<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Symantec Cyber Security Brief Podcast</title><atom:link rel="self" type="application/rss+xml" href="https://sed-cms.broadcom.com/api/v1/rss/podcasts/2059f58b-bde9-49d7-a4b5-d5b322dbebf2"/><link>https://symantec-enterprise-podcasts.security.com/podcasts/symantec-cyber-security-brief-podcast</link><language>en-us</language><copyright>2026 © Broadcom</copyright><itunes:author>Security Response Team</itunes:author><itunes:summary>Our regular podcast series features threat research and security news, hosted by threat researchers from the Threat Hunter Team.</itunes:summary><description>Our regular podcast series features threat research and security news, hosted by threat researchers from the Threat Hunter Team.</description><itunes:type>episodic</itunes:type><itunes:owner><itunes:name>Admin</itunes:name><itunes:email>symantecentgsm@gmail.com</itunes:email></itunes:owner><itunes:image href="https://symantec-enterprise-podcasts.security.com/podcasts/sites/default/files/styles/podcast_homepage_square_3x/public/podcast-channel-art/Cyber_Security_Brief_SED_3000x3000.png"/><itunes:category text="News"><itunes:category text="Tech News"/></itunes:category><itunes:explicit>false</itunes:explicit><item><itunes:episodeType>full</itunes:episodeType><itunes:title>New Billbug campaign, Prestige ransomware, and multiple arrests of alleged cyber-crime gang members</itunes:title><title>New Billbug campaign, Prestige ransomware, and multiple arrests of alleged cyber-crime gang members</title><itunes:summary>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss the Symantec Threat Hunter Team’s latest blog detailing a recent campaign by the Billbug espionage group, in which it targeted a certificate authority and multiple government agencies in various countries in Asia. We also discuss a new strain of ransomware called Prestige, which is being used in attacks against Ukraine, while we also take a look some recent arrests of suspects that are alleged to have been involved in major cyber crime groups - with one suspect alleged to have been involved in the JabberZeus gang arrested in Switzerland, while an alleged member of the LockBit ransomware group was apprehended in Canada.  </itunes:summary><description>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss the Symantec Threat Hunter Team’s latest blog detailing a recent campaign by the Billbug espionage group, in which it targeted a certificate authority and multiple government agencies in various countries in Asia. We also discuss a new strain of ransomware called Prestige, which is being used in attacks against Ukraine, while we also take a look some recent arrests of suspects that are alleged to have been involved in major cyber crime groups - with one suspect alleged to have been involved in the JabberZeus gang arrested in Switzerland, while an alleged member of the LockBit ransomware group was apprehended in Canada.  </description><content:encoded>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss the Symantec Threat Hunter Team’s latest blog detailing a recent campaign by the Billbug espionage group, in which it targeted a certificate authority and multiple government agencies in various countries in Asia. We also discuss a new strain of ransomware called Prestige, which is being used in attacks against Ukraine, while we also take a look some recent arrests of suspects that are alleged to have been involved in major cyber crime groups - with one suspect alleged to have been involved in the JabberZeus gang arrested in Switzerland, while an alleged member of the LockBit ransomware group was apprehended in Canada.  </content:encoded><enclosure length="36940299" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S05E06_Billbug_Ukraine_Ransomware_Arrests.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S05E06_Billbug_Ukraine_Ransomware_Arrests.mp3</guid><pubDate>Thu, 17 Nov 2022 14:00:00 +0000</pubDate><itunes:duration>00:25:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>6</itunes:episode><itunes:season>5</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Exbyte exfiltration tool, Cranefly uses new tools and novel technique, and OpenSSL bug is downgraded</itunes:title><title>Exbyte exfiltration tool, Cranefly uses new tools and novel technique, and OpenSSL bug is downgraded</title><itunes:summary>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss two recent Symantec blogs, including one detailing the new Exbyte data exfiltration tool, which is being used by at least one affiliate of the BlackByte ransomware gang. We also discuss our blog about a group called Cranefly, which is using a new dropper and malware, as well as a novel method of reading commands from legitimate IIS logs. We also discuss the OpenSSL vulnerability that caused a lot of headlines over the last week, and the ransomware losses that occurred in 2021. </itunes:summary><description>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss two recent Symantec blogs, including one detailing the new Exbyte data exfiltration tool, which is being used by at least one affiliate of the BlackByte ransomware gang. We also discuss our blog about a group called Cranefly, which is using a new dropper and malware, as well as a novel method of reading commands from legitimate IIS logs. We also discuss the OpenSSL vulnerability that caused a lot of headlines over the last week, and the ransomware losses that occurred in 2021. </description><content:encoded>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss two recent Symantec blogs, including one detailing the new Exbyte data exfiltration tool, which is being used by at least one affiliate of the BlackByte ransomware gang. We also discuss our blog about a group called Cranefly, which is using a new dropper and malware, as well as a novel method of reading commands from legitimate IIS logs. We also discuss the OpenSSL vulnerability that caused a lot of headlines over the last week, and the ransomware losses that occurred in 2021. </content:encoded><enclosure length="29825342" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S05E05_Cranefly_Exbyte_OpenSSL_Ransomware.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S05E05_Cranefly_Exbyte_OpenSSL_Ransomware.mp3</guid><pubDate>Thu, 03 Nov 2022 13:30:00 +0000</pubDate><itunes:duration>00:20:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>5</itunes:episode><itunes:season>5</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Budworm espionage activity, Spyder Loader malware, and Ransom Cartel links to Sodinokibi</itunes:title><title>Budworm espionage activity, Spyder Loader malware, and Ransom Cartel links to Sodinokibi</title><itunes:summary>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien are joined by Symantec threat researcher Kevin Sovey to discuss a blog we recently published about the Budworm espionage group targeting organizations in the U.S. We also discuss another blog we published this week about the Spyder Loader malware being deployed on the machines of government agencies in Hong Kong. We also talk about apparent links between the operators behind Ransom Cartel and the REvil/Sodinokibi ransomware family.</itunes:summary><description>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien are joined by Symantec threat researcher Kevin Sovey to discuss a blog we recently published about the Budworm espionage group targeting organizations in the U.S. We also discuss another blog we published this week about the Spyder Loader malware being deployed on the machines of government agencies in Hong Kong. We also talk about apparent links between the operators behind Ransom Cartel and the REvil/Sodinokibi ransomware family.</description><content:encoded>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien are joined by Symantec threat researcher Kevin Sovey to discuss a blog we recently published about the Budworm espionage group targeting organizations in the U.S. We also discuss another blog we published this week about the Spyder Loader malware being deployed on the machines of government agencies in Hong Kong. We also talk about apparent links between the operators behind Ransom Cartel and the REvil/Sodinokibi ransomware family.</content:encoded><enclosure length="26281456" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S05E04_Budworm_Spyder_Loader_REvil.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S05E04_Budworm_Spyder_Loader_REvil.mp3</guid><pubDate>Thu, 20 Oct 2022 13:00:00 +0000</pubDate><itunes:duration>00:18:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>4</itunes:episode><itunes:season>5</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Witchetty espionage group activity, Microsoft Exchange Server zero days, and U.S. defense sector targeted by APT groups</itunes:title><title>Witchetty espionage group activity, Microsoft Exchange Server zero days, and U.S. defense sector targeted by APT groups</title><itunes:summary>On this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien discuss a recent blog we published on the Witchetty (aka LookingFrog) espionage group, which has been progressively updating its toolset, using new malware in attacks on targets in the Middle East and Africa, including a new tool that employs steganography. We also discuss the recently discovered Microsoft Exchange Server zero days, the U.S. defense sector being targeted by multiple APT groups, and a newly discovered espionage actor called Metador, which was spotted operating in recent weeks. We also discuss the breach of Australian telecoms giant Optus, and some new information that has emerged about the takedown of the REvil/Sodinokibi ransomware gang. </itunes:summary><description>On this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien discuss a recent blog we published on the Witchetty (aka LookingFrog) espionage group, which has been progressively updating its toolset, using new malware in attacks on targets in the Middle East and Africa, including a new tool that employs steganography. We also discuss the recently discovered Microsoft Exchange Server zero days, the U.S. defense sector being targeted by multiple APT groups, and a newly discovered espionage actor called Metador, which was spotted operating in recent weeks. We also discuss the breach of Australian telecoms giant Optus, and some new information that has emerged about the takedown of the REvil/Sodinokibi ransomware gang. </description><content:encoded>On this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien discuss a recent blog we published on the Witchetty (aka LookingFrog) espionage group, which has been progressively updating its toolset, using new malware in attacks on targets in the Middle East and Africa, including a new tool that employs steganography. We also discuss the recently discovered Microsoft Exchange Server zero days, the U.S. defense sector being targeted by multiple APT groups, and a newly discovered espionage actor called Metador, which was spotted operating in recent weeks. We also discuss the breach of Australian telecoms giant Optus, and some new information that has emerged about the takedown of the REvil/Sodinokibi ransomware gang. </content:encoded><enclosure length="40092539" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S05E03_Witchetty_Exchange_Zero_Days.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S05E03_Witchetty_Exchange_Zero_Days.mp3</guid><pubDate>Thu, 06 Oct 2022 13:00:00 +0000</pubDate><itunes:duration>00:27:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>3</itunes:episode><itunes:season>5</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Espionage activity targeting Asian governments, Webworm develops customized tools, and latest Noberus TTPs</itunes:title><title>Espionage activity targeting Asian governments, Webworm develops customized tools, and latest Noberus TTPs</title><itunes:summary>On this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien are joined by Symantec threat researcher Alan Neville to discuss some of the recent blogs that the Symantec Threat Hunter team has published. We discuss a new wave of espionage activity targeting Asian governments by attackers who were formerly associated with the ShadowPad malware but who appear to have now adopted a new toolset to mount an ongoing campaign against a range of government and state-owned organizations in a number of Asian countries. We also examine the current activities of a group we call Webworm, which has developed customized versions of three older remote access Trojans (RATs), including Trochilus, Gh0st RAT, and 9002 RAT. We also discuss a blog we have published about the Noberus (aka BlackCat ) ransomware, and the recent tactics, tools, and procedures we have seen deployed alongside that ransomware recently.</itunes:summary><description>On this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien are joined by Symantec threat researcher Alan Neville to discuss some of the recent blogs that the Symantec Threat Hunter team has published. We discuss a new wave of espionage activity targeting Asian governments by attackers who were formerly associated with the ShadowPad malware but who appear to have now adopted a new toolset to mount an ongoing campaign against a range of government and state-owned organizations in a number of Asian countries. We also examine the current activities of a group we call Webworm, which has developed customized versions of three older remote access Trojans (RATs), including Trochilus, Gh0st RAT, and 9002 RAT. We also discuss a blog we have published about the Noberus (aka BlackCat ) ransomware, and the recent tactics, tools, and procedures we have seen deployed alongside that ransomware recently.</description><content:encoded>On this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien are joined by Symantec threat researcher Alan Neville to discuss some of the recent blogs that the Symantec Threat Hunter team has published. We discuss a new wave of espionage activity targeting Asian governments by attackers who were formerly associated with the ShadowPad malware but who appear to have now adopted a new toolset to mount an ongoing campaign against a range of government and state-owned organizations in a number of Asian countries. We also examine the current activities of a group we call Webworm, which has developed customized versions of three older remote access Trojans (RATs), including Trochilus, Gh0st RAT, and 9002 RAT. We also discuss a blog we have published about the Noberus (aka BlackCat ) ransomware, and the recent tactics, tools, and procedures we have seen deployed alongside that ransomware recently.</content:encoded><enclosure length="36600720" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S05E02_Espionage_Webworm_Noberus_BlackCat.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S05E02_Espionage_Webworm_Noberus_BlackCat.mp3</guid><pubDate>Thu, 22 Sep 2022 13:00:00 +0000</pubDate><itunes:duration>00:25:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>2</itunes:episode><itunes:season>5</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Mobile app security, Russian invasion of Ukraine cyber impact continues, and Evil Corp switches focus</itunes:title><title>Mobile app security, Russian invasion of Ukraine cyber impact continues, and Evil Corp switches focus</title><itunes:summary>The Cyber Security Brief is back after its summer break! In this episode, Brigid O Gorman and Dick O’Brien cover some of the stories you might have missed while we were off air. Dick discusses a recent Symantec blog that looks at the implications of poor security practices in the mobile software supply chain, and how this can lead to the exposure of an alarming amount of data. Brigid discusses some of the continuing effects of the Russian invasion of Ukraine in the world of cyber security, including some activity by the Shuckworm APT gang aimed at Ukraine, as well as a seemingly increased focus by Chinese espionage actors on Russia since the invasion began. Finally, we also discuss some recent developments by the Evil Corp cyber crime gang, and what these might mean. </itunes:summary><description>The Cyber Security Brief is back after its summer break! In this episode, Brigid O Gorman and Dick O’Brien cover some of the stories you might have missed while we were off air. Dick discusses a recent Symantec blog that looks at the implications of poor security practices in the mobile software supply chain, and how this can lead to the exposure of an alarming amount of data. Brigid discusses some of the continuing effects of the Russian invasion of Ukraine in the world of cyber security, including some activity by the Shuckworm APT gang aimed at Ukraine, as well as a seemingly increased focus by Chinese espionage actors on Russia since the invasion began. Finally, we also discuss some recent developments by the Evil Corp cyber crime gang, and what these might mean. </description><content:encoded>The Cyber Security Brief is back after its summer break! In this episode, Brigid O Gorman and Dick O’Brien cover some of the stories you might have missed while we were off air. Dick discusses a recent Symantec blog that looks at the implications of poor security practices in the mobile software supply chain, and how this can lead to the exposure of an alarming amount of data. Brigid discusses some of the continuing effects of the Russian invasion of Ukraine in the world of cyber security, including some activity by the Shuckworm APT gang aimed at Ukraine, as well as a seemingly increased focus by Chinese espionage actors on Russia since the invasion began. Finally, we also discuss some recent developments by the Evil Corp cyber crime gang, and what these might mean. </content:encoded><enclosure length="44823081" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S05E01.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S05E01.mp3</guid><pubDate>Thu, 08 Sep 2022 11:28:24 +0000</pubDate><itunes:duration>00:31:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>1</itunes:episode><itunes:season>5</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Bumblebee loader analysis, Raccoon Stealer returns, and LockBit launches a new version</itunes:title><title>Bumblebee loader analysis, Raccoon Stealer returns, and LockBit launches a new version</title><itunes:summary>In this week’s Cyber Security Brief, Dick O’Brien and Brigid O Gorman are joined by Symantec threat researcher Chris Kiefer to discuss our latest blog about the Bumblebee loader. We discuss this new malware’s place on the cyber crime landscape, its capabilities, and how it is being leveraged by ransomware actors. We also discuss the appearance of new versions of both Raccoon Stealer and LockBit, as well as an FBI warning about deepfakes being used in job interviews. The podcast will be taking a short break for the summer and we will be back with new episodes in September. </itunes:summary><description>In this week’s Cyber Security Brief, Dick O’Brien and Brigid O Gorman are joined by Symantec threat researcher Chris Kiefer to discuss our latest blog about the Bumblebee loader. We discuss this new malware’s place on the cyber crime landscape, its capabilities, and how it is being leveraged by ransomware actors. We also discuss the appearance of new versions of both Raccoon Stealer and LockBit, as well as an FBI warning about deepfakes being used in job interviews. The podcast will be taking a short break for the summer and we will be back with new episodes in September. </description><content:encoded>In this week’s Cyber Security Brief, Dick O’Brien and Brigid O Gorman are joined by Symantec threat researcher Chris Kiefer to discuss our latest blog about the Bumblebee loader. We discuss this new malware’s place on the cyber crime landscape, its capabilities, and how it is being leveraged by ransomware actors. We also discuss the appearance of new versions of both Raccoon Stealer and LockBit, as well as an FBI warning about deepfakes being used in job interviews. The podcast will be taking a short break for the summer and we will be back with new episodes in September. </content:encoded><enclosure length="33560085" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E20_Bumblebee_Raccoon_Stealer_Lockbit.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E20_Bumblebee_Raccoon_Stealer_Lockbit.mp3</guid><pubDate>Thu, 30 Jun 2022 15:19:31 +0000</pubDate><itunes:duration>00:23:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>20</itunes:episode><itunes:season>4</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>BlackCat ransomware, Follina vuln used by Russian actors, and a new version of Metasploit</itunes:title><title>BlackCat ransomware, Follina vuln used by Russian actors, and a new version of Metasploit</title><itunes:summary>In this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss how Russian espionage actors are exploiting the Follina vulnerability, the release of the latest version of Metasploit, and a new phishing campaign that’s been underway on Facebook. We also discuss ransomware extensively, including what authorities were able to find when they took down the Netwalker ransomware gang, the increasing activity of the BlackCat ransomware, and some new research into the Hello XD ransomware. We also speculate about the impact turmoil on the cryptocurrency markets may have on the types of payment ransomware actors might demand. </itunes:summary><description>In this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss how Russian espionage actors are exploiting the Follina vulnerability, the release of the latest version of Metasploit, and a new phishing campaign that’s been underway on Facebook. We also discuss ransomware extensively, including what authorities were able to find when they took down the Netwalker ransomware gang, the increasing activity of the BlackCat ransomware, and some new research into the Hello XD ransomware. We also speculate about the impact turmoil on the cryptocurrency markets may have on the types of payment ransomware actors might demand. </description><content:encoded>In this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss how Russian espionage actors are exploiting the Follina vulnerability, the release of the latest version of Metasploit, and a new phishing campaign that’s been underway on Facebook. We also discuss ransomware extensively, including what authorities were able to find when they took down the Netwalker ransomware gang, the increasing activity of the BlackCat ransomware, and some new research into the Hello XD ransomware. We also speculate about the impact turmoil on the cryptocurrency markets may have on the types of payment ransomware actors might demand. </content:encoded><enclosure length="40571911" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E19_Ransomware_Follina_BlackCat.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E19_Ransomware_Follina_BlackCat.mp3</guid><pubDate>Thu, 16 Jun 2022 13:00:00 +0000</pubDate><itunes:duration>00:28:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>19</itunes:episode><itunes:season>4</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>The Follina Microsoft Office vulnerability, Conti break-up, and more ransomware activity</itunes:title><title>The Follina Microsoft Office vulnerability, Conti break-up, and more ransomware activity</title><itunes:summary>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss the recently discovered Follina vulnerability in Microsoft Office, as well as some recent ransomware stories. One thing we talk about is the apparent break up of the Conti ransomware gang, with evidence pointing to the group folding itself into other ransomware gangs, including Hive, which carried out a recent attack on the health service in Costa Rica. The Clop and REvil names have also appeared in news reports in recent weeks, but are these ransomware gangs really back? And what are the signs of pre-ransomware activity that organizations need to look out for on their networks because they may indicate a ransomware attack in preparation? </itunes:summary><description>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss the recently discovered Follina vulnerability in Microsoft Office, as well as some recent ransomware stories. One thing we talk about is the apparent break up of the Conti ransomware gang, with evidence pointing to the group folding itself into other ransomware gangs, including Hive, which carried out a recent attack on the health service in Costa Rica. The Clop and REvil names have also appeared in news reports in recent weeks, but are these ransomware gangs really back? And what are the signs of pre-ransomware activity that organizations need to look out for on their networks because they may indicate a ransomware attack in preparation? </description><content:encoded>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss the recently discovered Follina vulnerability in Microsoft Office, as well as some recent ransomware stories. One thing we talk about is the apparent break up of the Conti ransomware gang, with evidence pointing to the group folding itself into other ransomware gangs, including Hive, which carried out a recent attack on the health service in Costa Rica. The Clop and REvil names have also appeared in news reports in recent weeks, but are these ransomware gangs really back? And what are the signs of pre-ransomware activity that organizations need to look out for on their networks because they may indicate a ransomware attack in preparation? </content:encoded><enclosure length="37696067" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E18_Follina_Conti_Ransomware.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E18_Follina_Conti_Ransomware.mp3</guid><pubDate>Thu, 02 Jun 2022 13:00:00 +0000</pubDate><itunes:duration>00:26:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>18</itunes:episode><itunes:season>4</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Chinese cyber-espionage activity, Conti gang threatens Costa Rica government, and U.S. warns about North Korean citizens seeking jobs in IT</itunes:title><title>Chinese cyber-espionage activity, Conti gang threatens Costa Rica government, and U.S. warns about North Korean citizens seeking jobs in IT</title><itunes:summary>In this week’s Cyber Security Brief, Dick O’Brien and Brigid O Gorman discuss the recent in-depth whitepaper the Symantec Threat Hunter team produced about Chinese cyber-espionage activity, which details the most active groups operating out of that country at the moment, as well as the tactics, tools, and procedures they leverage, the custom malware they use, and who their victims tend to be. We also talk about recent warnings from U.S. authorities about North Korean nationals posing as citizens of other countries to gain employment, and threats from the Conti ransomware gang to “overthrow” the government of Costa Rica. </itunes:summary><description>In this week’s Cyber Security Brief, Dick O’Brien and Brigid O Gorman discuss the recent in-depth whitepaper the Symantec Threat Hunter team produced about Chinese cyber-espionage activity, which details the most active groups operating out of that country at the moment, as well as the tactics, tools, and procedures they leverage, the custom malware they use, and who their victims tend to be. We also talk about recent warnings from U.S. authorities about North Korean nationals posing as citizens of other countries to gain employment, and threats from the Conti ransomware gang to “overthrow” the government of Costa Rica. </description><content:encoded>In this week’s Cyber Security Brief, Dick O’Brien and Brigid O Gorman discuss the recent in-depth whitepaper the Symantec Threat Hunter team produced about Chinese cyber-espionage activity, which details the most active groups operating out of that country at the moment, as well as the tactics, tools, and procedures they leverage, the custom malware they use, and who their victims tend to be. We also talk about recent warnings from U.S. authorities about North Korean nationals posing as citizens of other countries to gain employment, and threats from the Conti ransomware gang to “overthrow” the government of Costa Rica. </content:encoded><enclosure length="37111243" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E17_China_Cyber_Espionage_North_Korea_Conti_Ransomware.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E17_China_Cyber_Espionage_North_Korea_Conti_Ransomware.mp3</guid><pubDate>Thu, 19 May 2022 13:00:00 +0000</pubDate><itunes:duration>00:25:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>17</itunes:episode><itunes:season>4</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>North Korea’s Stonefly, commodity malware, and the potential return of the REvil ransomware</itunes:title><title>North Korea’s Stonefly, commodity malware, and the potential return of the REvil ransomware</title><itunes:summary>In the latest Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss some of the recent research published by Symantec’s Threat Hunter Team, including our blog about the activity of North Korean APT group Stonefly, and our latest whitepaper on the topic of Commodity Malware. We also talk about some stories that were in the news over the last week or so, including the possible return of the REvil/Sodinokibi ransomware gang, a new loader called Bumblebee that might be a successor to BazarLoader, and a China-on-Russia intelligence-gathering attack. </itunes:summary><description>In the latest Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss some of the recent research published by Symantec’s Threat Hunter Team, including our blog about the activity of North Korean APT group Stonefly, and our latest whitepaper on the topic of Commodity Malware. We also talk about some stories that were in the news over the last week or so, including the possible return of the REvil/Sodinokibi ransomware gang, a new loader called Bumblebee that might be a successor to BazarLoader, and a China-on-Russia intelligence-gathering attack. </description><content:encoded>In the latest Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss some of the recent research published by Symantec’s Threat Hunter Team, including our blog about the activity of North Korean APT group Stonefly, and our latest whitepaper on the topic of Commodity Malware. We also talk about some stories that were in the news over the last week or so, including the possible return of the REvil/Sodinokibi ransomware gang, a new loader called Bumblebee that might be a successor to BazarLoader, and a China-on-Russia intelligence-gathering attack. </content:encoded><enclosure length="46043619" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E16_Stonefly_REvil_Cobalt_Strike.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E16_Stonefly_REvil_Cobalt_Strike.mp3</guid><pubDate>Thu, 05 May 2022 13:00:00 +0000</pubDate><itunes:duration>00:31:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>16</itunes:episode><itunes:season>4</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Shuckworm targets Ukraine, Lazarus Dream Job campaign continues, and two dark marketplaces get taken down</itunes:title><title>Shuckworm targets Ukraine, Lazarus Dream Job campaign continues, and two dark marketplaces get taken down</title><itunes:summary>On this week’s Cyber Security Brief, Brigid O Gorman is joined by Symantec threat researchers John-Paul Power and Alan Neville. In this week’s podcast we discuss some recent research published by Symantec detailing new activity in the Dream Job campaign carried out by the North Korean Lazarus APT group, as well as continuing attacks aimed at Ukraine carried out by the Russia-linked APT group Shuckworm. Also,  we talk about a critical vulnerability in the Windows Remote Procedure Call Runtime (RPC) protocol, the shut down of two well-known dark marketplaces, and the emergence of a new marketplace offering stolen data for sale.</itunes:summary><description>On this week’s Cyber Security Brief, Brigid O Gorman is joined by Symantec threat researchers John-Paul Power and Alan Neville. In this week’s podcast we discuss some recent research published by Symantec detailing new activity in the Dream Job campaign carried out by the North Korean Lazarus APT group, as well as continuing attacks aimed at Ukraine carried out by the Russia-linked APT group Shuckworm. Also,  we talk about a critical vulnerability in the Windows Remote Procedure Call Runtime (RPC) protocol, the shut down of two well-known dark marketplaces, and the emergence of a new marketplace offering stolen data for sale.</description><content:encoded>On this week’s Cyber Security Brief, Brigid O Gorman is joined by Symantec threat researchers John-Paul Power and Alan Neville. In this week’s podcast we discuss some recent research published by Symantec detailing new activity in the Dream Job campaign carried out by the North Korean Lazarus APT group, as well as continuing attacks aimed at Ukraine carried out by the Russia-linked APT group Shuckworm. Also,  we talk about a critical vulnerability in the Windows Remote Procedure Call Runtime (RPC) protocol, the shut down of two well-known dark marketplaces, and the emergence of a new marketplace offering stolen data for sale.</content:encoded><enclosure length="39913359" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E15_Shuckworm_Lazarus_Dreamjob_Takedowns.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E15_Shuckworm_Lazarus_Dreamjob_Takedowns.mp3</guid><pubDate>Thu, 21 Apr 2022 13:00:00 +0000</pubDate><itunes:duration>00:27:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>15</itunes:episode><itunes:season>4</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Spring4Shell, Cicada campaign, new Verblecon malware, and Ukraine invasion cyber activity update</itunes:title><title>Spring4Shell, Cicada campaign, new Verblecon malware, and Ukraine invasion cyber activity update</title><itunes:summary>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss some of the research published by Symantec’s Threat Hunter team over the past couple of weeks, including a new Cicada/APT10 espionage campaign targeting government organizations and NGOs in multiple countries worldwide. We discuss the new Verblecon malware, which is being deployed in sophisticated campaigns that appear to have the relatively low-reward goal of cryptocurrency mining as their main objective. We also talk about the Spring4Shell vulnerability that briefly caused a lot of consternation last week, and give an update about the latest information that has emerged about the cyber activity that has been seen targeting organizations in Ukraine.   </itunes:summary><description>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss some of the research published by Symantec’s Threat Hunter team over the past couple of weeks, including a new Cicada/APT10 espionage campaign targeting government organizations and NGOs in multiple countries worldwide. We discuss the new Verblecon malware, which is being deployed in sophisticated campaigns that appear to have the relatively low-reward goal of cryptocurrency mining as their main objective. We also talk about the Spring4Shell vulnerability that briefly caused a lot of consternation last week, and give an update about the latest information that has emerged about the cyber activity that has been seen targeting organizations in Ukraine.   </description><content:encoded>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss some of the research published by Symantec’s Threat Hunter team over the past couple of weeks, including a new Cicada/APT10 espionage campaign targeting government organizations and NGOs in multiple countries worldwide. We discuss the new Verblecon malware, which is being deployed in sophisticated campaigns that appear to have the relatively low-reward goal of cryptocurrency mining as their main objective. We also talk about the Spring4Shell vulnerability that briefly caused a lot of consternation last week, and give an update about the latest information that has emerged about the cyber activity that has been seen targeting organizations in Ukraine.   </content:encoded><enclosure length="34053999" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E14-Spring4Shell-Cicada-Verblecon-Ukraine.