can be stolen. Biometric authentication seems the perfect solution for that problem.
Our guest today is Craig Williams, director of Talos outreach at Cisco. He'll be discussing and providing insights into their report which shows that fingerprints are good enough to protect the average person's privacy if they lose their phone. However, a person that is likely to be targeted by a well-funded and motivated actor should not use fingerprint authentication.
The research can be found here:
 Fingerprint cloning: Myth or reality?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Passwords are the traditional authentication methods for computers and networks. But passwords can be stolen. Biometric authentication seems the perfect solution for that problem.</p><p>Our guest today is Craig Williams, director of Talos outreach at Cisco. He'll be discussing and providing insights into their report which shows that fingerprints are good enough to protect the average person's privacy if they lose their phone. However, a person that is likely to be targeted by a well-funded and motivated actor should not use fingerprint authentication.</p><p>The research can be found here:</p><p><a href="https://blog.talosintelligence.com/2020/04/fingerprint-research.html"> Fingerprint cloning: Myth or reality?</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1263</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[62582dc8-48af-499a-b63b-4a0894b32b4a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4491352160.mp3?updated=1685107826" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Contact tracing as COVID-19 aid.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/132/notes</link>
      <description>Successful containment of the Coronavirus pandemic rests on the ability to quickly and reliably identify those who have been in close proximity to a contagious individual.
Mayank Varia from Boston University describes how his team suggests an approach based on using short-range communication
mechanisms, like Bluetooth, that are available in all modern cell phones.
The research can be found here:
Anonymous Collocation Discovery:
Harnessing Privacy to Tame the Coronavirus
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Apr 2020 05:00:00 -0000</pubDate>
      <itunes:title>Contact tracing as COVID-19 aid.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>132</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/73f9d110-dcfb-11ea-975e-3384612633c7/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Successful containment of the Coronavirus pandemic rests on the ability to quickly and reliably identify those who have been in close proximity to a contagious individual.
Mayank Varia from Boston University describes how his team suggests an approach based on using short-range communication
mechanisms, like Bluetooth, that are available in all modern cell phones.
The research can be found here:
Anonymous Collocation Discovery:
Harnessing Privacy to Tame the Coronavirus
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Successful containment of the Coronavirus pandemic rests on the ability to quickly and reliably identify those who have been in close proximity to a contagious individual.</p><p>Mayank Varia from Boston University describes how his team suggests an approach based on using short-range communication</p><p>mechanisms, like Bluetooth, that are available in all modern cell phones.</p><p>The research can be found here:</p><p><a href="https://arxiv.org/pdf/2003.13670.pdf">Anonymous Collocation Discovery:</a></p><p><a href="https://arxiv.org/pdf/2003.13670.pdf">Harnessing Privacy to Tame the Coronavirus</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2035</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f66c5bf6-4b3e-435d-8fa5-d6c31df46303]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8055012860.mp3?updated=1685107823" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How low can they go? A spike in Coronavirus phishing.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/131/notes</link>
      <description>As much of the world grapples with the new coronavirus, COVID-19, and how to handle it, attackers are taking advantage of the widespread discussion of COVID-19 in emails and across the web.
Joining us today is Fleming Shi, CTO of Barracuda discussing their report on these types of attacks, which are up 667-percent since the end of February.
The research can be found here:
 Threat Spotlight: Coronavirus-Related Phishing
To learn more about our Academic and Military discounts, visit The CyberWire and click on the Contact Us button in the Academic or Government &amp; Military box. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Apr 2020 05:00:00 -0000</pubDate>
      <itunes:title>How low can they go? A spike in Coronavirus phishing.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>131</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7413ede8-dcfb-11ea-975e-5fda4dd864b6/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>As much of the world grapples with the new coronavirus, COVID-19, and how to handle it, attackers are taking advantage of the widespread discussion of COVID-19 in emails and across the web.
Joining us today is Fleming Shi, CTO of Barracuda discussing their report on these types of attacks, which are up 667-percent since the end of February.
The research can be found here:
 Threat Spotlight: Coronavirus-Related Phishing
To learn more about our Academic and Military discounts, visit The CyberWire and click on the Contact Us button in the Academic or Government &amp; Military box. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As much of the world grapples with the new coronavirus, COVID-19, and how to handle it, attackers are taking advantage of the widespread discussion of COVID-19 in emails and across the web.</p><p>Joining us today is Fleming Shi, CTO of Barracuda discussing their report on these types of attacks, which are up 667-percent since the end of February.</p><p>The research can be found here:</p><p><a href="https://blog.barracuda.com/2020/03/26/threat-spotlight-coronavirus-related-phishing/"> Threat Spotlight: Coronavirus-Related Phishing</a></p><p>To learn more about our Academic and Military discounts, visit <a href="https://thecyberwire.com/pro">The CyberWire</a> and click on the Contact Us button in the Academic or Government &amp; Military box. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1051</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1851c668-fa9f-48f4-b90a-11366b72d5dc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1607068859.mp3?updated=1685107806" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Profiling an audacious Nigerian cybercriminal.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/130/notes</link>
      <description>By day, he is Dton, an upstanding Nigerian citizen. He believes in professionalism, hard work and excellence. He’s a leader, a content creator, an entrepreneur and an innovator; an accomplished business administrator; a renaissance man who is adored by his colleagues. But by night, he is Bill Henry, Cybercriminal Entrepreneur. We sat down with a researcher at CheckPoint for the inside scoop into this fascinating, brazen individual. 
The research can be found here:
 The Inside Scoop on a Six-Figure Nigerian Fraud Campaign
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Apr 2020 05:00:00 -0000</pubDate>
      <itunes:title>Profiling an audacious Nigerian cybercriminal.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>130</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/742f24aa-dcfb-11ea-975e-d72646210e16/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>By day, he is Dton, an upstanding Nigerian citizen. He believes in professionalism, hard work and excellence. He’s a leader, a content creator, an entrepreneur and an innovator; an accomplished business administrator; a renaissance man who is adored by his colleagues. But by night, he is Bill Henry, Cybercriminal Entrepreneur. We sat down with a researcher at CheckPoint for the inside scoop into this fascinating, brazen individual. 
The research can be found here:
 The Inside Scoop on a Six-Figure Nigerian Fraud Campaign
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>By day, he is Dton, an upstanding Nigerian citizen. He believes in professionalism, hard work and excellence. He’s a leader, a content creator, an entrepreneur and an innovator; an accomplished business administrator; a renaissance man who is adored by his colleagues. But by night, he is Bill Henry, Cybercriminal Entrepreneur. We sat down with a researcher at CheckPoint for the inside scoop into this fascinating, brazen individual. </p><p>The research can be found here:</p><p><a href="https://research.checkpoint.com/2020/the-inside-scoop-on-a-six-figure-nigerian-fraud-campaign/"> The Inside Scoop on a Six-Figure Nigerian Fraud Campaign</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1367</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[43fd24b9-a1b9-4fde-8ba7-a94e906737c0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1091862016.mp3?updated=1685107800" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A rough year ahead for ransomware attacks - and how to stop them.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/129/notes</link>
      <description>2020 is shaping up to be a rough year. Ransomware attacks will continue to grow as cybercriminals get more sophisticated in their methods and expand their reach. Allan Liska, Senior Analyst at Recorded Future, shares their findings and predictions in a new report. 
The research can be found here:
5 Ransomware Trends to Watch in 2020
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Apr 2020 05:00:00 -0000</pubDate>
      <itunes:title>A rough year ahead for ransomware attacks - and how to stop them.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>129</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/74456300-dcfb-11ea-975e-7b2e2fc733af/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>2020 is shaping up to be a rough year. Ransomware attacks will continue to grow as cybercriminals get more sophisticated in their methods and expand their reach. Allan Liska, Senior Analyst at Recorded Future, shares their findings and predictions in a new report. 
The research can be found here:
5 Ransomware Trends to Watch in 2020
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>2020 is shaping up to be a rough year. Ransomware attacks will continue to grow as cybercriminals get more sophisticated in their methods and expand their reach. Allan Liska, Senior Analyst at Recorded Future, shares their findings and predictions in a new report. </p><p>The research can be found here:</p><p><a href="https://www.recordedfuture.com/ransomware-trends-2020/">5 Ransomware Trends to Watch in 2020</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>877</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[678cf086-0784-4f08-b809-17d012023ab9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6145900368.mp3?updated=1685107788" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hidden dangers inside Windows and LINUX computers.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/128/notes</link>
      <description>Eclypsium has issued a study that suggests the prevalence of “unsigned firmware in WiFi adapters, USB hubs, trackpads, and cameras used in computers from Lenovo, Dell, HP and other major manufacturers.” Here to discuss their findings is Rick Altherr, a Principle Engineer at Eclypsium.
The research can be found here:
Perilous Peripherals: The Hidden Dangers Inside Windows and LINUX Computers. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Mar 2020 05:00:00 -0000</pubDate>
      <itunes:title>Hidden dangers inside Windows and LINUX computers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>128</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/745c6136-dcfb-11ea-975e-17c8c50a83d9/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Eclypsium has issued a study that suggests the prevalence of “unsigned firmware in WiFi adapters, USB hubs, trackpads, and cameras used in computers from Lenovo, Dell, HP and other major manufacturers.” Here to discuss their findings is Rick Altherr, a Principle Engineer at Eclypsium.
The research can be found here:
Perilous Peripherals: The Hidden Dangers Inside Windows and LINUX Computers. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Eclypsium has issued a study that suggests the prevalence of “unsigned firmware in WiFi adapters, USB hubs, trackpads, and cameras used in computers from Lenovo, Dell, HP and other major manufacturers.” Here to discuss their findings is Rick Altherr, a Principle Engineer at Eclypsium.</p><p>The research can be found here:</p><p><a href="https://eclypsium.com/2020/2/18/unsigned-peripheral-firmware/">Perilous Peripherals: The Hidden Dangers Inside Windows and LINUX Computers. </a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1382</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bbbff1d8-c6df-4a73-a19a-66c67b281cdc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1516992743.mp3?updated=1685107783" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The security implications of cloud infrastructure in IoT.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/127/notes</link>
      <description>Cloud computing is now at the center of nearly every business strategy. But, as with the rapid adoption of any new technology, growing pains persist. The key findings in these reports shed light on security missteps that are actually in practice by organizations across the globe.
Joining us in this special Research Saturday are Palo Alto Network's Matthew Chiodi and Ryan Olson. They discuss their findings in two different threat reports. 
The research can be found here:
Cloud Threat Report
IoT Threat Report
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Mar 2020 05:00:00 -0000</pubDate>
      <itunes:title>The security implications of cloud infrastructure in IoT.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>127</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/74900504-dcfb-11ea-975e-3fc20f5b40f9/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cloud computing is now at the center of nearly every business strategy. But, as with the rapid adoption of any new technology, growing pains persist. The key findings in these reports shed light on security missteps that are actually in practice by organizations across the globe.
Joining us in this special Research Saturday are Palo Alto Network's Matthew Chiodi and Ryan Olson. They discuss their findings in two different threat reports. 
The research can be found here:
Cloud Threat Report
IoT Threat Report
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cloud computing is now at the center of nearly every business strategy. But, as with the rapid adoption of any new technology, growing pains persist. The key findings in these reports shed light on security missteps that are actually in practice by organizations across the globe.</p><p>Joining us in this special Research Saturday are Palo Alto Network's Matthew Chiodi and Ryan Olson. They discuss their findings in two different threat reports. </p><p>The research can be found here:</p><p><a href="https://unit42.paloaltonetworks.com/cloud-threat-report-intro/">Cloud Threat Report</a></p><p><a href="https://unit42.paloaltonetworks.com/iot-threat-report-2020/">IoT Threat Report</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1791</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d12d8e24-c8fd-45ec-b4db-1a13d08ea08a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8152076218.mp3?updated=1685107777" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>TLS is here to stay.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/126/notes</link>
      <description>As websites and apps more widely adopt TLS (Transport Layer Security) and communicate over HTTPS connections, unencrypted traffic may draw even more attention, since it’s easier for analysts and security tools to identify malicious communication patterns in those plain HTTP sessions. Malware authors know this, and they’ve made it a priority to adopt TLS and thereby obfuscate the contents of malicious communication.
Joining us on this week's Research Saturday is Chester Wisniewski from SophosLabs discussing their research on the subject. 
The research can be found here:
 Nearly a quarter of malware now communicates using TLS
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Mar 2020 05:00:00 -0000</pubDate>
      <itunes:title>TLS is here to stay.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>126</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/74a55814-dcfb-11ea-975e-6f535f68e59d/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>As websites and apps more widely adopt TLS (Transport Layer Security) and communicate over HTTPS connections, unencrypted traffic may draw even more attention, since it’s easier for analysts and security tools to identify malicious communication patterns in those plain HTTP sessions. Malware authors know this, and they’ve made it a priority to adopt TLS and thereby obfuscate the contents of malicious communication.
Joining us on this week's Research Saturday is Chester Wisniewski from SophosLabs discussing their research on the subject. 
The research can be found here:
 Nearly a quarter of malware now communicates using TLS
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As websites and apps more widely adopt TLS (Transport Layer Security) and communicate over HTTPS connections, unencrypted traffic may draw even more attention, since it’s easier for analysts and security tools to identify malicious communication patterns in those plain HTTP sessions. Malware authors know this, and they’ve made it a priority to adopt TLS and thereby obfuscate the contents of malicious communication.</p><p>Joining us on this week's Research Saturday is Chester Wisniewski from SophosLabs discussing their research on the subject. </p><p>The research can be found here:</p><p><a href="https://news.sophos.com/en-us/2020/02/18/nearly-a-quarter-of-malware-now-communicates-using-tls/"> Nearly a quarter of malware now communicates using TLS</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1115</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[753eeaf3-aecc-4333-b569-57b020e49e50]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4012276569.mp3?updated=1685107763" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Overworked developers write vulnerable software.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/125/notes</link>
      <description>Why do some developers and development teams write more secure code than others? Software is written by people, either alone or in teams. Ultimately secure code development depends on the actions and decisions taken by the people who develop the code. Understanding the human factors that influence the introduction of software vulnerabilities, and acting on that knowledge, is a definitive way to shift security to the left. 
On this Research Saturday, our conversation with Anita D’Amico from CodeDX on which developers and teams are more likely to write vulnerable software.
The research can be found here:
 Which Developers and Teams Are More Likely to Write Vulnerable Software?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Mar 2020 06:00:00 -0000</pubDate>
      <itunes:title>Overworked developers write vulnerable software.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>125</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/74ba23e8-dcfb-11ea-975e-2f2d7289f34a/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Why do some developers and development teams write more secure code than others? Software is written by people, either alone or in teams. Ultimately secure code development depends on the actions and decisions taken by the people who develop the code. Understanding the human factors that influence the introduction of software vulnerabilities, and acting on that knowledge, is a definitive way to shift security to the left. 
On this Research Saturday, our conversation with Anita D’Amico from CodeDX on which developers and teams are more likely to write vulnerable software.
The research can be found here:
 Which Developers and Teams Are More Likely to Write Vulnerable Software?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Why do some developers and development teams write more secure code than others? Software is written by people, either alone or in teams. Ultimately secure code development depends on the actions and decisions taken by the people who develop the code. Understanding the human factors that influence the introduction of software vulnerabilities, and acting on that knowledge, is a definitive way to shift security to the left. </p><p>On this Research Saturday, our conversation with Anita D’Amico from CodeDX on which developers and teams are more likely to write vulnerable software.</p><p>The research can be found here:</p><p><a href="https://www.rsaconference.com/usa/agenda/which-developers-and-teams-are-more-likely-to-write-vulnerable-software"> Which Developers and Teams Are More Likely to Write Vulnerable Software?</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1011</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7ba79af-7601-4340-9412-039763dfc919]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3269701012.mp3?updated=1685107754" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Application tracking in Wacom tablets.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/124/notes</link>
      <description>Today's Research Saturday features our conversation with Robert Heaton, a software engineer with Stripe who penned a blog post about his disappointing discovery involving his Wacom tablet tracking his applications. The post struck a nerve and has since been widely distributed.
The research can be found here: 
 Wacom drawing tablets track the name of every application that you open
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 Feb 2020 06:00:00 -0000</pubDate>
      <itunes:title>Application tracking in Wacom tablets.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>124</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/74d053a2-dcfb-11ea-975e-93265890f973/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Today's Research Saturday features our conversation with Robert Heaton, a software engineer with Stripe who penned a blog post about his disappointing discovery involving his Wacom tablet tracking his applications. The post struck a nerve and has since been widely distributed.
The research can be found here: 
 Wacom drawing tablets track the name of every application that you open
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today's Research Saturday features our conversation with Robert Heaton, a software engineer with Stripe who penned a blog post about his disappointing discovery involving his Wacom tablet tracking his applications. The post struck a nerve and has since been widely distributed.</p><p>The research can be found here: </p><p><a href="https://robertheaton.com/2020/02/05/wacom-drawing-tablets-track-name-of-every-application-you-open/"> Wacom drawing tablets track the name of every application that you open</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1238</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7f4b6e4-caf7-48f1-ab96-1047d34ede41]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9345984777.mp3?updated=1685107745" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New vulnerabilities in PC sound cards.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/123/notes</link>
      <description>SafeBreach Labs discovered a new vulnerability in the Realtek HD Audio Driver Package, which is deployed on PCs containing Realtek sound cards. 
On this week's Research Saturday, our conversation with Itzik Kotler, who is Co-Founder and CTO at SafeBreach. 
The research can be found here: 
 Realtek HD Audio Driver Package - DLL Preloading and Potential Abuses
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Feb 2020 06:00:00 -0000</pubDate>
      <itunes:title>New vulnerabilities in PC sound cards.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>123</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/74e7f53e-dcfb-11ea-975e-77a2d7cca2a0/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>SafeBreach Labs discovered a new vulnerability in the Realtek HD Audio Driver Package, which is deployed on PCs containing Realtek sound cards. 
On this week's Research Saturday, our conversation with Itzik Kotler, who is Co-Founder and CTO at SafeBreach. 
The research can be found here: 
 Realtek HD Audio Driver Package - DLL Preloading and Potential Abuses
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>SafeBreach Labs discovered a new vulnerability in the Realtek HD Audio Driver Package, which is deployed on PCs containing Realtek sound cards. </p><p>On this week's Research Saturday, our conversation with Itzik Kotler, who is Co-Founder and CTO at SafeBreach. </p><p>The research can be found here: </p><p><a href="https://safebreach.com/Post/Realtek-HD-Audio-Driver-Package-DLL-Preloading-and-Potential-Abuses-CVE-2019-19705"> Realtek HD Audio Driver Package - DLL Preloading and Potential Abuses</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1300</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a750d79f-0bee-4b2c-8c59-f4d6c873893c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8252140271.mp3?updated=1685107738" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>If you can't detect it, you can't steal it.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/122/notes</link>
      <description>BGN Technologies, the technology transfer company of Ben-Gurion University (BGU) of the Negev, Israel, is introducing the first all-optical “stealth” encryption technology that will be significantly more secure and private for highly-sensitive cloud computing and data center network transmission. Joining us in this special Research Saturday is BGN's Dan Sadot who helped pioneer this technology. 
The Research can be found here:
Ben-Gurion University Researchers Introduce the FirstAll-Optical, Stealth Data Encryption Technology
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Feb 2020 06:00:00 -0000</pubDate>
      <itunes:title>If you can't detect it, you can't steal it.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>122</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/750a90d0-dcfb-11ea-975e-53c34da0ea9e/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>BGN Technologies, the technology transfer company of Ben-Gurion University (BGU) of the Negev, Israel, is introducing the first all-optical “stealth” encryption technology that will be significantly more secure and private for highly-sensitive cloud computing and data center network transmission. Joining us in this special Research Saturday is BGN's Dan Sadot who helped pioneer this technology. 
The Research can be found here:
Ben-Gurion University Researchers Introduce the FirstAll-Optical, Stealth Data Encryption Technology
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>BGN Technologies, the technology transfer company of Ben-Gurion University (BGU) of the Negev, Israel, is introducing the first all-optical “stealth” encryption technology that will be significantly more secure and private for highly-sensitive cloud computing and data center network transmission. Joining us in this special Research Saturday is BGN's Dan Sadot who helped pioneer this technology. </p><p>The Research can be found here:</p><p><a href="https://in.bgu.ac.il/en/bgn/Pages/default.aspx">Ben-Gurion University Researchers Introduce the FirstAll-Optical, Stealth Data Encryption Technology</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1533</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dc22013e-5dfe-4e9f-8ba4-e042d23bcd2f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5531865638.mp3?updated=1685107733" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Chameleon attacks Online Social Networks.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/121/notes</link>
      <description>The Chameleon attack technique is a new type of OSN-based trickery where malicious posts and profiles change the way they are displayed to OSN users to conceal themselves before the attack or avoid detection. Joining us to discuss their findings in a new report entitled "The Chameleon Attack: Manipulating Content Display in Online Social Media" is Ben-Gurion University's Rami Puzis. 
The research can be found here:
The Chameleon Attack: Manipulating Content Display in Online Social Media
Demonstration video of a Chameleon Attack
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Feb 2020 06:00:00 -0000</pubDate>
      <itunes:title>The Chameleon attacks Online Social Networks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>121</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/751fa74a-dcfb-11ea-975e-f722244f3584/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Chameleon attack technique is a new type of OSN-based trickery where malicious posts and profiles change the way they are displayed to OSN users to conceal themselves before the attack or avoid detection. Joining us to discuss their findings in a new report entitled "The Chameleon Attack: Manipulating Content Display in Online Social Media" is Ben-Gurion University's Rami Puzis. 
The research can be found here:
The Chameleon Attack: Manipulating Content Display in Online Social Media
Demonstration video of a Chameleon Attack
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Chameleon attack technique is a new type of OSN-based trickery where malicious posts and profiles change the way they are displayed to OSN users to conceal themselves before the attack or avoid detection. Joining us to discuss their findings in a new report entitled "The Chameleon Attack: Manipulating Content Display in Online Social Media" is Ben-Gurion University's Rami Puzis. </p><p>The research can be found here:</p><p><a href="https://arxiv.org/abs/2001.05668">The Chameleon Attack: Manipulating Content Display in Online Social Media</a></p><p><a href="https://www.youtube.com/watch?v=CRg6Sy5Ygws">Demonstration video of a Chameleon Attack</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1113</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[67cd438c-179c-456c-a95b-23d9b193c831]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5846756448.mp3?updated=1685107719" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tracking one of China's hidden hacking groups.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/120/notes</link>
      <description>Operation Wocao (我操, “Wǒ cāo”, is a Chinese curse word) is the name that Fox-IT uses to describe the hacking activities of a Chinese based hacking group.
We are joined by Fox-IT's Maarten van Dantzig who shares his insights into their new report entitled "Operation Wocao: Shining a light on one of China’s hidden hacking groups".
The Research can be found here:


 Operation Wocao: Shining a light on one of China’s hidden hacking groups
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Feb 2020 06:00:00 -0000</pubDate>
      <itunes:title>Tracking one of China's hidden hacking groups.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>120</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/75377726-dcfb-11ea-975e-7704f632c1d4/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Operation Wocao (我操, “Wǒ cāo”, is a Chinese curse word) is the name that Fox-IT uses to describe the hacking activities of a Chinese based hacking group.
We are joined by Fox-IT's Maarten van Dantzig who shares his insights into their new report entitled "Operation Wocao: Shining a light on one of China’s hidden hacking groups".
The Research can be found here:


