Ransomware public
[search 0]
Mai Mult
Download the App!
show episodes
 
Our podcast covers major data breaches, digital privacy issues, and the quirks of internet culture with a mix of humor and insight. Why Subscribe? Stay Informed: Get the latest updates on cybersecurity threats, ransomware attacks, and cyber insurance trends. Engaging Content: We break down complex topics with a lighthearted approach, making them easy to understand. Expert Insights: Learn from industry experts and our own experiences in the cybersecurity field. We dive deep into the latest in ...
  continue reading
 
Artwork

1
The Ransomware Files

Jeremy Kirk, Executive Editor, Information Security Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Lunar
 
The Ransomware Files podcast tells the harrowing stories of technology experts who have fought back against ransomware, which is one of the greatest crime waves the internet has ever seen. It features in-the-trenches stories about how organisations recovered and frank human reflections from those who have faced file-encrypting malware, a potent weapon used by high-tech criminals.
  continue reading
 
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
  continue reading
 
Loading …
show series
 
In this episode of Ransomware Rewind, Joe and Mike sit down with Andrew Klucsarits, Director and IT Security and Risk Manager at IT Solutions to talk Cybersecurity including modern ransomware trends and operational security for enterprise business. They analyze high-impact supply-chain attacks (including discussion of the Dragon Force incident and …
  continue reading
 
Kevin O'Neill, founder and CEO of CYVA Research Corporation dives deep into the current challenges surrounding data privacy and control, advocating for a paradigm shift towards self-protecting and self-governing data systems. He shares his vision for a more secure digital future where individuals have control over their personal information, irresp…
  continue reading
 
In this episode of the Ransomware Rewind podcast, we interviewed David Ritter, CEO and co-founder of Penta Privacy Lock. David elaborates on the complexities of privacy regulations like GDPR and CCPA amidst recent significant data breaches. He discusses the importance of privacy compliance in addition to robust cybersecurity measures and introduces…
  continue reading
 
In this episode, we sit down with Chris Hood, a seasoned customer experience expert, to discuss the critical steps management should take in the event of a cybersecurity breach. Chris offers valuable insights into building and maintaining customer trust, effective communication during crises, and leveraging AI to enhance cybersecurity. Perfect for …
  continue reading
 
Dr Chase Cunningham AKA Dr. Zero Trust goes after the "Big Cyber" and the US government telling truths about BS and mishandling sensitive and top secret data. Join us on this episode of the Ransomware Rewind podcast as we dive deep into the world of Zero Trust and current cyber events with Dr. Chase Cunningham, also known as Dr. Zero Trust. From hi…
  continue reading
 
In this episode of Ransomware Rewind, I interview Alexandre Blanc, a strategic cybersecurity advisor at Alexandre Blanc Consulting, to discuss critical issues in data protection and cybersecurity. He shares practical advice for consumers and businesses to manage their digital footprints, employ multi-factor authentication, and use encrypted passkey…
  continue reading
 
In this episode of the Ransomware Rewind podcast, Mike and Joe interview renowned cybersecurity expert Eric Cole, also known as the Cyber Czar. The discussion delves into Eric's fascinating journey from being a CIA hacker in the 1980s to creating successful cybersecurity firms and becoming a thought leader in the industry. Read down to the bottom t…
  continue reading
 
Dennis Underwood, a cybersecurity expert and CEO of Cyber Crucible, joins the show to discuss a variety of topics ranging from his experiences in Pittsburgh to the intricacies of cybersecurity. He delves deep into the technical aspects and importance of cybersecurity. He explains how Cyber Crucible's autonomous software works to prevent data breach…
  continue reading
 
Surviving & Preventing Online Scams: Insights from a Victim of a $1.7M Fraud Surviving & Preventing Online Scams: Insights from a Victim of a $1.7M Fraud David Fradin tells his harrowing story of a how he lost $1.7 million to a sophisticated online pig butchering scam. Learn key insights and practical tips to protect yourself from similar scams. Di…
  continue reading
 