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E14-Spring4Shell-Cicada-Verblecon-Ukraine.mp3</guid><pubDate>Thu, 07 Apr 2022 13:00:00 +0000</pubDate><itunes:duration>00:23:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>14</itunes:episode><itunes:season>4</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>What you need to know about hacking group Lapsus$, cyber impacts of Ukraine invasion, and BazarBackdoor deploys new tactics</itunes:title><title>What you need to know about hacking group Lapsus$, cyber impacts of Ukraine invasion, and BazarBackdoor deploys new tactics</title><itunes:summary>In this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien talk about extortion hacking group Lapsus$, which has made headlines in recent weeks by claiming to have compromised numerous high-profile companies including Microsoft, Okta, and Nvidia. We tell you what we know so far about this controversial new actor. We also discuss the impact the Russian invasion of Ukraine has had in the world of cyber security, from Russia potentially running out of data storage facilities due to international cloud providers pulling out of the country, to warnings about attacks on critical infrastructure being issued by authorities in the U.S. and the UK. Finally, the BazarBackdoor malware is seen deploying some new tactics.</itunes:summary><description>In this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien talk about extortion hacking group Lapsus$, which has made headlines in recent weeks by claiming to have compromised numerous high-profile companies including Microsoft, Okta, and Nvidia. We tell you what we know so far about this controversial new actor. We also discuss the impact the Russian invasion of Ukraine has had in the world of cyber security, from Russia potentially running out of data storage facilities due to international cloud providers pulling out of the country, to warnings about attacks on critical infrastructure being issued by authorities in the U.S. and the UK. Finally, the BazarBackdoor malware is seen deploying some new tactics.</description><content:encoded>In this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien talk about extortion hacking group Lapsus$, which has made headlines in recent weeks by claiming to have compromised numerous high-profile companies including Microsoft, Okta, and Nvidia. We tell you what we know so far about this controversial new actor. We also discuss the impact the Russian invasion of Ukraine has had in the world of cyber security, from Russia potentially running out of data storage facilities due to international cloud providers pulling out of the country, to warnings about attacks on critical infrastructure being issued by authorities in the U.S. and the UK. Finally, the BazarBackdoor malware is seen deploying some new tactics.</content:encoded><enclosure length="44506431" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E13_Lapsus_Ukraine_Critical_Infrastructure.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E13_Lapsus_Ukraine_Critical_Infrastructure.mp3</guid><pubDate>Thu, 24 Mar 2022 14:00:00 +0000</pubDate><itunes:duration>00:30:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>13</itunes:episode><itunes:season>4</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Daxin special: How this advanced malware was discovered</itunes:title><title>Daxin special: How this advanced malware was discovered</title><itunes:summary>In this special edition of the podcast, Dick O’Brien is joined by Symantec threat researchers and analysts Piotr Krysiuk and Vikram Thakur to discuss the Symantec Threat Hunter team’s discovery of Daxin, which is the most advanced piece of malware we have seen from China-linked actors. We published a blog about the discovery of Daxin last week, as well as two in-depth technical blogs with more information on the tool this week. Piotr discusses his work analyzing the malware, and when he realized the significance of this discovery, while Vikram talks about liaising with customers impacted by the malware as well as working with the Cyber Security and Infrastructure Security Agency (CISA) to engage with multiple foreign governments targeted with Daxin to assist with detection and remediation.</itunes:summary><description>In this special edition of the podcast, Dick O’Brien is joined by Symantec threat researchers and analysts Piotr Krysiuk and Vikram Thakur to discuss the Symantec Threat Hunter team’s discovery of Daxin, which is the most advanced piece of malware we have seen from China-linked actors. We published a blog about the discovery of Daxin last week, as well as two in-depth technical blogs with more information on the tool this week. Piotr discusses his work analyzing the malware, and when he realized the significance of this discovery, while Vikram talks about liaising with customers impacted by the malware as well as working with the Cyber Security and Infrastructure Security Agency (CISA) to engage with multiple foreign governments targeted with Daxin to assist with detection and remediation.</description><content:encoded>In this special edition of the podcast, Dick O’Brien is joined by Symantec threat researchers and analysts Piotr Krysiuk and Vikram Thakur to discuss the Symantec Threat Hunter team’s discovery of Daxin, which is the most advanced piece of malware we have seen from China-linked actors. We published a blog about the discovery of Daxin last week, as well as two in-depth technical blogs with more information on the tool this week. Piotr discusses his work analyzing the malware, and when he realized the significance of this discovery, while Vikram talks about liaising with customers impacted by the malware as well as working with the Cyber Security and Infrastructure Security Agency (CISA) to engage with multiple foreign governments targeted with Daxin to assist with detection and remediation.</content:encoded><enclosure length="43562273" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E12_Daxin.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E12_Daxin.mp3</guid><pubDate>Thu, 10 Mar 2022 14:00:00 +0000</pubDate><itunes:duration>00:30:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>12</itunes:episode><itunes:season>4</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Hive and BlackByte ransomware, the money made by cyber criminals, and BEC scammers’ new tactics</itunes:title><title>Hive and BlackByte ransomware, the money made by cyber criminals, and BEC scammers’ new tactics</title><itunes:summary>In this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien discuss some of the activity we saw in Ukraine prior to the escalation of the last couple of days. We also heavily cover ransomware in this podcast, including discussing a recent FBI alert about the BlackByte ransomware, and a possible decryptor for the Hive ransomware, as well as some research into how long ransomware gangs are remaining active for these days and the amount of money they are making. Finally, we also discuss how BEC scammers are leveraging virtual meeting platforms in their attacks.</itunes:summary><description>In this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien discuss some of the activity we saw in Ukraine prior to the escalation of the last couple of days. We also heavily cover ransomware in this podcast, including discussing a recent FBI alert about the BlackByte ransomware, and a possible decryptor for the Hive ransomware, as well as some research into how long ransomware gangs are remaining active for these days and the amount of money they are making. Finally, we also discuss how BEC scammers are leveraging virtual meeting platforms in their attacks.</description><content:encoded>In this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien discuss some of the activity we saw in Ukraine prior to the escalation of the last couple of days. We also heavily cover ransomware in this podcast, including discussing a recent FBI alert about the BlackByte ransomware, and a possible decryptor for the Hive ransomware, as well as some research into how long ransomware gangs are remaining active for these days and the amount of money they are making. Finally, we also discuss how BEC scammers are leveraging virtual meeting platforms in their attacks.</content:encoded><enclosure length="33943157" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E11_Ukraine_ransomware_BEC_scams.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E11_Ukraine_ransomware_BEC_scams.mp3</guid><pubDate>Thu, 24 Feb 2022 14:20:07 +0000</pubDate><itunes:duration>00:23:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>11</itunes:episode><itunes:season>4</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>FBI seizes $3.6 billion in cryptocurrency, cyber attacks against Ukraine continue, and financial organizations in Taiwan targeted</itunes:title><title>FBI seizes $3.6 billion in cryptocurrency, cyber attacks against Ukraine continue, and financial organizations in Taiwan targeted</title><itunes:summary>In this week’s Cyber Security Brief podcast, Dick O’Brien and Alan Neville discuss how Chinese state-backed advanced persistent threat (APT) group Antlion targeted financial institutions in Taiwan in a persistent campaign over the course of at least 18 months. Also up for discussion is the recent arrest of a New York couple and the seizure of $3.6 billion in cryptocurrency allegedly linked to the 2016 Bitfinex hack, as well as continuing attacks carried out by the Russia-linked Shuckworm APT group against targets in Ukraine.</itunes:summary><description>In this week’s Cyber Security Brief podcast, Dick O’Brien and Alan Neville discuss how Chinese state-backed advanced persistent threat (APT) group Antlion targeted financial institutions in Taiwan in a persistent campaign over the course of at least 18 months. Also up for discussion is the recent arrest of a New York couple and the seizure of $3.6 billion in cryptocurrency allegedly linked to the 2016 Bitfinex hack, as well as continuing attacks carried out by the Russia-linked Shuckworm APT group against targets in Ukraine.</description><content:encoded>In this week’s Cyber Security Brief podcast, Dick O’Brien and Alan Neville discuss how Chinese state-backed advanced persistent threat (APT) group Antlion targeted financial institutions in Taiwan in a persistent campaign over the course of at least 18 months. Also up for discussion is the recent arrest of a New York couple and the seizure of $3.6 billion in cryptocurrency allegedly linked to the 2016 Bitfinex hack, as well as continuing attacks carried out by the Russia-linked Shuckworm APT group against targets in Ukraine.</content:encoded><enclosure length="28020721" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E10.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E10.mp3</guid><pubDate>Thu, 10 Feb 2022 14:00:00 +0000</pubDate><itunes:duration>00:19:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>10</itunes:episode><itunes:season>4</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Ukraine cyber attacks, law enforcement activity, and a Noberus ransomware attack</itunes:title><title>Ukraine cyber attacks, law enforcement activity, and a Noberus ransomware attack</title><itunes:summary>In this week’s Cyber Security Brief podcast, Dick O’Brien and Brigid O Gorman discuss the tumultuous situation in Ukraine, where cyber attacks, including destructive cyber attacks, have been aimed at government and private sector organizations. The WhisperGate attacks, as they have been dubbed, have been compared by many to the infamous 2017 NotPetya wiper attacks. Also up for discussion is recent law enforcement activity aimed at cyber criminals in Russia and elsewhere, and some ransomware news, including a Noberus ransomware attack, and the FBI officially linking the Diavol ransomware to the creators of Trickbot and Conti.</itunes:summary><description>In this week’s Cyber Security Brief podcast, Dick O’Brien and Brigid O Gorman discuss the tumultuous situation in Ukraine, where cyber attacks, including destructive cyber attacks, have been aimed at government and private sector organizations. The WhisperGate attacks, as they have been dubbed, have been compared by many to the infamous 2017 NotPetya wiper attacks. Also up for discussion is recent law enforcement activity aimed at cyber criminals in Russia and elsewhere, and some ransomware news, including a Noberus ransomware attack, and the FBI officially linking the Diavol ransomware to the creators of Trickbot and Conti.</description><content:encoded>In this week’s Cyber Security Brief podcast, Dick O’Brien and Brigid O Gorman discuss the tumultuous situation in Ukraine, where cyber attacks, including destructive cyber attacks, have been aimed at government and private sector organizations. The WhisperGate attacks, as they have been dubbed, have been compared by many to the infamous 2017 NotPetya wiper attacks. Also up for discussion is recent law enforcement activity aimed at cyber criminals in Russia and elsewhere, and some ransomware news, including a Noberus ransomware attack, and the FBI officially linking the Diavol ransomware to the creators of Trickbot and Conti.</content:encoded><enclosure length="39458993" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E09_Ukraine_Whispergate_ransomware.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E09_Ukraine_Whispergate_ransomware.mp3</guid><pubDate>Thu, 27 Jan 2022 14:00:00 +0000</pubDate><itunes:duration>00:27:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>9</itunes:episode><itunes:season>4</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>BadUSB attacks, a new backdoor, and how one APT group managed to infect itself with malware</itunes:title><title>BadUSB attacks, a new backdoor, and how one APT group managed to infect itself with malware</title><itunes:summary>Welcome to the first Cyber Security Brief of 2022! In this week’s podcast, Dick O’Brien and Brigid O Gorman chat about some of the biggest news stories of the last couple of weeks. The topics up for discussion in this episode include: FIN7 BadUSB attacks return, an interesting new multi-platform backdoor, and the latest way attackers are attempting to abuse Google Docs. Also, a jump in the number of extortion DDoS attacks, how payments to suspicious cryptocurrency wallets have exploded in recent months, corruption of open source libraries as a form of protest, and how one APT group managed to infect itself with its own malware. </itunes:summary><description>Welcome to the first Cyber Security Brief of 2022! In this week’s podcast, Dick O’Brien and Brigid O Gorman chat about some of the biggest news stories of the last couple of weeks. The topics up for discussion in this episode include: FIN7 BadUSB attacks return, an interesting new multi-platform backdoor, and the latest way attackers are attempting to abuse Google Docs. Also, a jump in the number of extortion DDoS attacks, how payments to suspicious cryptocurrency wallets have exploded in recent months, corruption of open source libraries as a form of protest, and how one APT group managed to infect itself with its own malware. </description><content:encoded>Welcome to the first Cyber Security Brief of 2022! In this week’s podcast, Dick O’Brien and Brigid O Gorman chat about some of the biggest news stories of the last couple of weeks. The topics up for discussion in this episode include: FIN7 BadUSB attacks return, an interesting new multi-platform backdoor, and the latest way attackers are attempting to abuse Google Docs. Also, a jump in the number of extortion DDoS attacks, how payments to suspicious cryptocurrency wallets have exploded in recent months, corruption of open source libraries as a form of protest, and how one APT group managed to infect itself with its own malware. </content:encoded><enclosure length="31643233" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E08.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E08.mp3</guid><pubDate>Thu, 13 Jan 2022 14:00:00 +0000</pubDate><itunes:duration>00:21:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>8</itunes:episode><itunes:season>4</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Log4j vulnerabilities, likely Iran-backed attacks on telecoms companies, and new Rust-based Noberus ransomware</itunes:title><title>Log4j vulnerabilities, likely Iran-backed attacks on telecoms companies, and new Rust-based Noberus ransomware</title><itunes:summary>On this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien are joined by Symantec Threat Analyst Alan Neville to discuss the vulnerabilities in Apache Log4j that made lots of headlines this week. We also discuss two other blogs that Symantec published this week, including one looking at an attack campaign aimed at telecoms companies in the Middle East and Asia that appears likely to have originated from Iran-based attackers. Meanwhile, we also talk about a blog we published covering details about a new Rust-based malware we have dubbed Noberus (ALPHV/BlackCat). This is our last Cyber Security Brief podcast of 2021, we will be back on January 13. </itunes:summary><description>On this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien are joined by Symantec Threat Analyst Alan Neville to discuss the vulnerabilities in Apache Log4j that made lots of headlines this week. We also discuss two other blogs that Symantec published this week, including one looking at an attack campaign aimed at telecoms companies in the Middle East and Asia that appears likely to have originated from Iran-based attackers. Meanwhile, we also talk about a blog we published covering details about a new Rust-based malware we have dubbed Noberus (ALPHV/BlackCat). This is our last Cyber Security Brief podcast of 2021, we will be back on January 13. </description><content:encoded>On this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien are joined by Symantec Threat Analyst Alan Neville to discuss the vulnerabilities in Apache Log4j that made lots of headlines this week. We also discuss two other blogs that Symantec published this week, including one looking at an attack campaign aimed at telecoms companies in the Middle East and Asia that appears likely to have originated from Iran-based attackers. Meanwhile, we also talk about a blog we published covering details about a new Rust-based malware we have dubbed Noberus (ALPHV/BlackCat). This is our last Cyber Security Brief podcast of 2021, we will be back on January 13. </content:encoded><enclosure length="40750131" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E07_log4j_noberus_blackcat_telecoms_attacks.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E07_log4j_noberus_blackcat_telecoms_attacks.mp3</guid><pubDate>Thu, 16 Dec 2021 14:00:00 +0000</pubDate><itunes:duration>00:28:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>7</itunes:episode><itunes:season>4</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Yanluowang ransomware update, possible Conti link to Emotet, and the importance of strong passwords </itunes:title><title>Yanluowang ransomware update, possible Conti link to Emotet, and the importance of strong passwords </title><itunes:summary>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss the latest Symantec blog, some updated research about the Yanluowang ransomware gang, with fresh activity appearing to show that this ransomware isn’t a flash-in-the-pan. We also discuss how quickly exposed cloud services are compromised by malicious actors, how off-putting strong passwords are for attackers employing brute-forcing techniques, and apparent attempts by Russian hackers to collaborate with Chinese-speaking actors. Also, the Conti gang’s possible role in the return of Emotet, and North Korean actors continue to target security researchers with fake job offers.</itunes:summary><description>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss the latest Symantec blog, some updated research about the Yanluowang ransomware gang, with fresh activity appearing to show that this ransomware isn’t a flash-in-the-pan. We also discuss how quickly exposed cloud services are compromised by malicious actors, how off-putting strong passwords are for attackers employing brute-forcing techniques, and apparent attempts by Russian hackers to collaborate with Chinese-speaking actors. Also, the Conti gang’s possible role in the return of Emotet, and North Korean actors continue to target security researchers with fake job offers.</description><content:encoded>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss the latest Symantec blog, some updated research about the Yanluowang ransomware gang, with fresh activity appearing to show that this ransomware isn’t a flash-in-the-pan. We also discuss how quickly exposed cloud services are compromised by malicious actors, how off-putting strong passwords are for attackers employing brute-forcing techniques, and apparent attempts by Russian hackers to collaborate with Chinese-speaking actors. Also, the Conti gang’s possible role in the return of Emotet, and North Korean actors continue to target security researchers with fake job offers.</content:encoded><enclosure length="33153304" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E06_Yanluowang_Conti_Ransomware_Passwords.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E06_Yanluowang_Conti_Ransomware_Passwords.mp3</guid><pubDate>Thu, 02 Dec 2021 14:00:00 +0000</pubDate><itunes:duration>00:23:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>6</itunes:episode><itunes:season>4</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Attacks on critical infrastructure, ransomware arrests, and the return of Emotet?</itunes:title><title>Attacks on critical infrastructure, ransomware arrests, and the return of Emotet?</title><itunes:summary>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss some recent attack campaigns aimed at critical infrastructure organizations in several countries around the world, the possible return of the Emotet botnet, and some law enforcement activity that has led to the arrest of people involved with both the REvil and Gandcrab ransomware. We also discuss some new techniques being used by the BazarLoader gang, and an FBI system being compromised and used to send out fake information security alerts. </itunes:summary><description>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss some recent attack campaigns aimed at critical infrastructure organizations in several countries around the world, the possible return of the Emotet botnet, and some law enforcement activity that has led to the arrest of people involved with both the REvil and Gandcrab ransomware. We also discuss some new techniques being used by the BazarLoader gang, and an FBI system being compromised and used to send out fake information security alerts. </description><content:encoded>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss some recent attack campaigns aimed at critical infrastructure organizations in several countries around the world, the possible return of the Emotet botnet, and some law enforcement activity that has led to the arrest of people involved with both the REvil and Gandcrab ransomware. We also discuss some new techniques being used by the BazarLoader gang, and an FBI system being compromised and used to send out fake information security alerts. </content:encoded><enclosure length="31809899" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E05_Emotet_Ransomware_Critical_Infrastructure.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E05_Emotet_Ransomware_Critical_Infrastructure.mp3</guid><pubDate>Thu, 18 Nov 2021 14:00:00 +0000</pubDate><itunes:duration>00:22:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>5</itunes:episode><itunes:season>4</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>BlackMatter updates, lots of law enforcement activity, and new SquirrelWaffle malware is one to watch</itunes:title><title>BlackMatter updates, lots of law enforcement activity, and new SquirrelWaffle malware is one to watch</title><itunes:summary>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss some of our recent blogs, including at least one BlackMatter ransomware affiliate using a new data exfiltration tool in attacks, and also the breaking news that the BlackMatter ransomware operation is apparently winding down. We also discuss another recent blog we published about banking Trojan activity in Latin America, while recent law enforcement activity cracking down on ransomware criminals is also up for discussion. Elsewhere, we also talk about SquirrelWaffle, a reasonably new malware that is used as a loader and has been mentioned as a potential successor to the notorious Emotet for the delivery of threats. </itunes:summary><description>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss some of our recent blogs, including at least one BlackMatter ransomware affiliate using a new data exfiltration tool in attacks, and also the breaking news that the BlackMatter ransomware operation is apparently winding down. We also discuss another recent blog we published about banking Trojan activity in Latin America, while recent law enforcement activity cracking down on ransomware criminals is also up for discussion. Elsewhere, we also talk about SquirrelWaffle, a reasonably new malware that is used as a loader and has been mentioned as a potential successor to the notorious Emotet for the delivery of threats. </description><content:encoded>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss some of our recent blogs, including at least one BlackMatter ransomware affiliate using a new data exfiltration tool in attacks, and also the breaking news that the BlackMatter ransomware operation is apparently winding down. We also discuss another recent blog we published about banking Trojan activity in Latin America, while recent law enforcement activity cracking down on ransomware criminals is also up for discussion. Elsewhere, we also talk about SquirrelWaffle, a reasonably new malware that is used as a loader and has been mentioned as a potential successor to the notorious Emotet for the delivery of threats. </content:encoded><enclosure length="35257263" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E04_Blackmatter_ransomware_banking_trojan.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E04_Blackmatter_ransomware_banking_trojan.mp3</guid><pubDate>Thu, 04 Nov 2021 14:00:00 +0000</pubDate><itunes:duration>00:24:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>4</itunes:episode><itunes:season>4</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>New research about the Yanluowang ransomware and two separate campaigns targeting victims in Asia</itunes:title><title>New research about the Yanluowang ransomware and two separate campaigns targeting victims in Asia</title><itunes:summary>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss several new blogs that the Symantec Threat Hunter Team has published recently. Firstly, we uncovered a new ransomware threat that we dubbed Yanluowang, which appears to be deployed in a targeted fashion and is certainly a new threat as various indications point towards it still being in development. We also published two blogs detailing two separate campaigns targeting organizations in Asia. The Harvester group is a previously unknown, likely nation-state backed group targeting victims in South Asia, while elsewhere a new espionage campaign is targeting the defense, healthcare, and ICT sectors in South East Asia. Meanwhile, we also discuss new activity from a targeted attack group dubbed LightBasin, and the return of the Lyceum group.</itunes:summary><description>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss several new blogs that the Symantec Threat Hunter Team has published recently. Firstly, we uncovered a new ransomware threat that we dubbed Yanluowang, which appears to be deployed in a targeted fashion and is certainly a new threat as various indications point towards it still being in development. We also published two blogs detailing two separate campaigns targeting organizations in Asia. The Harvester group is a previously unknown, likely nation-state backed group targeting victims in South Asia, while elsewhere a new espionage campaign is targeting the defense, healthcare, and ICT sectors in South East Asia. Meanwhile, we also discuss new activity from a targeted attack group dubbed LightBasin, and the return of the Lyceum group.</description><content:encoded>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss several new blogs that the Symantec Threat Hunter Team has published recently. Firstly, we uncovered a new ransomware threat that we dubbed Yanluowang, which appears to be deployed in a targeted fashion and is certainly a new threat as various indications point towards it still being in development. We also published two blogs detailing two separate campaigns targeting organizations in Asia. The Harvester group is a previously unknown, likely nation-state backed group targeting victims in South Asia, while elsewhere a new espionage campaign is targeting the defense, healthcare, and ICT sectors in South East Asia. Meanwhile, we also discuss new activity from a targeted attack group dubbed LightBasin, and the return of the Lyceum group.</content:encoded><enclosure length="29029872" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E03_Yanluowang_ransomware_Harvester_Asia_attacks.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E03_Yanluowang_ransomware_Harvester_Asia_attacks.mp3</guid><pubDate>Thu, 21 Oct 2021 13:00:00 +0000</pubDate><itunes:duration>00:20:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>3</itunes:episode><itunes:season>4</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Governments tackle cyber crime, ransomware arrests, and an interesting phishing campaign</itunes:title><title>Governments tackle cyber crime, ransomware arrests, and an interesting phishing campaign</title><itunes:summary>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss how the UK and the U.S. are planning to increase their efforts to tackle cyber crime, ransomware being blamed in court for the death of a baby, and the arrests of some ransomware criminals in Ukraine. Also, the Conti ransomware gang makes some threats, evidence of the Pegasus spyware allegedly found on the phones of French cabinet ministers, and an interesting targeted phishing campaign. &#13;
</itunes:summary><description>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss how the UK and the U.S. are planning to increase their efforts to tackle cyber crime, ransomware being blamed in court for the death of a baby, and the arrests of some ransomware criminals in Ukraine. Also, the Conti ransomware gang makes some threats, evidence of the Pegasus spyware allegedly found on the phones of French cabinet ministers, and an interesting targeted phishing campaign. &#13;
</description><content:encoded>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss how the UK and the U.S. are planning to increase their efforts to tackle cyber crime, ransomware being blamed in court for the death of a baby, and the arrests of some ransomware criminals in Ukraine. Also, the Conti ransomware gang makes some threats, evidence of the Pegasus spyware allegedly found on the phones of French cabinet ministers, and an interesting targeted phishing campaign. &#13;
