Logo

    cybersecurity news

    Explore "cybersecurity news" with insightful episodes like "Mastering C-Suite Transformation: A Journey through High-Level Leadership with Steve Swick", "Microsoft vs Midnight Blizzard", "Midnight Blizzard, AnyDesk Breach & a $27 Million Ransomware Attack", "Tools of the Trade: Insights from Multifaceted CEO Tech Leader Scott Aken" and "The Dark Side of QR Codes" from podcasts like ""Quick Tips From the C-Suite", "The Security Swarm: A Hornetsecurity Podcast", "The Security Swarm: A Hornetsecurity Podcast", "Quick Tips From the C-Suite" and "The Security Swarm: A Hornetsecurity Podcast"" and more!

    Episodes (28)

    Mastering C-Suite Transformation: A Journey through High-Level Leadership with Steve Swick

    Mastering C-Suite Transformation: A Journey through High-Level Leadership with Steve Swick

    We are privileged to sit down with Steve Swick, a trailblazer in the realm of cybersecurity and high-level leadership.  Tune in to gain invaluable wisdom from one of the nation's foremost cybersecurity professionals, and we will unravel the strategies and insights that have propelled Steve to the forefront of cybersecurity leadership. Learn how he navigated the evolving landscape of information security, engaged with executive teams and boards of directors, and spearheaded transformative initiatives in the C-suite.

    More About Steve Swick:

    Steve Swick, an independent consultant with a remarkable 26-year tenure at American Electric Power (AEP), the largest energy company in the US, joins us to share his insights into c-suite transformation. As the former Chief Security Officer at AEP, Steve held the reins of Enterprise Aviation, Physical, and Cyber Security, navigating the company through the complex landscape of security risks and preparedness.

    With over 30 years of experience in Information Security, Steve's journey began monitoring phone calls and fax transmissions for the U.S. Air Force Intelligence in the 1980s. His pivotal role as one of the original members of the U.S. Air Force Computer Emergency Response Team in the mid-90s set the stage for his illustrious career in cybersecurity. Steve's expertise and dedication propelled him into the forefront of national security discussions, where he testified before Congress, addressed Senate Committees, and shared his insights with esteemed media outlets like the Wall Street Journal and Associated Press.

    Microsoft vs Midnight Blizzard

    Microsoft vs Midnight Blizzard

    During last week’s episode, we briefly spoke about major security incidents that took place between January and February 2024, including the Midnight Blizzard attack. Today, we're delving deeper into the specifics of this attack. From exploiting OAuth mechanics to navigating Microsoft's corporate environment, the attackers demonstrated a level of sophistication that evaded conventional detection controls.  

    Tune in to hear Andy and Paul examine its intricate attack chain and discuss their insights on what Microsoft should do in response.  

    Timestamps: 

    (2:00) What does the attack chain for this breach look like? 

    (7:11) – Timeline of the Attack 

    (8:53) – Thoughts on Microsoft’s Response 

    (18:55) – A Definition of an OAuth App and a Service Principal 

    (27:36) – What do Admins need to do about this? 

    (33:20) – Does the speed of change and the scale of Cloud Services negatively impact security? 

    Episode Resources: 

    Midnight Blizzard, AnyDesk Breach & a $27 Million Ransomware Attack

    Midnight Blizzard, AnyDesk Breach & a $27 Million Ransomware Attack

    The Monthly Threat Report by Hornetsecurity is a valuable resource that provides monthly insights into M365 security trends, email-based threats, and commentary on current events in the cybersecurity space. For this episode, Andy is joined by Hornetsecurity’s CTO – Yvonne Bernard, for an in-depth analysis of major security breaches and ransomware attacks that occurred between January and February 2024. 

    From the Midnight Blizzard attack on Microsoft to a ransomware attack that cost Johnson Controls 27 million USD, our hosts explore what went wrong and provide expert recommendations from the Security Lab at Hornetsecurity on how to protect your business from similar threats. 

    Timestamps: 

    (3:20) – Email Threat Trends from January 

    (6:51) – What were the Most Targeted Industries for January? 

    (9:52) – What were the most impersonated brands in January? 

