Logo

    cyberwar

    Explore " cyberwar" with insightful episodes like "The Geek in the Rear with the Gear: Andrew Strutt on Supporting Military operations | Cy Beat Podcast With Deb Radcliff", "The Geek in the Rear with the Gear: Andrew Strutt on Supporting Military operations | Cy Beat Podcast With Deb Radcliff", "Infowar—war by means of information systems | A Conversation with Winn Schwartau | Cy Beat Podcast With Deb Radcliff", "Infowar—war by means of information systems | A Conversation with Winn Schwartau | Cy Beat Podcast With Deb Radcliff" and "Cyberwar Versus Electronic Warfare | A Conversation with Marc Sachs | Cy Beat Podcast With Deb Radcliff" from podcasts like ""ITSPmagazine", "Cy Beat Podcast", "Cy Beat Podcast", "ITSPmagazine" and "ITSPmagazine"" and more!

    Episodes (42)

    The Geek in the Rear with the Gear: Andrew Strutt on Supporting Military operations | Cy Beat Podcast With Deb Radcliff

    The Geek in the Rear with the Gear: Andrew Strutt on Supporting Military operations | Cy Beat Podcast With Deb Radcliff

    Guest: Andrew Strutt, Hacker and Defense Agency Contractor [@2600net]

    On Twitter | https://twitter.com/andrew_strutt

    On LinkedIn | https://www.linkedin.com/in/andrew-strutt-b457a252/

    On Facebook | https://www.facebook.com/groups/2600net

    On YouTube | https://www.youtube.com/@HackerVideo

    Host: Deb Radcliff

    On ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/deb-radcliff

    ____________________________

    This Episode’s Sponsors

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    ____________________________

    Episode Description

    Hackers supporting defense agencies is common enough that I included this scenario in the third book of my hacker trilogy (Breaking Backbones: From Chaos to Order).

    In real life, this is the true story of Andrew Strutt, a respected, self-taught hacker, co-founder of Telephreak.org, and administrator of the 2600 IRC and Facebook page (with 63,000 followers). He even had his door kicked down in a warrantless FBI raid—a badge of honor in the hacker community.

    Even with this background, Andrew, with the help of a fellow hacker, got through the security clearances to work in defense agencies because, as he says, he never done anything illegal.

    Join us for this fun episode featuring a historic figure in the hacker community.

    ____________________________

    Resources

     

    ____________________________

    Cy Beat playlist on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllT6ZiiO_rDRMUsxB2U96KjG

    ITSPmagazine on YouTube: https://www.youtube.com/c/ITSPmagazine

    To see and hear more of the Cy Beat Podcast with Deb Radcliff content on ITSPmagazine, visit:
    https://www.itspmagazine.com/cy-beat-podcast-with-deb-radcliff

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    The Geek in the Rear with the Gear: Andrew Strutt on Supporting Military operations | Cy Beat Podcast With Deb Radcliff

    The Geek in the Rear with the Gear: Andrew Strutt on Supporting Military operations | Cy Beat Podcast With Deb Radcliff

    Guest: Andrew Strutt, Hacker and Defense Agency Contractor [@2600net]

    On Twitter | https://twitter.com/andrew_strutt

    On LinkedIn | https://www.linkedin.com/in/andrew-strutt-b457a252/

    On Facebook | https://www.facebook.com/groups/2600net

    On YouTube | https://www.youtube.com/@HackerVideo

    Host: Deb Radcliff

    On ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/deb-radcliff

    ____________________________

    This Episode’s Sponsors

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    ____________________________

    Episode Description

    Hackers supporting defense agencies is common enough that I included this scenario in the third book of my hacker trilogy (Breaking Backbones: From Chaos to Order).

    In real life, this is the true story of Andrew Strutt, a respected, self-taught hacker, co-founder of Telephreak.org, and administrator of the 2600 IRC and Facebook page (with 63,000 followers). He even had his door kicked down in a warrantless FBI raid—a badge of honor in the hacker community.

