<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://rss.buzzsprout.com/2154459.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>ShadowTalk: Powered by ReliaQuest</title>

  <lastBuildDate>Wed, 15 Apr 2026 12:39:48 -0400</lastBuildDate>
  <link>https://reliaquest.com/shadowtalk/</link>
  <language>en</language>
  <copyright>© 2026 ShadowTalk: Powered by ReliaQuest</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>480ee082-07a2-53b3-ab5e-00769367ddcc</podcast:guid>
  <itunes:author>ReliaQuest</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[<p><em>Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research.<br></em><br></p><p><em>Threat Intelligence Analyst John Dilgen brings extensive expertise in cyber threat intelligence and incident response, specializing in researching threats impacting ReliaQuest customers. John and his guests provide practical perspectives on the week’s top cybersecurity news and share knowledge and best practices to help businesses mitigate the most pertinent cyber threats.&nbsp;</em></p><p>&nbsp;</p><p><em>With over 1,000 customers worldwide and 1,200 teammates across six global operating centers, ReliaQuest delivers security outcomes for the most trusted enterprise brands in the world. Learn more at </em><a href="http://www.reliaquest.com/"><em>www.reliaquest.com</em></a><em>.</em></p>]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:owner>
    <itunes:name>ReliaQuest</itunes:name>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/wros64kx60j7mheqh9qpjzt1mjy2?.jpg</url>
     <title>ShadowTalk: Powered by ReliaQuest</title>
     <link>https://reliaquest.com/shadowtalk/</link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/wros64kx60j7mheqh9qpjzt1mjy2?.jpg" />
  <itunes:category text="News">
    <itunes:category text="Tech News" />
  </itunes:category>
  <itunes:category text="Technology" />
  <itunes:category text="Business">
    <itunes:category text="Careers" />
  </itunes:category>
  <item>
    <itunes:title>What Claude Mythos Means for Organizations</itunes:title>
    <title>What Claude Mythos Means for Organizations</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts John and Alex, alongside special guest and ReliaQuest CTO Joe Partlow, as they discuss: How Claude Mythos autonomously generated exploitsWhy AI is accelerating CVE volumeDefense strategies organizations need nowJoe Partlow: CTO of ReliaQuest, a leading Information Security provider and is currently involved with new product initiatives along with research and development efforts. Joe has been involved the Information Security field ...]]></itunes:summary>
    <description><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts John and Alex, alongside special guest and ReliaQuest CTO Joe Partlow, as they discuss:</p><ul><li>How Claude Mythos autonomously generated exploits</li><li>Why AI is accelerating CVE volume</li><li>Defense strategies organizations need now</li></ul><p><b>Joe Partlow: </b>CTO of ReliaQuest, a leading Information Security provider and is currently involved with new product initiatives along with research and development efforts. Joe has been involved the Information Security field for over 30 years, in both the defensive side and offensive capabilities. Current projects include data ingestion/analytics at scale, DFIR automation and generative AI. He is also a regular speaker and contributor at security conferences, groups and associations. Joe has a degree in Computer Information Systems and holds many industry-specific certifications</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Alexandra Moore: </b>Manager of Threat Intelligence at ReliaQuest, where she leads intelligence analysis and customer dissemination to help organizations understand and respond to emerging cyber threats. Prior to this, she established and scaled monitoring across Russian-language cybercriminal platforms at Digital Shadows, building collection and analytical coverage to support digital risk protection capabilities.</p>]]></description>
    <content:encoded><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts John and Alex, alongside special guest and ReliaQuest CTO Joe Partlow, as they discuss:</p><ul><li>How Claude Mythos autonomously generated exploits</li><li>Why AI is accelerating CVE volume</li><li>Defense strategies organizations need now</li></ul><p><b>Joe Partlow: </b>CTO of ReliaQuest, a leading Information Security provider and is currently involved with new product initiatives along with research and development efforts. Joe has been involved the Information Security field for over 30 years, in both the defensive side and offensive capabilities. Current projects include data ingestion/analytics at scale, DFIR automation and generative AI. He is also a regular speaker and contributor at security conferences, groups and associations. Joe has a degree in Computer Information Systems and holds many industry-specific certifications</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Alexandra Moore: </b>Manager of Threat Intelligence at ReliaQuest, where she leads intelligence analysis and customer dissemination to help organizations understand and respond to emerging cyber threats. Prior to this, she established and scaled monitoring across Russian-language cybercriminal platforms at Digital Shadows, building collection and analytical coverage to support digital risk protection capabilities.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/19021325-what-claude-mythos-means-for-organizations.mp3" length="18612462" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-19021325</guid>
    <pubDate>Wed, 15 Apr 2026 12:00:00 -0400</pubDate>
    <itunes:duration>1537</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Axios and Trivy — Supply Chain Gaps Organizations Must Fix</itunes:title>
    <title>Axios and Trivy — Supply Chain Gaps Organizations Must Fix</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts John and Tehman as they break down two of the most consequential supply chain attacks of 2026: How DPRK actors socially engineered a NPM maintainerWhy hijacked GitHub versions are a CI/CD wake-up callThe three gaps every security team needs to closeJohn Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he prev...]]></itunes:summary>
    <description><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts John and Tehman as they break down two of the most consequential supply chain attacks of 2026:</p><ul><li>How DPRK actors socially engineered a NPM maintainer</li><li>Why hijacked GitHub versions are a CI/CD wake-up call</li><li>The three gaps every security team needs to close</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Tehman Tariq</b>: Sr. Manager of Cyber Operations at ReliaQuest. He has spent a majority of my career leading our Incident Response, Security Architecture, and Detection teams. As well has working hand in hand with CISOs to introduce automation allowing for the maturity of their security programs.</p>]]></description>
    <content:encoded><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts John and Tehman as they break down two of the most consequential supply chain attacks of 2026:</p><ul><li>How DPRK actors socially engineered a NPM maintainer</li><li>Why hijacked GitHub versions are a CI/CD wake-up call</li><li>The three gaps every security team needs to close</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Tehman Tariq</b>: Sr. Manager of Cyber Operations at ReliaQuest. He has spent a majority of my career leading our Incident Response, Security Architecture, and Detection teams. As well has working hand in hand with CISOs to introduce automation allowing for the maturity of their security programs.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/18984918-axios-and-trivy-supply-chain-gaps-organizations-must-fix.mp3" length="18078627" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18984918</guid>
    <pubDate>Wed, 08 Apr 2026 16:00:00 -0400</pubDate>
    <itunes:duration>1493</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Faster, Smarter, and Already Escalated — What It Takes to Defend Against the Modern Threat Landscape</itunes:title>
    <title>Faster, Smarter, and Already Escalated — What It Takes to Defend Against the Modern Threat Landscape</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts Alexandra and John, live from Exponent 2026, alongside top security leaders as they discuss: How organizations keep pace with attackersWhy one in four incidents starts with social engineeringHow automated response is helping organizationsChris Thompson: CISO of Caris Life Sciences, a leading, next-generation AI TechBio company and precision medicine pioneer.  Chris is a retired Federal Agent having most recently led the North T...]]></itunes:summary>
    <description><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts Alexandra and John, live from Exponent 2026, alongside top security leaders as they discuss:</p><ul><li>How organizations keep pace with attackers</li><li>Why one in four incidents starts with social engineering</li><li>How automated response is helping organizations</li></ul><p><b>Chris Thompson:</b> CISO of Caris Life Sciences, a leading, next-generation AI TechBio company and precision medicine pioneer.  Chris is a retired Federal Agent having most recently led the North Texas Cyber Task Force for the FBI and was an operator on the FBI Cyber Action Team.</p><p><b>Michael Andreano:</b> Sr. Director of Information Security at Hikma Pharmaceuticals, leading their global information security team.  He has over 30 years experience in the healthcare and hospitality industries with roles of increasing responsibility at Merck, Wyndham Hotels, Olympus, Syneos Health, and now Hikma the past four years.  He also is part of the Evanta C-Suite Information Security Community where he serves as a Governing Body member and active in his local Cloud Security Alliance chapter in Lehigh Valley, Pennsylvania. </p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Alexandra Moore: </b>Manager of Threat Intelligence at ReliaQuest, where she leads intelligence analysis and customer dissemination to help organizations understand and respond to emerging cyber threats. Prior to this, she established and scaled monitoring across Russian-language cybercriminal platforms at Digital Shadows, building collection and analytical coverage to support digital risk protection capabilities.</p>]]></description>
    <content:encoded><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts Alexandra and John, live from Exponent 2026, alongside top security leaders as they discuss:</p><ul><li>How organizations keep pace with attackers</li><li>Why one in four incidents starts with social engineering</li><li>How automated response is helping organizations</li></ul><p><b>Chris Thompson:</b> CISO of Caris Life Sciences, a leading, next-generation AI TechBio company and precision medicine pioneer.  Chris is a retired Federal Agent having most recently led the North Texas Cyber Task Force for the FBI and was an operator on the FBI Cyber Action Team.</p><p><b>Michael Andreano:</b> Sr. Director of Information Security at Hikma Pharmaceuticals, leading their global information security team.  He has over 30 years experience in the healthcare and hospitality industries with roles of increasing responsibility at Merck, Wyndham Hotels, Olympus, Syneos Health, and now Hikma the past four years.  He also is part of the Evanta C-Suite Information Security Community where he serves as a Governing Body member and active in his local Cloud Security Alliance chapter in Lehigh Valley, Pennsylvania. </p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Alexandra Moore: </b>Manager of Threat Intelligence at ReliaQuest, where she leads intelligence analysis and customer dissemination to help organizations understand and respond to emerging cyber threats. Prior to this, she established and scaled monitoring across Russian-language cybercriminal platforms at Digital Shadows, building collection and analytical coverage to support digital risk protection capabilities.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/18945914-faster-smarter-and-already-escalated-what-it-takes-to-defend-against-the-modern-threat-landscape.mp3" length="24152445" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18945914</guid>
    <pubDate>Wed, 01 Apr 2026 13:00:00 -0400</pubDate>
    <itunes:duration>2001</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Invisible Attack Surface: Iran-Aligned Threat Actors and Corporate Blind Spots</itunes:title>
    <title>The Invisible Attack Surface: Iran-Aligned Threat Actors and Corporate Blind Spots</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts Brandon and John as they discuss: How Handala wiped 200,000 devices by weaponizing a trusted platformWhy your organization doesn't need to be a direct target to be at riskHow AI-enhanced malware is helping attackers get fasterJohn Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Inc...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts Brandon and John as they discuss:</p><ul><li>How Handala wiped 200,000 devices by weaponizing a trusted platform</li><li>Why your organization doesn&apos;t need to be a direct target to be at risk</li><li>How AI-enhanced malware is helping attackers get faster</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Brandon Tirado</b>: Brandon Tirado is the Director of GreyMatter Operations for ReliaQuest. Brandon is a skilled cyber defense professional with a unique combination of management and hands-on experience. With a deep understanding of adversary motives and the tactics, techniques, and procedures (TTPs) they use to achieve their goals, Brandon enjoys operationalizing his knowledge to make it more difficult for adversaries to operate within the environments of ReliaQuest customers. His managerial and hands-on experience enriches ShadowTalk with practical and strategic viewpoints. </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts Brandon and John as they discuss:</p><ul><li>How Handala wiped 200,000 devices by weaponizing a trusted platform</li><li>Why your organization doesn&apos;t need to be a direct target to be at risk</li><li>How AI-enhanced malware is helping attackers get faster</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Brandon Tirado</b>: Brandon Tirado is the Director of GreyMatter Operations for ReliaQuest. Brandon is a skilled cyber defense professional with a unique combination of management and hands-on experience. With a deep understanding of adversary motives and the tactics, techniques, and procedures (TTPs) they use to achieve their goals, Brandon enjoys operationalizing his knowledge to make it more difficult for adversaries to operate within the environments of ReliaQuest customers. His managerial and hands-on experience enriches ShadowTalk with practical and strategic viewpoints. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/18908302-the-invisible-attack-surface-iran-aligned-threat-actors-and-corporate-blind-spots.mp3" length="14450865" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18908302</guid>
    <pubDate>Wed, 25 Mar 2026 15:00:00 -0400</pubDate>
    <itunes:duration>1191</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The 2026 Annual Threat Report Breakdown, Part 3: The Long Game — Nation-State Threats &amp; What&#39;s Coming in 2026</itunes:title>
    <title>The 2026 Annual Threat Report Breakdown, Part 3: The Long Game — Nation-State Threats &amp; What&#39;s Coming in 2026</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts John and Alex as they discuss: How a Chinese APT maintained access for over a yearWhy North Korean impersonation surged 116%Why attackers exploit the same foundational gapsJohn Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest. Alex...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts John and Alex as they discuss:</p><ul><li>How a Chinese APT maintained access for over a year</li><li>Why North Korean impersonation surged 116%</li><li>Why attackers exploit the same foundational gaps</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Alexander Capraro: </b>Alexander Capraro is a Cyber Threat Intelligence Analyst at ReliaQuest with over five years of experience in cybersecurity. With his prior experience as a Security Analyst, he specializes in incident response, malware campaign tracking, and OSINT investigations. </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts John and Alex as they discuss:</p><ul><li>How a Chinese APT maintained access for over a year</li><li>Why North Korean impersonation surged 116%</li><li>Why attackers exploit the same foundational gaps</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Alexander Capraro: </b>Alexander Capraro is a Cyber Threat Intelligence Analyst at ReliaQuest with over five years of experience in cybersecurity. With his prior experience as a Security Analyst, he specializes in incident response, malware campaign tracking, and OSINT investigations. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/18870681-the-2026-annual-threat-report-breakdown-part-3-the-long-game-nation-state-threats-what-s-coming-in-2026.mp3" length="18231172" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18870681</guid>
    <pubDate>Wed, 18 Mar 2026 15:00:00 -0400</pubDate>
    <itunes:duration>1507</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The 2026 Annual Threat Report Breakdown, Part 2 — Once They&#39;re In: Post-Compromise Tactics, Ransomware &amp; Exfiltration</itunes:title>
    <title>The 2026 Annual Threat Report Breakdown, Part 2 — Once They&#39;re In: Post-Compromise Tactics, Ransomware &amp; Exfiltration</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts Tehman and John as they discuss: Why ransomware now prioritizes exfiltration over encryption How attackers can exfiltrate your data in just 6 minutesWhy proactive darkweb monitoring is criticalJohn Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and T...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts Tehman and John as they discuss:</p><ul><li>Why ransomware now prioritizes exfiltration over encryption </li><li>How attackers can exfiltrate your data in just 6 minutes</li><li>Why proactive darkweb monitoring is critical</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Tehman Tariq</b>: Sr. Manager of Cyber Operations at ReliaQuest. He has spent a majority of my career leading our Incident Response, Security Architecture, and Detection teams. As well has working hand in hand with CISOs to introduce automation allowing for the maturity of their security programs.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts Tehman and John as they discuss:</p><ul><li>Why ransomware now prioritizes exfiltration over encryption </li><li>How attackers can exfiltrate your data in just 6 minutes</li><li>Why proactive darkweb monitoring is critical</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Tehman Tariq</b>: Sr. Manager of Cyber Operations at ReliaQuest. He has spent a majority of my career leading our Incident Response, Security Architecture, and Detection teams. As well has working hand in hand with CISOs to introduce automation allowing for the maturity of their security programs.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/18831773-the-2026-annual-threat-report-breakdown-part-2-once-they-re-in-post-compromise-tactics-ransomware-exfiltration.mp3" length="18961923" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18831773</guid>
    <pubDate>Wed, 11 Mar 2026 16:00:00 -0400</pubDate>
    <itunes:duration>1566</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The 2026 Annual Threat Report Breakdown, Part 1 — How AI Contributes to Attacker Speed, and the Malware That&#39;s Winning</itunes:title>
    <title>The 2026 Annual Threat Report Breakdown, Part 1 — How AI Contributes to Attacker Speed, and the Malware That&#39;s Winning</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts Brandon and John as they discuss: How attacker breakout times dropped to as little as 4 minutes Why ClickFix surged 200%Why behavioral detection is criticalJohn Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest. Brandon Tirado:...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts Brandon and John as they discuss:</p><ul><li>How attacker breakout times dropped to as little as 4 minutes </li><li>Why ClickFix surged 200%</li><li>Why behavioral detection is critical</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Brandon Tirado</b>: Director of Threat Research for ReliaQuest. A skilled cyber defense professional with a unique combination of management and hands-on experience. With a deep understanding of adversary motives and the tactics, techniques, and procedures (TTPs) they use to achieve their goals, Brandon enjoys operationalizing his knowledge to make it more difficult for adversaries to operate within the environments of ReliaQuest customers. His managerial and hands-on experience enriches ShadowTalk with practical and strategic viewpoints.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts Brandon and John as they discuss:</p><ul><li>How attacker breakout times dropped to as little as 4 minutes </li><li>Why ClickFix surged 200%</li><li>Why behavioral detection is critical</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Brandon Tirado</b>: Director of Threat Research for ReliaQuest. A skilled cyber defense professional with a unique combination of management and hands-on experience. With a deep understanding of adversary motives and the tactics, techniques, and procedures (TTPs) they use to achieve their goals, Brandon enjoys operationalizing his knowledge to make it more difficult for adversaries to operate within the environments of ReliaQuest customers. His managerial and hands-on experience enriches ShadowTalk with practical and strategic viewpoints.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/18790303-the-2026-annual-threat-report-breakdown-part-1-how-ai-contributes-to-attacker-speed-and-the-malware-that-s-winning.mp3" length="18645690" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18790303</guid>
    <pubDate>Wed, 04 Mar 2026 14:00:00 -0500</pubDate>
    <itunes:duration>1539</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Malware Isn&#39;t Required—How Ransomware Groups Turn Legitimate RMMs Into a Weapon</itunes:title>
    <title>Malware Isn&#39;t Required—How Ransomware Groups Turn Legitimate RMMs Into a Weapon</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts John and Tehman as they discuss: What attackers prefer over custom malwareHow signature-based detection failsProactive governance vs. reactive triageJohn Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest. Tehman Tariq: Sr. Manager o...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts John and Tehman as they discuss:</p><ul><li>What attackers prefer over custom malware</li><li>How signature-based detection fails</li><li>Proactive governance vs. reactive triage</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Tehman Tariq</b>: Sr. Manager of Cyber Operations at ReliaQuest. He has spent a majority of my career leading our Incident Response, Security Architecture, and Detection teams. As well has working hand in hand with CISOs to introduce automation allowing for the maturity of their security programs.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts John and Tehman as they discuss:</p><ul><li>What attackers prefer over custom malware</li><li>How signature-based detection fails</li><li>Proactive governance vs. reactive triage</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Tehman Tariq</b>: Sr. Manager of Cyber Operations at ReliaQuest. He has spent a majority of my career leading our Incident Response, Security Architecture, and Detection teams. As well has working hand in hand with CISOs to introduce automation allowing for the maturity of their security programs.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/18747180-malware-isn-t-required-how-ransomware-groups-turn-legitimate-rmms-into-a-weapon.mp3" length="15357006" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18747180</guid>
    <pubDate>Wed, 25 Feb 2026 11:00:00 -0500</pubDate>
    <itunes:duration>1266</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ransomware vs. Exfiltration-Only—The Extortion Model Showdown</itunes:title>
    <title>Ransomware vs. Exfiltration-Only—The Extortion Model Showdown</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts Brandon and John as they discuss: Why extortion payment rates are the lowest everOrganizations paying ransomware but refusing data extortion demandsWhy defenders need both visibility and speedJohn Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts Brandon and John as they discuss:</p><ul><li>Why extortion payment rates are the lowest ever</li><li>Organizations paying ransomware but refusing data extortion demands</li><li>Why defenders need both visibility and speed</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Brandon Tirado</b>: Director of Threat Research for ReliaQuest. A skilled cyber defense professional with a unique combination of management and hands-on experience. With a deep understanding of adversary motives and the tactics, techniques, and procedures (TTPs) they use to achieve their goals, Brandon enjoys operationalizing his knowledge to make it more difficult for adversaries to operate within the environments of ReliaQuest customers. His managerial and hands-on experience enriches ShadowTalk with practical and strategic viewpoints.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts Brandon and John as they discuss:</p><ul><li>Why extortion payment rates are the lowest ever</li><li>Organizations paying ransomware but refusing data extortion demands</li><li>Why defenders need both visibility and speed</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Brandon Tirado</b>: Director of Threat Research for ReliaQuest. A skilled cyber defense professional with a unique combination of management and hands-on experience. With a deep understanding of adversary motives and the tactics, techniques, and procedures (TTPs) they use to achieve their goals, Brandon enjoys operationalizing his knowledge to make it more difficult for adversaries to operate within the environments of ReliaQuest customers. His managerial and hands-on experience enriches ShadowTalk with practical and strategic viewpoints.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/18708903-ransomware-vs-exfiltration-only-the-extortion-model-showdown.mp3" length="20612267" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18708903</guid>
    <pubDate>Wed, 18 Feb 2026 18:00:00 -0500</pubDate>
    <itunes:duration>1704</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Patch Management Is Losing—The Case for Predictive Vulnerability Defense</itunes:title>
    <title>Patch Management Is Losing—The Case for Predictive Vulnerability Defense</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts Brandon and John as they discuss: Why traditional patch cycles can't beat attackers exploiting vulnerabilities in 24 hoursThe shift from reactive patching to predictive intelligence using EPSS and CISA KEVHow to defend against zero-days when patching isn't an optionJohn Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical ba...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts Brandon and John as they discuss:</p><ul><li>Why traditional patch cycles can&apos;t beat attackers exploiting vulnerabilities in 24 hours</li><li>The shift from reactive patching to predictive intelligence using EPSS and CISA KEV</li><li>How to defend against zero-days when patching isn&apos;t an option</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Brandon Tirado</b>: Director of Threat Research for ReliaQuest. A skilled cyber defense professional with a unique combination of management and hands-on experience. With a deep understanding of adversary motives and the tactics, techniques, and procedures (TTPs) they use to achieve their goals, Brandon enjoys operationalizing his knowledge to make it more difficult for adversaries to operate within the environments of ReliaQuest customers. His managerial and hands-on experience enriches ShadowTalk with practical and strategic viewpoints.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts Brandon and John as they discuss:</p><ul><li>Why traditional patch cycles can&apos;t beat attackers exploiting vulnerabilities in 24 hours</li><li>The shift from reactive patching to predictive intelligence using EPSS and CISA KEV</li><li>How to defend against zero-days when patching isn&apos;t an option</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Brandon Tirado</b>: Director of Threat Research for ReliaQuest. A skilled cyber defense professional with a unique combination of management and hands-on experience. With a deep understanding of adversary motives and the tactics, techniques, and procedures (TTPs) they use to achieve their goals, Brandon enjoys operationalizing his knowledge to make it more difficult for adversaries to operate within the environments of ReliaQuest customers. His managerial and hands-on experience enriches ShadowTalk with practical and strategic viewpoints.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/18665331-patch-management-is-losing-the-case-for-predictive-vulnerability-defense.mp3" length="21148622" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18665331</guid>