    (12:30) – A Discussion on the Midnight Blizzard attack on Microsoft 

    (22:38) – The Recent Breach of AnyDesk 

    (27:15) – $27 Million Cost of Ransomware attack on Johnson Controls 

    Tools of the Trade: Insights from Multifaceted CEO Tech Leader Scott Aken

    Tools of the Trade: Insights from Multifaceted  CEO Tech Leader Scott Aken

    In this week's episode of Quick Tips from the C-Suite, join host Travis Thomas as he sits down with Scott Aken, a multifaceted CEO Tech Leader. Dive deep into the world of technology and leadership as Scott shares invaluable insights honed from his years of experience. Discover the secrets behind effective time management, achieving work-life balance, and embodying authentic leadership in today's fast-paced world. Through personal anecdotes, Scott unveils the transformative power of seeking guidance from unexpected quarters and the pivotal role of mentors in professional growth. Uncover the importance of embracing vulnerability and upholding integrity, while navigating the complexities of cybersecurity.

    More About Scott Aken:

    Scott Aken brings to the table over 25 years of experience in technology, product management, and operations leadership roles, spanning from Fortune 500 corporations to hypergrowth start-ups. Currently serving as CEO and Board Member at Axellio, a non-traditional defense contractor and data intelligence platform company, Scott oversees clients within the Department of Defense (DoD), Intelligence Community (IC), and the financial industry. Prior to Axellio, he was President of Charon Technologies, a division of CACI International, and held pivotal cyber leadership roles at L-3 and SAIC after starting his career as an FBI Special Agent, where he led the Cyber Action Team in high-profile computer intrusion investigations. A graduate of The Ohio State University in Mechanical Engineering and GE’s Technical Leadership Program, Scott is also an avid cyclist, former triathlete, and passionate traveler.

    The Dark Side of QR Codes

    The Dark Side of QR Codes

    QR Codes are used everywhere in our society, from reading restaurant menus to accessing Wi-Fi networks and authenticating payments. However, as with any technological advancement, there's a flip side. While QR codes are not malicious in their essence, the landscape has shifted in recent years.  

    Threat actors have evolved their tactics to exploit QR codes in various ways, posing new cybersecurity challenges. In this episode, host Andy teams up with Microsoft Certified Trainer Paul Schnackenburg to discuss the darker side of QR codes and the different ways in which threat actors are deceiving individuals. 

    Episode Resources:

    The Danger of Malicious OAuth Apps in M365

    Train your users to spot malicious emails with the Security Awareness Services Demo

    Safeguard your users from malicious QR codes with Advanced Threat Protection

     

    EP30 (PART 2): Dissecting Microsoft's Secure Future Initiative

    EP30 (PART 2): Dissecting Microsoft's Secure Future Initiative

    In this two-part episode, Andy and Paul Schnackenburg discuss Microsoft’s recently announced Secure Future Initiative, a multi-year commitment to revolutionize the design, building, testing and operation of technology for enhanced security standards in the age of AI. The discussion stems from the aftermath of the Storm 0558 breach that occurred in July 2023, orchestrated by Chinese nation-state threat actors. 

    Tune in to gain a comprehensive understanding of the Secure Future Initiative and its implications. 

    Episode Resources:

    Episode 17: On-Prem Security vs. Cloud Security

    Microsoft’s Announcement Regarding the Secure Future Initiative

    HN24 - Sandwich Data Breach Alert: Jason's Deli & Subway Under Attack

    HN24 -  Sandwich Data Breach Alert: Jason's Deli & Subway Under Attack

    🔒 Dive into the world of cybersecurity as we uncover the latest threats facing businesses in today's digital landscape. In this video, we dissect the Jason's Deli data breach, shedding light on the dangers of credential stuffing attacks. Discover how hackers exploit weak password habits and gain access to personal data, leaving thousands of customers at risk. Stay informed and learn how to protect yourself and your business from cyber threats. 💻🌐

    #Cybersecurity #DataBreach #Ransomware #LockBit #CredentialStuffing #OnlineSecurity #DigitalThreats #Cybercrime #PasswordProtection #ProtectYourData

    🍔 But that's not all! We also delve into the Subway ransomware attack, where the LockBit 3.0 gang threatens to expose sensitive financial information. Understand the evolving tactics of cybercriminals and how they target businesses of all sizes. Gain insights into the importance of proactive measures such as multi-factor authentication, secure passwords, and robust backup strategies. Stay ahead of the game and safeguard your digital assets. 🛡️🌐