</content:encoded><enclosure length="29936946" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E02_Ransomware_Conti_Pegasus_Phishing.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E02_Ransomware_Conti_Pegasus_Phishing.mp3</guid><pubDate>Thu, 07 Oct 2021 13:00:00 +0000</pubDate><itunes:duration>00:20:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>2</itunes:episode><itunes:season>4</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>A new ransomware whitepaper and some recent ransomware stories, plus new botnet is carrying out giant DDoS attacks</itunes:title><title>A new ransomware whitepaper and some recent ransomware stories, plus new botnet is carrying out giant DDoS attacks</title><itunes:summary>We are back for Season 4 after our summer break, and on this week’s Cyber Security Brief podcast Dick O’Brien and Brigid O Gorman spend a lot of time discussing the subject that also dominated the last season of the podcast - ransomware. We discuss some of the ransomware stories we missed while we were off air, as well as a ransomware whitepaper we recently worked on and made available to our customers. Apart from ransomware, we also discuss Mēris - a huge botnet that emerged over the summer and has aimed massive DDoS attacks at various organizations around the world. </itunes:summary><description>We are back for Season 4 after our summer break, and on this week’s Cyber Security Brief podcast Dick O’Brien and Brigid O Gorman spend a lot of time discussing the subject that also dominated the last season of the podcast - ransomware. We discuss some of the ransomware stories we missed while we were off air, as well as a ransomware whitepaper we recently worked on and made available to our customers. Apart from ransomware, we also discuss Mēris - a huge botnet that emerged over the summer and has aimed massive DDoS attacks at various organizations around the world. </description><content:encoded>We are back for Season 4 after our summer break, and on this week’s Cyber Security Brief podcast Dick O’Brien and Brigid O Gorman spend a lot of time discussing the subject that also dominated the last season of the podcast - ransomware. We discuss some of the ransomware stories we missed while we were off air, as well as a ransomware whitepaper we recently worked on and made available to our customers. Apart from ransomware, we also discuss Mēris - a huge botnet that emerged over the summer and has aimed massive DDoS attacks at various organizations around the world. </content:encoded><enclosure length="31831222" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E01_Ransomware_Meris_DDoS.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S04E01_Ransomware_Meris_DDoS.mp3</guid><pubDate>Thu, 23 Sep 2021 13:00:00 +0000</pubDate><itunes:duration>00:22:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>1</itunes:episode><itunes:season>4</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Ransomware, the rising cost of data breaches, and the U.S. points finger at China for Microsoft Exchange Server attacks</itunes:title><title>Ransomware, the rising cost of data breaches, and the U.S. points finger at China for Microsoft Exchange Server attacks</title><itunes:summary>On this week’s Cyber Security Brief, we discuss some recent ransomware stories, as well as giving a sneak peek into some research we have been doing into ransomware. We also talk about recent announcements from U.S. authorities that attributed some recent cyber attacks, including the Microsoft Exchange Server campaign, to Chinese actors, and we also discuss the rising cost of data breaches. This is the last podcast of season 3, we will be taking a short break and will return with new episodes in September.</itunes:summary><description>On this week’s Cyber Security Brief, we discuss some recent ransomware stories, as well as giving a sneak peek into some research we have been doing into ransomware. We also talk about recent announcements from U.S. authorities that attributed some recent cyber attacks, including the Microsoft Exchange Server campaign, to Chinese actors, and we also discuss the rising cost of data breaches. This is the last podcast of season 3, we will be taking a short break and will return with new episodes in September.</description><content:encoded>On this week’s Cyber Security Brief, we discuss some recent ransomware stories, as well as giving a sneak peek into some research we have been doing into ransomware. We also talk about recent announcements from U.S. authorities that attributed some recent cyber attacks, including the Microsoft Exchange Server campaign, to Chinese actors, and we also discuss the rising cost of data breaches. This is the last podcast of season 3, we will be taking a short break and will return with new episodes in September.</content:encoded><enclosure length="34687034" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E21_ransomware_data_breaches.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E21_ransomware_data_breaches.mp3</guid><pubDate>Thu, 29 Jul 2021 13:00:00 +0000</pubDate><itunes:duration>00:24:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>21</itunes:episode><itunes:season>3</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Kaseya ransomware supply chain attack, new SolarWinds vulnerability, and the rising cost of cyber insurance</itunes:title><title>Kaseya ransomware supply chain attack, new SolarWinds vulnerability, and the rising cost of cyber insurance</title><itunes:summary>On this week’s Cyber Security Brief, Gavin O’Gorman joins us to discuss the Kaseya ransomware supply chain attack that occurred over the July 4 holiday weekend in the U.S. The REvil/Sodinokibi ransomware gang were behind this attack, and Gavin and Dick O’Brien discuss whether this is a sign that we now need to be aware of ransomware actors targeting victims through supply chain attacks, which would more traditionally be associated with state-sponsored hackers, as well as some of the other interesting aspects of this attack. Meanwhile, Brigid O Gorman discusses the latest news of a new vulnerability in SolarWinds software being exploited by a Chinese hacking group, energy companies being targeted in a year-long espionage campaign, and the rising cost of cyber insurance.</itunes:summary><description>On this week’s Cyber Security Brief, Gavin O’Gorman joins us to discuss the Kaseya ransomware supply chain attack that occurred over the July 4 holiday weekend in the U.S. The REvil/Sodinokibi ransomware gang were behind this attack, and Gavin and Dick O’Brien discuss whether this is a sign that we now need to be aware of ransomware actors targeting victims through supply chain attacks, which would more traditionally be associated with state-sponsored hackers, as well as some of the other interesting aspects of this attack. Meanwhile, Brigid O Gorman discusses the latest news of a new vulnerability in SolarWinds software being exploited by a Chinese hacking group, energy companies being targeted in a year-long espionage campaign, and the rising cost of cyber insurance.</description><content:encoded>On this week’s Cyber Security Brief, Gavin O’Gorman joins us to discuss the Kaseya ransomware supply chain attack that occurred over the July 4 holiday weekend in the U.S. The REvil/Sodinokibi ransomware gang were behind this attack, and Gavin and Dick O’Brien discuss whether this is a sign that we now need to be aware of ransomware actors targeting victims through supply chain attacks, which would more traditionally be associated with state-sponsored hackers, as well as some of the other interesting aspects of this attack. Meanwhile, Brigid O Gorman discusses the latest news of a new vulnerability in SolarWinds software being exploited by a Chinese hacking group, energy companies being targeted in a year-long espionage campaign, and the rising cost of cyber insurance.</content:encoded><enclosure length="45989463" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E20_Kaseya_Revil_Ransomware_SolarWinds.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E20_Kaseya_Revil_Ransomware_SolarWinds.mp3</guid><pubDate>Thu, 15 Jul 2021 13:00:00 +0000</pubDate><itunes:duration>00:31:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>20</itunes:episode><itunes:season>3</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Ransomware attackers using virtual machines, over-60s lost $1 billion online in 2020, and the EU launches a new cyber security unit</itunes:title><title>Ransomware attackers using virtual machines, over-60s lost $1 billion online in 2020, and the EU launches a new cyber security unit</title><itunes:summary>On this week’s Cyber Security Brief podcast, Dick O’Brien fills us in on the latest research we have published on our blog about how a growing number of ransomware attackers are using virtual machines in their attacks. We also discuss a few other ransomware-related stories, including REvil introducing a new Linux version of its ransomware, a Babuk ransomware builder being leaked online, and a couple of stories showing the amount of money that can be involved in ransomware operations. Elsewhere, the FBI recently released a report stating that over-60s lost around $1 billion through online fraud in 2020, the U.S. Secret Service released a cyber crime Most Wanted list, a FIN7 gang member was jailed, and the EU launched a new cyber security unit.</itunes:summary><description>On this week’s Cyber Security Brief podcast, Dick O’Brien fills us in on the latest research we have published on our blog about how a growing number of ransomware attackers are using virtual machines in their attacks. We also discuss a few other ransomware-related stories, including REvil introducing a new Linux version of its ransomware, a Babuk ransomware builder being leaked online, and a couple of stories showing the amount of money that can be involved in ransomware operations. Elsewhere, the FBI recently released a report stating that over-60s lost around $1 billion through online fraud in 2020, the U.S. Secret Service released a cyber crime Most Wanted list, a FIN7 gang member was jailed, and the EU launched a new cyber security unit.</description><content:encoded>On this week’s Cyber Security Brief podcast, Dick O’Brien fills us in on the latest research we have published on our blog about how a growing number of ransomware attackers are using virtual machines in their attacks. We also discuss a few other ransomware-related stories, including REvil introducing a new Linux version of its ransomware, a Babuk ransomware builder being leaked online, and a couple of stories showing the amount of money that can be involved in ransomware operations. Elsewhere, the FBI recently released a report stating that over-60s lost around $1 billion through online fraud in 2020, the U.S. Secret Service released a cyber crime Most Wanted list, a FIN7 gang member was jailed, and the EU launched a new cyber security unit.</content:encoded><enclosure length="33424391" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E19.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E19.mp3</guid><pubDate>Thu, 01 Jul 2021 13:00:00 +0000</pubDate><itunes:duration>00:23:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>19</itunes:episode><itunes:season>3</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Ransomware, takedowns, and political promises to tackle cyber crime</itunes:title><title>Ransomware, takedowns, and political promises to tackle cyber crime</title><itunes:summary>In this week’s Cyber Security Brief podcast, Dick O’Brien and Brigid O Gorman discuss some of the biggest cyber security stories of the last two weeks. Ransomware has once again dominated the news headlines, with news about huge ransom payments and ransom recovery operations being reported. Meanwhile, cyber security comes to the fore in the political sphere following pronouncements from the G7 and NATO summits. Elsewhere, attackers leveraged Slack to attack one of the world’s biggest gaming companies, one of the largest online marketplaces for stolen credentials in the world was taken down by authorities, and how law enforcement used a backdoored chat app to spy on criminals, leading to hundreds of arrests.</itunes:summary><description>In this week’s Cyber Security Brief podcast, Dick O’Brien and Brigid O Gorman discuss some of the biggest cyber security stories of the last two weeks. Ransomware has once again dominated the news headlines, with news about huge ransom payments and ransom recovery operations being reported. Meanwhile, cyber security comes to the fore in the political sphere following pronouncements from the G7 and NATO summits. Elsewhere, attackers leveraged Slack to attack one of the world’s biggest gaming companies, one of the largest online marketplaces for stolen credentials in the world was taken down by authorities, and how law enforcement used a backdoored chat app to spy on criminals, leading to hundreds of arrests.</description><content:encoded>In this week’s Cyber Security Brief podcast, Dick O’Brien and Brigid O Gorman discuss some of the biggest cyber security stories of the last two weeks. Ransomware has once again dominated the news headlines, with news about huge ransom payments and ransom recovery operations being reported. Meanwhile, cyber security comes to the fore in the political sphere following pronouncements from the G7 and NATO summits. Elsewhere, attackers leveraged Slack to attack one of the world’s biggest gaming companies, one of the largest online marketplaces for stolen credentials in the world was taken down by authorities, and how law enforcement used a backdoored chat app to spy on criminals, leading to hundreds of arrests.</content:encoded><enclosure length="38381059" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E18.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E18.mp3</guid><pubDate>Thu, 17 Jun 2021 13:00:00 +0000</pubDate><itunes:duration>00:26:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>18</itunes:episode><itunes:season>3</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title> In-depth look at the ransomware attack on Ireland’s national health service, as major meat producer JBS also hit with ransomware</itunes:title><title> In-depth look at the ransomware attack on Ireland’s national health service, as major meat producer JBS also hit with ransomware</title><itunes:summary>On this week’s Cyber Security Brief podcast, Dick O’Brien and Brigid O’Gorman are joined by Symantec threat researcher Gavin O’Gorman to discuss the Conti ransomware attack on Ireland’s national health service, how the response to this attack is going, and what the likely consequences of it may be. Elsewhere, another ransomware attack, this time on the world’s largest meat producer, JBS Foods, and Sweden’s Public Health Agency is also hit with some hack attempts. Meanwhile, the alleged leader of an ATM fraud gang responsible for stealing more than $1 billion from tourists, is arrested in Mexico.</itunes:summary><description>On this week’s Cyber Security Brief podcast, Dick O’Brien and Brigid O’Gorman are joined by Symantec threat researcher Gavin O’Gorman to discuss the Conti ransomware attack on Ireland’s national health service, how the response to this attack is going, and what the likely consequences of it may be. Elsewhere, another ransomware attack, this time on the world’s largest meat producer, JBS Foods, and Sweden’s Public Health Agency is also hit with some hack attempts. Meanwhile, the alleged leader of an ATM fraud gang responsible for stealing more than $1 billion from tourists, is arrested in Mexico.</description><content:encoded>On this week’s Cyber Security Brief podcast, Dick O’Brien and Brigid O’Gorman are joined by Symantec threat researcher Gavin O’Gorman to discuss the Conti ransomware attack on Ireland’s national health service, how the response to this attack is going, and what the likely consequences of it may be. Elsewhere, another ransomware attack, this time on the world’s largest meat producer, JBS Foods, and Sweden’s Public Health Agency is also hit with some hack attempts. Meanwhile, the alleged leader of an ATM fraud gang responsible for stealing more than $1 billion from tourists, is arrested in Mexico.</content:encoded><enclosure length="48896607" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E17_HSE_Cyberattack_Ransomware_JBS.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E17_HSE_Cyberattack_Ransomware_JBS.mp3</guid><pubDate>Thu, 03 Jun 2021 13:00:00 +0000</pubDate><itunes:duration>00:33:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>17</itunes:episode><itunes:season>3</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Colonial Pipeline attack, Darkside ransomware gang, and crypto mining makes a comeback</itunes:title><title>Colonial Pipeline attack, Darkside ransomware gang, and crypto mining makes a comeback</title><itunes:summary>In this week’s Cyber Security Brief, Dick O’Brien and Brigid O’Gorman discuss the implications of the Colonial Pipeline ransomware attack and the activities of the group behind it, Darkside. We also talk about what appears to be a reasonably new ransomware - Avaddon - that has been used in a string of attacks recently, while we also discuss an idea Brian Krebs wrote about that could potentially help deter ransomware actors from infecting your network. Away from the world of ransomware we talk about Lemon Duck and something of a resurgence in crypto mining, while we also discuss what CISOs are most worried about in 2021.  </itunes:summary><description>In this week’s Cyber Security Brief, Dick O’Brien and Brigid O’Gorman discuss the implications of the Colonial Pipeline ransomware attack and the activities of the group behind it, Darkside. We also talk about what appears to be a reasonably new ransomware - Avaddon - that has been used in a string of attacks recently, while we also discuss an idea Brian Krebs wrote about that could potentially help deter ransomware actors from infecting your network. Away from the world of ransomware we talk about Lemon Duck and something of a resurgence in crypto mining, while we also discuss what CISOs are most worried about in 2021.  </description><content:encoded>In this week’s Cyber Security Brief, Dick O’Brien and Brigid O’Gorman discuss the implications of the Colonial Pipeline ransomware attack and the activities of the group behind it, Darkside. We also talk about what appears to be a reasonably new ransomware - Avaddon - that has been used in a string of attacks recently, while we also discuss an idea Brian Krebs wrote about that could potentially help deter ransomware actors from infecting your network. Away from the world of ransomware we talk about Lemon Duck and something of a resurgence in crypto mining, while we also discuss what CISOs are most worried about in 2021.  </content:encoded><enclosure length="33542079" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E16_Darkside_Ransomware_LemonDuck.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E16_Darkside_Ransomware_LemonDuck.mp3</guid><pubDate>Thu, 20 May 2021 13:30:00 +0000</pubDate><itunes:duration>00:23:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>16</itunes:episode><itunes:season>3</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>MFA causes headaches for attackers, and a look at living off the land activity</itunes:title><title>MFA causes headaches for attackers, and a look at living off the land activity</title><itunes:summary>On this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien discuss some research we have recently been working on at Symantec. First, we discuss a blog we published this week, which looks at multi-factor authentication and how it has become a headache for malicious actors, leading them to adopt new attack techniques in an attempt to bypass or avoid it completely. We also discuss a report that we shared with customers recently looking at living off the land attack techniques and the activity and trends in that area, as well as some steps you can take to try and protect your network from this kind of activity.  </itunes:summary><description>On this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien discuss some research we have recently been working on at Symantec. First, we discuss a blog we published this week, which looks at multi-factor authentication and how it has become a headache for malicious actors, leading them to adopt new attack techniques in an attempt to bypass or avoid it completely. We also discuss a report that we shared with customers recently looking at living off the land attack techniques and the activity and trends in that area, as well as some steps you can take to try and protect your network from this kind of activity.  </description><content:encoded>On this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien discuss some research we have recently been working on at Symantec. First, we discuss a blog we published this week, which looks at multi-factor authentication and how it has become a headache for malicious actors, leading them to adopt new attack techniques in an attempt to bypass or avoid it completely. We also discuss a report that we shared with customers recently looking at living off the land attack techniques and the activity and trends in that area, as well as some steps you can take to try and protect your network from this kind of activity.  </content:encoded><enclosure length="38654638" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E15_MFA_Living_off_the_land.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E15_MFA_Living_off_the_land.mp3</guid><pubDate>Thu, 06 May 2021 13:00:00 +0000</pubDate><itunes:duration>00:26:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>15</itunes:episode><itunes:season>3</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Pulse Secure VPN zero-day, SolarWinds and Exchange Server developments, and spies approach UK employees on social media</itunes:title><title>Pulse Secure VPN zero-day, SolarWinds and Exchange Server developments, and spies approach UK employees on social media</title><itunes:summary>On this week’s Cyber Security Brief, Alan Neville joins Brigid O Gorman and Dick O’Brien to discuss the recent discovery of a zero-day vulnerability in popular VPN product Pulse Secure. We also discuss some recent developments in the SolarWinds and Microsoft Exchange Server stories. Finally, we discuss a recent potential data breach at software testing company Codecov, and look at why UK authorities are warning government employees about potential approaches from foreign spies on social media. </itunes:summary><description>On this week’s Cyber Security Brief, Alan Neville joins Brigid O Gorman and Dick O’Brien to discuss the recent discovery of a zero-day vulnerability in popular VPN product Pulse Secure. We also discuss some recent developments in the SolarWinds and Microsoft Exchange Server stories. Finally, we discuss a recent potential data breach at software testing company Codecov, and look at why UK authorities are warning government employees about potential approaches from foreign spies on social media. </description><content:encoded>On this week’s Cyber Security Brief, Alan Neville joins Brigid O Gorman and Dick O’Brien to discuss the recent discovery of a zero-day vulnerability in popular VPN product Pulse Secure. We also discuss some recent developments in the SolarWinds and Microsoft Exchange Server stories. Finally, we discuss a recent potential data breach at software testing company Codecov, and look at why UK authorities are warning government employees about potential approaches from foreign spies on social media. </content:encoded><enclosure length="31609634" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E14_Pulse_Secure_SolarWinds.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E14_Pulse_Secure_SolarWinds.mp3</guid><pubDate>Thu, 22 Apr 2021 13:00:00 +0000</pubDate><itunes:duration>00:21:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>14</itunes:episode><itunes:season>3</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Facebook data leak, cyber attack aimed at EU institutions, and cyber criminals use a call center to spread malware</itunes:title><title>Facebook data leak, cyber attack aimed at EU institutions, and cyber criminals use a call center to spread malware</title><itunes:summary>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss the big Facebook data leak that has made headlines around the world this week, as well as a cyber attack aimed at European Union institutions, and a cyber incident impacting Australia’s parliament. We also discuss warnings from authorities in the U.S. about attackers attempting to exploit vulnerabilities in Fortinet FortiOS, while authorities in the UK have issued warnings about an increased risk of ransomware attacks targeting the education sector. Meanwhile, some cyber criminals have started using call centers to distribute malware, with the tactic reportedly proving quite successful for several cyber crime groups. </itunes:summary><description>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss the big Facebook data leak that has made headlines around the world this week, as well as a cyber attack aimed at European Union institutions, and a cyber incident impacting Australia’s parliament. We also discuss warnings from authorities in the U.S. about attackers attempting to exploit vulnerabilities in Fortinet FortiOS, while authorities in the UK have issued warnings about an increased risk of ransomware attacks targeting the education sector. Meanwhile, some cyber criminals have started using call centers to distribute malware, with the tactic reportedly proving quite successful for several cyber crime groups. </description><content:encoded>On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss the big Facebook data leak that has made headlines around the world this week, as well as a cyber attack aimed at European Union institutions, and a cyber incident impacting Australia’s parliament. We also discuss warnings from authorities in the U.S. about attackers attempting to exploit vulnerabilities in Fortinet FortiOS, while authorities in the UK have issued warnings about an increased risk of ransomware attacks targeting the education sector. Meanwhile, some cyber criminals have started using call centers to distribute malware, with the tactic reportedly proving quite successful for several cyber crime groups. </content:encoded><enclosure length="25891115" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E13.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E13.mp3</guid><pubDate>Thu, 08 Apr 2021 13:35:56 +0000</pubDate><itunes:duration>00:17:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>13</itunes:episode><itunes:season>3</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Ransomware attackers leverage the Microsoft Exchange Server vulns, WeLeakInfo users hit by data breach, and ransomware payments increase</itunes:title><title>Ransomware attackers leverage the Microsoft Exchange Server vulns, WeLeakInfo users hit by data breach, and ransomware payments increase</title><itunes:summary>On this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien discuss how ransomware attackers are now attempting to leverage the vulnerabilities in Microsoft Exchange Server. We also talk about an interesting interview given by one of the ReEvil ransomware gang to Recorded Future, evidence that ransomware payments increased over the last year, and the users of WeLeakInfo falling victim to their own data breach. Also, we warn U.S. taxpayers to be on the lookout for phishing campaigns at this time of year, and the hacker who made headlines a few weeks ago for hacking security cameras used in Tesla offices and elsewhere is indicted on numerous hacking charges in the U.S. </itunes:summary><description>On this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien discuss how ransomware attackers are now attempting to leverage the vulnerabilities in Microsoft Exchange Server. We also talk about an interesting interview given by one of the ReEvil ransomware gang to Recorded Future, evidence that ransomware payments increased over the last year, and the users of WeLeakInfo falling victim to their own data breach. Also, we warn U.S. taxpayers to be on the lookout for phishing campaigns at this time of year, and the hacker who made headlines a few weeks ago for hacking security cameras used in Tesla offices and elsewhere is indicted on numerous hacking charges in the U.S. </description><content:encoded>On this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien discuss how ransomware attackers are now attempting to leverage the vulnerabilities in Microsoft Exchange Server. We also talk about an interesting interview given by one of the ReEvil ransomware gang to Recorded Future, evidence that ransomware payments increased over the last year, and the users of WeLeakInfo falling victim to their own data breach. Also, we warn U.S. taxpayers to be on the lookout for phishing campaigns at this time of year, and the hacker who made headlines a few weeks ago for hacking security cameras used in Tesla offices and elsewhere is indicted on numerous hacking charges in the U.S. </content:encoded><enclosure length="29594501" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E12_ProxyLogon_Ransomware_ReEvil.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E12_ProxyLogon_Ransomware_ReEvil.mp3</guid><pubDate>Thu, 25 Mar 2021 14:00:00 +0000</pubDate><itunes:duration>00:20:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>12</itunes:episode><itunes:season>3</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>All you need to know about the Microsoft Exchange Server attacks, and some SolarWinds developments</itunes:title><title>All you need to know about the Microsoft Exchange Server attacks, and some SolarWinds developments</title><itunes:summary>On this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien are joined by Symantec threat researcher Alan Neville to discuss the biggest cyber security story of the last couple of weeks - the vulnerabilities in Microsoft Exchange Server. Alan gives a comprehensive overview of the vulnerabilities, what’s happened since they became public knowledge last week, and the steps you can take to keep your organization’s network safe. He also talks about some of the post-compromise activity that Symantec has seen. We also chat about some other topics: new research into the SolarWinds hack, and the arrest of an alleged GandCrab ransomware gang member.</itunes:summary><description>On this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien are joined by Symantec threat researcher Alan Neville to discuss the biggest cyber security story of the last couple of weeks - the vulnerabilities in Microsoft Exchange Server. Alan gives a comprehensive overview of the vulnerabilities, what’s happened since they became public knowledge last week, and the steps you can take to keep your organization’s network safe. He also talks about some of the post-compromise activity that Symantec has seen. We also chat about some other topics: new research into the SolarWinds hack, and the arrest of an alleged GandCrab ransomware gang member.</description><content:encoded>On this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien are joined by Symantec threat researcher Alan Neville to discuss the biggest cyber security story of the last couple of weeks - the vulnerabilities in Microsoft Exchange Server. Alan gives a comprehensive overview of the vulnerabilities, what’s happened since they became public knowledge last week, and the steps you can take to keep your organization’s network safe. He also talks about some of the post-compromise activity that Symantec has seen. We also chat about some other topics: new research into the SolarWinds hack, and the arrest of an alleged GandCrab ransomware gang member.</content:encoded><enclosure length="31663431" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E11_Microsoft_Exchange_Server_SolarWinds.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E11_Microsoft_Exchange_Server_SolarWinds.mp3</guid><pubDate>Thu, 11 Mar 2021 14:00:00 +0000</pubDate><itunes:duration>00:21:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>11</itunes:episode><itunes:season>3</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Accellion product vulns, Equation group tool copied by Chinese APT, and software supply chain attacks in France </itunes:title><title>Accellion product vulns, Equation group tool copied by Chinese APT, and software supply chain attacks in France </title><itunes:summary>On this week’s Cyber Security Brief podcast, Dick O’Brien and Brigid O’Gorman discuss some of the biggest cyber security stories of the last few weeks. Among the stories up for discussion are the bugs in Accellion’s 20-year-old FTA product, which led to multiple companies worldwide reporting breaches related to it. We also talk about the reports saying the Sandworm group has been carrying out a long-running spying campaign against multiple French IT services providers by compromising an open-source IT monitoring tool called Centreon, and a Chinese APT group reportedly cloning an Equation group tool. Some interesting law enforcement activity in recent weeks is also up for discussion.&#13;
</itunes:summary><description>On this week’s Cyber Security Brief podcast, Dick O’Brien and Brigid O’Gorman discuss some of the biggest cyber security stories of the last few weeks. Among the stories up for discussion are the bugs in Accellion’s 20-year-old FTA product, which led to multiple companies worldwide reporting breaches related to it. We also talk about the reports saying the Sandworm group has been carrying out a long-running spying campaign against multiple French IT services providers by compromising an open-source IT monitoring tool called Centreon, and a Chinese APT group reportedly cloning an Equation group tool. Some interesting law enforcement activity in recent weeks is also up for discussion.&#13;
</description><content:encoded>On this week’s Cyber Security Brief podcast, Dick O’Brien and Brigid O’Gorman discuss some of the biggest cyber security stories of the last few weeks. Among the stories up for discussion are the bugs in Accellion’s 20-year-old FTA product, which led to multiple companies worldwide reporting breaches related to it. We also talk about the reports saying the Sandworm group has been carrying out a long-running spying campaign against multiple French IT services providers by compromising an open-source IT monitoring tool called Centreon, and a Chinese APT group reportedly cloning an Equation group tool. Some interesting law enforcement activity in recent weeks is also up for discussion.&#13;
</content:encoded><enclosure length="33639403" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E10_Accellion_Equation_Supply_Chain.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E10_Accellion_Equation_Supply_Chain.mp3</guid><pubDate>Thu, 25 Feb 2021 14:00:00 +0000</pubDate><itunes:duration>00:23:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>10</itunes:episode><itunes:season>3</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Emotet takedown, water plant cyber attack, and a SolarWinds update</itunes:title><title>Emotet takedown, water plant cyber attack, and a SolarWinds update</title><itunes:summary>On this week’s Cyber Security Brief podcast, Dick O’Brien and Brigid O’Gorman round up some of the biggest cyber security stories of the last two weeks. We bring you the latest developments in the SolarWinds hack investigation, and chat about the significance of the disruption to the Emotet botnet. We also discuss some other recent takedowns and arrests, as well as some of the biggest ransomware stories of the last couple of weeks. We also talk about the recently reported cyber attack on a water treatment plant in the Florida town of Oldsmar - was this just a one-off incident or do industrial control systems like water plants need to be on high alert?</itunes:summary><description>On this week’s Cyber Security Brief podcast, Dick O’Brien and Brigid O’Gorman round up some of the biggest cyber security stories of the last two weeks. We bring you the latest developments in the SolarWinds hack investigation, and chat about the significance of the disruption to the Emotet botnet. We also discuss some other recent takedowns and arrests, as well as some of the biggest ransomware stories of the last couple of weeks. We also talk about the recently reported cyber attack on a water treatment plant in the Florida town of Oldsmar - was this just a one-off incident or do industrial control systems like water plants need to be on high alert?</description><content:encoded>On this week’s Cyber Security Brief podcast, Dick O’Brien and Brigid O’Gorman round up some of the biggest cyber security stories of the last two weeks. We bring you the latest developments in the SolarWinds hack investigation, and chat about the significance of the disruption to the Emotet botnet. We also discuss some other recent takedowns and arrests, as well as some of the biggest ransomware stories of the last couple of weeks. We also talk about the recently reported cyber attack on a water treatment plant in the Florida town of Oldsmar - was this just a one-off incident or do industrial control systems like water plants need to be on high alert?</content:encoded><enclosure length="32911223" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E09_SolarWinds_Emotet_ICS.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E09_SolarWinds_Emotet_ICS.mp3</guid><pubDate>Thu, 11 Feb 2021 14:00:00 +0000</pubDate><itunes:duration>00:22:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>9</itunes:episode><itunes:season>3</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Raindrop: How the additional tool was discovered in SolarWinds investigation</itunes:title><title>Raindrop: How the additional tool was discovered in SolarWinds investigation</title><itunes:summary>Old threats and new feature in this week’s Cyber Security Brief podcast. Dick O’Brien and Gavin O’Gorman discuss the latest developments in the SolarWinds hack investigation, including how Symantec investigators found Raindrop, an additional piece of malware used in the SolarWinds attacks against a select number of victims that were of interest to the attackers. We published a blog about Raindrop last week, and Dick and Gavin discuss how this new malware was discovered. Also, romance scams and DDoS attacks make a comeback. </itunes:summary><description>Old threats and new feature in this week’s Cyber Security Brief podcast. Dick O’Brien and Gavin O’Gorman discuss the latest developments in the SolarWinds hack investigation, including how Symantec investigators found Raindrop, an additional piece of malware used in the SolarWinds attacks against a select number of victims that were of interest to the attackers. We published a blog about Raindrop last week, and Dick and Gavin discuss how this new malware was discovered. Also, romance scams and DDoS attacks make a comeback. </description><content:encoded>Old threats and new feature in this week’s Cyber Security Brief podcast. Dick O’Brien and Gavin O’Gorman discuss the latest developments in the SolarWinds hack investigation, including how Symantec investigators found Raindrop, an additional piece of malware used in the SolarWinds attacks against a select number of victims that were of interest to the attackers. We published a blog about Raindrop last week, and Dick and Gavin discuss how this new malware was discovered. Also, romance scams and DDoS attacks make a comeback. </content:encoded><enclosure length="36119756" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E08_Raindrop_Solarwinds.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E08_Raindrop_Solarwinds.mp3</guid><pubDate>Thu, 28 Jan 2021 14:00:00 +0000</pubDate><itunes:duration>00:25:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>8</itunes:episode><itunes:season>3</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>The latest on the SolarWinds hack, a lot of ransomware activity, and healthcare hit hard by cyber attacks</itunes:title><title>The latest on the SolarWinds hack, a lot of ransomware activity, and healthcare hit hard by cyber attacks</title><itunes:summary>On this week’s Cyber Security Brief, the first of 2021, Dick O’Brien brings us a comprehensive update about some of the developments in the SolarWinds hack story, with a lot having happened since our last podcast. We also discuss some recent ransomware attacks, and how the healthcare sector is having a hard time with cyber attacks at the moment. </itunes:summary><description>On this week’s Cyber Security Brief, the first of 2021, Dick O’Brien brings us a comprehensive update about some of the developments in the SolarWinds hack story, with a lot having happened since our last podcast. We also discuss some recent ransomware attacks, and how the healthcare sector is having a hard time with cyber attacks at the moment. </description><content:encoded>On this week’s Cyber Security Brief, the first of 2021, Dick O’Brien brings us a comprehensive update about some of the developments in the SolarWinds hack story, with a lot having happened since our last podcast. We also discuss some recent ransomware attacks, and how the healthcare sector is having a hard time with cyber attacks at the moment. </content:encoded><enclosure length="35985018" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E07_final_solarwinds_ransomware.