    Even with this background, Andrew, with the help of a fellow hacker, got through the security clearances to work in defense agencies because, as he says, he never done anything illegal.

    Join us for this fun episode featuring a historic figure in the hacker community.

    ____________________________

    Resources

     

    ____________________________

    Cy Beat playlist on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllT6ZiiO_rDRMUsxB2U96KjG

    ITSPmagazine on YouTube: https://www.youtube.com/c/ITSPmagazine

    To see and hear more of the Cy Beat Podcast with Deb Radcliff content on ITSPmagazine, visit:
    https://www.itspmagazine.com/cy-beat-podcast-with-deb-radcliff

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    Infowar—war by means of information systems | A Conversation with Winn Schwartau | Cy Beat Podcast With Deb Radcliff

    Infowar—war by means of information systems | A Conversation with Winn Schwartau | Cy Beat Podcast With Deb Radcliff

    Guest: Winn Schwartau, Infowar Expert at WinnSchwartau.com

    On Twitter | https://twitter.com/winnschwartau

    On LinkedIn | https://www.linkedin.com/in/winnschwartau/

    On Facebook | https://www.facebook.com/profile.php?id=100083293070618

    Host: Deb Radcliff

    On ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/deb-radcliff

    ____________________________

    This Episode’s Sponsors

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    ____________________________

    Episode Description

    Winn Shwartau coined the term Electronic Pearl Harbor when testifying to Congress in 1991, a few years later he was named the “Civilian Architect of Information Warfare” by a Commodore in the OBE Royal Navy. Now, he’s about to publish a book on Metawar, the next iteration of Infowar, where AI and virtual reality are used to manipulate belief systems, truth, and the subjective reality of “the human endpoint.”

    In this podcast, we go back and forth on definitions, but what he has to say about Metawre is downright chilling.

    ____________________________

    Resources

    Cybeat Episode 11: Cyberwar Versus Electronic Warfare: https://www.itspmagazine.com/cy-beat-podcast-with-deb-radcliff

    ____________________________

    Cy Beat playlist on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllT6ZiiO_rDRMUsxB2U96KjG

    ITSPmagazine on YouTube: https://www.youtube.com/c/ITSPmagazine

    To see and hear more of the Cy Beat Podcast with Deb Radcliff content on ITSPmagazine, visit:
    https://www.itspmagazine.com/cy-beat-podcast-with-deb-radcliff

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    Infowar—war by means of information systems | A Conversation with Winn Schwartau | Cy Beat Podcast With Deb Radcliff

    Infowar—war by means of information systems | A Conversation with Winn Schwartau | Cy Beat Podcast With Deb Radcliff

    Guest: Winn Schwartau, Infowar Expert at WinnSchwartau.com

    On Twitter | https://twitter.com/winnschwartau

    On LinkedIn | https://www.linkedin.com/in/winnschwartau/

    On Facebook | https://www.facebook.com/profile.php?id=100083293070618

    Host: Deb Radcliff

    On ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/deb-radcliff

    ____________________________

    This Episode’s Sponsors

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    ____________________________

    Episode Description

    Winn Shwartau coined the term Electronic Pearl Harbor when testifying to Congress in 1991, a few years later he was named the “Civilian Architect of Information Warfare” by a Commodore in the OBE Royal Navy. Now, he’s about to publish a book on Metawar, the next iteration of Infowar, where AI and virtual reality are used to manipulate belief systems, truth, and the subjective reality of “the human endpoint.”

    In this podcast, we go back and forth on definitions, but what he has to say about Metawre is downright chilling.

