50 subscribers
Offline dengan aplikasi Player FM !
Podcast Layak Disimak
DISPONSORI
Salt Typhoon Telecom Attack
Manage episode 455386428 series 1411238
In this episode, Matt and David delve into the evolving story of Salt Typhoon, a Chinese state-sponsored group, and their use of the innovative 'GhostSpider' backdoor to infiltrate telecommunication service providers. This sophisticated and far-reaching cyberattack, which is much larger than previously understood, has compromised sensitive cellular logs and data from government entities, telecom providers, and millions of Americans. Don’t miss this opportunity to stay informed and keep your organization safe!
193 episode
Manage episode 455386428 series 1411238
In this episode, Matt and David delve into the evolving story of Salt Typhoon, a Chinese state-sponsored group, and their use of the innovative 'GhostSpider' backdoor to infiltrate telecommunication service providers. This sophisticated and far-reaching cyberattack, which is much larger than previously understood, has compromised sensitive cellular logs and data from government entities, telecom providers, and millions of Americans. Don’t miss this opportunity to stay informed and keep your organization safe!
193 episode
Semua episode
×1 ChatGPT Memory Manipulation + Salt Typhoon 28:28
1 Hacking Through School: College Cybersecurity Jobs with Nick Godshall 49:26
1 Catching Russian Hackers in Decommissioned Servers with Adrian from Thinkst 50:50
1 Breaking Facial Recognition With Vic From F-Secure 58:35
1 Automating the Fight Against Scammers & Unfair Parking Tickets with DoNotPay 43:54
1 Hacking the Wi-fi of Today & Tomorrow With Mathy Vanhoef 1:06:49
1 CreepDetector - Detecting Stalkers with Wardriving 47:24
1 Maltego - Open-source Intelligence and Forensics 50:10
1 Objective-See - Advanced MacOS Security Tools by Ex-NSA Hacker Patrick Wardle 56:23
1 ESP8266 - The Low-cost Wi-Fi Microchip with a Full TCP/IP Stack 48:52
1 Grabify - the IP Logging, Honeypot Tracking URL Shortener 45:01
1 Professor Angela Sasse FREng on Human-Centered Security 14:16
1 Statistician Kaiser Fung: Fishy Stats (Part 3) 18:38
1 Statistician Kaiser Fung: Accuracy of Algorithms (Part 2) 9:16
1 Statistician Kaiser Fung: Investigate The Process Behind A Numerical Finding (Part 1) 15:15
1 Security Expert and "Hacked Again" Author Scott Schober" (Part 2) 12:27
1 Security Expert and "Hacked Again" Author Scott Schober" (Part 1) 14:39
1 More Scout Brody: Bringing Design Thinking to IoT 9:53
1 Scout Brody, Ph.D. on Creating Security Systems Usable for All 13:18
1 The Dance Between Governance, Risk Management, and Compliance 23:52
1 Privacy Attorney Tiffany Li and AI Memory, Part II 14:10
1 Reflecting on Breaches, Scams and Fake Everything 26:55
1 Privacy Attorney Tiffany Li and AI Memory, Part I 11:31
1 #2018inFiveWords [Regarding Our Security Landscape] 24:55
1 Security and Privacy are Joined at the Hip 31:55
1 What New Tech Can Learn From Old Tech 22:33
1 Troy Hunt: The Modern State of Insecurity (Part Three) 13:16
1 Data Privacy Attorney Sheila FitzPatrick on GDPR 15:50
1 If You Can’t Build In Security, Build In Accountability 37:16
1 Troy Hunt: The Modern State of Insecurity (Part Two) 10:31
1 Troy Hunt: The Modern State of Insecurity (Part One) 8:34
1 How CISOs Explain Security to the C-Suite 30:23
1 Computational Biologist and Founder of Protocols.io, Lenny Teytelman (Part two) 10:41
1 Geneticist and Founder of Protocols.io, Lenny Teytelman (Part one) 15:49
1 I’m Mike McCabe, Systems Engineering Manager of SLED West at Varonis, and This is How I Work 17:14
1 Computer Scientists Aren’t Philosophers 23:10
1 Living Vicariously through Blackhat Attendees and Speakers 20:48
1 I’m Colleen Rafter, Professional Services Education Manager at Varonis, and This is How I Work 11:50
1 Data & Ethics Expert Dr. Gemma Galdon-Clavell: On the Breach of Trust (Part Two) 12:23
1 Gemma Galdon-Clavell: The Legal, Social, and Ethical Impact of Data and Data Technologies (Part One) 11:16
1 When Your Security Brain Never Runs Out Of Problems To Find 22:43
1 How Diversity & Inclusion Drives Innovation and Market Growth (Part Two) 13:15
1 Cyber & Tech Attorney Camille Stewart: Discerning One's Appetite for Risk (Part Two) 11:32
1 How Infosec Can Implement Diversity & Inclusion Programs to Address Workforce Shortage and Make More Money Too 18:26
1 Core Security Principles Drive Us into The Future 30:08