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E07_final_solarwinds_ransomware.mp3</guid><pubDate>Thu, 14 Jan 2021 14:00:00 +0000</pubDate><itunes:duration>00:24:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>7</itunes:episode><itunes:season>3</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Sunburst: Everything we know about the supply chain attack targeting SolarWinds users</itunes:title><title>Sunburst: Everything we know about the supply chain attack targeting SolarWinds users</title><itunes:summary>In this week’s Cyber Security Brief, the last one of 2020, find out all you need to know about the biggest news story of the week - the Sunburst supply chain attack targeting customers of software company SolarWinds. This is one of the biggest cyber security stories of the year, with thousands of organizations affected. Dick O’Brien and Symantec threat analyst Gavin O’Gorman give a comprehensive rundown of everything we know about this attack so far. Also, Twitter is handed a big fine by the Irish data regulator, and bug reports jump in 2020. </itunes:summary><description>In this week’s Cyber Security Brief, the last one of 2020, find out all you need to know about the biggest news story of the week - the Sunburst supply chain attack targeting customers of software company SolarWinds. This is one of the biggest cyber security stories of the year, with thousands of organizations affected. Dick O’Brien and Symantec threat analyst Gavin O’Gorman give a comprehensive rundown of everything we know about this attack so far. Also, Twitter is handed a big fine by the Irish data regulator, and bug reports jump in 2020. </description><content:encoded>In this week’s Cyber Security Brief, the last one of 2020, find out all you need to know about the biggest news story of the week - the Sunburst supply chain attack targeting customers of software company SolarWinds. This is one of the biggest cyber security stories of the year, with thousands of organizations affected. Dick O’Brien and Symantec threat analyst Gavin O’Gorman give a comprehensive rundown of everything we know about this attack so far. Also, Twitter is handed a big fine by the Irish data regulator, and bug reports jump in 2020. </content:encoded><enclosure length="40662018" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E06_Sunburst_SolarWinds.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E06_Sunburst_SolarWinds.mp3</guid><pubDate>Thu, 17 Dec 2020 14:00:00 +0000</pubDate><itunes:duration>00:28:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>6</itunes:episode><itunes:season>3</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Cyber predictions for 2021, botnets turn to ransomware, and the Gootkit infostealer reemerges</itunes:title><title>Cyber predictions for 2021, botnets turn to ransomware, and the Gootkit infostealer reemerges</title><itunes:summary>On this week’s Cyber Security Brief podcast, we discuss what card skimmers are up to during the busiest shopping time of the year, while also bringing some good news about how EU authorities prevented almost $50 million in card fraud this year. Also on the agenda, are botnets abandoning banking Trojans in favour of ransomware? It looks like they might be. We also take a look at some COVID-19 related cyber security stories that are making the headlines, as well as the reemergence of the Gootkit infostealer. Also, Dick O’Brien brings us his predictions for what to expect on the cyber security landscape in 2021 - including predictions around ransomware, the impact of work from home, and increased cooperation between cyber crime gangs. </itunes:summary><description>On this week’s Cyber Security Brief podcast, we discuss what card skimmers are up to during the busiest shopping time of the year, while also bringing some good news about how EU authorities prevented almost $50 million in card fraud this year. Also on the agenda, are botnets abandoning banking Trojans in favour of ransomware? It looks like they might be. We also take a look at some COVID-19 related cyber security stories that are making the headlines, as well as the reemergence of the Gootkit infostealer. Also, Dick O’Brien brings us his predictions for what to expect on the cyber security landscape in 2021 - including predictions around ransomware, the impact of work from home, and increased cooperation between cyber crime gangs. </description><content:encoded>On this week’s Cyber Security Brief podcast, we discuss what card skimmers are up to during the busiest shopping time of the year, while also bringing some good news about how EU authorities prevented almost $50 million in card fraud this year. Also on the agenda, are botnets abandoning banking Trojans in favour of ransomware? It looks like they might be. We also take a look at some COVID-19 related cyber security stories that are making the headlines, as well as the reemergence of the Gootkit infostealer. Also, Dick O’Brien brings us his predictions for what to expect on the cyber security landscape in 2021 - including predictions around ransomware, the impact of work from home, and increased cooperation between cyber crime gangs. </content:encoded><enclosure length="34798894" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E05.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E05.mp3</guid><pubDate>Thu, 03 Dec 2020 14:00:00 +0000</pubDate><itunes:duration>00:24:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>5</itunes:episode><itunes:season>3</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>New research about attacks on Japan-linked companies, and APT groups target COVID-19 vaccine makers</itunes:title><title>New research about attacks on Japan-linked companies, and APT groups target COVID-19 vaccine makers</title><itunes:summary>In this week’s Cyber Security Brief, Dick O’Brien and Brigid O’Gorman talk about some of the biggest cyber security stories of the last couple of weeks. There are multiple stories about APT groups to cover this week, including our own Threat Intel blog detailing a wide-ranging attack campaign that targeted Japan-linked companies in multiple sectors in 17 regions worldwide. We also discuss other public reports about a Chinese APT targeting governments in South East Asia, and nation-state backed attacks from Russia and North Korea targeting COVID-19 vaccine makers and researchers. We also discuss a separate campaign in which Lazarus is targeting victims in South Korea, and examine some developments in the world of ransomware. </itunes:summary><description>In this week’s Cyber Security Brief, Dick O’Brien and Brigid O’Gorman talk about some of the biggest cyber security stories of the last couple of weeks. There are multiple stories about APT groups to cover this week, including our own Threat Intel blog detailing a wide-ranging attack campaign that targeted Japan-linked companies in multiple sectors in 17 regions worldwide. We also discuss other public reports about a Chinese APT targeting governments in South East Asia, and nation-state backed attacks from Russia and North Korea targeting COVID-19 vaccine makers and researchers. We also discuss a separate campaign in which Lazarus is targeting victims in South Korea, and examine some developments in the world of ransomware. </description><content:encoded>In this week’s Cyber Security Brief, Dick O’Brien and Brigid O’Gorman talk about some of the biggest cyber security stories of the last couple of weeks. There are multiple stories about APT groups to cover this week, including our own Threat Intel blog detailing a wide-ranging attack campaign that targeted Japan-linked companies in multiple sectors in 17 regions worldwide. We also discuss other public reports about a Chinese APT targeting governments in South East Asia, and nation-state backed attacks from Russia and North Korea targeting COVID-19 vaccine makers and researchers. We also discuss a separate campaign in which Lazarus is targeting victims in South Korea, and examine some developments in the world of ransomware. </content:encoded><enclosure length="28194423" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E04.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E04.mp3</guid><pubDate>Thu, 19 Nov 2020 14:00:00 +0000</pubDate><itunes:duration>00:19:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>4</itunes:episode><itunes:season>3</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Maze 'retires' while Ryuk ramps up activity, U.S. election, and the UK ICO hands down a historically large fine</itunes:title><title>Maze 'retires' while Ryuk ramps up activity, U.S. election, and the UK ICO hands down a historically large fine</title><itunes:summary>In this week’s Cyber Security Brief, Dick O’Brien and Brigid O’Gorman talk about some of the biggest cyber security stories of the last couple of weeks. Of course, this week’s U.S. Presidential Election gets a mention, while we also discuss the recently announced ‘retirement’ of the Maze ransomware gang, as well as a threat alert issued last week by authorities in the U.S. about Trickbot and the Ryuk ransomware. Elsewhere, a Russian man was jailed this week for his involvement with a financial botnet, and the UK’s Information Commissioner’s Office handed down a US$23.8 million fine to the Marriott Hotels group. </itunes:summary><description>In this week’s Cyber Security Brief, Dick O’Brien and Brigid O’Gorman talk about some of the biggest cyber security stories of the last couple of weeks. Of course, this week’s U.S. Presidential Election gets a mention, while we also discuss the recently announced ‘retirement’ of the Maze ransomware gang, as well as a threat alert issued last week by authorities in the U.S. about Trickbot and the Ryuk ransomware. Elsewhere, a Russian man was jailed this week for his involvement with a financial botnet, and the UK’s Information Commissioner’s Office handed down a US$23.8 million fine to the Marriott Hotels group. </description><content:encoded>In this week’s Cyber Security Brief, Dick O’Brien and Brigid O’Gorman talk about some of the biggest cyber security stories of the last couple of weeks. Of course, this week’s U.S. Presidential Election gets a mention, while we also discuss the recently announced ‘retirement’ of the Maze ransomware gang, as well as a threat alert issued last week by authorities in the U.S. about Trickbot and the Ryuk ransomware. Elsewhere, a Russian man was jailed this week for his involvement with a financial botnet, and the UK’s Information Commissioner’s Office handed down a US$23.8 million fine to the Marriott Hotels group. </content:encoded><enclosure length="27403145" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E03.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S03E03.mp3</guid><pubDate>Thu, 05 Nov 2020 14:00:00 +0000</pubDate><itunes:duration>00:19:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>3</itunes:episode><itunes:season>3</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Trickbot disruption, newly released Seedworm research, and some noteworthy indictments</itunes:title><title>Trickbot disruption, newly released Seedworm research, and some noteworthy indictments</title><itunes:summary>On this week’s Cyber Security Brief, Dick O’Brien and Brigid O’Gorman are joined by Symantec threat researchers Vikram Thakur and Alan Neville. Vikram discusses Symantec’s role in the cross-industry initiative to disrupt the Trickbot botnet. Symantec was part of a global partnership that secured a court order directing hosting providers to take down Trickbot’s infrastructure. Trickbot had spread prolifically across the internet for years and became one of the most commonly blocked types of malware, suggesting it was one of the world’s largest botnets. Alan is on the podcast to discuss some newly-published Symantec research into Seedworm, as the Iran-linked group continues to target organizations in the Middle East, while we also chat about some of the indictments that have recently been announced against various nation-state backed actors around the world. </itunes:summary><description>On this week’s Cyber Security Brief, Dick O’Brien and Brigid O’Gorman are joined by Symantec threat researchers Vikram Thakur and Alan Neville. Vikram discusses Symantec’s role in the cross-industry initiative to disrupt the Trickbot botnet. Symantec was part of a global partnership that secured a court order directing hosting providers to take down Trickbot’s infrastructure. Trickbot had spread prolifically across the internet for years and became one of the most commonly blocked types of malware, suggesting it was one of the world’s largest botnets. Alan is on the podcast to discuss some newly-published Symantec research into Seedworm, as the Iran-linked group continues to target organizations in the Middle East, while we also chat about some of the indictments that have recently been announced against various nation-state backed actors around the world. </description><content:encoded>On this week’s Cyber Security Brief, Dick O’Brien and Brigid O’Gorman are joined by Symantec threat researchers Vikram Thakur and Alan Neville. Vikram discusses Symantec’s role in the cross-industry initiative to disrupt the Trickbot botnet. Symantec was part of a global partnership that secured a court order directing hosting providers to take down Trickbot’s infrastructure. Trickbot had spread prolifically across the internet for years and became one of the most commonly blocked types of malware, suggesting it was one of the world’s largest botnets. Alan is on the podcast to discuss some newly-published Symantec research into Seedworm, as the Iran-linked group continues to target organizations in the Middle East, while we also chat about some of the indictments that have recently been announced against various nation-state backed actors around the world. </content:encoded><enclosure length="40041982" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Trickbot_Seedworm_S03E02.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Trickbot_Seedworm_S03E02.mp3</guid><pubDate>Thu, 22 Oct 2020 13:00:00 +0000</pubDate><itunes:duration>00:27:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>2</itunes:episode><itunes:season>3</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Round up: Financial sector threats, North Korean actors, WastedLocker and more</itunes:title><title>Round up: Financial sector threats, North Korean actors, WastedLocker and more</title><itunes:summary>We are back! Welcome to Season 3 of the Cyber Security Brief podcast, recording now from home. We will be with you every fortnight going forward and we are delighted to be back to tell you all about what is happening in the world of cyber security. In this episode, Dick O’Brien and Brigid O’Gorman discuss some of the projects they have been working on while the podcast was off air - threats against the financial sector, North Korean threat actors’ activity, the WastedLocker ransomware, and an attack linked to the Palmerworm APT group are all covered.</itunes:summary><description>We are back! Welcome to Season 3 of the Cyber Security Brief podcast, recording now from home. We will be with you every fortnight going forward and we are delighted to be back to tell you all about what is happening in the world of cyber security. In this episode, Dick O’Brien and Brigid O’Gorman discuss some of the projects they have been working on while the podcast was off air - threats against the financial sector, North Korean threat actors’ activity, the WastedLocker ransomware, and an attack linked to the Palmerworm APT group are all covered.</description><content:encoded>We are back! Welcome to Season 3 of the Cyber Security Brief podcast, recording now from home. We will be with you every fortnight going forward and we are delighted to be back to tell you all about what is happening in the world of cyber security. In this episode, Dick O’Brien and Brigid O’Gorman discuss some of the projects they have been working on while the podcast was off air - threats against the financial sector, North Korean threat actors’ activity, the WastedLocker ransomware, and an attack linked to the Palmerworm APT group are all covered.</content:encoded><enclosure length="29294360" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Weekly+Roundup+20-10-08.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Weekly+Roundup+20-10-08.mp3</guid><pubDate>Thu, 08 Oct 2020 13:00:00 +0000</pubDate><itunes:duration>00:20:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>1</itunes:episode><itunes:season>3</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Round-up: A whole host of vulnerabilities, and the hackers hacking other hackers</itunes:title><title>Round-up: A whole host of vulnerabilities, and the hackers hacking other hackers</title><itunes:summary>In this week's Cyber Security Brief podcast, Brigid O'Gorman and Dick O'Brien discuss some of the biggest infosec news stories of the last week, including, new vulnerabilities in Intel chips, and the Microsoft SMB protocol, as well as the Rowhammer vulnerability being back in the headlines. As well as this, there is an intricate phishing scam targeting Russian speakers that uses a chatbot to help you hand over your information, a mysterious Vietnam-based group is releasing Trojanized hacking tools to try and hack other hackers, the chief suspect thought to be behind the Deer[.]io online marketplace is arrested, and BEC scammers make the headlines once again.</itunes:summary><description>In this week's Cyber Security Brief podcast, Brigid O'Gorman and Dick O'Brien discuss some of the biggest infosec news stories of the last week, including, new vulnerabilities in Intel chips, and the Microsoft SMB protocol, as well as the Rowhammer vulnerability being back in the headlines. As well as this, there is an intricate phishing scam targeting Russian speakers that uses a chatbot to help you hand over your information, a mysterious Vietnam-based group is releasing Trojanized hacking tools to try and hack other hackers, the chief suspect thought to be behind the Deer[.]io online marketplace is arrested, and BEC scammers make the headlines once again.</description><content:encoded>In this week's Cyber Security Brief podcast, Brigid O'Gorman and Dick O'Brien discuss some of the biggest infosec news stories of the last week, including, new vulnerabilities in Intel chips, and the Microsoft SMB protocol, as well as the Rowhammer vulnerability being back in the headlines. As well as this, there is an intricate phishing scam targeting Russian speakers that uses a chatbot to help you hand over your information, a mysterious Vietnam-based group is releasing Trojanized hacking tools to try and hack other hackers, the chief suspect thought to be behind the Deer[.]io online marketplace is arrested, and BEC scammers make the headlines once again.</content:encoded><enclosure length="33391274" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E23+20-03-12.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E23+20-03-12.mp3</guid><pubDate>Thu, 12 Mar 2020 14:00:00 +0000</pubDate><itunes:duration>00:23:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>23</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Round-up: Ransomware criminals continue to innovate, and BEC scammers hit a high-profile victim</itunes:title><title>Round-up: Ransomware criminals continue to innovate, and BEC scammers hit a high-profile victim</title><itunes:summary>On this week’s Cyber Security Brief, we bring you a round-up of some of the biggest cyber security stories of the last 7 days. Among the topics up for discussion are the latest innovations of ransomware criminals, a data breach at a controversial facial recognition company, and an investigation by Brian Krebs into a series of cyber attacks on companies in France that led to an interesting conclusion. Also this week, a survey reveals that many government employees feel ill-prepared to cope with a cyber attack, and a judge on Shark Tank falls victim to BEC scammers. </itunes:summary><description>On this week’s Cyber Security Brief, we bring you a round-up of some of the biggest cyber security stories of the last 7 days. Among the topics up for discussion are the latest innovations of ransomware criminals, a data breach at a controversial facial recognition company, and an investigation by Brian Krebs into a series of cyber attacks on companies in France that led to an interesting conclusion. Also this week, a survey reveals that many government employees feel ill-prepared to cope with a cyber attack, and a judge on Shark Tank falls victim to BEC scammers. </description><content:encoded>On this week’s Cyber Security Brief, we bring you a round-up of some of the biggest cyber security stories of the last 7 days. Among the topics up for discussion are the latest innovations of ransomware criminals, a data breach at a controversial facial recognition company, and an investigation by Brian Krebs into a series of cyber attacks on companies in France that led to an interesting conclusion. Also this week, a survey reveals that many government employees feel ill-prepared to cope with a cyber attack, and a judge on Shark Tank falls victim to BEC scammers. </content:encoded><enclosure length="31239210" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E22+20-03-05.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E22+20-03-05.mp3</guid><pubDate>Thu, 05 Mar 2020 14:00:00 +0000</pubDate><itunes:duration>00:21:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>22</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Special Edition: The RSA Conference 2020</itunes:title><title>Special Edition: The RSA Conference 2020</title><itunes:summary>Candid Wueest and Dick O’Brien join the Cyber Security Brief from the RSA Conference in San Francisco this week. Both Candid and Dick were presenting at RSA this week – Dick on the topic of targeted ransomware, and Candid on the subject of formjacking. They fill us in on how their presentations went, the other interesting sessions they attended, what the big themes of the conference are this year, and their overall impressions of RSAC 2020.</itunes:summary><description>Candid Wueest and Dick O’Brien join the Cyber Security Brief from the RSA Conference in San Francisco this week. Both Candid and Dick were presenting at RSA this week – Dick on the topic of targeted ransomware, and Candid on the subject of formjacking. They fill us in on how their presentations went, the other interesting sessions they attended, what the big themes of the conference are this year, and their overall impressions of RSAC 2020.</description><content:encoded>Candid Wueest and Dick O’Brien join the Cyber Security Brief from the RSA Conference in San Francisco this week. Both Candid and Dick were presenting at RSA this week – Dick on the topic of targeted ransomware, and Candid on the subject of formjacking. They fill us in on how their presentations went, the other interesting sessions they attended, what the big themes of the conference are this year, and their overall impressions of RSAC 2020.</content:encoded><enclosure length="37921310" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E21_RSAC_2020_ransomware_formjacking.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E21_RSAC_2020_ransomware_formjacking.mp3</guid><pubDate>Thu, 27 Feb 2020 14:00:00 +0000</pubDate><itunes:duration>00:26:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>21</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Focus On: Pegasus spyware</itunes:title><title>Focus On: Pegasus spyware</title><itunes:summary>This week’s Cyber Security Brief is part of our regular Attack Group of the Month series, though this time around it’s more like Tool of the Month, as we take a closer look at Pegasus. Pegasus is a mobile spyware that is owned and sold by Israeli company the NSO Group, which says it is a legitimate tool that it sells exclusively to law enforcement and government agencies. However, there have been many cases where Pegasus appears to have been misused and has been found on the phones of journalists, activists and government critics in some countries. Symantec engineer Alexey Kleymenov has examined Pegasus extensively, and joins Dick O’Brien to discuss the malware and its technical abilities and sophistication.</itunes:summary><description>This week’s Cyber Security Brief is part of our regular Attack Group of the Month series, though this time around it’s more like Tool of the Month, as we take a closer look at Pegasus. Pegasus is a mobile spyware that is owned and sold by Israeli company the NSO Group, which says it is a legitimate tool that it sells exclusively to law enforcement and government agencies. However, there have been many cases where Pegasus appears to have been misused and has been found on the phones of journalists, activists and government critics in some countries. Symantec engineer Alexey Kleymenov has examined Pegasus extensively, and joins Dick O’Brien to discuss the malware and its technical abilities and sophistication.</description><content:encoded>This week’s Cyber Security Brief is part of our regular Attack Group of the Month series, though this time around it’s more like Tool of the Month, as we take a closer look at Pegasus. Pegasus is a mobile spyware that is owned and sold by Israeli company the NSO Group, which says it is a legitimate tool that it sells exclusively to law enforcement and government agencies. However, there have been many cases where Pegasus appears to have been misused and has been found on the phones of journalists, activists and government critics in some countries. Symantec engineer Alexey Kleymenov has examined Pegasus extensively, and joins Dick O’Brien to discuss the malware and its technical abilities and sophistication.</content:encoded><enclosure length="19198426" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E20+20-02-20.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E20+20-02-20.mp3</guid><pubDate>Thu, 20 Feb 2020 14:00:00 +0000</pubDate><itunes:duration>00:13:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>20</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Spotlight On: The healthcare cyber threat landscape</itunes:title><title>Spotlight On: The healthcare cyber threat landscape</title><itunes:summary>In this week’s Cyber Security Brief, we discuss the various cyber security concerns facing the healthcare sector. Ransomware attacks are now one of the biggest challenges facing organizations in the healthcare industry, while data breaches also remain a major concern. Meanwhile, developments in medtech and the increased connectivity of hospitals and other healthcare organizations pose new challenges for practitioners and patients. We discuss the main threats facing the sector, and the steps you can take to keep your organization safe. </itunes:summary><description>In this week’s Cyber Security Brief, we discuss the various cyber security concerns facing the healthcare sector. Ransomware attacks are now one of the biggest challenges facing organizations in the healthcare industry, while data breaches also remain a major concern. Meanwhile, developments in medtech and the increased connectivity of hospitals and other healthcare organizations pose new challenges for practitioners and patients. We discuss the main threats facing the sector, and the steps you can take to keep your organization safe. </description><content:encoded>In this week’s Cyber Security Brief, we discuss the various cyber security concerns facing the healthcare sector. Ransomware attacks are now one of the biggest challenges facing organizations in the healthcare industry, while data breaches also remain a major concern. Meanwhile, developments in medtech and the increased connectivity of hospitals and other healthcare organizations pose new challenges for practitioners and patients. We discuss the main threats facing the sector, and the steps you can take to keep your organization safe. </content:encoded><enclosure length="28697659" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E19+20-02-13.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E19+20-02-13.mp3</guid><pubDate>Thu, 13 Feb 2020 12:33:50 +0000</pubDate><itunes:duration>00:19:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>19</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Round-up: Traffic jams, increasing defenses, and shortening the Google Chrome ‘patch gap’</itunes:title><title>Round-up: Traffic jams, increasing defenses, and shortening the Google Chrome ‘patch gap’</title><itunes:summary>In this week’s edition of the Cyber Security Brief, Brigid O’Gorman, Candid Wueest and Dick O’Brien discuss the U.S. Department of Defense’s new cyber security framework for its contractors, how easy it was for a performance artist in Germany to cause a fake traffic jam on Google Maps, and the way the coronavirus outbreak is being exploited by cyber scammers. Also this week, Google halves its Chrome patch gap, Microsoft Teams gets knocked offline, and how bugs in Microsoft Azure could have allowed cloud servers to be hacked. </itunes:summary><description>In this week’s edition of the Cyber Security Brief, Brigid O’Gorman, Candid Wueest and Dick O’Brien discuss the U.S. Department of Defense’s new cyber security framework for its contractors, how easy it was for a performance artist in Germany to cause a fake traffic jam on Google Maps, and the way the coronavirus outbreak is being exploited by cyber scammers. Also this week, Google halves its Chrome patch gap, Microsoft Teams gets knocked offline, and how bugs in Microsoft Azure could have allowed cloud servers to be hacked. </description><content:encoded>In this week’s edition of the Cyber Security Brief, Brigid O’Gorman, Candid Wueest and Dick O’Brien discuss the U.S. Department of Defense’s new cyber security framework for its contractors, how easy it was for a performance artist in Germany to cause a fake traffic jam on Google Maps, and the way the coronavirus outbreak is being exploited by cyber scammers. Also this week, Google halves its Chrome patch gap, Microsoft Teams gets knocked offline, and how bugs in Microsoft Azure could have allowed cloud servers to be hacked. </content:encoded><enclosure length="29957021" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S01E18_Coronavirus_Google_DoD.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S01E18_Coronavirus_Google_DoD.mp3</guid><pubDate>Thu, 06 Feb 2020 14:00:00 +0000</pubDate><itunes:duration>00:20:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>18</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Round-up: Ransomware, vulnerabilities, and eavesdropping</itunes:title><title>Round-up: Ransomware, vulnerabilities, and eavesdropping</title><itunes:summary>In this week’s Cyber Security Brief, Candid Wueest and Brigid O’Gorman bring you a round-up of the biggest cyber security news stories of the last week. We discuss the Shlayer malware, the publication of exploits for a vulnerability in Windows Remote Desktop Gateway, and how attackers may be able to eavesdrop on your conference calls. Also this week, there were a whole slew of news stories about ransomware, so we discuss some of those as well. </itunes:summary><description>In this week’s Cyber Security Brief, Candid Wueest and Brigid O’Gorman bring you a round-up of the biggest cyber security news stories of the last week. We discuss the Shlayer malware, the publication of exploits for a vulnerability in Windows Remote Desktop Gateway, and how attackers may be able to eavesdrop on your conference calls. Also this week, there were a whole slew of news stories about ransomware, so we discuss some of those as well. </description><content:encoded>In this week’s Cyber Security Brief, Candid Wueest and Brigid O’Gorman bring you a round-up of the biggest cyber security news stories of the last week. We discuss the Shlayer malware, the publication of exploits for a vulnerability in Windows Remote Desktop Gateway, and how attackers may be able to eavesdrop on your conference calls. Also this week, there were a whole slew of news stories about ransomware, so we discuss some of those as well. </content:encoded><enclosure length="29623689" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E17+20-01-30.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E17+20-01-30.mp3</guid><pubDate>Thu, 30 Jan 2020 13:42:04 +0000</pubDate><itunes:duration>00:20:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>17</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Spotlight On: Software vulnerabilities and patch management</itunes:title><title>Spotlight On: Software vulnerabilities and patch management</title><itunes:summary>On this week’s Cyber Security Brief, we discuss a timely issue – the importance of patching software vulnerabilities and the necessity for organizations to have good patch management. We decided to cover this topic as it is something that has been much in the news recently: CVE-2020-0601, a vulnerability in Microsoft’s Windows CryptoAPI, that was reported to the software giant by the NSA and was described as “severe” by the security agency, has made many headlines in the last week. Vulnerabilities in software from Citrix, and in Pulse Secure VPN servers, which were first revealed in December and April 2019, respectively, were also in the news in the last week or so. The vulnerabilities in the Pulse VPN servers were patched back in April - but despite this they are suspected of having been exploited in several cyber attacks since then, demonstrating that patches are not always being applied in a timely fashion. We discuss why that might be, and a variety of other issues, in this podcast. </itunes:summary><description>On this week’s Cyber Security Brief, we discuss a timely issue – the importance of patching software vulnerabilities and the necessity for organizations to have good patch management. We decided to cover this topic as it is something that has been much in the news recently: CVE-2020-0601, a vulnerability in Microsoft’s Windows CryptoAPI, that was reported to the software giant by the NSA and was described as “severe” by the security agency, has made many headlines in the last week. Vulnerabilities in software from Citrix, and in Pulse Secure VPN servers, which were first revealed in December and April 2019, respectively, were also in the news in the last week or so. The vulnerabilities in the Pulse VPN servers were patched back in April - but despite this they are suspected of having been exploited in several cyber attacks since then, demonstrating that patches are not always being applied in a timely fashion. We discuss why that might be, and a variety of other issues, in this podcast. </description><content:encoded>On this week’s Cyber Security Brief, we discuss a timely issue – the importance of patching software vulnerabilities and the necessity for organizations to have good patch management. We decided to cover this topic as it is something that has been much in the news recently: CVE-2020-0601, a vulnerability in Microsoft’s Windows CryptoAPI, that was reported to the software giant by the NSA and was described as “severe” by the security agency, has made many headlines in the last week. Vulnerabilities in software from Citrix, and in Pulse Secure VPN servers, which were first revealed in December and April 2019, respectively, were also in the news in the last week or so. The vulnerabilities in the Pulse VPN servers were patched back in April - but despite this they are suspected of having been exploited in several cyber attacks since then, demonstrating that patches are not always being applied in a timely fashion. We discuss why that might be, and a variety of other issues, in this podcast. </content:encoded><enclosure length="29006118" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E16_Vulnerabilities_Patching.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E16_Vulnerabilities_Patching.mp3</guid><pubDate>Thu, 23 Jan 2020 13:55:00 +0000</pubDate><itunes:duration>00:20:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>16</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Spotlight On: Living off the land</itunes:title><title>Spotlight On: Living off the land</title><itunes:summary>On this week’s Cyber Security Brief, we discuss “living off the land”, where attackers use legitimate tools on your device or network for malicious purposes. Dick O’Brien is joined by Candid Wueest, who wrote a whitepaper on this very topic just before the holidays, to discuss the tools that are most commonly exploited by attackers using living off the land techniques, the prevalence of this kind of activity, and what organizations can do to protect themselves. As well as this, we give an overview of CVE-2020-0601, the vulnerability in the Windows CryptoAPI that was patched by Microsoft on Tuesday.