Countering Cyber Extortion and Hacktivism
In this episode of Studio 471, we discuss two areas where Orange Cyberdefense has produced unique research in its Security Navigator 2024 report: cyber extortion and hacktivism. We tackle whether cyber extortion can be deterred and also the deeper effects of hacktivism, which can eclipse technical disruptions.
Cybercrime Exposed Podcast: Crypto Heist
In this podcast, we explore the story of Axie Infinity and examine how cyber attackers from North Korea managed to steal almost $600 million worth of virtual currency in just a few minutes, as well as how investigators were able to trace them.
Building Capable Threat Intelligence Programs
It's possible to build effective cyber threat intelligence programs with smaller teams, but stakeholder buy-in is important. John Fokker of Trellix describes how security teams can improve their CTI programs.
Cybercrime Exposed Podcast: Botnet Breakup
The Qakbot or QBot botnet was used by cybercriminal gangs to infiltrate computers, steal their data, conduct financial crime and deploy ransomware. But in 2023, law enforcement hacked the hackers. Here's the story.
Testing the Efficacy of Security Software
In this edition of Studio 471, Simon Edwards of SE Labs walks through how his company tests security products based on the cyber kill chain and MITRE ATT&CK.
Cybercrime Exposed Podcast: The Xbox One Hack
In the early 2010s, a group of malicious hackers had a goal: to build a Durango, which was the code name for Microsoft’s next-generation gaming console, eventually known as the Xbox One.
Vulnerability Management and Patching: Outrunning Attackers
In this edition of Studio 471, Patrick Garrity of Nucleus Security shares the effects of the KEV list across the security industry, his research into the KEV, and how threat intelligence can guide patching efforts.
Cybercrime Exposed Podcast: Social Engineering
In this episode of Cybercrime Exposed, Bluma Janowitz, a social engineer and red team agent, describes two of her engagements to test an organization’s defenses against malicious hackers.
Mandiant’s CTO: A Bad Year for Ransomware and Extortion
In this edition of Studio 471, Mandiant CTO Charles Carmakal says half of all ransomware or extortion victims are paying ransoms. Sometimes, that is to prevent the release of sensitive data, while others pay to speed up recovery – even if the organizations have backups.
Cybercrime Exposed Podcast: The Extortionists
In one long weekend in May 2023, a cybercriminal gang called Clop conducted one of the largest data breaches on record.