    <pubDate>Wed, 11 Feb 2026 14:00:00 -0500</pubDate>
    <itunes:duration>1748</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Beyond Phishing Emails—Social Engineering Drives Initial Access</itunes:title>
    <title>Beyond Phishing Emails—Social Engineering Drives Initial Access</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts John and Tehman as they discuss: Why phishing emails are no longer the top malware delivery methodEmerging social engineering tactics: vishing, copy and paste abuse, and software impersonationHow campaigns have evolved from Black Basta to ShinyHuntersJohn Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he pr...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts John and Tehman as they discuss:</p><ul><li>Why phishing emails are no longer the top malware delivery method</li><li>Emerging social engineering tactics: vishing, copy and paste abuse, and software impersonation</li><li>How campaigns have evolved from Black Basta to ShinyHunters</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Tehman Tariq</b>: Sr. Manager of Cyber Operations at ReliaQuest. He has spent a majority of my career leading our Incident Response, Security Architecture, and Detection teams. As well has working hand in hand with CISOs to introduce automation allowing for the maturity of their security programs.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts John and Tehman as they discuss:</p><ul><li>Why phishing emails are no longer the top malware delivery method</li><li>Emerging social engineering tactics: vishing, copy and paste abuse, and software impersonation</li><li>How campaigns have evolved from Black Basta to ShinyHunters</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Tehman Tariq</b>: Sr. Manager of Cyber Operations at ReliaQuest. He has spent a majority of my career leading our Incident Response, Security Architecture, and Detection teams. As well has working hand in hand with CISOs to introduce automation allowing for the maturity of their security programs.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/18626552-beyond-phishing-emails-social-engineering-drives-initial-access.mp3" length="16617106" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18626552</guid>
    <pubDate>Wed, 04 Feb 2026 16:00:00 -0500</pubDate>
    <itunes:duration>1371</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Malicious AI—The New Face of Cyber Threats</itunes:title>
    <title>Malicious AI—The New Face of Cyber Threats</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk John and Tehman as they discuss: How AI is enabling large-scale, high-speed attacksNation-states weaponizing AI for attack automationThe rise of sophisticated AI-generated malwareJohn Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest. Tehman T...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>John and Tehman as they discuss:</p><ul><li>How AI is enabling large-scale, high-speed attacks</li><li>Nation-states weaponizing AI for attack automation</li><li>The rise of sophisticated AI-generated malware</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Tehman Tariq</b>: Sr. Manager of Cyber Operations at ReliaQuest. He has spent a majority of my career leading our Incident Response, Security Architecture, and Detection teams. As well has working hand in hand with CISOs to introduce automation allowing for the maturity of their security programs.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>John and Tehman as they discuss:</p><ul><li>How AI is enabling large-scale, high-speed attacks</li><li>Nation-states weaponizing AI for attack automation</li><li>The rise of sophisticated AI-generated malware</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Tehman Tariq</b>: Sr. Manager of Cyber Operations at ReliaQuest. He has spent a majority of my career leading our Incident Response, Security Architecture, and Detection teams. As well has working hand in hand with CISOs to introduce automation allowing for the maturity of their security programs.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/18586742-malicious-ai-the-new-face-of-cyber-threats.mp3" length="14972065" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18586742</guid>
    <pubDate>Wed, 28 Jan 2026 16:00:00 -0500</pubDate>
    <itunes:duration>1234</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Maintainer Compromise: The Next Supply-Chain Attack Vector in 2026</itunes:title>
    <title>Maintainer Compromise: The Next Supply-Chain Attack Vector in 2026</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts Brandon and John as they discuss: How supply-chain attacks evolvedCampaigns targeting NPM package maintainersActionable defense strategiesBrandon Tirado: Director of Threat Research for ReliaQuest. A skilled cyber defense professional with a unique combination of management and hands-on experience. With a deep understanding of adversary motives and the tactics, techniques, and procedures (TTPs) they use to achieve their goals, Brand...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts Brandon and John as they discuss:</p><ul><li>How supply-chain attacks evolved</li><li>Campaigns targeting NPM package maintainers</li><li>Actionable defense strategies</li></ul><p><b>Brandon Tirado</b>: Director of Threat Research for ReliaQuest. A skilled cyber defense professional with a unique combination of management and hands-on experience. With a deep understanding of adversary motives and the tactics, techniques, and procedures (TTPs) they use to achieve their goals, Brandon enjoys operationalizing his knowledge to make it more difficult for adversaries to operate within the environments of ReliaQuest customers. His managerial and hands-on experience enriches ShadowTalk with practical and strategic viewpoints.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts Brandon and John as they discuss:</p><ul><li>How supply-chain attacks evolved</li><li>Campaigns targeting NPM package maintainers</li><li>Actionable defense strategies</li></ul><p><b>Brandon Tirado</b>: Director of Threat Research for ReliaQuest. A skilled cyber defense professional with a unique combination of management and hands-on experience. With a deep understanding of adversary motives and the tactics, techniques, and procedures (TTPs) they use to achieve their goals, Brandon enjoys operationalizing his knowledge to make it more difficult for adversaries to operate within the environments of ReliaQuest customers. His managerial and hands-on experience enriches ShadowTalk with practical and strategic viewpoints.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/18547651-maintainer-compromise-the-next-supply-chain-attack-vector-in-2026.mp3" length="19804246" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18547651</guid>
    <pubDate>Wed, 21 Jan 2026 13:00:00 -0500</pubDate>
    <itunes:duration>1632</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Kicking Off 2026 with Ransomware Insights and Defense Strategies</itunes:title>
    <title>Kicking Off 2026 with Ransomware Insights and Defense Strategies</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts Brandon and Tehman as they discuss: The resurgence of LockBit 5.0 and its December 2025 surge in named organizationsHow top ransomware groups like Qilin, Akira, and Clop dominated in 2025.Actionable defense strategies for organizations to proactively combat ransomware in 2026Brandon Tirado: Director of Threat Research for ReliaQuest. Brandon is a skilled cyber defense professional with a unique combination of management and hands-on...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts Brandon and Tehman as they discuss:</p><ul><li>The resurgence of LockBit 5.0 and its December 2025 surge in named organizations</li><li>How top ransomware groups like Qilin, Akira, and Clop dominated in 2025.</li><li>Actionable defense strategies for organizations to proactively combat ransomware in 2026</li></ul><p><b>Brandon Tirado</b>: Director of Threat Research for ReliaQuest. Brandon is a skilled cyber defense professional with a unique combination of management and hands-on experience. With a deep understanding of adversary motives and the tactics, techniques, and procedures (TTPs) they use to achieve their goals, Brandon enjoys operationalizing his knowledge to make it more difficult for adversaries to operate within the environments of ReliaQuest customers. His managerial and hands-on experience enriches ShadowTalk with practical and strategic viewpoints.</p><p><b>Tehman Tariq</b>: Sr. Manager of Cyber Operations at ReliaQuest. He has spent a majority of my career leading our Incident Response, Security Architecture, and Detection teams. As well has working hand in hand with CISOs to introduce automation allowing for the maturity of their security programs.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join hosts Brandon and Tehman as they discuss:</p><ul><li>The resurgence of LockBit 5.0 and its December 2025 surge in named organizations</li><li>How top ransomware groups like Qilin, Akira, and Clop dominated in 2025.</li><li>Actionable defense strategies for organizations to proactively combat ransomware in 2026</li></ul><p><b>Brandon Tirado</b>: Director of Threat Research for ReliaQuest. Brandon is a skilled cyber defense professional with a unique combination of management and hands-on experience. With a deep understanding of adversary motives and the tactics, techniques, and procedures (TTPs) they use to achieve their goals, Brandon enjoys operationalizing his knowledge to make it more difficult for adversaries to operate within the environments of ReliaQuest customers. His managerial and hands-on experience enriches ShadowTalk with practical and strategic viewpoints.</p><p><b>Tehman Tariq</b>: Sr. Manager of Cyber Operations at ReliaQuest. He has spent a majority of my career leading our Incident Response, Security Architecture, and Detection teams. As well has working hand in hand with CISOs to introduce automation allowing for the maturity of their security programs.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/18508980-kicking-off-2026-with-ransomware-insights-and-defense-strategies.mp3" length="22920378" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18508980</guid>
    <pubDate>Wed, 14 Jan 2026 18:00:00 -0500</pubDate>
    <itunes:duration>1894</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>React2Shell Attacks Evolve, ClickFix Attacks, and Holiday Season Threats</itunes:title>
    <title>React2Shell Attacks Evolve, ClickFix Attacks, and Holiday Season Threats</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join host John and intelligence analyst Ivan as they discuss: React2Shell Exploits Flood the Internet as Attacks Continue (1:06)ClickFix Style Attack Leveraging Grok and ChatGPT for Malware Delivery (7:39)New ConsentFix Attack Hijacking Microsoft Accounts via Azure CLI (13:50)Holiday Season Attack Risks: Phishing, Ransomware, and Defense Recommendations (18:22)John Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes i...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host John and intelligence analyst Ivan as they discuss:</p><ul><li>React2Shell Exploits Flood the Internet as Attacks Continue (1:06)</li><li>ClickFix Style Attack Leveraging Grok and ChatGPT for Malware Delivery (7:39)</li><li>New ConsentFix Attack Hijacking Microsoft Accounts via Azure CLI (13:50)</li><li>Holiday Season Attack Risks: Phishing, Ransomware, and Defense Recommendations (18:22)</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Ivan Righi: </b>Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. Since joining ReliaQuest in June 2019, Ivan has focused on data breach investigations, automations, threat actor profiling, and reverse engineering threat campaigns. He holds a Master of Science degree in Cybersecurity and a GIAC Reverse Engineering Malware (GREM) certification, bringing technical expertise and actionable insights.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host John and intelligence analyst Ivan as they discuss:</p><ul><li>React2Shell Exploits Flood the Internet as Attacks Continue (1:06)</li><li>ClickFix Style Attack Leveraging Grok and ChatGPT for Malware Delivery (7:39)</li><li>New ConsentFix Attack Hijacking Microsoft Accounts via Azure CLI (13:50)</li><li>Holiday Season Attack Risks: Phishing, Ransomware, and Defense Recommendations (18:22)</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Ivan Righi: </b>Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. Since joining ReliaQuest in June 2019, Ivan has focused on data breach investigations, automations, threat actor profiling, and reverse engineering threat campaigns. He holds a Master of Science degree in Cybersecurity and a GIAC Reverse Engineering Malware (GREM) certification, bringing technical expertise and actionable insights.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/18374206-react2shell-attacks-evolve-clickfix-attacks-and-holiday-season-threats.mp3" length="22968364" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18374206</guid>
    <pubDate>Wed, 17 Dec 2025 14:00:00 -0500</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/2154459/18374206/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Intro" />
  <psc:chapter start="1:06" title="React2Shell Exploits Continue to Flood the Internet" />
  <psc:chapter start="7:40" title="ClickFix Style Attack Leveraging Grok and ChatGPT" />
  <psc:chapter start="13:51" title="New ConsentFix Attack Hijacking Microsoft Accounts via Azure CLI" />
  <psc:chapter start="18:22" title="Holiday Season Attack Risks" />
  <psc:chapter start="30:13" title="Outro" />
</psc:chapters>
    <itunes:duration>1898</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>React2Shell Exploits, CISA’s Brickstorm Warning, ShadyPanda’s Browser Weaponization</itunes:title>
    <title>React2Shell Exploits, CISA’s Brickstorm Warning, ShadyPanda’s Browser Weaponization</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join host John along with systems security engineer Corey and intelligence analyst Hayden as they discuss: Chinese Threat Groups Exploiting the React2Shell Vulnerability (1:18)CISA Issues Alert on Persistent Brickstorm Backdoor Attacks (9:05)ShadyPanda Hackers Turn Millions of Browsers into Weapons (13:36)Storm-0249’s Shift to Targeted EDR Exploitation (20:09)John Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host John along with systems security engineer Corey and intelligence analyst Hayden as they discuss:</p><ul><li>Chinese Threat Groups Exploiting the React2Shell Vulnerability (1:18)</li><li>CISA Issues Alert on Persistent Brickstorm Backdoor Attacks (9:05)</li><li>ShadyPanda Hackers Turn Millions of Browsers into Weapons (13:36)</li><li>Storm-0249’s Shift to Targeted EDR Exploitation (20:09)</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Corey Carter</b>: Systems Security Engineer at ReliaQuest. A Florida native and former infantryman in the United States Marines, Corey holds a bachelor&apos;s degree in computer science with a specialization in information assurance. His experience as a detection researcher, security analyst, and threat hunter at ReliaQuest, combined with his military background, equips him with a unique perspective on cybersecurity challenges.</p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host John along with systems security engineer Corey and intelligence analyst Hayden as they discuss:</p><ul><li>Chinese Threat Groups Exploiting the React2Shell Vulnerability (1:18)</li><li>CISA Issues Alert on Persistent Brickstorm Backdoor Attacks (9:05)</li><li>ShadyPanda Hackers Turn Millions of Browsers into Weapons (13:36)</li><li>Storm-0249’s Shift to Targeted EDR Exploitation (20:09)</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Corey Carter</b>: Systems Security Engineer at ReliaQuest. A Florida native and former infantryman in the United States Marines, Corey holds a bachelor&apos;s degree in computer science with a specialization in information assurance. His experience as a detection researcher, security analyst, and threat hunter at ReliaQuest, combined with his military background, equips him with a unique perspective on cybersecurity challenges.</p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/18332130-react2shell-exploits-cisa-s-brickstorm-warning-shadypanda-s-browser-weaponization.mp3" length="23598113" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18332130</guid>
    <pubDate>Wed, 10 Dec 2025 12:00:00 -0500</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/2154459/18332130/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Intro" />
  <psc:chapter start="1:18" title="Chinese Threat Groups Exploiting the React2Shell Vulnerability" />
  <psc:chapter start="9:05" title="CISA Issues Alert on Persistent Brickstorm Backdoor Attacks" />
  <psc:chapter start="13:36" title="ShadyPanda Hackers Turn Millions of Browsers into Weapons" />
  <psc:chapter start="20:09" title="Storm-0429&#39;s Shift to Targeted EDR Exploitation" />
  <psc:chapter start="31:09" title="Outro" />
</psc:chapters>
    <itunes:duration>1949</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Scattered Lapsus$ Hunters, SilverFox&#39;s ValleyRat Campaign, and More</itunes:title>
    <title>Scattered Lapsus$ Hunters, SilverFox&#39;s ValleyRat Campaign, and More</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join host John and intelligence analysts Alex and Hayden as they discuss: Scattered Lapsus$ Hunters Targeting Zendesk (1:14)Microsoft Teams Guest Access Phishing Bypass (3:37)Dark AI Tools Enhancing Threat Actors (6:08)Silver Fox’s Campaign: Chinese APT Spotlight (10:05)John Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical backgrou...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host John and intelligence analysts Alex and Hayden as they discuss:</p><ul><li>Scattered Lapsus$ Hunters Targeting Zendesk (1:14)</li><li>Microsoft Teams Guest Access Phishing Bypass (3:37)</li><li>Dark AI Tools Enhancing Threat Actors (6:08)</li><li>Silver Fox’s Campaign: Chinese APT Spotlight (10:05)</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Alexander Capraro: </b>Cyber Threat Intelligence Analyst at ReliaQuest with over five years of experience in cybersecurity. With his prior experience as a Security Analyst, he specializes in incident response, malware campaign tracking, and OSINT investigations. </p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host John and intelligence analysts Alex and Hayden as they discuss:</p><ul><li>Scattered Lapsus$ Hunters Targeting Zendesk (1:14)</li><li>Microsoft Teams Guest Access Phishing Bypass (3:37)</li><li>Dark AI Tools Enhancing Threat Actors (6:08)</li><li>Silver Fox’s Campaign: Chinese APT Spotlight (10:05)</li></ul><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Alexander Capraro: </b>Cyber Threat Intelligence Analyst at ReliaQuest with over five years of experience in cybersecurity. With his prior experience as a Security Analyst, he specializes in incident response, malware campaign tracking, and OSINT investigations. </p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/18293733-scattered-lapsus-hunters-silverfox-s-valleyrat-campaign-and-more.mp3" length="18204967" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18293733</guid>
    <pubDate>Wed, 03 Dec 2025 16:00:00 -0500</pubDate>
    <itunes:duration>1501</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Are Cyber Predictions Worth It? Plus Chinese AI Attacks, IoT Takeovers</itunes:title>
    <title>Are Cyber Predictions Worth It? Plus Chinese AI Attacks, IoT Takeovers</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Do you really need predictions to tackle cyber threats? Join host Kim along with intelligence analyst John &amp; special guest CISO Rafal Baran as they discuss: New NPM Supply Chain Threat (1:13)China Manipulates AI for Initial Access (4:46)Cloud Gaps Bring IoT Takeover (7:29)2026 Cyber-Threat Predictions (10:57)Rafal Baran: IT security leader and CISO in the global reinsurance space. He focuses on building practical security and privacy ...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Do you really need predictions to tackle cyber threats? Join host Kim along with intelligence analyst John &amp; special guest CISO Rafal Baran as they discuss:</p><ul><li>New NPM Supply Chain Threat (1:13)</li><li>China Manipulates AI for Initial Access (4:46)</li><li>Cloud Gaps Bring IoT Takeover (7:29)</li><li>2026 Cyber-Threat Predictions (10:57)</li></ul><p><b>Rafal Baran: </b>IT security leader and CISO in the global reinsurance space. He focuses on building practical security and privacy programs across multiple jurisdictions, with an emphasis on cloud security and incident readiness. He advises senior leadership on emerging risks and resilience and holds boardroom certification as a Qualified Technology Expert, along with multiple credentials spanning cybersecurity, privacy, and the re/insurance domains. Outside his role, he mentors upcoming security professionals and contributes to the broader cyber community. </p><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Do you really need predictions to tackle cyber threats? Join host Kim along with intelligence analyst John &amp; special guest CISO Rafal Baran as they discuss:</p><ul><li>New NPM Supply Chain Threat (1:13)</li><li>China Manipulates AI for Initial Access (4:46)</li><li>Cloud Gaps Bring IoT Takeover (7:29)</li><li>2026 Cyber-Threat Predictions (10:57)</li></ul><p><b>Rafal Baran: </b>IT security leader and CISO in the global reinsurance space. He focuses on building practical security and privacy programs across multiple jurisdictions, with an emphasis on cloud security and incident readiness. He advises senior leadership on emerging risks and resilience and holds boardroom certification as a Qualified Technology Expert, along with multiple credentials spanning cybersecurity, privacy, and the re/insurance domains. Outside his role, he mentors upcoming security professionals and contributes to the broader cyber community. </p><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/18258790-are-cyber-predictions-worth-it-plus-chinese-ai-attacks-iot-takeovers.mp3" length="20299110" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18258790</guid>
    <pubDate>Wed, 26 Nov 2025 12:00:00 -0500</pubDate>
    <itunes:duration>1673</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Fortinet Flaw Exposed and Exploited! Plus, Threat Hunter Hacks: SEO Hits Hard</itunes:title>
    <title>Fortinet Flaw Exposed and Exploited! Plus, Threat Hunter Hacks: SEO Hits Hard</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim, intelligence analyst John, and threat hunter Tristan as they discuss: Fortinet Flaw Enables Admin TakeoverAkira Ransomware Targets Nutanix VMsSmart Redirects Evade Phishing DetectionThreat Hunter Hacks: SEO Hits HardListen on @Listennotes: https://lnns.co/mgbyVjXv7p6 Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK la...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim, intelligence analyst John, and threat hunter Tristan as they discuss:</p><ul><li>Fortinet Flaw Enables Admin Takeover</li><li>Akira Ransomware Targets Nutanix VMs</li><li>Smart Redirects Evade Phishing Detection</li><li>Threat Hunter Hacks: SEO Hits Hard</li></ul><p>Listen on <b>@Listennotes</b>: <a href='https://lnns.co/mgbyVjXv7p6'>https://lnns.co/mgbyVjXv7p6</a></p><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Tristan Luikey</b>: Threat Hunter at ReliaQuest, specializing in responding to and mitigating active breaches to safeguard customers&apos; networks. In addition to breach response, Tristan conducts comprehensive research into emerging threats and attack techniques, enabling proactive threat hunting to strengthen organizational security.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim, intelligence analyst John, and threat hunter Tristan as they discuss:</p><ul><li>Fortinet Flaw Enables Admin Takeover</li><li>Akira Ransomware Targets Nutanix VMs</li><li>Smart Redirects Evade Phishing Detection</li><li>Threat Hunter Hacks: SEO Hits Hard</li></ul><p>Listen on <b>@Listennotes</b>: <a href='https://lnns.co/mgbyVjXv7p6'>https://lnns.co/mgbyVjXv7p6</a></p><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Tristan Luikey</b>: Threat Hunter at ReliaQuest, specializing in responding to and mitigating active breaches to safeguard customers&apos; networks. In addition to breach response, Tristan conducts comprehensive research into emerging threats and attack techniques, enabling proactive threat hunting to strengthen organizational security.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/18220430-fortinet-flaw-exposed-and-exploited-plus-threat-hunter-hacks-seo-hits-hard.mp3" length="21485139" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18220430</guid>
    <pubDate>Wed, 19 Nov 2025 16:00:00 -0500</pubDate>
    <itunes:duration>1775</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Gootloader&#39;s Return, LANDFALL Android Spyware, Sector-by-Sector Cyber Trends</itunes:title>
    <title>Gootloader&#39;s Return, LANDFALL Android Spyware, Sector-by-Sector Cyber Trends</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Wondering why Gootloader is suddenly back in action? Join host Kim along with intelligence analyst Hayden &amp; Systems Security Engineer Corey as they discuss: Gootloader Returns Using SEO Poisoning (1:27)New Android Spyware LANDFALL (6:33)Curly COMrades Hide in Windows Using Linux VMs (10:57)Sector-by-Sector Cyber Trends Q3 2025 (15:20)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined Re...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Wondering why Gootloader is suddenly back in action? Join host Kim along with intelligence analyst Hayden &amp; Systems Security Engineer Corey as they discuss:</p><ul><li>Gootloader Returns Using SEO Poisoning (1:27)</li><li>New Android Spyware LANDFALL (6:33)</li><li>Curly COMrades Hide in Windows Using Linux VMs (10:57)</li><li>Sector-by-Sector Cyber Trends Q3 2025 (15:20)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Corey Carter</b>: Detection Researcher at ReliaQuest. A Florida native and former infantryman in the United States Marines, Corey holds a bachelor&apos;s degree in computer science with a specialization in information assurance. His experience as a Security Analyst and Threat Hunter at ReliaQuest, combined with his military background, equips him with a unique perspective on cybersecurity challenges.</p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Wondering why Gootloader is suddenly back in action? Join host Kim along with intelligence analyst Hayden &amp; Systems Security Engineer Corey as they discuss:</p><ul><li>Gootloader Returns Using SEO Poisoning (1:27)</li><li>New Android Spyware LANDFALL (6:33)</li><li>Curly COMrades Hide in Windows Using Linux VMs (10:57)</li><li>Sector-by-Sector Cyber Trends Q3 2025 (15:20)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Corey Carter</b>: Detection Researcher at ReliaQuest. A Florida native and former infantryman in the United States Marines, Corey holds a bachelor&apos;s degree in computer science with a specialization in information assurance. His experience as a Security Analyst and Threat Hunter at ReliaQuest, combined with his military background, equips him with a unique perspective on cybersecurity challenges.</p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/18178771-gootloader-s-return-landfall-android-spyware-sector-by-sector-cyber-trends.mp3" length="24931937" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18178771</guid>
    <pubDate>Wed, 12 Nov 2025 12:00:00 -0500</pubDate>
    <itunes:duration>2057</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why Cloud Threats Are Escalating: Identity Risks, Automation Flaws, and Legacy Vulnerabilities, Plus the Latest on Chinese APT Campaigns and NPM Package Abuse</itunes:title>