    ____________________________

    Resources

    Cybeat Episode 11: Cyberwar Versus Electronic Warfare: https://www.itspmagazine.com/cy-beat-podcast-with-deb-radcliff

    ____________________________

    Cy Beat playlist on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllT6ZiiO_rDRMUsxB2U96KjG

    ITSPmagazine on YouTube: https://www.youtube.com/c/ITSPmagazine

    To see and hear more of the Cy Beat Podcast with Deb Radcliff content on ITSPmagazine, visit:
    https://www.itspmagazine.com/cy-beat-podcast-with-deb-radcliff

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    Cyberwar Versus Electronic Warfare | A Conversation with Marc Sachs | Cy Beat Podcast With Deb Radcliff

    Cyberwar Versus Electronic Warfare | A Conversation with Marc Sachs | Cy Beat Podcast With Deb Radcliff

    Guest: Marcus H. Sachs, Deputy Director for Research, McCrary Institute for Cyber and Critical Infrastructure Security [@McCraryCyber]

    On Twitter | https://twitter.com/MarcusSachs

    On LinkedIn | https://www.linkedin.com/in/marcsachs/

    On YouTube | https://www.youtube.com/channel/UCbGROxTp2WcVTqBCrLScLlg

    Host: Deb Radcliff

    On ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/deb-radcliff

    ____________________________

    This Episode’s Sponsors

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    ____________________________

    Episode Description

    Marc Sachs was a Major in the U.S. Army supporting cyber battlefield operations when I first interviewed him for a 2001 Computerworld article about info warriors.

    Recently, Marc was instrumental distinguishing between cyber war versus electronic warfare scenarios in book three of my Breaking Backbones Hacker Trilogy, “Chaos to Order.” His infrastructure expertise was also invaluable when describing a cyber attack on three major power grids.

    Back in the '90's, “We didn’t quite know what we were doing, there were no rules of engagement … and yes, we had friends on the dark side," Marc says. In our discussions back then, we were predicting cyber battles such as those playing out in Ukraine and Israel. But we hadn't foreseen the arms-race for AI-enabled, autonomous fighting machines.

    ____________________________

    Resources

    Info Warriors Computerworld Article with March Sachs: https://www.computerworld.com/article/2590364/the-info--warrior.html

    Breaking Backbones: Chaos to Order, book 3 of Deb's hacker trilogy: https://www.amazon.com/Breaking-Backbones-Chaos-Deb-Radcliff/dp/1665747277/

    ____________________________

    To see and hear more of the Cy Beat Podcast with Deb Radcliff content on ITSPmagazine, visit:
    https://www.itspmagazine.com/cy-beat-podcast-with-deb-radcliff

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    Cyberwar Versus Electronic Warfare | A Conversation with Marc Sachs | Cy Beat Podcast With Deb Radcliff

    Cyberwar Versus Electronic Warfare | A Conversation with Marc Sachs | Cy Beat Podcast With Deb Radcliff

    Guest: Marcus H. Sachs, Deputy Director for Research, McCrary Institute for Cyber and Critical Infrastructure Security [@McCraryCyber]

    On Twitter | https://twitter.com/MarcusSachs

    On LinkedIn | https://www.linkedin.com/in/marcsachs/

    On YouTube | https://www.youtube.com/channel/UCbGROxTp2WcVTqBCrLScLlg

    Host: Deb Radcliff

    On ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/deb-radcliff

    ____________________________

    This Episode’s Sponsors

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    ____________________________

    Episode Description

    Marc Sachs was a Major in the U.S. Army supporting cyber battlefield operations when I first interviewed him for a 2001 Computerworld article about info warriors.

    Recently, Marc was instrumental distinguishing between cyber war versus electronic warfare scenarios in book three of my Breaking Backbones Hacker Trilogy, “Chaos to Order.” His infrastructure expertise was also invaluable when describing a cyber attack on three major power grids.

    Back in the '90's, “We didn’t quite know what we were doing, there were no rules of engagement … and yes, we had friends on the dark side," Marc says. In our discussions back then, we were predicting cyber battles such as those playing out in Ukraine and Israel. But we hadn't foreseen the arms-race for AI-enabled, autonomous fighting machines.