</itunes:summary><description>On this week’s Cyber Security Brief, we discuss “living off the land”, where attackers use legitimate tools on your device or network for malicious purposes. Dick O’Brien is joined by Candid Wueest, who wrote a whitepaper on this very topic just before the holidays, to discuss the tools that are most commonly exploited by attackers using living off the land techniques, the prevalence of this kind of activity, and what organizations can do to protect themselves. As well as this, we give an overview of CVE-2020-0601, the vulnerability in the Windows CryptoAPI that was patched by Microsoft on Tuesday.</description><content:encoded>On this week’s Cyber Security Brief, we discuss “living off the land”, where attackers use legitimate tools on your device or network for malicious purposes. Dick O’Brien is joined by Candid Wueest, who wrote a whitepaper on this very topic just before the holidays, to discuss the tools that are most commonly exploited by attackers using living off the land techniques, the prevalence of this kind of activity, and what organizations can do to protect themselves. As well as this, we give an overview of CVE-2020-0601, the vulnerability in the Windows CryptoAPI that was patched by Microsoft on Tuesday.</content:encoded><enclosure length="31177095" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S01E15_Living_off_the_land_Microsoft.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S01E15_Living_off_the_land_Microsoft.mp3</guid><pubDate>Thu, 16 Jan 2020 14:00:00 +0000</pubDate><itunes:duration>00:21:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>15</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Spotlight On: Iranian cyber espionage activity</itunes:title><title>Spotlight On: Iranian cyber espionage activity</title><itunes:summary>On this week’s Cyber Security Brief, we decide to take a look at an issue that is very topical at the moment – Iranian cyber espionage activity. Dick O’Brien and Gavin O’Gorman discuss some past campaigns we have seen carried out by Iranian actors, and the kind of cyber capabilities the country has. Threat researcher Gavin gives his opinion on what is likely to happen next when it comes to cyber activity, and if we are likely to see any cyber attacks by Iranian actors targeting U.S. organisations.</itunes:summary><description>On this week’s Cyber Security Brief, we decide to take a look at an issue that is very topical at the moment – Iranian cyber espionage activity. Dick O’Brien and Gavin O’Gorman discuss some past campaigns we have seen carried out by Iranian actors, and the kind of cyber capabilities the country has. Threat researcher Gavin gives his opinion on what is likely to happen next when it comes to cyber activity, and if we are likely to see any cyber attacks by Iranian actors targeting U.S. organisations.</description><content:encoded>On this week’s Cyber Security Brief, we decide to take a look at an issue that is very topical at the moment – Iranian cyber espionage activity. Dick O’Brien and Gavin O’Gorman discuss some past campaigns we have seen carried out by Iranian actors, and the kind of cyber capabilities the country has. Threat researcher Gavin gives his opinion on what is likely to happen next when it comes to cyber activity, and if we are likely to see any cyber attacks by Iranian actors targeting U.S. organisations.</content:encoded><enclosure length="35828301" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E14_Iran_Cyber_Attacks.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E14_Iran_Cyber_Attacks.mp3</guid><pubDate>Thu, 09 Jan 2020 14:00:00 +0000</pubDate><itunes:duration>00:24:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>14</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Cyber Security Brief’s Review of the Year</itunes:title><title>Cyber Security Brief’s Review of the Year</title><itunes:summary>This week’s episode of the Cyber Security Brief is the last one of 2019, so we are taking a look back at some of the big stories of the year in the world of infosec. Brigid O’Gorman, Dick O’Brien and Candid Wueest discuss a range of topics, including targeted ransomware, living off the land, supply chain attacks, extortion scams, and formjacking. We are taking a short break for the holidays but will be back in January 2020 with lots more chat about the world of cyber security.</itunes:summary><description>This week’s episode of the Cyber Security Brief is the last one of 2019, so we are taking a look back at some of the big stories of the year in the world of infosec. Brigid O’Gorman, Dick O’Brien and Candid Wueest discuss a range of topics, including targeted ransomware, living off the land, supply chain attacks, extortion scams, and formjacking. We are taking a short break for the holidays but will be back in January 2020 with lots more chat about the world of cyber security.</description><content:encoded>This week’s episode of the Cyber Security Brief is the last one of 2019, so we are taking a look back at some of the big stories of the year in the world of infosec. Brigid O’Gorman, Dick O’Brien and Candid Wueest discuss a range of topics, including targeted ransomware, living off the land, supply chain attacks, extortion scams, and formjacking. We are taking a short break for the holidays but will be back in January 2020 with lots more chat about the world of cyber security.</content:encoded><enclosure length="38199263" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E13_19-12-19_Cyber_Security_Review_of_2019.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E13_19-12-19_Cyber_Security_Review_of_2019.mp3</guid><pubDate>Thu, 19 Dec 2019 14:00:00 +0000</pubDate><itunes:duration>00:26:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>13</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Spotlight On: Targeted ransomware – a major trend in 2019</itunes:title><title>Spotlight On: Targeted ransomware – a major trend in 2019</title><itunes:summary>On this week’s Cyber Security Brief, we turn the spotlight onto targeted ransomware – one of the most active threats we observed in 2019. Targeted ransomware has seen huge growth since the start of 2018, with 2019, in particular, seeing a big rise in the number of targeted ransomware families operating. We take a look at the reasons for this growth, outline the activities of some of the most interesting targeted ransomware families that have emerged in 2019, take you through how an attack like this works, and provider some essential tips to help you keep your business safe from targeted ransomware. </itunes:summary><description>On this week’s Cyber Security Brief, we turn the spotlight onto targeted ransomware – one of the most active threats we observed in 2019. Targeted ransomware has seen huge growth since the start of 2018, with 2019, in particular, seeing a big rise in the number of targeted ransomware families operating. We take a look at the reasons for this growth, outline the activities of some of the most interesting targeted ransomware families that have emerged in 2019, take you through how an attack like this works, and provider some essential tips to help you keep your business safe from targeted ransomware. </description><content:encoded>On this week’s Cyber Security Brief, we turn the spotlight onto targeted ransomware – one of the most active threats we observed in 2019. Targeted ransomware has seen huge growth since the start of 2018, with 2019, in particular, seeing a big rise in the number of targeted ransomware families operating. We take a look at the reasons for this growth, outline the activities of some of the most interesting targeted ransomware families that have emerged in 2019, take you through how an attack like this works, and provider some essential tips to help you keep your business safe from targeted ransomware. </content:encoded><enclosure length="33036941" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E12_Targeted_Ransomware_19-12-12.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E12_Targeted_Ransomware_19-12-12.mp3</guid><pubDate>Thu, 12 Dec 2019 14:00:00 +0000</pubDate><itunes:duration>00:22:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>12</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Attack Group of the Month: Shamoon – targeting the Middle East with disk-wiping malware</itunes:title><title>Attack Group of the Month: Shamoon – targeting the Middle East with disk-wiping malware</title><itunes:summary>On this week’s Cyber Security Brief podcast we are introducing a new feature – Attack Group of the Month. Every month we will bring in one of our expert threat researchers for a deep dive into the history, tactics, and techniques of notable attack groups, and discuss what you should do to keep your company safe from these sophisticated attackers. This week we look at Shamoon, an attack group that first appeared in 2012, causing waves when it wiped the disks on thousands of computers in two companies in Saudi Arabia. Threat researcher Gavin O’Gorman brings us through the history of the group, what makes it so interesting, and why he thinks we haven’t seen the last of Shamoon yet. </itunes:summary><description>On this week’s Cyber Security Brief podcast we are introducing a new feature – Attack Group of the Month. Every month we will bring in one of our expert threat researchers for a deep dive into the history, tactics, and techniques of notable attack groups, and discuss what you should do to keep your company safe from these sophisticated attackers. This week we look at Shamoon, an attack group that first appeared in 2012, causing waves when it wiped the disks on thousands of computers in two companies in Saudi Arabia. Threat researcher Gavin O’Gorman brings us through the history of the group, what makes it so interesting, and why he thinks we haven’t seen the last of Shamoon yet. </description><content:encoded>On this week’s Cyber Security Brief podcast we are introducing a new feature – Attack Group of the Month. Every month we will bring in one of our expert threat researchers for a deep dive into the history, tactics, and techniques of notable attack groups, and discuss what you should do to keep your company safe from these sophisticated attackers. This week we look at Shamoon, an attack group that first appeared in 2012, causing waves when it wiped the disks on thousands of computers in two companies in Saudi Arabia. Threat researcher Gavin O’Gorman brings us through the history of the group, what makes it so interesting, and why he thinks we haven’t seen the last of Shamoon yet. </content:encoded><enclosure length="37767147" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E11_Shamoon_19-12-05.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E11_Shamoon_19-12-05.mp3</guid><pubDate>Thu, 05 Dec 2019 14:00:00 +0000</pubDate><itunes:duration>00:26:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>11</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Spotlight On: BEC scams – an expensive threat</itunes:title><title>Spotlight On: BEC scams – an expensive threat</title><itunes:summary>On this week’s Cyber Security Brief, Dick O’Brien, Candid Wueest and Brigid O’Gorman focus on business email compromise (BEC) scams, which are a major issue for enterprises and organizations. The FBI has estimated that between June 2016 and July 2019 more than $26 billion was lost to BEC scams globally. Our experts discuss some recent examples of BEC scams, the common tactics and techniques many of these scams share, and the steps you can take to mitigate the danger to your business from these types of scams. &#13;
</itunes:summary><description>On this week’s Cyber Security Brief, Dick O’Brien, Candid Wueest and Brigid O’Gorman focus on business email compromise (BEC) scams, which are a major issue for enterprises and organizations. The FBI has estimated that between June 2016 and July 2019 more than $26 billion was lost to BEC scams globally. Our experts discuss some recent examples of BEC scams, the common tactics and techniques many of these scams share, and the steps you can take to mitigate the danger to your business from these types of scams. &#13;
</description><content:encoded>On this week’s Cyber Security Brief, Dick O’Brien, Candid Wueest and Brigid O’Gorman focus on business email compromise (BEC) scams, which are a major issue for enterprises and organizations. The FBI has estimated that between June 2016 and July 2019 more than $26 billion was lost to BEC scams globally. Our experts discuss some recent examples of BEC scams, the common tactics and techniques many of these scams share, and the steps you can take to mitigate the danger to your business from these types of scams. &#13;
</content:encoded><enclosure length="29432900" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E10_19-11-28_BEC_Scams.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E10_19-11-28_BEC_Scams.mp3</guid><pubDate>Thu, 28 Nov 2019 14:00:00 +0000</pubDate><itunes:duration>00:20:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>10</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Holiday shopping special: Scams to watch out for this Black Friday and Cyber Monday</itunes:title><title>Holiday shopping special: Scams to watch out for this Black Friday and Cyber Monday</title><itunes:summary>On this week’s Symantec Cyber Security Brief, we bring you a holiday shopping cyber security special in advance of Black Friday, Cyber Monday, and the holiday shopping period in general. We discuss the dangers people need to be aware of when shopping online, including formjacking, fake shops, and social media scams. We discuss common scams that try to trick victims using fake delivery notices, as well as point of sale malware, which is still a threat, even as more people move to doing their shopping online. </itunes:summary><description>On this week’s Symantec Cyber Security Brief, we bring you a holiday shopping cyber security special in advance of Black Friday, Cyber Monday, and the holiday shopping period in general. We discuss the dangers people need to be aware of when shopping online, including formjacking, fake shops, and social media scams. We discuss common scams that try to trick victims using fake delivery notices, as well as point of sale malware, which is still a threat, even as more people move to doing their shopping online. </description><content:encoded>On this week’s Symantec Cyber Security Brief, we bring you a holiday shopping cyber security special in advance of Black Friday, Cyber Monday, and the holiday shopping period in general. We discuss the dangers people need to be aware of when shopping online, including formjacking, fake shops, and social media scams. We discuss common scams that try to trick victims using fake delivery notices, as well as point of sale malware, which is still a threat, even as more people move to doing their shopping online. </content:encoded><enclosure length="32579864" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast_S02E09_Black_Friday_Shopping.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast_S02E09_Black_Friday_Shopping.mp3</guid><pubDate>Thu, 21 Nov 2019 14:00:00 +0000</pubDate><itunes:duration>00:22:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>9</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Privacy concerns, election campaign worries, and phish-y meeting invites</itunes:title><title>Privacy concerns, election campaign worries, and phish-y meeting invites</title><itunes:summary>On this week’s Symantec Cyber Security Brief, Dick O’Brien is joined by Brigid O’Gorman and Candid Wueest to discuss some of the big cyber security stories of the last week. This week, Ubiquiti customers are annoyed after a firmware update led to their routers sending information back to Ubiquiti HQ without their consent, a “sophisticated” attack on the UK Labour Party’s digital platforms causes consternation in the middle of an election campaign – but was it really that serious? Also, a (complicated) way to gain access to people’s Wi-Fi networks via Amazon’s Ring doorbell, a new ruling in the U.S. on whether or not border police are entitled to search your electronic devices when you’re entering the country, and beware of suspicious meeting invites. </itunes:summary><description>On this week’s Symantec Cyber Security Brief, Dick O’Brien is joined by Brigid O’Gorman and Candid Wueest to discuss some of the big cyber security stories of the last week. This week, Ubiquiti customers are annoyed after a firmware update led to their routers sending information back to Ubiquiti HQ without their consent, a “sophisticated” attack on the UK Labour Party’s digital platforms causes consternation in the middle of an election campaign – but was it really that serious? Also, a (complicated) way to gain access to people’s Wi-Fi networks via Amazon’s Ring doorbell, a new ruling in the U.S. on whether or not border police are entitled to search your electronic devices when you’re entering the country, and beware of suspicious meeting invites. </description><content:encoded>On this week’s Symantec Cyber Security Brief, Dick O’Brien is joined by Brigid O’Gorman and Candid Wueest to discuss some of the big cyber security stories of the last week. This week, Ubiquiti customers are annoyed after a firmware update led to their routers sending information back to Ubiquiti HQ without their consent, a “sophisticated” attack on the UK Labour Party’s digital platforms causes consternation in the middle of an election campaign – but was it really that serious? Also, a (complicated) way to gain access to people’s Wi-Fi networks via Amazon’s Ring doorbell, a new ruling in the U.S. on whether or not border police are entitled to search your electronic devices when you’re entering the country, and beware of suspicious meeting invites. </content:encoded><enclosure length="33167650" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+S02E08+19-11-14.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+S02E08+19-11-14.mp3</guid><pubDate>Thu, 14 Nov 2019 14:00:00 +0000</pubDate><itunes:duration>00:23:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>8</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Lasers, Bluekeep, and BEC scammers continue to cash in</itunes:title><title>Lasers, Bluekeep, and BEC scammers continue to cash in</title><itunes:summary>On this week’s Cyber Security Brief, Dick O’Brien is joined by Candid Wueest and Brigid O’Gorman to discuss the biggest cyber security news stories of the week. On this episode, we chat about how lasers could be used to hack your voice-controlled devices – including your phone, the Bluekeep attacks that have been spotted in the wild, and the ongoing repercussions surrounding the WhatsApp zero-day that was discovered in May. Also, BEC scammers cash in, the QSnatch malware hits thousands of NAS devices, and a new vulnerability in Microsoft Office for Mac.  </itunes:summary><description>On this week’s Cyber Security Brief, Dick O’Brien is joined by Candid Wueest and Brigid O’Gorman to discuss the biggest cyber security news stories of the week. On this episode, we chat about how lasers could be used to hack your voice-controlled devices – including your phone, the Bluekeep attacks that have been spotted in the wild, and the ongoing repercussions surrounding the WhatsApp zero-day that was discovered in May. Also, BEC scammers cash in, the QSnatch malware hits thousands of NAS devices, and a new vulnerability in Microsoft Office for Mac.  </description><content:encoded>On this week’s Cyber Security Brief, Dick O’Brien is joined by Candid Wueest and Brigid O’Gorman to discuss the biggest cyber security news stories of the week. On this episode, we chat about how lasers could be used to hack your voice-controlled devices – including your phone, the Bluekeep attacks that have been spotted in the wild, and the ongoing repercussions surrounding the WhatsApp zero-day that was discovered in May. Also, BEC scammers cash in, the QSnatch malware hits thousands of NAS devices, and a new vulnerability in Microsoft Office for Mac.  </content:encoded><enclosure length="33350612" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E07_WhatsApp_Lasers_BEC.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02E07_WhatsApp_Lasers_BEC.mp3</guid><pubDate>Thu, 07 Nov 2019 14:00:00 +0000</pubDate><itunes:duration>00:23:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>7</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Fancy Bear attack campaign, ransomware hits Johannesburg again, and malware hijacks Discord client</itunes:title><title>Fancy Bear attack campaign, ransomware hits Johannesburg again, and malware hijacks Discord client</title><itunes:summary>In this week’s Cyber Security Brief, Dick O’Brien is joined by Candid Wueest and Brigid O’Gorman to discuss the biggest infosec stories of the week. This week we discuss Fancy Bear’s campaign against at least 16 anti-doping and sporting organizations, yet another ransomware attack on Johannesburg, and the malware that was turning the Discord client into an info-stealing backdoor. Also this week, the security researcher who discovered they could hack other people’s pet feeders, and the man who still has access to the connected car he rented – and returned – several months ago.</itunes:summary><description>In this week’s Cyber Security Brief, Dick O’Brien is joined by Candid Wueest and Brigid O’Gorman to discuss the biggest infosec stories of the week. This week we discuss Fancy Bear’s campaign against at least 16 anti-doping and sporting organizations, yet another ransomware attack on Johannesburg, and the malware that was turning the Discord client into an info-stealing backdoor. Also this week, the security researcher who discovered they could hack other people’s pet feeders, and the man who still has access to the connected car he rented – and returned – several months ago.</description><content:encoded>In this week’s Cyber Security Brief, Dick O’Brien is joined by Candid Wueest and Brigid O’Gorman to discuss the biggest infosec stories of the week. This week we discuss Fancy Bear’s campaign against at least 16 anti-doping and sporting organizations, yet another ransomware attack on Johannesburg, and the malware that was turning the Discord client into an info-stealing backdoor. Also this week, the security researcher who discovered they could hack other people’s pet feeders, and the man who still has access to the connected car he rented – and returned – several months ago.</content:encoded><enclosure length="31512180" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+58+Fancy+Bear+IoT+Discord.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+58+Fancy+Bear+IoT+Discord.mp3</guid><pubDate>Thu, 31 Oct 2019 14:00:00 +0000</pubDate><itunes:duration>00:21:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>6</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>A second supply chain attack attempt against CCleaner, voice-controlled home assistants spying on owners, and dodgy mobile biometric authentication</itunes:title><title>A second supply chain attack attempt against CCleaner, voice-controlled home assistants spying on owners, and dodgy mobile biometric authentication</title><itunes:summary>In this week's Cyber Security Brief, Dick O'Brien and Candid Wueest discuss some of the biggest cyber security stories of the past week. Topics this week include a second supply chain attack attempt aimed at compromising CCleaner, how Amazon Alexa and Google Home devices can be used to spy on their owners using malicious third-party applications, problems for Samsung and Google arising from issues with biometric authentication on their mobile devices, and how a Chinese cyber-espionage group has been targeting SQL servers.</itunes:summary><description>In this week's Cyber Security Brief, Dick O'Brien and Candid Wueest discuss some of the biggest cyber security stories of the past week. Topics this week include a second supply chain attack attempt aimed at compromising CCleaner, how Amazon Alexa and Google Home devices can be used to spy on their owners using malicious third-party applications, problems for Samsung and Google arising from issues with biometric authentication on their mobile devices, and how a Chinese cyber-espionage group has been targeting SQL servers.</description><content:encoded>In this week's Cyber Security Brief, Dick O'Brien and Candid Wueest discuss some of the biggest cyber security stories of the past week. Topics this week include a second supply chain attack attempt aimed at compromising CCleaner, how Amazon Alexa and Google Home devices can be used to spy on their owners using malicious third-party applications, problems for Samsung and Google arising from issues with biometric authentication on their mobile devices, and how a Chinese cyber-espionage group has been targeting SQL servers.</content:encoded><enclosure length="31303622" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+57+19-10-24.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+57+19-10-24.mp3</guid><pubDate>Thu, 24 Oct 2019 11:03:40 +0000</pubDate><itunes:duration>00:21:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>5</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>An iTunes and iCloud zero-day, ATM malware, and the Sudo vulnerability</itunes:title><title>An iTunes and iCloud zero-day, ATM malware, and the Sudo vulnerability</title><itunes:summary>In this week’s Cyber Security Brief, Dick O’Brien is joined by Candid Wueest and Brigid O’Gorman to discuss the biggest cyber security stories of the week. In the mix this week, a zero-day in the Windows version of iTunes and iCloud, ATM malware, the Sudo vulnerability, and how it has been proved that you can insert spy chips into firewalls. Also, the stalker in Japan who used reflections in photos to track down his victim, and finally, the price paid for people’s private information on the deep and dark web.  </itunes:summary><description>In this week’s Cyber Security Brief, Dick O’Brien is joined by Candid Wueest and Brigid O’Gorman to discuss the biggest cyber security stories of the week. In the mix this week, a zero-day in the Windows version of iTunes and iCloud, ATM malware, the Sudo vulnerability, and how it has been proved that you can insert spy chips into firewalls. Also, the stalker in Japan who used reflections in photos to track down his victim, and finally, the price paid for people’s private information on the deep and dark web.  </description><content:encoded>In this week’s Cyber Security Brief, Dick O’Brien is joined by Candid Wueest and Brigid O’Gorman to discuss the biggest cyber security stories of the week. In the mix this week, a zero-day in the Windows version of iTunes and iCloud, ATM malware, the Sudo vulnerability, and how it has been proved that you can insert spy chips into firewalls. Also, the stalker in Japan who used reflections in photos to track down his victim, and finally, the price paid for people’s private information on the deep and dark web.  </content:encoded><enclosure length="38426876" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+56+19-10-17.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+56+19-10-17.mp3</guid><pubDate>Thu, 17 Oct 2019 13:00:00 +0000</pubDate><itunes:duration>00:26:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>4</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>A controversial Apple app, a far-reaching ruling from the ECJ, and many, many data breaches</itunes:title><title>A controversial Apple app, a far-reaching ruling from the ECJ, and many, many data breaches</title><itunes:summary>In this week’s Cyber Security Brief, Dick O’Brien is joined by Candid Wueest and Brigid O’Gorman to discuss some of the biggest cyber security stories of the last week. Topics on the agenda include: controversy over Apple allowing a police-tracking app to be carried on its App Store in Hong Kong, a ruling from the European Court of Justice that could have big implications for social media platforms, new technology that claims it can identify people through walls from their gait using just Wi-Fi receivers, and a whole lot of data breaches. Also, Candid tells us about the it-sa: IT Security Expo and Congress, which he is attending and presenting at in Nuremberg, Germany, this week.  </itunes:summary><description>In this week’s Cyber Security Brief, Dick O’Brien is joined by Candid Wueest and Brigid O’Gorman to discuss some of the biggest cyber security stories of the last week. Topics on the agenda include: controversy over Apple allowing a police-tracking app to be carried on its App Store in Hong Kong, a ruling from the European Court of Justice that could have big implications for social media platforms, new technology that claims it can identify people through walls from their gait using just Wi-Fi receivers, and a whole lot of data breaches. Also, Candid tells us about the it-sa: IT Security Expo and Congress, which he is attending and presenting at in Nuremberg, Germany, this week.  </description><content:encoded>In this week’s Cyber Security Brief, Dick O’Brien is joined by Candid Wueest and Brigid O’Gorman to discuss some of the biggest cyber security stories of the last week. Topics on the agenda include: controversy over Apple allowing a police-tracking app to be carried on its App Store in Hong Kong, a ruling from the European Court of Justice that could have big implications for social media platforms, new technology that claims it can identify people through walls from their gait using just Wi-Fi receivers, and a whole lot of data breaches. Also, Candid tells us about the it-sa: IT Security Expo and Congress, which he is attending and presenting at in Nuremberg, Germany, this week.  </content:encoded><enclosure length="32971894" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+55+Apple+Facebook+Hong+Kong.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+55+Apple+Facebook+Hong+Kong.mp3</guid><pubDate>Thu, 10 Oct 2019 13:00:00 +0000</pubDate><itunes:duration>00:22:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>3</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Deepfakes, disinformation, and the former NATO bunker housing a bulletproof hosting service</itunes:title><title>Deepfakes, disinformation, and the former NATO bunker housing a bulletproof hosting service</title><itunes:summary>In this week’s Cyber Security Brief, Dick O’Brien, Candid Wueest and Brigid O’Gorman discuss the high cost of ransomware, and the emergence of disinformation-as-a-service on underground markets. We also chat about researchers finding a way to steal data from encrypted PDFs, and the bulletproof hosting service housed in a former NATO bunker in Germany that was recently shut down by police. Finally, we discuss the issue of deepfake videos, the problems they could present, and the steps Google and others are taking to tackle them.</itunes:summary><description>In this week’s Cyber Security Brief, Dick O’Brien, Candid Wueest and Brigid O’Gorman discuss the high cost of ransomware, and the emergence of disinformation-as-a-service on underground markets. We also chat about researchers finding a way to steal data from encrypted PDFs, and the bulletproof hosting service housed in a former NATO bunker in Germany that was recently shut down by police. Finally, we discuss the issue of deepfake videos, the problems they could present, and the steps Google and others are taking to tackle them.</description><content:encoded>In this week’s Cyber Security Brief, Dick O’Brien, Candid Wueest and Brigid O’Gorman discuss the high cost of ransomware, and the emergence of disinformation-as-a-service on underground markets. We also chat about researchers finding a way to steal data from encrypted PDFs, and the bulletproof hosting service housed in a former NATO bunker in Germany that was recently shut down by police. Finally, we discuss the issue of deepfake videos, the problems they could present, and the steps Google and others are taking to tackle them.</content:encoded><enclosure length="33610572" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+Deepfakes+Disinformation+Ransomware.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+Deepfakes+Disinformation+Ransomware.mp3</guid><pubDate>Thu, 03 Oct 2019 13:00:00 +0000</pubDate><itunes:duration>00:23:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>2</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Tortoiseshell APT group, vBulletin zero-day, and Facebook suspends thousands of apps</itunes:title><title>Tortoiseshell APT group, vBulletin zero-day, and Facebook suspends thousands of apps</title><itunes:summary>We’re back! The Cyber Security Brief returns for season 2. In our first episode, Dick O’Brien is joined by Brigid O’Gorman and Gavin O’Gorman (no relation) to discuss our recent research into Tortoiseshell, an APT group we recently discovered using both custom and off-the-shelf malware to target IT providers in Saudi Arabia in what appear to be supply chain attacks with the end goal of compromising the IT providers’ customers. We also discuss the recently revealed vulnerability in vBulletin, the release of iOS 13, a ransomware attack on a healthcare facility in Wyoming, and Facebook suspending thousands of apps from its platform.</itunes:summary><description>We’re back! The Cyber Security Brief returns for season 2. In our first episode, Dick O’Brien is joined by Brigid O’Gorman and Gavin O’Gorman (no relation) to discuss our recent research into Tortoiseshell, an APT group we recently discovered using both custom and off-the-shelf malware to target IT providers in Saudi Arabia in what appear to be supply chain attacks with the end goal of compromising the IT providers’ customers. We also discuss the recently revealed vulnerability in vBulletin, the release of iOS 13, a ransomware attack on a healthcare facility in Wyoming, and Facebook suspending thousands of apps from its platform.</description><content:encoded>We’re back! The Cyber Security Brief returns for season 2. In our first episode, Dick O’Brien is joined by Brigid O’Gorman and Gavin O’Gorman (no relation) to discuss our recent research into Tortoiseshell, an APT group we recently discovered using both custom and off-the-shelf malware to target IT providers in Saudi Arabia in what appear to be supply chain attacks with the end goal of compromising the IT providers’ customers. We also discuss the recently revealed vulnerability in vBulletin, the release of iOS 13, a ransomware attack on a healthcare facility in Wyoming, and Facebook suspending thousands of apps from its platform.</content:encoded><enclosure length="33469922" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+53+Tortoiseshell+Facebook+vBulletin.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+53+Tortoiseshell+Facebook+vBulletin.mp3</guid><pubDate>Thu, 26 Sep 2019 13:00:00 +0000</pubDate><itunes:duration>00:23:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>1</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Cloud security, telecoms companies compromised, and can someone else access your Nest camera?</itunes:title><title>Cloud security, telecoms companies compromised, and can someone else access your Nest camera?</title><itunes:summary>In this week’s Cyber Security Brief, it’s episode 52, and the last one before we take a short summer break – we will be back with you in August, with more essential stories and trends from the world of cyber security. This week, we discuss the Cloud Security Threat Report that was recently released by Symantec, reports that APT10 compromised the networks of at least 10 telecoms companies, and the unusual circumstances that led to the arrest of a member of the Anonymous Belgium hacking group. Also, how a bug allowed the past owners of Nest cameras to spy on current owners, even after a factory reset. Finally, as the value of Bitcoin surges again, we have two cryptocurrency-related stories as two brothers are arrested in relation to the massive Bitfinex hack that occurred in 2016, and a new coinminer is emulating Linux to target both Windows and Mac systems.&#13;
&#13;
Don’t forget, while we are off air, we will still be posting blogs and tweets, so make sure to follow us on Twitter (@ThreatIntel), and to read our blogs at https://www.symantec.com/blogs/threat-intelligence and on Medium at https://medium.com/threat-intel. &#13;