    <title>Why Cloud Threats Are Escalating: Identity Risks, Automation Flaws, and Legacy Vulnerabilities, Plus the Latest on Chinese APT Campaigns and NPM Package Abuse</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Did you know 99% of cloud identities are over-privileged, creating the perfect storm for attackers to seamlessly infiltrate your environment? Join host Kim along with intelligence analysts John &amp; Alex as they discuss:  Chinese Nation-State Campaigns and Geopolitics (1:12)Malicious NPM Packages (7:20)TruffleNet Attacks on AWS (10:53)The Danger of Over-Privileged Cloud Identities (15:36)Kim Bromley: Senior Cyber Threat Intelligence Anal...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Did you know 99% of cloud identities are over-privileged, creating the perfect storm for attackers to seamlessly infiltrate your environment? Join host Kim along with intelligence analysts John &amp; Alex as they discuss: </p><ul><li>Chinese Nation-State Campaigns and Geopolitics (1:12)</li><li>Malicious NPM Packages (7:20)</li><li>TruffleNet Attacks on AWS (10:53)</li><li>The Danger of Over-Privileged Cloud Identities (15:36)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Alexander Capraro: </b>Alexander Capraro is a Cyber Threat Intelligence Analyst at ReliaQuest with over five years of experience in cybersecurity. With his prior experience as a Security Analyst, he specializes in incident response, malware campaign tracking, and OSINT investigations. </p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Did you know 99% of cloud identities are over-privileged, creating the perfect storm for attackers to seamlessly infiltrate your environment? Join host Kim along with intelligence analysts John &amp; Alex as they discuss: </p><ul><li>Chinese Nation-State Campaigns and Geopolitics (1:12)</li><li>Malicious NPM Packages (7:20)</li><li>TruffleNet Attacks on AWS (10:53)</li><li>The Danger of Over-Privileged Cloud Identities (15:36)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Alexander Capraro: </b>Alexander Capraro is a Cyber Threat Intelligence Analyst at ReliaQuest with over five years of experience in cybersecurity. With his prior experience as a Security Analyst, he specializes in incident response, malware campaign tracking, and OSINT investigations. </p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/18139198-why-cloud-threats-are-escalating-identity-risks-automation-flaws-and-legacy-vulnerabilities-plus-the-latest-on-chinese-apt-campaigns-and-npm-package-abuse.mp3" length="19836539" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18139198</guid>
    <pubDate>Wed, 05 Nov 2025 12:00:00 -0500</pubDate>
    <itunes:duration>1638</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why Cyber Threats Surge 20% During M&amp;A, Plus the Latest on Qilin and Lazarus Group Campaigns</itunes:title>
    <title>Why Cyber Threats Surge 20% During M&amp;A, Plus the Latest on Qilin and Lazarus Group Campaigns</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Picture this: You close a $50M acquisition on Friday and by Monday, attackers are in your network. Sound far-fetched? It's not. Join host Kim along with intelligence analyst John &amp; Threat Hunter Leo as they discuss: Attackers Exploit WSUS Flaw (1:15)Qilin Deploys Cross-Platform Attacks (4:21)Lazarus Group Reignites Operation DreamJob (9:05)Threat Hunter Hacks: Active Cyber Threats in M&amp;A (15:19)Kim Bromley: Senior Cyber Threat Intellig...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Picture this: You close a $50M acquisition on Friday and by Monday, attackers are in your network. Sound far-fetched? It&apos;s not. Join host Kim along with intelligence analyst John &amp; Threat Hunter Leo as they discuss:</p><ul><li>Attackers Exploit WSUS Flaw (1:15)</li><li>Qilin Deploys Cross-Platform Attacks (4:21)</li><li>Lazarus Group Reignites Operation DreamJob (9:05)</li><li>Threat Hunter Hacks: Active Cyber Threats in M&amp;A (15:19)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Leo Dawson</b>: Leo Dawson is a Threat Hunter on the ReliaQuest Threat Research Team. With a deep background in Experimental Physics and Artificial Intelligence, Leo brings a unique interdisciplinary perspective to cybersecurity. He is driven by a passion for leveraging these skills to proactively track, analyze, and understand threat actor campaigns while gaining deeper insights into their evolving tactics and behaviors. </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Picture this: You close a $50M acquisition on Friday and by Monday, attackers are in your network. Sound far-fetched? It&apos;s not. Join host Kim along with intelligence analyst John &amp; Threat Hunter Leo as they discuss:</p><ul><li>Attackers Exploit WSUS Flaw (1:15)</li><li>Qilin Deploys Cross-Platform Attacks (4:21)</li><li>Lazarus Group Reignites Operation DreamJob (9:05)</li><li>Threat Hunter Hacks: Active Cyber Threats in M&amp;A (15:19)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Leo Dawson</b>: Leo Dawson is a Threat Hunter on the ReliaQuest Threat Research Team. With a deep background in Experimental Physics and Artificial Intelligence, Leo brings a unique interdisciplinary perspective to cybersecurity. He is driven by a passion for leveraging these skills to proactively track, analyze, and understand threat actor campaigns while gaining deeper insights into their evolving tactics and behaviors. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/18099631-why-cyber-threats-surge-20-during-m-a-plus-the-latest-on-qilin-and-lazarus-group-campaigns.mp3" length="22536086" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18099631</guid>
    <pubDate>Wed, 29 Oct 2025 13:00:00 -0400</pubDate>
    <itunes:duration>1865</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Automate to Defend: A Former FBI Agent&#39;s Ransomware Guide for CISOs</itunes:title>
    <title>Automate to Defend: A Former FBI Agent&#39;s Ransomware Guide for CISOs</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Wondering what makes ransomware operations successful? Join host Kim along with intelligence analyst John &amp; former FBI Special Agent Keith Mularski as they discuss: Year-Long F5 Breach (2:42)North Korean Attacker Adopts EtherHiding (7:53)Phishing Attacks Target LastPass (12:11)Fighting Ransomware Automation: A CISO's Guide (17:19)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQ...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Wondering what makes ransomware operations successful? Join host Kim along with intelligence analyst John &amp; former FBI Special Agent Keith Mularski as they discuss:</p><ul><li>Year-Long F5 Breach (2:42)</li><li>North Korean Attacker Adopts EtherHiding (7:53)</li><li>Phishing Attacks Target LastPass (12:11)</li><li>Fighting Ransomware Automation: A CISO&apos;s Guide (17:19)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Keith Mularski</b> is the Chief Global Ambassador at Qintel, where he leads global engagement and represents the company’s intelligence mission across governments, industry, and cybersecurity communities worldwide. Before joining Qintel, Keith led the Cyber Threat Management group at Ernst &amp; Young, advising Fortune 100 companies on proactive defense and intelligence strategies. He also served more than 20 years as an FBI Special Agent, leading groundbreaking cybercrime investigations and pioneering collaboration between law enforcement and the private sector. His undercover work has been featured in the books <em>Kingpin</em> and <em>DarkMarket</em>. Keith is also co-host of the podcast <em>Only Malware in the Building</em>, where he explores the stories behind cybercrime and threat intelligence.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Wondering what makes ransomware operations successful? Join host Kim along with intelligence analyst John &amp; former FBI Special Agent Keith Mularski as they discuss:</p><ul><li>Year-Long F5 Breach (2:42)</li><li>North Korean Attacker Adopts EtherHiding (7:53)</li><li>Phishing Attacks Target LastPass (12:11)</li><li>Fighting Ransomware Automation: A CISO&apos;s Guide (17:19)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Keith Mularski</b> is the Chief Global Ambassador at Qintel, where he leads global engagement and represents the company’s intelligence mission across governments, industry, and cybersecurity communities worldwide. Before joining Qintel, Keith led the Cyber Threat Management group at Ernst &amp; Young, advising Fortune 100 companies on proactive defense and intelligence strategies. He also served more than 20 years as an FBI Special Agent, leading groundbreaking cybercrime investigations and pioneering collaboration between law enforcement and the private sector. His undercover work has been featured in the books <em>Kingpin</em> and <em>DarkMarket</em>. Keith is also co-host of the podcast <em>Only Malware in the Building</em>, where he explores the stories behind cybercrime and threat intelligence.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/18057436-automate-to-defend-a-former-fbi-agent-s-ransomware-guide-for-cisos.mp3" length="23352351" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18057436</guid>
    <pubDate>Wed, 22 Oct 2025 13:00:00 -0400</pubDate>
    <itunes:duration>1928</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Is Your Software a Secret Backdoor? Flax Typhoon&#39;s Latest Campaign Unwrapped</itunes:title>
    <title>Is Your Software a Secret Backdoor? Flax Typhoon&#39;s Latest Campaign Unwrapped</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk How long could Flax Typhoon nestle silently in your networks? Join host Kim along with intelligence analysts John &amp; Joey as they discuss: Velociraptor Abused in Ransomware Attacks (1:13)New Oracle E-business Suite Flaw (5:19)GitHub CamoLeak AI Attack (7:46)Year-Long Flax Typhoon ArcGIS Campaign  (11:23)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 follo...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>How long could Flax Typhoon nestle silently in your networks? Join host Kim along with intelligence analysts John &amp; Joey as they discuss:</p><ul><li>Velociraptor Abused in Ransomware Attacks (1:13)</li><li>New Oracle E-business Suite Flaw (5:19)</li><li>GitHub CamoLeak AI Attack (7:46)</li><li>Year-Long Flax Typhoon ArcGIS Campaign  (11:23)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>How long could Flax Typhoon nestle silently in your networks? Join host Kim along with intelligence analysts John &amp; Joey as they discuss:</p><ul><li>Velociraptor Abused in Ransomware Attacks (1:13)</li><li>New Oracle E-business Suite Flaw (5:19)</li><li>GitHub CamoLeak AI Attack (7:46)</li><li>Year-Long Flax Typhoon ArcGIS Campaign  (11:23)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/18017539-is-your-software-a-secret-backdoor-flax-typhoon-s-latest-campaign-unwrapped.mp3" length="16269799" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18017539</guid>
    <pubDate>Wed, 15 Oct 2025 13:00:00 -0400</pubDate>
    <itunes:duration>1341</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cl0p&#39;s Latest Heist: Exploiting Oracle&#39;s Critical Vulnerability</itunes:title>
    <title>Cl0p&#39;s Latest Heist: Exploiting Oracle&#39;s Critical Vulnerability</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with Intelligence Analyst John and Threat Detection Engineer Marken as they discuss: Clop's Exploitation of Oracle E-Business Suite (1:09)Scattered Lapsus$ Hunters Return With Salesforce Leaks (5:27)Shutdown Threatens US Intel Sharing and Cyber Defense (10:02)Ransomware and Cyber Extortion in Q3 2025 (15:02)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with Intelligence Analyst John and Threat Detection Engineer Marken as they discuss:</p><ul><li>Clop&apos;s Exploitation of Oracle E-Business Suite (1:09)</li><li>Scattered Lapsus$ Hunters Return With Salesforce Leaks (5:27)</li><li>Shutdown Threatens US Intel Sharing and Cyber Defense (10:02)</li><li>Ransomware and Cyber Extortion in Q3 2025 (15:02)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Marken Teder</b>: Threat Detection Engineer at ReliaQuest, with a total of 7 years at the company. A native Estonian, he has previously worked as an Incident Response Analyst, Content Developer, and Security Architect. Marken&apos;s extensive experience in detection and response brings a robust technical perspective to discussions.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with Intelligence Analyst John and Threat Detection Engineer Marken as they discuss:</p><ul><li>Clop&apos;s Exploitation of Oracle E-Business Suite (1:09)</li><li>Scattered Lapsus$ Hunters Return With Salesforce Leaks (5:27)</li><li>Shutdown Threatens US Intel Sharing and Cyber Defense (10:02)</li><li>Ransomware and Cyber Extortion in Q3 2025 (15:02)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Marken Teder</b>: Threat Detection Engineer at ReliaQuest, with a total of 7 years at the company. A native Estonian, he has previously worked as an Incident Response Analyst, Content Developer, and Security Architect. Marken&apos;s extensive experience in detection and response brings a robust technical perspective to discussions.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17978190-cl0p-s-latest-heist-exploiting-oracle-s-critical-vulnerability.mp3" length="25545856" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17978190</guid>
    <pubDate>Wed, 08 Oct 2025 13:00:00 -0400</pubDate>
    <itunes:duration>2108</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Should Governments Hoard Zero Days? Analyzing Brickstorm Malware and Storm-1849</itunes:title>
    <title>Should Governments Hoard Zero Days? Analyzing Brickstorm Malware and Storm-1849</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Joey along with intelligence analysts Alex and Hayden as they discuss: Brickstorm Backdoor in U.S. Legal and Tech Sectors (1:17)Storm-1849 Targeting Cisco ASA Devices (4:38)Medusa Attempts to Pay Reporter for Initial Access (7:00)Debate Over Government Zero-Day Stockpiling (14:41)Joseph Keyes: Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Anal...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Joey along with intelligence analysts Alex and Hayden as they discuss:</p><ul><li>Brickstorm Backdoor in U.S. Legal and Tech Sectors (1:17)</li><li>Storm-1849 Targeting Cisco ASA Devices (4:38)</li><li>Medusa Attempts to Pay Reporter for Initial Access (7:00)</li><li>Debate Over Government Zero-Day Stockpiling (14:41)</li></ul><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs.</p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security. </p><p><b>Alexander Capraro: </b>Cyber Threat Intelligence Analyst at ReliaQuest with over five years of experience in cybersecurity. With his prior experience as a Security Analyst, he specializes in incident response, malware analysis and campaign tracking, and OSINT investigations.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Joey along with intelligence analysts Alex and Hayden as they discuss:</p><ul><li>Brickstorm Backdoor in U.S. Legal and Tech Sectors (1:17)</li><li>Storm-1849 Targeting Cisco ASA Devices (4:38)</li><li>Medusa Attempts to Pay Reporter for Initial Access (7:00)</li><li>Debate Over Government Zero-Day Stockpiling (14:41)</li></ul><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs.</p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security. </p><p><b>Alexander Capraro: </b>Cyber Threat Intelligence Analyst at ReliaQuest with over five years of experience in cybersecurity. With his prior experience as a Security Analyst, he specializes in incident response, malware analysis and campaign tracking, and OSINT investigations.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17940230-should-governments-hoard-zero-days-analyzing-brickstorm-malware-and-storm-1849.mp3" length="19340108" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17940230</guid>
    <pubDate>Wed, 01 Oct 2025 13:00:00 -0400</pubDate>
    <itunes:duration>1589</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Attacker Breakout Time Hits 18 Minutes, New Shai-hulud NPM Worm</itunes:title>
    <title>Attacker Breakout Time Hits 18 Minutes, New Shai-hulud NPM Worm</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts John and Joey as they discuss: Summer 2025 Attacker Trends (13:41)Self-Replicating 'Shai-hulud' Worm Targeting NPM Packages (1:05)Fortra Critical Patch for GoAnywhere MFT Vulnerability (3:49)Phishing Round Up: File Fix Campaign and Microsoft's RaccoonO365 Takedown (7:12)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 ...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with <em>intelligence analysts John and Joey</em> as they discuss:</p><ul><li>Summer 2025 Attacker Trends (13:41)</li><li>Self-Replicating &apos;Shai-hulud&apos; Worm Targeting NPM Packages (1:05)</li><li>Fortra Critical Patch for GoAnywhere MFT Vulnerability (3:49)</li><li>Phishing Round Up: File Fix Campaign and Microsoft&apos;s RaccoonO365 Takedown (7:12)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs. </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with <em>intelligence analysts John and Joey</em> as they discuss:</p><ul><li>Summer 2025 Attacker Trends (13:41)</li><li>Self-Replicating &apos;Shai-hulud&apos; Worm Targeting NPM Packages (1:05)</li><li>Fortra Critical Patch for GoAnywhere MFT Vulnerability (3:49)</li><li>Phishing Round Up: File Fix Campaign and Microsoft&apos;s RaccoonO365 Takedown (7:12)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17899010-attacker-breakout-time-hits-18-minutes-new-shai-hulud-npm-worm.mp3" length="21094696" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17899010</guid>
    <pubDate>Wed, 24 Sep 2025 13:00:00 -0400</pubDate>
    <itunes:duration>1739</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Welcome to ShadowTalk</itunes:title>
    <title>Welcome to ShadowTalk</title>
    <itunes:summary><![CDATA[Host, Kim, alongside ReliaQuest's Threat Research experts, cut through the noise to bring you the cyber insights that matter most.  Get news, research and actionable strategies from industry leaders, to help you stay ahead of attackers. New episodes every Wednesday at 1pm EST. ]]></itunes:summary>
    <description><![CDATA[<p>Host, Kim, alongside ReliaQuest&apos;s Threat Research experts, cut through the noise to bring you the cyber insights that matter most. </p><p>Get news, research and actionable strategies from industry leaders, to help you stay ahead of attackers.</p><p>New episodes every Wednesday at 1pm EST.</p>]]></description>
    <content:encoded><![CDATA[<p>Host, Kim, alongside ReliaQuest&apos;s Threat Research experts, cut through the noise to bring you the cyber insights that matter most. </p><p>Get news, research and actionable strategies from industry leaders, to help you stay ahead of attackers.</p><p>New episodes every Wednesday at 1pm EST.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17853149-welcome-to-shadowtalk.mp3" length="637990" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17853149</guid>
    <pubDate>Tue, 16 Sep 2025 09:00:00 -0400</pubDate>
    <itunes:duration>49</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>trailer</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Do You Need AI to Fight AI? Plus Supply-Chain Attacks and Russia&#39;s Latest Backdoor</itunes:title>
    <title>Do You Need AI to Fight AI? Plus Supply-Chain Attacks and Russia&#39;s Latest Backdoor</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Thinking about whether you need more AI in SecOps? Join host Kim along with intelligence analyst Joey &amp; systems security engineer Corey as they discuss: SAP S/4HANA Flaw Exploitation (2:09)AI-Powered Malware Exposes GitHub (4:24)APT28 Outlook Backdoor hits NATO (8:21)ReliaQuest Experts Answer Your Questions (11:55)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 202...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Thinking about whether you need more AI in SecOps? Join host Kim along with intelligence analyst Joey &amp; systems security engineer Corey as they discuss:</p><ul><li>SAP S/4HANA Flaw Exploitation (2:09)</li><li>AI-Powered Malware Exposes GitHub (4:24)</li><li>APT28 Outlook Backdoor hits NATO (8:21)</li><li>ReliaQuest Experts Answer Your Questions (11:55)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs. </p><p><b>Corey Carter</b>: Detection Researcher at ReliaQuest. A Florida native and former infantryman in the United States Marines, Corey holds a bachelor&apos;s degree in computer science with a specialization in information assurance. His experience as a Security Analyst and Threat Hunter at ReliaQuest, combined with his military background, equips him with a unique perspective on cybersecurity challenges.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Thinking about whether you need more AI in SecOps? Join host Kim along with intelligence analyst Joey &amp; systems security engineer Corey as they discuss:</p><ul><li>SAP S/4HANA Flaw Exploitation (2:09)</li><li>AI-Powered Malware Exposes GitHub (4:24)</li><li>APT28 Outlook Backdoor hits NATO (8:21)</li><li>ReliaQuest Experts Answer Your Questions (11:55)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs. </p><p><b>Corey Carter</b>: Detection Researcher at ReliaQuest. A Florida native and former infantryman in the United States Marines, Corey holds a bachelor&apos;s degree in computer science with a specialization in information assurance. His experience as a Security Analyst and Threat Hunter at ReliaQuest, combined with his military background, equips him with a unique perspective on cybersecurity challenges.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17822379-do-you-need-ai-to-fight-ai-plus-supply-chain-attacks-and-russia-s-latest-backdoor.mp3" length="20244701" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17822379</guid>
    <pubDate>Wed, 10 Sep 2025 12:00:00 -0400</pubDate>
    <itunes:duration>1669</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Salesforce Attack Fallout, Axios Abuse, and Cloud Ransomware</itunes:title>
    <title>Salesforce Attack Fallout, Axios Abuse, and Cloud Ransomware</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Need the latest information on Salesloft Drift? Join host Kim along with intelligence analyst John &amp; detection engineer Marken as they discuss: Salesloft Drift Tokens Result in Salesforce Data Theft (1:31)Storm-0501 Shifts Ransomware Attacks to Cloud (6:36)APT29 Microsoft 365 Campaign Disrupted (11:26)Axios, Direct Send Abuse Redefine Phishing (14:19)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Te...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Need the latest information on Salesloft Drift? Join host Kim along with intelligence analyst John &amp; detection engineer Marken as they discuss:</p><ul><li>Salesloft Drift Tokens Result in Salesforce Data Theft (1:31)</li><li>Storm-0501 Shifts Ransomware Attacks to Cloud (6:36)</li><li>APT29 Microsoft 365 Campaign Disrupted (11:26)</li><li>Axios, Direct Send Abuse Redefine Phishing (14:19)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Marken Teder</b>: Threat Detection Engineer at ReliaQuest, with a total of 7 years at the company. A native Estonian, he has previously worked as an Incident Response Analyst, Content Developer, and Security Architect. Marken&apos;s extensive experience in detection and response brings a robust technical perspective to discussions.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest. </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Need the latest information on Salesloft Drift? Join host Kim along with intelligence analyst John &amp; detection engineer Marken as they discuss:</p><ul><li>Salesloft Drift Tokens Result in Salesforce Data Theft (1:31)</li><li>Storm-0501 Shifts Ransomware Attacks to Cloud (6:36)</li><li>APT29 Microsoft 365 Campaign Disrupted (11:26)</li><li>Axios, Direct Send Abuse Redefine Phishing (14:19)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Marken Teder</b>: Threat Detection Engineer at ReliaQuest, with a total of 7 years at the company. A native Estonian, he has previously worked as an Incident Response Analyst, Content Developer, and Security Architect. Marken&apos;s extensive experience in detection and response brings a robust technical perspective to discussions.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17782958-salesforce-attack-fallout-axios-abuse-and-cloud-ransomware.mp3" length="16992324" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17782958</guid>
    <pubDate>Wed, 03 Sep 2025 11:00:00 -0400</pubDate>
    <itunes:duration>1399</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>New Silk Typhoon Attacks, the Cybercriminal Recruitment Underworld, and More!</itunes:title>
    <title>New Silk Typhoon Attacks, the Cybercriminal Recruitment Underworld, and More!</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Curious about the skills needed for modern cyber attacks? Join host Kim along with intelligence analysts John &amp; Hayden as they discuss: Apple Patches Exploited Zero-Day (1:40)Hackers Abuse Linux Files to Drop Malware (3:50)Silk Typhoon Attacks Cloud Supply Chains (7:21)ReliaQuest Uncovers Cybercriminals' Most Sought After Skills (11:02)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Curious about the skills needed for modern cyber attacks? Join host Kim along with intelligence analysts John &amp; Hayden as they discuss:</p><ul><li>Apple Patches Exploited Zero-Day (1:40)</li><li>Hackers Abuse Linux Files to Drop Malware (3:50)</li><li>Silk Typhoon Attacks Cloud Supply Chains (7:21)</li><li>ReliaQuest Uncovers Cybercriminals&apos; Most Sought After Skills (11:02)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest. </p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security. </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Curious about the skills needed for modern cyber attacks? Join host Kim along with intelligence analysts John &amp; Hayden as they discuss:</p><ul><li>Apple Patches Exploited Zero-Day (1:40)</li><li>Hackers Abuse Linux Files to Drop Malware (3:50)</li><li>Silk Typhoon Attacks Cloud Supply Chains (7:21)</li><li>ReliaQuest Uncovers Cybercriminals&apos; Most Sought After Skills (11:02)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest. </p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17742989-new-silk-typhoon-attacks-the-cybercriminal-recruitment-underworld-and-more.mp3" length="19249601" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17742989</guid>
    <pubDate>Wed, 27 Aug 2025 12:00:00 -0400</pubDate>
    <itunes:duration>1586</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Warlock Ransomware Hits Telecoms, LLM Data Theft, and ShinyHunters Updates</itunes:title>
    <title>Warlock Ransomware Hits Telecoms, LLM Data Theft, and ShinyHunters Updates</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Intrigued by Warlock ransomware's Chinese connection? Join host Kim along with intelligence analysts Joey &amp; John as they discuss: \Warlock Ransomware Attacks Against Telecoms (3:12)New FortiSIEM Flaw Exploited in the Wild (5:19)Man-in-the-Prompt Attack Steals Data from LLMs (8:04)How ReliaQuest Tracks Ransomware Groups and Evolving Cyber Threats (12:36)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research ...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Intrigued by Warlock ransomware&apos;s Chinese connection? Join host Kim along with intelligence analysts Joey &amp; John as they discuss:</p><ul><li>\Warlock Ransomware Attacks Against Telecoms (3:12)</li><li>New FortiSIEM Flaw Exploited in the Wild (5:19)</li><li>Man-in-the-Prompt Attack Steals Data from LLMs (8:04)</li><li>How ReliaQuest Tracks Ransomware Groups and Evolving Cyber Threats (12:36)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs. </p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest. </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Intrigued by Warlock ransomware&apos;s Chinese connection? Join host Kim along with intelligence analysts Joey &amp; John as they discuss:</p><ul><li>\Warlock Ransomware Attacks Against Telecoms (3:12)</li><li>New FortiSIEM Flaw Exploited in the Wild (5:19)</li><li>Man-in-the-Prompt Attack Steals Data from LLMs (8:04)</li><li>How ReliaQuest Tracks Ransomware Groups and Evolving Cyber Threats (12:36)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs. </p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17704862-warlock-ransomware-hits-telecoms-llm-data-theft-and-shinyhunters-updates.mp3" length="18447491" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17704862</guid>
    <pubDate>Wed, 20 Aug 2025 12:00:00 -0400</pubDate>
    <itunes:duration>1520</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>ShinyHunters, Scattered Spider, and Salesforce? Plus, Kimsuky Data Breach!</itunes:title>