Business owners and IT professionals: Learn how to kickstart a successful career in cybersecurity with expert insights from Cybersecurity Consultant and Content Creator, Sam Romanov. Join co-hosts Joe Erle, a seasoned cyber insurance expert, and Mike Dowdy, AI and cloud security expert, as they explore the latest trends in cybersecurity. Discover p…
  continue reading
 
Business owners and IT professionals: Learn practical cybersecurity tips and be entertained at the same time. :) Join co-hosts Joe Erle, a seasoned cyber insurance expert, and Mike Dowdy, AI and cloud security expert, as they bring you unique insights from top industry professionals (Cyber Lawyer & Pentester on this episode) on the latest threats a…
  continue reading
 
Enterprise Incident Response & Crisis Management with Combat Veteran, Ricoh Danielson In this exclusive interview, we speak with Ricoh Danielson, a U.S. Army Combat Veteran of Iraq and Afghanistan turned cybersecurity expert. Topics in This Interview (breakdown with timestamps below) How businesses can prepare for and respond to cyberattacks Best p…
  continue reading
 
In this episode of Ransomware Rewind: iphone & BYOD best practices for businesses for cybersecurity, Crypto meme coin rug pulls, cloud security mistakes, legacy software vulnerabilities, and more. Dave Tuckman from Fr Secure joins us to discuss everything from digital currencies, including the infamous "Hawk Tuah Girl" meme coin, to the evolving la…
  continue reading
 
In this episode, Mike and Joe are joined by John Braggiotti. With over 20 years experience in the datacenter space working on data centers on multiple continents John knows the real reasons the likes of Microsoft, Amazon and Google are spending billions on data centers. We dive into the shadowy world of nation-state spying and how governments are l…
  continue reading
 
In this episode of Ransomware Rewind, hosts Joe Erle, a cyber insurance expert, and Mike Dowdy, a cloud technology veteran, dive into the dark world of Ransomware as a Service (RaaS). RaaS is a business model that allows cybercriminals with little technical expertise to deploy ransomware attacks by purchasing services from expert developers on the …
  continue reading
 
Imagine receiving a desperate call from a loved one, their voice pleading for help, while a criminal demands money in the background. Deep fakes have brought this nightmare scenario closer to reality, with AI-generated voices and videos that mimic anyone, even your own family. In this episode, we dive into the chilling world of deep fakes, explorin…
  continue reading
 
After 13 episodes and one guest episode, The Ransomware Files project has come to a close. I want to thank everyone who participated and supported it. I wish this project had come to an end because ransomware was no longer a problem. Unfortunately, that's not the case. It remains one of the internet's greatest crime waves. I hope some of the main m…
  continue reading
 
What if you were hired for an office job but ended up negotiating with cybercriminals? There aren’t many rules around the cybercrime known as ransomware, but this is a story about one rule that was definitely broken. By the end it, the path to the truth lead to a place on the other side of the world. It was a place that no one expected and disturbi…
  continue reading
 
Dain Drake was CEO of United Structures of America, a steel fabrication facility outside of Houston. In June 2019, Dain found himself standing outside an adult boutique in Houston at 10 AM on a Sunday morning. It was closed. He called the owner and pleaded for him to come and open the shop. He needed something inside, which might just save his busi…
  continue reading
 
The Ransomware Files is pleased to host a special guest episode from our friends at Hacked. In mid-April, there was a ransomware attack. It wasn’t against a small business. It wasn’t directed at a large company or even a large city. It was against a country: Costa Rica. The Conti ransomware gang struck more than two dozen government bodies in Costa…
  continue reading
 
Is a practicing cardiologist living in Venezuela also a ransomware mastermind? If U.S. prosecutors are to be believed, Moises Luis Zagala Gonzalez is a cybercriminal polymath. He’s on the FBI’s Most Wanted list for cybercrime, but people who know him say the accusations cannot be true. Zagala is charged in federal court in New York with developing …
  continue reading
 