    ____________________________

    Resources

    Info Warriors Computerworld Article with March Sachs: https://www.computerworld.com/article/2590364/the-info--warrior.html

    Breaking Backbones: Chaos to Order, book 3 of Deb's hacker trilogy: https://www.amazon.com/Breaking-Backbones-Chaos-Deb-Radcliff/dp/1665747277/

    ____________________________

    To see and hear more of the Cy Beat Podcast with Deb Radcliff content on ITSPmagazine, visit:
    https://www.itspmagazine.com/cy-beat-podcast-with-deb-radcliff

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    Introduction to Infowar, Cyberwar, and Electronic Warfare | Cy Beat Podcast With Deb Radcliff

    Introduction to Infowar, Cyberwar, and Electronic Warfare | Cy Beat Podcast With Deb Radcliff

    Host: Deb Radcliff

    On ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/deb-radcliff

    ____________________________

    This Episode’s Sponsors

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    ____________________________

    Episode Description

    In this podcast series, we examine the differences between information warfare, cyber warfare, and electronic warfare, including where they intersect and overlap.

    Having just published the third book of my Breaking Backbones Hacker Trilogy, a thriller series, it’s time to cover some of the topics in the trilogy. In the next few episodes, we’ll examine the differences between information war, cyberwar, and electronic warfare, starting with excerpts from my books and then following up with additional podcasts by bringing in experts who also served as models for the heroes in my stories.

    So, please stay tuned for followup shows in which we will discuss where all of this is going and what’s at stake.

    ____________________________

    Resources

    Deb's cyber thrillers: https://www.amazon.com/Deb-Radcliff/e/B092KFMG5B/ref=aufs_dp_fta_dsk

    ____________________________

    To see and hear more of the Cy Beat Podcast with Deb Radcliff content on ITSPmagazine, visit:
    https://www.itspmagazine.com/cy-beat-podcast-with-deb-radcliff

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    Introduction to Infowar, Cyberwar, and Electronic Warfare | Cy Beat Podcast With Deb Radcliff

    Introduction to Infowar, Cyberwar, and Electronic Warfare | Cy Beat Podcast With Deb Radcliff

    Host: Deb Radcliff

    On ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/deb-radcliff

    ____________________________

    This Episode’s Sponsors

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    ____________________________

    Episode Description

    In this podcast series, we examine the differences between information warfare, cyber warfare, and electronic warfare, including where they intersect and overlap.

    Having just published the third book of my Breaking Backbones Hacker Trilogy, a thriller series, it’s time to cover some of the topics in the trilogy. In the next few episodes, we’ll examine the differences between information war, cyberwar, and electronic warfare, starting with excerpts from my books and then following up with additional podcasts by bringing in experts who also served as models for the heroes in my stories.

    So, please stay tuned for followup shows in which we will discuss where all of this is going and what’s at stake.

    ____________________________

    Resources

    Deb's cyber thrillers: https://www.amazon.com/Deb-Radcliff/e/B092KFMG5B/ref=aufs_dp_fta_dsk

    ____________________________

    To see and hear more of the Cy Beat Podcast with Deb Radcliff content on ITSPmagazine, visit:
    https://www.itspmagazine.com/cy-beat-podcast-with-deb-radcliff

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    Cyber Crimes and How to Fight Them | Police Chowki

    Cyber Crimes and How to Fight Them | Police Chowki

    As cyberspace grows, cyber crimes have also increased in number and variety. In this episode of Police Chowki, Shrikrishna Upadhyaya quizzes Javeed Ahmad (ex-IPS & ex-DGP of Uttar Pradesh) and Dr. Aravind Chaturvedi (IPS & SP, Vigilance, Uttar Pradesh) on how to classify cyber crimes, aspects of cyber security, how should individuals and organisations protect themselves in the cyber world, and the police organisational structure and investigative methods in solving cyber crime. They also reflect on how cyber crimes are not merely a law & order matters, but a reflection of more significant socioeconomic reasons, in the context of the emergence of cybercrime hubs like Jamtara, Alwar, Nuh, and others.