</itunes:summary><description>In this week’s Cyber Security Brief, it’s episode 52, and the last one before we take a short summer break – we will be back with you in August, with more essential stories and trends from the world of cyber security. This week, we discuss the Cloud Security Threat Report that was recently released by Symantec, reports that APT10 compromised the networks of at least 10 telecoms companies, and the unusual circumstances that led to the arrest of a member of the Anonymous Belgium hacking group. Also, how a bug allowed the past owners of Nest cameras to spy on current owners, even after a factory reset. Finally, as the value of Bitcoin surges again, we have two cryptocurrency-related stories as two brothers are arrested in relation to the massive Bitfinex hack that occurred in 2016, and a new coinminer is emulating Linux to target both Windows and Mac systems.&#13;
&#13;
Don’t forget, while we are off air, we will still be posting blogs and tweets, so make sure to follow us on Twitter (@ThreatIntel), and to read our blogs at https://www.symantec.com/blogs/threat-intelligence and on Medium at https://medium.com/threat-intel. &#13;
</description><content:encoded>In this week’s Cyber Security Brief, it’s episode 52, and the last one before we take a short summer break – we will be back with you in August, with more essential stories and trends from the world of cyber security. This week, we discuss the Cloud Security Threat Report that was recently released by Symantec, reports that APT10 compromised the networks of at least 10 telecoms companies, and the unusual circumstances that led to the arrest of a member of the Anonymous Belgium hacking group. Also, how a bug allowed the past owners of Nest cameras to spy on current owners, even after a factory reset. Finally, as the value of Bitcoin surges again, we have two cryptocurrency-related stories as two brothers are arrested in relation to the massive Bitfinex hack that occurred in 2016, and a new coinminer is emulating Linux to target both Windows and Mac systems.&#13;
&#13;
Don’t forget, while we are off air, we will still be posting blogs and tweets, so make sure to follow us on Twitter (@ThreatIntel), and to read our blogs at https://www.symantec.com/blogs/threat-intelligence and on Medium at https://medium.com/threat-intel. &#13;
</content:encoded><enclosure length="27166298" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+52+19-06-27.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+52+19-06-27.mp3</guid><pubDate>Thu, 27 Jun 2019 09:50:04 +0000</pubDate><itunes:duration>00:18:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>52</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Waterbug, “smart” TVs, and BEC scam hits Canadian city</itunes:title><title>Waterbug, “smart” TVs, and BEC scam hits Canadian city</title><itunes:summary>In this week’s Cyber Security Brief podcast, we discuss the drama that ensued when Samsung tweeted about scanning their smart TVs for malware, a city in Canada lost CA$500,000 to a BEC scam, and three universities in the U.S. revealed in the same week that they were hit by data breaches. Also, we discuss new research just published by Symantec into the Waterbug/Turla group, and two different Android threats that were in the news this week.</itunes:summary><description>In this week’s Cyber Security Brief podcast, we discuss the drama that ensued when Samsung tweeted about scanning their smart TVs for malware, a city in Canada lost CA$500,000 to a BEC scam, and three universities in the U.S. revealed in the same week that they were hit by data breaches. Also, we discuss new research just published by Symantec into the Waterbug/Turla group, and two different Android threats that were in the news this week.</description><content:encoded>In this week’s Cyber Security Brief podcast, we discuss the drama that ensued when Samsung tweeted about scanning their smart TVs for malware, a city in Canada lost CA$500,000 to a BEC scam, and three universities in the U.S. revealed in the same week that they were hit by data breaches. Also, we discuss new research just published by Symantec into the Waterbug/Turla group, and two different Android threats that were in the news this week.</content:encoded><enclosure length="35202520" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+51+19-06-20.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+51+19-06-20.mp3</guid><pubDate>Thu, 20 Jun 2019 11:22:47 +0000</pubDate><itunes:duration>00:24:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>51</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Bug bounties, bad passwords, and Radiohead</itunes:title><title>Bug bounties, bad passwords, and Radiohead</title><itunes:summary>On this week’s Cyber Security Brief, it's episode 50! We discuss the EU’s bug bounty program, bad password security practice, and why “secure” websites are becomingly increasingly untrustworthy. We also chat about the start-up that hacked its own customers’ cryptocurrency wallets – in order to safeguard their funds, a further update on the RDP vulnerability we’ve discussed previously, and how the Spanish soccer league La Liga was misusing its mobile app. Finally, the story of how Radiohead called the bluff of a ransomware criminal. </itunes:summary><description>On this week’s Cyber Security Brief, it's episode 50! We discuss the EU’s bug bounty program, bad password security practice, and why “secure” websites are becomingly increasingly untrustworthy. We also chat about the start-up that hacked its own customers’ cryptocurrency wallets – in order to safeguard their funds, a further update on the RDP vulnerability we’ve discussed previously, and how the Spanish soccer league La Liga was misusing its mobile app. Finally, the story of how Radiohead called the bluff of a ransomware criminal. </description><content:encoded>On this week’s Cyber Security Brief, it's episode 50! We discuss the EU’s bug bounty program, bad password security practice, and why “secure” websites are becomingly increasingly untrustworthy. We also chat about the start-up that hacked its own customers’ cryptocurrency wallets – in order to safeguard their funds, a further update on the RDP vulnerability we’ve discussed previously, and how the Spanish soccer league La Liga was misusing its mobile app. Finally, the story of how Radiohead called the bluff of a ransomware criminal. </content:encoded><enclosure length="31202746" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+50+19-06-13.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+50+19-06-13.mp3</guid><pubDate>Thu, 13 Jun 2019 10:52:46 +0000</pubDate><itunes:duration>00:21:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>50</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Twitterbots, ransomware retirements, and email mishaps</itunes:title><title>Twitterbots, ransomware retirements, and email mishaps</title><itunes:summary>On this week’s Cyber Security Brief, we chat about our report looking into the Internet Research Agency's disinformation campaign targeting the 2016 US presidential election. We also talk about the apparent retirement of the operators behind GandCrab, and red faces in both the New Zealand government and the Dutch Data Protection Authority.</itunes:summary><description>On this week’s Cyber Security Brief, we chat about our report looking into the Internet Research Agency's disinformation campaign targeting the 2016 US presidential election. We also talk about the apparent retirement of the operators behind GandCrab, and red faces in both the New Zealand government and the Dutch Data Protection Authority.</description><content:encoded>On this week’s Cyber Security Brief, we chat about our report looking into the Internet Research Agency's disinformation campaign targeting the 2016 US presidential election. We also talk about the apparent retirement of the operators behind GandCrab, and red faces in both the New Zealand government and the Dutch Data Protection Authority.</content:encoded><enclosure length="27549646" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+49+19-06-05.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+49+19-06-05.mp3</guid><pubDate>Thu, 06 Jun 2019 13:08:10 +0000</pubDate><itunes:duration>00:19:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>49</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Tube users’ data to be collected, Baltimore ransomware attack continues to cause problems, and the latest on the BlueKeep vulnerability</itunes:title><title>Tube users’ data to be collected, Baltimore ransomware attack continues to cause problems, and the latest on the BlueKeep vulnerability</title><itunes:summary>On this week’s Cyber Security Brief podcast, Candid Wueest and Dick O’Brien discuss Transport for London’s plans to start collecting data about the customers using its Wi-Fi, and what that might mean for people’s privacy. Also, the ongoing repercussions of the ransomware attack that hit the U.S. city of Baltimore, including revelations about the use of the EternalBlue tool by the attackers, plus an update on activity surrounding the BlueKeep RDP vulnerability that was patched by Microsoft a few weeks ago. Also this week, the teen who appeared in court in Australia charged with hacking Apple, and the latest Bitcoin scams doing the rounds online.  </itunes:summary><description>On this week’s Cyber Security Brief podcast, Candid Wueest and Dick O’Brien discuss Transport for London’s plans to start collecting data about the customers using its Wi-Fi, and what that might mean for people’s privacy. Also, the ongoing repercussions of the ransomware attack that hit the U.S. city of Baltimore, including revelations about the use of the EternalBlue tool by the attackers, plus an update on activity surrounding the BlueKeep RDP vulnerability that was patched by Microsoft a few weeks ago. Also this week, the teen who appeared in court in Australia charged with hacking Apple, and the latest Bitcoin scams doing the rounds online.  </description><content:encoded>On this week’s Cyber Security Brief podcast, Candid Wueest and Dick O’Brien discuss Transport for London’s plans to start collecting data about the customers using its Wi-Fi, and what that might mean for people’s privacy. Also, the ongoing repercussions of the ransomware attack that hit the U.S. city of Baltimore, including revelations about the use of the EternalBlue tool by the attackers, plus an update on activity surrounding the BlueKeep RDP vulnerability that was patched by Microsoft a few weeks ago. Also this week, the teen who appeared in court in Australia charged with hacking Apple, and the latest Bitcoin scams doing the rounds online.  </content:encoded><enclosure length="30881478" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+48+19-05-30.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+48+19-05-30.mp3</guid><pubDate>Thu, 30 May 2019 10:26:00 +0000</pubDate><itunes:duration>00:21:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>48</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>BlueKeep bug, ransomware “recovery”, and the dismantling of the GozNym network</itunes:title><title>BlueKeep bug, ransomware “recovery”, and the dismantling of the GozNym network</title><itunes:summary>In this week’s Cyber Security Brief podcast, we discuss the government employee who was charged with using his work IT systems to mine cryptocurrency, how Google is scanning your emails to collect information about your purchases, and the proof of concept exploits that have been created for the BlueKeep bug. We also chat about ransomware “recovery” services that are just paying the ransom, the dismantling of the GozNym network, and how Intel CPUs have been impacted by new MDS side-channel attacks.</itunes:summary><description>In this week’s Cyber Security Brief podcast, we discuss the government employee who was charged with using his work IT systems to mine cryptocurrency, how Google is scanning your emails to collect information about your purchases, and the proof of concept exploits that have been created for the BlueKeep bug. We also chat about ransomware “recovery” services that are just paying the ransom, the dismantling of the GozNym network, and how Intel CPUs have been impacted by new MDS side-channel attacks.</description><content:encoded>In this week’s Cyber Security Brief podcast, we discuss the government employee who was charged with using his work IT systems to mine cryptocurrency, how Google is scanning your emails to collect information about your purchases, and the proof of concept exploits that have been created for the BlueKeep bug. We also chat about ransomware “recovery” services that are just paying the ransom, the dismantling of the GozNym network, and how Intel CPUs have been impacted by new MDS side-channel attacks.</content:encoded><enclosure length="30402458" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+47+19-05-23.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+47+19-05-23.mp3</guid><pubDate>Thu, 23 May 2019 13:00:00 +0000</pubDate><itunes:duration>00:21:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>47</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>GDPR Special: The Impact of the Regulation One Year On</itunes:title><title>GDPR Special: The Impact of the Regulation One Year On</title><itunes:summary>In this week’s Cyber Security Brief podcast, we mark the one-year anniversary of the introduction of the General Data Protection Regulation – more commonly known as GDPR. To mark the introduction of GDPR, Brigid O’Gorman talks to Zoltan Precsenyi, Symantec’s director of GDPR strategy. We discuss the impact of the introduction of GDPR on companies and members of the public, whether or not the regulation is fulfilling its stated purpose, and the new data protection and privacy challenges that are likely to face companies in the future.</itunes:summary><description>In this week’s Cyber Security Brief podcast, we mark the one-year anniversary of the introduction of the General Data Protection Regulation – more commonly known as GDPR. To mark the introduction of GDPR, Brigid O’Gorman talks to Zoltan Precsenyi, Symantec’s director of GDPR strategy. We discuss the impact of the introduction of GDPR on companies and members of the public, whether or not the regulation is fulfilling its stated purpose, and the new data protection and privacy challenges that are likely to face companies in the future.</description><content:encoded>In this week’s Cyber Security Brief podcast, we mark the one-year anniversary of the introduction of the General Data Protection Regulation – more commonly known as GDPR. To mark the introduction of GDPR, Brigid O’Gorman talks to Zoltan Precsenyi, Symantec’s director of GDPR strategy. We discuss the impact of the introduction of GDPR on companies and members of the public, whether or not the regulation is fulfilling its stated purpose, and the new data protection and privacy challenges that are likely to face companies in the future.</content:encoded><enclosure length="36690594" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+46+GDPR.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+46+GDPR.mp3</guid><pubDate>Wed, 15 May 2019 11:22:11 +0000</pubDate><itunes:duration>00:25:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>46</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Buckeye’s use of Equation group tools pre Shadow Brokers leak, IoT security, and targeted ransomware</itunes:title><title>Buckeye’s use of Equation group tools pre Shadow Brokers leak, IoT security, and targeted ransomware</title><itunes:summary>On this week’s Cyber Security Brief podcast, we discuss our newly-released research into the Buckeye espionage group, and its use of Equation group tools prior to the Shadow Brokers leak. Dick O’Brien is joined by Symantec analyst Sylvester Segura to discuss the findings and to share more details about Symantec’s investigation into this activity. Also this week, we chat about the growing threat of targeted ransomware, and look at what the UK government is planning to do to improve the security of IoT devices.</itunes:summary><description>On this week’s Cyber Security Brief podcast, we discuss our newly-released research into the Buckeye espionage group, and its use of Equation group tools prior to the Shadow Brokers leak. Dick O’Brien is joined by Symantec analyst Sylvester Segura to discuss the findings and to share more details about Symantec’s investigation into this activity. Also this week, we chat about the growing threat of targeted ransomware, and look at what the UK government is planning to do to improve the security of IoT devices.</description><content:encoded>On this week’s Cyber Security Brief podcast, we discuss our newly-released research into the Buckeye espionage group, and its use of Equation group tools prior to the Shadow Brokers leak. Dick O’Brien is joined by Symantec analyst Sylvester Segura to discuss the findings and to share more details about Symantec’s investigation into this activity. Also this week, we chat about the growing threat of targeted ransomware, and look at what the UK government is planning to do to improve the security of IoT devices.</content:encoded><enclosure length="28623366" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+45+Buckeye+Equation+Group+Shadow+Brokers.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+45+Buckeye+Equation+Group+Shadow+Brokers.mp3</guid><pubDate>Thu, 09 May 2019 11:22:46 +0000</pubDate><itunes:duration>00:19:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>45</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Beapy cryptojacking worm, Emotet’s new hiding technique, and set-top box dangers</itunes:title><title>Beapy cryptojacking worm, Emotet’s new hiding technique, and set-top box dangers</title><itunes:summary>On this week’s Cyber Security Brief podcast, we discuss our recently published research into the Beapy cryptojacking worm, which is using the EternalBlue exploit to spread, and is primarily impacting enterprises in China. We also talk about data breaches, the dangers your set-top box might pose, why some GPS apps need to upgrade their security, and what the Emotet criminals are up to now.</itunes:summary><description>On this week’s Cyber Security Brief podcast, we discuss our recently published research into the Beapy cryptojacking worm, which is using the EternalBlue exploit to spread, and is primarily impacting enterprises in China. We also talk about data breaches, the dangers your set-top box might pose, why some GPS apps need to upgrade their security, and what the Emotet criminals are up to now.</description><content:encoded>On this week’s Cyber Security Brief podcast, we discuss our recently published research into the Beapy cryptojacking worm, which is using the EternalBlue exploit to spread, and is primarily impacting enterprises in China. We also talk about data breaches, the dangers your set-top box might pose, why some GPS apps need to upgrade their security, and what the Emotet criminals are up to now.</content:encoded><enclosure length="34638104" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+44+19-05-02.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+44+19-05-02.mp3</guid><pubDate>Thu, 02 May 2019 13:22:34 +0000</pubDate><itunes:duration>00:24:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>44</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Interview: Martijn Grooten, Editor, Virus Bulletin</itunes:title><title>Interview: Martijn Grooten, Editor, Virus Bulletin</title><itunes:summary>On this week’s Cyber Security Brief podcast, we are joined by Martijn Grooten, editor of Virus Bulletin. We discuss Martijn’s career and how he ended up in his role at Virus Bulletin, as well as the threats that need tackling on the current cyber security landscape. We also take a look at the email space, and the way threats there have developed.</itunes:summary><description>On this week’s Cyber Security Brief podcast, we are joined by Martijn Grooten, editor of Virus Bulletin. We discuss Martijn’s career and how he ended up in his role at Virus Bulletin, as well as the threats that need tackling on the current cyber security landscape. We also take a look at the email space, and the way threats there have developed.</description><content:encoded>On this week’s Cyber Security Brief podcast, we are joined by Martijn Grooten, editor of Virus Bulletin. We discuss Martijn’s career and how he ended up in his role at Virus Bulletin, as well as the threats that need tackling on the current cyber security landscape. We also take a look at the email space, and the way threats there have developed.</content:encoded><enclosure length="28015398" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+43+19-04-25.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+43+19-04-25.mp3</guid><pubDate>Wed, 24 Apr 2019 14:13:33 +0000</pubDate><itunes:duration>00:19:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>43</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Symantec’s role in Bayrob convictions, Silk Road 2.0 founder jailed, and who’s listening to your Alexa recordings?</itunes:title><title>Symantec’s role in Bayrob convictions, Silk Road 2.0 founder jailed, and who’s listening to your Alexa recordings?</title><itunes:summary>On this week’s Cyber Security Brief, we discuss the conviction of two members of the Bayrob gang – and the role Symantec played in their capture and conviction. Also, the founder of Silk Road 2.0 is sentenced to jail time in the UK, the personal data of thousands of law enforcement personnel is reportedly published online by a hacking group, and we discuss the Windows Tiles sub-domain takeover. Finally, when you’re talking to your smart speaker, who hears what you say?</itunes:summary><description>On this week’s Cyber Security Brief, we discuss the conviction of two members of the Bayrob gang – and the role Symantec played in their capture and conviction. Also, the founder of Silk Road 2.0 is sentenced to jail time in the UK, the personal data of thousands of law enforcement personnel is reportedly published online by a hacking group, and we discuss the Windows Tiles sub-domain takeover. Finally, when you’re talking to your smart speaker, who hears what you say?</description><content:encoded>On this week’s Cyber Security Brief, we discuss the conviction of two members of the Bayrob gang – and the role Symantec played in their capture and conviction. Also, the founder of Silk Road 2.0 is sentenced to jail time in the UK, the personal data of thousands of law enforcement personnel is reportedly published online by a hacking group, and we discuss the Windows Tiles sub-domain takeover. Finally, when you’re talking to your smart speaker, who hears what you say?</content:encoded><enclosure length="33913822" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+42+19-04-18.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+42+19-04-18.mp3</guid><pubDate>Thu, 18 Apr 2019 11:18:27 +0000</pubDate><itunes:duration>00:23:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>42</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Hotel booking privacy, dark marketplace selling your digital fingerprint, and Mar-a-Lago intruder update</itunes:title><title>Hotel booking privacy, dark marketplace selling your digital fingerprint, and Mar-a-Lago intruder update</title><itunes:summary>On this week’s Cyber Security Brief podcast, we discuss our new research into the privacy of your hotel booking details, and how we found that two in three hotel websites leak guest booking details and allow access to personal data. We also have an update on the case of the Chinese national who tried to gain access to President Trump’s Mar-a-Lago resort while carrying a malware-laden thumb drive. We also discuss a complaint against audio equipment maker Sonos in the UK alleging it is coercing customers into surrendering an excessive amount of personal information, and the discovery of a dark marketplace called Genesis that is selling the digital fingerprints of thousands of people.</itunes:summary><description>On this week’s Cyber Security Brief podcast, we discuss our new research into the privacy of your hotel booking details, and how we found that two in three hotel websites leak guest booking details and allow access to personal data. We also have an update on the case of the Chinese national who tried to gain access to President Trump’s Mar-a-Lago resort while carrying a malware-laden thumb drive. We also discuss a complaint against audio equipment maker Sonos in the UK alleging it is coercing customers into surrendering an excessive amount of personal information, and the discovery of a dark marketplace called Genesis that is selling the digital fingerprints of thousands of people.</description><content:encoded>On this week’s Cyber Security Brief podcast, we discuss our new research into the privacy of your hotel booking details, and how we found that two in three hotel websites leak guest booking details and allow access to personal data. We also have an update on the case of the Chinese national who tried to gain access to President Trump’s Mar-a-Lago resort while carrying a malware-laden thumb drive. We also discuss a complaint against audio equipment maker Sonos in the UK alleging it is coercing customers into surrendering an excessive amount of personal information, and the discovery of a dark marketplace called Genesis that is selling the digital fingerprints of thousands of people.</content:encoded><enclosure length="33668300" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+41+19-04-11.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+41+19-04-11.mp3</guid><pubDate>Thu, 11 Apr 2019 13:00:00 +0000</pubDate><itunes:duration>00:23:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>41</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Malware sneaked onto Trump property, Albany ransomware attack, and Tesla tricked</itunes:title><title>Malware sneaked onto Trump property, Albany ransomware attack, and Tesla tricked</title><itunes:summary>On this week’s Cyber Security Brief, we discuss the strange story of the Chinese woman who was apprehended after attempting to sneak into President Donald Trump’s Mar-a-Lago resort with a malware-infected thumb drive. We also discuss the researchers who tricked a Tesla, a ransomware attack on the city of Albany, and the latest tricks being used by scammers to get you to click on annoying pop-up ads.</itunes:summary><description>On this week’s Cyber Security Brief, we discuss the strange story of the Chinese woman who was apprehended after attempting to sneak into President Donald Trump’s Mar-a-Lago resort with a malware-infected thumb drive. We also discuss the researchers who tricked a Tesla, a ransomware attack on the city of Albany, and the latest tricks being used by scammers to get you to click on annoying pop-up ads.</description><content:encoded>On this week’s Cyber Security Brief, we discuss the strange story of the Chinese woman who was apprehended after attempting to sneak into President Donald Trump’s Mar-a-Lago resort with a malware-infected thumb drive. We also discuss the researchers who tricked a Tesla, a ransomware attack on the city of Albany, and the latest tricks being used by scammers to get you to click on annoying pop-up ads.</content:encoded><enclosure length="28694730" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+40+19-04-04.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+40+19-04-04.mp3</guid><pubDate>Thu, 04 Apr 2019 11:41:44 +0000</pubDate><itunes:duration>00:19:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>40</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Elfin research, ASUS software supply chain attack, insider threats, and mobile security</itunes:title><title>Elfin research, ASUS software supply chain attack, insider threats, and mobile security</title><itunes:summary>On this week’s Cyber Security Brief podcast, we discuss our new research into the Elfin espionage group, which we have seen targeting multiple organisations in Saudi Arabia and the U.S. We also talk about one of the big stories of the last week – ASUS’ software update system being hijacked to send out malicious updates, as well as discussing the ongoing issue of insider threats, and some new research into how mobile apps could be compromising your privacy and online security. </itunes:summary><description>On this week’s Cyber Security Brief podcast, we discuss our new research into the Elfin espionage group, which we have seen targeting multiple organisations in Saudi Arabia and the U.S. We also talk about one of the big stories of the last week – ASUS’ software update system being hijacked to send out malicious updates, as well as discussing the ongoing issue of insider threats, and some new research into how mobile apps could be compromising your privacy and online security. </description><content:encoded>On this week’s Cyber Security Brief podcast, we discuss our new research into the Elfin espionage group, which we have seen targeting multiple organisations in Saudi Arabia and the U.S. We also talk about one of the big stories of the last week – ASUS’ software update system being hijacked to send out malicious updates, as well as discussing the ongoing issue of insider threats, and some new research into how mobile apps could be compromising your privacy and online security. </content:encoded><enclosure length="32775526" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+39+19-03-28.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+39+19-03-28.mp3</guid><pubDate>Thu, 28 Mar 2019 14:00:00 +0000</pubDate><itunes:duration>00:22:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>39</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Interview: Neil Jenkins, Chief Analytic Officer, Cyber Threat Alliance</itunes:title><title>Interview: Neil Jenkins, Chief Analytic Officer, Cyber Threat Alliance</title><itunes:summary>In today’s Cyber Security Brief, Dick O’Brien is joined by Neil Jenkins, the Chief Analytic Officer at the Cyber Threat Alliance (CTA). The CTA brings together various vendors in the cyber security community to help them better protect their customers and the public at large. Neil tells Dick about the aims of the CTA, its achievements and challenges so far, and the alliance’s plans for the future.</itunes:summary><description>In today’s Cyber Security Brief, Dick O’Brien is joined by Neil Jenkins, the Chief Analytic Officer at the Cyber Threat Alliance (CTA). The CTA brings together various vendors in the cyber security community to help them better protect their customers and the public at large. Neil tells Dick about the aims of the CTA, its achievements and challenges so far, and the alliance’s plans for the future.</description><content:encoded>In today’s Cyber Security Brief, Dick O’Brien is joined by Neil Jenkins, the Chief Analytic Officer at the Cyber Threat Alliance (CTA). The CTA brings together various vendors in the cyber security community to help them better protect their customers and the public at large. Neil tells Dick about the aims of the CTA, its achievements and challenges so far, and the alliance’s plans for the future.</content:encoded><enclosure length="34968912" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+38+19-03-21.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+38+19-03-21.mp3</guid><pubDate>Thu, 21 Mar 2019 12:59:42 +0000</pubDate><itunes:duration>00:24:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>38</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Highlights from RSA Conference 2019</itunes:title><title>Highlights from RSA Conference 2019</title><itunes:summary>In this week's Cyber Security Brief, we chat about some of the highlights from this year's RSA conference including zero trust security, tackling fake news, the impending 5G network, IoT security, and a Symantec demonstration showing how much damage attackers can carry out in under seven minutes. </itunes:summary><description>In this week's Cyber Security Brief, we chat about some of the highlights from this year's RSA conference including zero trust security, tackling fake news, the impending 5G network, IoT security, and a Symantec demonstration showing how much damage attackers can carry out in under seven minutes. </description><content:encoded>In this week's Cyber Security Brief, we chat about some of the highlights from this year's RSA conference including zero trust security, tackling fake news, the impending 5G network, IoT security, and a Symantec demonstration showing how much damage attackers can carry out in under seven minutes. </content:encoded><enclosure length="46069052" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+37+19-03-14.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+37+19-03-14.mp3</guid><pubDate>Thu, 14 Mar 2019 14:58:53 +0000</pubDate><itunes:duration>00:31:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>37</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>ISTR Special: Enterprise</itunes:title><title>ISTR Special: Enterprise</title><itunes:summary>This week’s Cyber Security Brief is the second of two special episodes delving into the findings of Symantec’s Internet Security Threat Report (ISTR). The ISTR uses Symantec’s broad intelligence sources, researchers and analysts to bring you an insight into the key events and trends of 12 months in cyber security. In this episode, Dick O’Brien, Brigid O’Gorman, and Candid Wueest discuss some of the events and trends that affected enterprises the most in 2018.</itunes:summary><description>This week’s Cyber Security Brief is the second of two special episodes delving into the findings of Symantec’s Internet Security Threat Report (ISTR). The ISTR uses Symantec’s broad intelligence sources, researchers and analysts to bring you an insight into the key events and trends of 12 months in cyber security. In this episode, Dick O’Brien, Brigid O’Gorman, and Candid Wueest discuss some of the events and trends that affected enterprises the most in 2018.</description><content:encoded>This week’s Cyber Security Brief is the second of two special episodes delving into the findings of Symantec’s Internet Security Threat Report (ISTR). The ISTR uses Symantec’s broad intelligence sources, researchers and analysts to bring you an insight into the key events and trends of 12 months in cyber security. In this episode, Dick O’Brien, Brigid O’Gorman, and Candid Wueest discuss some of the events and trends that affected enterprises the most in 2018.</content:encoded><enclosure length="40803228" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+36+19-03-07.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+36+19-03-07.mp3</guid><pubDate>Thu, 07 Mar 2019 14:43:50 +0000</pubDate><itunes:duration>00:28:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>36</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>ISTR Special: Consumers</itunes:title><title>ISTR Special: Consumers</title><itunes:summary>This week’s Cyber Security Brief is the first of two special episodes delving into the findings of Symantec’s Internet Security Threat Report (ISTR). The ISTR uses Symantec’s broad intelligence sources, researchers and analysts to bring you an insight into the key events and trends of 12 months in cyber security. In this episode, Dick O’Brien, Brigid O’Gorman and Candid Wueest take a look at the 2018 events and trends that hit consumers the most. </itunes:summary><description>This week’s Cyber Security Brief is the first of two special episodes delving into the findings of Symantec’s Internet Security Threat Report (ISTR). The ISTR uses Symantec’s broad intelligence sources, researchers and analysts to bring you an insight into the key events and trends of 12 months in cyber security. In this episode, Dick O’Brien, Brigid O’Gorman and Candid Wueest take a look at the 2018 events and trends that hit consumers the most. </description><content:encoded>This week’s Cyber Security Brief is the first of two special episodes delving into the findings of Symantec’s Internet Security Threat Report (ISTR). The ISTR uses Symantec’s broad intelligence sources, researchers and analysts to bring you an insight into the key events and trends of 12 months in cyber security. In this episode, Dick O’Brien, Brigid O’Gorman and Candid Wueest take a look at the 2018 events and trends that hit consumers the most. </content:encoded><enclosure length="48467140" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+35+19-02-28.