    <title>ShinyHunters, Scattered Spider, and Salesforce? Plus, Kimsuky Data Breach!</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Want to know if ShinyHunters and Scattered Spider are really working together? Join host Kim along with detection engineer Marken as they discuss: WinRAR Zero-Day Exploited in RomCom Attacks (1:44)New EDR Killer Popular with Ransomware Groups (4:30)Data Breach Reveal Kimsuky Inner Workings (11:31)ReliaQuest Uncovers Potential ShinyHunters x Scattered Spider Collaboration (15:00)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the Relia...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Want to know if ShinyHunters and Scattered Spider are really working together? Join host Kim along with detection engineer Marken as they discuss:</p><ul><li>WinRAR Zero-Day Exploited in RomCom Attacks (1:44)</li><li>New EDR Killer Popular with Ransomware Groups (4:30)</li><li>Data Breach Reveal Kimsuky Inner Workings (11:31)</li><li>ReliaQuest Uncovers Potential ShinyHunters x Scattered Spider Collaboration (15:00)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Marken Teder</b>: Threat Detection Engineer at ReliaQuest, with a total of 7 years at the company. A native Estonian, he has previously worked as an Incident Response Analyst, Content Developer, and Security Architect. Marken&apos;s extensive experience in detection and response brings a robust technical perspective to discussions.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Want to know if ShinyHunters and Scattered Spider are really working together? Join host Kim along with detection engineer Marken as they discuss:</p><ul><li>WinRAR Zero-Day Exploited in RomCom Attacks (1:44)</li><li>New EDR Killer Popular with Ransomware Groups (4:30)</li><li>Data Breach Reveal Kimsuky Inner Workings (11:31)</li><li>ReliaQuest Uncovers Potential ShinyHunters x Scattered Spider Collaboration (15:00)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Marken Teder</b>: Threat Detection Engineer at ReliaQuest, with a total of 7 years at the company. A native Estonian, he has previously worked as an Incident Response Analyst, Content Developer, and Security Architect. Marken&apos;s extensive experience in detection and response brings a robust technical perspective to discussions.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17665703-shinyhunters-scattered-spider-and-salesforce-plus-kimsuky-data-breach.mp3" length="20448319" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17665703</guid>
    <pubDate>Wed, 13 Aug 2025 12:00:00 -0400</pubDate>
    <itunes:duration>1684</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Akira’s Zero-Day Chaos + The Rise of DRP Threats</itunes:title>
    <title>Akira’s Zero-Day Chaos + The Rise of DRP Threats</title>
    <itunes:summary><![CDATA[Akira ransomware group is exploiting potential zero-day vulnerabilities, and digital risk protection (DRP) threats are rapidly evolving. Join host Joey, along with intelligence analysts John and Hayden, as they dive into: Akira Ransomware Exploiting a Potential Zero DayPlague Backdoor Emerges as Silent IntruderEvolving Tactics of North Korean AttackerDRP Threats Surge Amid Organizational GrowthResources: https://linktr.ee/ReliaQuestShadowTalk Joseph Keyes: Joseph Keyes is a Cyber Threat Intel...]]></itunes:summary>
    <description><![CDATA[<p>Akira ransomware group is exploiting potential zero-day vulnerabilities, and digital risk protection (DRP) threats are rapidly evolving. Join host Joey, along with intelligence analysts John and Hayden, as they dive into:</p><ul><li>Akira Ransomware Exploiting a Potential Zero Day</li><li>Plague Backdoor Emerges as Silent Intruder</li><li>Evolving Tactics of North Korean Attacker</li><li>DRP Threats Surge Amid Organizational Growth</li></ul><p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p><b>Joseph Keyes: </b>Joseph Keyes is a Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs. </p><p><b>John Dilgen:</b> John Dilgen is a Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest. </p><p><b>Hayden Evans:</b> Hayden Evans is a Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security. </p>]]></description>
    <content:encoded><![CDATA[<p>Akira ransomware group is exploiting potential zero-day vulnerabilities, and digital risk protection (DRP) threats are rapidly evolving. Join host Joey, along with intelligence analysts John and Hayden, as they dive into:</p><ul><li>Akira Ransomware Exploiting a Potential Zero Day</li><li>Plague Backdoor Emerges as Silent Intruder</li><li>Evolving Tactics of North Korean Attacker</li><li>DRP Threats Surge Amid Organizational Growth</li></ul><p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p><b>Joseph Keyes: </b>Joseph Keyes is a Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs. </p><p><b>John Dilgen:</b> John Dilgen is a Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest. </p><p><b>Hayden Evans:</b> Hayden Evans is a Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17625583-akira-s-zero-day-chaos-the-rise-of-drp-threats.mp3" length="20882096" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17625583</guid>
    <pubDate>Wed, 06 Aug 2025 13:00:00 -0400</pubDate>
    <itunes:duration>1723</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Full CrushFTP Attack Chain, Plus BreachForums is Back!</itunes:title>
    <title>Full CrushFTP Attack Chain, Plus BreachForums is Back!</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Curious how the latest CrushFTP exploit works? Join host Kim along with intelligence analyst Hayden and threat hunter Leo as they discuss: BreachForums Back, XSS Out (1:28)Warlock Ransomware Hits SharePoint (5:28)Fire Ant Stings ESXi (9:39)ReliaQuest Uncovers CrushFTP Attack Chain (13:35Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in ...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Curious how the latest CrushFTP exploit works? Join host Kim along with intelligence analyst Hayden and threat hunter Leo as they discuss:</p><ul><li>BreachForums Back, XSS Out (1:28)</li><li>Warlock Ransomware Hits SharePoint (5:28)</li><li>Fire Ant Stings ESXi (9:39)</li><li>ReliaQuest Uncovers CrushFTP Attack Chain (13:35</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security.</p><p><b>Leo Dawson</b>: Threat Hunter on the ReliaQuest Threat Research Team. With a deep background in Experimental Physics and Artificial Intelligence, Leo brings a unique interdisciplinary perspective to cybersecurity. He is driven by a passion for leveraging these skills to proactively track, analyze, and understand threat actor campaigns while gaining deeper insights into their evolving tactics and behaviors. </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Curious how the latest CrushFTP exploit works? Join host Kim along with intelligence analyst Hayden and threat hunter Leo as they discuss:</p><ul><li>BreachForums Back, XSS Out (1:28)</li><li>Warlock Ransomware Hits SharePoint (5:28)</li><li>Fire Ant Stings ESXi (9:39)</li><li>ReliaQuest Uncovers CrushFTP Attack Chain (13:35</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security.</p><p><b>Leo Dawson</b>: Threat Hunter on the ReliaQuest Threat Research Team. With a deep background in Experimental Physics and Artificial Intelligence, Leo brings a unique interdisciplinary perspective to cybersecurity. He is driven by a passion for leveraging these skills to proactively track, analyze, and understand threat actor campaigns while gaining deeper insights into their evolving tactics and behaviors. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17588752-full-crushftp-attack-chain-plus-breachforums-is-back.mp3" length="20179716" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17588752</guid>
    <pubDate>Wed, 30 Jul 2025 13:00:00 -0400</pubDate>
    <itunes:duration>1664</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>New SharePoint Flaw, How Cybercriminals Use AI</itunes:title>
    <title>New SharePoint Flaw, How Cybercriminals Use AI</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Curious about how cybercriminals use AI? Join host Kim along with detection engineer Marken and intelligence analyst Alex as they discuss: New SharePoint Vulnerability (1:34)LameHug AI-Powered Malware (5:55)UK Bans Ransomware Payments (9:44)AI Tactics Behind the Latest Cyber Threats (14:11)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career ...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Curious about how cybercriminals use AI? Join host Kim along with detection engineer Marken and intelligence analyst Alex as they discuss:</p><ul><li>New SharePoint Vulnerability (1:34)</li><li>LameHug AI-Powered Malware (5:55)</li><li>UK Bans Ransomware Payments (9:44)</li><li>AI Tactics Behind the Latest Cyber Threats (14:11)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Marken Teder</b>: Threat Detection Engineer at ReliaQuest, with a total of 7 years at the company. A native Estonian, he has previously worked as an Incident Response Analyst, Content Developer, and Security Architect. Marken&apos;s extensive experience in detection and response brings a robust technical perspective to discussions.</p><p><b>Alexander Capraro: </b>Cyber Threat Intelligence Analyst at ReliaQuest with over five years of experience in cybersecurity. With his prior experience as a Security Analyst, he specializes in incident response, malware analysis and campaign tracking, and OSINT investigations.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Curious about how cybercriminals use AI? Join host Kim along with detection engineer Marken and intelligence analyst Alex as they discuss:</p><ul><li>New SharePoint Vulnerability (1:34)</li><li>LameHug AI-Powered Malware (5:55)</li><li>UK Bans Ransomware Payments (9:44)</li><li>AI Tactics Behind the Latest Cyber Threats (14:11)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Marken Teder</b>: Threat Detection Engineer at ReliaQuest, with a total of 7 years at the company. A native Estonian, he has previously worked as an Incident Response Analyst, Content Developer, and Security Architect. Marken&apos;s extensive experience in detection and response brings a robust technical perspective to discussions.</p><p><b>Alexander Capraro: </b>Cyber Threat Intelligence Analyst at ReliaQuest with over five years of experience in cybersecurity. With his prior experience as a Security Analyst, he specializes in incident response, malware analysis and campaign tracking, and OSINT investigations.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17552059-new-sharepoint-flaw-how-cybercriminals-use-ai.mp3" length="19065300" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17552059</guid>
    <pubDate>Wed, 23 Jul 2025 11:00:00 -0400</pubDate>
    <itunes:duration>1569</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Do You Really Need IOCs? Plus Zero-Day Exploits, AI Data Leaks, and Phishing for VIPs</itunes:title>
    <title>Do You Really Need IOCs? Plus Zero-Day Exploits, AI Data Leaks, and Phishing for VIPs</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Ever wondered if IOCs are still relevant in a world of polymorphic malware and zero-day exploits? Join host Kim along with intelligence analyst Joey and threat hunter Tristan as they discuss: North American APT Targets China (1:25)Chatbot Exposes Thousands of Job Applications (4:57)New Phishing Campaign Targets VIPs (7:17)How IOCs are Used in Modern Threat Hunting (10:07)Kim Bromley: Kim Bromley is a Threat Intelligence Analyst on the ReliaQue...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Ever wondered if IOCs are still relevant in a world of polymorphic malware and zero-day exploits? Join host Kim along with intelligence analyst Joey and threat hunter Tristan as they discuss:</p><ul><li>North American APT Targets China (1:25)</li><li>Chatbot Exposes Thousands of Job Applications (4:57)</li><li>New Phishing Campaign Targets VIPs (7:17)</li><li>How IOCs are Used in Modern Threat Hunting (10:07)</li></ul><p><b>Kim Bromley</b>: Kim Bromley is a Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights for ShadowTalk.  </p><p><b>Joseph Keyes: </b>Joseph Keyes is a Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs. </p><p><b>Tristan Luikey</b>: Tristan Luikey is a Threat Hunter at ReliaQuest, specializing in responding to and mitigating active breaches to safeguard customers&apos; networks. In addition to breach response, Tristan conducts comprehensive research into emerging threats and attack techniques, enabling proactive threat hunting to strengthen organizational security. </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Ever wondered if IOCs are still relevant in a world of polymorphic malware and zero-day exploits? Join host Kim along with intelligence analyst Joey and threat hunter Tristan as they discuss:</p><ul><li>North American APT Targets China (1:25)</li><li>Chatbot Exposes Thousands of Job Applications (4:57)</li><li>New Phishing Campaign Targets VIPs (7:17)</li><li>How IOCs are Used in Modern Threat Hunting (10:07)</li></ul><p><b>Kim Bromley</b>: Kim Bromley is a Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights for ShadowTalk.  </p><p><b>Joseph Keyes: </b>Joseph Keyes is a Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs. </p><p><b>Tristan Luikey</b>: Tristan Luikey is a Threat Hunter at ReliaQuest, specializing in responding to and mitigating active breaches to safeguard customers&apos; networks. In addition to breach response, Tristan conducts comprehensive research into emerging threats and attack techniques, enabling proactive threat hunting to strengthen organizational security. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17515975-do-you-really-need-iocs-plus-zero-day-exploits-ai-data-leaks-and-phishing-for-vips.mp3" length="17374093" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17515975</guid>
    <pubDate>Wed, 16 Jul 2025 13:00:00 -0400</pubDate>
    <itunes:duration>1433</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>SafePay Ransomware Rises, North Korea Adopts ClickFix</itunes:title>
    <title>SafePay Ransomware Rises, North Korea Adopts ClickFix</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Have you heard of SafePay ransomware? Join host Kim along with intelligence analysts Hayden and John as they discuss: SafePay Targets Ingram Micro (1:16)Updates on Iran-Israel (5:43)North Korea Adopts ClickFix &amp; Attacks Web3 (8:24)Insights from ReliaQuest Customer Incidents (13:14)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Have you heard of SafePay ransomware? Join host Kim along with intelligence analysts Hayden and John as they discuss:</p><ul><li>SafePay Targets Ingram Micro (1:16)</li><li>Updates on Iran-Israel (5:43)</li><li>North Korea Adopts ClickFix &amp; Attacks Web3 (8:24)</li><li>Insights from ReliaQuest Customer Incidents (13:14)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Have you heard of SafePay ransomware? Join host Kim along with intelligence analysts Hayden and John as they discuss:</p><ul><li>SafePay Targets Ingram Micro (1:16)</li><li>Updates on Iran-Israel (5:43)</li><li>North Korea Adopts ClickFix &amp; Attacks Web3 (8:24)</li><li>Insights from ReliaQuest Customer Incidents (13:14)</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17477935-safepay-ransomware-rises-north-korea-adopts-clickfix.mp3" length="17716284" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17477935</guid>
    <pubDate>Wed, 09 Jul 2025 12:00:00 -0400</pubDate>
    <itunes:duration>1460</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Citrix Bleed 2, Scattered Spider Hits Aviation</itunes:title>
    <title>Citrix Bleed 2, Scattered Spider Hits Aviation</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Ivan and John as they discuss: Citrix Bleed 2Scattered Spider Hits Aviation From ClickFix to FileFixRansomware Threats from Q2Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intell...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with intelligence analysts Ivan and John as they discuss:</p><ul><li>Citrix Bleed 2</li><li>Scattered Spider Hits Aviation </li><li>From ClickFix to FileFix</li><li>Ransomware Threats from Q2</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Ivan Righi: </b>Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. Since joining ReliaQuest in June 2019, Ivan has focused on data breach investigations, automations, threat actor profiling, and reverse engineering threat campaigns. He holds a Master of Science degree in Cybersecurity and a GIAC Reverse Engineering Malware (GREM) certification, bringing technical expertise and actionable insights.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with intelligence analysts Ivan and John as they discuss:</p><ul><li>Citrix Bleed 2</li><li>Scattered Spider Hits Aviation </li><li>From ClickFix to FileFix</li><li>Ransomware Threats from Q2</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Ivan Righi: </b>Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. Since joining ReliaQuest in June 2019, Ivan has focused on data breach investigations, automations, threat actor profiling, and reverse engineering threat campaigns. He holds a Master of Science degree in Cybersecurity and a GIAC Reverse Engineering Malware (GREM) certification, bringing technical expertise and actionable insights.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17437288-citrix-bleed-2-scattered-spider-hits-aviation.mp3" length="19527394" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17437288</guid>
    <pubDate>Wed, 02 Jul 2025 11:00:00 -0400</pubDate>
    <itunes:duration>1611</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Analyzing Iran-Israel Cyber Threats, New Scattered Spider Attack Chain</itunes:title>
    <title>Analyzing Iran-Israel Cyber Threats, New Scattered Spider Attack Chain</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with Intelligence Analyst Hayden and Threat Hunter Leo as they discuss: New Scattered Spider Attack ChainIsrael and Iran Cyber Threat Deep DiveTop Iran-linked Threat Groups &amp; How to MitigateKim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a w...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with Intelligence Analyst Hayden and Threat Hunter Leo as they discuss:</p><ul><li>New Scattered Spider Attack Chain</li><li>Israel and Iran Cyber Threat Deep Dive</li><li>Top Iran-linked Threat Groups &amp; How to Mitigate</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security.</p><p><b>Leo Dawson</b>: Threat Hunter on the ReliaQuest Threat Research Team. With a deep background in Experimental Physics and Artificial Intelligence, Leo brings a unique interdisciplinary perspective to cybersecurity. He is driven by a passion for leveraging these skills to proactively track, analyze, and understand threat actor campaigns while gaining deeper insights into their evolving tactics and behaviors. </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with Intelligence Analyst Hayden and Threat Hunter Leo as they discuss:</p><ul><li>New Scattered Spider Attack Chain</li><li>Israel and Iran Cyber Threat Deep Dive</li><li>Top Iran-linked Threat Groups &amp; How to Mitigate</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security.</p><p><b>Leo Dawson</b>: Threat Hunter on the ReliaQuest Threat Research Team. With a deep background in Experimental Physics and Artificial Intelligence, Leo brings a unique interdisciplinary perspective to cybersecurity. He is driven by a passion for leveraging these skills to proactively track, analyze, and understand threat actor campaigns while gaining deeper insights into their evolving tactics and behaviors. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17398691-analyzing-iran-israel-cyber-threats-new-scattered-spider-attack-chain.mp3" length="25328437" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17398691</guid>
    <pubDate>Wed, 25 Jun 2025 14:00:00 -0400</pubDate>
    <itunes:duration>2089</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Israel-Iran Cyber Warfare, Anubis Ransomware, and More Attacker Trends</itunes:title>
    <title>Israel-Iran Cyber Warfare, Anubis Ransomware, and More Attacker Trends</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analyst Joey and detection engineer Marken as they discuss: Anubis Ransomware Wiper CapabilityTeamfiltration Pentesting ToolCyber Implications of Israel-Iran ConflictThe Most Up to Date Attacker TrendsKim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with intelligence analyst Joey and detection engineer Marken as they discuss:</p><ul><li>Anubis Ransomware Wiper Capability</li><li>Teamfiltration Pentesting Tool</li><li>Cyber Implications of Israel-Iran Conflict</li><li>The Most Up to Date Attacker Trends</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Marken Teder</b>: Threat Detection Engineer at ReliaQuest, with a total of 7 years at the company. A native Estonian, he has previously worked as an Incident Response Analyst, Content Developer, and Security Architect. Marken&apos;s extensive experience in detection and response brings a robust technical perspective to discussions.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with intelligence analyst Joey and detection engineer Marken as they discuss:</p><ul><li>Anubis Ransomware Wiper Capability</li><li>Teamfiltration Pentesting Tool</li><li>Cyber Implications of Israel-Iran Conflict</li><li>The Most Up to Date Attacker Trends</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Marken Teder</b>: Threat Detection Engineer at ReliaQuest, with a total of 7 years at the company. A native Estonian, he has previously worked as an Incident Response Analyst, Content Developer, and Security Architect. Marken&apos;s extensive experience in detection and response brings a robust technical perspective to discussions.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17360044-israel-iran-cyber-warfare-anubis-ransomware-and-more-attacker-trends.mp3" length="26259008" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17360044</guid>
    <pubDate>Wed, 18 Jun 2025 15:00:00 -0400</pubDate>
    <itunes:duration>2167</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Black Basta&#39;s Enduring Legacy, Qilin Exploits Fortinet Flaws</itunes:title>
    <title>Black Basta&#39;s Enduring Legacy, Qilin Exploits Fortinet Flaws</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Alex and John as they discuss: The Enduring Legacy of Black BastaQilin's Exploitation of Fortinet FlawsVishing for Salesforce DataAtomic Stealer x ClickFix CampaignKim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a weal...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with intelligence analysts Alex and John as they discuss:</p><ul><li>The Enduring Legacy of Black Basta</li><li>Qilin&apos;s Exploitation of Fortinet Flaws</li><li>Vishing for Salesforce Data</li><li>Atomic Stealer x ClickFix Campaign</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Alexander Capraro: </b>Cyber Threat Intelligence Analyst at ReliaQuest with over five years of experience in cybersecurity. With his prior experience as a Security Analyst, he specializes in incident response, malware analysis and campaign tracking, and OSINT investigations. </p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with intelligence analysts Alex and John as they discuss:</p><ul><li>The Enduring Legacy of Black Basta</li><li>Qilin&apos;s Exploitation of Fortinet Flaws</li><li>Vishing for Salesforce Data</li><li>Atomic Stealer x ClickFix Campaign</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Alexander Capraro: </b>Cyber Threat Intelligence Analyst at ReliaQuest with over five years of experience in cybersecurity. With his prior experience as a Security Analyst, he specializes in incident response, malware analysis and campaign tracking, and OSINT investigations. </p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17319905-black-basta-s-enduring-legacy-qilin-exploits-fortinet-flaws.mp3" length="21757618" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17319905</guid>
    <pubDate>Wed, 11 Jun 2025 12:00:00 -0400</pubDate>
    <itunes:duration>1795</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Scattered Spider&#39;s Evolving Playbook, SentinelOne Outage</itunes:title>
    <title>Scattered Spider&#39;s Evolving Playbook, SentinelOne Outage</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Alex as they discuss: Scattered Spider's Focus on Tech VendorsHow APT41 Abuses Google Calendar for C2The SentinelOne OutageA New Void Blizzard Espionage CampaignKim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings ...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with intelligence analysts Joey and Alex as they discuss:</p><ul><li>Scattered Spider&apos;s Focus on Tech Vendors</li><li>How APT41 Abuses Google Calendar for C2</li><li>The SentinelOne Outage</li><li>A New Void Blizzard Espionage Campaign</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs.</p><p><b>Alexander Capraro: </b>Cyber Threat Intelligence Analyst at ReliaQuest with over five years of experience in cybersecurity. With his prior experience as a Security Analyst, he specializes in incident response, malware analysis and campaign tracking, and OSINT investigations. </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with intelligence analysts Joey and Alex as they discuss:</p><ul><li>Scattered Spider&apos;s Focus on Tech Vendors</li><li>How APT41 Abuses Google Calendar for C2</li><li>The SentinelOne Outage</li><li>A New Void Blizzard Espionage Campaign</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs.</p><p><b>Alexander Capraro: </b>Cyber Threat Intelligence Analyst at ReliaQuest with over five years of experience in cybersecurity. With his prior experience as a Security Analyst, he specializes in incident response, malware analysis and campaign tracking, and OSINT investigations. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17281377-scattered-spider-s-evolving-playbook-sentinelone-outage.mp3" length="20157898" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17281377</guid>
    <pubDate>Wed, 04 Jun 2025 12:00:00 -0400</pubDate>
    <itunes:duration>1656</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>SPECIAL: How Russian Market Fuels Credential-Based Attacks</itunes:title>
    <title>SPECIAL: How Russian Market Fuels Credential-Based Attacks</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Alex as they discuss: Factors Driving Russian Market's PopularityAttackers' Favorite InfostealersInfostealer Attack PathsMain Types and Exclusivity of Stolen LogsKim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with intelligence analysts Joey and Alex as they discuss:</p><ul><li>Factors Driving Russian Market&apos;s Popularity</li><li>Attackers&apos; Favorite Infostealers</li><li>Infostealer Attack Paths</li><li>Main Types and Exclusivity of Stolen Logs</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs.</p><p><b>Alexander Capraro: </b>Cyber Threat Intelligence Analyst at ReliaQuest with over five years of experience in cybersecurity. With his prior experience as a Security Analyst, he specializes in incident response, malware analysis and campaign tracking, and OSINT investigations. </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with intelligence analysts Joey and Alex as they discuss:</p><ul><li>Factors Driving Russian Market&apos;s Popularity</li><li>Attackers&apos; Favorite Infostealers</li><li>Infostealer Attack Paths</li><li>Main Types and Exclusivity of Stolen Logs</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs.</p><p><b>Alexander Capraro: </b>Cyber Threat Intelligence Analyst at ReliaQuest with over five years of experience in cybersecurity. With his prior experience as a Security Analyst, he specializes in incident response, malware analysis and campaign tracking, and OSINT investigations. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17242445-special-how-russian-market-fuels-credential-based-attacks.mp3" length="32125129" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17242445</guid>
    <pubDate>Wed, 28 May 2025 14:00:00 -0400</pubDate>
    <itunes:duration>2657</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Threat Evolution: SAP Exploits, SEO Poisoning, and SkitNet Malware</itunes:title>
