The Cybersecurity Defenders Podcast-logo

The Cybersecurity Defenders Podcast

Technology Podcasts

An accessible but technical podcast about cybersecurity and the people who keep the internet safe. The podcast is built as a series of segments: we will be looking back at the last couple of weeks in cybersecurity news, talking to different people in the industry about areas of their expertise, we're going to break apart some of the TTPs being used by adversaries, and we will even cover a little bit of hacker history.

Location:

United States

Description:

An accessible but technical podcast about cybersecurity and the people who keep the internet safe. The podcast is built as a series of segments: we will be looking back at the last couple of weeks in cybersecurity news, talking to different people in the industry about areas of their expertise, we're going to break apart some of the TTPs being used by adversaries, and we will even cover a little bit of hacker history.

Language:

English

Contact:

6048025683


Episodes
Ask host to enable sharing for playback control

#178 - Intel Chat: ptcpdump, Target adopts TLSH, Clop, XLoader & HeartCrypt

12/20/2024
In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel. ptcpdump is an eBPF-based version of tcpdump that adds process information to each packet. It supports filtering by process ID, process name, container ID, and Kubernetes pod name. In a recent implementation, Target's cybersecurity team adopted TLSH (Trend Micro Locality Sensitive Hash) to improve their malware detection capabilities. Huntress recently issued a threat advisory regarding active exploitation of a zero-day vulnerability affecting Cleo's file transfer software, specifically impacting LexiCom, VLTrader, and Harmony versions up to 5.8.0.21. Sublime Security recently analyzed a phishing campaign that impersonates Microsoft SharePoint to deliver the XLoader malware. Palo Alto Networks' Unit 42 team has uncovered a new packer-as-a-service (PaaS) operation named HeartCrypt, which has been active since July 2023 and began sales in February 2024. HeartCrypt is designed to obfuscate malware, making detection by security solutions more challenging.

Duration:00:31:00

Ask host to enable sharing for playback control

#177 - Intel Chat: Supply-Chain Firewall, Scattered Spider, Linux malware & another NTLM exploit

12/12/2024
Slack channelpackages sourced from PyPI and npm repositoriestwo unnamed telecommunications firmsLinux distribution package repositoriesWindows 7 and Server 2008 R2 up to the latest Windows 11 v24H2 and Server 2022And you can subscribe to Detection Engineering Weekly here.

Duration:00:27:19

Ask host to enable sharing for playback control

#176 - The reality of modern browser threat with John Tuckner, Founder at Secure Annex

12/10/2024
On this episode of The Cybersecurity Defenders Podcast we explore the reality of modern browser threats with John Tuckner, Founder at Secure Annex. John, the founder of Secure Annex, an innovative platform focused on helping organizations manage and secure browser extensions. With over a decade of experience in cybersecurity and technical program management, they have held key leadership roles at companies like Tines, Cyderes, and Optiv. At Tines, they spearheaded multiple initiatives, including the creation of Tines Labs, the development of a natural language AI workflow tool, and the expansion of the Tines Library of automation workflows. John’s career also includes building customer success engineering teams, driving security automation research, and implementing cutting-edge network and security solutions. They bring a wealth of expertise in creating scalable frameworks, strategic tools, and impactful automation technologies.

Duration:00:31:48

Ask host to enable sharing for playback control

#175 - Intel Chat: Hydra dark web, DOC entity list, Venom Spider & flowbreaking,

12/6/2024
In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel. Russian courts have sentenced Stanislav Moiseyev, the leader of the Hydra dark web marketplace, to life imprisonment. The U.S. Commerce Department has expanded its export controls, adding nearly 140 Chinese technology companies to its "entity list." This action primarily targets firms involved in the production of computer chips, chipmaking tools, and related software, including Chinese-owned entities operating in Japan, South Korea, and Singapore. Researchers have uncovered new malware strains, RevC2 and Venom Loader, tied to the sophisticated threat actor known as Venom Spider. Recent analyses have identified a critical vulnerability in generative AI systems, termed "flowbreaking" exploits, which can lead to unintended data leaks.

Duration:00:28:56

Ask host to enable sharing for playback control

#174 - Predictions for the future of cybersecurity from 2024

12/4/2024
A special episode of The Cybersecurity Defenders Podcast, where we look back at our conversations throughout 2024, and bring together all of the predictions for the future of cybersecurity.