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+35+19-02-28.mp3</guid><pubDate>Thu, 28 Feb 2019 13:45:00 +0000</pubDate><itunes:duration>00:33:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>35</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Google backtracks, Apple gets sued, and Australia a victim of state-sponsored cyber attack</itunes:title><title>Google backtracks, Apple gets sued, and Australia a victim of state-sponsored cyber attack</title><itunes:summary>In this week’s Cyber Security Brief podcast, we recap Google’s decision to backtrack on proposed changes to its Chrome web browser that would have rendered many ad blocking extensions inoperable. We also discuss the two security issues that were recently addressed by Facebook, including one that could have allowed accounts to be taken over. We also chat about another batch of online accounts that have been put up for sale on the dark web, the man who is suing Apple because he doesn’t like 2FA, and the “sophisticated state actor” reportedly responsible for cyber attacks targeting Australia’s parliament and a number of its political parties. And also, two UK soaps team up for a cyber security special… </itunes:summary><description>In this week’s Cyber Security Brief podcast, we recap Google’s decision to backtrack on proposed changes to its Chrome web browser that would have rendered many ad blocking extensions inoperable. We also discuss the two security issues that were recently addressed by Facebook, including one that could have allowed accounts to be taken over. We also chat about another batch of online accounts that have been put up for sale on the dark web, the man who is suing Apple because he doesn’t like 2FA, and the “sophisticated state actor” reportedly responsible for cyber attacks targeting Australia’s parliament and a number of its political parties. And also, two UK soaps team up for a cyber security special… </description><content:encoded>In this week’s Cyber Security Brief podcast, we recap Google’s decision to backtrack on proposed changes to its Chrome web browser that would have rendered many ad blocking extensions inoperable. We also discuss the two security issues that were recently addressed by Facebook, including one that could have allowed accounts to be taken over. We also chat about another batch of online accounts that have been put up for sale on the dark web, the man who is suing Apple because he doesn’t like 2FA, and the “sophisticated state actor” reportedly responsible for cyber attacks targeting Australia’s parliament and a number of its political parties. And also, two UK soaps team up for a cyber security special… </content:encoded><enclosure length="33679768" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+34+19-02-21.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+34+19-02-21.mp3</guid><pubDate>Thu, 21 Feb 2019 12:38:46 +0000</pubDate><itunes:duration>00:23:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>34</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Stolen data for sale, Mac malware, and container vulnerabilities</itunes:title><title>Stolen data for sale, Mac malware, and container vulnerabilities</title><itunes:summary>In this week’s Cyber Security Brief, we chat about a slew of stolen online account data found for sale on the dark web, malware targeting Macs, and container vulnerabilities. Also this week, we look at a Wi-Fi connected USB cable that can allow for remote attacks on targeted computers.</itunes:summary><description>In this week’s Cyber Security Brief, we chat about a slew of stolen online account data found for sale on the dark web, malware targeting Macs, and container vulnerabilities. Also this week, we look at a Wi-Fi connected USB cable that can allow for remote attacks on targeted computers.</description><content:encoded>In this week’s Cyber Security Brief, we chat about a slew of stolen online account data found for sale on the dark web, malware targeting Macs, and container vulnerabilities. Also this week, we look at a Wi-Fi connected USB cable that can allow for remote attacks on targeted computers.</content:encoded><enclosure length="31178618" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+33+19-02-14.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+33+19-02-14.mp3</guid><pubDate>Thu, 14 Feb 2019 11:27:07 +0000</pubDate><itunes:duration>00:21:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>33</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Insecure IoT devices, password breach checks, and misleading phone apps</itunes:title><title>Insecure IoT devices, password breach checks, and misleading phone apps</title><itunes:summary>In this week’s Cyber Security Brief, we discuss a bad week for cryptocurrencies, the new Google Chrome extension that will let you know if your password has been breached, why parents should be wary of kids’ smartwatches, and why we all should be wary of phone apps that promise to make you look beautiful. Plus, we chat about the experience of one Illinois family who felt the heat after their suite of Nest devices was hacked.</itunes:summary><description>In this week’s Cyber Security Brief, we discuss a bad week for cryptocurrencies, the new Google Chrome extension that will let you know if your password has been breached, why parents should be wary of kids’ smartwatches, and why we all should be wary of phone apps that promise to make you look beautiful. Plus, we chat about the experience of one Illinois family who felt the heat after their suite of Nest devices was hacked.</description><content:encoded>In this week’s Cyber Security Brief, we discuss a bad week for cryptocurrencies, the new Google Chrome extension that will let you know if your password has been breached, why parents should be wary of kids’ smartwatches, and why we all should be wary of phone apps that promise to make you look beautiful. Plus, we chat about the experience of one Illinois family who felt the heat after their suite of Nest devices was hacked.</content:encoded><enclosure length="35946581" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+32+19-02-07.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+32+19-02-07.mp3</guid><pubDate>Thu, 07 Feb 2019 14:00:00 +0000</pubDate><itunes:duration>00:24:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>32</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Japan to hack civilians’ IoT devices, Apple Facetime bug, and an evolution in BEC scams</itunes:title><title>Japan to hack civilians’ IoT devices, Apple Facetime bug, and an evolution in BEC scams</title><itunes:summary>In this week’s Symantec Cyber Security Brief we discuss authorities' pursuit of Webstresser users, Japan allowing officials to hack civilians’ IoT devices in an attempt to improve security, and the much-discussed Apple Facetime bug. We also chat about the Razy malware attempting to steal cryptocurrencies, an evolution of business email compromise (BEC) scams, and a bizarre sting operation targeting the Citizen Lab internet watchdog group.</itunes:summary><description>In this week’s Symantec Cyber Security Brief we discuss authorities' pursuit of Webstresser users, Japan allowing officials to hack civilians’ IoT devices in an attempt to improve security, and the much-discussed Apple Facetime bug. We also chat about the Razy malware attempting to steal cryptocurrencies, an evolution of business email compromise (BEC) scams, and a bizarre sting operation targeting the Citizen Lab internet watchdog group.</description><content:encoded>In this week’s Symantec Cyber Security Brief we discuss authorities' pursuit of Webstresser users, Japan allowing officials to hack civilians’ IoT devices in an attempt to improve security, and the much-discussed Apple Facetime bug. We also chat about the Razy malware attempting to steal cryptocurrencies, an evolution of business email compromise (BEC) scams, and a bizarre sting operation targeting the Citizen Lab internet watchdog group.</content:encoded><enclosure length="36438757" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+31+19-01-30.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+31+19-01-30.mp3</guid><pubDate>Thu, 31 Jan 2019 13:59:53 +0000</pubDate><itunes:duration>00:25:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>31</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Attacks on financial institutions in Africa, dodgy free mobile VPN apps, and Facebook shutters multiple “inauthentic” accounts</itunes:title><title>Attacks on financial institutions in Africa, dodgy free mobile VPN apps, and Facebook shutters multiple “inauthentic” accounts</title><itunes:summary>On this week’s Cyber Security Brief podcast, Symantec threat researcher Stephen Doherty joins us to discuss our recently published research into a wave of attacks against financial institutions in West Africa. We also discuss some new research that found that many free mobile VPNs could actually compromise people’s privacy, a hitman who was convicted thanks to evidence found on his smartwatch, and an embarrassing compromise of the ATLAS MMO game. Also this week, Russia is back in the headlines again, with the DNC revealing it was targeted once again by a spear-phishing campaign originating in Russia in November last, while Facebook also removed a number of “inauthentic” accounts that it says were based in Russia and involved in spreading misinformation on the social media platform. </itunes:summary><description>On this week’s Cyber Security Brief podcast, Symantec threat researcher Stephen Doherty joins us to discuss our recently published research into a wave of attacks against financial institutions in West Africa. We also discuss some new research that found that many free mobile VPNs could actually compromise people’s privacy, a hitman who was convicted thanks to evidence found on his smartwatch, and an embarrassing compromise of the ATLAS MMO game. Also this week, Russia is back in the headlines again, with the DNC revealing it was targeted once again by a spear-phishing campaign originating in Russia in November last, while Facebook also removed a number of “inauthentic” accounts that it says were based in Russia and involved in spreading misinformation on the social media platform. </description><content:encoded>On this week’s Cyber Security Brief podcast, Symantec threat researcher Stephen Doherty joins us to discuss our recently published research into a wave of attacks against financial institutions in West Africa. We also discuss some new research that found that many free mobile VPNs could actually compromise people’s privacy, a hitman who was convicted thanks to evidence found on his smartwatch, and an embarrassing compromise of the ATLAS MMO game. Also this week, Russia is back in the headlines again, with the DNC revealing it was targeted once again by a spear-phishing campaign originating in Russia in November last, while Facebook also removed a number of “inauthentic” accounts that it says were based in Russia and involved in spreading misinformation on the social media platform. </content:encoded><enclosure length="32891554" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+30+19-01-24.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+30+19-01-24.mp3</guid><pubDate>Thu, 24 Jan 2019 14:00:00 +0000</pubDate><itunes:duration>00:22:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>30</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Ukrainians indicted, cash for Tesla hacks, and cryptocurrency exchanges breached</itunes:title><title>Ukrainians indicted, cash for Tesla hacks, and cryptocurrency exchanges breached</title><itunes:summary>In this week’s Cyber Security Brief, we discuss the indictment of two Ukrainian nationals for their role in a conspiracy to hack into the Securities and Exchange Commission’s (SEC) computer systems. We also chat about the recent controversy about GoDaddy quietly injecting scripts onto websites without the website owners knowing, and recent attacks on cryptocurrency exchanges. We also cover the Pwn2Own contest offering cash prizes for hacks on a Tesla vehicle for the first time, and how credit card scammers are using smartcard technology to their advantage. </itunes:summary><description>In this week’s Cyber Security Brief, we discuss the indictment of two Ukrainian nationals for their role in a conspiracy to hack into the Securities and Exchange Commission’s (SEC) computer systems. We also chat about the recent controversy about GoDaddy quietly injecting scripts onto websites without the website owners knowing, and recent attacks on cryptocurrency exchanges. We also cover the Pwn2Own contest offering cash prizes for hacks on a Tesla vehicle for the first time, and how credit card scammers are using smartcard technology to their advantage. </description><content:encoded>In this week’s Cyber Security Brief, we discuss the indictment of two Ukrainian nationals for their role in a conspiracy to hack into the Securities and Exchange Commission’s (SEC) computer systems. We also chat about the recent controversy about GoDaddy quietly injecting scripts onto websites without the website owners knowing, and recent attacks on cryptocurrency exchanges. We also cover the Pwn2Own contest offering cash prizes for hacks on a Tesla vehicle for the first time, and how credit card scammers are using smartcard technology to their advantage. </content:encoded><enclosure length="34716144" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+29+19-01-17.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+29+19-01-17.mp3</guid><pubDate>Thu, 17 Jan 2019 14:00:00 +0000</pubDate><itunes:duration>00:24:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>29</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>German data leak, untrustworthy IoT devices, and PewDiePie hackers go quiet</itunes:title><title>German data leak, untrustworthy IoT devices, and PewDiePie hackers go quiet</title><itunes:summary>Welcome to the first Cyber Security Brief podcast of 2019! On this week’s episode we discuss the fact that most people don’t trust their internet of things devices, but also aren’t that willing to pay extra for improved security. We also chat about the major leak of personal data of high-profile politicians and others in Germany, and developments in the campaign of the hackers taking over printers and Chromecasts to express their support for PewDiePie (and highlight security issues). Finally, we take a look at some research highlighting the fact that facial recognition on smartphones still isn’t foolproof.</itunes:summary><description>Welcome to the first Cyber Security Brief podcast of 2019! On this week’s episode we discuss the fact that most people don’t trust their internet of things devices, but also aren’t that willing to pay extra for improved security. We also chat about the major leak of personal data of high-profile politicians and others in Germany, and developments in the campaign of the hackers taking over printers and Chromecasts to express their support for PewDiePie (and highlight security issues). Finally, we take a look at some research highlighting the fact that facial recognition on smartphones still isn’t foolproof.</description><content:encoded>Welcome to the first Cyber Security Brief podcast of 2019! On this week’s episode we discuss the fact that most people don’t trust their internet of things devices, but also aren’t that willing to pay extra for improved security. We also chat about the major leak of personal data of high-profile politicians and others in Germany, and developments in the campaign of the hackers taking over printers and Chromecasts to express their support for PewDiePie (and highlight security issues). Finally, we take a look at some research highlighting the fact that facial recognition on smartphones still isn’t foolproof.</content:encoded><enclosure length="32411352" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+28+19-01-10.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+28+19-01-10.mp3</guid><pubDate>Thu, 10 Jan 2019 14:00:00 +0000</pubDate><itunes:duration>00:22:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>28</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>What Were the Top 5 Cyber Security Stories of 2018?</itunes:title><title>What Were the Top 5 Cyber Security Stories of 2018?</title><itunes:summary>In the final Cyber Security Brief podcast of 2018, we take a look back at the year that has gone by in cyber security, and count down the top 5 biggest cyber security stories of 2018. Listen to find out what we thought they were!</itunes:summary><description>In the final Cyber Security Brief podcast of 2018, we take a look back at the year that has gone by in cyber security, and count down the top 5 biggest cyber security stories of 2018. Listen to find out what we thought they were!</description><content:encoded>In the final Cyber Security Brief podcast of 2018, we take a look back at the year that has gone by in cyber security, and count down the top 5 biggest cyber security stories of 2018. Listen to find out what we thought they were!</content:encoded><enclosure length="44041804" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Weekly+Roundup+18-12-20.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Weekly+Roundup+18-12-20.mp3</guid><pubDate>Thu, 20 Dec 2018 14:58:53 +0000</pubDate><itunes:duration>30:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>27</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Money mule arrests, grandparent scams, and new research into the Seedworm group</itunes:title><title>Money mule arrests, grandparent scams, and new research into the Seedworm group</title><itunes:summary>On this week’s Cyber Security Brief podcast, money is a big theme! We discuss a series of heists on banks in Eastern Europe that sound like something out of a Hollywood movie, a rise in the money lost to so-called “grandparent scams”, a crackdown by cops on money mules operating throughout Europe, and a new twist to the sextortion email scams we have previously discussed on this podcast. Also this week, we chat about new research Symantec has just published into the Seedworm group (aka Muddywater), which has hit more than 130 victims in 30 organisations since September 2018.</itunes:summary><description>On this week’s Cyber Security Brief podcast, money is a big theme! We discuss a series of heists on banks in Eastern Europe that sound like something out of a Hollywood movie, a rise in the money lost to so-called “grandparent scams”, a crackdown by cops on money mules operating throughout Europe, and a new twist to the sextortion email scams we have previously discussed on this podcast. Also this week, we chat about new research Symantec has just published into the Seedworm group (aka Muddywater), which has hit more than 130 victims in 30 organisations since September 2018.</description><content:encoded>On this week’s Cyber Security Brief podcast, money is a big theme! We discuss a series of heists on banks in Eastern Europe that sound like something out of a Hollywood movie, a rise in the money lost to so-called “grandparent scams”, a crackdown by cops on money mules operating throughout Europe, and a new twist to the sextortion email scams we have previously discussed on this podcast. Also this week, we chat about new research Symantec has just published into the Seedworm group (aka Muddywater), which has hit more than 130 victims in 30 organisations since September 2018.</content:encoded><enclosure length="35567504" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+26+18-12-12.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+26+18-12-12.mp3</guid><pubDate>Thu, 13 Dec 2018 13:31:26 +0000</pubDate><itunes:duration>00:24:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>26</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>SamSam developments, an AI gaffe, and some massive data breaches</itunes:title><title>SamSam developments, an AI gaffe, and some massive data breaches</title><itunes:summary><![CDATA[In this week’s Cyber Security Brief, we discuss the latest developments in the SamSam ransomware, with two of the people reportedly behind the ransomware having been recently indicted. Dick O’Brien, Candid Wueest and Brigid O Gorman also discuss the recent huge data breach at the Marriot-owned Starwood chain of hotels, as well as a large breach at Q & A website Quora. The hacker who hijacked 50,000 printers to spam people to support infamous YouTuber PewDiePie, a gaffe by an AI jaywalking detection system in a city in China, and malicious fitness apps on the Apple App Store are also up for discussion.]]></itunes:summary><description><![CDATA[In this week’s Cyber Security Brief, we discuss the latest developments in the SamSam ransomware, with two of the people reportedly behind the ransomware having been recently indicted. Dick O’Brien, Candid Wueest and Brigid O Gorman also discuss the recent huge data breach at the Marriot-owned Starwood chain of hotels, as well as a large breach at Q & A website Quora. The hacker who hijacked 50,000 printers to spam people to support infamous YouTuber PewDiePie, a gaffe by an AI jaywalking detection system in a city in China, and malicious fitness apps on the Apple App Store are also up for discussion.]]></description><content:encoded><![CDATA[In this week’s Cyber Security Brief, we discuss the latest developments in the SamSam ransomware, with two of the people reportedly behind the ransomware having been recently indicted. Dick O’Brien, Candid Wueest and Brigid O Gorman also discuss the recent huge data breach at the Marriot-owned Starwood chain of hotels, as well as a large breach at Q & A website Quora. The hacker who hijacked 50,000 printers to spam people to support infamous YouTuber PewDiePie, a gaffe by an AI jaywalking detection system in a city in China, and malicious fitness apps on the Apple App Store are also up for discussion.]]></content:encoded><enclosure length="35492384" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+25+18-12-06.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+25+18-12-06.mp3</guid><pubDate>Thu, 06 Dec 2018 14:00:00 +0000</pubDate><itunes:duration>00:24:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>25</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Operation Eversion, Magecart, and the UK parliament takes on Facebook</itunes:title><title>Operation Eversion, Magecart, and the UK parliament takes on Facebook</title><itunes:summary>On this week’s Cyber Security Brief, we discuss Symantec’s role in an FBI takedown of ad-fraud infrastructure dubbed Operation Eversion. We also discuss the latest developments in the Facebook/Cambridge Analytica scandal, as well as the most recent activity from Magecart. Also, the dangers of most phishing sites having the padlock sign beside their address, and the curious incident of a security researcher who responsibly reported a vulnerability but was still subsequently reported to the police.</itunes:summary><description>On this week’s Cyber Security Brief, we discuss Symantec’s role in an FBI takedown of ad-fraud infrastructure dubbed Operation Eversion. We also discuss the latest developments in the Facebook/Cambridge Analytica scandal, as well as the most recent activity from Magecart. Also, the dangers of most phishing sites having the padlock sign beside their address, and the curious incident of a security researcher who responsibly reported a vulnerability but was still subsequently reported to the police.</description><content:encoded>On this week’s Cyber Security Brief, we discuss Symantec’s role in an FBI takedown of ad-fraud infrastructure dubbed Operation Eversion. We also discuss the latest developments in the Facebook/Cambridge Analytica scandal, as well as the most recent activity from Magecart. Also, the dangers of most phishing sites having the padlock sign beside their address, and the curious incident of a security researcher who responsibly reported a vulnerability but was still subsequently reported to the police.</content:encoded><enclosure length="30938860" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+24+18-11-29.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+24+18-11-29.mp3</guid><pubDate>Thu, 29 Nov 2018 14:00:00 +0000</pubDate><itunes:duration>00:21:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>24</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Special Report: Conficker’s 10th anniversary</itunes:title><title>Special Report: Conficker’s 10th anniversary</title><itunes:summary>On this week’s episode of the Cyber Security Brief, Brigid O Gorman is joined by Candid Wueest to discuss the infamous Conficker worm, which marks its 10th anniversary this week. This worm first appeared on November 21, 2008, and despite the many changes that have occurred in the cyber security landscape since then we still see hundreds and thousands of detections of Conficker in the wild today. As well as Conficker, we also discuss some of the other old threats that are still around today – and speculate as to whether any of today’s threats are likely to have similar longevity.</itunes:summary><description>On this week’s episode of the Cyber Security Brief, Brigid O Gorman is joined by Candid Wueest to discuss the infamous Conficker worm, which marks its 10th anniversary this week. This worm first appeared on November 21, 2008, and despite the many changes that have occurred in the cyber security landscape since then we still see hundreds and thousands of detections of Conficker in the wild today. As well as Conficker, we also discuss some of the other old threats that are still around today – and speculate as to whether any of today’s threats are likely to have similar longevity.</description><content:encoded>On this week’s episode of the Cyber Security Brief, Brigid O Gorman is joined by Candid Wueest to discuss the infamous Conficker worm, which marks its 10th anniversary this week. This worm first appeared on November 21, 2008, and despite the many changes that have occurred in the cyber security landscape since then we still see hundreds and thousands of detections of Conficker in the wild today. As well as Conficker, we also discuss some of the other old threats that are still around today – and speculate as to whether any of today’s threats are likely to have similar longevity.</content:encoded><enclosure length="51165536" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+23+18-11-22.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+23+18-11-22.mp3</guid><pubDate>Thu, 22 Nov 2018 14:00:00 +0000</pubDate><itunes:duration>00:35:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>23</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Formjacking, lots of vulnerabilities get patched, and a BEC scam costs a cinema company millions</itunes:title><title>Formjacking, lots of vulnerabilities get patched, and a BEC scam costs a cinema company millions</title><itunes:summary>In this week’s Cyber Security Brief podcast, Dick O’Brien, Candid Wueest and Brigid O Gorman discuss new research into formjacking and the Megecart group; a subsidiary of French movie chain Pathe loses more than $20 million in a Business Email Compromise (BEC) scam, and a whole slew of vulnerabilities get patched.</itunes:summary><description>In this week’s Cyber Security Brief podcast, Dick O’Brien, Candid Wueest and Brigid O Gorman discuss new research into formjacking and the Megecart group; a subsidiary of French movie chain Pathe loses more than $20 million in a Business Email Compromise (BEC) scam, and a whole slew of vulnerabilities get patched.</description><content:encoded>In this week’s Cyber Security Brief podcast, Dick O’Brien, Candid Wueest and Brigid O Gorman discuss new research into formjacking and the Megecart group; a subsidiary of French movie chain Pathe loses more than $20 million in a Business Email Compromise (BEC) scam, and a whole slew of vulnerabilities get patched.</content:encoded><enclosure length="32100090" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+22+18-11-15.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+22+18-11-15.mp3</guid><pubDate>Thu, 15 Nov 2018 14:00:00 +0000</pubDate><itunes:duration>00:22:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>22</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Lazarus ATM attacks, Inception Framework uses new backdoor, and small businesses’ cyber risk</itunes:title><title>Lazarus ATM attacks, Inception Framework uses new backdoor, and small businesses’ cyber risk</title><itunes:summary>In this week’s Cyber Security Brief podcast we discuss the FASTCash attacks, in which the Lazarus group has been emptying ATMs, and highlight the research we have published into this activity. We also discuss a new report highlighting small businesses’ cyber risk, the Inception Framework using a new backdoor, and a vulnerability in a building management software.</itunes:summary><description>In this week’s Cyber Security Brief podcast we discuss the FASTCash attacks, in which the Lazarus group has been emptying ATMs, and highlight the research we have published into this activity. We also discuss a new report highlighting small businesses’ cyber risk, the Inception Framework using a new backdoor, and a vulnerability in a building management software.</description><content:encoded>In this week’s Cyber Security Brief podcast we discuss the FASTCash attacks, in which the Lazarus group has been emptying ATMs, and highlight the research we have published into this activity. We also discuss a new report highlighting small businesses’ cyber risk, the Inception Framework using a new backdoor, and a vulnerability in a building management software.</content:encoded><enclosure length="32956318" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+21+18-11-08.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+21+18-11-08.mp3</guid><pubDate>Thu, 08 Nov 2018 14:14:40 +0000</pubDate><itunes:duration>00:22:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>21</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>SamSam ransomware, Midterms 2018, new Emotet activity, and Docker APIs exploited for cryptojacking</itunes:title><title>SamSam ransomware, Midterms 2018, new Emotet activity, and Docker APIs exploited for cryptojacking</title><itunes:summary>In this week’s Cyber Security Brief podcast we discuss our newly-published research into the SamSam ransomware, exposed Docker APIs being used for cryptojacking, and some new activity from the Emotet botnet. With the midterm elections in the U.S. fast approaching we also take a look at some of the election security stories that have come up in the last week. Finally, we discuss a cautionary tale underlining why you shouldn’t use your work laptop to visit “adult” websites.</itunes:summary><description>In this week’s Cyber Security Brief podcast we discuss our newly-published research into the SamSam ransomware, exposed Docker APIs being used for cryptojacking, and some new activity from the Emotet botnet. With the midterm elections in the U.S. fast approaching we also take a look at some of the election security stories that have come up in the last week. Finally, we discuss a cautionary tale underlining why you shouldn’t use your work laptop to visit “adult” websites.</description><content:encoded>In this week’s Cyber Security Brief podcast we discuss our newly-published research into the SamSam ransomware, exposed Docker APIs being used for cryptojacking, and some new activity from the Emotet botnet. With the midterm elections in the U.S. fast approaching we also take a look at some of the election security stories that have come up in the last week. Finally, we discuss a cautionary tale underlining why you shouldn’t use your work laptop to visit “adult” websites.</content:encoded><enclosure length="38165544" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+20+18-11-01.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+20+18-11-01.mp3</guid><pubDate>Thu, 01 Nov 2018 14:00:00 +0000</pubDate><itunes:duration>00:26:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>20</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Super Micro spy chip story contradictions, Russian woman indicted in U.S. for conspiring to interfere in U.S. elections, and Twitter tackles disinformation campaigns</itunes:title><title>Super Micro spy chip story contradictions, Russian woman indicted in U.S. for conspiring to interfere in U.S. elections, and Twitter tackles disinformation campaigns</title><itunes:summary>In this week’s Cyber Security Brief podcast, we discuss the claims and counter claims related to the Bloomberg Businessweek story published at the start of October that alleged Chinese spies had infiltrated U.S. companies by implanting secret chips on Super Micro motherboards – a story that has been rebutted by almost all the companies mentioned in it, including Super Micro itself, Apple and Amazon. With calls from those companies now for Bloomberg to retract the story, we discuss this ongoing saga. Also in the last week, a Russian woman was indicted in the U.S. on charges of playing a role in a conspiracy to interfere in the U.S. political system, meanwhile, Twitter released a huge trove of tweets it had identified that were attempting to influence political campaigns in the last couple of years. We consider the significance of that move from the social media giant.</itunes:summary><description>In this week’s Cyber Security Brief podcast, we discuss the claims and counter claims related to the Bloomberg Businessweek story published at the start of October that alleged Chinese spies had infiltrated U.S. companies by implanting secret chips on Super Micro motherboards – a story that has been rebutted by almost all the companies mentioned in it, including Super Micro itself, Apple and Amazon. With calls from those companies now for Bloomberg to retract the story, we discuss this ongoing saga. Also in the last week, a Russian woman was indicted in the U.S. on charges of playing a role in a conspiracy to interfere in the U.S. political system, meanwhile, Twitter released a huge trove of tweets it had identified that were attempting to influence political campaigns in the last couple of years. We consider the significance of that move from the social media giant.</description><content:encoded>In this week’s Cyber Security Brief podcast, we discuss the claims and counter claims related to the Bloomberg Businessweek story published at the start of October that alleged Chinese spies had infiltrated U.S. companies by implanting secret chips on Super Micro motherboards – a story that has been rebutted by almost all the companies mentioned in it, including Super Micro itself, Apple and Amazon. With calls from those companies now for Bloomberg to retract the story, we discuss this ongoing saga. Also in the last week, a Russian woman was indicted in the U.S. on charges of playing a role in a conspiracy to interfere in the U.S. political system, meanwhile, Twitter released a huge trove of tweets it had identified that were attempting to influence political campaigns in the last couple of years. We consider the significance of that move from the social media giant.</content:encoded><enclosure length="28423542" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+19+18-10-25.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+19+18-10-25.mp3</guid><pubDate>Thu, 25 Oct 2018 13:00:00 +0000</pubDate><itunes:duration>00:19:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>19</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Special Report: What is it Really Like to Work in Cyber Security?</itunes:title><title>Special Report: What is it Really Like to Work in Cyber Security?</title><itunes:summary>Something a little different this week as we take a behind-the-scenes look at life in Symantec. Dick O’Brien chats to three Symantec engineers working in different parts of the company, and at different stages in their careers, to find out what it is really like to work as an engineer in a cyber security firm. Dick is joined by Symantec engineers Sayali Kulkarni, Conor Murray and Eric Chien to discuss the evolution of their careers in cyber security.</itunes:summary><description>Something a little different this week as we take a behind-the-scenes look at life in Symantec. Dick O’Brien chats to three Symantec engineers working in different parts of the company, and at different stages in their careers, to find out what it is really like to work as an engineer in a cyber security firm. Dick is joined by Symantec engineers Sayali Kulkarni, Conor Murray and Eric Chien to discuss the evolution of their careers in cyber security.