 Operation Wocao: Shining a light on one of China’s hidden hacking groups
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Operation Wocao (我操, “Wǒ cāo”, is a Chinese curse word) is the name that Fox-IT uses to describe the hacking activities of a Chinese based hacking group.</p><p>We are joined by Fox-IT's Maarten van Dantzig who shares his insights into their new report entitled "Operation Wocao: Shining a light on one of China’s hidden hacking groups".</p><p>The Research can be found here:</p><p><br></p><p><br></p><p><a href="https://www.fox-it.com/en/news/whitepapers/operation-wocao-shining-a-light-on-one-of-chinas-hidden-hacking-groups/"> Operation Wocao: Shining a light on one of China’s hidden hacking groups</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1197</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6167f5bf-d264-429f-9e70-2c64d385a774]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4705831507.mp3?updated=1685107484" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Know Thine Enemy - Identifying North American Cyber Threats.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/119/notes</link>
      <description>The electric utility industry is a valuable target for adversaries seeking to exploit industrial control systems (ICS) and operations technology (OT) for a variety of purposes. As adversaries and their sponsors invest more effort and money into obtaining effects-focused capabilities, the risk of a disruptive or destructive attack on the electric sector significantly increases.
Selena Larson from Dragos joins us to discuss their new report North American Electric Cyber Threat Perspective.
The report can be found here:
 North American Electric Cyber Threat Perspective
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Jan 2020 06:00:00 -0000</pubDate>
      <itunes:title>Know Thine Enemy - Identifying North American Cyber Threats.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>119</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/754f6d7c-dcfb-11ea-975e-1fb582d3ab02/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The electric utility industry is a valuable target for adversaries seeking to exploit industrial control systems (ICS) and operations technology (OT) for a variety of purposes. As adversaries and their sponsors invest more effort and money into obtaining effects-focused capabilities, the risk of a disruptive or destructive attack on the electric sector significantly increases.
Selena Larson from Dragos joins us to discuss their new report North American Electric Cyber Threat Perspective.
The report can be found here:
 North American Electric Cyber Threat Perspective
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The electric utility industry is a valuable target for adversaries seeking to exploit industrial control systems (ICS) and operations technology (OT) for a variety of purposes. As adversaries and their sponsors invest more effort and money into obtaining effects-focused capabilities, the risk of a disruptive or destructive attack on the electric sector significantly increases.</p><p>Selena Larson from Dragos joins us to discuss their new report North American Electric Cyber Threat Perspective.</p><p>The report can be found here:</p><p><a href="https://dragos.com/resource/north-american-electric-cyber-threat-perspective/"> North American Electric Cyber Threat Perspective</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1722</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ca1157a3-ddc7-4b4c-901c-23f183226e6a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7341667151.mp3?updated=1685107482" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Clever breaches demonstrate IoT security gaps.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/118/notes</link>
      <description>Some of our favorite and most trusted IoT devices help make us feel secure in our homes. From garage door openers to the locks on our front doors, we trust these devices to recognize and alert us when people are entering our home. It should come as no surprise that these too are subject to attack. 
Steve Povolny is head of advanced research at McAfee; we discuss a pair of research projects they recently published involving popular IoT devices. 
The research can be found here:
McAfee Advanced Threat Research demo McLear NFC Ring
McAfee Advanced Threat Research Demo Chamberlain MyQ
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Jan 2020 06:00:00 -0000</pubDate>
      <itunes:title>Clever breaches demonstrate IoT security gaps.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>118</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/75713ab0-dcfb-11ea-975e-3f4a1656bce4/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Some of our favorite and most trusted IoT devices help make us feel secure in our homes. From garage door openers to the locks on our front doors, we trust these devices to recognize and alert us when people are entering our home. It should come as no surprise that these too are subject to attack. 
Steve Povolny is head of advanced research at McAfee; we discuss a pair of research projects they recently published involving popular IoT devices. 
The research can be found here:
McAfee Advanced Threat Research demo McLear NFC Ring
McAfee Advanced Threat Research Demo Chamberlain MyQ
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Some of our favorite and most trusted IoT devices help make us feel secure in our homes. From garage door openers to the locks on our front doors, we trust these devices to recognize and alert us when people are entering our home. It should come as no surprise that these too are subject to attack. </p><p>Steve Povolny is head of advanced research at McAfee; we discuss a pair of research projects they recently published involving popular IoT devices. </p><p>The research can be found here:</p><p><a href="https://www.youtube.com/watch?v=nqi42aSQIKY&amp;t=7s">McAfee Advanced Threat Research demo McLear NFC Ring</a></p><p><a href="https://www.youtube.com/watch?v=6ZgK_r7g7kA">McAfee Advanced Threat Research Demo Chamberlain MyQ</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1397</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a43cd600-42ef-4bc3-9d63-38860471e676]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2326826889.mp3?updated=1685107467" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Profiling the Linken Sphere anti-detection browser.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/117/notes</link>
      <description>Multiple e-commerce and financial organizations around the world are targeted by cybercriminals attempting to bypass or disable their security mechanisms, in some cases by using tools that imitate the activities of legitimate users. Linken Sphere, an anti-detection browser, is one of the most popular tools of this kind at the moment.
Staffan Truvé is the CTO and Co-Founder of Recorded Future, he joins us to discuss their new report on the browser. 
The research can be found here:
Profiling the Linken Sphere Anti-Detection Browser
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Jan 2020 06:00:00 -0000</pubDate>
      <itunes:title>Profiling the Linken Sphere anti-detection browser.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>117</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/758d827e-dcfb-11ea-975e-67e26f695fad/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Multiple e-commerce and financial organizations around the world are targeted by cybercriminals attempting to bypass or disable their security mechanisms, in some cases by using tools that imitate the activities of legitimate users. Linken Sphere, an anti-detection browser, is one of the most popular tools of this kind at the moment.
Staffan Truvé is the CTO and Co-Founder of Recorded Future, he joins us to discuss their new report on the browser. 
The research can be found here:
Profiling the Linken Sphere Anti-Detection Browser
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Multiple e-commerce and financial organizations around the world are targeted by cybercriminals attempting to bypass or disable their security mechanisms, in some cases by using tools that imitate the activities of legitimate users. Linken Sphere, an anti-detection browser, is one of the most popular tools of this kind at the moment.</p><p>Staffan Truvé is the CTO and Co-Founder of Recorded Future, he joins us to discuss their new report on the browser. </p><p>The research can be found here:</p><p><a href="https://www.recordedfuture.com/linken-sphere-profile/">Profiling the Linken Sphere Anti-Detection Browser</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>817</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a26d8ee7-e5f1-4a13-99a1-84a0c32dae21]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5342648930.mp3?updated=1685107454" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A Jira vulnerability that’s leaking data in the public cloud.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/116/notes</link>
      <description>Unit 42 (the Palo Alto Networks threat intelligence team) released new research on a Jira vulnerability that’s leaking data of technology, industrial and media organizations in the public cloud. The vulnerability (a Server Side Request Forgery -- SSRF) is the same type that led to the Capital One data breach in July 2019.
Jen Miller-Osborn is the Deputy Director of Threat Intelligence for Unit 42 at Palo Alto Networks, and she joins us to share their findings.
The research can be found here:
https://unit42.paloaltonetworks.com/server-side-request-forgery-exposes-data-of-technology-industrial-and-media-organizations/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 02 Jan 2020 23:35:00 -0000</pubDate>
      <itunes:title>A Jira vulnerability that’s leaking data in the public cloud.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>116</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/75a7d070-dcfb-11ea-975e-ef0ca4e5fd71/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Unit 42 (the Palo Alto Networks threat intelligence team) released new research on a Jira vulnerability that’s leaking data of technology, industrial and media organizations in the public cloud. The vulnerability (a Server Side Request Forgery -- SSRF) is the same type that led to the Capital One data breach in July 2019.
Jen Miller-Osborn is the Deputy Director of Threat Intelligence for Unit 42 at Palo Alto Networks, and she joins us to share their findings.
The research can be found here:
https://unit42.paloaltonetworks.com/server-side-request-forgery-exposes-data-of-technology-industrial-and-media-organizations/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Unit 42 (the Palo Alto Networks threat intelligence team) released new research on a Jira vulnerability that’s leaking data of technology, industrial and media organizations in the public cloud. The vulnerability (a Server Side Request Forgery -- SSRF) is the same type that led to the Capital One data breach in July 2019.</p><p>Jen Miller-Osborn is the Deputy Director of Threat Intelligence for Unit 42 at Palo Alto Networks, and she joins us to share their findings.</p><p>The research can be found here:</p><p><a href="https://www.google.com/url?q=https://unit42.paloaltonetworks.com/server-side-request-forgery-exposes-data-of-technology-industrial-and-media-organizations/&amp;sa=D&amp;ust=1575757565425000&amp;usg=AOvVaw21WsE6SV66zfD7XE67vGv1">https://unit42.paloaltonetworks.com/server-side-request-forgery-exposes-data-of-technology-industrial-and-media-organizations/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>965</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a522684b-f14b-44de-8b00-397780ed113b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8549155799.mp3?updated=1685107447" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Inside Magecart and Genesis.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/115/notes</link>
      <description>Dan Woods is VP of the intelligence center and Shape Security. He shares insights on two noteworthy attacks tools, Genesis and Magecart. Before joining Shape Security Dan served as assistant chief agent of special investigations at the Arizona attorney general's office, where he investigated complex fraud. Prior to that, he spent 20 years with federal law enforcement agencies and intelligence organizations, including the CIA and FBI, where he specialized in information operations and cybercrime.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Dec 2019 06:00:00 -0000</pubDate>
      <itunes:title>Inside Magecart and Genesis.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>115</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/75c02d96-dcfb-11ea-975e-0bda53188a51/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dan Woods is VP of the intelligence center and Shape Security. He shares insights on two noteworthy attacks tools, Genesis and Magecart. Before joining Shape Security Dan served as assistant chief agent of special investigations at the Arizona attorney general's office, where he investigated complex fraud. Prior to that, he spent 20 years with federal law enforcement agencies and intelligence organizations, including the CIA and FBI, where he specialized in information operations and cybercrime.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dan Woods is VP of the intelligence center and Shape Security. He shares insights on two noteworthy attacks tools, Genesis and Magecart. Before joining Shape Security Dan served as assistant chief agent of special investigations at the Arizona attorney general's office, where he investigated complex fraud. Prior to that, he spent 20 years with federal law enforcement agencies and intelligence organizations, including the CIA and FBI, where he specialized in information operations and cybercrime.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1218</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ba9354a6-f0e2-40c7-9e4c-c305693311f0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5981125855.mp3?updated=1685107441" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>WAV files carry malicious data payloads.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/114/notes</link>
      <description>Researchers at BlackBerry Cylance have been tracking ordinary WAV audio files being used to carry hidden malicious data used by threat actors. 
Eric Milam is VP of threat research and intelligence at BlackBerry Cylance, and he joins us to share their findings.
The research can be found here:
 https://threatvector.cylance.com/en_us/home/malicious-payloads-hiding-beneath-the-wav.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Dec 2019 06:00:00 -0000</pubDate>
      <itunes:title>WAV files carry malicious data payloads.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>114</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/75dc4e86-dcfb-11ea-975e-7bcc3f0b332b/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at BlackBerry Cylance have been tracking ordinary WAV audio files being used to carry hidden malicious data used by threat actors. 
Eric Milam is VP of threat research and intelligence at BlackBerry Cylance, and he joins us to share their findings.
The research can be found here:
 https://threatvector.cylance.com/en_us/home/malicious-payloads-hiding-beneath-the-wav.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at BlackBerry Cylance have been tracking ordinary WAV audio files being used to carry hidden malicious data used by threat actors. </p><p>Eric Milam is VP of threat research and intelligence at BlackBerry Cylance, and he joins us to share their findings.</p><p>The research can be found here:</p><p><a href="https://threatvector.cylance.com/en_us/home/malicious-payloads-hiding-beneath-the-wav.html"> https://threatvector.cylance.com/en_us/home/malicious-payloads-hiding-beneath-the-wav.html</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1169</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5bd2ce28-3081-4ace-a5a0-1ec703273a60]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9741837000.mp3?updated=1685107432" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Targeting routers to hit gaming servers.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/113/notes</link>
      <description>Researchers at Palo Alto Networks' Unit 42 recently published research outlining attacks on home and small-business routers, taking advantage of known vulnerabilities to make the routers parts of botnets, ultimately used to attack gaming servers.
Jen Miller-Osborn is the Deputy Director of Threat Intelligence for Unit 42 at Palo Alto Networks. She joins us to share their findings.
The research can be found here:
 https://unit42.paloaltonetworks.com/home-small-office-wireless-routers-exploited-to-attack-gaming-servers/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Dec 2019 06:00:00 -0000</pubDate>
      <itunes:title>Targeting routers to hit gaming servers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>113</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/75f3c1d8-dcfb-11ea-975e-1f003211c8c4/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Palo Alto Networks' Unit 42 recently published research outlining attacks on home and small-business routers, taking advantage of known vulnerabilities to make the routers parts of botnets, ultimately used to attack gaming servers.
Jen Miller-Osborn is the Deputy Director of Threat Intelligence for Unit 42 at Palo Alto Networks. She joins us to share their findings.
The research can be found here:
 https://unit42.paloaltonetworks.com/home-small-office-wireless-routers-exploited-to-attack-gaming-servers/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Palo Alto Networks' Unit 42 recently published research outlining attacks on home and small-business routers, taking advantage of known vulnerabilities to make the routers parts of botnets, ultimately used to attack gaming servers.</p><p>Jen Miller-Osborn is the Deputy Director of Threat Intelligence for Unit 42 at Palo Alto Networks. She joins us to share their findings.</p><p>The research can be found here:</p><p><a href="https://unit42.paloaltonetworks.com/home-small-office-wireless-routers-exploited-to-attack-gaming-servers/"> https://unit42.paloaltonetworks.com/home-small-office-wireless-routers-exploited-to-attack-gaming-servers/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1120</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2f44bcc2-d3a7-42ca-8cb8-010aba7d4a8e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3931032960.mp3?updated=1685107424" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mustang Panda leverages Windows shortcut files.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/112/notes</link>
      <description>Researchers at Anomali have been tracking China-based threat group, Mustang Panda, believing them to be responsible for attacks making clever use of Windows shortcut files. 
Parthiban is a researcher at Anomali, and he joins us to share their findings.
The research is here:
 https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Nov 2019 06:00:00 -0000</pubDate>
      <itunes:title>Mustang Panda leverages Windows shortcut files.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>112</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7634d416-dcfb-11ea-975e-e3732130ff01/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Anomali have been tracking China-based threat group, Mustang Panda, believing them to be responsible for attacks making clever use of Windows shortcut files. 
Parthiban is a researcher at Anomali, and he joins us to share their findings.
The research is here:
 https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Anomali have been tracking China-based threat group, Mustang Panda, believing them to be responsible for attacks making clever use of Windows shortcut files. </p><p>Parthiban is a researcher at Anomali, and he joins us to share their findings.</p><p>The research is here:</p><p><a href="https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations"> https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>882</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c23d9dd6-58d4-4ac8-b1ad-a8b22239ca27]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7542299701.mp3?updated=1685107410" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sodinokibi aka REvil connections to GandCrab.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/111/notes</link>
      <description>Researchers at McAfee's Advanced Threat Research Team have been analyzing Sodinokibi ransomware as a service, also known as REvil. John Fokker is head of cyber investigations for McAfee Advanced Threat Research, and he joins us to share their findings.
The research is here:
 https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/mcafee-atr-analyzes-sodinokibi-aka-revil-ransomware-as-a-service-what-the-code-tells-us/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Nov 2019 06:00:00 -0000</pubDate>
      <itunes:title>Sodinokibi aka REvil connections to GandCrab.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>111</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/764f5c00-dcfb-11ea-975e-4f274fa02fd6/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at McAfee's Advanced Threat Research Team have been analyzing Sodinokibi ransomware as a service, also known as REvil. John Fokker is head of cyber investigations for McAfee Advanced Threat Research, and he joins us to share their findings.
The research is here:
 https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/mcafee-atr-analyzes-sodinokibi-aka-revil-ransomware-as-a-service-what-the-code-tells-us/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at McAfee's Advanced Threat Research Team have been analyzing Sodinokibi ransomware as a service, also known as REvil. John Fokker is head of cyber investigations for McAfee Advanced Threat Research, and he joins us to share their findings.</p><p>The research is here:</p><p><a href="https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/mcafee-atr-analyzes-sodinokibi-aka-revil-ransomware-as-a-service-what-the-code-tells-us/"> https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/mcafee-atr-analyzes-sodinokibi-aka-revil-ransomware-as-a-service-what-the-code-tells-us/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1178</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[36ee4516819945658cfe0c65c767e607]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1782890955.mp3?updated=1685107403" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Monitoring the growing sophistication of PKPLUG.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/110/notes</link>
      <description>Researchers from Palo Alto Networks' Unit 42 have been tracking a Chinese cyber espionage group they've named PKPLUG. The group mainly targets victims in the Southeast Asia region. Ryan Olson is VP of threat intelligence at Palo Alto Networks, and he joins us to share their findings.
The original research is here:
 https://unit42.paloaltonetworks.com/pkplug_chinese_cyber_espionage_group_attacking_asia/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Nov 2019 06:00:00 -0000</pubDate>
      <itunes:title>Monitoring the growing sophistication of PKPLUG.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>110</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/766b6dc8-dcfb-11ea-975e-f7227d2e6279/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers from Palo Alto Networks' Unit 42 have been tracking a Chinese cyber espionage group they've named PKPLUG. The group mainly targets victims in the Southeast Asia region. Ryan Olson is VP of threat intelligence at Palo Alto Networks, and he joins us to share their findings.
The original research is here:
 https://unit42.paloaltonetworks.com/pkplug_chinese_cyber_espionage_group_attacking_asia/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers from Palo Alto Networks' Unit 42 have been tracking a Chinese cyber espionage group they've named PKPLUG. The group mainly targets victims in the Southeast Asia region. Ryan Olson is VP of threat intelligence at Palo Alto Networks, and he joins us to share their findings.</p><p>The original research is here:</p><p><a href="https://unit42.paloaltonetworks.com/pkplug_chinese_cyber_espionage_group_attacking_asia/"> https://unit42.paloaltonetworks.com/pkplug_chinese_cyber_espionage_group_attacking_asia/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1385</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c37cb64cc0c24be59a1dcdc757b4afc2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1794738937.mp3?updated=1685107397" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Usable security is a delicate balance.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/109/notes</link>
      <description>Until recently, usability was often an afterthought when developing security tools. These days there's growing realization that usability is a fundamental part of security. Lorrie Cranor is director of the CyLab Usable Privacy and Security lab (CUPS) at Carnegie Mellon University. She shares the work she's been doing with her colleagues and students to improve security through usability.
The research can be found here:
https://www.cylab.cmu.edu/news/2019/07/29-usability-history.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Nov 2019 05:00:00 -0000</pubDate>
      <itunes:title>Usable security is a delicate balance.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>109</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7682976e-dcfb-11ea-975e-0ff22246d35e/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Until recently, usability was often an afterthought when developing security tools. These days there's growing realization that usability is a fundamental part of security. Lorrie Cranor is director of the CyLab Usable Privacy and Security lab (CUPS) at Carnegie Mellon University. She shares the work she's been doing with her colleagues and students to improve security through usability.
The research can be found here:
https://www.cylab.cmu.edu/news/2019/07/29-usability-history.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Until recently, usability was often an afterthought when developing security tools. These days there's growing realization that usability is a fundamental part of security. Lorrie Cranor is director of the CyLab Usable Privacy and Security lab (CUPS) at Carnegie Mellon University. She shares the work she's been doing with her colleagues and students to improve security through usability.</p><p>The research can be found here:</p><p><a href="https://www.cylab.cmu.edu/news/2019/07/29-usability-history.html">https://www.cylab.cmu.edu/news/2019/07/29-usability-history.html</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1230</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fc78e48f88fa4ce099de26c363b763f0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6853772440.mp3?updated=1685106907" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Masad Steals via Social Media.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/108/notes</link>
      <description>Researchers at Juniper Networks have been tracking a trojan they call Masad Stealer, which uses the Telegram instant messaging platform for part it its command and control infrastructure. (Telegram wasn't hacked; it's the innocent conduit.) Mounir Hahad is head of Juniper Threat Labs at Juniper Networks and he joins us to share their findings
The original research is here:
 https://forums.juniper.net/t5/Threat-Research/Masad-Stealer-Exfiltrating-using-Telegram/ba-p/468559
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Oct 2019 05:00:00 -0000</pubDate>
      <itunes:title>Masad Steals via Social Media.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>108</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/76a6ee2a-dcfb-11ea-975e-57a64a0e9260/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Juniper Networks have been tracking a trojan they call Masad Stealer, which uses the Telegram instant messaging platform for part it its command and control infrastructure. (Telegram wasn't hacked; it's the innocent conduit.) Mounir Hahad is head of Juniper Threat Labs at Juniper Networks and he joins us to share their findings
The original research is here:
 https://forums.juniper.net/t5/Threat-Research/Masad-Stealer-Exfiltrating-using-Telegram/ba-p/468559
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Juniper Networks have been tracking a trojan they call Masad Stealer, which uses the Telegram instant messaging platform for part it its command and control infrastructure. (Telegram wasn't hacked; it's the innocent conduit.) Mounir Hahad is head of Juniper Threat Labs at Juniper Networks and he joins us to share their findings</p><p>The original research is here:</p><p><a href="https://forums.juniper.net/t5/Threat-Research/Masad-Stealer-Exfiltrating-using-Telegram/ba-p/468559"> https://forums.juniper.net/t5/Threat-Research/Masad-Stealer-Exfiltrating-using-Telegram/ba-p/468559</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1204</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a5b2311d9f744da78bf15f65c25ca6f8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1053224440.mp3?updated=1685106898" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hoping for SOHO security.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/107/notes</link>
      <description>Researchers at Independent Security Evaluators (ISE) recently published a report titled SOHOpelessly Broken 2.0, Security Vulnerabilities in Network Accessible Services. This publication continues and expands previous work they did examining small office/home office (SOHO) routers, network-attached storage devices (NAS), and IP cameras. 
Shaun Mirani is a security analyst at ISE, and he joins us to share their findings. 

The original research is here:
https://www.ise.io/whitepaper/sohopelessly-broken-2/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Oct 2019 05:00:00 -0000</pubDate>
      <itunes:title>Hoping for SOHO security.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>107</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/76c4baae-dcfb-11ea-975e-676694f09fb7/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Independent Security Evaluators (ISE) recently published a report titled SOHOpelessly Broken 2.0, Security Vulnerabilities in Network Accessible Services. This publication continues and expands previous work they did examining small office/home office (SOHO) routers, network-attached storage devices (NAS), and IP cameras. 
Shaun Mirani is a security analyst at ISE, and he joins us to share their findings. 

The original research is here:
https://www.ise.io/whitepaper/sohopelessly-broken-2/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Independent Security Evaluators (ISE) recently published a report titled SOHOpelessly Broken 2.0, Security Vulnerabilities in Network Accessible Services. This publication continues and expands previous work they did examining small office/home office (SOHO) routers, network-attached storage devices (NAS), and IP cameras. </p><p>Shaun Mirani is a security analyst at ISE, and he joins us to share their findings. </p><p><br></p><p>The original research is here:</p><p><a href="https://www.ise.io/whitepaper/sohopelessly-broken-2/">https://www.ise.io/whitepaper/sohopelessly-broken-2/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1065</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f228f639c0d2491aace468b3b46cdad5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3193052793.mp3?updated=1685106884" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Decrypting ransomware for good.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/106/notes</link>
      <description>Michael Gillespie is a programmer at Emsisoft, as well as a host of the popular ID Ransomware web site that helps victims identify what strain of ransomware they may have been infected with, and what decryptors may be available. He's written many decryptors himself, most recently for the Syrk strain of ransomware. 
Links to the research and Michael's work:
 https://blog.emsisoft.com/en/33885/emsisoft-releases-a-free-decryptor-for-the-syrk-ransomware/
https://id-ransomware.malwarehunterteam.com/
https://www.youtube.com/user/Demonslay335
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Oct 2019 05:00:00 -0000</pubDate>
      <itunes:title>Decrypting ransomware for good.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>106</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/76e1617c-dcfb-11ea-975e-7f9131a81c7e/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Michael Gillespie is a programmer at Emsisoft, as well as a host of the popular ID Ransomware web site that helps victims identify what strain of ransomware they may have been infected with, and what decryptors may be available. He's written many decryptors himself, most recently for the Syrk strain of ransomware. 
Links to the research and Michael's work:
 https://blog.emsisoft.com/en/33885/emsisoft-releases-a-free-decryptor-for-the-syrk-ransomware/
https://id-ransomware.malwarehunterteam.com/
https://www.youtube.com/user/Demonslay335
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Michael Gillespie is a programmer at Emsisoft, as well as a host of the popular ID Ransomware web site that helps victims identify what strain of ransomware they may have been infected with, and what decryptors may be available. He's written many decryptors himself, most recently for the Syrk strain of ransomware. </p><p>Links to the research and Michael's work:</p><p><a href="https://blog.emsisoft.com/en/33885/emsisoft-releases-a-free-decryptor-for-the-syrk-ransomware/"> https://blog.emsisoft.com/en/33885/emsisoft-releases-a-free-decryptor-for-the-syrk-ransomware/</a></p><p><a href="https://id-ransomware.malwarehunterteam.com/">https://id-ransomware.malwarehunterteam.com/</a></p><p><a href="https://www.youtube.com/user/Demonslay335">https://www.youtube.com/user/Demonslay335</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1341</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[971c1ab6877e4ddbb693ee6ffe05e3db]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8858332654.mp3?updated=1685106877" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The fuzzy boundaries of APT41.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/105/notes</link>
      <description>Researchers at FireEye recently released a report detailing the activities of APT41, a Chinese cyber threat group notable for the range of tools they use, their origins in the world of video gaming, and their willingness to shift from seemingly state-sponsored activity to hacking for personal gain. 
Nalani Fraser and Fred Plan contributed to the report, and they join us to share their findings.
The original research is here:
 https://www.fireeye.com/blog/threat-research/2019/08/apt41-dual-espionage-and-cyber-crime-operation.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Oct 2019 05:00:00 -0000</pubDate>
      <itunes:title>The fuzzy boundaries of APT41.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>105</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/76f78952-dcfb-11ea-975e-977cbb09d720/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at FireEye recently released a report detailing the activities of APT41, a Chinese cyber threat group notable for the range of tools they use, their origins in the world of video gaming, and their willingness to shift from seemingly state-sponsored activity to hacking for personal gain. 
Nalani Fraser and Fred Plan contributed to the report, and they join us to share their findings.
The original research is here:
 https://www.fireeye.com/blog/threat-research/2019/08/apt41-dual-espionage-and-cyber-crime-operation.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at FireEye recently released a report detailing the activities of APT41, a Chinese cyber threat group notable for the range of tools they use, their origins in the world of video gaming, and their willingness to shift from seemingly state-sponsored activity to hacking for personal gain. </p><p>Nalani Fraser and Fred Plan contributed to the report, and they join us to share their findings.</p><p>The original research is here:</p><p><a href="https://www.fireeye.com/blog/threat-research/2019/08/apt41-dual-espionage-and-cyber-crime-operation.html"> https://www.fireeye.com/blog/threat-research/2019/08/apt41-dual-espionage-and-cyber-crime-operation.html</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1520</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3eb8fc34c8ed4420b3b89058f87959a8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5000628875.mp3?updated=1685106868" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Focusing on Autumn Aperture.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/104/notes</link>
      <description>Researchers at Prevalion have been tracking a malware campaign making use of antiquated file formats and social engineering to target specific groups. 

Danny Adamitis and Elizabeth Wharton are coauthors of the report, and they join us to share their findings.
The research can be found here:
https://blog.prevailion.com/2019/09/autumn-aperture-report.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Sep 2019 05:00:00 -0000</pubDate>
      <itunes:title>Focusing on Autumn Aperture.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>104</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7705e830-dcfb-11ea-975e-47dc90f34784/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Prevalion have been tracking a malware campaign making use of antiquated file formats and social engineering to target specific groups. 