The FBI’s Most Wanted list for cybercrime has a recent entry: Moises Luis Zagala Gonzalez. He is a 55-year-old cardiologist living in Ciudad Bolivar, Venezuela. He has a bald head and an earnest smile. In one photo, he wears a doctor’s white overcoat with a stethoscope around his neck. What is this man doing on that list? U.S. prosecutors allege Za…
  continue reading
 
Ransomware struck global currency exchange and remittance company Travelex on New Year's Eve 2019. Security Architect Don Gibson was DJing at a friend’s place when the first alerts came in. That night kicked off turbulent period for Don that lasted throughout the rest of the year. His name became publicly linked with the Travelex incident, and the …
  continue reading
 
If software has a dangerous and easy-to-exploit security vulnerability, should its maker tell customers to shut it down until it’s fixed? It’s a tough call, but one that Dutch company Hoppenbrouwers says the software vendor Kaseya should have undertaken last year to prevent a massive supply-chain attack executed by the REvil ransomware gang. The ga…
  continue reading
 
Rockford Public Schools in Illinois was infected with the Ryuk ransomware just days after the school year started in September 2019. They had one thought for the suspected Russia-based cybercriminal group at the root of the attack: "Screw them." The attack encrypted upwards of six million files, wrecked applications and locked up servers. But the d…
  continue reading
 
The REvil ransomware gang's attack against the US software company Kaseya in 2021 is not only amongst the largest ransomware attacks of all time, but it's also one of the most intriguing. It involves the use of zero-day software vulnerabilities known only to a handful of people, a race between attackers trying to snare ransom payments and defenders…
  continue reading
 
In 2019, 23 cities across Texas were infected with the REvil/Sodinokibi ransomware in one of the largest ransomware attacks that has ever occurred in the US. The cities recovered with remarkable speed due to the state's diligent preparation. But a small managed service provider called TSM Consulting, which the ransomware actors exploited in a suppl…
  continue reading
 
What if destructive malware disguised as ransomware nearly sank not just one company but many? Shipping giant Maersk was one of dozens of organisations crippled by the NotPetya malware in June 2017. Gavin Ashton and Bharat Halai worked in identity and access management at Maersk. They share how the company's technology team tirelessly brought the c…
  continue reading
 
Cybersecurity experts are increasingly worried about attacks and ransomware directed at the 70,000 water and wastewater facilities in the United States. In November 2020, the Hampton Roads Sanitation District, which serves 1.7 million people in eastern Virginia, was infected with the Ryuk ransomware. Fortunately, its operational technology systems …
  continue reading
 
Matthews is an Australian company that specializes in intelligent identification, labelling and inspection systems used by the food and beverage industry. In early 2020, it faced a "double extortion" attempt from ransomware actors. But Matthews fought back, recovered its data and saved its business. Matthews is one of hundreds of organizations in A…
  continue reading
 
Ski Kacoroski is a systems administrator with the Northshore School District in Bothell, Washington, which has 23,000 students. In 2019, the district was infected by Emotet and Trickbot, two notorious types of malware. Access to the district's systems was auctioned off twice by cybercriminals, and the district's system were eventually infected in S…
  continue reading
 
No one likes to be told that their baby is ugly. Magnify that sentiment with a multi-billion dollar corporation with a reputation at stake. THIS is the challenge that ethical hackers face when they are able to breach environments and report it to these businesses. Are they received well? Sometimes yes, and mostly, no. No one is taking anything or c…
  continue reading
 
We know Ransomware attacks have blown up in recent years and targets are as diverse as the type of attacks. We've discussed the challenges for businesses, small and enterprise, but what about for the public at large? Who is at risk? What percentage of the population is security savvy to know what to look for in attacks or attempts? This week's Rans…
  continue reading
 
What is it about mainstream entertainment that makes the general population suddenly pay attention? Ransomware has grown exponentially in the last year and though it feels like attacks are daily occurrences, the majority of folks haven't changed behaviors, enacted additional security measures or seem to notice the impact that the headline attacks a…
  continue reading
 