Duration:01:26:17

Ask host to enable sharing for playback control

#173 - Intel Chat: ClickFix, Raspberry Robin, Gelsemium, Fancy Bear & Salt Typhoon

11/28/2024
In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel. copying and pasting scripts into their systems.execution to obscure its true purposeincreasing security of Windows systems. “nearest neighbor attack” to exploit Wi-Fi networks remotely."the worst telecom hack in our nation's history."

Duration:00:43:18

Ask host to enable sharing for playback control

#172 - Cybercrime cottage industries with Reed McGinley-Stempel, the Co-Founder and CEO of Stytch

11/27/2024
On today's episode of The Cybersecurity Defenders Podcast we talk about cybercrime cottage industries with Reed McGinley-Stempel, the Co-Founder and CEO of Stytch Stytch is a platform designed to streamline authentication, authorization, and fraud prevention in a way that enhances security while minimizing user friction. Stytch serves both consumer and B2B applications, offering a variety of authentication solutions, including features like Google One-Tap and Biometrics for consumer-facing applications, as well as SSO, Role-Based Access Control, and SCIM integrations for enterprise SaaS. Reed founded Stytch after witnessing the challenges teams face when building secure and user-friendly authentication solutions, a problem he first encountered while working at Plaid. He is also a proud duke alumni and was the recipient of the prestigious Fullbright Scholarship

Duration:00:35:28

Ask host to enable sharing for playback control

#171 - Intel Chat: Snowflake, Scattered Spider, CCP, Melofee backdoor, SilkSpecter & Palo Alto Networks

11/23/2024
In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel. one of Snowflake's prominent clientstheft of confidential information and cryptocurrencyobjectives of the Chinese Communist Party (CCP)enhanced stealth and persistence mechanisms November's Black Friday seasonCVE-2024-0012 and CVE-2024-9474

Duration:00:43:29

Ask host to enable sharing for playback control

#170 - A novel path into cybersecurity with Jibby Saetang, Security Researcher with Microsoft GHOST

11/19/2024
On this episode of The Cybersecurity Defenders Podcast we speak with Jibby Saetang, Security Researcher with Microsoft GHOST, about his novel path to a career in cybersecurity. With over a decade of experience in watch and jewelry repair, Jibby developed an impressive eye for detail and a knack for solving complex problems. These skills translated seamlessly into the world of cybersecurity, where Jibby found an unexpected yet perfect fit. Driven by a passion for learning, Jibby dove into the KC7 platform, an immersive cybersecurity training resource, which ultimately led to a role at Microsoft—all without taking the traditional certification route. Jibby’s story is a testament to the power of persistence, passion, and non-traditional paths in tech. Now, Jibby is focused on helping others break into cybersecurity by developing new KC7 training modules, aiming to inspire and equip the next generation of problem-solvers.

Duration:00:29:14

Ask host to enable sharing for playback control

#169 - Intel Chat: Tools, N. Korean IT workers, GootLoader, FakeBat & Pacific Rim

11/15/2024
In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel. MFA is enabledMITRE ATT&CK Techniquesoften lack adequate protectioncompanies, often under disguised identitiesSEO poisoning tacticspopular app Notionacross South and Southeast Asia

Duration:00:37:42

Ask host to enable sharing for playback control

#168 - Intel Chat: Latrodectus, WarmCookie, FortiManager, EU's Product Liability Directive & Linus Torvalds

10/31/2024
In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel. evasive, sophisticated malwarelong-term presence in systemsactively exploited in the wildcircular economyopen-source community

Duration:00:35:24

Ask host to enable sharing for playback control

#167 - Running and MDR company with Joshua Sitta, Co-Founder and CTO at Sittadel

10/30/2024
On this episode of The Cybersecurity Defenders Podcast we talk about running and MDR company with Joshua Sitta, Co-Founder and CTO at Sittadel. My guest today is Joshua Sitta, the co-founder and CTO of Sittadel, a cybersecurity company specializing in 24/7/365 Managed Detection and Response services. With a focus on enterprise-grade EDR solutions, Sittadel provides comprehensive cybersecurity monitoring and incident response. Before founding Sittadel, Joshua served as the Director of Enterprise Security Architecture at SouthState Bank, where he built a robust in-house cybersecurity program that safeguarded billions in assets. He brings a deep expertise in protecting organizations from modern cyber threats.