Danny Adamitis and Elizabeth Wharton are coauthors of the report, and they join us to share their findings.
The research can be found here:
https://blog.prevailion.com/2019/09/autumn-aperture-report.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Prevalion have been tracking a malware campaign making use of antiquated file formats and social engineering to target specific groups. </p><p><br></p><p>Danny Adamitis and Elizabeth Wharton are coauthors of the report, and they join us to share their findings.</p><p>The research can be found here:</p><p><a href="https://blog.prevailion.com/2019/09/autumn-aperture-report.html">https://blog.prevailion.com/2019/09/autumn-aperture-report.html</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1253</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[61baf074391b400cb1f1a23c23568034]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6053439041.mp3?updated=1684590268" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leaky guest networks and covert channels.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/103/notes</link>
      <description>Many users of inexpensive internet routers use guest network functionality to help secure their home networks. Researchers at Ben Gurion University have discovered methods for defeating these security measures. Dr. Yossi Oren joins us to share their findings.
The original research is here:
https://www.usenix.org/system/files/woot19-paper_ovadia.pdf
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Sep 2019 05:00:00 -0000</pubDate>
      <itunes:title>Leaky guest networks and covert channels.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>103</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7724f5ae-dcfb-11ea-975e-af88b9a07666/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Many users of inexpensive internet routers use guest network functionality to help secure their home networks. Researchers at Ben Gurion University have discovered methods for defeating these security measures. Dr. Yossi Oren joins us to share their findings.
The original research is here:
https://www.usenix.org/system/files/woot19-paper_ovadia.pdf
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Many users of inexpensive internet routers use guest network functionality to help secure their home networks. Researchers at Ben Gurion University have discovered methods for defeating these security measures. Dr. Yossi Oren joins us to share their findings.</p><p>The original research is here:</p><p><a href="https://www.usenix.org/system/files/woot19-paper_ovadia.pdf">https://www.usenix.org/system/files/woot19-paper_ovadia.pdf</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1068</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6508bb5913ef4aa0a06f287a15441134]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8076553193.mp3?updated=1685044947" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bluetooth blues: KNOB attack explained.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/102/notes</link>
      <description>A team of researchers have published a report titled, "KNOB Attack.
Key Negotiation of Bluetooth Attack: Breaking Bluetooth Security." The report outlines vulnerabilities in the Bluetooth standard, along with mitigations to prevent them. 
Daniele Antonioli is from Singapore University of Technology and Design, and is one of the researchers studying KNOB. He joins us to share their findings.
The research can be found here:
https://knobattack.com
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Sep 2019 05:00:00 -0000</pubDate>
      <itunes:title>Bluetooth blues: KNOB attack explained.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>102</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/773b4a0c-dcfb-11ea-975e-03c214454571/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A team of researchers have published a report titled, "KNOB Attack.
Key Negotiation of Bluetooth Attack: Breaking Bluetooth Security." The report outlines vulnerabilities in the Bluetooth standard, along with mitigations to prevent them. 
Daniele Antonioli is from Singapore University of Technology and Design, and is one of the researchers studying KNOB. He joins us to share their findings.
The research can be found here:
https://knobattack.com
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A team of researchers have published a report titled, "KNOB Attack.</p><p>Key Negotiation of Bluetooth Attack: Breaking Bluetooth Security." The report outlines vulnerabilities in the Bluetooth standard, along with mitigations to prevent them. </p><p>Daniele Antonioli is from Singapore University of Technology and Design, and is one of the researchers studying KNOB. He joins us to share their findings.</p><p>The research can be found here:</p><p><a href="https://knobattack.com">https://knobattack.com</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1158</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[184870f69d214967aff0e253a29c95cd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4830324286.mp3?updated=1685044937" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>VOIP phone system harbors decade-old vulnerability.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/101/notes</link>
      <description>Researchers at McAfee's Advanced Threat Research Team recently published the results of their investigation into a popular VOIP system, where they discovered a well-know, decade-old vulnerability in open source software used on the platform. 
Steve Povolny serves as the Head of Advanced Threat Research at McAfee, and he joins us to share their findings.
The original research can be found here:
 https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/avaya-deskphone-decade-old-vulnerability-found-in-phones-firmware/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Sep 2019 05:00:00 -0000</pubDate>
      <itunes:title>VOIP phone system harbors decade-old vulnerability.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>101</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/775b7584-dcfb-11ea-975e-bfa6350c9027/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at McAfee's Advanced Threat Research Team recently published the results of their investigation into a popular VOIP system, where they discovered a well-know, decade-old vulnerability in open source software used on the platform. 
Steve Povolny serves as the Head of Advanced Threat Research at McAfee, and he joins us to share their findings.
The original research can be found here:
 https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/avaya-deskphone-decade-old-vulnerability-found-in-phones-firmware/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at McAfee's Advanced Threat Research Team recently published the results of their investigation into a popular VOIP system, where they discovered a well-know, decade-old vulnerability in open source software used on the platform. </p><p>Steve Povolny serves as the Head of Advanced Threat Research at McAfee, and he joins us to share their findings.</p><p>The original research can be found here:</p><p><a href="https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/avaya-deskphone-decade-old-vulnerability-found-in-phones-firmware/"> https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/avaya-deskphone-decade-old-vulnerability-found-in-phones-firmware/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1705</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[63f35802db874d60abef8ece3bddaed8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5400519694.mp3?updated=1685044924" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Emotet's updated business model.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/100/notes</link>
      <description>The Emotet malware came on the scene in 2014 as a banking trojan and has since evolved in sophistication and shifted its business model. Researchers at Bromium have taken a detailed look at Emotet, and malware analyst Alex Holland joins us to share their findings.
The research can be found here:
 https://www.google.com/url?q=https://www.bromium.com/resource/emotet-a-technical-analysis-of-the-destructive-polymorphic-malware
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 31 Aug 2019 05:00:00 -0000</pubDate>
      <itunes:title>Emotet's updated business model.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>100</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/777242fa-dcfb-11ea-975e-e39d84d61f53/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Emotet malware came on the scene in 2014 as a banking trojan and has since evolved in sophistication and shifted its business model. Researchers at Bromium have taken a detailed look at Emotet, and malware analyst Alex Holland joins us to share their findings.
The research can be found here:
 https://www.google.com/url?q=https://www.bromium.com/resource/emotet-a-technical-analysis-of-the-destructive-polymorphic-malware
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Emotet malware came on the scene in 2014 as a banking trojan and has since evolved in sophistication and shifted its business model. Researchers at Bromium have taken a detailed look at Emotet, and malware analyst Alex Holland joins us to share their findings.</p><p>The research can be found here:</p><p><a href="https://www.google.com/url?q=https://www.bromium.com/resource/emotet-a-technical-analysis-of-the-destructive-polymorphic-malware"> https://www.google.com/url?q=https://www.bromium.com/resource/emotet-a-technical-analysis-of-the-destructive-polymorphic-malware</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1524</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3675f10b3d124a6d93cb078b83db4d8e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6907441515.mp3?updated=1685044909" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Gift card bots evolve and adapt.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/99/notes</link>
      <description>Researchers at Distil Networks have been tracking online bots targeting ecommerce gift card systems of major online retailers. The threat actors show remarkable resourcefulness and adaptability. Jonathan Butler is technical account team manager at Distil Networks, part of Imperva, and he joins to share their findings.
The research can be found here:
 https://resources.distilnetworks.com/all-blog-posts/giftghostbot-attacks-ecommerce-gift-card-systems
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Aug 2019 05:00:00 -0000</pubDate>
      <itunes:title>Gift card bots evolve and adapt.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>99</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/779a1172-dcfb-11ea-975e-8fbae4bbe6e4/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Distil Networks have been tracking online bots targeting ecommerce gift card systems of major online retailers. The threat actors show remarkable resourcefulness and adaptability. Jonathan Butler is technical account team manager at Distil Networks, part of Imperva, and he joins to share their findings.
The research can be found here:
 https://resources.distilnetworks.com/all-blog-posts/giftghostbot-attacks-ecommerce-gift-card-systems
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Distil Networks have been tracking online bots targeting ecommerce gift card systems of major online retailers. The threat actors show remarkable resourcefulness and adaptability. Jonathan Butler is technical account team manager at Distil Networks, part of Imperva, and he joins to share their findings.</p><p>The research can be found here:</p><p><a href="https://resources.distilnetworks.com/all-blog-posts/giftghostbot-attacks-ecommerce-gift-card-systems"> https://resources.distilnetworks.com/all-blog-posts/giftghostbot-attacks-ecommerce-gift-card-systems</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1547</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8a495db7633f40b98d8b4338164caf64]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6611055047.mp3?updated=1685044895" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Detecting dating profile fraud.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/98/notes</link>
      <description>Researchers from King’s College London, University of Bristol, Boston University, and University of Melbourne recently collaborated to publish a report titled, "Automatically Dismantling Online Dating Fraud." The research outlines techniques to analyze and identify fraudulent online dating profiles with a high degree of accuracy.

Professor Awais Rashid is one of the report's authors, and he joins us to share their findings.
The original research can be found here:
https://arxiv.org/pdf/1905.12593.pdf
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Aug 2019 05:00:00 -0000</pubDate>
      <itunes:title>Detecting dating profile fraud.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>98</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/77b5734a-dcfb-11ea-975e-0734d17c996a/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers from King’s College London, University of Bristol, Boston University, and University of Melbourne recently collaborated to publish a report titled, "Automatically Dismantling Online Dating Fraud." The research outlines techniques to analyze and identify fraudulent online dating profiles with a high degree of accuracy.

Professor Awais Rashid is one of the report's authors, and he joins us to share their findings.
The original research can be found here:
https://arxiv.org/pdf/1905.12593.pdf
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers from King’s College London, University of Bristol, Boston University, and University of Melbourne recently collaborated to publish a report titled, "Automatically Dismantling Online Dating Fraud." The research outlines techniques to analyze and identify fraudulent online dating profiles with a high degree of accuracy.</p><p><br></p><p>Professor Awais Rashid is one of the report's authors, and he joins us to share their findings.</p><p>The original research can be found here:</p><p><a href="https://arxiv.org/pdf/1905.12593.pdf">https://arxiv.org/pdf/1905.12593.pdf</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1642</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2506374ad03b4c9c82e5a8aa991d2f87]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8699506473.mp3?updated=1685044848" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unpacking the Malvertising Ecosystem.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/97/notes</link>
      <description>Researchers at Cisco's Talos Unit recently published research exploring the tactics, technics and procedures of the global malvertising ecosystem. Craig Williams is head of Talos Outreach at Cisco, and he guides us through the life cycle of malicious online ads, along with tips for protecting yourself and your organization.
The research can be found here: 
 https://blog.talosintelligence.com/2019/07/malvertising-deepdive.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Aug 2019 05:00:00 -0000</pubDate>
      <itunes:title>Unpacking the Malvertising Ecosystem.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>97</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/77e4d126-dcfb-11ea-975e-4316e2172483/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Cisco's Talos Unit recently published research exploring the tactics, technics and procedures of the global malvertising ecosystem. Craig Williams is head of Talos Outreach at Cisco, and he guides us through the life cycle of malicious online ads, along with tips for protecting yourself and your organization.
The research can be found here: 
 https://blog.talosintelligence.com/2019/07/malvertising-deepdive.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Cisco's Talos Unit recently published research exploring the tactics, technics and procedures of the global malvertising ecosystem. Craig Williams is head of Talos Outreach at Cisco, and he guides us through the life cycle of malicious online ads, along with tips for protecting yourself and your organization.</p><p>The research can be found here: </p><p><a href="https://blog.talosintelligence.com/2019/07/malvertising-deepdive.html"> https://blog.talosintelligence.com/2019/07/malvertising-deepdive.html</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1707</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[558642666e3243f9ad455929bf8d63e6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6809340389.mp3?updated=1685044839" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Package manager repository malware detection.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/96/notes</link>
      <description>Researchers at Reversing Labs have been tracking malware hidden in software package manager repositories, and it's use as a supply chain attack vector. Robert Perica is a principal engineer at Reversing Labs, and he joins us to share their findings. 
The research can be found here:
 https://blog.reversinglabs.com/blog/suppy-chain-malware-detecting-malware-in-package-manager-repositories
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Aug 2019 05:00:00 -0000</pubDate>
      <itunes:title>Package manager repository malware detection.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>96</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/77ffcd00-dcfb-11ea-975e-6739c2b0f7f7/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Reversing Labs have been tracking malware hidden in software package manager repositories, and it's use as a supply chain attack vector. Robert Perica is a principal engineer at Reversing Labs, and he joins us to share their findings. 
The research can be found here:
 https://blog.reversinglabs.com/blog/suppy-chain-malware-detecting-malware-in-package-manager-repositories
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Reversing Labs have been tracking malware hidden in software package manager repositories, and it's use as a supply chain attack vector. Robert Perica is a principal engineer at Reversing Labs, and he joins us to share their findings. </p><p>The research can be found here:</p><p><a href="https://blog.reversinglabs.com/blog/suppy-chain-malware-detecting-malware-in-package-manager-repositories"> https://blog.reversinglabs.com/blog/suppy-chain-malware-detecting-malware-in-package-manager-repositories</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>836</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[69c06ae5e9d44abbbf6fad01d3d0c49e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6353748800.mp3?updated=1685044815" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Day to day app fraud in the Google Play store.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/95/notes</link>
      <description>Researchers at bot mitigation firm White Ops have been tracking fraudulent apps in the Google Play store. These apps often imitate legitimate apps, even going so far as to lift code directly from them, but instead of providing true functionality they harvest user data and send it back to command and control servers.
Marcelle Lee is a principal threat intel researcher at White Ops, and she shares their findings. 
The original research can be found here —
https://www.whiteops.com/blog/another-day-another-fraudulent-app
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Jul 2019 05:00:00 -0000</pubDate>
      <itunes:title>Day to day app fraud in the Google Play store.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>95</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/782598fa-dcfb-11ea-975e-1fbe478e2bf3/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at bot mitigation firm White Ops have been tracking fraudulent apps in the Google Play store. These apps often imitate legitimate apps, even going so far as to lift code directly from them, but instead of providing true functionality they harvest user data and send it back to command and control servers.
Marcelle Lee is a principal threat intel researcher at White Ops, and she shares their findings. 
The original research can be found here —
https://www.whiteops.com/blog/another-day-another-fraudulent-app
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at bot mitigation firm White Ops have been tracking fraudulent apps in the Google Play store. These apps often imitate legitimate apps, even going so far as to lift code directly from them, but instead of providing true functionality they harvest user data and send it back to command and control servers.</p><p>Marcelle Lee is a principal threat intel researcher at White Ops, and she shares their findings. </p><p>The original research can be found here —</p><p><a href="https://www.whiteops.com/blog/another-day-another-fraudulent-app">https://www.whiteops.com/blog/another-day-another-fraudulent-app</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1345</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1bff691f08714b88bcf226943b854c38]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6496542723.mp3?updated=1685044805" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Nansh0u not your normal cryptominer.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/94/notes</link>
      <description>Researchers at Guardicore Labs have been tracking an unusual cryptominer that seems to be based in China and is targeting Windows MS-SQL and phpMyAdmin servers. Some elements of the exploit make use of sophisticated components previously associated with nation-state actors.
Ophir Harpaz and Daniel Goldberg are members of the Guardicore Labs team, and they join us to explain their findings.
The research can be found here - 
 https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Jul 2019 05:00:00 -0000</pubDate>
      <itunes:title>Nansh0u not your normal cryptominer.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>94</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/783cf068-dcfb-11ea-975e-9f7f2770ec9f/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Guardicore Labs have been tracking an unusual cryptominer that seems to be based in China and is targeting Windows MS-SQL and phpMyAdmin servers. Some elements of the exploit make use of sophisticated components previously associated with nation-state actors.
Ophir Harpaz and Daniel Goldberg are members of the Guardicore Labs team, and they join us to explain their findings.
The research can be found here - 
 https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Guardicore Labs have been tracking an unusual cryptominer that seems to be based in China and is targeting Windows MS-SQL and phpMyAdmin servers. Some elements of the exploit make use of sophisticated components previously associated with nation-state actors.</p><p>Ophir Harpaz and Daniel Goldberg are members of the Guardicore Labs team, and they join us to explain their findings.</p><p>The research can be found here - </p><p><a href="https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/"> https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1206</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[29a07624a59d4c6db65f9b100ef5b918]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4691420440.mp3?updated=1685044790" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Opportunistic botnets round up vulnerable routers.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/93/notes</link>
      <description>Researchers at Netscout's ASERT Team have been tracking the growth of botnets originating in Egypt and targeting routers in South Africa. The payload is a variant of the Hakai DDoS bot.
Richard Hummel is threat intelligence manager at Netscout, and he joins us to share their findings.
The original research is here:
 https://www.netscout.com/blog/asert/realtek-sdk-exploits-rise-egypt
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Jul 2019 05:00:00 -0000</pubDate>
      <itunes:title>Opportunistic botnets round up vulnerable routers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>93</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/78537e96-dcfb-11ea-975e-0f2ff9eb0add/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Netscout's ASERT Team have been tracking the growth of botnets originating in Egypt and targeting routers in South Africa. The payload is a variant of the Hakai DDoS bot.
Richard Hummel is threat intelligence manager at Netscout, and he joins us to share their findings.
The original research is here:
 https://www.netscout.com/blog/asert/realtek-sdk-exploits-rise-egypt
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Netscout's ASERT Team have been tracking the growth of botnets originating in Egypt and targeting routers in South Africa. The payload is a variant of the Hakai DDoS bot.</p><p>Richard Hummel is threat intelligence manager at Netscout, and he joins us to share their findings.</p><p>The original research is here:</p><p><a href="https://www.netscout.com/blog/asert/realtek-sdk-exploits-rise-egypt"> https://www.netscout.com/blog/asert/realtek-sdk-exploits-rise-egypt</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1226</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5e9be9ee6ef14f2286e0b5f5f04bdb1a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5759915531.mp3?updated=1685044773" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Giving everyone a stake in the success of Open Source implementation.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/92/notes</link>
      <description>Synopsys recently published the 2019 edition of their Open Source Security and Risk Analysis (OSSRA) Report, providing an in-depth look at the state of open source security, compliance, and code quality risk in commercial software.

Tim Mackey is principal security strategist within the Synopsys Cyber Research Center, and he joins us to share their findings.
The research can be found here:
 https://www.synopsys.com/software-integrity/resources/analyst-reports/2019-open-source-security-risk-analysis.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 Jun 2019 05:00:00 -0000</pubDate>
      <itunes:title>Giving everyone a stake in the success of Open Source implementation.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>92</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7863c634-dcfb-11ea-975e-8b6a70b8d1d8/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Synopsys recently published the 2019 edition of their Open Source Security and Risk Analysis (OSSRA) Report, providing an in-depth look at the state of open source security, compliance, and code quality risk in commercial software.

Tim Mackey is principal security strategist within the Synopsys Cyber Research Center, and he joins us to share their findings.
The research can be found here:
 https://www.synopsys.com/software-integrity/resources/analyst-reports/2019-open-source-security-risk-analysis.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Synopsys recently published the 2019 edition of their Open Source Security and Risk Analysis (OSSRA) Report, providing an in-depth look at the state of open source security, compliance, and code quality risk in commercial software.</p><p><br></p><p>Tim Mackey is principal security strategist within the Synopsys Cyber Research Center, and he joins us to share their findings.</p><p>The research can be found here:</p><p><a href="https://www.synopsys.com/software-integrity/resources/analyst-reports/2019-open-source-security-risk-analysis.html"> https://www.synopsys.com/software-integrity/resources/analyst-reports/2019-open-source-security-risk-analysis.html</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1450</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[55f3c61ef228424bb6ccc1a6f028feb4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1100228490.mp3?updated=1685043125" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Middleboxes may be meddling with TLS connections.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/91/notes</link>
      <description>Researchers at Cloudflare have been examining HTTPS interception, a technique that weakens security, and have developed tools to help detect it. 
Nick Sullivan is head of cryptography at Cloudflare, and he joins to us share their findings.
The research can be found here:
https://blog.cloudflare.com/monsters-in-the-middleboxes/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Jun 2019 05:00:00 -0000</pubDate>
      <itunes:title>Middleboxes may be meddling with TLS connections.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>91</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/78812e7c-dcfb-11ea-975e-339701bc2a4f/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Cloudflare have been examining HTTPS interception, a technique that weakens security, and have developed tools to help detect it. 
Nick Sullivan is head of cryptography at Cloudflare, and he joins to us share their findings.
The research can be found here:
https://blog.cloudflare.com/monsters-in-the-middleboxes/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Cloudflare have been examining HTTPS interception, a technique that weakens security, and have developed tools to help detect it. </p><p>Nick Sullivan is head of cryptography at Cloudflare, and he joins to us share their findings.</p><p>The research can be found here:</p><p><a href="https://blog.cloudflare.com/monsters-in-the-middleboxes/">https://blog.cloudflare.com/monsters-in-the-middleboxes/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1452</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7bb2ef053c0c4e04bde4be123704a4a4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8576498794.mp3?updated=1685043110" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Apps on third-party Android store carry unwelcome code.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/90/notes</link>
      <description>Researchers at Zscaler have been tracking look-alike apps in third-party Android app stores that carry malicious code. Deepen Desai is VP of security research and operations and Zscaler, and he joins us to share their findings. 
The original research can be found here:
 https://www.zscaler.com/blogs/research/third-party-android-store-sms-trojan
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Jun 2019 05:00:00 -0000</pubDate>
      <itunes:title>Apps on third-party Android store carry unwelcome code.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>90</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7898a52a-dcfb-11ea-975e-7b654bc30206/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Zscaler have been tracking look-alike apps in third-party Android app stores that carry malicious code. Deepen Desai is VP of security research and operations and Zscaler, and he joins us to share their findings. 
The original research can be found here:
 https://www.zscaler.com/blogs/research/third-party-android-store-sms-trojan
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Zscaler have been tracking look-alike apps in third-party Android app stores that carry malicious code. Deepen Desai is VP of security research and operations and Zscaler, and he joins us to share their findings. </p><p>The original research can be found here:</p><p><a href="https://www.zscaler.com/blogs/research/third-party-android-store-sms-trojan"> https://www.zscaler.com/blogs/research/third-party-android-store-sms-trojan</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>880</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8c7bceb1f4b345cea4e001134f2a2a2e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4615539637.mp3?updated=1685043088" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Xwo scans for default credentials and exposed web services.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/89/notes</link>
      <description>Researchers at AT&amp;T Alien Labs have been tracking a new malware family they've named "Xwo" that's scanning systems for default credentials and vulnerable web services. 
Tom Hegel is security researcher with AT&amp;T Alien Labs, and he share their findings.
The original research is here:
 https://www.alienvault.com/blogs/labs-research/xwo-a-python-based-bot-scanner
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Jun 2019 05:00:00 -0000</pubDate>
      <itunes:title>Xwo scans for default credentials and exposed web services. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>89</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/78c887ae-dcfb-11ea-975e-1f48079a7206/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at AT&amp;T Alien Labs have been tracking a new malware family they've named "Xwo" that's scanning systems for default credentials and vulnerable web services. 
Tom Hegel is security researcher with AT&amp;T Alien Labs, and he share their findings.
The original research is here:
 https://www.alienvault.com/blogs/labs-research/xwo-a-python-based-bot-scanner
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at AT&amp;T Alien Labs have been tracking a new malware family they've named "Xwo" that's scanning systems for default credentials and vulnerable web services. </p><p>Tom Hegel is security researcher with AT&amp;T Alien Labs, and he share their findings.</p><p>The original research is here:</p><p><a href="https://www.alienvault.com/blogs/labs-research/xwo-a-python-based-bot-scanner"> https://www.alienvault.com/blogs/labs-research/xwo-a-python-based-bot-scanner</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>998</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0d2becfb26364c9eb280eb8630bbd540]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1315989781.mp3?updated=1685043069" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Blockchain bandits plunder weak wallets.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/88/notes</link>
      <description>Adrian Bednarek is a senior research analyst at Independent Security Evaluators. He and his colleagues looked at weak private cryptocurrency keys on the Ethereum blockchain in an attempt to discover how and why they are being generated as well as how bad actors are taking advantage of them.
The original research is here:
https://www.securityevaluators.com/casestudies/ethercombing/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Jun 2019 05:00:00 -0000</pubDate>
      <itunes:title>Blockchain bandits plunder weak wallets.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>88</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/78f22d66-dcfb-11ea-975e-174090e1deae/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Adrian Bednarek is a senior research analyst at Independent Security Evaluators. He and his colleagues looked at weak private cryptocurrency keys on the Ethereum blockchain in an attempt to discover how and why they are being generated as well as how bad actors are taking advantage of them.
The original research is here:
https://www.securityevaluators.com/casestudies/ethercombing/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Adrian Bednarek is a senior research analyst at Independent Security Evaluators. He and his colleagues looked at weak private cryptocurrency keys on the Ethereum blockchain in an attempt to discover how and why they are being generated as well as how bad actors are taking advantage of them.</p><p>The original research is here:</p><p><a href="https://www.securityevaluators.com/casestudies/ethercombing/">https://www.securityevaluators.com/casestudies/ethercombing/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1294</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[988bf7285d3340dd8020c7b5da309b13]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3831567484.mp3?updated=1685029043" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A fresh look at GOSSIPGIRL and the Supra Threat Actors.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/87/notes</link>
      <description>Chronicle researchers Juan Andres Guerrero Saade and Silas Cutler recently published research tracking the development of the Stuxnet family of malware, which ultimately led them to the GOSSIPGIRL Supra Group of threat actors. 
Juan Andres Guerrero Saade joins us to share their findings.
The research can be found here:
https://medium.com/chronicle-blog/who-is-gossipgirl-3b4170f846c0
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 May 2019 05:00:00 -0000</pubDate>
      <itunes:title>A fresh look at GOSSIPGIRL and the Supra Threat Actors.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>87</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7909370e-dcfb-11ea-975e-278d959757fb/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Chronicle researchers Juan Andres Guerrero Saade and Silas Cutler recently published research tracking the development of the Stuxnet family of malware, which ultimately led them to the GOSSIPGIRL Supra Group of threat actors. 
Juan Andres Guerrero Saade joins us to share their findings.
The research can be found here:
https://medium.com/chronicle-blog/who-is-gossipgirl-3b4170f846c0
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chronicle researchers Juan Andres Guerrero Saade and Silas Cutler recently published research tracking the development of the Stuxnet family of malware, which ultimately led them to the GOSSIPGIRL Supra Group of threat actors. </p><p>Juan Andres Guerrero Saade joins us to share their findings.</p><p>The research can be found here:</p><p><a href="https://medium.com/chronicle-blog/who-is-gossipgirl-3b4170f846c0">https://medium.com/chronicle-blog/who-is-gossipgirl-3b4170f846c0</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1909</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[925a77e37895459895dc21c5605f047f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3196901715.mp3?updated=1685029026" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Elfin APT group targets Middle East energy sector.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/86/notes</link>
      <description>Researchers at Symantec have been tracking an espionage group known as Elfin (aka APT 33) that has targeted dozens of organizations over the past three years, primarily focusing on Saudi Arabia and the United States. 
Alan Neville is a principal threat intelligence analyst at Symantec, and he joins us to share their findings.
The research can be found here:
 https://www.symantec.com/blogs/threat-intelligence/elfin-apt33-espionage
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 May 2019 05:00:00 -0000</pubDate>
      <itunes:title>Elfin APT group targets Middle East energy sector.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>86</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/791d17c4-dcfb-11ea-975e-2b500facd0fd/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Symantec have been tracking an espionage group known as Elfin (aka APT 33) that has targeted dozens of organizations over the past three years, primarily focusing on Saudi Arabia and the United States. 
Alan Neville is a principal threat intelligence analyst at Symantec, and he joins us to share their findings.
The research can be found here:
 https://www.symantec.com/blogs/threat-intelligence/elfin-apt33-espionage
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Symantec have been tracking an espionage group known as Elfin (aka APT 33) that has targeted dozens of organizations over the past three years, primarily focusing on Saudi Arabia and the United States. </p><p>Alan Neville is a principal threat intelligence analyst at Symantec, and he joins us to share their findings.</p><p>The research can be found here:</p><p><a href="https://www.symantec.com/blogs/threat-intelligence/elfin-apt33-espionage"> https://www.symantec.com/blogs/threat-intelligence/elfin-apt33-espionage</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1061</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0b98be1e77374167a8235d2bcd6bf191]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9586931907.mp3?updated=1685029005" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Steganography enables sophisticated OceanLotus payloads.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/85/notes</link>
      <description>Researchers at Blackberry Cylance have been tracking payload obfuscation techniques employed by OceanLotus (APT32), specifically steganography used to hide code within seemingly benign image files.