    #Subway #RansomwareAttack #LockBit3 #CybersecurityMeasures #DataProtection #DigitalSafety #CyberThreats #OnlinePrivacy #ProtectYourBusiness

    🔐 Join us on this cybersecurity journey to uncover the truth behind these cyber threats and learn how to fortify your defenses. Explore the world of hackers, ransomware, and the ever-evolving landscape of online security. Don't miss out on essential tips to keep your data safe in the digital age. Tune in now and become a cybersecurity expert! 🚀💻

    #OnlineSafety #CybersecurityAwareness #DataPrivacy #CyberSecurityTips #StaySafeOnline #SecurityMeasures #ProtectYourself #DigitalProtection #CybersecurityInsights #ExploreBrokers

    Website: https://Exploitbrokers.com

    Follow us: https://follow.exploitbrokers.com

    Timeline: 
    00:00 Intro 
    00:18 Opener
    00:49 Jason's Cred Stuffing
    07:37 Subway Ransomware
    19:50 Closing Remarks/Outro

    Sources
    Jason's Deli: https://www.darkreading.com/cyberattacks-data-breaches/jason-s-deli-accounts-compromised-by-credential-stuffing-
    Subway: https://www.darkreading.com/cyberattacks-data-breaches/subway-lockbit-investigation-on-menu

    EP30 (PART 1): Dissecting Microsoft's Secure Future Initiative

    EP30 (PART 1): Dissecting Microsoft's Secure Future Initiative

    In this two-part episode, Andy and Paul Schnackenburg discuss Microsoft’s recently announced Secure Future Initiative, a multi-year commitment to revolutionize the design, building, testing and operation of technology for enhanced security standards in the age of AI. The discussion stems from the aftermath of the Storm 0558 breach that occurred in July 2023, orchestrated by Chinese nation-state threat actors. 

    Tune in to gain a comprehensive understanding of the Secure Future Initiative and its implications.  

    Stay tuned for part 2! 

    Timestamps: 

    (2:55) An Update on the Microsoft Storm-0558 Breach 

    (8:40) The Microsoft Secure Future Initiative (SFI) 

    (12:12) – Comparison with the 2002 Trustworthy Computing Initiative Memo 

    (17:39) The Trustworthiness of On-Prem vs. The Cloud 

    Cyber-Securing the Future: CISO Jason Rebholz on Leadership and Cyber Resilience

    Cyber-Securing the Future: CISO Jason Rebholz on Leadership and Cyber Resilience

    This week on Quick Tips From the C-Suite, we have the honor of sitting down with a cybersecurity expert who knows how to navigate the complex and ever-evolving world of digital threats. Tune in to this episode with host, Travis Thomas and special guest, Jason Rebholz, the Chief Information Security Officer at Corvus.

    Today, we tap into Jason's expertise to gain insights into the evolving cybersecurity landscape and the measures organizations can take to build secure and resilient digital environments. The conversation provides valuable advice for aspiring cybersecurity professionals and organizations looking to enhance both their leadership and security measures.

    About Jason Rebholtz:

    With over a decade of experience in forensic investigations and cybersecurity, Jason Rebholtz has been at the forefront of uncovering and mitigating sophisticated cyberattacks. In his current role at Corvus, Jason takes on the critical task of safeguarding both Corvus internally and the policyholders they serve. His wealth of knowledge in incident response, security, and infrastructure makes him a driving force behind the company's security strategy, aimed at reducing the risk of security threats. He's even branded himself as The Teach Me Cyber Guy on YouTube. Prior to joining Corvus, Jason held leadership roles at Mandiant, The Crypsis Group, Gigamon, and was a co-founder of MOXFIVE.

    The Web of Disinformation Campaigns

    The Web of Disinformation Campaigns

    Oh misinformation, we will break your spell..

    In this episode, understand the entangled complex web of disinformation and misinformation that threatens to disrupt the delicate balance of our communities. The false narratives start to manifest in the real world, the vulnerability of societal trust, and the importance of critical thinking in the face of a relentless tide of misinformation. 

    Learn on how the geopolitical theatre shapes our world and how to protect yourself. 

    Support the show

    Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.