    Do follow IVM Podcasts on social media.

    We are @‌IVMPodcasts on Facebook, Twitter, & Instagram.

    https://twitter.com/IVMPodcasts

    https://www.instagram.com/ivmpodcasts/?hl=en

    https://www.facebook.com/ivmpodcasts/

    You can check out our website at https://shows.ivmpodcasts.com/featured

    Follow the show across platforms:

    SpotifyGoogle PodcastsApple PodcastsJioSaavnGaanaAmazon Music

    Do share the word with your folks!

     

    See omnystudio.com/listener for privacy information.

    Decoding The Information Age with Scott Shapiro

    Decoding The Information Age with Scott Shapiro
    You’ve probably encountered phishing emails or computer viruses. Or maybe one or more of your accounts has been hacked or compromised. How and why do hackers hack and what are they generally seeking? Our guest this week points out that understanding the answers to those questions is essential for making sense of the psychological, economic, political and social effects of cybercrime. Scott Shapiro is Southmayd Professor of Law and Professor of Philosophy at Yale Law School. He is the author of a new book called, “Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks.” The book dives into five historical examples, one of which involves its namesake, Fancy Bear, a Russian cyberintelligence unit responsible for hacking the Democratic National Convention. Shapiro joins WITHpod to discuss some of the biggest inflection points in the history of hacking, why the internet is so vulnerable, the role that generative AI may place in future cybercrime and his thoughts on if we should really be concerned about cyberwar.

    #04. OLEKSANDR BEREZIANSKYI | AJAX SYSTEMS

    #04. OLEKSANDR BEREZIANSKYI | AJAX SYSTEMS

    Oleksandr Berezianskyi is R&D Director at Ajax Systems, forging teams and delivering processes, building infrastructure, and designing common architectural solutions for ~350 R&D people in RTOS Malevich, server, mobile, desktop, and infrastructure departments. 

    Ajax Systems is a tech company established in Ukraine in 2011, creating solutions that stand on the cutting edge of technology and science — then putting those innovations into the devices. 

    Ajax devices operate in extreme conditions and are always ready to protect against tragedy, sold in 120+ countries. There are 2,000,000 premises under Ajax protection around the world.

    https://www.youtube.com/@ajaxsystems8076/videos 

    Russia’s Cyber Game: What Worked and What Didn’t

    Russia’s Cyber Game: What Worked and What Didn’t
    In this episode, Dmitri Alperovitch talks with Dr. Danny Moore, a scholar of offensive cyber operations and a former cyber operator in the Israeli Defense Forces, about the successes and failures of Russian cyber attacks against Ukraine, the reasons for the lack of Russian cyber retaliation against the West, how the cyber component of warfare might play out different in a potential conflict with China over Taiwan, and the disturbing vulnerabilities of US weapons platforms like the F35 to cyber attacks

    JAG-S on big-game malware hunting and a very mysterious APT

    JAG-S on big-game malware hunting and a very mysterious APT
    Episode sponsors: Binarly (https://binarly.io/) and FwHunt (https://fwhunt.run/) - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence. SentinelLabs malware hunter Juan Andres Guerrero-Saade (JAG-S) returns to the show to discuss how big-game attribution has changed over the years, the nation-state APT landscape, Mudge and the nightmares facing CISOs, and a mysterious actor named Metador.

    Diminished Democracies: Big Tech, Red Tech, and Deep Tech

    Diminished Democracies: Big Tech, Red Tech, and Deep Tech

    Technology, once presumed to deepen and reinforce democracy, also poses risks to free societies along multiple axes. Large tech companies have gained influence in sectors from financial services to healthcare, while regulators struggle to keep up. Authoritarian states have discovered the use of technology as a method of control. And technology itself has moved into areas such as deep fakes that challenge social reality itself.