Tom Bonner is director of threat research at Blackberry Cylance, and he joins us to share their findings.
The original research can be found here:
 https://www.cylance.com/en-us/lp/threat-research-and-intelligence/oceanlotus-steganography-malware-analysis-white-paper-2019.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 May 2019 05:00:00 -0000</pubDate>
      <itunes:title>Steganography enables sophisticated OceanLotus payloads.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>85</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/79349020-dcfb-11ea-975e-3bce0c63febd/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Blackberry Cylance have been tracking payload obfuscation techniques employed by OceanLotus (APT32), specifically steganography used to hide code within seemingly benign image files.

Tom Bonner is director of threat research at Blackberry Cylance, and he joins us to share their findings.
The original research can be found here:
 https://www.cylance.com/en-us/lp/threat-research-and-intelligence/oceanlotus-steganography-malware-analysis-white-paper-2019.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Blackberry Cylance have been tracking payload obfuscation techniques employed by OceanLotus (APT32), specifically steganography used to hide code within seemingly benign image files.</p><p><br></p><p>Tom Bonner is director of threat research at Blackberry Cylance, and he joins us to share their findings.</p><p>The original research can be found here:</p><p><a href="https://www.cylance.com/en-us/lp/threat-research-and-intelligence/oceanlotus-steganography-malware-analysis-white-paper-2019.html"> https://www.cylance.com/en-us/lp/threat-research-and-intelligence/oceanlotus-steganography-malware-analysis-white-paper-2019.html</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1193</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ccaf20bd84b2441cb99c4088875aa416]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3857654743.mp3?updated=1685028997" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sea Turtle state-sponsored DNS hijacking.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/84/notes</link>
      <description>Researchers at Cisco Talos have been tracking what they believe is a state-sponsored attack on DNS systems, targeting the Middle East and North Africa. This attack has the potential to erode trust and stability of the DNS system, so critical to the global economy.
Craig Williams is director of Talos Outreach at Cisco, and he joins us to share their findings. 
The original research can be found here:
https://blog.talosintelligence.com/2019/04/seaturtle.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 May 2019 05:00:00 -0000</pubDate>
      <itunes:title>Sea Turtle state-sponsored DNS hijacking.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>84</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/794bdaf0-dcfb-11ea-975e-ef95c6ba9d7c/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Cisco Talos have been tracking what they believe is a state-sponsored attack on DNS systems, targeting the Middle East and North Africa. This attack has the potential to erode trust and stability of the DNS system, so critical to the global economy.
Craig Williams is director of Talos Outreach at Cisco, and he joins us to share their findings. 
The original research can be found here:
https://blog.talosintelligence.com/2019/04/seaturtle.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Cisco Talos have been tracking what they believe is a state-sponsored attack on DNS systems, targeting the Middle East and North Africa. This attack has the potential to erode trust and stability of the DNS system, so critical to the global economy.</p><p>Craig Williams is director of Talos Outreach at Cisco, and he joins us to share their findings. </p><p>The original research can be found here:</p><p>https://blog.talosintelligence.com/2019/04/seaturtle.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1556</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[65c5cb4119a44c03b6dd0947e04a5edd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9585450398.mp3?updated=1685028979" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Deep Learning threatens 3D medical imaging integrity.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/83/notes</link>
      <description>Researchers at Ben Gurion University in Israel have developed techniques to infiltrate medical imaging system networks and alter 3D medical scans within, fooling both human and automated examiners with a high rate of success. 
Yisroel Mirsky is a cybersecurity researcher and project manager at Ben Gurion University, and he joins us to share what his team discovered.
The original research can be found here:
https://arxiv.org/pdf/1901.03597.pdf
A video demonstrating the exploit is here:
https://youtu.be/_mkRAArj-x0
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Apr 2019 05:00:00 -0000</pubDate>
      <itunes:title>Deep Learning threatens 3D medical imaging integrity.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>83</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/795ffd64-dcfb-11ea-975e-c39983647cee/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Ben Gurion University in Israel have developed techniques to infiltrate medical imaging system networks and alter 3D medical scans within, fooling both human and automated examiners with a high rate of success. 
Yisroel Mirsky is a cybersecurity researcher and project manager at Ben Gurion University, and he joins us to share what his team discovered.
The original research can be found here:
https://arxiv.org/pdf/1901.03597.pdf
A video demonstrating the exploit is here:
https://youtu.be/_mkRAArj-x0
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Ben Gurion University in Israel have developed techniques to infiltrate medical imaging system networks and alter 3D medical scans within, fooling both human and automated examiners with a high rate of success. </p><p>Yisroel Mirsky is a cybersecurity researcher and project manager at Ben Gurion University, and he joins us to share what his team discovered.</p><p>The original research can be found here:</p><p><a href="https://arxiv.org/pdf/1901.03597.pdf">https://arxiv.org/pdf/1901.03597.pdf</a></p><p>A video demonstrating the exploit is here:</p><p><a href="https://youtu.be/_mkRAArj-x0">https://youtu.be/_mkRAArj-x0</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1412</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4debc947169d4f9c9e1525900944b718]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1258784492.mp3?updated=1685028960" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Undetectable vote manipulation in SwissPost e-voting system.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/82/notes</link>
      <description>Researchers have discovered a number of vulnerabilities in the SwissPost e-vote system which could allow undetectable manipulation of votes. 
Dr Vanessa Teague is Associate Professor and Chair, Cybersecurity and Democracy Network at the Melbourne School of Engineering, University of Melbourne, Australia. She joins us to explain her team's findings.
The original research is here:
https://people.eng.unimelb.edu.au/vjteague/SwissVote
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Apr 2019 05:00:00 -0000</pubDate>
      <itunes:title>Undetectable vote manipulation in SwissPost e-voting system.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>82</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/797dcd58-dcfb-11ea-975e-6f37a0404439/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers have discovered a number of vulnerabilities in the SwissPost e-vote system which could allow undetectable manipulation of votes. 
Dr Vanessa Teague is Associate Professor and Chair, Cybersecurity and Democracy Network at the Melbourne School of Engineering, University of Melbourne, Australia. She joins us to explain her team's findings.
The original research is here:
https://people.eng.unimelb.edu.au/vjteague/SwissVote
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers have discovered a number of vulnerabilities in the SwissPost e-vote system which could allow undetectable manipulation of votes. </p><p>Dr Vanessa Teague is Associate Professor and Chair, Cybersecurity and Democracy Network at the Melbourne School of Engineering, University of Melbourne, Australia. She joins us to explain her team's findings.</p><p>The original research is here:</p><p><a href="https://people.eng.unimelb.edu.au/vjteague/SwissVote">https://people.eng.unimelb.edu.au/vjteague/SwissVote</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1701</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f1d4e91f3ced456c9d5073cf2ed290cb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5049512543.mp3?updated=1685028939" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Establishing software root of trust unconditionally.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/81/notes</link>
      <description>Researchers at Carnegie Mellon University's CyLab Security and Privacy Institute claim to have made an important breakthrough in establishing root of trust (RoT) to detect malware in computing devices. Virgil Gligor is one of the authors of the research, and he joins us to share their findings.
Link to original research - 
 https://www.ndss-symposium.org/ndss-paper/establishing-software-root-of-trust-unconditionally/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Apr 2019 05:00:00 -0000</pubDate>
      <itunes:title>Establishing software root of trust unconditionally.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>81</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/799ce4ae-dcfb-11ea-975e-a3ec623ad75f/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Carnegie Mellon University's CyLab Security and Privacy Institute claim to have made an important breakthrough in establishing root of trust (RoT) to detect malware in computing devices. Virgil Gligor is one of the authors of the research, and he joins us to share their findings.
Link to original research - 
 https://www.ndss-symposium.org/ndss-paper/establishing-software-root-of-trust-unconditionally/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Carnegie Mellon University's CyLab Security and Privacy Institute claim to have made an important breakthrough in establishing root of trust (RoT) to detect malware in computing devices. Virgil Gligor is one of the authors of the research, and he joins us to share their findings.</p><p>Link to original research - </p><p><a href="https://www.ndss-symposium.org/ndss-paper/establishing-software-root-of-trust-unconditionally/"> https://www.ndss-symposium.org/ndss-paper/establishing-software-root-of-trust-unconditionally/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1494</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d6027be292304da2b4d0ceece77425de]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5908110509.mp3?updated=1685028924" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lessons learned from Ukraine elections.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/80/notes</link>
      <description>Joep Gommers from EclecticIQ joins us to share their research tracking the information operations and and security methods they've been tracking that Russians have been using in advance of the recently held elections in Ukraine.
The research can be found here:
 https://www.eclecticiq.com/resources/fusion-center-report-situational-awareness-ukraine-elections
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Apr 2019 05:00:00 -0000</pubDate>
      <itunes:title>Lessons learned from Ukraine elections.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>80</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/79c99e54-dcfb-11ea-975e-2beaf1f0fcb6/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joep Gommers from EclecticIQ joins us to share their research tracking the information operations and and security methods they've been tracking that Russians have been using in advance of the recently held elections in Ukraine.
The research can be found here:
 https://www.eclecticiq.com/resources/fusion-center-report-situational-awareness-ukraine-elections
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joep Gommers from EclecticIQ joins us to share their research tracking the information operations and and security methods they've been tracking that Russians have been using in advance of the recently held elections in Ukraine.</p><p>The research can be found here:</p><p><a href="https://www.eclecticiq.com/resources/fusion-center-report-situational-awareness-ukraine-elections"> https://www.eclecticiq.com/resources/fusion-center-report-situational-awareness-ukraine-elections</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1539</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[02702238dc4b420a8edcb0c35227ae46]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1110751149.mp3?updated=1685028504" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Alarming vulnerabilities in automotive security systems.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/79/notes</link>
      <description>Researchers at Pen Test Partners recently examined a variety of third-party automotive security systems and found serious security issues, potentially giving bad actors the ability to locate, disable or meddle with multiple vehicle systems.
Ken Munro is a security researcher with Pen Test Partners, and he joins us to share their findings.
The original research can be found here:
 https://www.pentestpartners.com/security-blog/gone-in-six-seconds-exploiting-car-alarms/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Mar 2019 05:00:00 -0000</pubDate>
      <itunes:title>Alarming vulnerabilities in automotive security systems.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>79</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/79e50608-dcfb-11ea-975e-671cdd9bbea2/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Pen Test Partners recently examined a variety of third-party automotive security systems and found serious security issues, potentially giving bad actors the ability to locate, disable or meddle with multiple vehicle systems.
Ken Munro is a security researcher with Pen Test Partners, and he joins us to share their findings.
The original research can be found here:
 https://www.pentestpartners.com/security-blog/gone-in-six-seconds-exploiting-car-alarms/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Pen Test Partners recently examined a variety of third-party automotive security systems and found serious security issues, potentially giving bad actors the ability to locate, disable or meddle with multiple vehicle systems.</p><p>Ken Munro is a security researcher with Pen Test Partners, and he joins us to share their findings.</p><p>The original research can be found here:</p><p><a href="https://www.pentestpartners.com/security-blog/gone-in-six-seconds-exploiting-car-alarms/"> https://www.pentestpartners.com/security-blog/gone-in-six-seconds-exploiting-car-alarms/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1267</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[59b0da5412b34308b3a7558b43a84752]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4207583655.mp3?updated=1685028487" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ryuk ransomware relationship revelations.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/78/notes</link>
      <description>Investigators from McAfee's advanced threat research unit, working with partners at Coveware, have reevaluated hasty attributions of Ryuk ransomware to North Korea and have explored the inner workings of the threat.
John Fokker is head of cyber investigations in McAfee's Advanced Threat research unit. He join us to share their findings.
The original research can be found here:
 https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/ryuk-exploring-the-human-connection/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Mar 2019 05:00:00 -0000</pubDate>
      <itunes:title>Ryuk ransomware relationship revelations.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>78</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7a03a82e-dcfb-11ea-975e-4bcb617ed5d6/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Investigators from McAfee's advanced threat research unit, working with partners at Coveware, have reevaluated hasty attributions of Ryuk ransomware to North Korea and have explored the inner workings of the threat.
John Fokker is head of cyber investigations in McAfee's Advanced Threat research unit. He join us to share their findings.
The original research can be found here:
 https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/ryuk-exploring-the-human-connection/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Investigators from McAfee's advanced threat research unit, working with partners at Coveware, have reevaluated hasty attributions of Ryuk ransomware to North Korea and have explored the inner workings of the threat.</p><p>John Fokker is head of cyber investigations in McAfee's Advanced Threat research unit. He join us to share their findings.</p><p>The original research can be found here:</p><p><a href="https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/ryuk-exploring-the-human-connection/"> https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/ryuk-exploring-the-human-connection/</a></p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1445</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0e10f441f83c4b45a8b2d274b820e0d4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2550235853.mp3?updated=1685028249" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ThinkPHP exploit from Asia-Pacific region goes global.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/77/notes</link>
      <description>Akamai's Larry Cashdollar joins us to describe an exploit he recently came across while researching MageCart incidents. It's a remote command execution vulnerability affecting ThinkPHP, a popular web framework.
The original research can be found here:
 https://blogs.akamai.com/sitr/2019/01/thinkphp-exploit-actively-exploited-in-the-wild.html
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Mar 2019 05:00:00 -0000</pubDate>
      <itunes:title>ThinkPHP exploit from Asia-Pacific region goes global.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>77</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7a2040f6-dcfb-11ea-975e-db5b7cb772cc/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Akamai's Larry Cashdollar joins us to describe an exploit he recently came across while researching MageCart incidents. It's a remote command execution vulnerability affecting ThinkPHP, a popular web framework.
The original research can be found here:
 https://blogs.akamai.com/sitr/2019/01/thinkphp-exploit-actively-exploited-in-the-wild.html
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Akamai's Larry Cashdollar joins us to describe an exploit he recently came across while researching MageCart incidents. It's a remote command execution vulnerability affecting ThinkPHP, a popular web framework.</p><p>The original research can be found here:</p><p><a href="https://blogs.akamai.com/sitr/2019/01/thinkphp-exploit-actively-exploited-in-the-wild.html"> https://blogs.akamai.com/sitr/2019/01/thinkphp-exploit-actively-exploited-in-the-wild.html</a></p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>848</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0fbfbea5e0fe4a3093124403a6f6a4c9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1978351451.mp3?updated=1685022996" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Job-seeker exposes banking network to Lazurus Group.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/76/notes</link>
      <description>Vitali Kremez is a Director of Research at Flashpoint. His team discovered that the recently disclosed intrusion suffered in December 2018 by Chilean interbank network Redbanc involved PowerRatankba, a malware toolkit with ties to North Korea-linked group Lazarus. The intrusion represents the latest known example of Lazarus-affiliated tools being deployed within financially motivated activity targeted toward financial institutions in Latin America.
The original research can be found here:
 https://www.flashpoint-intel.com/blog/disclosure-chilean-redbanc-intrusion-lazarus-ties/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Mar 2019 06:00:00 -0000</pubDate>
      <itunes:title>Job-seeker exposes banking network to Lazurus Group.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>76</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7a39b8ec-dcfb-11ea-975e-2f7e0e478e16/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Vitali Kremez is a Director of Research at Flashpoint. His team discovered that the recently disclosed intrusion suffered in December 2018 by Chilean interbank network Redbanc involved PowerRatankba, a malware toolkit with ties to North Korea-linked group Lazarus. The intrusion represents the latest known example of Lazarus-affiliated tools being deployed within financially motivated activity targeted toward financial institutions in Latin America.
The original research can be found here:
 https://www.flashpoint-intel.com/blog/disclosure-chilean-redbanc-intrusion-lazarus-ties/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Vitali Kremez is a Director of Research at Flashpoint. His team discovered that the recently disclosed intrusion suffered in December 2018 by Chilean interbank network Redbanc involved PowerRatankba, a malware toolkit with ties to North Korea-linked group Lazarus. The intrusion represents the latest known example of Lazarus-affiliated tools being deployed within financially motivated activity targeted toward financial institutions in Latin America.</p><p>The original research can be found here:</p><p><a href="https://www.flashpoint-intel.com/blog/disclosure-chilean-redbanc-intrusion-lazarus-ties/"> https://www.flashpoint-intel.com/blog/disclosure-chilean-redbanc-intrusion-lazarus-ties/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1475</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ad206584fb4e4a8caee2d0fb21c78791]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9102189243.mp3?updated=1685022934" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fake Fortnite app scams infect gamers.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/75/notes</link>
      <description>Researchers at Zscaler have been tracking a variety fake versions of the popular Fortnite game on the Google Play store, along with associated scams. Deepen Desai is head of security research at Zscaler, and he joins us to share their findings.

The original research can be found here:

 https://www.zscaler.com/blogs/research/fake-fortnite-apps-scamming-and-spying-android-gamers
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Mar 2019 06:00:00 -0000</pubDate>
      <itunes:title>Fake Fortnite app scams infect gamers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>75</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7a52fe60-dcfb-11ea-975e-27691ac16ddb/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Zscaler have been tracking a variety fake versions of the popular Fortnite game on the Google Play store, along with associated scams. Deepen Desai is head of security research at Zscaler, and he joins us to share their findings.

The original research can be found here:

 https://www.zscaler.com/blogs/research/fake-fortnite-apps-scamming-and-spying-android-gamers
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Zscaler have been tracking a variety fake versions of the popular Fortnite game on the Google Play store, along with associated scams. Deepen Desai is head of security research at Zscaler, and he joins us to share their findings.</p><p><br></p><p>The original research can be found here:</p><p><br></p><p><a href="https://www.zscaler.com/blogs/research/fake-fortnite-apps-scamming-and-spying-android-gamers"> https://www.zscaler.com/blogs/research/fake-fortnite-apps-scamming-and-spying-android-gamers</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1058</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[37e129f843f444409ab1decba46f6790]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9848367313.mp3?updated=1685022908" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rosneft suspicions shift from espionage to business email compromise.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/74/notes</link>
      <description>Researchers at security firm Cylance have been tracking a threat group targeting the Rosneft Russian oil company. As Cylance uncovered details, suspicions shifted from state-sponsored espionage to business email compromise. 

Kevin Livelli is director of threat intelligence at Cylance, and he joins us to share what they found.
The original research can be found here:
 https://threatvector.cylance.com/en_us/home/poking-the-bear-three-year-campaign-targets-russian-critical-infrastructure.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Feb 2019 06:00:00 -0000</pubDate>
      <itunes:title>Rosneft suspicions shift from espionage to business email compromise.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>74</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7a627c6e-dcfb-11ea-975e-cb5a0a649e53/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at security firm Cylance have been tracking a threat group targeting the Rosneft Russian oil company. As Cylance uncovered details, suspicions shifted from state-sponsored espionage to business email compromise. 

Kevin Livelli is director of threat intelligence at Cylance, and he joins us to share what they found.
The original research can be found here:
 https://threatvector.cylance.com/en_us/home/poking-the-bear-three-year-campaign-targets-russian-critical-infrastructure.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at security firm Cylance have been tracking a threat group targeting the Rosneft Russian oil company. As Cylance uncovered details, suspicions shifted from state-sponsored espionage to business email compromise. </p><p><br></p><p>Kevin Livelli is director of threat intelligence at Cylance, and he joins us to share what they found.</p><p>The original research can be found here:</p><p><a href="https://threatvector.cylance.com/en_us/home/poking-the-bear-three-year-campaign-targets-russian-critical-infrastructure.html"> https://threatvector.cylance.com/en_us/home/poking-the-bear-three-year-campaign-targets-russian-critical-infrastructure.html</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1767</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0cbd22f5bd244b9c9a92b3c1b7fd908c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5391701707.mp3?updated=1685022901" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Seedworm digs Middle East intelligence.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/73/notes</link>
      <description>Researchers at Symantec have been tracking Seedworm, a cyber espionage group targeting the Middle East as well as Europe and North America. The threat group targets government agencies, oil &amp; gas facilities, NGOs, telecoms and IT firms.
Al Cooley is director of product management at Symantec, and he joins us to share their findings.
The original research can be found here:
 https://www.symantec.com/blogs/threat-intelligence/seedworm-espionage-group
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Feb 2019 06:00:00 -0000</pubDate>
      <itunes:title>Seedworm digs Middle East intelligence.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>73</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7a79fc40-dcfb-11ea-975e-8f7d190dd87a/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Symantec have been tracking Seedworm, a cyber espionage group targeting the Middle East as well as Europe and North America. The threat group targets government agencies, oil &amp; gas facilities, NGOs, telecoms and IT firms.
Al Cooley is director of product management at Symantec, and he joins us to share their findings.
The original research can be found here:
 https://www.symantec.com/blogs/threat-intelligence/seedworm-espionage-group
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Symantec have been tracking Seedworm, a cyber espionage group targeting the Middle East as well as Europe and North America. The threat group targets government agencies, oil &amp; gas facilities, NGOs, telecoms and IT firms.</p><p>Al Cooley is director of product management at Symantec, and he joins us to share their findings.</p><p>The original research can be found here:</p><p><a href="https://www.symantec.com/blogs/threat-intelligence/seedworm-espionage-group"> https://www.symantec.com/blogs/threat-intelligence/seedworm-espionage-group</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1137</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6591a1845c0b4b67b733acdba4b540b3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6370330273.mp3?updated=1685022887" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trends and tips for cloud security.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/72/notes</link>
      <description>The team at Palo Alto Networks' Unit 42 recently published research tracking trends in how organizations are addressing cloud security, along with tips for improvement. 
Ryan Olson is VP of threat intelligence at Palo Alto Networks, and he joins us to share their findings.
The original research can be found here:
 https://unit42.paloaltonetworks.com/unit-42-cloud-security-trends-tips/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Feb 2019 06:00:00 -0000</pubDate>
      <itunes:title>Trends and tips for cloud security.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>72</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7a9485e2-dcfb-11ea-975e-ff5ee91de964/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The team at Palo Alto Networks' Unit 42 recently published research tracking trends in how organizations are addressing cloud security, along with tips for improvement. 
Ryan Olson is VP of threat intelligence at Palo Alto Networks, and he joins us to share their findings.
The original research can be found here:
 https://unit42.paloaltonetworks.com/unit-42-cloud-security-trends-tips/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The team at Palo Alto Networks' Unit 42 recently published research tracking trends in how organizations are addressing cloud security, along with tips for improvement. </p><p>Ryan Olson is VP of threat intelligence at Palo Alto Networks, and he joins us to share their findings.</p><p>The original research can be found here:</p><p><a href="https://unit42.paloaltonetworks.com/unit-42-cloud-security-trends-tips/"> https://unit42.paloaltonetworks.com/unit-42-cloud-security-trends-tips/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1347</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7facb47d756a41bcae5f17478cd477d9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6343316791.mp3?updated=1685022854" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Online underground markets in the Middle East.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/71/notes</link>
      <description>Researchers at Trend Micro recently published their look inside online underground marketplaces in the Middle East and North Africa, where criminals are buying and selling malware, laundering money and event booking their next discount vacation.
Jon Clay is director of global threat communications at Trend Micro, and he joins us with their findings. 