    Securing Success: Nurturing a Culture of Cybersecurity from Small Enterprises to Corporate Giants with Reg Harnish

    Securing Success: Nurturing a Culture of Cybersecurity from Small Enterprises to Corporate Giants with Reg Harnish

    Join us in this captivating episode as we delve deep into the world of Cybersecurity with Reg Harnish – a nationally recognized Cybersecurity veteran, investor, board member, advisor, author, and CEO of OrbitalFire Cybersecurity.

    In this episode, hosts Travis Thomas and Reg Harnish delve into the transformative impact of Orbitalfire within the Cybersecurity industry. Reg not only sheds light on the startling statistics related to Cybersecurity adoption within small companies but also explores the factors that hinder their progress, along with quick tips to help organizations navigate the Innovative Technology-evolving landscape.

    More about Reg Harnish and Orbitalfire Cybersecurity:

    Reg brings his thought-provoking and sometimes provocative perspectives to the serious topic of Cybersecurity, making him a highly sought-after keynote speaker in the field. He's on a mission to simplify, automate, and ultimately solve security challenges for the underserved – small businesses.

    Reg has been practicing Cybersecurity for nearly two decades. His experiences, skills, and perspectives have established him as a highly respected thought leader in the industry. Reg is a fellow of the National Cybersecurity Institute, a member of the Forbes Technology Council, and a board advisor to numerous high-growth cybersecurity startups. Reg has been featured in Time Magazine, Forbes, The Washington Post, CBS Nightly News, CIO Magazine, Dark Reading, Software Magazine, ComputerWorld, InfoWorld, and countless other media outlets.

    MilCyberSync Podcast - 27th November 2022 - Episode 35

    MilCyberSync Podcast - 27th November 2022 - Episode 35

    This week on the 35th Episode of the MilCyberSync Podcast: Post Quantum Cryptography, DOD Zero Trust Strategy, NSA/Cybercom Dual-hat, plus an interview with CSM David Redmond (Ret) on his career and the Combined Federal Campaign. 👉🏼Like👍  👉🏼Subscribe🙏🏼

    The MilCyberSync Podcast is a program of the Military Cyber Professionals Association (MCPA), a 501(c)(3) educational nonprofit and public charity.

    MilCyberSync Podcast - 6 November 2022 - Episode 32

    MilCyberSync Podcast - 6 November 2022 - Episode 32

    This week on the 32nd Episode of the Military Cyber Professionals Association's MilCyberSync Podcast: Leyla Gulen and I report on: U.S. SPACE COMMAND's Integration, U.S. Cyber Command ’s Cyber Flag 23-1 and Cyber Mission Forces ,Department of the Navy Chief Information Officer (DON CIO) ’s Cyber Dominance, plus an interview with Cisco's Andy Stewart and Rebecca Chisolm on STEM and more!

    👉🏼Like👍  👉🏼Subscribe🙏🏼

    The MilCyberSync Podcast is a program of the Military Cyber Professionals Association (MCPA), a 501(c)(3) educational nonprofit and public charity. 

    MilCyberSync Podcast - 30 October 2022 - Episode 31

    MilCyberSync Podcast - 30 October 2022 - Episode 31

    This week on the 31st Episode of the Military Cyber Professionals Association's MilCyberSync Podcast: The 780th Military Intelligence Brigade (Cyber) partners up to support STEM, United States Space Force sniffs out cyberthreats, Cybersecurity and Infrastructure Security Agency’s cybersecurity goals for critical infrastructure, U.S. Cyber Command's Col. Candice Frost on threat intel, plus more!  

    👉🏼Watch 👀. 👉🏼Like👍  👉🏼Subscribe🙏🏼

    The MilCyberSync Podcast is a program of the Military Cyber Professionals Association (MCPA), a 501(c)(3) educational nonprofit and public charity

    MilCyberSync Podcast - 16 October 2022 - Episode 29

    MilCyberSync Podcast - 16 October 2022 - Episode 29

    This week on the 29th Episode of the MilCyberSync Podcast: Fleet Cyber Command's Operation Cyber Dragon, Navy Mesh Network, Cyber Security Awareness Month, Army Zero Trust, and more! 👉🏼Watch 👀. 👉🏼Like👍 👉🏼Subscribe🙏🏼

    The MilCyberSync Podcast is a program of the Military Cyber Professionals Association (MCPA), a 501(c)(3) educational nonprofit and public charity.

    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io