    <title>The Threat Evolution: SAP Exploits, SEO Poisoning, and SkitNet Malware</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Joey along with intelligence analysts John and Hayden as they discuss: ReliaQuest's investigation into hijacked routers and SEO poisoning fueling payroll heistsNation-state actors leveraging the SAP NetWeaver vulnerability en masseA new "Defendnot" tool that tricks Windows Defender into disabling itselfRansomware groups using a stealthy post-exploitation malwareJoseph Keyes: Cyber Threat Intelligence Analyst at ReliaQuest, specializi...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Joey along with intelligence analysts John and Hayden as they discuss:</p><ul><li>ReliaQuest&apos;s investigation into hijacked routers and SEO poisoning fueling payroll heists</li><li>Nation-state actors leveraging the SAP NetWeaver vulnerability en masse</li><li>A new &quot;Defendnot&quot; tool that tricks Windows Defender into disabling itself</li><li>Ransomware groups using a stealthy post-exploitation malware</li></ul><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security. </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Joey along with intelligence analysts John and Hayden as they discuss:</p><ul><li>ReliaQuest&apos;s investigation into hijacked routers and SEO poisoning fueling payroll heists</li><li>Nation-state actors leveraging the SAP NetWeaver vulnerability en masse</li><li>A new &quot;Defendnot&quot; tool that tricks Windows Defender into disabling itself</li><li>Ransomware groups using a stealthy post-exploitation malware</li></ul><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs.</p><p><b>John Dilgen:</b> Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17203829-the-threat-evolution-sap-exploits-seo-poisoning-and-skitnet-malware.mp3" length="21098096" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17203829</guid>
    <pubDate>Wed, 21 May 2025 12:00:00 -0400</pubDate>
    <itunes:duration>1743</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Will US Politics Reshape Russian Cyber Threats?</itunes:title>
    <title>Will US Politics Reshape Russian Cyber Threats?</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Hayden as they discuss: ReliaQuest's Forecast for How US Policy will Impact Russia-linked Cyber ThreatsInfostealers Spread by Fake AI Video GeneratorsKickidler Abuse by Ransomware GroupsFBI Takedown of Huge BotnetKim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement,...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with intelligence analysts Joey and Hayden as they discuss:</p><ul><li>ReliaQuest&apos;s Forecast for How US Policy will Impact Russia-linked Cyber Threats</li><li>Infostealers Spread by Fake AI Video Generators</li><li>Kickidler Abuse by Ransomware Groups</li><li>FBI Takedown of Huge Botnet</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs.</p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security. </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with intelligence analysts Joey and Hayden as they discuss:</p><ul><li>ReliaQuest&apos;s Forecast for How US Policy will Impact Russia-linked Cyber Threats</li><li>Infostealers Spread by Fake AI Video Generators</li><li>Kickidler Abuse by Ransomware Groups</li><li>FBI Takedown of Huge Botnet</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs.</p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17162096-will-us-politics-reshape-russian-cyber-threats.mp3" length="20302923" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17162096</guid>
    <pubDate>Wed, 14 May 2025 12:00:00 -0400</pubDate>
    <itunes:duration>1679</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Scattered Spider Strikes Again, Hunt for North Korean Insiders Heats Up</itunes:title>
    <title>Scattered Spider Strikes Again, Hunt for North Korean Insiders Heats Up</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analyst John and threat hunter Tristan as they discuss: Scattered Spider Attacks UK Retail OrgsBring Your Own Installer SentinelOne BypassHunting for North Korean InsidersKim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with intelligence analyst John and threat hunter Tristan as they discuss:</p><ul><li>Scattered Spider Attacks UK Retail Orgs</li><li>Bring Your Own Installer SentinelOne Bypass</li><li>Hunting for North Korean Insiders</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>John Dilgen:</b> John Dilgen is a Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Tristan Luikey:</b> Threat Hunter at ReliaQuest, specializing in responding to and mitigating active breaches to safeguard customers&apos; networks. In addition to breach response, Tristan conducts comprehensive research into emerging threats and attack techniques, enabling proactive threat hunting to strengthen organizational security. </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with intelligence analyst John and threat hunter Tristan as they discuss:</p><ul><li>Scattered Spider Attacks UK Retail Orgs</li><li>Bring Your Own Installer SentinelOne Bypass</li><li>Hunting for North Korean Insiders</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>John Dilgen:</b> John Dilgen is a Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.</p><p><b>Tristan Luikey:</b> Threat Hunter at ReliaQuest, specializing in responding to and mitigating active breaches to safeguard customers&apos; networks. In addition to breach response, Tristan conducts comprehensive research into emerging threats and attack techniques, enabling proactive threat hunting to strengthen organizational security. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17117839-scattered-spider-strikes-again-hunt-for-north-korean-insiders-heats-up.mp3" length="20389175" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17117839</guid>
    <pubDate>Wed, 07 May 2025 14:00:00 -0400</pubDate>
    <itunes:duration>1688</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Demystifying CVE-2025-31324, The New Critical SAP NetWeaver Flaw</itunes:title>
    <title>Demystifying CVE-2025-31324, The New Critical SAP NetWeaver Flaw</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with detection engineer Marken and intelligence analyst Alex as they discuss: ReliaQuest's Discovery of Critical SAP NetWeaver VulnerabilityAI Upgrade for Darcula Phishing Kit DragonForce's New Cartel Business ModelMaximum Severity Commvault flawKim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcemen...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with detection engineer Marken and intelligence analyst Alex as they discuss:</p><ul><li>ReliaQuest&apos;s Discovery of Critical SAP NetWeaver Vulnerability</li><li>AI Upgrade for Darcula Phishing Kit </li><li>DragonForce&apos;s New Cartel Business Model</li><li>Maximum Severity Commvault flaw</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Marken Teder</b>: Threat Detection Engineer at ReliaQuest, with a total of 7 years at the company. A native Estonian, he has previously worked as an Incident Response Analyst, Content Developer, and Security Architect. Marken&apos;s extensive experience in detection and response brings a robust technical perspective to discussions.</p><p><b>Alexander Capraro: </b>Alexander Capraro is a Cyber Threat Intelligence Analyst at ReliaQuest with over five years of experience in cybersecurity. With his prior experience as a Security Analyst, he specializes in incident response, malware analysis and campaign tracking, and OSINT investigations. </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with detection engineer Marken and intelligence analyst Alex as they discuss:</p><ul><li>ReliaQuest&apos;s Discovery of Critical SAP NetWeaver Vulnerability</li><li>AI Upgrade for Darcula Phishing Kit </li><li>DragonForce&apos;s New Cartel Business Model</li><li>Maximum Severity Commvault flaw</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Marken Teder</b>: Threat Detection Engineer at ReliaQuest, with a total of 7 years at the company. A native Estonian, he has previously worked as an Incident Response Analyst, Content Developer, and Security Architect. Marken&apos;s extensive experience in detection and response brings a robust technical perspective to discussions.</p><p><b>Alexander Capraro: </b>Alexander Capraro is a Cyber Threat Intelligence Analyst at ReliaQuest with over five years of experience in cybersecurity. With his prior experience as a Security Analyst, he specializes in incident response, malware analysis and campaign tracking, and OSINT investigations. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17072745-demystifying-cve-2025-31324-the-new-critical-sap-netweaver-flaw.mp3" length="17806198" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17072745</guid>
    <pubDate>Wed, 30 Apr 2025 12:00:00 -0400</pubDate>
    <itunes:duration>1471</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>BreachForums Down: Hacktivist Attack or FBI Crackdown?</itunes:title>
    <title>BreachForums Down: Hacktivist Attack or FBI Crackdown?</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and John as they discuss: BreachForums Down: Dark Storm Team Takes CreditA Potential New Vulnerability in SAP NetWeaverExploit User Targets Salesforce DataReliaQuest Research: Understanding Chinese Espionage StrategiesKim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with intelligence analysts Joey and John as they discuss:</p><ul><li>BreachForums Down: Dark Storm Team Takes Credit</li><li>A Potential New Vulnerability in SAP NetWeaver</li><li>Exploit User Targets Salesforce Data</li><li>ReliaQuest Research: Understanding Chinese Espionage Strategies</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.<br/><br/><b>Joseph Keyes: </b>Joseph Keyes is a Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs. </p><p><b>John Dilgen:</b> John Dilgen is a Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest. </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/ReliaQuestShadowTalk'>https://linktr.ee/ReliaQuestShadowTalk</a></p><p>Join host Kim along with intelligence analysts Joey and John as they discuss:</p><ul><li>BreachForums Down: Dark Storm Team Takes Credit</li><li>A Potential New Vulnerability in SAP NetWeaver</li><li>Exploit User Targets Salesforce Data</li><li>ReliaQuest Research: Understanding Chinese Espionage Strategies</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.<br/><br/><b>Joseph Keyes: </b>Joseph Keyes is a Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs. </p><p><b>John Dilgen:</b> John Dilgen is a Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/17028769-breachforums-down-hacktivist-attack-or-fbi-crackdown.mp3" length="17554436" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17028769</guid>
    <pubDate>Wed, 23 Apr 2025 12:00:00 -0400</pubDate>
    <itunes:duration>1455</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hijacked and Hidden: ReliaQuest Identifies New Backdoor and Persistence Technique</itunes:title>
    <title>Hijacked and Hidden: ReliaQuest Identifies New Backdoor and Persistence Technique</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/RQShadowTalk Join host Kim along with intelligence analysts Ivan and Hayden as they discuss: How ReliaQuest Identified a New Backdoor and Persistence TechniqueOur Latest Ransomware Quarterly ReportHow Attackers Maintained Access to Patched FortiGate VPNsWhat Oracle Said Next About That Breach  Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforce...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></p><p>Join host Kim along with intelligence analysts Ivan and Hayden as they discuss:</p><ul><li>How ReliaQuest Identified a New Backdoor and Persistence Technique</li><li>Our Latest Ransomware Quarterly Report</li><li>How Attackers Maintained Access to Patched FortiGate VPNs</li><li>What Oracle Said Next About <em>That</em> Breach</li></ul><p><br/></p><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Ivan Righi</b>:<b> </b>Senior Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. His areas of expertise include the development of cyber intelligence tools, data breach investigations, threat actor profiling, and reverse engineering of threat campaigns. Before joining ReliaQuest, Ivan was a member of the Digital Shadows Photon Research Team, where he investigated, researched, and responded to cyber threats across the clear, deep, and dark web. </p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security. </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></p><p>Join host Kim along with intelligence analysts Ivan and Hayden as they discuss:</p><ul><li>How ReliaQuest Identified a New Backdoor and Persistence Technique</li><li>Our Latest Ransomware Quarterly Report</li><li>How Attackers Maintained Access to Patched FortiGate VPNs</li><li>What Oracle Said Next About <em>That</em> Breach</li></ul><p><br/></p><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Ivan Righi</b>:<b> </b>Senior Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. His areas of expertise include the development of cyber intelligence tools, data breach investigations, threat actor profiling, and reverse engineering of threat campaigns. Before joining ReliaQuest, Ivan was a member of the Digital Shadows Photon Research Team, where he investigated, researched, and responded to cyber threats across the clear, deep, and dark web. </p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/16990529-hijacked-and-hidden-reliaquest-identifies-new-backdoor-and-persistence-technique.mp3" length="19501197" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16990529</guid>
    <pubDate>Wed, 16 Apr 2025 13:00:00 -0400</pubDate>
    <itunes:duration>1611</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Fast Flux DNS Challenges, Evolving Adversary Tactics, and Proactive Defense Strategies</itunes:title>
    <title>Fast Flux DNS Challenges, Evolving Adversary Tactics, and Proactive Defense Strategies</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/RQShadowTalk Join host Kim along with intelligence analyst Joey and threat hunter Leo as they discuss: Ivanti Patches Exploited VulnerabilityFast Flux DNS Evasion WarningRansomware Scene ShiftsReliaQuest's Approach to Threat HuntingKim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a weal...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></p><p>Join host Kim along with intelligence analyst Joey and threat hunter Leo as they discuss:</p><ul><li>Ivanti Patches Exploited Vulnerability</li><li>Fast Flux DNS Evasion Warning</li><li>Ransomware Scene Shifts</li><li>ReliaQuest&apos;s Approach to Threat Hunting</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs.</p><p><b>Leo Dawson</b>: Threat Hunter on the ReliaQuest Threat Research Team. With a deep background in Experimental Physics and Artificial Intelligence, Leo brings a unique interdisciplinary perspective to cybersecurity. He is driven by a passion for leveraging these skills to proactively track, analyze, and understand threat actor campaigns while gaining deeper insights into their evolving tactics and behaviors. </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></p><p>Join host Kim along with intelligence analyst Joey and threat hunter Leo as they discuss:</p><ul><li>Ivanti Patches Exploited Vulnerability</li><li>Fast Flux DNS Evasion Warning</li><li>Ransomware Scene Shifts</li><li>ReliaQuest&apos;s Approach to Threat Hunting</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs.</p><p><b>Leo Dawson</b>: Threat Hunter on the ReliaQuest Threat Research Team. With a deep background in Experimental Physics and Artificial Intelligence, Leo brings a unique interdisciplinary perspective to cybersecurity. He is driven by a passion for leveraging these skills to proactively track, analyze, and understand threat actor campaigns while gaining deeper insights into their evolving tactics and behaviors. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/16946492-fast-flux-dns-challenges-evolving-adversary-tactics-and-proactive-defense-strategies.mp3" length="24807942" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16946492</guid>
    <pubDate>Wed, 09 Apr 2025 13:00:00 -0400</pubDate>
    <itunes:duration>2056</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>From Oracle to AI: Everything You Need to Know About Emerging Cyber Threats</itunes:title>
    <title>From Oracle to AI: Everything You Need to Know About Emerging Cyber Threats</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/RQShadowTalk Join host Kim along with intelligence analyst Hayden and threat detection engineer Marken as they discuss: Oracle Data Breach Latest UpdatesBlackLock Ransomware ExposedActive Exploitation of ChatGPT FlawUp to the Minute Attacker TechniquesKim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.&nbs...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></p><p>Join host Kim along with intelligence analyst Hayden and threat detection engineer Marken as they discuss:</p><ul><li>Oracle Data Breach Latest Updates</li><li>BlackLock Ransomware Exposed</li><li>Active Exploitation of ChatGPT Flaw</li><li>Up to the Minute Attacker Techniques</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Marken Teder</b>: Threat Detection Engineer at ReliaQuest, with a total of 7 years at the company. A native Estonian, he has previously worked as an Incident Response Analyst, Content Developer, and Security Architect. Marken&apos;s extensive experience in detection and response brings a robust technical perspective to discussions.</p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security. </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></p><p>Join host Kim along with intelligence analyst Hayden and threat detection engineer Marken as they discuss:</p><ul><li>Oracle Data Breach Latest Updates</li><li>BlackLock Ransomware Exposed</li><li>Active Exploitation of ChatGPT Flaw</li><li>Up to the Minute Attacker Techniques</li></ul><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Marken Teder</b>: Threat Detection Engineer at ReliaQuest, with a total of 7 years at the company. A native Estonian, he has previously worked as an Incident Response Analyst, Content Developer, and Security Architect. Marken&apos;s extensive experience in detection and response brings a robust technical perspective to discussions.</p><p><b>Hayden Evans:</b> Cyber Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/16911459-from-oracle-to-ai-everything-you-need-to-know-about-emerging-cyber-threats.mp3" length="24624984" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16911459</guid>
    <pubDate>Thu, 03 Apr 2025 11:00:00 -0400</pubDate>
    <itunes:duration>2037</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Guest Episode: Navigating Cyber Storms with Expert Insights on Incident Response</itunes:title>
    <title>Guest Episode: Navigating Cyber Storms with Expert Insights on Incident Response</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/RQShadowTalk Join host Kim along with intelligence analyst Joey and special guest Rachel Ratcliff as they discuss:  The latest Insights on the Alleged Oracle Data BreachA Critical Vulnerability in Next.js MiddlewareThe Importance of Incident Response when Tackling Today's Cyber ThreatsRachel Ratcliff: Engagement Management Leader for Aon Cyber Solutions and Stroz Friedberg Digital Forensics and Incident Response where she sits on the Executive Committee and o...]]></itunes:summary>
    <description><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></p><p>Join host Kim along with intelligence analyst Joey and special guest Rachel Ratcliff as they discuss:</p><ul><li> The latest Insights on the Alleged Oracle Data Breach</li><li>A Critical Vulnerability in Next.js Middleware</li><li>The Importance of Incident Response when Tackling Today&apos;s Cyber Threats</li></ul><p><b>Rachel Ratcliff: </b>Engagement Management Leader for Aon Cyber Solutions and Stroz Friedberg Digital Forensics and Incident Response where she sits on the Executive Committee and oversees global commercial strategy for the firm’s reactive services practice.  She and her team of professionals are responsible for managing complex digital forensic investigations, responding to data breach incidents, and overseeing testing and assessment in a host of cases involving cybercrime, theft of intellectual property, deletion of digital data, e-forgery, cyber-harassment, and online fraud and abuse.  Rachel brings over 15 years of experience in incident response, and prior to joining Aon/Stroz Friedberg, she was a practicing lawyer in Dallas, Texas.  Rachel is a frequent speaker, guest lecturer, and advisor to boards and C-suite executives on cybersecurity matters.</p><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs.</p>]]></description>
    <content:encoded><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></p><p>Join host Kim along with intelligence analyst Joey and special guest Rachel Ratcliff as they discuss:</p><ul><li> The latest Insights on the Alleged Oracle Data Breach</li><li>A Critical Vulnerability in Next.js Middleware</li><li>The Importance of Incident Response when Tackling Today&apos;s Cyber Threats</li></ul><p><b>Rachel Ratcliff: </b>Engagement Management Leader for Aon Cyber Solutions and Stroz Friedberg Digital Forensics and Incident Response where she sits on the Executive Committee and oversees global commercial strategy for the firm’s reactive services practice.  She and her team of professionals are responsible for managing complex digital forensic investigations, responding to data breach incidents, and overseeing testing and assessment in a host of cases involving cybercrime, theft of intellectual property, deletion of digital data, e-forgery, cyber-harassment, and online fraud and abuse.  Rachel brings over 15 years of experience in incident response, and prior to joining Aon/Stroz Friedberg, she was a practicing lawyer in Dallas, Texas.  Rachel is a frequent speaker, guest lecturer, and advisor to boards and C-suite executives on cybersecurity matters.</p><p><b>Kim Bromley:</b> Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/16864478-guest-episode-navigating-cyber-storms-with-expert-insights-on-incident-response.mp3" length="27871457" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16864478</guid>
    <pubDate>Wed, 26 Mar 2025 12:00:00 -0400</pubDate>
    <itunes:duration>2313</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>When Old Meets New: The Rise of VPN Exploits and Brute-Force Tools</itunes:title>
    <title>When Old Meets New: The Rise of VPN Exploits and Brute-Force Tools</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/RQShadowTalk Join host Kim along with intelligence analysts Ivan and John as they discuss: ReliaQuest's Research: Devastating Paths to VPN ExploitationSuperBlack Ransomware Exploits Fortinet FlawsBRUTED Framework Automates Black Basta AttacksClickFix Campaign Hooks Hospitality SectorKim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and h...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></p><p>Join host Kim along with intelligence analysts Ivan and John as they discuss:</p><ul><li>ReliaQuest&apos;s Research: Devastating Paths to VPN Exploitation</li><li>SuperBlack Ransomware Exploits Fortinet Flaws</li><li>BRUTED Framework Automates Black Basta Attacks</li><li>ClickFix Campaign Hooks Hospitality Sector</li></ul><p><b>Kim Bromley</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Ivan Righi</b>:<b> </b>Senior Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. His areas of expertise include the development of cyber intelligence tools, data breach investigations, threat actor profiling, and reverse engineering of threat campaigns. Before joining ReliaQuest, Ivan was a member of the Digital Shadows Photon Research Team, where he investigated, researched, and responded to cyber threats across the clear, deep, and dark web. </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></p><p>Join host Kim along with intelligence analysts Ivan and John as they discuss:</p><ul><li>ReliaQuest&apos;s Research: Devastating Paths to VPN Exploitation</li><li>SuperBlack Ransomware Exploits Fortinet Flaws</li><li>BRUTED Framework Automates Black Basta Attacks</li><li>ClickFix Campaign Hooks Hospitality Sector</li></ul><p><b>Kim Bromley</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Ivan Righi</b>:<b> </b>Senior Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. His areas of expertise include the development of cyber intelligence tools, data breach investigations, threat actor profiling, and reverse engineering of threat campaigns. Before joining ReliaQuest, Ivan was a member of the Digital Shadows Photon Research Team, where he investigated, researched, and responded to cyber threats across the clear, deep, and dark web. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/16824204-when-old-meets-new-the-rise-of-vpn-exploits-and-brute-force-tools.mp3" length="19747510" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16824204</guid>
    <pubDate>Wed, 19 Mar 2025 13:00:00 -0400</pubDate>
    <itunes:duration>1635</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Webcam Warfare, Supply Chains Under Siege, Insider Threats, and More!</itunes:title>
    <title>Webcam Warfare, Supply Chains Under Siege, Insider Threats, and More!</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/RQShadowTalk Join host Kim, and intelligence analysts Joey and Anna as they discuss: ReliaQuest's Research: Cyber Threats to Hospitality and RecreationSilk Typhoon Expands to Supply-Chain AttacksInsider's Kill Switch Cripples Ex-EmployerAkira Ransomware Uses Webcam to Compromise NetworkKim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, an...]]></itunes:summary>
    <description><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></p><p>Join host Kim, and intelligence analysts Joey and Anna as they discuss:</p><ul><li>ReliaQuest&apos;s Research: Cyber Threats to Hospitality and Recreation</li><li>Silk Typhoon Expands to Supply-Chain Attacks</li><li>Insider&apos;s Kill Switch Cripples Ex-Employer</li><li>Akira Ransomware Uses Webcam to Compromise Network</li></ul><p><b>Kim Bromley</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs. </p><p><b>Anna Jones</b>: Cyber Threat Intelligence Analyst at ReliaQuest, based in our London office. She joined in June 2023 and specializes in OSINT investigations, with 5 years of experience in threat intelligence. Anna&apos;s expertise in sourcing and analyzing covert threat data provides unique insights into cybercriminal activities. </p>]]></description>
    <content:encoded><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></p><p>Join host Kim, and intelligence analysts Joey and Anna as they discuss:</p><ul><li>ReliaQuest&apos;s Research: Cyber Threats to Hospitality and Recreation</li><li>Silk Typhoon Expands to Supply-Chain Attacks</li><li>Insider&apos;s Kill Switch Cripples Ex-Employer</li><li>Akira Ransomware Uses Webcam to Compromise Network</li></ul><p><b>Kim Bromley</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs. </p><p><b>Anna Jones</b>: Cyber Threat Intelligence Analyst at ReliaQuest, based in our London office. She joined in June 2023 and specializes in OSINT investigations, with 5 years of experience in threat intelligence. Anna&apos;s expertise in sourcing and analyzing covert threat data provides unique insights into cybercriminal activities. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/16779853-webcam-warfare-supply-chains-under-siege-insider-threats-and-more.mp3" length="18098809" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16779853</guid>
    <pubDate>Wed, 12 Mar 2025 12:00:00 -0400</pubDate>
    <itunes:duration>1498</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hooked and Hacked: Phishing Frenzy, Ransomware Recap, Zero-Day Fallout</itunes:title>
    <title>Hooked and Hacked: Phishing Frenzy, Ransomware Recap, Zero-Day Fallout</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/RQShadowTalk Join host Kim and Detection Researcher Marken Teder as they discuss: ReliaQuest's Research: Blink and They're InThe Latest Ransomware Developments244 Million Passwords Added to 'Have I Been Pwned'VMware Zero-Days Actively ExploitedKim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim b...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></p><p>Join host Kim and Detection Researcher Marken Teder as they discuss:</p><ul><li>ReliaQuest&apos;s Research: Blink and They&apos;re In</li><li>The Latest Ransomware Developments</li><li>244 Million Passwords Added to &apos;Have I Been Pwned&apos;</li><li>VMware Zero-Days Actively Exploited</li></ul><p><b>Kim Bromley</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Marken Teder</b>: Detection Researcher at ReliaQuest, with a total of 6 years at the company. A native Estonian, he has previously worked as an Incident Response Analyst, Content Developer, and Security Architect. Marken&apos;s extensive experience in detection and response brings a robust technical perspective to discussions.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></p><p>Join host Kim and Detection Researcher Marken Teder as they discuss:</p><ul><li>ReliaQuest&apos;s Research: Blink and They&apos;re In</li><li>The Latest Ransomware Developments</li><li>244 Million Passwords Added to &apos;Have I Been Pwned&apos;</li><li>VMware Zero-Days Actively Exploited</li></ul><p><b>Kim Bromley</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Marken Teder</b>: Detection Researcher at ReliaQuest, with a total of 6 years at the company. A native Estonian, he has previously worked as an Incident Response Analyst, Content Developer, and Security Architect. Marken&apos;s extensive experience in detection and response brings a robust technical perspective to discussions.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/16739634-hooked-and-hacked-phishing-frenzy-ransomware-recap-zero-day-fallout.mp3" length="23446155" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16739634</guid>