The original research can be found here:
 https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/cash-and-communication-new-trends-in-the-middle-east-and-north-africa-underground
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Feb 2019 06:00:00 -0000</pubDate>
      <itunes:title>Online underground markets in the Middle East.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>71</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7ab24140-dcfb-11ea-975e-5f85dd16b167/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Trend Micro recently published their look inside online underground marketplaces in the Middle East and North Africa, where criminals are buying and selling malware, laundering money and event booking their next discount vacation.
Jon Clay is director of global threat communications at Trend Micro, and he joins us with their findings. 

The original research can be found here:
 https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/cash-and-communication-new-trends-in-the-middle-east-and-north-africa-underground
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Trend Micro recently published their look inside online underground marketplaces in the Middle East and North Africa, where criminals are buying and selling malware, laundering money and event booking their next discount vacation.</p><p>Jon Clay is director of global threat communications at Trend Micro, and he joins us with their findings. </p><p><br></p><p>The original research can be found here:</p><p><a href="https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/cash-and-communication-new-trends-in-the-middle-east-and-north-africa-underground"> https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/cash-and-communication-new-trends-in-the-middle-east-and-north-africa-underground</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1238</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9d05d911cffd43a6a647141f9db12c74]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6057869033.mp3?updated=1685022844" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Amplification bots and how to detect them.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/70/notes</link>
      <description>Researchers from Duo Security have been analyzing the behavior of Twitter bots in a series of posts on their web site. Their most recent dive into the subject explores amplification bots, which boost the impact of tweets through likes and retweets.

Jordan Wright is a principal R&amp;D engineer at Duo Security, and he joins us to share their findings.
Link to the original research - 
 https://duo.com/labs/research/anatomy-of-twitter-bots-amplification-bots
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Jan 2019 06:00:00 -0000</pubDate>
      <itunes:title>Amplification bots and how to detect them..</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>70</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7ac929d2-dcfb-11ea-975e-9be9889fa68f/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers from Duo Security have been analyzing the behavior of Twitter bots in a series of posts on their web site. Their most recent dive into the subject explores amplification bots, which boost the impact of tweets through likes and retweets.

Jordan Wright is a principal R&amp;D engineer at Duo Security, and he joins us to share their findings.
Link to the original research - 
 https://duo.com/labs/research/anatomy-of-twitter-bots-amplification-bots
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers from Duo Security have been analyzing the behavior of Twitter bots in a series of posts on their web site. Their most recent dive into the subject explores amplification bots, which boost the impact of tweets through likes and retweets.</p><p><br></p><p>Jordan Wright is a principal R&amp;D engineer at Duo Security, and he joins us to share their findings.</p><p>Link to the original research - </p><p><a href="https://duo.com/labs/research/anatomy-of-twitter-bots-amplification-bots"> https://duo.com/labs/research/anatomy-of-twitter-bots-amplification-bots</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1273</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[977fbead5fd0414aa7364f476f91a0fe]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7283831852.mp3?updated=1685022834" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Luring IoT botnets to the honeypot.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/69/notes</link>
      <description>Researchers from Netscout's ASERT team have been making use of honeypots to gather information on rapidly evolving IoT botnets that take advantage of default usernames and passwords to gain access and take control of unprotected devices.
Matt Bing is a security research analyst with Netscout, and he guides us through their findings.
The original research can be found here:
https://asert.arbornetworks.com/dipping-into-the-honeypot/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Jan 2019 06:00:00 -0000</pubDate>
      <itunes:title>Luring IoT botnets to the honeypot.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>69</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7ae503c8-dcfb-11ea-975e-9ba51c89ddfe/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers from Netscout's ASERT team have been making use of honeypots to gather information on rapidly evolving IoT botnets that take advantage of default usernames and passwords to gain access and take control of unprotected devices.
Matt Bing is a security research analyst with Netscout, and he guides us through their findings.
The original research can be found here:
https://asert.arbornetworks.com/dipping-into-the-honeypot/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers from Netscout's ASERT team have been making use of honeypots to gather information on rapidly evolving IoT botnets that take advantage of default usernames and passwords to gain access and take control of unprotected devices.</p><p>Matt Bing is a security research analyst with Netscout, and he guides us through their findings.</p><p>The original research can be found here:</p><p><a href="https://asert.arbornetworks.com/dipping-into-the-honeypot/">https://asert.arbornetworks.com/dipping-into-the-honeypot/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1292</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e99e390078794f99817a403e401c62bf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7697192011.mp3?updated=1685022826" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Magecart payment card theft analysis.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/68/notes</link>
      <description>Researchers at RiskIQ have been tracking a series of web-based credit card skimmers known as Magecart. We take a closer look at attacks on Ticketmaster, British Airways, NewEgg and Shopper Approved payment card pages. 
Yonathan Klijnsma is lead of threat research at RiskIQ, and he guides us through what they've learned.
Links to RiskIQ research:
https://www.riskiq.com/blog/labs/magecart-ticketmaster-breach/
https://www.riskiq.com/blog/labs/magecart-british-airways-breach/
https://www.riskiq.com/blog/labs/magecart-newegg/
https://www.riskiq.com/blog/labs/magecart-shopper-approved/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Jan 2019 06:00:00 -0000</pubDate>
      <itunes:title>Magecart payment card theft analysis.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>68</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7afda48c-dcfb-11ea-975e-af4a2e9069a1/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at RiskIQ have been tracking a series of web-based credit card skimmers known as Magecart. We take a closer look at attacks on Ticketmaster, British Airways, NewEgg and Shopper Approved payment card pages. 
Yonathan Klijnsma is lead of threat research at RiskIQ, and he guides us through what they've learned.
Links to RiskIQ research:
https://www.riskiq.com/blog/labs/magecart-ticketmaster-breach/
https://www.riskiq.com/blog/labs/magecart-british-airways-breach/
https://www.riskiq.com/blog/labs/magecart-newegg/
https://www.riskiq.com/blog/labs/magecart-shopper-approved/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at RiskIQ have been tracking a series of web-based credit card skimmers known as Magecart. We take a closer look at attacks on Ticketmaster, British Airways, NewEgg and Shopper Approved payment card pages. </p><p>Yonathan Klijnsma is lead of threat research at RiskIQ, and he guides us through what they've learned.</p><p>Links to RiskIQ research:</p><p>https://www.riskiq.com/blog/labs/magecart-ticketmaster-breach/</p><p>https://www.riskiq.com/blog/labs/magecart-british-airways-breach/</p><p>https://www.riskiq.com/blog/labs/magecart-newegg/</p><p><a href="https://www.riskiq.com/blog/labs/magecart-shopper-approved/">https://www.riskiq.com/blog/labs/magecart-shopper-approved/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1900</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[03e5969e861c492bb4190e1749fc6083]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8322473287.mp3?updated=1685022820" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>NOKKI, Reaper and DOGCALL target Russians and Cambodians.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/67/notes</link>
      <description>Researchers from Unit 42 at Palo Alto Networks have discovered an interesting relationship between the NOKKI and DOGCALL malware families, as well as a new RAT being used to deploy the malware.
Jen Miller-Osborn is Deputy Director of Threat Intelligence with Unit 42, and she joins us to share their findings.
The original research can be found here:
 https://unit42.paloaltonetworks.com/unit42-nokki-almost-ties-the-knot-with-dogcall-reaper-group-uses-new-malware-to-deploy-rat/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Jan 2019 06:00:00 -0000</pubDate>
      <itunes:title>NOKKI, Reaper and DOGCALL target Russians and Cambodians.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>67</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7b1ad232-dcfb-11ea-975e-7f97dabe1074/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers from Unit 42 at Palo Alto Networks have discovered an interesting relationship between the NOKKI and DOGCALL malware families, as well as a new RAT being used to deploy the malware.
Jen Miller-Osborn is Deputy Director of Threat Intelligence with Unit 42, and she joins us to share their findings.
The original research can be found here:
 https://unit42.paloaltonetworks.com/unit42-nokki-almost-ties-the-knot-with-dogcall-reaper-group-uses-new-malware-to-deploy-rat/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers from Unit 42 at Palo Alto Networks have discovered an interesting relationship between the NOKKI and DOGCALL malware families, as well as a new RAT being used to deploy the malware.</p><p>Jen Miller-Osborn is Deputy Director of Threat Intelligence with Unit 42, and she joins us to share their findings.</p><p>The original research can be found here:</p><p><a href="https://unit42.paloaltonetworks.com/unit42-nokki-almost-ties-the-knot-with-dogcall-reaper-group-uses-new-malware-to-deploy-rat/"> https://unit42.paloaltonetworks.com/unit42-nokki-almost-ties-the-knot-with-dogcall-reaper-group-uses-new-malware-to-deploy-rat/</a></p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1027</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3e5dd8c65531432f8feec63037f44865]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4831312732.mp3?updated=1685022806" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Apple Device Enrollment Program vulnerabilities explored.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/66/notes</link>
      <description>Researchers at Duo Security have been looking into Apple's Device Enrollment Program (DEM) and have discovered vulnerabilities that could expose users of the service to potential issues from social engineering and rogue devices.
James Barclay is Senior R&amp;D Engineer at Duo Security, and he joins us to share what they've found.
The original research can be found here:
 https://duo.com/blog/weak-apple-dep-authentication-leaves-enterprises-vulnerable-to-social-engineering-attacks-and-rogue-devices
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Dec 2018 06:00:00 -0000</pubDate>
      <itunes:title>Apple Device Enrollment Program vulnerabilities explored.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>66</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7b39c5d4-dcfb-11ea-975e-9fa66a2b8ce4/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Duo Security have been looking into Apple's Device Enrollment Program (DEM) and have discovered vulnerabilities that could expose users of the service to potential issues from social engineering and rogue devices.
James Barclay is Senior R&amp;D Engineer at Duo Security, and he joins us to share what they've found.
The original research can be found here:
 https://duo.com/blog/weak-apple-dep-authentication-leaves-enterprises-vulnerable-to-social-engineering-attacks-and-rogue-devices
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Duo Security have been looking into Apple's Device Enrollment Program (DEM) and have discovered vulnerabilities that could expose users of the service to potential issues from social engineering and rogue devices.</p><p>James Barclay is Senior R&amp;D Engineer at Duo Security, and he joins us to share what they've found.</p><p>The original research can be found here:</p><p><a href="https://duo.com/blog/weak-apple-dep-authentication-leaves-enterprises-vulnerable-to-social-engineering-attacks-and-rogue-devices"> https://duo.com/blog/weak-apple-dep-authentication-leaves-enterprises-vulnerable-to-social-engineering-attacks-and-rogue-devices</a></p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1200</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[acf4a35e33174bde9e8554bbd4e054ff]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5683994912.mp3?updated=1685022715" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Sony hack and the perils of attribution.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/65/notes</link>
      <description>Researchers at Risk Based Security took a detailed look back at the 2014 Sony hack, comparing analysis that occurred while the facts were still unfolding with what we know, today. There are interesting lessons to be learned, especially when it comes to attribution.
Brian Martin is V.P. of vulnerability intelligence at Risk Based Security, and he shares their findings.
The research can be found here:
 https://www.riskbasedsecurity.com/2018/09/you-didnt-think-the-sony-saga-was-over-did-you/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Dec 2018 06:00:00 -0000</pubDate>
      <itunes:title>The Sony hack and the perils of attribution.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>65</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7b523fd8-dcfb-11ea-975e-83eccf589e4a/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Risk Based Security took a detailed look back at the 2014 Sony hack, comparing analysis that occurred while the facts were still unfolding with what we know, today. There are interesting lessons to be learned, especially when it comes to attribution.
Brian Martin is V.P. of vulnerability intelligence at Risk Based Security, and he shares their findings.
The research can be found here:
 https://www.riskbasedsecurity.com/2018/09/you-didnt-think-the-sony-saga-was-over-did-you/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Risk Based Security took a detailed look back at the 2014 Sony hack, comparing analysis that occurred while the facts were still unfolding with what we know, today. There are interesting lessons to be learned, especially when it comes to attribution.</p><p>Brian Martin is V.P. of vulnerability intelligence at Risk Based Security, and he shares their findings.</p><p>The research can be found here:</p><p><a href="https://www.riskbasedsecurity.com/2018/09/you-didnt-think-the-sony-saga-was-over-did-you/"> https://www.riskbasedsecurity.com/2018/09/you-didnt-think-the-sony-saga-was-over-did-you/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1371</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e1d4faa8e79e4ad0ba999cbe51741731]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1948201861.mp3?updated=1685022696" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Operation Red Signature targets South Korean supply chain.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/64/notes</link>
      <description>Researchers at Trend Micro uncovered a supply chain attack targeting organizations in South Korea. With the goal of information theft, attackers compromised the update server of a third party support provider, resulting in the installation of a RAT, or remote access trojan.

Rik Ferguson is Vice President of Security Research at Trend Micro, and he guides us through their discoveries.

The research can be found here:
 https://blog.trendmicro.com/trendlabs-security-intelligence/supply-chain-attack-operation-red-signature-targets-south-korean-organizations/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Dec 2018 06:00:00 -0000</pubDate>
      <itunes:title>Operation Red Signature targets South Korean supply chain.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>64</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7b690880-dcfb-11ea-975e-4f1e3a07f462/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Trend Micro uncovered a supply chain attack targeting organizations in South Korea. With the goal of information theft, attackers compromised the update server of a third party support provider, resulting in the installation of a RAT, or remote access trojan.

Rik Ferguson is Vice President of Security Research at Trend Micro, and he guides us through their discoveries.

The research can be found here:
 https://blog.trendmicro.com/trendlabs-security-intelligence/supply-chain-attack-operation-red-signature-targets-south-korean-organizations/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Trend Micro uncovered a supply chain attack targeting organizations in South Korea. With the goal of information theft, attackers compromised the update server of a third party support provider, resulting in the installation of a RAT, or remote access trojan.</p><p><br></p><p>Rik Ferguson is Vice President of Security Research at Trend Micro, and he guides us through their discoveries.</p><p><br></p><p>The research can be found here:</p><p><a href="https://blog.trendmicro.com/trendlabs-security-intelligence/supply-chain-attack-operation-red-signature-targets-south-korean-organizations/"> https://blog.trendmicro.com/trendlabs-security-intelligence/supply-chain-attack-operation-red-signature-targets-south-korean-organizations/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1591</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8312255bd7bb4e05b456b42454d10189]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2216308003.mp3?updated=1685022688" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Getting an education on Cobalt Dickens.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/63/notes</link>
      <description>Researchers from Secureworks' Counter Threat Unit have been tracking a threat group spoofing login pages for universities. Evidence suggests the Iranian group Cobalt Dickens is likely responsible.
Allison Wikoff is a senior researcher at Secureworks, and she joins us to share what they've found.

The original research is here:
 https://www.secureworks.com/blog/back-to-school-cobalt-dickens-targets-universities
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Dec 2018 06:00:00 -0000</pubDate>
      <itunes:title>Getting an education on Cobalt Dickens.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>63</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7b865304-dcfb-11ea-975e-37b054918dd0/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers from Secureworks' Counter Threat Unit have been tracking a threat group spoofing login pages for universities. Evidence suggests the Iranian group Cobalt Dickens is likely responsible.
Allison Wikoff is a senior researcher at Secureworks, and she joins us to share what they've found.

The original research is here:
 https://www.secureworks.com/blog/back-to-school-cobalt-dickens-targets-universities
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers from Secureworks' Counter Threat Unit have been tracking a threat group spoofing login pages for universities. Evidence suggests the Iranian group Cobalt Dickens is likely responsible.</p><p>Allison Wikoff is a senior researcher at Secureworks, and she joins us to share what they've found.</p><p><br></p><p>The original research is here:</p><p><a href="https://www.secureworks.com/blog/back-to-school-cobalt-dickens-targets-universities"> https://www.secureworks.com/blog/back-to-school-cobalt-dickens-targets-universities</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>901</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7850397d559a446596ed2e7febdd2ba0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6847074975.mp3?updated=1685022679" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Doubling down on Cobalt Group activity.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/62/notes</link>
      <description>The NETSCOUT Arbor ASERT team has been tracking Cobalt Group campaigns targeting financial institutions. Richard Hummel is manager of threat intelligence with ASERT, and he joins us to share his team's findings. 
The research can be found here:
 https://asert.arbornetworks.com/double-the-infection-double-the-fun/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Nov 2018 06:00:00 -0000</pubDate>
      <itunes:title>Doubling down on Cobalt Group activity.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>62</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7bb5fabe-dcfb-11ea-975e-bbffb0253133/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The NETSCOUT Arbor ASERT team has been tracking Cobalt Group campaigns targeting financial institutions. Richard Hummel is manager of threat intelligence with ASERT, and he joins us to share his team's findings. 
The research can be found here:
 https://asert.arbornetworks.com/double-the-infection-double-the-fun/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The NETSCOUT Arbor ASERT team has been tracking Cobalt Group campaigns targeting financial institutions. Richard Hummel is manager of threat intelligence with ASERT, and he joins us to share his team's findings. </p><p>The research can be found here:</p><p><a href="https://asert.arbornetworks.com/double-the-infection-double-the-fun/"> https://asert.arbornetworks.com/double-the-infection-double-the-fun/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1292</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[45d8fbb399a84fe09406e8c75badc50b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5367094976.mp3?updated=1685022666" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Establishing international norms in cyberspace.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/61/notes</link>
      <description>Joseph Nye is former dean of the Harvard Kennedy School of Government. He served as Chair of the National Intelligence Council, and as Assistant Secretary of Defense for International Security Affairs under President Clinton. He serves as a Commissioner for the Global Commission on Internet Governance, and is the author of over a dozen books, including, “Soft Power: The means to success in work politics,” and “The future of power.”
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Nov 2018 06:00:00 -0000</pubDate>
      <itunes:title>Establishing international norms in cyberspace.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>61</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7c00abb8-dcfb-11ea-975e-bf9cd7291d62/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joseph Nye is former dean of the Harvard Kennedy School of Government. He served as Chair of the National Intelligence Council, and as Assistant Secretary of Defense for International Security Affairs under President Clinton. He serves as a Commissioner for the Global Commission on Internet Governance, and is the author of over a dozen books, including, “Soft Power: The means to success in work politics,” and “The future of power.”
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joseph Nye is former dean of the Harvard Kennedy School of Government. He served as Chair of the National Intelligence Council, and as Assistant Secretary of Defense for International Security Affairs under President Clinton. He serves as a Commissioner for the Global Commission on Internet Governance, and is the author of over a dozen books, including, “Soft Power: The means to success in work politics,” and “The future of power.”</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1386</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fc0c7f1965d946eebc7191b1c4e5d3fe]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8591237563.mp3?updated=1685022675" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Election protection.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/60/notes</link>
      <description>Symantec technical director Vikram Thakur returns to share his team's look at threat groups APT 28 and APT 29, the influence they had on the 2016 election, and how the cyber security industry has responded in preparation for the 2018 midterms.

The original research can be found here:
 https://www.symantec.com/blogs/election-security/election-hacking-faq
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Nov 2018 05:00:00 -0000</pubDate>
      <itunes:title>Election protection.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>60</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7c2e4640-dcfb-11ea-975e-33f2ae4b9cf4/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Symantec technical director Vikram Thakur returns to share his team's look at threat groups APT 28 and APT 29, the influence they had on the 2016 election, and how the cyber security industry has responded in preparation for the 2018 midterms.

The original research can be found here:
 https://www.symantec.com/blogs/election-security/election-hacking-faq
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Symantec technical director Vikram Thakur returns to share his team's look at threat groups APT 28 and APT 29, the influence they had on the 2016 election, and how the cyber security industry has responded in preparation for the 2018 midterms.</p><p><br></p><p>The original research can be found here:</p><p><a href="https://www.symantec.com/blogs/election-security/election-hacking-faq"> https://www.symantec.com/blogs/election-security/election-hacking-faq</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1498</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[11cb8172a8bb4df5b75f155f89dfb13a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1409372205.mp3?updated=1685022653" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Faxploitation.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/59/notes</link>
      <description>Researchers at security firm Check Point Software Technologies explored the possibility of exploiting old, complex fax protocols to gain access to modern multifunction office printers, and then pivot to connected networks. 
Yaniv Balmas is head of security research at Check Point, and he joins us to share what he and his colleague Eyal Itkin discovered.
The research can be found here:
 https://research.checkpoint.com/sending-fax-back-to-the-dark-ages/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Oct 2018 05:00:00 -0000</pubDate>
      <itunes:title>Faxploitation.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>59</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7c46696e-dcfb-11ea-975e-97e83b953f2f/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at security firm Check Point Software Technologies explored the possibility of exploiting old, complex fax protocols to gain access to modern multifunction office printers, and then pivot to connected networks. 
Yaniv Balmas is head of security research at Check Point, and he joins us to share what he and his colleague Eyal Itkin discovered.
The research can be found here:
 https://research.checkpoint.com/sending-fax-back-to-the-dark-ages/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at security firm Check Point Software Technologies explored the possibility of exploiting old, complex fax protocols to gain access to modern multifunction office printers, and then pivot to connected networks. </p><p>Yaniv Balmas is head of security research at Check Point, and he joins us to share what he and his colleague Eyal Itkin discovered.</p><p>The research can be found here:</p><p><a href="https://research.checkpoint.com/sending-fax-back-to-the-dark-ages/"> https://research.checkpoint.com/sending-fax-back-to-the-dark-ages/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1031</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6d1215ee63884ff3a8d61a480fb42539]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6262168620.mp3?updated=1685022632" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stormy weather in the Office 365 cloud.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/58/notes</link>
      <description>Security firm Lastline recently took a close look at threats to the Office 365 cloud environment, taking advantage of the insights they gain protecting their clients. 
Andy Norton is director of threat intelligence at Lastline, and he joins us to describe their findings. 
The research can be found here:
 https://www.lastline.com/blog/malspam-malscape-snapshot-malicious-activity-in-the-office-365-cloud/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Oct 2018 05:00:00 -0000</pubDate>
      <itunes:title>Stormy weather in the Office 365 cloud.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>58</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7c73dc14-dcfb-11ea-975e-2335b8de0cd5/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Security firm Lastline recently took a close look at threats to the Office 365 cloud environment, taking advantage of the insights they gain protecting their clients. 
Andy Norton is director of threat intelligence at Lastline, and he joins us to describe their findings. 
The research can be found here:
 https://www.lastline.com/blog/malspam-malscape-snapshot-malicious-activity-in-the-office-365-cloud/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Security firm Lastline recently took a close look at threats to the Office 365 cloud environment, taking advantage of the insights they gain protecting their clients. </p><p>Andy Norton is director of threat intelligence at Lastline, and he joins us to describe their findings. </p><p>The research can be found here:</p><p><a href="https://www.lastline.com/blog/malspam-malscape-snapshot-malicious-activity-in-the-office-365-cloud/"> https://www.lastline.com/blog/malspam-malscape-snapshot-malicious-activity-in-the-office-365-cloud/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1457</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9ca65657c2b141e582e53f796de0763a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7722730073.mp3?updated=1685022638" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Driving GPS manipulation.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/57/notes</link>
      <description>Researchers at Virginia Tech investigate possible ways to manipulate GPS signals and send drivers to specific locations without their knowledge. 

Gang Wang is Assistant Professor of Computer Science at Virginia Tech, and he joins us to share his team's findings.

The original research can be found here:
https://people.cs.vt.edu/gangwang/sec18-gps.pdf
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Oct 2018 05:00:00 -0000</pubDate>
      <itunes:title>Driving GPS manipulation.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>57</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7c919b5a-dcfb-11ea-975e-2f4878d6e7c9/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Virginia Tech investigate possible ways to manipulate GPS signals and send drivers to specific locations without their knowledge. 

Gang Wang is Assistant Professor of Computer Science at Virginia Tech, and he joins us to share his team's findings.