Red team and blue team play an important role in defending against advanced cyber attacks that threaten business communications. In this special episode of Ransomware Battleground, we talk through the flow in incident response per cyber kill chain. Ransomware Kill Switch™ can be used by the incident response to control/contain the blast radius in r…
  continue reading
 
Where does time go when the heat of summer turns up and families can enjoy a little vacation time? Well hopefully ransomware attacks aren't tied to soaring temperatures because it's looking like over 120% increase in attacks from 2020. No one is immune and it's up to educating the broader population to understand that ANYTHING can be suspect. Even …
  continue reading
 
Kaseya Ltd. is a Miami-based company that provides software to help other businesses manage their networks. The hackers targeted Kaseya’s virtual systems/server administrator (VSA), a type of software that large companies and technology-service providers use to manage and send out software updates to systems on computer networks. The hacks are caus…
  continue reading
 
In 2021, the global eSports market was valued at just over 1.08 billion U.S. dollars.(Source) Online games and specifically the Massive Multiplayer (MMO) games, experience multiple attacks from hackers, platform competition that try to block players’ access to the gaming platforms, as well as cheating players that can attack other players slowing t…
  continue reading
 
In 2021, the global eSports market was valued at just over 1.08 billion U.S. dollars.(Source) Online games and specifically the Massive Multiplayer (MMO) games, experience multiple attacks from hackers, platform competition that try to block players’ access to the gaming platforms, as well as cheating players that can attack other players slowing t…
  continue reading
 
Online games and specifically the Massive Multiplayer (MMO) games, experience multiple attacks from hackers, platform competition that try to block players’ access to the gaming platforms, as well as cheating players that can attack other players slowing their connection, while gaining a competitive advantage. These attacks can take the entire game…
  continue reading
 
Tesla, Cloudflare, Halifax Health, and Equinox are among the victims involved in a breach of more than 150,000 Verdaka's security cameras by a group of hackers known as Advanced Persistent Threat 69420 Arson Cats. The hackers used a "super admin account," which allowed them to peer into the cameras of all of Verdaka's customers. The group found the…
  continue reading
 
In this episode of Ransomware Battleground, we will be talking about Ransom DDoS attacks. Unlike a ransomware attack, a DDoS Ransom attack does not encrypt a company's systems; it mainly aims to stress and halt them offline. It also does not require the attacker to gain access to a business's internal systems before it can be carried out. So, how w…
  continue reading
 
Big Game Hunting, the targeted large-scale ransomware campaign, is now regarded as the primary cyber threat to organizations across all sectors including financial, healthcare, and government in 2021. Leaking stolen data in an effort to pressure victims into paying is part of a broader trend across the BGH ecosystem. In the recent headlines, the ra…
  continue reading
 
On Feb 9th. 2021 - the nightmare scenario that the security community has warned for years, one that could kill thousands by targeting the critical infrastructure that we all rely on. In this case, the hacker gained access to a computer at the Florida water facility used for running remote control software TeamViewer, according to Reuters, and jack…
  continue reading
 
In this ransomware battleground, we are looking into double-extortion attacks. What are they? And how do they get triggered? Hackers first extract large amounts of sensitive data prior to encrypting a victim’s databases. Then they threaten to publish the data unless the victim pays ransom demands. This puts extra pressure on organizations to pay up…
  continue reading
 
Ransomware Intelligence Observations and Behavior Prediction for 2021 The exponential growth of ransomware creates a constant threat to end-users and corporate ITs. Regardless of your business size, industry, or location, preventing ransomware is a critical task to your organization, both from a financial perspective and for your brand reputation. …
  continue reading
 
Ransomware has evolved beyond the commodity, widespread attacks intended to infect a single endpoint to include more advanced techniques, such as fileless malware and data exfiltration. One of the biggest drivers behind ransomware’s continued success is the adoption of the Ransomware as a Service (RaaS) distribution model. These new strains of rans…
  continue reading
 
Loading …

Ghid rapid de referință

Listen to this show while you explore
Play