    How important is digital literacy and how can it be established to protect private data?

    Since the digital is our public sphere, is it time to regulate advertisement by perverse political actors and their agents? Will digital territories shape the 21st century as the Westphalian political model defined the past?

    Speakers:

    Rajeev Chandrasekhar, Minister of State, Electronics and Information Technology, India

    Zunaid Ahmed Palak, Minister of State, Information and Communication Technology, Bangladesh

    Anne Neuberger, Deputy National Security Advisor, Cyber and Emerging Technology, United States

    Vivek Lall, Chief Executive, General Atomics Global Corporation, United States

    Nanjira Sambuli, Fellow, Technology and International Affairs Program, Carnegie Endowment for International Peace, United States

    Moderator: Kanchan Gupta, Senior Advisor, Ministry of Information and Broadcasting, India


    The Raisina Dialogue is a multilateral conference committed to addressing the most challenging issues facing the global community. Every year, global leaders in policy, business, media and civil society are hosted in New Delhi to discuss cooperation on a wide range of pertinent international policy matters.

    The conference is hosted by the Observer Research Foundation in collaboration with the Government of India, Ministry of External Affairs.

    Click here to learn more on ORF Podcast: www.orfonline.org/podcasts/

    Tech News: NASA Delays Artemis I Launch

    Tech News: NASA Delays Artemis I Launch

    We'll have to wait a while longer before the first of NASA's missions to return us to the Moon takes off. Plus, Brazil tells Apple to include phone chargers or else, a human rights group tells Meta to step up against Brazilian President Bolsonaro's misinformation campaign, and the hardware chief who oversaw the development of the PS5 is retiring. And more!

    See omnystudio.com/listener for privacy information.

    Putting Conti in Context

    Putting Conti in Context

    The Conti ransomware group —a.k.a. Wizard Spider; a.k.a. TrickBot; a.k.a Ryuk—is one of the most prolific ransomware gangs around. It is believed to have been active, in various incarnations, since about 2016. Just in the last year, Conti is believed to be responsible for high profile attacks, including the city government in Tulsa, Oklahoma and Ireland's Health Executive service in May, 2021.

    Even as leading ransomware groups like REvil and Darkside have folded in recent months, Conti is getting renewed attention from cybersecurity experts. The group, CISA warns, has been linked to more than 1,000 attacks on U.S. and international organizations while “Conti cyber threat actors remain active.”

    Why? In our latest episode of the ConversingLabs Podcast, ConversingLabs host Paul Roberts sat down with Yelisey Boguslavskiy, a co-founder of the threat intelligence firm AdvIntel, to talk about Conti’s evolution in recent years, and why the group continues to be such a potent threat.

    According to Boguslavskiy, Conti’s continued vitality reflects a long-running practice of tightly controlled and highly vertical business operations. That runs counter to the predominant “ransomware as a service” model of “quantity over quality:" farming work out to pretty much anyone interested in making a buck and counting on a small number of scores from a large base of attacks. “This is something Conti never really followed in their methodology,” Boguslavskiy said.

    #13 - Cyberattacken im Russland-Ukraine-Krieg

    #13 - Cyberattacken im Russland-Ukraine-Krieg

    Über den Cyberraum können neben der Störung oder gar Zerstörung von Informationssystemen auch verstärkt Desinformationen vermittelt werden. Desinformationen werden täglich ganz gezielt in Politik, Öffentlichkeit, Wirtschaft oder Militär eingesetzt. Ziel ist die Beeinflussung der Zielgruppe und Stimmungsmache, um ein bestimmtes machtpolitisches Ziel zu erreichen. Die Desinformation erfolgt über explizite Falschinformationen oder subtiler Unterdrückung und gezieltem Verschweigen oder Ablenken von überprüften Fakten. Wie so oft kann die Frage cui bono, also „wem nützt es“, ein Leitschnur für eine richtige Einordnung sein. Setzt sich das russische oder das ukrainische Narrativ durch?