Duration:00:37:11

Ask host to enable sharing for playback control

#166 - Intel Chat: Microsoft logs, USDoD, SolarWinds WHD, & CISA KEV

10/24/2024
In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel. several of its cloud serviceshigh-profile data breachescredentials that could be exploited by attackersactively used in cyberattacks

Duration:00:29:58

Ask host to enable sharing for playback control

#165 - How AI is revolutionizing compliance with Dr. Gaurav Banga, CEO of Balbix

10/23/2024
On this episode of The Cybersecurity Defenders Podcast we examine how AI is revolutionizing compliance with Dr. Gaurav Banga, CEO of Balbix. Gaurav Banga, the CEO and Founder of Balbix, an AI-powered cybersecurity risk management startup. Gaurav is an accomplished inventor with over 50 patents to his name, and he has a deep background in founding and leading multiple successful tech ventures. His journey into entrepreneurship is unique—it began over a decade ago when he was inspired by a book that eventually led him to leave academia and pursue his passion for deep tech. Gaurav regularly speaks with CISOs, gaining firsthand insights into their biggest challenges as they navigate an increasingly complex cybersecurity landscape. As regulatory scrutiny around security disclosures intensifies, Gaurav offers a unique perspective on how AI can reshape the future of risk management, helping organizations strike the right balance between innovation and security.

Duration:00:29:50

Ask host to enable sharing for playback control

#164 - Intel Chat: Wazuh, .io, AI, Discord, Palo Alto & GoldenJackal

10/21/2024
In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel. cryptomining payloadBritish Indian Ocean Territory, to Mauritiusmalware debugging, and influence operationsthe platformusernames, passwords, and API keysthe Middle East, and South Asia

Duration:00:40:36

Ask host to enable sharing for playback control

#163 - Practical applications of AI in cybersecurity with Rich Heimann, AI researcher & author

10/17/2024
On this episode of The Cybersecurity Defenders Podcast we speak with Rich Heimann, AI researcher and author. Rich is a visionary leader in artificial intelligence and business transformation. As a Chief Artificial Intelligence Officer, Rich has a proven track record of developing and deploying AI solutions that drive measurable impact across a range of industries. Known for his ability to blend technical expertise with strategic insight, he consistently helps organizations unlock the full potential of AI to achieve real business results. Rich is also committed to ethical AI practices and excels at building innovative, high-performing teams. He’s recently authored a new book titled Generative Artificial Intelligence Revealed.

Duration:00:46:19

Ask host to enable sharing for playback control

#162 - Intel Chat: FIN7, COLDRIVER, perfectly, Comcast & EKUwu

10/10/2024
In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel. spread malwarealso known as COLDRIVERsophisticated methodsFinancial Business and Consumer Solutions (FBCS)certificate templatesStats on business outcomes after breaches referenced by Matt.

Duration:00:29:45

Ask host to enable sharing for playback control

#161 - Intel Chat: MSSN CTRL, CRI summit, Shadow AI, More_Eggs, Andariel hacking group & DrayTek routers

10/8/2024
In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel. global threat of ransomwaresignificant risks for organizationsbackdoor since late 2023attacks against U.S. organizationssignificant security risks

Duration:00:40:19

Ask host to enable sharing for playback control

#160 - Cryptocurrency and its role in money laundering with BBC journalist and author Geoff White

10/3/2024
On this episode of The Cybersecurity Defenders Podcast, we dive into cryptocurrency and it’s role in money laundering with BBC journalist and author Geoff White. Geoff is an accomplished author, speaker, investigative journalist, and podcast creator with over 20 years of experience, focusing on organized crime and technology. He has worked with major outlets including the BBC, Audible, Penguin, Sky News, and The Sunday Times, covering topics such as financial crime, money laundering, cryptocurrency, and cybercrime. His recently released book, Rinsed, dives into how technology is transforming the money laundering industry, and was published by Penguin back in June of 2024. His previous book, The Lazarus Heist, followed the success of the hit BBC podcast series he co-hosted, which investigated North Korea’s cyber operations. He’s also the author of Crime Dot Com, which explores the global rise of hacking, and has created multiple podcast series for Audible, including The Dark Web and Artificial Intelligence: Friend or Foe? In addition to writing, he is a sought-after public speaker who has given keynote talks for brands like Microsoft, MasterCard, and HSBC. He has also won numerous awards for his reporting, including his work on the Snowden leaks and his investigations into internet fraud. Rinsed: From Cartels to Crypto How the Tech Industry Washes Money for the World's Deadliest Crooks

Duration:00:48:41

Ask host to enable sharing for playback control

#159 - Intel Chat: Sequoia disruption, Github, Supershell, DPRK & Telegram arrest

9/30/2024
In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel. and othersmalicious URLsCross Fork Object Reference (CFOR)brute-force attacksevade sanctionscriminal activities to proliferate on the platform

Duration:00:38:54