The original research can be found here:
https://people.cs.vt.edu/gangwang/sec18-gps.pdf
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Virginia Tech investigate possible ways to manipulate GPS signals and send drivers to specific locations without their knowledge. </p><p><br></p><p>Gang Wang is Assistant Professor of Computer Science at Virginia Tech, and he joins us to share his team's findings.</p><p><br></p><p>The original research can be found here:</p><p>https://people.cs.vt.edu/gangwang/sec18-gps.pdf</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1806</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e8a88019db2c4e6d916f0c0b40ba79e0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2789307266.mp3?updated=1685022619" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cryptojacking criminal capers continue.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/56/notes</link>
      <description>Researchers at Palo Alto Networks' Unit 42 have been tracking the rise of cryptocurrency mining operations run by criminal groups around the world. Ryan Olson is V.P. of threat intelligence at Palo Alto Networks, and he joins us to share what they've learned.
The original research can be found here:
https://researchcenter.paloaltonetworks.com/2018/06/unit42-rise-cryptocurrency-miners/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Oct 2018 05:00:00 -0000</pubDate>
      <itunes:title>Cryptojacking criminal capers continue.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>56</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7caff7f8-dcfb-11ea-975e-e3d234522b5d/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Palo Alto Networks' Unit 42 have been tracking the rise of cryptocurrency mining operations run by criminal groups around the world. Ryan Olson is V.P. of threat intelligence at Palo Alto Networks, and he joins us to share what they've learned.
The original research can be found here:
https://researchcenter.paloaltonetworks.com/2018/06/unit42-rise-cryptocurrency-miners/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Palo Alto Networks' Unit 42 have been tracking the rise of cryptocurrency mining operations run by criminal groups around the world. Ryan Olson is V.P. of threat intelligence at Palo Alto Networks, and he joins us to share what they've learned.</p><p>The original research can be found here:</p><p>https://researchcenter.paloaltonetworks.com/2018/06/unit42-rise-cryptocurrency-miners/</p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1518</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[95912ad48e364d478ca4bead22d5a65d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7550751718.mp3?updated=1685022634" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sophisticated FIN7 criminal group hits payment card data.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/55/notes</link>
      <description>Researchers at security firm FireEye have been tracking malicious actors they call FIN7, a group which targets payment card data in the hospitality industry and elsewhere. They make use of targeted phishing campaigns, telephone vishing and even a convincing front company to do their deeds. 
Nick Carr and Barry Vengerick are coauthors of the research, along with their colleagues Kimberly Goody and Steve Miller. 
The research is titled On the Hunt for FIN7: Pursuing an Enigmatic and Evasive Global Criminal Operation. It can be found here:
https://www.fireeye.com/blog/threat-research/2018/08/fin7-pursuing-an-enigmatic-and-evasive-global-criminal-operation.html
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 Sep 2018 05:00:00 -0000</pubDate>
      <itunes:title>Sophisticated FIN7 criminal group hits payment card data.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>55</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7ccb4fee-dcfb-11ea-975e-53856111067b/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at security firm FireEye have been tracking malicious actors they call FIN7, a group which targets payment card data in the hospitality industry and elsewhere. They make use of targeted phishing campaigns, telephone vishing and even a convincing front company to do their deeds. 
Nick Carr and Barry Vengerick are coauthors of the research, along with their colleagues Kimberly Goody and Steve Miller. 
The research is titled On the Hunt for FIN7: Pursuing an Enigmatic and Evasive Global Criminal Operation. It can be found here:
https://www.fireeye.com/blog/threat-research/2018/08/fin7-pursuing-an-enigmatic-and-evasive-global-criminal-operation.html
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at security firm FireEye have been tracking malicious actors they call FIN7, a group which targets payment card data in the hospitality industry and elsewhere. They make use of targeted phishing campaigns, telephone vishing and even a convincing front company to do their deeds. </p><p>Nick Carr and Barry Vengerick are coauthors of the research, along with their colleagues Kimberly Goody and Steve Miller. </p><p>The research is titled On the Hunt for FIN7: Pursuing an Enigmatic and Evasive Global Criminal Operation. It can be found here:</p><p>https://www.fireeye.com/blog/threat-research/2018/08/fin7-pursuing-an-enigmatic-and-evasive-global-criminal-operation.html</p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2050</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00a14914819e43ad852d1bc768f2cca1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4641162237.mp3?updated=1685022617" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ICS honeypots attract sophisticated snoops.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/54/notes</link>
      <description>Researchers at security firm Cybereason recently set up online honeypots to attract adversaries interested in industrial control system environments. It didn't take long for sophisticated attackers to sniff out the virtual honey and start snuffling around.
Ross Rustici is senior director of intelligence services at Cybereason, and he joins us to share what they learned.
The research is titled ICS Threat Broadens: Nation-state Hackers are no Longer the Only Game in Town. It can be found here:
https://www.cybereason.com/blog/industrial-control-system-specialized-hackers
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Sep 2018 05:00:00 -0000</pubDate>
      <itunes:title>ICS honeypots attract sophisticated snoops.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>54</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7cf79afe-dcfb-11ea-975e-5b65869176c4/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at security firm Cybereason recently set up online honeypots to attract adversaries interested in industrial control system environments. It didn't take long for sophisticated attackers to sniff out the virtual honey and start snuffling around.
Ross Rustici is senior director of intelligence services at Cybereason, and he joins us to share what they learned.
The research is titled ICS Threat Broadens: Nation-state Hackers are no Longer the Only Game in Town. It can be found here:
https://www.cybereason.com/blog/industrial-control-system-specialized-hackers
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at security firm Cybereason recently set up online honeypots to attract adversaries interested in industrial control system environments. It didn't take long for sophisticated attackers to sniff out the virtual honey and start snuffling around.</p><p>Ross Rustici is senior director of intelligence services at Cybereason, and he joins us to share what they learned.</p><p>The research is titled ICS Threat Broadens: Nation-state Hackers are no Longer the Only Game in Town. It can be found here:</p><p>https://www.cybereason.com/blog/industrial-control-system-specialized-hackers</p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1436</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2f061e66deb442d7a3853f505ae59366]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6587338874.mp3?updated=1685022597" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Android device eavesdropping investigation.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/53/notes</link>
      <description>A team of researchers from Northeastern University and UC Santa Barbara examined over 17,000 Android apps, and revealed a number of alarming privacy risks. 
Elleen Pan and Christo Wilson were members of the research team, and they join us to share what they found. 
The research is titled Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications. It can be found here:
https://recon.meddle.mobi/papers/panoptispy18pets.pdf
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Sep 2018 10:00:00 -0000</pubDate>
      <itunes:title>Android device eavesdropping investigation.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>53</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7d0dbb04-dcfb-11ea-975e-c37ec51de1f8/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A team of researchers from Northeastern University and UC Santa Barbara examined over 17,000 Android apps, and revealed a number of alarming privacy risks. 
Elleen Pan and Christo Wilson were members of the research team, and they join us to share what they found. 
The research is titled Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications. It can be found here:
https://recon.meddle.mobi/papers/panoptispy18pets.pdf
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A team of researchers from Northeastern University and UC Santa Barbara examined over 17,000 Android apps, and revealed a number of alarming privacy risks. </p><p>Elleen Pan and Christo Wilson were members of the research team, and they join us to share what they found. </p><p>The research is titled Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications. It can be found here:</p><p>https://recon.meddle.mobi/papers/panoptispy18pets.pdf</p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1208</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[33ca416ec16243eab5212d8a6d8f50d5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9438020926.mp3?updated=1685022583" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leafminer espionage digs the Middle East.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/52/notes</link>
      <description>Researchers at Symantec recently published their findings on an active attack group named Leafminer that's targeting government organizations and businesses in the Middle East region. 
Vikram Thakur is a technical director at Symantec, and he joins us to share what they've found.
The research can be found here:
https://www.symantec.com/blogs/threat-intelligence/leafminer-espionage-middle-east
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Sep 2018 10:00:00 -0000</pubDate>
      <itunes:title>Leafminer espionage digs the Middle East.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>52</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7d300038-dcfb-11ea-975e-cb90d4125fd5/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Symantec recently published their findings on an active attack group named Leafminer that's targeting government organizations and businesses in the Middle East region. 
Vikram Thakur is a technical director at Symantec, and he joins us to share what they've found.
The research can be found here:
https://www.symantec.com/blogs/threat-intelligence/leafminer-espionage-middle-east
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Symantec recently published their findings on an active attack group named Leafminer that's targeting government organizations and businesses in the Middle East region. </p><p>Vikram Thakur is a technical director at Symantec, and he joins us to share what they've found.</p><p>The research can be found here:</p><p>https://www.symantec.com/blogs/threat-intelligence/leafminer-espionage-middle-east</p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1500</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[56aba6ce46834bccac65cf49a8193b4e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8703376202.mp3?updated=1685022572" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ATM hacks on the rise.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/51/notes</link>
      <description>Threat researcher Marcelle Lee from LookingGlass Cyber Solutions joins us to share her research on the growing threat of ATM hacks in the U.S. 
The research can be found here:
https://www.lookingglasscyber.com/blog/atm-hacking-you-dont-have-to-pay-to-play/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Sep 2018 10:00:00 -0000</pubDate>
      <itunes:title>ATM hacks on the rise.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>51</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7d467c32-dcfb-11ea-975e-f3548ddc1db8/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Threat researcher Marcelle Lee from LookingGlass Cyber Solutions joins us to share her research on the growing threat of ATM hacks in the U.S. 
The research can be found here:
https://www.lookingglasscyber.com/blog/atm-hacking-you-dont-have-to-pay-to-play/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Threat researcher Marcelle Lee from LookingGlass Cyber Solutions joins us to share her research on the growing threat of ATM hacks in the U.S. </p><p>The research can be found here:</p><p>https://www.lookingglasscyber.com/blog/atm-hacking-you-dont-have-to-pay-to-play/</p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1522</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[77a0b29925074a2a87ce18f382d00185]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3629817302.mp3?updated=1685022578" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber espionage coming from Chinese University.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/50/notes</link>
      <description>Threat intelligence firm Recorded Future recently published research describing espionage activities originating from servers at a major Chinese university, coinciding with international economic development efforts.
Winnona DeSombre and Sanil Chohan are authors of the report, Chinese Cyberespionage Originating from Tsinghua University Infrastructure, along with their colleague Justin Grosfelt.
The research can be found here:
 https://www.recordedfuture.com/chinese-cyberespionage-operations/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Aug 2018 10:00:00 -0000</pubDate>
      <itunes:title>Cyber espionage coming from Chinese University.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>50</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7d5d796e-dcfb-11ea-975e-730ae811cab2/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Threat intelligence firm Recorded Future recently published research describing espionage activities originating from servers at a major Chinese university, coinciding with international economic development efforts.
Winnona DeSombre and Sanil Chohan are authors of the report, Chinese Cyberespionage Originating from Tsinghua University Infrastructure, along with their colleague Justin Grosfelt.
The research can be found here:
 https://www.recordedfuture.com/chinese-cyberespionage-operations/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Threat intelligence firm Recorded Future recently published research describing espionage activities originating from servers at a major Chinese university, coinciding with international economic development efforts.</p><p>Winnona DeSombre and Sanil Chohan are authors of the report, Chinese Cyberespionage Originating from Tsinghua University Infrastructure, along with their colleague Justin Grosfelt.</p><p>The research can be found here:</p><p><a href="https://www.recordedfuture.com/chinese-cyberespionage-operations/"> https://www.recordedfuture.com/chinese-cyberespionage-operations/</a></p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1703</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[50115e598e814632991c9908d9e602d6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4144338274.mp3?updated=1685022567" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stealthy ad fraud campaign evades detection.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/49/notes</link>
      <description>Researchers at Bitdefender have been tracking a bit of complex rootkit malware called Zacinlo that they suspect has been operating virtually undetected for over six years. Bogdan Botezatu is a senior cyber security analyst with Bitdefender, and he describes what they've found.
Research link:
 https://labs.bitdefender.com/2018/06/six-years-and-counting-inside-the-complex-zacinlo-ad-fraud-operation/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Aug 2018 10:00:00 -0000</pubDate>
      <itunes:title>Stealthy ad fraud campaign evades detection.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>49</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7d7372a0-dcfb-11ea-975e-fbc90843c455/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Bitdefender have been tracking a bit of complex rootkit malware called Zacinlo that they suspect has been operating virtually undetected for over six years. Bogdan Botezatu is a senior cyber security analyst with Bitdefender, and he describes what they've found.
Research link:
 https://labs.bitdefender.com/2018/06/six-years-and-counting-inside-the-complex-zacinlo-ad-fraud-operation/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Bitdefender have been tracking a bit of complex rootkit malware called Zacinlo that they suspect has been operating virtually undetected for over six years. Bogdan Botezatu is a senior cyber security analyst with Bitdefender, and he describes what they've found.</p><p>Research link:</p><p><a href="https://labs.bitdefender.com/2018/06/six-years-and-counting-inside-the-complex-zacinlo-ad-fraud-operation/"> https://labs.bitdefender.com/2018/06/six-years-and-counting-inside-the-complex-zacinlo-ad-fraud-operation/</a></p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1290</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c559c10c440f4e60abd638fe9b5b81bc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4766120144.mp3?updated=1685022544" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Thrip espionage group lives off the land.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/48/notes</link>
      <description>Researchers at Symantec have been tracking a wide-ranging espionage operation that's targeting satellite, telecom and defense companies. 
Jon DiMaggio is a senior cyber intelligence analyst at Symantec, and he takes us through what they've discovered.
The research can be found here:
 https://www.symantec.com/blogs/threat-intelligence/thrip-hits-satellite-telecoms-defense-targets
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Aug 2018 10:00:00 -0000</pubDate>
      <itunes:title>Thrip espionage group lives off the land.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>48</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7d8ced66-dcfb-11ea-975e-8b2e8c4419e1/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Symantec have been tracking a wide-ranging espionage operation that's targeting satellite, telecom and defense companies. 
Jon DiMaggio is a senior cyber intelligence analyst at Symantec, and he takes us through what they've discovered.
The research can be found here:
 https://www.symantec.com/blogs/threat-intelligence/thrip-hits-satellite-telecoms-defense-targets
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Symantec have been tracking a wide-ranging espionage operation that's targeting satellite, telecom and defense companies. </p><p>Jon DiMaggio is a senior cyber intelligence analyst at Symantec, and he takes us through what they've discovered.</p><p>The research can be found here:</p><p><a href="https://www.symantec.com/blogs/threat-intelligence/thrip-hits-satellite-telecoms-defense-targets"> https://www.symantec.com/blogs/threat-intelligence/thrip-hits-satellite-telecoms-defense-targets</a></p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1703</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aaf4968088234323b93cbd4be3941035]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2330444780.mp3?updated=1685022590" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cortana voice assistant lets you in.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/47/notes</link>
      <description>Researchers at McAfee recently discovered code execution vulnerabilities in the default settings of the Cortana voice-activated digital assistant in Windows 10 systems. 
Steve Povolny is head of advanced threat research at McAfee and he shares their findings.
The research can be found here:
 https://securingtomorrow.mcafee.com/mcafee-labs/want-to-break-into-a-locked-windows-10-device-ask-cortana-cve-2018-8140
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Aug 2018 11:00:00 -0000</pubDate>
      <itunes:title>Cortana voice assistant lets you in.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>47</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7da66dc2-dcfb-11ea-975e-4f0157a04291/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at McAfee recently discovered code execution vulnerabilities in the default settings of the Cortana voice-activated digital assistant in Windows 10 systems. 
Steve Povolny is head of advanced threat research at McAfee and he shares their findings.
The research can be found here:
 https://securingtomorrow.mcafee.com/mcafee-labs/want-to-break-into-a-locked-windows-10-device-ask-cortana-cve-2018-8140
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at McAfee recently discovered code execution vulnerabilities in the default settings of the Cortana voice-activated digital assistant in Windows 10 systems. </p><p>Steve Povolny is head of advanced threat research at McAfee and he shares their findings.</p><p>The research can be found here:</p><p><a href="https://securingtomorrow.mcafee.com/mcafee-labs/want-to-break-into-a-locked-windows-10-device-ask-cortana-cve-2018-8140"> https://securingtomorrow.mcafee.com/mcafee-labs/want-to-break-into-a-locked-windows-10-device-ask-cortana-cve-2018-8140</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1450</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e614c95806fe46319110219632678367]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6267621247.mp3?updated=1685022578" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BabaYaga strangely symbiotic Wordpress malware.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/46/notes</link>
      <description>Researchers at Defiant recently analyzed a malware family they named "BabaYaga," which has the curious behavior of clearing out other malware and keeping infected sites up to date.
Brad Hass is a senior security analyst at Defiant, and he guides us through their findings.
The research can be found here:
 https://www.wordfence.com/blog/2018/06/babayaga-wordpress-malware/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Jul 2018 11:00:00 -0000</pubDate>
      <itunes:title>BabaYaga strangely symbiotic Wordpress malware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>46</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7dc07ab4-dcfb-11ea-975e-a73ddff8ea7a/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Defiant recently analyzed a malware family they named "BabaYaga," which has the curious behavior of clearing out other malware and keeping infected sites up to date.
Brad Hass is a senior security analyst at Defiant, and he guides us through their findings.
The research can be found here:
 https://www.wordfence.com/blog/2018/06/babayaga-wordpress-malware/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Defiant recently analyzed a malware family they named "BabaYaga," which has the curious behavior of clearing out other malware and keeping infected sites up to date.</p><p>Brad Hass is a senior security analyst at Defiant, and he guides us through their findings.</p><p>The research can be found here:</p><p><a href="https://www.wordfence.com/blog/2018/06/babayaga-wordpress-malware/"> https://www.wordfence.com/blog/2018/06/babayaga-wordpress-malware/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1387</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5fc5e61710a84b908630b29dbeb9b566]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8045292886.mp3?updated=1685022509" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Measuring the spearphishing threat.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/45/notes</link>
      <description>Researchers Gang Wang and Hang Hu from Virginia Tech recently conducted an end-to-end measurement on 35 popular email providers and examining user reactions to spoofing through a real-world spoofing/phishing test. Gang Wang joins us to share the sobering results.
End-to-End Measurements of Email Spoofing Attacks
https://people.cs.vt.edu/gangwang/usenix-draft.pdf
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Jul 2018 11:00:00 -0000</pubDate>
      <itunes:title>Measuring the spearphishing threat.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>45</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7dd3968a-dcfb-11ea-975e-7f7e3ecf6888/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers Gang Wang and Hang Hu from Virginia Tech recently conducted an end-to-end measurement on 35 popular email providers and examining user reactions to spoofing through a real-world spoofing/phishing test. Gang Wang joins us to share the sobering results.
End-to-End Measurements of Email Spoofing Attacks
https://people.cs.vt.edu/gangwang/usenix-draft.pdf
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers Gang Wang and Hang Hu from Virginia Tech recently conducted an end-to-end measurement on 35 popular email providers and examining user reactions to spoofing through a real-world spoofing/phishing test. Gang Wang joins us to share the sobering results.</p><p>End-to-End Measurements of Email Spoofing Attacks</p><p><a href="https://people.cs.vt.edu/gangwang/usenix-draft.pdf">https://people.cs.vt.edu/gangwang/usenix-draft.pdf</a></p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1578</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[69003e972cee40b8a064f638b2ca698c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4985263024.mp3?updated=1685022539" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A new approach to mission critical systems.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/44/notes</link>
      <description>Andy Bochman is senior grid strategist for Idaho National Lab’s National and Homeland Security directorate. Today we’re discussing the research the INL has been doing, developing new approaches to protecting mission critical systems.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Jul 2018 11:00:00 -0000</pubDate>
      <itunes:title>A new approach to mission critical systems.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>44</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7de92d24-dcfb-11ea-975e-9bb60e40bd93/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Andy Bochman is senior grid strategist for Idaho National Lab’s National and Homeland Security directorate. Today we’re discussing the research the INL has been doing, developing new approaches to protecting mission critical systems.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Andy Bochman is senior grid strategist for Idaho National Lab’s National and Homeland Security directorate. Today we’re discussing the research the INL has been doing, developing new approaches to protecting mission critical systems.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1434</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a3c46cc50e864a34ae54df8ab13591c4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3812044978.mp3?updated=1685022494" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No Distribute Scanners help sell malware.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/43/notes</link>
      <description>Sellers of malware on Dark Web forums often use No Distribute malware scanning tools to help verify the effectiveness of their wares, while preventing legitimate virus scanning tools from adding the malware to their database.
Daniel Hatheway is a Senior Security Analyst at Recorded Future, and he takes us through their recently published research, Uncover Unseen Malware Samples with No Distribute Scanners. 
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Jul 2018 11:00:00 -0000</pubDate>
      <itunes:title>No Distribute Scanners help sell malware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>43</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7e0cd6b6-dcfb-11ea-975e-fffc0a8c478d/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Sellers of malware on Dark Web forums often use No Distribute malware scanning tools to help verify the effectiveness of their wares, while preventing legitimate virus scanning tools from adding the malware to their database.
Daniel Hatheway is a Senior Security Analyst at Recorded Future, and he takes us through their recently published research, Uncover Unseen Malware Samples with No Distribute Scanners. 
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Sellers of malware on Dark Web forums often use No Distribute malware scanning tools to help verify the effectiveness of their wares, while preventing legitimate virus scanning tools from adding the malware to their database.</p><p>Daniel Hatheway is a Senior Security Analyst at Recorded Future, and he takes us through their recently published research, <a href="https://www.recordedfuture.com/no-distribute-scanners/">Uncover Unseen Malware Samples with No Distribute Scanners. </a></p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1027</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[778e388781844433971d74dedc623f15]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7646077016.mp3?updated=1685022372" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>VPNFilter malware could brick devices worldwide.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/42/notes</link>
      <description>Researchers from Cisco Talos continue to track malware they've named VPNFilter, a multi-stage infection with multiple capabilities, targeting consumer-grade routers. Craig Williams is head of Cisco Talos Outreach, and he joins us with the details. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Jun 2018 11:00:00 -0000</pubDate>
      <itunes:title>VPNFilter malware could brick devices worldwide.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>42</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7e473518-dcfb-11ea-975e-dfe823ef09ee/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers from Cisco Talos continue to track malware they've named VPNFilter, a multi-stage infection with multiple capabilities, targeting consumer-grade routers. Craig Williams is head of Cisco Talos Outreach, and he joins us with the details. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers from Cisco Talos continue to track <a href="https://blog.talosintelligence.com/2018/06/vpnfilter-update.html">malware they've named VPNFilter</a>, a multi-stage infection with multiple capabilities, targeting consumer-grade routers. Craig Williams is head of Cisco Talos Outreach, and he joins us with the details. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1880</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[33da6e4f73d74758816285df38fe71ee]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9108682846.mp3?updated=1685022328" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>LG smartphone keyboard vulnerabilities.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/41/notes</link>
      <description>Researchers at Check Point Research recently discovered vulnerabilities in some LG smartphone keyboards, vulnerabilities that could have been used to remotely execute code with elevated privileges, act as a keylogger and thereby compromise the users’ privacy and authentication details.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Jun 2018 11:00:00 -0000</pubDate>
      <itunes:title>LG smartphone keyboard vulnerabilities.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>41</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7e748900-dcfb-11ea-975e-2f7a9780877e/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Check Point Research recently discovered vulnerabilities in some LG smartphone keyboards, vulnerabilities that could have been used to remotely execute code with elevated privileges, act as a keylogger and thereby compromise the users’ privacy and authentication details.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Check Point Research <a href="https://research.checkpoint.com/lg-keyboard-vulnerabilities/">recently discovered vulnerabilities in some LG smartphone keyboards</a>, vulnerabilities that could have been used to remotely execute code with elevated privileges, act as a keylogger and thereby compromise the users’ privacy and authentication details.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1137</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e9589ac7b4de429da29bccd805a1186a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4567948546.mp3?updated=1685022369" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber bank heists.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/40/notes</link>
      <description>Carbon Black's Chief Cybersecurity Officer Tom Kellerman shares the results of their recent report, Modern Bank Heists: Cyberattacks &amp; Lateral Movement in the Financial Sector.
For the report, they interviewed CISOs at 40 major financial institutions, revealing attack and mitigation trends.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Jun 2018 11:00:00 -0000</pubDate>
      <itunes:title>Cyber bank heists.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>40</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7e8a9ff6-dcfb-11ea-975e-03575eba0f33/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Carbon Black's Chief Cybersecurity Officer Tom Kellerman shares the results of their recent report, Modern Bank Heists: Cyberattacks &amp; Lateral Movement in the Financial Sector.
For the report, they interviewed CISOs at 40 major financial institutions, revealing attack and mitigation trends.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Carbon Black's Chief Cybersecurity Officer Tom Kellerman shares the results of their recent report, <a href="https://www.carbonblack.com/resource/modern-bank-heists-cyberattacks-lateral-movement-in-the-financial-sector/">Modern Bank Heists: Cyberattacks &amp; Lateral Movement in the Financial Sector.</a></p><p>For the report, they interviewed CISOs at 40 major financial institutions, revealing attack and mitigation trends.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1113</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a0acba22781b46c1b2c8de2b8713d954]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9651741014.mp3?updated=1685022289" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Winnti Umbrella Chinese threat group.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/39/notes</link>
      <description>Researchers from ProtectWise's 401TRG team recently published research linking a variety of new and previously reported Chinese cyber threat groups.
Tom Hegel is a Senior Threat Researcher with the 401TRG, and he joins us to share their findings. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Jun 2018 11:00:00 -0000</pubDate>
      <itunes:title>Winnti Umbrella Chinese threat group.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>39</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7ea86482-dcfb-11ea-975e-a38647403a3c/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers from ProtectWise's 401TRG team recently published research linking a variety of new and previously reported Chinese cyber threat groups.
Tom Hegel is a Senior Threat Researcher with the 401TRG, and he joins us to share their findings. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers from ProtectWise's 401TRG team recently <a href="https://401trg.com/burning-umbrella/">published research</a> linking a variety of new and previously reported Chinese cyber threat groups.</p><p>Tom Hegel is a Senior Threat Researcher with the 401TRG, and he joins us to share their findings. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1414</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[755b7e27ebeb45f98b5fed932f214927]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9514956053.mp3?updated=1685022371" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Islamic State propaganda persistence.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/38/notes</link>
      <description>Researchers from Flashpoint recently explored ISIS' ability to distribute propaganda across the internet, and their use of major internet service providers to help them achieve persistence.

Ken Wolf is a Senior Analyst at Flashpoint, and he describes what they learned.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Jun 2018 11:00:00 -0000</pubDate>
      <itunes:title>Islamic State propaganda persistence.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>38</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7ebeb174-dcfb-11ea-975e-afdf6fb11699/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers from Flashpoint recently explored ISIS' ability to distribute propaganda across the internet, and their use of major internet service providers to help them achieve persistence.