    <pubDate>Wed, 05 Mar 2025 11:00:00 -0500</pubDate>
    <itunes:duration>1943</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>SPECIAL: &#39;From Data to Defense&#39; - Insights from ReliaQuest&#39;s Annual Cyber-Threat Report</itunes:title>
    <title>SPECIAL: &#39;From Data to Defense&#39; - Insights from ReliaQuest&#39;s Annual Cyber-Threat Report</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/RQShadowTalk  Join host Kim and cyber threat intelligence analysts Joey Keyes and Hayden Evans as they discuss insights from ReliaQuest's 2025 Annual Cyber-Threat Report: The Top Successful Initial Access Techniques How Attackers Achieve Breakout in 48 MinutesKey Recommendations to Outpace AttackersKim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a> </p><p>Join host Kim and cyber threat intelligence analysts Joey Keyes and Hayden Evans as they discuss insights from ReliaQuest&apos;s 2025 Annual Cyber-Threat Report:</p><ul><li>The Top Successful Initial Access Techniques </li><li>How Attackers Achieve Breakout in 48 Minutes</li><li>Key Recommendations to Outpace Attackers</li></ul><p><b>Kim Bromley</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs. </p><p><b>Hayden Evans:</b> Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security. </p><p> </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a> </p><p>Join host Kim and cyber threat intelligence analysts Joey Keyes and Hayden Evans as they discuss insights from ReliaQuest&apos;s 2025 Annual Cyber-Threat Report:</p><ul><li>The Top Successful Initial Access Techniques </li><li>How Attackers Achieve Breakout in 48 Minutes</li><li>Key Recommendations to Outpace Attackers</li></ul><p><b>Kim Bromley</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Joseph Keyes: </b>Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Analyst, he has gained years of experience in triaging and responding to active threats using GreyMatter&apos;s various tools. Joseph is skilled in intrusion response, threat actor profiling, OSINT across the clear and dark web, and analyzing adversarial TTPs. </p><p><b>Hayden Evans:</b> Threat Intelligence Analyst at ReliaQuest. He has experience in the F3EAD lifecycle and analyzing adversaries&apos; TTPs to operationalize this information. He is also experienced with intrusion response, OSINT investigations, and offensive security. </p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/16698049-special-from-data-to-defense-insights-from-reliaquest-s-annual-cyber-threat-report.mp3" length="31022032" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16698049</guid>
    <pubDate>Wed, 26 Feb 2025 12:00:00 -0500</pubDate>
    <itunes:duration>2574</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>BlackLock Ransomware, 8Base Seized, Storm-2372 Phishing</itunes:title>
    <title>BlackLock Ransomware, 8Base Seized, Storm-2372 Phishing</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/RQShadowTalk Join hosts Chris and Kim as they discuss: Storm-2372 Device Code Phishing CampaignChina Linked Espionage Tools Used Alongside Ransomware8Base Leak Site Seized in Law Enforcement OperationReliaQuest Research on the Worlds Fastest Rising Ransomware Group: BlackLockChris Morgan: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></p><p>Join hosts Chris and Kim as they discuss:</p><ul><li>Storm-2372 Device Code Phishing Campaign</li><li>China Linked Espionage Tools Used Alongside Ransomware</li><li>8Base Leak Site Seized in Law Enforcement Operation</li><li>ReliaQuest Research on the Worlds Fastest Rising Ransomware Group: BlackLock</li></ul><p><b>Chris Morgan</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes.</p><p><b>Kim Bromley</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></p><p>Join hosts Chris and Kim as they discuss:</p><ul><li>Storm-2372 Device Code Phishing Campaign</li><li>China Linked Espionage Tools Used Alongside Ransomware</li><li>8Base Leak Site Seized in Law Enforcement Operation</li><li>ReliaQuest Research on the Worlds Fastest Rising Ransomware Group: BlackLock</li></ul><p><b>Chris Morgan</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes.</p><p><b>Kim Bromley</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/16655500-blacklock-ransomware-8base-seized-storm-2372-phishing.mp3" length="19913895" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16655500</guid>
    <pubDate>Wed, 19 Feb 2025 13:00:00 -0500</pubDate>
    <itunes:duration>1651</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Brute Force Campaign, Ransomware Insider Recruiting, Manufacturing Threats</itunes:title>
    <title>Brute Force Campaign, Ransomware Insider Recruiting, Manufacturing Threats</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/RQShadowTalk Join hosts Chris and Kim, and Detection researcher Corey Carter as they discuss: Large Scale Brute Force Campaign Targeting Edge DevicesCritical Microsoft RCE Vulnerability Exploited Ransomware Criminals Attempt to Recruit InsidersReliaQuest Research: Manufacturing Sector ReportChris Morgan: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in Au...]]></itunes:summary>
    <description><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></p><p>Join hosts Chris and Kim, and Detection researcher Corey Carter as they discuss:</p><ul><li>Large Scale Brute Force Campaign Targeting Edge Devices</li><li>Critical Microsoft RCE Vulnerability Exploited </li><li>Ransomware Criminals Attempt to Recruit Insiders</li><li>ReliaQuest Research: Manufacturing Sector Report</li></ul><p><b>Chris Morgan</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes.</p><p><b>Kim Bromley</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Corey Carter</b>: Detection Researcher at ReliaQuest. A Florida native and former infantryman in the United States Marines, Corey holds a bachelor&apos;s degree in computer science with a specialization in information assurance. His experience as a Security Analyst and Threat Hunter at ReliaQuest, combined with his military background, equips him with a unique perspective on cybersecurity challenges. </p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></p><p>Join hosts Chris and Kim, and Detection researcher Corey Carter as they discuss:</p><ul><li>Large Scale Brute Force Campaign Targeting Edge Devices</li><li>Critical Microsoft RCE Vulnerability Exploited </li><li>Ransomware Criminals Attempt to Recruit Insiders</li><li>ReliaQuest Research: Manufacturing Sector Report</li></ul><p><b>Chris Morgan</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes.</p><p><b>Kim Bromley</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p><p><b>Corey Carter</b>: Detection Researcher at ReliaQuest. A Florida native and former infantryman in the United States Marines, Corey holds a bachelor&apos;s degree in computer science with a specialization in information assurance. His experience as a Security Analyst and Threat Hunter at ReliaQuest, combined with his military background, equips him with a unique perspective on cybersecurity challenges. </p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/16610394-brute-force-campaign-ransomware-insider-recruiting-manufacturing-threats.mp3" length="22078170" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16610394</guid>
    <pubDate>Wed, 12 Feb 2025 12:00:00 -0500</pubDate>
    <itunes:duration>1831</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>AI Spies, Unused AWS Buckets, New Lazarus Group Infrastructure</itunes:title>
    <title>AI Spies, Unused AWS Buckets, New Lazarus Group Infrastructure</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/RQShadowTalk Join hosts Chris and Kim, and Senior Threat Intelligence Analyst Ivan Righi as they discuss: APT Groups Use AI for ReconnaissanceUnused AWS Buckets Pose Supply-Chain RiskNew Lazarus Group Infrastructure UncoveredReliaQuest Research: Attackers Abuse Legitimate ToolsKim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has act...]]></itunes:summary>
    <description><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></p><p>Join hosts Chris and Kim, and Senior Threat Intelligence Analyst Ivan Righi as they discuss:</p><ul><li>APT Groups Use AI for Reconnaissance</li><li>Unused AWS Buckets Pose Supply-Chain Risk</li><li>New Lazarus Group Infrastructure Uncovered</li><li>ReliaQuest Research: Attackers Abuse Legitimate Tools</li></ul><p><b>Kim Bromley</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.<br/><br/><b>Chris Morgan</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes.</p><p><b>Ivan Righi</b>:<b> </b>Senior Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. His areas of expertise include the development of cyber intelligence tools, data breach investigations, threat actor profiling, and reverse engineering of threat campaigns. Before joining ReliaQuest, Ivan was a member of the Digital Shadows Photon Research Team, where he investigated, researched, and responded to cyber threats across the clear, deep, and dark web. </p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></p><p>Join hosts Chris and Kim, and Senior Threat Intelligence Analyst Ivan Righi as they discuss:</p><ul><li>APT Groups Use AI for Reconnaissance</li><li>Unused AWS Buckets Pose Supply-Chain Risk</li><li>New Lazarus Group Infrastructure Uncovered</li><li>ReliaQuest Research: Attackers Abuse Legitimate Tools</li></ul><p><b>Kim Bromley</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.<br/><br/><b>Chris Morgan</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes.</p><p><b>Ivan Righi</b>:<b> </b>Senior Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. His areas of expertise include the development of cyber intelligence tools, data breach investigations, threat actor profiling, and reverse engineering of threat campaigns. Before joining ReliaQuest, Ivan was a member of the Digital Shadows Photon Research Team, where he investigated, researched, and responded to cyber threats across the clear, deep, and dark web. </p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/16569776-ai-spies-unused-aws-buckets-new-lazarus-group-infrastructure.mp3" length="17719032" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16569776</guid>
    <pubDate>Wed, 05 Feb 2025 12:00:00 -0500</pubDate>
    <itunes:duration>1469</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Attackers Accelerating Attacks, Lumma Infostealer, DeepSeek LLM</itunes:title>
    <title>Attackers Accelerating Attacks, Lumma Infostealer, DeepSeek LLM</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/RQShadowTalk   Join hosts Chris and Marken, and Threat Intelligence Analyst Anna as they discuss:  ReliaQuest's Research into Attacker Breakout Times Lumma Infostealer Spreading via Fake Reddit Webpages Ransomware Persisting with SSH Tunnelling DeepSeek and the Potential Risks to User Data Chris Morgan: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk...]]></itunes:summary>
    <description><![CDATA[<p>Resources: <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a> <br/><br/>Join hosts Chris and Marken, and Threat Intelligence Analyst Anna as they discuss:</p><ul><li> ReliaQuest&apos;s Research into Attacker Breakout Times</li><li> Lumma Infostealer Spreading via Fake Reddit Webpages</li><li> Ransomware Persisting with SSH Tunnelling</li><li> DeepSeek and the Potential Risks to User Data </li></ul><p><b>Chris Morgan</b>: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  brings deep insights into various threat landscapes.</p><p><b>Marken Teder</b>: Marken Teder is a Detection Researcher at ReliaQuest, with a total of 6 years at the company. A native Estonian, he has previously worked as an Incident Response Analyst, Content Developer, and Security Architect. Marken&apos;s extensive experience in detection and response brings a robust technical perspective.<br/><br/><b>Anna Jones</b>: Anna is a Cyber Threat Intelligence Analyst at ReliaQuest, based in our London office. She joined in June 2023 and specializes in OSINT investigations, with 5 years of experience in threat intelligence. Anna&apos;s expertise in sourcing and analyzing covert threat data provides unique insights into cybercriminal activities for ShadowTalk. </p>]]></description>
    <content:encoded><![CDATA[<p>Resources: <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a> <br/><br/>Join hosts Chris and Marken, and Threat Intelligence Analyst Anna as they discuss:</p><ul><li> ReliaQuest&apos;s Research into Attacker Breakout Times</li><li> Lumma Infostealer Spreading via Fake Reddit Webpages</li><li> Ransomware Persisting with SSH Tunnelling</li><li> DeepSeek and the Potential Risks to User Data </li></ul><p><b>Chris Morgan</b>: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  brings deep insights into various threat landscapes.</p><p><b>Marken Teder</b>: Marken Teder is a Detection Researcher at ReliaQuest, with a total of 6 years at the company. A native Estonian, he has previously worked as an Incident Response Analyst, Content Developer, and Security Architect. Marken&apos;s extensive experience in detection and response brings a robust technical perspective.<br/><br/><b>Anna Jones</b>: Anna is a Cyber Threat Intelligence Analyst at ReliaQuest, based in our London office. She joined in June 2023 and specializes in OSINT investigations, with 5 years of experience in threat intelligence. Anna&apos;s expertise in sourcing and analyzing covert threat data provides unique insights into cybercriminal activities for ShadowTalk. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/16527209-attackers-accelerating-attacks-lumma-infostealer-deepseek-llm.mp3" length="29776925" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16527209</guid>
    <pubDate>Wed, 29 Jan 2025 11:00:00 -0500</pubDate>
    <itunes:duration>2477</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ransomware Hits New Heights, FortiGate Data Leaked, Sneaky 2FA Phishing Kit</itunes:title>
    <title>Ransomware Hits New Heights, FortiGate Data Leaked, Sneaky 2FA Phishing Kit</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/RQShadowTalk  Join hosts Chris and Kim, and Detection Researcher Corey Carter as they discuss: ReliaQuest's Q4 Ransomware ReportFortiGate Data LeakNew Sneaky 2FA Phishing KitUK Contemplates Ransomware Payment BanKim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in ...]]></itunes:summary>
    <description><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a><br/><br/>Join hosts Chris and Kim, and Detection Researcher Corey Carter as they discuss:</p><ul><li>ReliaQuest&apos;s Q4 Ransomware Report</li><li>FortiGate Data Leak</li><li>New Sneaky 2FA Phishing Kit</li><li>UK Contemplates Ransomware Payment Ban</li></ul><p><b>Kim Bromley</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.<br/><br/><b>Chris Morgan</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes.<br/><br/><b>Corey Carter</b>: Detection Researcher at ReliaQuest. A Florida native and former infantryman in the United States Marines, Corey holds a bachelor&apos;s degree in computer science with a specialization in information assurance. His experience as a Security Analyst and Threat Hunter at ReliaQuest, combined with his military background, equips him with a unique perspective on cybersecurity challenges. </p>]]></description>
    <content:encoded><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a><br/><br/>Join hosts Chris and Kim, and Detection Researcher Corey Carter as they discuss:</p><ul><li>ReliaQuest&apos;s Q4 Ransomware Report</li><li>FortiGate Data Leak</li><li>New Sneaky 2FA Phishing Kit</li><li>UK Contemplates Ransomware Payment Ban</li></ul><p><b>Kim Bromley</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.<br/><br/><b>Chris Morgan</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes.<br/><br/><b>Corey Carter</b>: Detection Researcher at ReliaQuest. A Florida native and former infantryman in the United States Marines, Corey holds a bachelor&apos;s degree in computer science with a specialization in information assurance. His experience as a Security Analyst and Threat Hunter at ReliaQuest, combined with his military background, equips him with a unique perspective on cybersecurity challenges. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/16484937-ransomware-hits-new-heights-fortigate-data-leaked-sneaky-2fa-phishing-kit.mp3" length="25550045" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16484937</guid>
    <pubDate>Wed, 22 Jan 2025 13:00:00 -0500</pubDate>
    <itunes:duration>2121</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Guest Episode: Ways Threat Intel Can Prioritize Threats, Vulnerability Chaos, Biden Executive Order</itunes:title>
    <title>Guest Episode: Ways Threat Intel Can Prioritize Threats, Vulnerability Chaos, Biden Executive Order</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/RQShadowTalk  Join hosts Chris and Kim, along with guest speaker Barri Graham, Beazley Threat Intelligence. Fortinet and Ivanti zero-days under active exploitationInfostealer spread via fake LDAPNightmare exploitBiden administration hasten's executive orderThe importance of taking a proactive approach within threat intelligenceBarri Graham: Experienced Security professional with over 25 years in the field. His 20+ years of military service saw stints as security p...]]></itunes:summary>
    <description><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a><br/><br/>Join hosts Chris and Kim, along with guest speaker Barri Graham, Beazley Threat Intelligence.</p><ul><li>Fortinet and Ivanti zero-days under active exploitation</li><li>Infostealer spread via fake LDAPNightmare exploit</li><li>Biden administration hasten&apos;s executive order</li><li>The importance of taking a proactive approach within threat intelligence</li></ul><p><b>Barri Graham</b>: Experienced Security professional with over 25 years in the field. His 20+ years of military service saw stints as security practitioner and leader in both UK and Global settings. Following military retirement he took up the mantle of auditor and joined NQA in 2019 as an information security auditor. After 2 years in the role he struck out as consultant for a range of public and private sector clients. In 2023, the opportunity to work with a global FTSE100 company presented itself when he joined Beazley as Head of Cyber Threat Intelligence where he works today.</p><p><b>Chris Morgan</b>: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes.<br/><br/><b>Kim Bromley</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p>]]></description>
    <content:encoded><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a><br/><br/>Join hosts Chris and Kim, along with guest speaker Barri Graham, Beazley Threat Intelligence.</p><ul><li>Fortinet and Ivanti zero-days under active exploitation</li><li>Infostealer spread via fake LDAPNightmare exploit</li><li>Biden administration hasten&apos;s executive order</li><li>The importance of taking a proactive approach within threat intelligence</li></ul><p><b>Barri Graham</b>: Experienced Security professional with over 25 years in the field. His 20+ years of military service saw stints as security practitioner and leader in both UK and Global settings. Following military retirement he took up the mantle of auditor and joined NQA in 2019 as an information security auditor. After 2 years in the role he struck out as consultant for a range of public and private sector clients. In 2023, the opportunity to work with a global FTSE100 company presented itself when he joined Beazley as Head of Cyber Threat Intelligence where he works today.</p><p><b>Chris Morgan</b>: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes.<br/><br/><b>Kim Bromley</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/16443595-guest-episode-ways-threat-intel-can-prioritize-threats-vulnerability-chaos-biden-executive-order.mp3" length="34812097" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16443595</guid>
    <pubDate>Wed, 15 Jan 2025 13:00:00 -0500</pubDate>
    <itunes:duration>2890</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Espionage Hits US Treasury, OtterCookie Tricks Jobseekers, ReliaQuest Tackles Pure Malware</itunes:title>
    <title>Espionage Hits US Treasury, OtterCookie Tricks Jobseekers, ReliaQuest Tackles Pure Malware</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/RQShadowTalk  Join hosts Chris and Kim, and threat hunter Brian as they discuss:  Chinese Espionage Hits US Treasury DepartmentNew OtterCookie Variant Used in North Korea Recruitment ScamFireScam Infostealer Imitates Telegram to Steal Your DataReliaQuest's Response to a Speedy Pure Malware CompromiseKim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK ...]]></itunes:summary>
    <description><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a><br/><br/>Join hosts Chris and Kim, and threat hunter Brian as they discuss:</p><ul><li> Chinese Espionage Hits US Treasury Department</li><li>New OtterCookie Variant Used in North Korea Recruitment Scam</li><li>FireScam Infostealer Imitates Telegram to Steal Your Data</li><li>ReliaQuest&apos;s Response to a Speedy Pure Malware Compromise</li></ul><p><b>Kim Bromley</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.<br/><br/><b>Chris Morgan</b>: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes.<br/><br/><b>Brian Kelly</b>: Brian Kelly is an experienced Threat Hunter and Intrusion Response Operator with a deep understanding of adversary tactics, techniques, procedures (TTPs), and motivations. Beginning his career in IT, Brian swiftly transitioned into cybersecurity, where he actively hunts for threats within organizations and responds to ongoing incidents. His expertise in adversary emulation and TTP exploration empowers him to anticipate and counteract malicious activities. Positioned on the front lines, Brian offers invaluable and actionable insights on the current threat landscape.</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a><br/><br/>Join hosts Chris and Kim, and threat hunter Brian as they discuss:</p><ul><li> Chinese Espionage Hits US Treasury Department</li><li>New OtterCookie Variant Used in North Korea Recruitment Scam</li><li>FireScam Infostealer Imitates Telegram to Steal Your Data</li><li>ReliaQuest&apos;s Response to a Speedy Pure Malware Compromise</li></ul><p><b>Kim Bromley</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.<br/><br/><b>Chris Morgan</b>: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes.<br/><br/><b>Brian Kelly</b>: Brian Kelly is an experienced Threat Hunter and Intrusion Response Operator with a deep understanding of adversary tactics, techniques, procedures (TTPs), and motivations. Beginning his career in IT, Brian swiftly transitioned into cybersecurity, where he actively hunts for threats within organizations and responds to ongoing incidents. His expertise in adversary emulation and TTP exploration empowers him to anticipate and counteract malicious activities. Positioned on the front lines, Brian offers invaluable and actionable insights on the current threat landscape.</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/16402808-espionage-hits-us-treasury-ottercookie-tricks-jobseekers-reliaquest-tackles-pure-malware.mp3" length="20054270" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16402808</guid>
    <pubDate>Wed, 08 Jan 2025 11:00:00 -0500</pubDate>
    <itunes:duration>1663</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Guest Episode: Are Cyber Predictions Worth It? Clop Strikes, BADBOX Crumbles, US Fights Back Against Chinese Espionage</itunes:title>
    <title>Guest Episode: Are Cyber Predictions Worth It? Clop Strikes, BADBOX Crumbles, US Fights Back Against Chinese Espionage</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/RQShadowTalk  Join hosts Chris and Kim, and guest Noah Davis, CISO Ingersoll Rand, as they discuss:  2024 look-back, 2025 forecast. We discuss our expectations for the coming yearClop resurface in new campaignPresident-elect Trump administration pivot on tackling Chinese espionageThe future for AI and automation in shaping the security landscapeNoah Davis: Seasoned technologist with over 20 years of experience, excelling in translating complex tech challenges...]]></itunes:summary>
    <description><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a><br/><br/>Join hosts Chris and Kim, and guest Noah Davis, CISO Ingersoll Rand, as they discuss:</p><ul><li> 2024 look-back, 2025 forecast. We discuss our expectations for the coming year</li><li>Clop resurface in new campaign</li><li>President-elect Trump administration pivot on tackling Chinese espionage</li><li>The future for AI and automation in shaping the security landscape</li></ul><p><b>Noah Davis: </b>Seasoned technologist with over 20 years of experience, excelling in translating complex tech challenges into simple business solutions for Fortune 500 companies. As VP &amp; Chief Information Security Officer at Ingersoll Rand, he leads global cybersecurity efforts. Previously, he held senior roles in IT audit, incident response, and security architecture. Noah champions leadership by prioritizing people, enabling a secure and flexible future, and fostering authenticity and transparency.<br/><br/><b>Chris Morgan</b>: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes.<br/><br/><b>Kim Bromley</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.<br/><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a><br/><br/>Join hosts Chris and Kim, and guest Noah Davis, CISO Ingersoll Rand, as they discuss:</p><ul><li> 2024 look-back, 2025 forecast. We discuss our expectations for the coming year</li><li>Clop resurface in new campaign</li><li>President-elect Trump administration pivot on tackling Chinese espionage</li><li>The future for AI and automation in shaping the security landscape</li></ul><p><b>Noah Davis: </b>Seasoned technologist with over 20 years of experience, excelling in translating complex tech challenges into simple business solutions for Fortune 500 companies. As VP &amp; Chief Information Security Officer at Ingersoll Rand, he leads global cybersecurity efforts. Previously, he held senior roles in IT audit, incident response, and security architecture. Noah champions leadership by prioritizing people, enabling a secure and flexible future, and fostering authenticity and transparency.<br/><br/><b>Chris Morgan</b>: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes.<br/><br/><b>Kim Bromley</b>: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.<br/><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/16302166-guest-episode-are-cyber-predictions-worth-it-clop-strikes-badbox-crumbles-us-fights-back-against-chinese-espionage.mp3" length="33663142" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16302166</guid>
    <pubDate>Wed, 18 Dec 2024 13:00:00 -0500</pubDate>
    <itunes:duration>2795</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Termite Ransomware, QR-Code Browser Bypass, CAPTCHA Hijacking</itunes:title>
    <title>Termite Ransomware, QR-Code Browser Bypass, CAPTCHA Hijacking</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/RQShadowTalk  Join hosts Chris and Kim, ReliaQuest field CISO Rick Holland, and detection researcher Marken as they discuss: Termite Ransomware claiming responsibility for Blue Yonder incidentRansomware impacting Romanian electricity supplyResearchers divulge QR code based browser bypassReliaQuest research into malware distribution through CAPTCHA hijackingChris Morgan: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Te...]]></itunes:summary>
    <description><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a><br/><br/>Join hosts Chris and Kim, ReliaQuest field CISO Rick Holland, and detection researcher Marken as they discuss:</p><ul><li>Termite Ransomware claiming responsibility for Blue Yonder incident</li><li>Ransomware impacting Romanian electricity supply</li><li>Researchers divulge QR code based browser bypass</li><li>ReliaQuest research into malware distribution through CAPTCHA hijacking</li></ul><p><b>Chris Morgan</b>: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  brings deep insights into various threat landscapes.<br/><br/><b>Kim Bromley</b>: Kim Bromley is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.<br/><br/><b>Rick Holland</b>: Rick Holland is one of ReliaQuest’s Chief Information Security Officers. A seasoned cybersecurity executive, practitioner, and former Forrester Research industry analyst, Rick is also a U.S. Army intelligence veteran. He regularly speaks at leading security conferences, including SANS, RSAC, and BSides. Rick&apos;s extensive expertise and industry insights make him an invaluable contributor.<br/><br/><b>Marken Teder</b>: Marken Teder is a Detection Researcher at ReliaQuest, with a total of 6 years at the company. A native Estonian, he has previously worked as an Incident Response Analyst, Content Developer, and Security Architect. Marken&apos;s extensive experience in detection and response brings a robust technical perspective.</p>]]></description>
