What Can We Learn from Ransomware Attacks
In this Studio 471, Jamie MacColl, a research fellow with the Royal United Services Institute, discusses a recent study, “The Scourge of Ransomware Victim Insights on Harms to Individuals, Organisations and Society.” The study sought to understand the impacts of ransomware on multiple levels, from the IT people on the front line through to civil society.
MITRE ATT&CK Looks at Cybercrime Techniques
In this Studio 471, Patrick Howell O’Neill, who is a Lead Cyber Operations Analyst at MITRE, discusses cybercrime techniques and why ATT&CK is useful to security professionals.
Countering Cyber Extortion and Hacktivism
In this episode of Studio 471, we discuss two areas where Orange Cyberdefense has produced unique research in its Security Navigator 2024 report: cyber extortion and hacktivism. We tackle whether cyber extortion can be deterred and also the deeper effects of hacktivism, which can eclipse technical disruptions.
Cybercrime Exposed Podcast: Crypto Heist
In this podcast, we explore the story of Axie Infinity and examine how cyber attackers from North Korea managed to steal almost $600 million worth of virtual currency in just a few minutes, as well as how investigators were able to trace them.
Building Capable Threat Intelligence Programs
It's possible to build effective cyber threat intelligence programs with smaller teams, but stakeholder buy-in is important. John Fokker of Trellix describes how security teams can improve their CTI programs.
![Cybercrime Exposed Podcast: Botnet Breakup](https://intel471.imgix.net/Podcast_Botnet-Breakup.png?auto=compress%2Cformat&crop=focalpoint&fit=crop&fm=webp&fp-x=0.5&fp-y=0.5&h=420&q=80&w=570&s=ccbb0161ce1ce7583307f27390b3f07e 570w)
Cybercrime Exposed Podcast: Botnet Breakup
The Qakbot or QBot botnet was used by cybercriminal gangs to infiltrate computers, steal their data, conduct financial crime and deploy ransomware. But in 2023, law enforcement hacked the hackers. Here's the story.
![Testing the Efficacy of Security Software](https://intel471.imgix.net/Webinar-Listing-Image_2023-08-16-001853_yqhw.png?auto=compress%2Cformat&crop=focalpoint&fit=crop&fm=webp&fp-x=0.5&fp-y=0.5&h=420&q=80&w=570&s=d1f8494705966b7646b149243c1cf548 570w)
Testing the Efficacy of Security Software
In this edition of Studio 471, Simon Edwards of SE Labs walks through how his company tests security products based on the cyber kill chain and MITRE ATT&CK.
![Cybercrime Exposed Podcast: The Xbox One Hack](https://intel471.imgix.net/Podcast_episode_4.png?auto=compress%2Cformat&crop=focalpoint&fit=crop&fm=webp&fp-x=0.5&fp-y=0.5&h=420&q=80&w=570&s=f5bc441d8aded09b4fd54d7e2cd37599 570w)
Cybercrime Exposed Podcast: The Xbox One Hack
In the early 2010s, a group of malicious hackers had a goal: to build a Durango, which was the code name for Microsoft’s next-generation gaming console, eventually known as the Xbox One.
![Vulnerability Management and Patching: Outrunning Attackers](https://intel471.imgix.net/Webinar-Listing-Image_2023-08-16-001853_yqhw.png?auto=compress%2Cformat&crop=focalpoint&fit=crop&fm=webp&fp-x=0.5&fp-y=0.5&h=420&q=80&w=570&s=d1f8494705966b7646b149243c1cf548 570w)
Vulnerability Management and Patching: Outrunning Attackers
In this edition of Studio 471, Patrick Garrity of Nucleus Security shares the effects of the KEV list across the security industry, his research into the KEV, and how threat intelligence can guide patching efforts.
![Cybercrime Exposed Podcast: Social Engineering](https://intel471.imgix.net/Cybercrime-Exposed-Ep.-3.png?auto=compress%2Cformat&crop=focalpoint&fit=crop&fm=webp&fp-x=0.5&fp-y=0.5&h=420&q=80&w=570&s=0d5899c054ee51c59a17162b0e42dda1 570w)
Cybercrime Exposed Podcast: Social Engineering
In this episode of Cybercrime Exposed, Bluma Janowitz, a social engineer and red team agent, describes two of her engagements to test an organization’s defenses against malicious hackers.