Ken Wolf is a Senior Analyst at Flashpoint, and he describes what they learned.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers from Flashpoint recently explored ISIS' ability to distribute propaganda across the internet, and their use of major internet service providers to help them achieve persistence.</p><p><br></p><p>Ken Wolf is a Senior Analyst at Flashpoint, and he describes what they learned.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1297</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3e0098dbf3e6462da3d4e18bedd2969b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW6010366997.mp3?updated=1685022288" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>UPnProxy infiltrates home routers.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/37/notes</link>
      <description>Researchers at Akamai recently published a white paper titled UPnProxy: Blackhat proxies via NAT Injections.
In it, they describe vulnerabilities with Universal Plug and Play capabilities in home routers, and how malicious actors could take advantage of them. 
Chad Seaman is a senior CERT engineer at Akamai, and he's our guide. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 May 2018 11:00:00 -0000</pubDate>
      <itunes:title>UPnProxy infiltrates home routers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>37</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7ed82d5c-dcfb-11ea-975e-8f223a685191/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Akamai recently published a white paper titled UPnProxy: Blackhat proxies via NAT Injections.
In it, they describe vulnerabilities with Universal Plug and Play capabilities in home routers, and how malicious actors could take advantage of them. 
Chad Seaman is a senior CERT engineer at Akamai, and he's our guide. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Akamai recently published a white paper titled <a href="https://www.akamai.com/us/en/multimedia/documents/white-paper/upnproxy-blackhat-proxies-via-nat-injections-white-paper.pdf">UPnProxy: Blackhat proxies via NAT Injections.</a></p><p>In it, they describe vulnerabilities with Universal Plug and Play capabilities in home routers, and how malicious actors could take advantage of them. </p><p>Chad Seaman is a senior CERT engineer at Akamai, and he's our guide. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1382</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4ccda07136df499ea0d1f3af3fea0206]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2903764733.mp3?updated=1685022276" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Threat actors hijack Lojack.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/36/notes</link>
      <description>Researchers from Arbor Networks' ASERT Threat Intelligence Team recently published a report titled, "Lojack Becomes a Double Agent." It outlines how threat actors are altering legitimate recovery utility software and simulating its command and control servers to gain access to target machines. 
Richard Hummel is manager of the ASERT Threat Research Team, and he joins us to describe their work. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 May 2018 11:00:00 -0000</pubDate>
      <itunes:title>Threat actors hijack Lojack.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>36</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7efac510-dcfb-11ea-975e-bf69351b32cf/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers from Arbor Networks' ASERT Threat Intelligence Team recently published a report titled, "Lojack Becomes a Double Agent." It outlines how threat actors are altering legitimate recovery utility software and simulating its command and control servers to gain access to target machines. 
Richard Hummel is manager of the ASERT Threat Research Team, and he joins us to describe their work. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers from Arbor Networks' ASERT Threat Intelligence Team recently published a report titled, "<a href="https://asert.arbornetworks.com/lojack-becomes-a-double-agent/">Lojack Becomes a Double Agent.</a>" It outlines how threat actors are altering legitimate recovery utility software and simulating its command and control servers to gain access to target machines. </p><p>Richard Hummel is manager of the ASERT Threat Research Team, and he joins us to describe their work. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1183</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f98c7d864dc643f885e6a4f85726d79c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4878040046.mp3?updated=1685022277" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Three pillars of Artificial Intelligence.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/35/notes</link>
      <description>Bobby Filar is a Principal Data Scientist at Endgame, and coauthor of the research paper, The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation. The report surveys the landscape of potential security threats from malicious uses of AI, and proposes ways to better forecast, prevent, and mitigate these threats. Bobby Filar joins us to discuss the paper, and his views on the evolving role of AI in cybersecurity. 
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 May 2018 11:00:00 -0000</pubDate>
      <itunes:title>Three pillars of Artificial Intelligence.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>35</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7f15105a-dcfb-11ea-975e-273f49a0a7d0/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Bobby Filar is a Principal Data Scientist at Endgame, and coauthor of the research paper, The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation. The report surveys the landscape of potential security threats from malicious uses of AI, and proposes ways to better forecast, prevent, and mitigate these threats. Bobby Filar joins us to discuss the paper, and his views on the evolving role of AI in cybersecurity. 
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Bobby Filar is a Principal Data Scientist at Endgame, and coauthor of the research paper, The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation. The report surveys the landscape of potential security threats from malicious uses of AI, and proposes ways to better forecast, prevent, and mitigate these threats. Bobby Filar joins us to discuss the paper, and his views on the evolving role of AI in cybersecurity. </p><p><a href="https://arxiv.org/abs/1802.07228">The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2090</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[89bdf7f153fae7ea5e87670499d55e75]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2541321368.mp3?updated=1685022367" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BlackTDS and ThreadKit offered in criminal markets.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/34/notes</link>
      <description>Kevin Epstein is Vice President of Proofpoint's Threat Operations Center. We’re discussing two bits of research with him today. The first is about  BlackTDS, a traffic distribution tool for sale in dark web markets. A little later in the show, he’ll tell us about  ThreadKit, a document exploit builder.
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 May 2018 11:00:00 -0000</pubDate>
      <itunes:title>BlackTDS and ThreadKit offered in criminal markets.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>34</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7f300b8a-dcfb-11ea-975e-4be06e708a76/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Kevin Epstein is Vice President of Proofpoint's Threat Operations Center. We’re discussing two bits of research with him today. The first is about  BlackTDS, a traffic distribution tool for sale in dark web markets. A little later in the show, he’ll tell us about  ThreadKit, a document exploit builder.
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kevin Epstein is Vice President of Proofpoint's Threat Operations Center. We’re discussing two bits of research with him today. The first is about <a href="https://www.proofpoint.com/us/threat-insight/post/drive-service-blacktds"> BlackTDS, a traffic distribution tool</a> for sale in dark web markets. A little later in the show, he’ll tell us about <a href="https://www.proofpoint.com/us/threat-insight/post/unraveling-ThreadKit-new-document-exploit-builder-distribute-The-Trick-Formbook-Loki-Bot-malware"> ThreadKit, a document exploit builder.</a></p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1432</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6695fe330548bc161b91b3452097218a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9865349112.mp3?updated=1685021729" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New MacOS backdoor linked to OceanLotus.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/33/notes</link>
      <description>Researchers at Trend Micro recently discovered a backdoor targeting MacOS users that they believe is the work of the OceanLotus threat group, an organization previously thought to have launched targeted attacks against human rights organizations, media organizations, research institutes, and maritime construction firms.
Mark Nunnikhoven is VP of Cloud Research at Trend Micro, and he explains what they've learned. 
https://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Apr 2018 11:00:00 -0000</pubDate>
      <itunes:title>New MacOS backdoor linked to OceanLotus.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>33</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7f46bab0-dcfb-11ea-975e-d3a07500bcf1/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Trend Micro recently discovered a backdoor targeting MacOS users that they believe is the work of the OceanLotus threat group, an organization previously thought to have launched targeted attacks against human rights organizations, media organizations, research institutes, and maritime construction firms.
Mark Nunnikhoven is VP of Cloud Research at Trend Micro, and he explains what they've learned. 
https://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Trend Micro recently discovered a backdoor targeting MacOS users that they believe is the work of the OceanLotus threat group, an organization previously thought to have launched targeted attacks against human rights organizations, media organizations, research institutes, and maritime construction firms.</p><p>Mark Nunnikhoven is VP of Cloud Research at Trend Micro, and he explains what they've learned. </p><p>https://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/</p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1354</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e7c40a56a774585db10694ad9a64f0f5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8298706383.mp3?updated=1685021721" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>InnaputRAT exfiltrates victim data.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/32/notes</link>
      <description>Researchers with Arbor Networks ASERT team have been tracking a malware campaign targeting commercial manufacturing, and have uncovered various samples dating back to at least 2016.

Richard Hummel is Threat Intelligence Manager for Arbor Networks' ASERT Team, and he takes us through what they've discovered.
 https://www.arbornetworks.com/blog/asert/innaput-actors-utilize-remote-access-trojan-since-2016-presumably-targeting-victim-files/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Apr 2018 11:00:00 -0000</pubDate>
      <itunes:title>InnaputRAT exfiltrates victim data.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>32</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7f69cf46-dcfb-11ea-975e-f7a9ab3879de/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers with Arbor Networks ASERT team have been tracking a malware campaign targeting commercial manufacturing, and have uncovered various samples dating back to at least 2016.

Richard Hummel is Threat Intelligence Manager for Arbor Networks' ASERT Team, and he takes us through what they've discovered.
 https://www.arbornetworks.com/blog/asert/innaput-actors-utilize-remote-access-trojan-since-2016-presumably-targeting-victim-files/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers with Arbor Networks ASERT team have been tracking a malware campaign targeting commercial manufacturing, and have uncovered various samples dating back to at least 2016.</p><p><br></p><p>Richard Hummel is Threat Intelligence Manager for Arbor Networks' ASERT Team, and he takes us through what they've discovered.</p><p><a href="https://www.arbornetworks.com/blog/asert/innaput-actors-utilize-remote-access-trojan-since-2016-presumably-targeting-victim-files/"> https://www.arbornetworks.com/blog/asert/innaput-actors-utilize-remote-access-trojan-since-2016-presumably-targeting-victim-files/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1373</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1f00b22d2ab5ca99a283e1f3df3d1be3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4943172052.mp3?updated=1685021709" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Energetic Dragonfly and DYMALLOY Bear 2.0.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/31/notes</link>
      <description>Researchers at Cylance recently uncovered the malicious use of a core router in a campaign aimed at critical infrastructure around the world. 

Kevin Levelli is Director of Threat Intelligence at Cylance, and he takes us through what they've discovered. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Apr 2018 11:00:00 -0000</pubDate>
      <itunes:title>Energetic Dragonfly and DYMALLOY Bear 2.0.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>31</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7f8774d8-dcfb-11ea-975e-134a36b40484/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Cylance recently uncovered the malicious use of a core router in a campaign aimed at critical infrastructure around the world. 

Kevin Levelli is Director of Threat Intelligence at Cylance, and he takes us through what they've discovered. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Cylance recently uncovered the malicious use of a core router in a campaign aimed at critical infrastructure around the world. </p><p><br></p><p>Kevin Levelli is Director of Threat Intelligence at Cylance, and he takes us through what they've discovered. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1283</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9654bf62afa402a6ec746bffbe6c6f32]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5623621517.mp3?updated=1685021696" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Crypto crumple zones.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/30/notes</link>
      <description>In their recently published paper, "Crypto Crumple Zones: Enabling Limited Access Without Mass Surveillance," coauthors Charles Wright and Mayank Varia make their case for an alternative approach to the encryption debate, one based on economics as a limiting factor on government overreach and surveillance. 

Crypto Crumple Zones: Enabling Limited Access Without Mass Surveillance
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Apr 2018 11:00:00 -0000</pubDate>
      <itunes:title>Crypto crumple zones.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>30</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7fa15470-dcfb-11ea-975e-f38048f4c548/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In their recently published paper, "Crypto Crumple Zones: Enabling Limited Access Without Mass Surveillance," coauthors Charles Wright and Mayank Varia make their case for an alternative approach to the encryption debate, one based on economics as a limiting factor on government overreach and surveillance. 

Crypto Crumple Zones: Enabling Limited Access Without Mass Surveillance
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In their recently published paper, "Crypto Crumple Zones: Enabling Limited Access Without Mass Surveillance," coauthors Charles Wright and Mayank Varia make their case for an alternative approach to the encryption debate, one based on economics as a limiting factor on government overreach and surveillance. </p><p><br></p><p><a href="http://web.cecs.pdx.edu/~cvwright/papers/crumplezones.pdf">Crypto Crumple Zones: Enabling Limited Access Without Mass Surveillance</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2294</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ec7e763a8e555692b42a5b441aa1cf7c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2946519512.mp3?updated=1685021685" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chasing FlawedAMMYY.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/29/notes</link>
      <description>FlawedAMMYY is a newly discovered remote access trojan (RAT) that’s been used in malicious email campaigns, as far back as 2016.
Ryan Kalember is Senior Vice President of Cyber Security Strategy at Proofpoint, and he takes us through  their research. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 31 Mar 2018 11:00:00 -0000</pubDate>
      <itunes:title>Chasing FlawedAMMYY.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>29</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7fb62ee0-dcfb-11ea-975e-2f64b80421fc/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>FlawedAMMYY is a newly discovered remote access trojan (RAT) that’s been used in malicious email campaigns, as far back as 2016.
Ryan Kalember is Senior Vice President of Cyber Security Strategy at Proofpoint, and he takes us through  their research. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>FlawedAMMYY is a newly discovered remote access trojan (RAT) that’s been used in malicious email campaigns, as far back as 2016.</p><p>Ryan Kalember is Senior Vice President of Cyber Security Strategy at Proofpoint, and he takes us through <a href="https://www.proofpoint.com/us/threat-insight/post/leaked-source-code-ammyy-admin-turned-flawedammyy-rat"> their research.</a> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1389</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e62973ecb700e3185388b88e33ea7e6f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8601934776.mp3?updated=1684873792" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Code comments cause SAML conundrum.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/28/notes</link>
      <description>Researchers at Duo Security recently unearthed a new vulnerability class that affects SAML-based single sign-on (SSO) systems. This vulnerability can allow an attacker with authenticated access to trick SAML systems into authenticating as a different user without knowledge of the victim user’s password.
Kelby Ludwig is a Senior Application Security Engineer at Duo security, and he takes us  through his discoveries. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Mar 2018 11:00:00 -0000</pubDate>
      <itunes:title>Code comments cause SAML conundrum.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>28</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7fd1d73a-dcfb-11ea-975e-d3bdb0942ec6/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Duo Security recently unearthed a new vulnerability class that affects SAML-based single sign-on (SSO) systems. This vulnerability can allow an attacker with authenticated access to trick SAML systems into authenticating as a different user without knowledge of the victim user’s password.
Kelby Ludwig is a Senior Application Security Engineer at Duo security, and he takes us  through his discoveries. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Duo Security recently unearthed a new vulnerability class that affects SAML-based single sign-on (SSO) systems. This vulnerability can allow an attacker with authenticated access to trick SAML systems into authenticating as a different user without knowledge of the victim user’s password.</p><p>Kelby Ludwig is a Senior Application Security Engineer at Duo security, and he takes us <a href="https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations"> through his discoveries</a>. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1142</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[60240d70409b7baa496eb11359448635]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4209794354.mp3?updated=1684873776" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cryptojacking injections heat up.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/27/notes</link>
      <description>There's been an epidemic of cryptojacking code injections recently, as bad actors attempt to cash in on the cryptocurrency craze through unauthorized cryptomining operations on unsuspecting users. 
Marcelle Lee is a threat researcher at LookingGlass, and she takes us through her recently published research,  Cryptojacking — Coming to a Server Near You. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Mar 2018 11:00:00 -0000</pubDate>
      <itunes:title>Cryptojacking injections heat up.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>27</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7feaef86-dcfb-11ea-975e-0740b96fd5ad/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>There's been an epidemic of cryptojacking code injections recently, as bad actors attempt to cash in on the cryptocurrency craze through unauthorized cryptomining operations on unsuspecting users. 
Marcelle Lee is a threat researcher at LookingGlass, and she takes us through her recently published research,  Cryptojacking — Coming to a Server Near You. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>There's been an epidemic of cryptojacking code injections recently, as bad actors attempt to cash in on the cryptocurrency craze through unauthorized cryptomining operations on unsuspecting users. </p><p>Marcelle Lee is a threat researcher at LookingGlass, and she takes us through her recently published research, <a href="https://www.lookingglasscyber.com/blog/cryptojacking-coming-soon-server-near/"> Cryptojacking — Coming to a Server Near You. </a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1520</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[357ab9b433c5e6031d99e88036775c3c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW1165345059.mp3?updated=1684873759" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dark Caracal APT steals out of Lebanon.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/26/notes</link>
      <description>Researcher from Lookout and the EFF have discovered an APT group operating out of Lebanon they've named Dark Caracal. The group is running a global espionage campaign, targeting journalists, military personnel, activists, lawyers, medical professionals and educational institutions. 
Mike Murray is VP of Security Intelligence at Lookout, and he's our guide through their research.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Mar 2018 12:00:00 -0000</pubDate>
      <itunes:title>Dark Caracal APT steals out of Lebanon.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>26</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/80074b68-dcfb-11ea-975e-47e240d3132a/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researcher from Lookout and the EFF have discovered an APT group operating out of Lebanon they've named Dark Caracal. The group is running a global espionage campaign, targeting journalists, military personnel, activists, lawyers, medical professionals and educational institutions. 
Mike Murray is VP of Security Intelligence at Lookout, and he's our guide through their research.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researcher from Lookout and the EFF have discovered an APT group operating out of Lebanon they've named Dark Caracal. The group is running a global espionage campaign, targeting journalists, military personnel, activists, lawyers, medical professionals and educational institutions. </p><p>Mike Murray is VP of Security Intelligence at Lookout, and he's our guide through their research.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2400</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a9f853959a0bd8d5c7f41db67667ed22]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4708772605.mp3?updated=1684873752" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lebal malware phishes for victims.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/25/notes</link>
      <description>Researchers at Comodo Security Solutions have been tracking a recently discovered strain of malware named Lebal. The malware uses several clever techniques to attempt to hide itself, and once installed targets credentials and cryptocurrency wallets. 
Fatih Orhan is VP of Threat Labs at Comodo, and he takes us through their research.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Mar 2018 12:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>25</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/802c9e5e-dcfb-11ea-975e-9b45a8a276fb/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Lebal malware phishes for victims</itunes:subtitle>
      <itunes:summary>Researchers at Comodo Security Solutions have been tracking a recently discovered strain of malware named Lebal. The malware uses several clever techniques to attempt to hide itself, and once installed targets credentials and cryptocurrency wallets. 
Fatih Orhan is VP of Threat Labs at Comodo, and he takes us through their research.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Comodo Security Solutions have been tracking a recently discovered strain of malware named Lebal. The malware uses several clever techniques to attempt to hide itself, and once installed targets credentials and cryptocurrency wallets. </p><p>Fatih Orhan is VP of Threat Labs at Comodo, and he takes us through their research.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1050</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[94a8c94496aed6cc68ff83afa68e2a4f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9049087908.mp3?updated=1684873727" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing for holiday winnings.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/24/notes</link>
      <description>Or Katz is principal lead security researcher for Akamai's Enterprise Security Business Unit, and the research he’s sharing today is a widespread phishing campaign targeting users using an advertising tactic. The research is titled, “Gone Phishing for the Holidays."
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Feb 2018 12:00:00 -0000</pubDate>
      <itunes:title>Phishing for holiday winnings.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>24</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8047f35c-dcfb-11ea-975e-779c14133385/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Or Katz is principal lead security researcher for Akamai's Enterprise Security Business Unit, and the research he’s sharing today is a widespread phishing campaign targeting users using an advertising tactic. The research is titled, “Gone Phishing for the Holidays."
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Or Katz is principal lead security researcher for Akamai's Enterprise Security Business Unit, and the research he’s sharing today is a widespread phishing campaign targeting users using an advertising tactic. The research is titled, “<a href="https://blogs.akamai.com/2018/01/gone-phishing-for-the-holidays.html">Gone Phishing for the Holidays</a>."</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1394</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e1839d1fa835b49bd3bf4c4cc73f659b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8516696243.mp3?updated=1684873716" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The uncanny HEX men.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/23/notes</link>
      <description>The research we’re discussing today is called, “Beware the Hex Men”, and it tracks multiple attack campaigns conducted by a Chinese threat actor. The GuardiCore Labs team identified three attack variants that they named Hex, Hanako and Taylor, targeting SQL servers.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Feb 2018 12:00:00 -0000</pubDate>
      <itunes:title>The uncanny HEX men</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>23</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/805cf860-dcfb-11ea-975e-27ad35229112/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The research we’re discussing today is called, “Beware the Hex Men”, and it tracks multiple attack campaigns conducted by a Chinese threat actor. The GuardiCore Labs team identified three attack variants that they named Hex, Hanako and Taylor, targeting SQL servers.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The research we’re discussing today is called, “Beware the Hex Men”, and it tracks multiple attack campaigns conducted by a Chinese threat actor. The GuardiCore Labs team identified three attack variants that they named Hex, Hanako and Taylor, targeting SQL servers.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1523</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c53e9d090c40c0cc97588f6f2a633fec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW3512458859.mp3?updated=1684873702" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>IcedID banking trojan.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/22/notes</link>
      <description>IcedID is a banking trojan recently discovered and tracked by IBM's X-Force research team, targeting banks, payment card providers, mobile services providers, payroll, webmail and e-commerce sites in the U.S. 
Limor Kessem is an executive security advisor with IBM Security. She returns to Research Saturday to describe what she and her team found.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Feb 2018 12:00:00 -0000</pubDate>
      <itunes:title>IcedID banking trojan</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>22</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/80786758-dcfb-11ea-975e-b752d3e071e7/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>IcedID is a banking trojan recently discovered and tracked by IBM's X-Force research team, targeting banks, payment card providers, mobile services providers, payroll, webmail and e-commerce sites in the U.S. 
Limor Kessem is an executive security advisor with IBM Security. She returns to Research Saturday to describe what she and her team found.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>IcedID is a banking trojan recently discovered and tracked by IBM's X-Force research team, targeting banks, payment card providers, mobile services providers, payroll, webmail and e-commerce sites in the U.S. </p><p>Limor Kessem is an executive security advisor with IBM Security. She returns to Research Saturday to describe what she and her team found.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1436</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8a8079d1d22b8749b48de97f8386b55a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9595127097.mp3?updated=1684873687" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Advanced adware with nation-state tactics.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/21/notes</link>
      <description>Adware is generally considered unsophisticated, and because of its low perceived threat level it's often ignored. Researchers at the Booz Allen Dark Labs' Advanced Threat Hunt Team have recently published research describing a more advanced type of adware, using infection techniques usually attributed to nation-state actors. 

Jay Novak is a threat hunter and tech lead at Booz Allen, and he takes us through their research.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Feb 2018 12:00:00 -0000</pubDate>
      <itunes:title>Advanced adware with nation-state tactics</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>21</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/809c9664-dcfb-11ea-975e-f7f0e25cb890/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Adware is generally considered unsophisticated, and because of its low perceived threat level it's often ignored. Researchers at the Booz Allen Dark Labs' Advanced Threat Hunt Team have recently published research describing a more advanced type of adware, using infection techniques usually attributed to nation-state actors. 

Jay Novak is a threat hunter and tech lead at Booz Allen, and he takes us through their research.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Adware is generally considered unsophisticated, and because of its low perceived threat level it's often ignored. Researchers at the Booz Allen Dark Labs' Advanced Threat Hunt Team have recently published research describing a more advanced type of adware, using infection techniques usually attributed to nation-state actors. </p><p><br></p><p>Jay Novak is a threat hunter and tech lead at Booz Allen, and he takes us through their research.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1163</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fff13a92f3df3631a38a97bbb56c77a7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9362264518.mp3?updated=1684873666" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Targeting Olympic organizations.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/20/notes</link>
      <description>This week we’re discussing the a campaign the McAfee Advanced Threat Research team recently discovered, one that’s targeting organizations involved with the upcoming Pyeongchang Winter Olympics.
Raj Samani is chief scientist at McAfee, and he shares the campaign's clever details.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Jan 2018 12:00:00 -0000</pubDate>
      <itunes:title>Targeting Olympic organizations.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>20</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/80b40fb0-dcfb-11ea-975e-fb27dd2547da/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week we’re discussing the a campaign the McAfee Advanced Threat Research team recently discovered, one that’s targeting organizations involved with the upcoming Pyeongchang Winter Olympics.
Raj Samani is chief scientist at McAfee, and he shares the campaign's clever details.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we’re discussing the a campaign the McAfee Advanced Threat Research team recently discovered, one that’s targeting organizations involved with the upcoming Pyeongchang Winter Olympics.</p><p>Raj Samani is chief scientist at McAfee, and he shares the campaign's clever details.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1306</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[57977fe845a9952d1c0f427957558b55]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8857617260.mp3?updated=1684873652" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fancy Bear Duping Doping Domains.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/19/notes</link>
      <description>Researchers at ThreatConnect have discovered evidence that Fancy Bear, a cyber espionage group generally associated with Russia's military agency GRU, may be spoofing domains belonging to the World Anti-Doping Agency (WADA), the US Anti-Doping Agency (USADA), and the Olympic Council of Asia.

Kyle Ehmke is a threat intelligence researcher with ThreatConnect, and he takes us through their work.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Jan 2018 12:00:00 -0000</pubDate>
      <itunes:title>Fancy Bear Duping Doping Domains.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>19</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/80ccdcca-dcfb-11ea-975e-f731c9266ad2/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at ThreatConnect have discovered evidence that Fancy Bear, a cyber espionage group generally associated with Russia's military agency GRU, may be spoofing domains belonging to the World Anti-Doping Agency (WADA), the US Anti-Doping Agency (USADA), and the Olympic Council of Asia.