    <content:encoded><![CDATA[<p><b>Resources:</b> <a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a><br/><br/>Join hosts Chris and Kim, ReliaQuest field CISO Rick Holland, and detection researcher Marken as they discuss:</p><ul><li>Termite Ransomware claiming responsibility for Blue Yonder incident</li><li>Ransomware impacting Romanian electricity supply</li><li>Researchers divulge QR code based browser bypass</li><li>ReliaQuest research into malware distribution through CAPTCHA hijacking</li></ul><p><b>Chris Morgan</b>: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  brings deep insights into various threat landscapes.<br/><br/><b>Kim Bromley</b>: Kim Bromley is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights.<br/><br/><b>Rick Holland</b>: Rick Holland is one of ReliaQuest’s Chief Information Security Officers. A seasoned cybersecurity executive, practitioner, and former Forrester Research industry analyst, Rick is also a U.S. Army intelligence veteran. He regularly speaks at leading security conferences, including SANS, RSAC, and BSides. Rick&apos;s extensive expertise and industry insights make him an invaluable contributor.<br/><br/><b>Marken Teder</b>: Marken Teder is a Detection Researcher at ReliaQuest, with a total of 6 years at the company. A native Estonian, he has previously worked as an Incident Response Analyst, Content Developer, and Security Architect. Marken&apos;s extensive experience in detection and response brings a robust technical perspective.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/16263402-termite-ransomware-qr-code-browser-bypass-captcha-hijacking.mp3" length="28309417" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16263402</guid>
    <pubDate>Wed, 11 Dec 2024 15:00:00 -0500</pubDate>
    <itunes:duration>2351</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>BootKitty Unleashed, Word Corruption Campaigns, M&amp;A Cyber Threats</itunes:title>
    <title>BootKitty Unleashed, Word Corruption Campaigns, M&amp;A Cyber Threats</title>
    <itunes:summary><![CDATA[Resources: https://linktr.ee/RQShadowTalk  Join hosts Chris and Kim, and Threat Hunter Brian Kelly as they discuss:  BootKitty Linux BootkitLockBit Arrest in RussiaNovel Phishing Campaign Corrupts WordCyber Threats During M&amp;AKim Bromley: Kim Bromley is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of expe...]]></itunes:summary>
    <description><![CDATA[<p><b>Resources: </b><a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a><br/><br/>Join hosts Chris and Kim, and Threat Hunter Brian Kelly as they discuss:</p><ul><li> BootKitty Linux Bootkit</li><li>LockBit Arrest in Russia</li><li>Novel Phishing Campaign Corrupts Word</li><li>Cyber Threats During M&amp;A</li></ul><p><b>Kim Bromley</b>: Kim Bromley is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights for ShadowTalk.  </p><p><b>Chris Morgan</b>: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes.<br/><br/><b>Brian Kelly</b>: Brian Kelly is an experienced Threat Hunter and Intrusion Response Operator with a deep understanding of adversary tactics, techniques, procedures (TTPs), and motivations. Beginning his career in IT, Brian swiftly transitioned into cybersecurity, where he actively hunts for threats within organizations and responds to ongoing incidents. His expertise in adversary emulation and TTP exploration empowers him to anticipate and counteract malicious activities. Positioned on the front lines, Brian offers invaluable and actionable insights on the current threat landscape for ShadowTalk. </p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>Resources: </b><a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a><br/><br/>Join hosts Chris and Kim, and Threat Hunter Brian Kelly as they discuss:</p><ul><li> BootKitty Linux Bootkit</li><li>LockBit Arrest in Russia</li><li>Novel Phishing Campaign Corrupts Word</li><li>Cyber Threats During M&amp;A</li></ul><p><b>Kim Bromley</b>: Kim Bromley is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights for ShadowTalk.  </p><p><b>Chris Morgan</b>: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes.<br/><br/><b>Brian Kelly</b>: Brian Kelly is an experienced Threat Hunter and Intrusion Response Operator with a deep understanding of adversary tactics, techniques, procedures (TTPs), and motivations. Beginning his career in IT, Brian swiftly transitioned into cybersecurity, where he actively hunts for threats within organizations and responds to ongoing incidents. His expertise in adversary emulation and TTP exploration empowers him to anticipate and counteract malicious activities. Positioned on the front lines, Brian offers invaluable and actionable insights on the current threat landscape for ShadowTalk. </p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/16222374-bootkitty-unleashed-word-corruption-campaigns-m-a-cyber-threats.mp3" length="22090137" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16222374</guid>
    <pubDate>Wed, 04 Dec 2024 13:00:00 -0500</pubDate>
    <itunes:duration>1834</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Guest Episode: Can Someone Non-Technical Be a CISO? New APT28 &amp; Palo Alto Exploits</itunes:title>
    <title>Guest Episode: Can Someone Non-Technical Be a CISO? New APT28 &amp; Palo Alto Exploits</title>
    <itunes:summary><![CDATA[Join hosts Chris and Kim, and guest CISO Chris Gunner, as they discuss: APT28 conduct 'Nearest Neighbor' WiFi AttackWindows Reissue Controversial Recall Feature Update on Palo Alto Critical Vulnerability ExploitationNavigating potential obstacles as a new CISOResources: https://linktr.ee/RQShadowTalk Chris Gunner: Group CISO at a global financial service firm, comprised of federated business units across 20 countries. Chris is responsible for Group-wide cyber strategy as well as adv...]]></itunes:summary>
    <description><![CDATA[<p>Join hosts Chris and Kim, and guest CISO Chris Gunner, as they discuss:</p><ul><li>APT28 conduct &apos;Nearest Neighbor&apos; WiFi Attack</li><li>Windows Reissue Controversial Recall Feature </li><li>Update on Palo Alto Critical Vulnerability Exploitation</li><li>Navigating potential obstacles as a new CISO</li></ul><p><b>Resources: </b><a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></p><p><b>Chris Gunner:</b> Group CISO at a global financial service firm, comprised of federated business units across 20 countries. Chris is responsible for Group-wide cyber strategy as well as advising the business in the Group. Previously held roles as a security leader in law firms, as well as varied roles in consulting. Passionate that cyber security is a business enabler, where it can drive better business decisions, as well as protecting organizations and their customers.<br/><br/><b>Chris Morgan</b>: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes. <br/><br/><b>Kim Bromley</b>: Kim Bromley is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights for ShadowTalk. </p>]]></description>
    <content:encoded><![CDATA[<p>Join hosts Chris and Kim, and guest CISO Chris Gunner, as they discuss:</p><ul><li>APT28 conduct &apos;Nearest Neighbor&apos; WiFi Attack</li><li>Windows Reissue Controversial Recall Feature </li><li>Update on Palo Alto Critical Vulnerability Exploitation</li><li>Navigating potential obstacles as a new CISO</li></ul><p><b>Resources: </b><a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></p><p><b>Chris Gunner:</b> Group CISO at a global financial service firm, comprised of federated business units across 20 countries. Chris is responsible for Group-wide cyber strategy as well as advising the business in the Group. Previously held roles as a security leader in law firms, as well as varied roles in consulting. Passionate that cyber security is a business enabler, where it can drive better business decisions, as well as protecting organizations and their customers.<br/><br/><b>Chris Morgan</b>: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes. <br/><br/><b>Kim Bromley</b>: Kim Bromley is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights for ShadowTalk. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/16179928-guest-episode-can-someone-non-technical-be-a-ciso-new-apt28-palo-alto-exploits.mp3" length="29056563" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16179928</guid>
    <pubDate>Wed, 27 Nov 2024 12:00:00 -0500</pubDate>
    <itunes:duration>2410</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Black Friday Retail Risks, T-Mobile Troubles, AI Deceptions</itunes:title>
    <title>Black Friday Retail Risks, T-Mobile Troubles, AI Deceptions</title>
    <itunes:summary><![CDATA[Join hosts Chris and Kim, Field CISO Rick Holland, and Detection Researcher Corey Carter as they discuss: Black Friday: Cyber Threats Facing the Retail SectorT-Mobile Breached AgainAttacks Exploiting PAN-OS Zero-DayFake AI Image Generators Deploy InfostealersResources: https://linktr.ee/RQShadowTalkKim Bromley: Kim Bromley is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, a...]]></itunes:summary>
    <description><![CDATA[<p>Join hosts Chris and Kim, Field CISO Rick Holland, and Detection Researcher Corey Carter as they discuss:</p><ul><li>Black Friday: Cyber Threats Facing the Retail Sector</li><li>T-Mobile Breached Again</li><li>Attacks Exploiting PAN-OS Zero-Day</li><li>Fake AI Image Generators Deploy Infostealers</li></ul><p><b>Resources:</b></p><ul><li><a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></li></ul><p><b>Kim Bromley</b>: Kim Bromley is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights for ShadowTalk.  </p><p><b>Chris Morgan</b>: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes. <br/><br/><b>Rick Holland</b>: Rick Holland is one of ReliaQuest’s Chief Information Security Officers. A seasoned cybersecurity executive, practitioner, and former Forrester Research industry analyst, Rick is also a U.S. Army intelligence veteran. He regularly speaks at leading security conferences, including SANS, RSAC, and BSides. Rick&apos;s extensive expertise and industry insights make him an invaluable contributor on ShadowTalk. <br/><br/><b>Corey Carter</b>: Corey Carter is a Detection Researcher at ReliaQuest. A Florida native and former infantryman in the United States Marines, Corey holds a bachelor&apos;s degree in computer science with a specialization in information assurance. His experience as a Security Analyst and Threat Hunter at ReliaQuest, combined with his military background, equips him with a unique perspective on cybersecurity challenges. </p>]]></description>
    <content:encoded><![CDATA[<p>Join hosts Chris and Kim, Field CISO Rick Holland, and Detection Researcher Corey Carter as they discuss:</p><ul><li>Black Friday: Cyber Threats Facing the Retail Sector</li><li>T-Mobile Breached Again</li><li>Attacks Exploiting PAN-OS Zero-Day</li><li>Fake AI Image Generators Deploy Infostealers</li></ul><p><b>Resources:</b></p><ul><li><a href='https://linktr.ee/RQShadowTalk'>https://linktr.ee/RQShadowTalk</a></li></ul><p><b>Kim Bromley</b>: Kim Bromley is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights for ShadowTalk.  </p><p><b>Chris Morgan</b>: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes. <br/><br/><b>Rick Holland</b>: Rick Holland is one of ReliaQuest’s Chief Information Security Officers. A seasoned cybersecurity executive, practitioner, and former Forrester Research industry analyst, Rick is also a U.S. Army intelligence veteran. He regularly speaks at leading security conferences, including SANS, RSAC, and BSides. Rick&apos;s extensive expertise and industry insights make him an invaluable contributor on ShadowTalk. <br/><br/><b>Corey Carter</b>: Corey Carter is a Detection Researcher at ReliaQuest. A Florida native and former infantryman in the United States Marines, Corey holds a bachelor&apos;s degree in computer science with a specialization in information assurance. His experience as a Security Analyst and Threat Hunter at ReliaQuest, combined with his military background, equips him with a unique perspective on cybersecurity challenges. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/16142446-black-friday-retail-risks-t-mobile-troubles-ai-deceptions.mp3" length="23859055" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16142446</guid>
    <pubDate>Wed, 20 Nov 2024 14:00:00 -0500</pubDate>
    <itunes:duration>1980</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>2025 Cyber Threat Predictions, MOVEit Data Breach, Volt Typhoon Rebuilds</itunes:title>
    <title>2025 Cyber Threat Predictions, MOVEit Data Breach, Volt Typhoon Rebuilds</title>
    <itunes:summary><![CDATA[Join hosts Chris, Kim and Anna as they discuss: ReliaQuest's Cyber Threat Predictions for 2025Huge Data Leak Linked to 2023 MOVEit FlawNew Ransomware Partners with RustyStealerVolt Typhoon Rebuilds Dismantled BotnetResources: https://www.reliaquest.com/blog/report-shows-ransomware-has-grown-41-for-construction-industry/https://www.reliaquest.com/blog/service-account-abuse/Chris Morgan: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has be...]]></itunes:summary>
    <description><![CDATA[<p>Join hosts Chris, Kim and Anna as they discuss:</p><ul><li>ReliaQuest&apos;s Cyber Threat Predictions for 2025</li><li>Huge Data Leak Linked to 2023 MOVEit Flaw</li><li>New Ransomware Partners with RustyStealer</li><li>Volt Typhoon Rebuilds Dismantled Botnet</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/report-shows-ransomware-has-grown-41-for-construction-industry/'>https://www.reliaquest.com/blog/report-shows-ransomware-has-grown-41-for-construction-industry/</a></li><li><a href='https://www.reliaquest.com/blog/service-account-abuse/'>https://www.reliaquest.com/blog/service-account-abuse/</a></li></ul><p><b>Chris Morgan</b>: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes.<br/><br/><b>Kim Bromley</b>: Kim Bromley is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights for ShadowTalk.<br/><br/><b>Anna Jones</b>: Anna is a Cyber Threat Intelligence Analyst at ReliaQuest, based in our London office. She joined in June 2023 and specializes in OSINT investigations, with 5 years of experience in threat intelligence. Anna&apos;s expertise in sourcing and analyzing covert threat data provides unique insights into cybercriminal activities for ShadowTalk. </p>]]></description>
    <content:encoded><![CDATA[<p>Join hosts Chris, Kim and Anna as they discuss:</p><ul><li>ReliaQuest&apos;s Cyber Threat Predictions for 2025</li><li>Huge Data Leak Linked to 2023 MOVEit Flaw</li><li>New Ransomware Partners with RustyStealer</li><li>Volt Typhoon Rebuilds Dismantled Botnet</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/report-shows-ransomware-has-grown-41-for-construction-industry/'>https://www.reliaquest.com/blog/report-shows-ransomware-has-grown-41-for-construction-industry/</a></li><li><a href='https://www.reliaquest.com/blog/service-account-abuse/'>https://www.reliaquest.com/blog/service-account-abuse/</a></li></ul><p><b>Chris Morgan</b>: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes.<br/><br/><b>Kim Bromley</b>: Kim Bromley is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights for ShadowTalk.<br/><br/><b>Anna Jones</b>: Anna is a Cyber Threat Intelligence Analyst at ReliaQuest, based in our London office. She joined in June 2023 and specializes in OSINT investigations, with 5 years of experience in threat intelligence. Anna&apos;s expertise in sourcing and analyzing covert threat data provides unique insights into cybercriminal activities for ShadowTalk. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/16099501-2025-cyber-threat-predictions-moveit-data-breach-volt-typhoon-rebuilds.mp3" length="25390943" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16099501</guid>
    <pubDate>Wed, 13 Nov 2024 11:00:00 -0500</pubDate>
    <itunes:duration>2108</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Credential Theft, LastPass Social Engineering, Interlock Ransomware</itunes:title>
    <title>Credential Theft, LastPass Social Engineering, Interlock Ransomware</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, hosts Chris and Kim are joined by Senior Threat Intelligence Analyst Ivan Righi, to discuss the latest news in cybersecurity and threat research. Topics this week include: ReliaQuest research exploring credential theft and misuseSocial engineering campaign targets LastPass usersPatch now: Sharepoint vulnerability exploited in the wildNew Interlock ransomware group targeting FreeBSD OSResources: https://www.reliaquest.com/blog/the-credential-abuse-cycle-theft-tra...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, hosts Chris and Kim are joined by Senior Threat Intelligence Analyst Ivan Righi, to discuss the latest news in cybersecurity and threat research. Topics this week include:</p><ul><li>ReliaQuest research exploring credential theft and misuse</li><li>Social engineering campaign targets LastPass users</li><li>Patch now: Sharepoint vulnerability exploited in the wild</li><li>New Interlock ransomware group targeting FreeBSD OS</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/the-credential-abuse-cycle-theft-trade-and-exploitation/'>https://www.reliaquest.com/blog/the-credential-abuse-cycle-theft-trade-and-exploitation/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, hosts Chris and Kim are joined by Senior Threat Intelligence Analyst Ivan Righi, to discuss the latest news in cybersecurity and threat research. Topics this week include:</p><ul><li>ReliaQuest research exploring credential theft and misuse</li><li>Social engineering campaign targets LastPass users</li><li>Patch now: Sharepoint vulnerability exploited in the wild</li><li>New Interlock ransomware group targeting FreeBSD OS</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/the-credential-abuse-cycle-theft-trade-and-exploitation/'>https://www.reliaquest.com/blog/the-credential-abuse-cycle-theft-trade-and-exploitation/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/16059289-credential-theft-lastpass-social-engineering-interlock-ransomware.mp3" length="23090063" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16059289</guid>
    <pubDate>Wed, 06 Nov 2024 11:00:00 -0500</pubDate>
    <itunes:duration>1915</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Guest Episode: Black Basta&#39;s TTP Shift, Diversity, Equity, and Inclusion (DEI) In Cyber Security</itunes:title>
    <title>Guest Episode: Black Basta&#39;s TTP Shift, Diversity, Equity, and Inclusion (DEI) In Cyber Security</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, hosts Kim and Chris are joined by guest speaker Eric Knopp, to discuss the latest news in cybersecurity and threat research. Topics this week include: ReliaQuest research identifies Black Basta TTP changesAmazon seize APT29 domainsTango down: Redline &amp; Meta Infostealers taken down by Dutch policeThe importance of supporting DEI programs in hiring practicesResources: https://www.reliaquest.com/blog/black-basta-social-engineering-technique-microsoft-teams/http...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, hosts Kim and Chris are joined by guest speaker Eric Knopp, to discuss the latest news in cybersecurity and threat research. Topics this week include:</p><ul><li>ReliaQuest research identifies Black Basta TTP changes</li><li>Amazon seize APT29 domains</li><li>Tango down: Redline &amp; Meta Infostealers taken down by Dutch police</li><li>The importance of supporting DEI programs in hiring practices</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/black-basta-social-engineering-technique-microsoft-teams/'>https://www.reliaquest.com/blog/black-basta-social-engineering-technique-microsoft-teams/</a></li><li><a href='https://www.reliaquest.com/blog/5-critical-threat-actors-you-need-to-know-about/'>https://www.reliaquest.com/blog/5-critical-threat-actors-you-need-to-know-about/</a></li></ul><p><b>Eric Knopp</b>: VP Security Operations for one of ReliaQuest’s customers, a large global financial services company. Eric has been in the IT industry for almost 30 years, with the past 11 in IT Security. He also has a passion for diversity, equity and inclusion, co-leading the DEI Committee in London. He also supports the cyber apprenticeship program in the UK.<br/><br/><b>Kim Bromley</b>: Kim Bromley is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights for ShadowTalk.<br/><br/><b>Chris Morgan</b>: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes. </p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, hosts Kim and Chris are joined by guest speaker Eric Knopp, to discuss the latest news in cybersecurity and threat research. Topics this week include:</p><ul><li>ReliaQuest research identifies Black Basta TTP changes</li><li>Amazon seize APT29 domains</li><li>Tango down: Redline &amp; Meta Infostealers taken down by Dutch police</li><li>The importance of supporting DEI programs in hiring practices</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/black-basta-social-engineering-technique-microsoft-teams/'>https://www.reliaquest.com/blog/black-basta-social-engineering-technique-microsoft-teams/</a></li><li><a href='https://www.reliaquest.com/blog/5-critical-threat-actors-you-need-to-know-about/'>https://www.reliaquest.com/blog/5-critical-threat-actors-you-need-to-know-about/</a></li></ul><p><b>Eric Knopp</b>: VP Security Operations for one of ReliaQuest’s customers, a large global financial services company. Eric has been in the IT industry for almost 30 years, with the past 11 in IT Security. He also has a passion for diversity, equity and inclusion, co-leading the DEI Committee in London. He also supports the cyber apprenticeship program in the UK.<br/><br/><b>Kim Bromley</b>: Kim Bromley is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights for ShadowTalk.<br/><br/><b>Chris Morgan</b>: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/16020148-guest-episode-black-basta-s-ttp-shift-diversity-equity-and-inclusion-dei-in-cyber-security.mp3" length="31585859" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16020148</guid>
    <pubDate>Wed, 30 Oct 2024 14:00:00 -0400</pubDate>
    <itunes:duration>2621</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Scattered Spider x RansomHub, Anonymous Sudan Unmasked, APT41 Gamble</itunes:title>
    <title>Scattered Spider x RansomHub, Anonymous Sudan Unmasked, APT41 Gamble</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Kim is joined by Director of Threat Research Brandon Tirado and Threat Hunter Brian Kelly, to discuss the latest news in cybersecurity and threat research. Topics this week include: Scattered Spider x RansomHub: A New PartnershipUS Authorities Indict Anonymous Sudan LeadersCrypt Ghouls Deploys LockBit on Russian OrganizationsAPT41 Targets Gambling and Gaming Industry in New Financially-Motivated Campaign  Resources: https://www.reliaquest.com/resources...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Kim is joined by Director of Threat Research Brandon Tirado and Threat Hunter Brian Kelly, to discuss the latest news in cybersecurity and threat research. Topics this week include:</p><ul><li>Scattered Spider x RansomHub: A New Partnership</li><li>US Authorities Indict Anonymous Sudan Leaders</li><li>Crypt Ghouls Deploys LockBit on Russian Organizations</li><li>APT41 Targets Gambling and Gaming Industry in New Financially-Motivated Campaign  </li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/resources/research-reports/five-ways-cyber-attackers-exploit-cloud-environments/'>https://www.reliaquest.com/resources/research-reports/five-ways-cyber-attackers-exploit-cloud-environments/</a></li><li><a href='https://www.reliaquest.com/blog/virtual-machines-defense-evasion/'>https://www.reliaquest.com/blog/virtual-machines-defense-evasion/</a></li></ul><p><b>Kim Bromley</b>: Kim Bromley is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights for ShadowTalk.<br/><br/><b>Brandon Tirado</b>: Brandon Tirado is the Director of Threat Research for ReliaQuest. Brandon is a skilled cyber defense professional with a unique combination of management and hands-on experience. With a deep understanding of adversary motives and the tactics, techniques, and procedures (TTPs) they use to achieve their goals, Brandon enjoys operationalizing his knowledge to make it more difficult for adversaries to operate within the environments of ReliaQuest customers. His managerial and hands-on experience enriches ShadowTalk with practical and strategic viewpoints. <br/><br/><b>Brian Kelly</b>: Brian Kelly is an experienced Threat Hunter and Intrusion Response Operator with a deep understanding of adversary tactics, techniques, procedures (TTPs), and motivations. Beginning his career in IT, Brian swiftly transitioned into cybersecurity, where he actively hunts for threats within organizations and responds to ongoing incidents. His expertise in adversary emulation and TTP exploration empowers him to anticipate and counteract malicious activities. Positioned on the front lines, Brian offers invaluable and actionable insights on the current threat landscape for ShadowTalk.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Kim is joined by Director of Threat Research Brandon Tirado and Threat Hunter Brian Kelly, to discuss the latest news in cybersecurity and threat research. Topics this week include:</p><ul><li>Scattered Spider x RansomHub: A New Partnership</li><li>US Authorities Indict Anonymous Sudan Leaders</li><li>Crypt Ghouls Deploys LockBit on Russian Organizations</li><li>APT41 Targets Gambling and Gaming Industry in New Financially-Motivated Campaign  </li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/resources/research-reports/five-ways-cyber-attackers-exploit-cloud-environments/'>https://www.reliaquest.com/resources/research-reports/five-ways-cyber-attackers-exploit-cloud-environments/</a></li><li><a href='https://www.reliaquest.com/blog/virtual-machines-defense-evasion/'>https://www.reliaquest.com/blog/virtual-machines-defense-evasion/</a></li></ul><p><b>Kim Bromley</b>: Kim Bromley is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights for ShadowTalk.<br/><br/><b>Brandon Tirado</b>: Brandon Tirado is the Director of Threat Research for ReliaQuest. Brandon is a skilled cyber defense professional with a unique combination of management and hands-on experience. With a deep understanding of adversary motives and the tactics, techniques, and procedures (TTPs) they use to achieve their goals, Brandon enjoys operationalizing his knowledge to make it more difficult for adversaries to operate within the environments of ReliaQuest customers. His managerial and hands-on experience enriches ShadowTalk with practical and strategic viewpoints. <br/><br/><b>Brian Kelly</b>: Brian Kelly is an experienced Threat Hunter and Intrusion Response Operator with a deep understanding of adversary tactics, techniques, procedures (TTPs), and motivations. Beginning his career in IT, Brian swiftly transitioned into cybersecurity, where he actively hunts for threats within organizations and responds to ongoing incidents. His expertise in adversary emulation and TTP exploration empowers him to anticipate and counteract malicious activities. Positioned on the front lines, Brian offers invaluable and actionable insights on the current threat landscape for ShadowTalk.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15977056-scattered-spider-x-ransomhub-anonymous-sudan-unmasked-apt41-gamble.mp3" length="22001289" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15977056</guid>
    <pubDate>Wed, 23 Oct 2024 12:00:00 -0400</pubDate>
    <itunes:duration>1825</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ransomware in Q3 2024, Cisco Breached, ChatGPT Misuse</itunes:title>