1 Cyber & Tech Attorney Camille Stewart: The Tension Between Law and Tech (Part 1) 7:13
1 I’m Sean Campbell, Systems Engineer at Varonis, and This is How I Work 17:20
1 I’m Brian Vecci, Technical Evangelist at Varonis, and This is How I Work 19:26
1 Attorney Sara Jodka on GDPR and Employee Data, Part II 8:04
1 Varonis CFO & COO Guy Melamed: Preventing Data Breaches and Reducing Risk, Part Two 8:13
1 Attorney Sara Jodka on GDPR and Employee Data, Part I 8:12
1 Varonis CFO & COO Guy Melamed: Preventing Data Breaches and Reducing Risk, Part One 12:47
1 Dr. Wolter Pieters on Information Ethics, Part Two 10:48
1 41% of organizations have at least 1,000 sensitive files open to all employees 27:20
1 Dr. Wolter Pieters on Information Ethics, Part One 14:34
1 I’m Elena Khasanova, Professional Services Manager at Varonis, and This is How I Work 22:48
1 Are Users and Third-Party Vendors Frenemies? 22:08
1 Details Matter in Breaches and in Business 22:27
1 Manifesting Chaos or a Security Risk? 26:03
1 Chief Data Officer Richard Wendell: Information as an Asset (Part 1) 12:01
1 Who is in Control? The Data or Humans? 22:38
1 Security and Privacy Concerns with Chatbots, Trackers, and more 21:14
1 The Challenges and Promise of Digital Drugs 28:53
1 Bring Back Dedicated and Local Security Teams 22:43
1 Rita Gurevich, CEO of SPHERE Technology Solutions 29:00
1 The Moral Obligation of Machines and Humans 28:41
1 The Anatomy of a Cybercriminal Startup 24:51
1 How Weightless Data Impacts Data Security 23:54
1 Penetration Testers Sanjiv Kawa and Tom Porter 38:19
1 Ofer Shezaf, Varonis Director of Cyber Security, Part II 13:06
1 Ofer Shezaf, Varonis Director of Cyber Security, Part I 9:26
1 Dr. Tyrone Grandison on Data, Privacy and Security 35:06
1 The Security of Visually Impaired Self-Driving Cars 28:01
1 Dr. Zinaida Benenson and Phishing, Part II 8:05
1 Deleting a File Is More than Placing It into the Trash 23:29
1 John P. Carlin: Economic Espionage & Weaponized Information (Part 2) 15:10
1 Attorney and GDPR Expert Sue Foster, Part 2 9:10
1 Attorney and GDPR Expert Sue Foster, Part 1 11:10
1 John P. Carlin: Lessons Learned from the DOJ (Part 1) 15:56
1 Presenting Cybersecurity Ideas to the Board 24:20
1 Christina Morillo, Enterprise Information Security Expert 28:31
1 What CISOs are Making, Reading and Sharing 24:36
1 Dr. Zinaida Benenson and Phishing, Part I 14:53
1 Roxy Dee, Threat Intelligence Engineer 23:35
1 Blackhat Briefings That Will Add to Your Tool Belt 26:42
1 Cyber Threats Are Evolving and So Must Two-Factor 20:56
1 What does the EU General Data Protection Regulation (GDPR) mean for countries outside the EU? 31:26
1 Troy Hunt and Lessons from a Billion Breached Data Records 27:58
1 John P. Carlin: Emerging Threats (Part 4) 12:52
1 Security Pros and Users, We’re All in This Together 27:46
1 Taking The Long View, Investing in Technology and Security 27:16
1 John P. Carlin: Ransomware & Insider Threat (Part 3) 9:58
1 When Our Reality Becomes What the Data Says 24:51
1 Security Courts the Internet of Things 26:48
1 Professor Angela Sasse on the Economics of Security 12:14
1 Medical Privacy Expert Adam Tanner (Part II) 6:38
1 Security Pros Bring Out Their Game Face 29:30
1 Medical Privacy Expert Adam Tanner (Part I) 8:21
1 More Ann Cavoukian: GDPR and Access Control 10:05
1 Dr. Ann Cavoukian on Privacy By Design 15:10
1 Password Expert Per Thorsheim on Biometrics and Keystroke Dynamics 21:43
1 Password expert Per Thorsheim On Life After Two Factor Authentication 15:30
1 More Sheila FitzPatrick: Data Privacy and the Law 13:53
1 IoT Pen Tester Ken Munro: Probing Wireless Networks (Part 2) 10:11
1 When Security Is Low, How Do We Go High? 25:04
1 IoT Pen Tester Ken Munro: Security Holes (Part 1) 9:46
1 Six Degrees of Kevin Bacon (Security Edition) 19:16
1 Attorney and Data Scientist Bennett Borden: Find Insider Threats (Part 2) 21:27
1 Attraction of Repulsion (to Ransomware) 29:21
1 Attorney and Data Scientist Bennett Borden: Data Analysis Techniques (Part 1) 12:53
1 Chief Data Officer Richard Wendell: Skills to Cultivate (Part 2) 14:38
1 Moods and Motives of a Smooth Criminal 19:22
1 More Articles on Privacy by Design than Implementation 27:52
Selamat datang di Player FM!
Player FM memindai web untuk mencari podcast berkualitas tinggi untuk Anda nikmati saat ini. Ini adalah aplikasi podcast terbaik dan bekerja untuk Android, iPhone, dan web. Daftar untuk menyinkronkan langganan di seluruh perangkat.