    Sollten Sie Fragen zum konkreten Podcast oder ganz allgemein zum Militär oder zu sicherheitspolitischen Themen haben, schreiben sie mir bitte ein E-Mail an stetsbereit@missing-link.media.

    Gerne komme ich bei der Themenfindung auf ihre Fragen zurück.

    Sie können mir auch auf Facebook und Twitter folgen.

    Herbert Bauer, Generalmajor i.R. und Militärexperte

    Weiterführende Links:

    Cyberkrieg

    Informationskrieg

    Deepfake

    Desinformation

    Hybridkrieg

    Ukraine-Krieg im Netz: „Deep-Fake“ zeigt Selenskyj-Kapitulation - auch falsche Putin-Rede kursiert

    Psychologische Kriegsführung

    Cyber War and Ukraine

    Troll-Armee

    Anonymous (Kollektiv)

    Cyberkrieg im Bezug zum Russland-Ukraine-Krieg

    Sandworm

    Hacktivismus

    Russia's war on Ukraine: Timeline of cyber-attacks

    CyberBerkut

    Cyberangriff auf die Ukraine: Wie russische Hacker mit „NotPetya“ den Westen angriffen

    Eutelsat KA-SAT 9A

    https://stetsbereit.simplecast.com/

    Social Media की बीमारी, क्या हुई बटुए पर भारी ?

    Social Media की बीमारी, क्या हुई बटुए पर भारी ?

    क्या आप Social media का बहुत उपयोग करते हैं? क्या अपनी ज़िन्दगी के सभी छोटे छोटे developments और ज़िन्दगी में हो रहा हर छोटा से बड़ा secret, Social Media पर डालते हैं? तो आप Social Media पर digital footprints छोड़ रहे हैं. यानी, social media पर आपको कोई भी track कर सकता हैं, hack कर सकता हैं . आपके data के साथ, आपकी पहचान के साथ, और आपके पैसों के साथ कोई भी खिलवाड़ कर सकता हैं . Ikka Dukka Economy Podcast के इस special episode पर अभिनव त्रिवेदी बात कर रहे हैं जाने माने Cyber Security expert Dr. पवन दुग्गल के साथ, और आपको ये बताने की कोशिश कर रहे हैं की कैसे आपको social media पर सावधानी बरतनी चाहिए, और कैसे आप अपने ऊपर मंडरा रहे financial hacking और identity theft जैसे खतरों को टाल सकते हैं.

    Are you too prevalent & active on Social Media apps? Are you aware that exposing yourself too much on the internet can make you leave trackable digital footprints on the internet? Digital footprints or personal data can easily be used to predict & track your future behaviour and can be manipulated or used against you, in the form of cyber stealing, identity theft and financial hacks. In such a scenario, what kind of behaviour should you avoid on SM? What kind of precautions should one adhere to, in order to avoid social media manipulations? In this special episode of Ikka Dukka Economy podcast, Abhinav Trivedi talks to Renowned Cyber Security expert Dr. Pavan Duggal about possible cyber & financial dangers lurking on the Internet and what kind of digital hygiene one should follow to avoid cyber threats & dangers on the internet.

    You can follow our host Abhinav Trivedi on social media:

    Instagram: https://instagram.com/pongapundit

    Twitter: https://twitter.com/alteredpandit?s=11

    Facebook: facebook.com/Abhinav.trivedi.56

    You can listen to this show and other awesome shows on the IVM Podcasts app on Android: https://ivm.today/android or iOS: https://ivm.today/ios, or any other podcast app.

    The views, information or opinions expressed by guests on the Ikka Dukka Economy podcast are solely their own and do not necessarily represent those of the IVM Podcasts network and any affiliated companies.

    See omnystudio.com/listener for privacy information.

    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io