</description><content:encoded>Something a little different this week as we take a behind-the-scenes look at life in Symantec. Dick O’Brien chats to three Symantec engineers working in different parts of the company, and at different stages in their careers, to find out what it is really like to work as an engineer in a cyber security firm. Dick is joined by Symantec engineers Sayali Kulkarni, Conor Murray and Eric Chien to discuss the evolution of their careers in cyber security.</content:encoded><enclosure length="43567046" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+18+18-10-18.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+18+18-10-18.mp3</guid><pubDate>Thu, 18 Oct 2018 13:00:00 +0000</pubDate><itunes:duration>00:30:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>18</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Gallmaker research, Navionics breach, and Fitbit data used by cops in murder investigation</itunes:title><title>Gallmaker research, Navionics breach, and Fitbit data used by cops in murder investigation</title><itunes:summary>In this week’s Cyber Security Brief, Dick O’Brien is joined by Symantec threat researchers Jon DiMaggio and Candid Wueest to discuss the big cyber security stories of the last week. We talk about Symantec’s latest research on a previously-unknown attack group called Gallmaker, which is using “living off the land” and publicly-available hack tools to target organizations in the government and defense sectors. We also discuss the hack of the SpankChain cryptocurrency project, the breach at Garmin-owned boating app Navionics, and how Fitbit data has been used in a murder investigation.</itunes:summary><description>In this week’s Cyber Security Brief, Dick O’Brien is joined by Symantec threat researchers Jon DiMaggio and Candid Wueest to discuss the big cyber security stories of the last week. We talk about Symantec’s latest research on a previously-unknown attack group called Gallmaker, which is using “living off the land” and publicly-available hack tools to target organizations in the government and defense sectors. We also discuss the hack of the SpankChain cryptocurrency project, the breach at Garmin-owned boating app Navionics, and how Fitbit data has been used in a murder investigation.</description><content:encoded>In this week’s Cyber Security Brief, Dick O’Brien is joined by Symantec threat researchers Jon DiMaggio and Candid Wueest to discuss the big cyber security stories of the last week. We talk about Symantec’s latest research on a previously-unknown attack group called Gallmaker, which is using “living off the land” and publicly-available hack tools to target organizations in the government and defense sectors. We also discuss the hack of the SpankChain cryptocurrency project, the breach at Garmin-owned boating app Navionics, and how Fitbit data has been used in a murder investigation.</content:encoded><enclosure length="32907474" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+17.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+17.mp3</guid><pubDate>Thu, 11 Oct 2018 13:00:00 +0000</pubDate><itunes:duration>00:22:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>17</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>APT28 activity, cryptojacking research, and Face ID used to access criminal suspect’s phone</itunes:title><title>APT28 activity, cryptojacking research, and Face ID used to access criminal suspect’s phone</title><itunes:summary>In this week’s Symantec Cyber Security Brief we discuss two of our recently-published pieces of research. First, we are joined by Threat Analyst Stephen Doherty to discuss the recent activity of APT28 (aka Swallowtail, Fancy Bear), which made headlines in 2016 due to its involvement in cyber attacks against an organisation involved in the U.S. presidential election. Then, we talk about our newly published whitepaper examining the topic of cryptojacking – one of the hottest subjects in the world of cyber security in 2018. Finally, we discuss a first-of-its-kind case in the U.S. where a criminal suspect was forced by the FBI to use Face ID to unlock his iPhone.</itunes:summary><description>In this week’s Symantec Cyber Security Brief we discuss two of our recently-published pieces of research. First, we are joined by Threat Analyst Stephen Doherty to discuss the recent activity of APT28 (aka Swallowtail, Fancy Bear), which made headlines in 2016 due to its involvement in cyber attacks against an organisation involved in the U.S. presidential election. Then, we talk about our newly published whitepaper examining the topic of cryptojacking – one of the hottest subjects in the world of cyber security in 2018. Finally, we discuss a first-of-its-kind case in the U.S. where a criminal suspect was forced by the FBI to use Face ID to unlock his iPhone.</description><content:encoded>In this week’s Symantec Cyber Security Brief we discuss two of our recently-published pieces of research. First, we are joined by Threat Analyst Stephen Doherty to discuss the recent activity of APT28 (aka Swallowtail, Fancy Bear), which made headlines in 2016 due to its involvement in cyber attacks against an organisation involved in the U.S. presidential election. Then, we talk about our newly published whitepaper examining the topic of cryptojacking – one of the hottest subjects in the world of cyber security in 2018. Finally, we discuss a first-of-its-kind case in the U.S. where a criminal suspect was forced by the FBI to use Face ID to unlock his iPhone.</content:encoded><enclosure length="41960556" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+16+18-10-04.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+16+18-10-04.mp3</guid><pubDate>Thu, 04 Oct 2018 14:00:00 +0000</pubDate><itunes:duration>00:29:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>16</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Formjacking research, WordPress plugins cause problems, the dangers of plaintext password storage, and the Mojave zero day</itunes:title><title>Formjacking research, WordPress plugins cause problems, the dangers of plaintext password storage, and the Mojave zero day</title><itunes:summary>In this week’s Symantec Cyber Security Brief, we discuss recent research Symantec has published on formjacking, as well as the formjacking attacks that have been carried out by the Magecart group. We also discuss how outdated plugins are allowing malicious code to be injected into WordPress sites, the Apple macOS Mojave zero day, and why it’s never a good idea for companies to store their customers’ passwords in plaintext.</itunes:summary><description>In this week’s Symantec Cyber Security Brief, we discuss recent research Symantec has published on formjacking, as well as the formjacking attacks that have been carried out by the Magecart group. We also discuss how outdated plugins are allowing malicious code to be injected into WordPress sites, the Apple macOS Mojave zero day, and why it’s never a good idea for companies to store their customers’ passwords in plaintext.</description><content:encoded>In this week’s Symantec Cyber Security Brief, we discuss recent research Symantec has published on formjacking, as well as the formjacking attacks that have been carried out by the Magecart group. We also discuss how outdated plugins are allowing malicious code to be injected into WordPress sites, the Apple macOS Mojave zero day, and why it’s never a good idea for companies to store their customers’ passwords in plaintext.</content:encoded><enclosure length="35885096" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+15.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+15.mp3</guid><pubDate>Thu, 27 Sep 2018 13:00:00 +0000</pubDate><itunes:duration>00:24:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>15</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Xbash threat, TripAdvisor fake review clampdown, blockchain casinos targeted, and who is behind DDoS attacks on UK unis?</itunes:title><title>Xbash threat, TripAdvisor fake review clampdown, blockchain casinos targeted, and who is behind DDoS attacks on UK unis?</title><itunes:summary>On this week’s podcast Dick O’Brien is joined by threat researchers Candid Wueest and Brigid O Gorman to discuss the biggest cyber security stories of the week. We take a look at the newly-discovered Xbash malware family and what it can do, as well as discussing the first case of its kind where a man was convicted and imprisoned for writing fake reviews on TripAdvisor. Also, we look at some recent hacks against blockchain casinos, and speculate on the likely perpetrators behind DDoS attacks on UK university networks.</itunes:summary><description>On this week’s podcast Dick O’Brien is joined by threat researchers Candid Wueest and Brigid O Gorman to discuss the biggest cyber security stories of the week. We take a look at the newly-discovered Xbash malware family and what it can do, as well as discussing the first case of its kind where a man was convicted and imprisoned for writing fake reviews on TripAdvisor. Also, we look at some recent hacks against blockchain casinos, and speculate on the likely perpetrators behind DDoS attacks on UK university networks.</description><content:encoded>On this week’s podcast Dick O’Brien is joined by threat researchers Candid Wueest and Brigid O Gorman to discuss the biggest cyber security stories of the week. We take a look at the newly-discovered Xbash malware family and what it can do, as well as discussing the first case of its kind where a man was convicted and imprisoned for writing fake reviews on TripAdvisor. Also, we look at some recent hacks against blockchain casinos, and speculate on the likely perpetrators behind DDoS attacks on UK university networks.</content:encoded><enclosure length="42314228" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+14+18-09-20.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+14+18-09-20.mp3</guid><pubDate>Thu, 20 Sep 2018 13:00:00 +0000</pubDate><itunes:duration>00:29:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>14</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Deep Dive: Symantec Takes on Software Supply Chain Attacks</itunes:title><title>Deep Dive: Symantec Takes on Software Supply Chain Attacks</title><itunes:summary>Dick O’Brien is joined by Symantec product manager Arvind Rao and architect Haik Mesropian to discuss their work, and what they are doing to combat software supply chain attacks, the products they are building, and how they are hoping their efforts will help developers combat these attacks.</itunes:summary><description>Dick O’Brien is joined by Symantec product manager Arvind Rao and architect Haik Mesropian to discuss their work, and what they are doing to combat software supply chain attacks, the products they are building, and how they are hoping their efforts will help developers combat these attacks.</description><content:encoded>Dick O’Brien is joined by Symantec product manager Arvind Rao and architect Haik Mesropian to discuss their work, and what they are doing to combat software supply chain attacks, the products they are building, and how they are hoping their efforts will help developers combat these attacks.</content:encoded><enclosure length="36320651" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+13+Arvind_Haik+18-09-13.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+13+Arvind_Haik+18-09-13.mp3</guid><pubDate>Thu, 13 Sep 2018 13:00:00 +0000</pubDate><itunes:duration>00:25:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>13</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>One billion dollars in Bitcoin on the move, data breaches, Mastercard and Google’s info-sharing deal, and MikroTik developments</itunes:title><title>One billion dollars in Bitcoin on the move, data breaches, Mastercard and Google’s info-sharing deal, and MikroTik developments</title><itunes:summary>In this week’s podcast we discuss how insiders are often the ones to blame for data breaches, and how often data breaches are caused by human error more often than malicious attackers. We look at the implications of a deal between Mastercard and Google that allows advertisers to figure out how effective their ads are at getting consumers to make purchases in the real world, and a development in the MikroTik routers hack. Also, we discuss $1 billion in Bitcoin that has suddenly started to move – and ask who might be in control of it?</itunes:summary><description>In this week’s podcast we discuss how insiders are often the ones to blame for data breaches, and how often data breaches are caused by human error more often than malicious attackers. We look at the implications of a deal between Mastercard and Google that allows advertisers to figure out how effective their ads are at getting consumers to make purchases in the real world, and a development in the MikroTik routers hack. Also, we discuss $1 billion in Bitcoin that has suddenly started to move – and ask who might be in control of it?</description><content:encoded>In this week’s podcast we discuss how insiders are often the ones to blame for data breaches, and how often data breaches are caused by human error more often than malicious attackers. We look at the implications of a deal between Mastercard and Google that allows advertisers to figure out how effective their ads are at getting consumers to make purchases in the real world, and a development in the MikroTik routers hack. Also, we discuss $1 billion in Bitcoin that has suddenly started to move – and ask who might be in control of it?</content:encoded><enclosure length="40100450" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+12.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+12.mp3</guid><pubDate>Thu, 06 Sep 2018 13:00:00 +0000</pubDate><itunes:duration>00:27:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>12</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Andromeda botnet, DNC “hack”, a new Windows zero day, and dark web developments</itunes:title><title>Andromeda botnet, DNC “hack”, a new Windows zero day, and dark web developments</title><itunes:summary>On this week’s podcast we discuss the DNC “hack” that wasn’t, developments on dark web marketplaces, and the release of a Windows zero day on Twitter. We also discuss the Andromeda botnet, following the release from prison of one of the people accused of being behind it.</itunes:summary><description>On this week’s podcast we discuss the DNC “hack” that wasn’t, developments on dark web marketplaces, and the release of a Windows zero day on Twitter. We also discuss the Andromeda botnet, following the release from prison of one of the people accused of being behind it.</description><content:encoded>On this week’s podcast we discuss the DNC “hack” that wasn’t, developments on dark web marketplaces, and the release of a Windows zero day on Twitter. We also discuss the Andromeda botnet, following the release from prison of one of the people accused of being behind it.</content:encoded><enclosure length="31270707" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+11.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Podcast+11.mp3</guid><pubDate>Thu, 30 Aug 2018 13:00:00 +0000</pubDate><itunes:duration>00:21:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>11</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>How much do your mobile apps really know about you? Is your charging cable safe? And is end-to-end encryption under threat?</itunes:title><title>How much do your mobile apps really know about you? Is your charging cable safe? And is end-to-end encryption under threat?</title><itunes:summary>This week, Dick O’Brien is joined by Symantec threat researcher Gillian Cleary, who discusses her recent research into the 100 most popular mobile apps, and how much information they are really gathering about their users. We also discuss an attack dubbed USBHarpoon that turns USB charging cables malicious, and we look at a court case in the U.S. where the government is reportedly attempting to compel Facebook to break the encryption on its Messenger service.</itunes:summary><description>This week, Dick O’Brien is joined by Symantec threat researcher Gillian Cleary, who discusses her recent research into the 100 most popular mobile apps, and how much information they are really gathering about their users. We also discuss an attack dubbed USBHarpoon that turns USB charging cables malicious, and we look at a court case in the U.S. where the government is reportedly attempting to compel Facebook to break the encryption on its Messenger service.</description><content:encoded>This week, Dick O’Brien is joined by Symantec threat researcher Gillian Cleary, who discusses her recent research into the 100 most popular mobile apps, and how much information they are really gathering about their users. We also discuss an attack dubbed USBHarpoon that turns USB charging cables malicious, and we look at a court case in the U.S. where the government is reportedly attempting to compel Facebook to break the encryption on its Messenger service.</content:encoded><enclosure length="33498028" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Weekly+Roundup+18-08-22_Podcast.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Weekly+Roundup+18-08-22_Podcast.mp3</guid><pubDate>Thu, 23 Aug 2018 13:00:00 +0000</pubDate><itunes:duration>00:23:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>10</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Special Report: Financial Threats</itunes:title><title>Special Report: Financial Threats</title><itunes:summary>This week we bring you a special podcast taking an in-depth look at the financial threats cyber crime landscape. Brigid O’Gorman is joined by Symantec threat analysts Stephen Doherty and Eric Chien to discuss the threats facing both banking consumers and banks themselves. We also discuss the Lazarus group’s role in recent high-value attacks targeting financial institutions, and talk about the future of the financial threats landscape.</itunes:summary><description>This week we bring you a special podcast taking an in-depth look at the financial threats cyber crime landscape. Brigid O’Gorman is joined by Symantec threat analysts Stephen Doherty and Eric Chien to discuss the threats facing both banking consumers and banks themselves. We also discuss the Lazarus group’s role in recent high-value attacks targeting financial institutions, and talk about the future of the financial threats landscape.</description><content:encoded>This week we bring you a special podcast taking an in-depth look at the financial threats cyber crime landscape. Brigid O’Gorman is joined by Symantec threat analysts Stephen Doherty and Eric Chien to discuss the threats facing both banking consumers and banks themselves. We also discuss the Lazarus group’s role in recent high-value attacks targeting financial institutions, and talk about the future of the financial threats landscape.</content:encoded><enclosure length="39500454" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Financial_Threats_Podcast_v3_0.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Financial_Threats_Podcast_v3_0.mp3</guid><pubDate>Thu, 16 Aug 2018 13:00:00 +0000</pubDate><itunes:duration>00:27:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>9</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>“Security through obscurity”, Snapchat's source code leak, MikroTik coin mining campaign, and Symantec talks machine learning at Black Hat</itunes:title><title>“Security through obscurity”, Snapchat's source code leak, MikroTik coin mining campaign, and Symantec talks machine learning at Black Hat</title><itunes:summary>In this week’s cyber security news round-up, we chat about Threat Intel’s Liam O’Murchu’s Black Hat presentation: How To Use Machine Learning to Discover New Targeted Attacks. We also discuss the Snapchat source code leak, the coin mining campaign targeting MikroTik routers, and the concept of “security through obscurity” – adding more bugs to code to make it harder for black hat hackers to figure out which bugs are the exploitable ones.</itunes:summary><description>In this week’s cyber security news round-up, we chat about Threat Intel’s Liam O’Murchu’s Black Hat presentation: How To Use Machine Learning to Discover New Targeted Attacks. We also discuss the Snapchat source code leak, the coin mining campaign targeting MikroTik routers, and the concept of “security through obscurity” – adding more bugs to code to make it harder for black hat hackers to figure out which bugs are the exploitable ones.</description><content:encoded>In this week’s cyber security news round-up, we chat about Threat Intel’s Liam O’Murchu’s Black Hat presentation: How To Use Machine Learning to Discover New Targeted Attacks. We also discuss the Snapchat source code leak, the coin mining campaign targeting MikroTik routers, and the concept of “security through obscurity” – adding more bugs to code to make it harder for black hat hackers to figure out which bugs are the exploitable ones.</content:encoded><enclosure length="38801760" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Weekly+Roundup+18-08-09_mixdown.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Weekly+Roundup+18-08-09_mixdown.mp3</guid><pubDate>Thu, 09 Aug 2018 14:42:30 +0000</pubDate><itunes:duration>00:26:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>8</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Coin mining in games, SIM hijacking, connected car vulnerabilities, and attacks on the software supply chain within the supply chain</itunes:title><title>Coin mining in games, SIM hijacking, connected car vulnerabilities, and attacks on the software supply chain within the supply chain</title><itunes:summary>Welcome to your weekly cyber security news round-up. This week we discuss the simple-seeming game that was exploiting users’ CPU to mine cryptocurrency. We look at the story of prisoners in the U.S. who hacked their prison-issued tablets, and discuss the teen who stole $5 million through SIM hijacking. We also consider some of the issues that can arise when you buy second-hand connected cars and, yet again, we cover another attack on the software supply chain.</itunes:summary><description>Welcome to your weekly cyber security news round-up. This week we discuss the simple-seeming game that was exploiting users’ CPU to mine cryptocurrency. We look at the story of prisoners in the U.S. who hacked their prison-issued tablets, and discuss the teen who stole $5 million through SIM hijacking. We also consider some of the issues that can arise when you buy second-hand connected cars and, yet again, we cover another attack on the software supply chain.</description><content:encoded>Welcome to your weekly cyber security news round-up. This week we discuss the simple-seeming game that was exploiting users’ CPU to mine cryptocurrency. We look at the story of prisoners in the U.S. who hacked their prison-issued tablets, and discuss the teen who stole $5 million through SIM hijacking. We also consider some of the issues that can arise when you buy second-hand connected cars and, yet again, we cover another attack on the software supply chain.</content:encoded><enclosure length="44611022" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Weekly+Roundup+18-08-02_mixdown.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Weekly+Roundup+18-08-02_mixdown.mp3</guid><pubDate>Thu, 02 Aug 2018 13:00:00 +0000</pubDate><itunes:duration>00:30:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>7</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Leafminer research, data breaches, credential stuffing, and IoT security fails</itunes:title><title>Leafminer research, data breaches, credential stuffing, and IoT security fails</title><itunes:summary>In this week’s round-up of all things cyber security we discuss newly-released research from Symantec detailing the activity of Leafminer, a threat actor carrying out campaigns that target organisations in the Middle East. We also discuss the continuing problem of data breaches, and how these can facilitate credential stuffing attacks by cyber criminals. The Internet of things (IoT), and the security failures that often occur in that space, is also up for discussion. </itunes:summary><description>In this week’s round-up of all things cyber security we discuss newly-released research from Symantec detailing the activity of Leafminer, a threat actor carrying out campaigns that target organisations in the Middle East. We also discuss the continuing problem of data breaches, and how these can facilitate credential stuffing attacks by cyber criminals. The Internet of things (IoT), and the security failures that often occur in that space, is also up for discussion. </description><content:encoded>In this week’s round-up of all things cyber security we discuss newly-released research from Symantec detailing the activity of Leafminer, a threat actor carrying out campaigns that target organisations in the Middle East. We also discuss the continuing problem of data breaches, and how these can facilitate credential stuffing attacks by cyber criminals. The Internet of things (IoT), and the security failures that often occur in that space, is also up for discussion. </content:encoded><enclosure length="39849164" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Weekly+Roundup+18-07-26.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Weekly+Roundup+18-07-26.mp3</guid><pubDate>Thu, 26 Jul 2018 13:00:00 +0000</pubDate><itunes:duration>00:27:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>6</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Powershell risks, extortion scams that threaten embarrassment, Twitter clamps down on dodgy accounts, and the financial impact of data breaches</itunes:title><title>Powershell risks, extortion scams that threaten embarrassment, Twitter clamps down on dodgy accounts, and the financial impact of data breaches</title><itunes:summary>This week we look back at the week that was in cyber security. Dick O’Brien is joined by threat researchers Candid Wueest and Brigid O Gorman to discuss the latest research Symantec has just published about how Powershell is being leveraged by malicious actors. We also discuss extortion scams where people are tricked into transferring money to scammers who claim they have video of them visiting adult websites, how Twitter is trying to clean up its platform, and the financial cost of data breaches for business. </itunes:summary><description>This week we look back at the week that was in cyber security. Dick O’Brien is joined by threat researchers Candid Wueest and Brigid O Gorman to discuss the latest research Symantec has just published about how Powershell is being leveraged by malicious actors. We also discuss extortion scams where people are tricked into transferring money to scammers who claim they have video of them visiting adult websites, how Twitter is trying to clean up its platform, and the financial cost of data breaches for business. </description><content:encoded>This week we look back at the week that was in cyber security. Dick O’Brien is joined by threat researchers Candid Wueest and Brigid O Gorman to discuss the latest research Symantec has just published about how Powershell is being leveraged by malicious actors. We also discuss extortion scams where people are tricked into transferring money to scammers who claim they have video of them visiting adult websites, how Twitter is trying to clean up its platform, and the financial cost of data breaches for business. </content:encoded><enclosure length="45362110" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Weekly+Roundup+18-07-18.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Weekly+Roundup+18-07-18.mp3</guid><pubDate>Thu, 19 Jul 2018 13:34:53 +0000</pubDate><itunes:duration>00:31:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>5</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Special Report: Software Update Supply Chain Attacks</itunes:title><title>Special Report: Software Update Supply Chain Attacks</title><itunes:summary>In this week’s podcast, we discuss software supply chain attacks, a subject we wrote about in this year’s ISTR. Software supply chain attacks increased by 200 percent between 2016 and 2017, with at least one attack every month in 2017. Dick O’Brien is joined by Symantec threat researchers Candid Wueest and Gavin O’Gorman to discuss this surge in attacks, and also to talk about two high-profile examples of these kind of attacks: the Petya/NotPetya and CCleaner attacks.</itunes:summary><description>In this week’s podcast, we discuss software supply chain attacks, a subject we wrote about in this year’s ISTR. Software supply chain attacks increased by 200 percent between 2016 and 2017, with at least one attack every month in 2017. Dick O’Brien is joined by Symantec threat researchers Candid Wueest and Gavin O’Gorman to discuss this surge in attacks, and also to talk about two high-profile examples of these kind of attacks: the Petya/NotPetya and CCleaner attacks.</description><content:encoded>In this week’s podcast, we discuss software supply chain attacks, a subject we wrote about in this year’s ISTR. Software supply chain attacks increased by 200 percent between 2016 and 2017, with at least one attack every month in 2017. Dick O’Brien is joined by Symantec threat researchers Candid Wueest and Gavin O’Gorman to discuss this surge in attacks, and also to talk about two high-profile examples of these kind of attacks: the Petya/NotPetya and CCleaner attacks.</content:encoded><enclosure length="41748859" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/supply_chain_podcast.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/supply_chain_podcast.mp3</guid><pubDate>Thu, 12 Jul 2018 13:30:00 +0000</pubDate><itunes:duration>00:28:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>4</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Mid-year review: Some of the biggest stories of 2018 so far, including VPNFilter, Orangeworm, and Meltdown and Spectre</itunes:title><title>Mid-year review: Some of the biggest stories of 2018 so far, including VPNFilter, Orangeworm, and Meltdown and Spectre</title><itunes:summary>In this week’s podcast we take a look back at the first six months of the year, and review some of the biggest cyber security stories. We discuss VPNFilter, a router malware that, unusually, is able to survive the router being rebooted, as well as highlighting the tool that Symantec has released to tell users whether or not their router is infected with VPNFilter. We also look back at investigations into the Orangeworm and Inception Framework attack groups, as well as reviewing the impact of the Meltdown and Spectre bugs. Finally we look to the world of IoT and discuss smart locks, and if they’re really as smart as they claim to be…</itunes:summary><description>In this week’s podcast we take a look back at the first six months of the year, and review some of the biggest cyber security stories. We discuss VPNFilter, a router malware that, unusually, is able to survive the router being rebooted, as well as highlighting the tool that Symantec has released to tell users whether or not their router is infected with VPNFilter. We also look back at investigations into the Orangeworm and Inception Framework attack groups, as well as reviewing the impact of the Meltdown and Spectre bugs. Finally we look to the world of IoT and discuss smart locks, and if they’re really as smart as they claim to be…</description><content:encoded>In this week’s podcast we take a look back at the first six months of the year, and review some of the biggest cyber security stories. We discuss VPNFilter, a router malware that, unusually, is able to survive the router being rebooted, as well as highlighting the tool that Symantec has released to tell users whether or not their router is infected with VPNFilter. We also look back at investigations into the Orangeworm and Inception Framework attack groups, as well as reviewing the impact of the Meltdown and Spectre bugs. Finally we look to the world of IoT and discuss smart locks, and if they’re really as smart as they claim to be…</content:encoded><enclosure length="47736454" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Half+Year+Roundup+2018_mixdown.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Half+Year+Roundup+2018_mixdown.mp3</guid><pubDate>Thu, 05 Jul 2018 11:19:12 +0000</pubDate><itunes:duration>00:33:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>3</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Ticketmaster breach, insider attacks, the issue of legacy systems in businesses, and is encrypted ransomware a new trend?</itunes:title><title>Ticketmaster breach, insider attacks, the issue of legacy systems in businesses, and is encrypted ransomware a new trend?</title><itunes:summary>In this week’s essential cyber security news round-up, we discuss the recent data breach at Ticketmaster, and also look at encrypted ransomware and wonder whether it's set to become a new trend. Also, after news broke last week that an employee at Tesla had been caught changing code and passing sensitive company information to third parties, we discuss the dangers of insider threats for business, and we also look at the reasons why, in a recent survey, almost 90 percent of UK businesses admitted to running legacy systems in order to keep data accessible.</itunes:summary><description>In this week’s essential cyber security news round-up, we discuss the recent data breach at Ticketmaster, and also look at encrypted ransomware and wonder whether it's set to become a new trend. Also, after news broke last week that an employee at Tesla had been caught changing code and passing sensitive company information to third parties, we discuss the dangers of insider threats for business, and we also look at the reasons why, in a recent survey, almost 90 percent of UK businesses admitted to running legacy systems in order to keep data accessible.</description><content:encoded>In this week’s essential cyber security news round-up, we discuss the recent data breach at Ticketmaster, and also look at encrypted ransomware and wonder whether it's set to become a new trend. Also, after news broke last week that an employee at Tesla had been caught changing code and passing sensitive company information to third parties, we discuss the dangers of insider threats for business, and we also look at the reasons why, in a recent survey, almost 90 percent of UK businesses admitted to running legacy systems in order to keep data accessible.</content:encoded><enclosure length="27781817" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Weekly+roundup+18-06-28.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Weekly+roundup+18-06-28.mp3</guid><pubDate>Thu, 28 Jun 2018 16:35:54 +0000</pubDate><itunes:duration>00:19:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>2</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>New Symantec research on the Thrip cyber espionage group, BEC scammers, and coinminers in court in Japan</itunes:title><title>New Symantec research on the Thrip cyber espionage group, BEC scammers, and coinminers in court in Japan</title><itunes:summary>We discuss a major law enforcement operation against Business Email Compromise (BEC) scammers, an interesting court case in Japan regarding the legality of browser-based coinmining, and we also talk to Jon Di Maggio, the Symantec investigator responsible for our latest research into the cyber espionage group Thrip.</itunes:summary><description>We discuss a major law enforcement operation against Business Email Compromise (BEC) scammers, an interesting court case in Japan regarding the legality of browser-based coinmining, and we also talk to Jon Di Maggio, the Symantec investigator responsible for our latest research into the cyber espionage group Thrip.</description><content:encoded>We discuss a major law enforcement operation against Business Email Compromise (BEC) scammers, an interesting court case in Japan regarding the legality of browser-based coinmining, and we also talk to Jon Di Maggio, the Symantec investigator responsible for our latest research into the cyber espionage group Thrip.</content:encoded><enclosure length="40267352" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Weekly+Roundup+June+20%2C+2018.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Weekly+Roundup+June+20%2C+2018.mp3</guid><pubDate>Thu, 21 Jun 2018 15:29:56 +0000</pubDate><itunes:duration>27:57</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>1</itunes:episode><itunes:season>1</itunes:season></item></channel></rss>