Kyle Ehmke is a threat intelligence researcher with ThreatConnect, and he takes us through their work.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at ThreatConnect have discovered evidence that Fancy Bear, a cyber espionage group generally associated with Russia's military agency GRU, may be spoofing domains belonging to the World Anti-Doping Agency (WADA), the US Anti-Doping Agency (USADA), and the Olympic Council of Asia.</p><p><br></p><p>Kyle Ehmke is a threat intelligence researcher with ThreatConnect, and he takes us through their work.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1004</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b8ba0f95c9765447690a56338b7f0141]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7298389412.mp3?updated=1684873629" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Shake Your MoneyTaker.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/18/notes</link>
      <description>A group of Russian-speaking hackers have stolen nearly $10 million from banks around the world. Group-IB, a company with expertise in computer forensics, information security and, specifically, Russian‑speaking criminal groups, have named these thieves MoneyTaker. Nicholas Palmer is the director of international business development at Group-IB, and he's joined by their head of threat intelligence, Dmitry Volkob to explain the MoneyTaker group's schemes.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Jan 2018 12:00:00 -0000</pubDate>
      <itunes:title>Shake Your MoneyTaker.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>18</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/80f10a32-dcfb-11ea-975e-e37e2d99bd96/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A group of Russian-speaking hackers have stolen nearly $10 million from banks around the world. Group-IB, a company with expertise in computer forensics, information security and, specifically, Russian‑speaking criminal groups, have named these thieves MoneyTaker. Nicholas Palmer is the director of international business development at Group-IB, and he's joined by their head of threat intelligence, Dmitry Volkob to explain the MoneyTaker group's schemes.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A group of Russian-speaking hackers have stolen nearly $10 million from banks around the world. Group-IB, a company with expertise in computer forensics, information security and, specifically, Russian‑speaking criminal groups, have named these thieves MoneyTaker. Nicholas Palmer is the director of international business development at Group-IB, and he's joined by their head of threat intelligence, Dmitry Volkob to explain the MoneyTaker group's schemes.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1295</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7dd165a6446519c8d5ccb4b2ae90180a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4470209778.mp3?updated=1684873614" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>TRISIS Malware: Fail-safe fail.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/17/notes</link>
      <description>Robert M. Lee. is CEO of Dragos Security, a company that specializes in the protection of industrial control systems. He’s describing his team's research on TRISIS, tailored ICS malware infecting safety instrumented systems (SIS), so far found only in the middle east. It's only the fifth known incident of malware targeting ICS systems. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Jan 2018 12:00:00 -0000</pubDate>
      <itunes:title>TRISIS Malware: Fail-safe fail.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>17</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/810bbf6c-dcfb-11ea-975e-9789831ff759/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Robert M. Lee. is CEO of Dragos Security, a company that specializes in the protection of industrial control systems. He’s describing his team's research on TRISIS, tailored ICS malware infecting safety instrumented systems (SIS), so far found only in the middle east. It's only the fifth known incident of malware targeting ICS systems. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Robert M. Lee. is CEO of Dragos Security, a company that specializes in the protection of industrial control systems. He’s describing his team's research on TRISIS, tailored ICS malware infecting safety instrumented systems (SIS), so far found only in the middle east. It's only the fifth known incident of malware targeting ICS systems. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2319</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e2ef8239cc39e740f2a52621978ffefd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2988859911.mp3?updated=1684873606" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hunting the Sowbug.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/16/notes</link>
      <description>Alan Neville is a senior threat intelligence analyst at Symantec located in Dublin. He is responsible for leading and documenting investigations into high priority attacks.

He recently published research on the Sowbug cyber espionage group targeting South American and Southeast Asian governments.

 https://www.symantec.com/connect/blogs/sowbug-cyber-espionage-group-targets-south-american-and-southeast-asian-governments
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Dec 2017 12:00:00 -0000</pubDate>
      <itunes:title>Hunting the Sowbug</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>16</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/811ffc84-dcfb-11ea-975e-6b4f6be4ca94/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Alan Neville is a senior threat intelligence analyst at Symantec located in Dublin. He is responsible for leading and documenting investigations into high priority attacks.

He recently published research on the Sowbug cyber espionage group targeting South American and Southeast Asian governments.

 https://www.symantec.com/connect/blogs/sowbug-cyber-espionage-group-targets-south-american-and-southeast-asian-governments
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Alan Neville is a senior threat intelligence analyst at Symantec located in Dublin. He is responsible for leading and documenting investigations into high priority attacks.</p><p><br></p><p>He recently published research on the Sowbug cyber espionage group targeting South American and Southeast Asian governments.</p><p><br></p><p><a href="https://www.symantec.com/connect/blogs/sowbug-cyber-espionage-group-targets-south-american-and-southeast-asian-governments%20"> https://www.symantec.com/connect/blogs/sowbug-cyber-espionage-group-targets-south-american-and-southeast-asian-governments</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1197</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[47630f9b5864eb9eb4b9b286f0bfcf46]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW4831786388.mp3?updated=1684873587" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Keyboys back in town.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/15/notes</link>
      <description>In this edition of the CyberWire Research Saturday, we'll take a look at a more recent intrusion PwC has uncovered, named KeyBoy and highly likely a China-based threat actor. It uses compromised Word documents to gain access.

Bart Parys is a lead researcher in PwC's cyber threat intelligence team, responsible for tracking cyber threat actors, their latest toolsets and methodologies. 

 https://www.pwc.co.uk/issues/cyber-security-data-privacy/research/the-keyboys-are-back-in-town.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Dec 2017 12:00:00 -0000</pubDate>
      <itunes:title>Keyboys back in town.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>15</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/81349068-dcfb-11ea-975e-939a4603c541/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this edition of the CyberWire Research Saturday, we'll take a look at a more recent intrusion PwC has uncovered, named KeyBoy and highly likely a China-based threat actor. It uses compromised Word documents to gain access.

Bart Parys is a lead researcher in PwC's cyber threat intelligence team, responsible for tracking cyber threat actors, their latest toolsets and methodologies. 

 https://www.pwc.co.uk/issues/cyber-security-data-privacy/research/the-keyboys-are-back-in-town.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this edition of the CyberWire Research Saturday, we'll take a look at a more recent intrusion PwC has uncovered, named KeyBoy and highly likely a China-based threat actor. It uses compromised Word documents to gain access.</p><p><br></p><p>Bart Parys is a lead researcher in PwC's cyber threat intelligence team, responsible for tracking cyber threat actors, their latest toolsets and methodologies. </p><p><br></p><p><a href="https://www.pwc.co.uk/issues/cyber-security-data-privacy/research/the-keyboys-are-back-in-town.html"> https://www.pwc.co.uk/issues/cyber-security-data-privacy/research/the-keyboys-are-back-in-town.html</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1265</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7f067c6bc653a9518354357d8c542ab6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9846587990.mp3?updated=1684873571" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The unique culture of the Middle Eastern and North African underground.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/14/notes</link>
      <description>Online underground markets thrive across the globe, with the Middle East and North Africa being no exception. Researchers at Trend Micro recently too a look inside these digital souks, and while much of what they discovered matches similar online marketplaces, there are unique cultural elements that set these regional trading posts apart.
Jon Clay is a cyber security expert from Trend Micro, and he takes us through their research paper,  "Digital Souks: A Glimpse into the Middle East and North African Underground."
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Dec 2017 12:00:00 -0000</pubDate>
      <itunes:title>The unique culture of the Middle Eastern and North African underground</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>14</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/814f4ae8-dcfb-11ea-975e-1f6b92f6e56a/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Online underground markets thrive across the globe, with the Middle East and North Africa being no exception. Researchers at Trend Micro recently too a look inside these digital souks, and while much of what they discovered matches similar online marketplaces, there are unique cultural elements that set these regional trading posts apart.
Jon Clay is a cyber security expert from Trend Micro, and he takes us through their research paper,  "Digital Souks: A Glimpse into the Middle East and North African Underground."
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Online underground markets thrive across the globe, with the Middle East and North Africa being no exception. Researchers at Trend Micro recently too a look inside these digital souks, and while much of what they discovered matches similar online marketplaces, there are unique cultural elements that set these regional trading posts apart.</p><p>Jon Clay is a cyber security expert from Trend Micro, and he takes us through their research paper, <a href="https://documents.trendmicro.com/assets/white_papers/wp-middle-eastern-north-african-underground.pdf"> "Digital Souks: A Glimpse into the Middle East and North African Underground."</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1496</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b2f5cc4d9e6b5f4f677cebbe4cf84f41]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8557780210.mp3?updated=1684873557" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stealthy Zberp Banking Trojan.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/13/notes</link>
      <description>Zberp is a stealthy banking trojan with an unconventional process injection technique. A hybrid of the ZeusVM and Carberp malware, Zberp uses a variety of techniques to prevent detection while it gathers information from infected systems. 
Limor Kessem is an executive security advisor for IBM, and she's our guide.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Dec 2017 12:00:00 -0000</pubDate>
      <itunes:title>Stealthy Zberp Banking Trojan.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>13</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8165e410-dcfb-11ea-975e-c34a31815c1f/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Zberp is a stealthy banking trojan with an unconventional process injection technique. A hybrid of the ZeusVM and Carberp malware, Zberp uses a variety of techniques to prevent detection while it gathers information from infected systems. 
Limor Kessem is an executive security advisor for IBM, and she's our guide.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Zberp is a stealthy banking trojan with an unconventional process injection technique. A hybrid of the ZeusVM and Carberp malware, Zberp uses a variety of techniques to prevent detection while it gathers information from infected systems. </p><p>Limor Kessem is an executive security advisor for IBM, and she's our guide.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1559</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8aa6dcb8dd16f0580494a65cf55364d1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5909129317.mp3?updated=1684873057" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Staying ahead of Fast Flux Networks.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/12/notes</link>
      <description>Bad actors are using Fast Flux Networks with quickly-changing IP addresses and domain names to help hide their activities.
Or Katz, Principal Lead Security Researcher at Akamai, takes us through their recently-published white paper, "Digging Deeper — An In-Depth Analysis of a Fast Flux Network."
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Dec 2017 12:00:00 -0000</pubDate>
      <itunes:title>Staying ahead of Fast Flux Networks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>12</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/81801da8-dcfb-11ea-975e-d338229934e7/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Bad actors are using Fast Flux Networks with quickly-changing IP addresses and domain names to help hide their activities.
Or Katz, Principal Lead Security Researcher at Akamai, takes us through their recently-published white paper, "Digging Deeper — An In-Depth Analysis of a Fast Flux Network."
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Bad actors are using Fast Flux Networks with quickly-changing IP addresses and domain names to help hide their activities.</p><p>Or Katz, Principal Lead Security Researcher at Akamai, takes us through their recently-published white paper, "Digging Deeper — An In-Depth Analysis of a Fast Flux Network."</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1200</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4596174b22750a1ebcd468ecf4c313ef]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8098021714.mp3?updated=1684873037" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Waiting for Terdot, a sneaky banking Trojan.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/11/notes</link>
      <description>The Terdot Banker Trojan is a descendant of the Zeus family of malware, and has evolved to feature serious espionage capabilities. It can compromise transactions, steal accounts and credit card information, and can eavesdrop on and modify traffic on social media and email platforms. While not yet widely spread, it's a threat to consumers and businesses alike.
Bogdan Botezatu is a senior e-threat analyst at Bitdefender, and he takes us through their recently published whitepaper.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Nov 2017 12:00:00 -0000</pubDate>
      <itunes:title>Waiting for Terdot, a sneaky banking Trojan.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>11</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/81a0bb4e-dcfb-11ea-975e-e7fce0cd9a51/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Terdot Banker Trojan is a descendant of the Zeus family of malware, and has evolved to feature serious espionage capabilities. It can compromise transactions, steal accounts and credit card information, and can eavesdrop on and modify traffic on social media and email platforms. While not yet widely spread, it's a threat to consumers and businesses alike.
Bogdan Botezatu is a senior e-threat analyst at Bitdefender, and he takes us through their recently published whitepaper.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Terdot Banker Trojan is a descendant of the Zeus family of malware, and has evolved to feature serious espionage capabilities. It can compromise transactions, steal accounts and credit card information, and can eavesdrop on and modify traffic on social media and email platforms. While not yet widely spread, it's a threat to consumers and businesses alike.</p><p>Bogdan Botezatu is a senior e-threat analyst at Bitdefender, and he takes us through their recently published whitepaper.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1234</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eeeb76777da32180ac0fc84437deaddd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7912818234.mp3?updated=1684864741" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dark Net Pricing with Flashpoint's Liv Rowley.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/10/notes</link>
      <description>Cybercriminals offer all sorts of illicit goods for sale on Deep and Dark Web markets. In this episode, Liv Rowley, cybercrime intelligence analyst at Flashpoint, takes us through her team's research into the pricing of certain illegal goods online, including "Fullz", exploit kits, DDoS for hire, RDP servers, card data, bank logs and passports. Supply meets demand in this shady underground ecosystem.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Nov 2017 12:00:00 -0000</pubDate>
      <itunes:title>Dark Net Pricing with Flashpoint's Liv Rowley.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/81b2cc08-dcfb-11ea-975e-7b8f9cbeef43/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cybercriminals offer all sorts of illicit goods for sale on Deep and Dark Web markets. In this episode, Liv Rowley, cybercrime intelligence analyst at Flashpoint, takes us through her team's research into the pricing of certain illegal goods online, including "Fullz", exploit kits, DDoS for hire, RDP servers, card data, bank logs and passports. Supply meets demand in this shady underground ecosystem.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cybercriminals offer all sorts of illicit goods for sale on Deep and Dark Web markets. In this episode, Liv Rowley, cybercrime intelligence analyst at Flashpoint, takes us through her team's research into the pricing of certain illegal goods online, including "Fullz", exploit kits, DDoS for hire, RDP servers, card data, bank logs and passports. Supply meets demand in this shady underground ecosystem.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1327</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a725fccc00b5c90343c884ff917c5923]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8755675647.mp3?updated=1684864732" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Taiwan Bank Heist and Lazurus Group with BAE's Adrian Nish.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/9/notes</link>
      <description>Dr. Adrian Nish is head of cyber threat intelligence at BAE Systems. His team has been tracking a new cyber-enabled bank heist in Asia. Some of the tools used are reminiscent of the Bangladesh Bank attack from February 2016.
The full report  can be found here.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Nov 2017 12:00:00 -0000</pubDate>
      <itunes:title>Taiwan Bank Heist and Lazurus Group with BAE's Adrian Nish</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>9</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/81cfee8c-dcfb-11ea-975e-5feebfecf929/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dr. Adrian Nish is head of cyber threat intelligence at BAE Systems. His team has been tracking a new cyber-enabled bank heist in Asia. Some of the tools used are reminiscent of the Bangladesh Bank attack from February 2016.
The full report  can be found here.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dr. Adrian Nish is head of cyber threat intelligence at BAE Systems. His team has been tracking a new cyber-enabled bank heist in Asia. Some of the tools used are reminiscent of the Bangladesh Bank attack from February 2016.</p><p>The full report <a href="http://baesystemsai.blogspot.com/2017/10/taiwan-heist-lazarus-tools.html"> can be found here</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>982</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8c51da0466a732b5760abcb446548c87]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8465108232.mp3?updated=1684864717" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exploring Phishing Kits with Duo Security's Jordan Wright.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/8/notes</link>
      <description>In this episode of the CyberWire’s Research Saturday we are joined by Jordan Wright, Senior Research and Development Engineer at Duo Security. He’s the author of the research report, “Phish in a Barrel,” which describes his work gathering and examining thousands of phishing kits from around the web.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Nov 2017 11:00:00 -0000</pubDate>
      <itunes:title>Exploring Phishing Kits with Duo Security's Jordan Wright</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>8</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/81e25b3a-dcfb-11ea-975e-532755175960/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode of the CyberWire’s Research Saturday we are joined by Jordan Wright, Senior Research and Development Engineer at Duo Security. He’s the author of the research report, “Phish in a Barrel,” which describes his work gathering and examining thousands of phishing kits from around the web.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of the CyberWire’s Research Saturday we are joined by Jordan Wright, Senior Research and Development Engineer at Duo Security. He’s the author of the research report, “Phish in a Barrel,” which describes his work gathering and examining thousands of phishing kits from around the web.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1965</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fcab23ed0daad46b8ec27a7ed3c25ef5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW8097607685.mp3?updated=1684864715" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tracking a Trojan: KHRAT.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/7/notes</link>
      <description>The moniker KHRAT came about because of the identification of a Remote Access Trojan (RAT) with command and control infrastructure found in Cambodia (KH). In the most recent episode of the CyberWire's Research Saturday, Ryan Olson, Director of Threat Intelligence at Palo Alto Networks, talks with us about the capabilities of KHRAT and shares details the feature set it provides to threat actors that use it.
https://researchcenter.paloaltonetworks.com/2017/08/unit42-updated-khrat-malware-used-in-cambodia-attacks/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Oct 2017 15:06:00 -0000</pubDate>
      <itunes:title>Tracking a Trojan: KHRAT</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>7</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/81fe593e-dcfb-11ea-975e-ebc167109ffe/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The moniker KHRAT came about because of the identification of a Remote Access Trojan (RAT) with command and control infrastructure found in Cambodia (KH). In the most recent episode of the CyberWire's Research Saturday, Ryan Olson, Director of Threat Intelligence at Palo Alto Networks, talks with us about the capabilities of KHRAT and shares details the feature set it provides to threat actors that use it.
https://researchcenter.paloaltonetworks.com/2017/08/unit42-updated-khrat-malware-used-in-cambodia-attacks/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The moniker KHRAT came about because of the identification of a Remote Access Trojan (RAT) with command and control infrastructure found in Cambodia (KH). In the most recent episode of the CyberWire's Research Saturday, Ryan Olson, Director of Threat Intelligence at Palo Alto Networks, talks with us about the capabilities of KHRAT and shares details the feature set it provides to threat actors that use it.</p><p>https://researchcenter.paloaltonetworks.com/2017/08/unit42-updated-khrat-malware-used-in-cambodia-attacks/</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1199</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6513aad7a950bcf890c0b0c20840cc17]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2441703759.mp3?updated=1684864696" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>WireX BotNet with Justin Paine from Cloudflare.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/6/notes</link>
      <description>In August 2017, multiple Content Delivery Networks (CDNs) and content providers were subject to significant attacks from a botnet dubbed WireX. (The botnet is named for an anagram for one of the delimiter strings in its command and control protocol.) The WireX botnet is primarily made up of Android devices running malicious applications and is designed to create DDoS traffic. The botnet is sometimes associated with ransom notes to targets.
Justin Paine is Head of Trust and Safety at Cloudflare, and he joins us to share the WireX story. 
https://blog.cloudflare.com/the-wirex-botnet/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Oct 2017 11:00:00 -0000</pubDate>
      <itunes:title>WireX BotNet with Justin Paine from Cloudflare</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>6</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/821a2fba-dcfb-11ea-975e-9b52ec87734c/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In August 2017, multiple Content Delivery Networks (CDNs) and content providers were subject to significant attacks from a botnet dubbed WireX. (The botnet is named for an anagram for one of the delimiter strings in its command and control protocol.) The WireX botnet is primarily made up of Android devices running malicious applications and is designed to create DDoS traffic. The botnet is sometimes associated with ransom notes to targets.
Justin Paine is Head of Trust and Safety at Cloudflare, and he joins us to share the WireX story. 
https://blog.cloudflare.com/the-wirex-botnet/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In August 2017, multiple Content Delivery Networks (CDNs) and content providers were subject to significant attacks from a botnet dubbed WireX. (The botnet is named for an anagram for one of the delimiter strings in its command and control protocol.) The WireX botnet is primarily made up of Android devices running malicious applications and is designed to create DDoS traffic. The botnet is sometimes associated with ransom notes to targets.</p><p>Justin Paine is Head of Trust and Safety at Cloudflare, and he joins us to share the WireX story. </p><p>https://blog.cloudflare.com/the-wirex-botnet/</p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1577</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ef06defb10e3b452f3daed9762d5a576]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7883466205.mp3?updated=1684864684" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Synthesized DNA Malware with Peter Ney.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/5/notes</link>
      <description>Peter Ney is a PhD candidate in the Allen School of Computer Science and Engineering at the University of Washington where he is advised by Professor Tadayoshi Kohno. His current research is focused on understanding computer security risks in emerging technologies like DNA synthesis and sequencing and the new threats posed by maliciously crafted, synthetic DNA. He and his team found that security of DNA processing programs is poor and show with a proof-of-concept that it is possible to attack computer systems with adversarial synthetic DNA.

 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Oct 2017 11:00:00 -0000</pubDate>
      <itunes:title>Synthesized DNA Malware with Peter Ney</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>5</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8230ac22-dcfb-11ea-975e-c74dc4851e67/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Peter Ney is a PhD candidate in the Allen School of Computer Science and Engineering at the University of Washington where he is advised by Professor Tadayoshi Kohno. His current research is focused on understanding computer security risks in emerging technologies like DNA synthesis and sequencing and the new threats posed by maliciously crafted, synthetic DNA. He and his team found that security of DNA processing programs is poor and show with a proof-of-concept that it is possible to attack computer systems with adversarial synthetic DNA.

 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Peter Ney is a PhD candidate in the Allen School of Computer Science and Engineering at the University of Washington where he is advised by Professor Tadayoshi Kohno. His current research is focused on understanding computer security risks in emerging technologies like DNA synthesis and sequencing and the new threats posed by maliciously crafted, synthetic DNA. He and his team found that security of DNA processing programs is poor and show with a proof-of-concept that it is possible to attack computer systems with adversarial synthetic DNA.</p><p><br></p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1404</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2760d889168d4cc1ab8f70cf7e4a1721]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW7592781687.mp3?updated=1684864670" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Android Toast Overlay: Ryan Olson from Palo Alto Networks.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/4/notes</link>
      <description>Android Toast Overlay enables attackers to trick Android users into enabling permissions on infected devices by making them think they are clicking on benign buttons superimposed over the user interface.

Ryan Olson is Director of Threat Intelligence at Palo Alto Networks' Unity 42, and he joins us to share their research.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Oct 2017 11:00:00 -0000</pubDate>
      <itunes:title>Android Toast Overlay: Ryan Olson from Palo Alto Networks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/825d068c-dcfb-11ea-975e-d772e520650b/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Android Toast Overlay enables attackers to trick Android users into enabling permissions on infected devices by making them think they are clicking on benign buttons superimposed over the user interface.

Ryan Olson is Director of Threat Intelligence at Palo Alto Networks' Unity 42, and he joins us to share their research.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Android Toast Overlay enables attackers to trick Android users into enabling permissions on infected devices by making them think they are clicking on benign buttons superimposed over the user interface.</p><p><br></p><p>Ryan Olson is Director of Threat Intelligence at Palo Alto Networks' Unity 42, and he joins us to share their research.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1145</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04830f64d57274fc5503b1e55d921aab]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW5176732007.mp3?updated=1684775276" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>APT 33: FireEye's John Hultquist on an Iranian Cyber Espionage Group.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/3/notes</link>
      <description>APT 33 is an Iranian cyber espionage group that targets aerospace and energy sectors and has ties to destructive malware. John Hultquist is Director of Intelligence Analysis at FireEye, and he takes us through their research.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Sep 2017 11:00:00 -0000</pubDate>
      <itunes:title>APT 33: FireEye's John Hultquist on an Iranian Cyber Espionage Group</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/82784136-dcfb-11ea-975e-e7eede784a8a/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>APT 33 is an Iranian cyber espionage group that targets aerospace and energy sectors and has ties to destructive malware. John Hultquist is Director of Intelligence Analysis at FireEye, and he takes us through their research.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>APT 33 is an Iranian cyber espionage group that targets aerospace and energy sectors and has ties to destructive malware. John Hultquist is Director of Intelligence Analysis at FireEye, and he takes us through their research.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1051</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1ac5e89f1b624e472aa0abfca3aa6bc9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW2770056269.mp3?updated=1684774817" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pacifier APT : Bitdefender's Liviu Arsene describes a sophisticated, multifaceted malware campaign.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/2/notes</link>
      <description>In 2016 Bitdefender uncovered a new advanced persistent threat dubbed Pacifier, targeting government institutions starting in 2014. Using malicious .doc documents and .zip files distributed via spear phishing e-mails, attackers would lure victims with invitations to social functions or conferences into executing the attachments. It’s capable of dropping multi-stage backdoors.
Liviu Arsene is a senior e-threat analyst at BitDefender, and he's our guide to the complex components of Pacifier APT.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Sep 2017 11:00:00 -0000</pubDate>
      <itunes:title>Pacifier APT : Bitdefender's Liviu Arsene describes a sophisticated, multifaceted malware campaign</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/829b750c-dcfb-11ea-975e-075c0407ebfa/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In 2016 Bitdefender uncovered a new advanced persistent threat dubbed Pacifier, targeting government institutions starting in 2014. Using malicious .doc documents and .zip files distributed via spear phishing e-mails, attackers would lure victims with invitations to social functions or conferences into executing the attachments. It’s capable of dropping multi-stage backdoors.
Liviu Arsene is a senior e-threat analyst at BitDefender, and he's our guide to the complex components of Pacifier APT.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In 2016 Bitdefender uncovered a new advanced persistent threat dubbed Pacifier, targeting government institutions starting in 2014. Using malicious .doc documents and .zip files distributed via spear phishing e-mails, attackers would lure victims with invitations to social functions or conferences into executing the attachments. It’s capable of dropping multi-stage backdoors.</p><p>Liviu Arsene is a senior e-threat analyst at BitDefender, and he's our guide to the complex components of Pacifier APT.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1489</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2903b3ad457535dfe3b4cf2d2b036fa5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9264153918.mp3?updated=1684774785" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cobian RAT: Zscaler’s Deepen Desai describes some clever malware.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/1/notes</link>
      <description>Deepen Desai, senior director of security research and operations at Zscaler, describes research he and his team have been doing since discovered a clever bit of malware they’ve named Cobian RAT. (RAT stands for Remote Access Trojan.) It’s available for free, but contains a back door that allows the original author to access and control the RAT remotely.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Sep 2017 11:00:00 -0000</pubDate>
      <itunes:title>Cobian RAT: Zscaler’s Deepen Desai describes some clever malware</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/82b10c5a-dcfb-11ea-975e-877c9c7ce0b8/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Deepen Desai, senior director of security research and operations at Zscaler, describes research he and his team have been doing since discovered a clever bit of malware they’ve named Cobian RAT. (RAT stands for Remote Access Trojan.) It’s available for free, but contains a back door that allows the original author to access and control the RAT remotely.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Deepen Desai, senior director of security research and operations at Zscaler, describes research he and his team have been doing since discovered a clever bit of malware they’ve named Cobian RAT. (RAT stands for Remote Access Trojan.) It’s available for free, but contains a back door that allows the original author to access and control the RAT remotely.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1092</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c2e78f78176fbece3b7d3f105aa35b03]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/6ec23a/traffic.megaphone.fm/CYBW9000872787.mp3?updated=1684775238" length="0" type="audio/mpeg"/>
    </item>
  </channel>
</rss>