    <title>Ransomware in Q3 2024, Cisco Breached, ChatGPT Misuse</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris and Kim are joined by Detection researcher Corey Carter, to discuss the latest news in cybersecurity and threat research. Topics this week include: ReliaQuest reporting on ransomware activity in Q3 2024OpenAI confirm malicious use of ChatGPTRussian APT29 mass exploiting known vulnerabilitiesCISCO data reportedly breached by IntelBrokerResources: https://media.defense.gov/2024/Oct/09/2003562611/-1/-1/0/CSA-UPDATE-ON-SVR-CYBER-OPS.PDFhttps://www.reliaqu...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris and Kim are joined by Detection researcher Corey Carter, to discuss the latest news in cybersecurity and threat research. Topics this week include:</p><ul><li>ReliaQuest reporting on ransomware activity in Q3 2024</li><li>OpenAI confirm malicious use of ChatGPT</li><li>Russian APT29 mass exploiting known vulnerabilities</li><li>CISCO data reportedly breached by IntelBroker</li></ul><p><b>Resources:</b></p><ul><li><a href='https://media.defense.gov/2024/Oct/09/2003562611/-1/-1/0/CSA-UPDATE-ON-SVR-CYBER-OPS.PDF'>https://media.defense.gov/2024/Oct/09/2003562611/-1/-1/0/CSA-UPDATE-ON-SVR-CYBER-OPS.PDF</a></li><li><a href='https://www.reliaquest.com/blog/q3-2024-ransomware/'>https://www.reliaquest.com/blog/q3-2024-ransomware/</a></li></ul><p><b>Chris Morgan</b>: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes. <br/><br/><b>Kim Bromley</b>: Kim Bromley is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights for ShadowTalk.<br/><br/><b>Corey Carter</b>: Corey Carter is a Detection Researcher at ReliaQuest. A Florida native and former infantryman in the United States Marines, Corey holds a bachelor&apos;s degree in computer science with a specialization in information assurance. His experience as a Security Analyst and Threat Hunter at ReliaQuest, combined with his military background, equips him with a unique perspective on cybersecurity challenges. </p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris and Kim are joined by Detection researcher Corey Carter, to discuss the latest news in cybersecurity and threat research. Topics this week include:</p><ul><li>ReliaQuest reporting on ransomware activity in Q3 2024</li><li>OpenAI confirm malicious use of ChatGPT</li><li>Russian APT29 mass exploiting known vulnerabilities</li><li>CISCO data reportedly breached by IntelBroker</li></ul><p><b>Resources:</b></p><ul><li><a href='https://media.defense.gov/2024/Oct/09/2003562611/-1/-1/0/CSA-UPDATE-ON-SVR-CYBER-OPS.PDF'>https://media.defense.gov/2024/Oct/09/2003562611/-1/-1/0/CSA-UPDATE-ON-SVR-CYBER-OPS.PDF</a></li><li><a href='https://www.reliaquest.com/blog/q3-2024-ransomware/'>https://www.reliaquest.com/blog/q3-2024-ransomware/</a></li></ul><p><b>Chris Morgan</b>: Chris Morgan is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team and has been the host of ShadowTalk since 2021. Chris joined ReliaQuest in August 2020, previously working as a Cyber Threat Intelligence analyst in the telecommunications and financial sectors. Chris also has a background in the British military. With his diverse background, he  enhances ShadowTalk with deep insights into various threat landscapes. <br/><br/><b>Kim Bromley</b>: Kim Bromley is a Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024.  Kim brings a wealth of experience in threat intelligence and law enforcement tactics, providing unique insights for ShadowTalk.<br/><br/><b>Corey Carter</b>: Corey Carter is a Detection Researcher at ReliaQuest. A Florida native and former infantryman in the United States Marines, Corey holds a bachelor&apos;s degree in computer science with a specialization in information assurance. His experience as a Security Analyst and Threat Hunter at ReliaQuest, combined with his military background, equips him with a unique perspective on cybersecurity challenges. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15937103-ransomware-in-q3-2024-cisco-breached-chatgpt-misuse.mp3" length="21543839" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15937103</guid>
    <pubDate>Wed, 16 Oct 2024 12:00:00 -0400</pubDate>
    <itunes:duration>1787</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Healthcare Cyber Threat, Salt Typhoon Compromises US Telecoms, Gorilla Botnet DDoS Campaigns</itunes:title>
    <title>Healthcare Cyber Threat, Salt Typhoon Compromises US Telecoms, Gorilla Botnet DDoS Campaigns</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris and Kim are joined by detection researcher, Marken, to discuss the latest news in cybersecurity and threat research. Topics this week include: Cyber Threats Facing the Health Care and Social Assistance SectorSalt Typhoon Compromises US-based Telecoms Companies Microsoft and US DoJ Takedown Star Blizzard InfrastructureGorilla Botnet Conducts Large-Scale DDoS CampaignResources: https://www.reliaquest.com/blog/threats-health-care-social-assistance-l...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris and Kim are joined by detection researcher, Marken, to discuss the latest news in cybersecurity and threat research. Topics this week include:</p><ul><li>Cyber Threats Facing the Health Care and Social Assistance Sector</li><li>Salt Typhoon Compromises US-based Telecoms Companies </li><li>Microsoft and US DoJ Takedown Star Blizzard Infrastructure</li><li>Gorilla Botnet Conducts Large-Scale DDoS Campaign</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/threats-health-care-social-assistance-landscape/'>https://www.reliaquest.com/blog/threats-health-care-social-assistance-landscape/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris and Kim are joined by detection researcher, Marken, to discuss the latest news in cybersecurity and threat research. Topics this week include:</p><ul><li>Cyber Threats Facing the Health Care and Social Assistance Sector</li><li>Salt Typhoon Compromises US-based Telecoms Companies </li><li>Microsoft and US DoJ Takedown Star Blizzard Infrastructure</li><li>Gorilla Botnet Conducts Large-Scale DDoS Campaign</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/threats-health-care-social-assistance-landscape/'>https://www.reliaquest.com/blog/threats-health-care-social-assistance-landscape/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15898160-healthcare-cyber-threat-salt-typhoon-compromises-us-telecoms-gorilla-botnet-ddos-campaigns.mp3" length="24779970" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15898160</guid>
    <pubDate>Wed, 09 Oct 2024 12:00:00 -0400</pubDate>
    <itunes:duration>2058</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Guest Episode: Importance of Cyber Insurance, Embargo Ransomware Target Cloud, Influence Ops Target US Election</itunes:title>
    <title>Guest Episode: Importance of Cyber Insurance, Embargo Ransomware Target Cloud, Influence Ops Target US Election</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris and Kim are joined by guest Samantha Billy, AON U.S Broking Growth Leader, to discuss the latest news in cybersecurity and threat research. Topics this week include: The Critical Role of Cyber Insurance in Mitigating Cyber RiskEmbargo Ransomware Targeting CloudIranian Threat Actors Conducting Influence Ops Against US ElectionsNational Crime Agency Tease Lockbit UpdateResources: https://www.reliaquest.com/blog/2024-us-election-top-cyber-threats-organiz...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris and Kim are joined by guest Samantha Billy, AON U.S Broking Growth Leader, to discuss the latest news in cybersecurity and threat research. Topics this week include:</p><ul><li>The Critical Role of Cyber Insurance in Mitigating Cyber Risk</li><li>Embargo Ransomware Targeting Cloud</li><li>Iranian Threat Actors Conducting Influence Ops Against US Elections</li><li>National Crime Agency Tease Lockbit Update</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/2024-us-election-top-cyber-threats-organizational-impacts/'>https://www.reliaquest.com/blog/2024-us-election-top-cyber-threats-organizational-impacts/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris and Kim are joined by guest Samantha Billy, AON U.S Broking Growth Leader, to discuss the latest news in cybersecurity and threat research. Topics this week include:</p><ul><li>The Critical Role of Cyber Insurance in Mitigating Cyber Risk</li><li>Embargo Ransomware Targeting Cloud</li><li>Iranian Threat Actors Conducting Influence Ops Against US Elections</li><li>National Crime Agency Tease Lockbit Update</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/2024-us-election-top-cyber-threats-organizational-impacts/'>https://www.reliaquest.com/blog/2024-us-election-top-cyber-threats-organizational-impacts/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15860725-guest-episode-importance-of-cyber-insurance-embargo-ransomware-target-cloud-influence-ops-target-us-election.mp3" length="25899023" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15860725</guid>
    <pubDate>Wed, 02 Oct 2024 23:00:00 -0400</pubDate>
    <itunes:duration>2151</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Telegram&#39;s Pivot, Kaspersky&#39;s Surprise, Remediating Data Exfiltration Attacks</itunes:title>
    <title>Telegram&#39;s Pivot, Kaspersky&#39;s Surprise, Remediating Data Exfiltration Attacks</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris and Kim, along with Threat Hunter Brian, discuss the latest news in cybersecurity and threat research. Topics this week include: Telegram Pivot 180: Agree to Share IP and Phone Data on Legal RequestsKaspersky Auto-Replace Software with UltraAV AntivirusDell Investigate Two Data BreachesReliaQuest Data Exfiltration Case Study]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris and Kim, along with Threat Hunter Brian, discuss the latest news in cybersecurity and threat research. Topics this week include:</p><ul><li>Telegram Pivot 180: Agree to Share IP and Phone Data on Legal Requests</li><li>Kaspersky Auto-Replace Software with UltraAV Antivirus</li><li>Dell Investigate Two Data Breaches</li><li>ReliaQuest Data Exfiltration Case Study</li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris and Kim, along with Threat Hunter Brian, discuss the latest news in cybersecurity and threat research. Topics this week include:</p><ul><li>Telegram Pivot 180: Agree to Share IP and Phone Data on Legal Requests</li><li>Kaspersky Auto-Replace Software with UltraAV Antivirus</li><li>Dell Investigate Two Data Breaches</li><li>ReliaQuest Data Exfiltration Case Study</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15814274-telegram-s-pivot-kaspersky-s-surprise-remediating-data-exfiltration-attacks.mp3" length="21696784" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15814274</guid>
    <pubDate>Wed, 25 Sep 2024 11:00:00 -0400</pubDate>
    <itunes:duration>1800</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Fortinet Breach, Malware Locks Users in &quot;Kiosk&quot; Mode, Insider Threat Case Studies</itunes:title>
    <title>Fortinet Breach, Malware Locks Users in &quot;Kiosk&quot; Mode, Insider Threat Case Studies</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Corey and Anna, discuss the latest news in cyber security and threat research. Topics this week include: Threat actors express difficulty in retrieving stolen Fortinet dataAmadey malware's novel approach: Users locked in Kiosk Mode Aftermath of incident affecting Transport for London (TFL)ReliaQuest Response to Insider Threat CasesResources: https://www.reliaquest.com/blog/common-infostealers/]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Corey and Anna, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Threat actors express difficulty in retrieving stolen Fortinet data</li><li>Amadey malware&apos;s novel approach: Users locked in Kiosk Mode </li><li>Aftermath of incident affecting Transport for London (TFL)</li><li>ReliaQuest Response to Insider Threat Cases</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/common-infostealers/'>https://www.reliaquest.com/blog/common-infostealers/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Corey and Anna, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Threat actors express difficulty in retrieving stolen Fortinet data</li><li>Amadey malware&apos;s novel approach: Users locked in Kiosk Mode </li><li>Aftermath of incident affecting Transport for London (TFL)</li><li>ReliaQuest Response to Insider Threat Cases</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/common-infostealers/'>https://www.reliaquest.com/blog/common-infostealers/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15774977-fortinet-breach-malware-locks-users-in-kiosk-mode-insider-threat-case-studies.mp3" length="23489314" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15774977</guid>
    <pubDate>Wed, 18 Sep 2024 11:00:00 -0400</pubDate>
    <itunes:duration>1950</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>GRU Orchestrate Sabotage and Assassination, Sextortion Scams, Inc. Ransom&#39;s Novel Attack</itunes:title>
    <title>GRU Orchestrate Sabotage and Assassination, Sextortion Scams, Inc. Ransom&#39;s Novel Attack</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris Morgan, along with Marken Teder, discuss the latest news in cyber security and threat research. Topics this week include: Russia's Military Intelligence target CNI, identified using "Non-Lethal Acoustic Weapons" New Sextortion scam targets spousesPrivacy concerns with smart automobilesReliaQuest research into "Inc Ransom" Data Extortion Attack Resources: https://www.reliaquest.com/blog/inc-ransom-attack-analysis/   ]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris Morgan, along with Marken Teder, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Russia&apos;s Military Intelligence target CNI, identified using &quot;Non-Lethal Acoustic Weapons&quot; </li><li>New Sextortion scam targets spouses</li><li>Privacy concerns with smart automobiles</li><li>ReliaQuest research into &quot;Inc Ransom&quot; Data Extortion Attack</li></ul><p> Resources:</p><ul><li><a href='https://www.reliaquest.com/blog/inc-ransom-attack-analysis/'>https://www.reliaquest.com/blog/inc-ransom-attack-analysis/ </a></li></ul><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris Morgan, along with Marken Teder, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Russia&apos;s Military Intelligence target CNI, identified using &quot;Non-Lethal Acoustic Weapons&quot; </li><li>New Sextortion scam targets spouses</li><li>Privacy concerns with smart automobiles</li><li>ReliaQuest research into &quot;Inc Ransom&quot; Data Extortion Attack</li></ul><p> Resources:</p><ul><li><a href='https://www.reliaquest.com/blog/inc-ransom-attack-analysis/'>https://www.reliaquest.com/blog/inc-ransom-attack-analysis/ </a></li></ul><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15735729-gru-orchestrate-sabotage-and-assassination-sextortion-scams-inc-ransom-s-novel-attack.mp3" length="26489301" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15735729</guid>
    <pubDate>Wed, 11 Sep 2024 12:00:00 -0400</pubDate>
    <itunes:duration>2203</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Guest Episode: Building Security Teams, Ransomware and Lawsuits, Top Attacker Techniques</itunes:title>
    <title>Guest Episode: Building Security Teams, Ransomware and Lawsuits, Top Attacker Techniques</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, hosts Chris and Kim, along with guest CISO Rob F, discuss the latest news in cyber security and threat research. Topics this week include: City of Columbus Ohio sue security researcher following ransomware breachDutch Data Protection Authority fine AI/Facial recognition companyBuilding security teams and improving your cyber maturityReliaQuest research into top attacker techniquesResources: https://www.reliaquest.com/blog/top-cyber-attacker-techniques/ ]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, hosts Chris and Kim, along with guest CISO Rob F, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>City of Columbus Ohio sue security researcher following ransomware breach</li><li>Dutch Data Protection Authority fine AI/Facial recognition company</li><li>Building security teams and improving your cyber maturity</li><li>ReliaQuest research into top attacker techniques</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/top-cyber-attacker-techniques/'>https://www.reliaquest.com/blog/top-cyber-attacker-techniques/</a> </li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, hosts Chris and Kim, along with guest CISO Rob F, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>City of Columbus Ohio sue security researcher following ransomware breach</li><li>Dutch Data Protection Authority fine AI/Facial recognition company</li><li>Building security teams and improving your cyber maturity</li><li>ReliaQuest research into top attacker techniques</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/top-cyber-attacker-techniques/'>https://www.reliaquest.com/blog/top-cyber-attacker-techniques/</a> </li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15695354-guest-episode-building-security-teams-ransomware-and-lawsuits-top-attacker-techniques.mp3" length="32079832" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15695354</guid>
    <pubDate>Wed, 04 Sep 2024 11:00:00 -0400</pubDate>
    <itunes:duration>2662</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Telegram CEO Arrested, Volt Typhoon, Cybercriminal Forum Insights</itunes:title>
    <title>Telegram CEO Arrested, Volt Typhoon, Cybercriminal Forum Insights</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, hosts Chris and Kim, along with Director of Threat Research Brandon Tirado and Threat Intelligence Analyst Anna, discuss the latest news in cyber security and threat research. Telegram CEO arrested in France over alleged criminal use of the platform Return of Volt Typhoon: China APT exploiting Versa high-severity bug Cybercriminals discuss exploiting physical security gaps to target SMEs]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, hosts Chris and Kim, along with Director of Threat Research Brandon Tirado and Threat Intelligence Analyst Anna, discuss the latest news in cyber security and threat research.</p><ul><li>Telegram CEO arrested in France over alleged criminal use of the platform</li><li> Return of Volt Typhoon: China APT exploiting Versa high-severity bug</li><li> Cybercriminals discuss exploiting physical security gaps to target SMEs</li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, hosts Chris and Kim, along with Director of Threat Research Brandon Tirado and Threat Intelligence Analyst Anna, discuss the latest news in cyber security and threat research.</p><ul><li>Telegram CEO arrested in France over alleged criminal use of the platform</li><li> Return of Volt Typhoon: China APT exploiting Versa high-severity bug</li><li> Cybercriminals discuss exploiting physical security gaps to target SMEs</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15664010-telegram-ceo-arrested-volt-typhoon-cybercriminal-forum-insights.mp3" length="26125319" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15664010</guid>
    <pubDate>Thu, 29 Aug 2024 13:00:00 -0400</pubDate>
    <itunes:duration>2173</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>NPD Breach Latest, Election Disinformation, Service Account Abuse</itunes:title>
    <title>NPD Breach Latest, Election Disinformation, Service Account Abuse</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Kim, along with Corey and Gjergji, discusses the latest news in cyber security and threat research. Topics this week include:   Data breach at NPD affecting millions resulted from exposed credentialsIran-linked APT groups abuse OpenAI to create US-election propagandaReliaQuest Research: Service Account AbuseResources: https://www.reliaquest.com/blog/exploring-impacket-abuse/https://www.reliaquest.com/blog/service-account-abuse/]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Kim, along with Corey and Gjergji, discusses the latest news in cyber security and threat research. Topics this week include:<br/><br/></p><ul><li>Data breach at NPD affecting millions resulted from exposed credentials</li><li>Iran-linked APT groups abuse OpenAI to create US-election propaganda</li><li>ReliaQuest Research: Service Account Abuse</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/exploring-impacket-abuse/'>https://www.reliaquest.com/blog/exploring-impacket-abuse/</a></li><li><a href='https://www.reliaquest.com/blog/service-account-abuse/'>https://www.reliaquest.com/blog/service-account-abuse/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Kim, along with Corey and Gjergji, discusses the latest news in cyber security and threat research. Topics this week include:<br/><br/></p><ul><li>Data breach at NPD affecting millions resulted from exposed credentials</li><li>Iran-linked APT groups abuse OpenAI to create US-election propaganda</li><li>ReliaQuest Research: Service Account Abuse</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/exploring-impacket-abuse/'>https://www.reliaquest.com/blog/exploring-impacket-abuse/</a></li><li><a href='https://www.reliaquest.com/blog/service-account-abuse/'>https://www.reliaquest.com/blog/service-account-abuse/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15618899-npd-breach-latest-election-disinformation-service-account-abuse.mp3" length="25922897" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15618899</guid>
    <pubDate>Wed, 21 Aug 2024 11:00:00 -0400</pubDate>
    <itunes:duration>2153</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Unusual Espionage, Vicious Vulnerabilities, Popular Exfiltration Tools and Malware Loaders</itunes:title>
    <title>Unusual Espionage, Vicious Vulnerabilities, Popular Exfiltration Tools and Malware Loaders</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Kim, along with Marken and Brian, discusses the latest news in cyber security and threat research. Topics this week include: Unusual Espionage: China-linked threat groups target Russian government, IT organizationsVicious Vulnerabilities: New vulnerability in all Windows systems with IPv6, Sonos Speaker flaws allow eavesdroppingReliaQuest Research: Data Exfiltration Tools and Malware LoadersResources: https://www.reliaquest.com/blog/exfiltration-tools https...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Kim, along with Marken and Brian, discusses the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Unusual Espionage: China-linked threat groups target Russian government, IT organizations</li><li>Vicious Vulnerabilities: New vulnerability in all Windows systems with IPv6, Sonos Speaker flaws allow eavesdropping</li><li>ReliaQuest Research: Data Exfiltration Tools and Malware Loaders</li></ul><p><b>Resources:</b></p><p><a href='https://www.reliaquest.com/blog/exfiltration-tools'>https://www.reliaquest.com/blog/exfiltration-tools</a></p><p><a href='https://www.reliaquest.com/blog/common-malware-loaders'>https://www.reliaquest.com/blog/common-malware-loaders</a></p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Kim, along with Marken and Brian, discusses the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Unusual Espionage: China-linked threat groups target Russian government, IT organizations</li><li>Vicious Vulnerabilities: New vulnerability in all Windows systems with IPv6, Sonos Speaker flaws allow eavesdropping</li><li>ReliaQuest Research: Data Exfiltration Tools and Malware Loaders</li></ul><p><b>Resources:</b></p><p><a href='https://www.reliaquest.com/blog/exfiltration-tools'>https://www.reliaquest.com/blog/exfiltration-tools</a></p><p><a href='https://www.reliaquest.com/blog/common-malware-loaders'>https://www.reliaquest.com/blog/common-malware-loaders</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15583922-unusual-espionage-vicious-vulnerabilities-popular-exfiltration-tools-and-malware-loaders.mp3" length="23249440" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15583922</guid>
    <pubDate>Wed, 14 Aug 2024 14:00:00 -0400</pubDate>
    <itunes:duration>1930</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: LIVE from BlackHat 2024, Unauthorized RMM Useage, DEF CON 32 Preview</itunes:title>
    <title>Special: LIVE from BlackHat 2024, Unauthorized RMM Useage, DEF CON 32 Preview</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Rick Holland is joined by ReliaQuest Lead Threat Hunter Colin Ferris LIVE on the BlackHat show floor in Las Vegas to discuss: Takeaways from BlackHat CISO SummitReliaQuest presentation on Remote Monitoring &amp; Management (RMM) toolsThings to look forward to at DEF CON 32]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Rick Holland is joined by ReliaQuest Lead Threat Hunter Colin Ferris LIVE on the BlackHat show floor in Las Vegas to discuss:</p><ul><li>Takeaways from BlackHat CISO Summit</li><li>ReliaQuest presentation on Remote Monitoring &amp; Management (RMM) tools</li><li>Things to look forward to at DEF CON 32</li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Rick Holland is joined by ReliaQuest Lead Threat Hunter Colin Ferris LIVE on the BlackHat show floor in Las Vegas to discuss:</p><ul><li>Takeaways from BlackHat CISO Summit</li><li>ReliaQuest presentation on Remote Monitoring &amp; Management (RMM) tools</li><li>Things to look forward to at DEF CON 32</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15553243-special-live-from-blackhat-2024-unauthorized-rmm-useage-def-con-32-preview.mp3" length="19425403" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15553243</guid>
    <pubDate>Thu, 08 Aug 2024 16:00:00 -0400</pubDate>
    <itunes:duration>1613</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Deepfakes-The New Frontier in Deception, Ransomware Roundup, Threats Bypassing Your EDR</itunes:title>
    <title>Deepfakes-The New Frontier in Deception, Ransomware Roundup, Threats Bypassing Your EDR</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, hosts Chris and Kim, along with Ivan Righi, discuss the latest news in cyber security and threat research. Topics this week include: Rise of the Deepfakes: Threat actors target Ferrari, Fake North Korean IT worker fake's job interviewDevelopments in ransomware: Stormous v3, VSXI, Black Basta develop custom malwareReliaQuest Research: Beyond the Endpoint: Threats Bypassing your Endpoint Detection and Response (EDR) solutionsResources: https://www.reliaquest.com/b...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, hosts Chris and Kim, along with Ivan Righi, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Rise of the Deepfakes: Threat actors target Ferrari, Fake North Korean IT worker fake&apos;s job interview</li><li>Developments in ransomware: Stormous v3, VSXI, Black Basta develop custom malware</li><li>ReliaQuest Research: Beyond the Endpoint: Threats Bypassing your Endpoint Detection and Response (EDR) solutions</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/beyond-the-endpoint-cyber-threats-eluding-endpoint-detection/'>https://www.reliaquest.com/blog/beyond-the-endpoint-cyber-threats-eluding-endpoint-detection/</a></li><li><a href='https://arstechnica.com/tech-policy/2024/07/us-security-firm-unwittingly-hired-apparent-nation-state-hacker-from-north-korea/'>https://arstechnica.com/tech-policy/2024/07/us-security-firm-unwittingly-hired-apparent-nation-state-hacker-from-north-korea/</a></li><li><a href='https://www.drive.com.au/news/ferrari-ceo-impersonated-ai-deepfake-scam/'>https://www.drive.com.au/news/ferrari-ceo-impersonated-ai-deepfake-scam/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, hosts Chris and Kim, along with Ivan Righi, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Rise of the Deepfakes: Threat actors target Ferrari, Fake North Korean IT worker fake&apos;s job interview</li><li>Developments in ransomware: Stormous v3, VSXI, Black Basta develop custom malware</li><li>ReliaQuest Research: Beyond the Endpoint: Threats Bypassing your Endpoint Detection and Response (EDR) solutions</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/beyond-the-endpoint-cyber-threats-eluding-endpoint-detection/'>https://www.reliaquest.com/blog/beyond-the-endpoint-cyber-threats-eluding-endpoint-detection/</a></li><li><a href='https://arstechnica.com/tech-policy/2024/07/us-security-firm-unwittingly-hired-apparent-nation-state-hacker-from-north-korea/'>https://arstechnica.com/tech-policy/2024/07/us-security-firm-unwittingly-hired-apparent-nation-state-hacker-from-north-korea/</a></li><li><a href='https://www.drive.com.au/news/ferrari-ceo-impersonated-ai-deepfake-scam/'>https://www.drive.com.au/news/ferrari-ceo-impersonated-ai-deepfake-scam/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15509465-deepfakes-the-new-frontier-in-deception-ransomware-roundup-threats-bypassing-your-edr.mp3" length="22983067" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15509465</guid>
    <pubDate>Wed, 31 Jul 2024 13:00:00 -0400</pubDate>
    <itunes:duration>1910</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CrowdStrike Global IT Outage, Finance &amp; Insurance Threats</itunes:title>
    <title>CrowdStrike Global IT Outage, Finance &amp; Insurance Threats</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, hosts Chris and Kim, along with ReliaQuest CISO Rick Holland, and Detection Researcher Corey Carter, discuss the latest news in cyber security and threat research. Topics this week include: CrowdStrike Global IT Outage breaks records in impacting 8.5 million devices (1:22)The importance of accountability and trust when working with third party vendorsReliaQuest research into threats facing Financial &amp; Insurance (18:46)Resources: https://www.reliaquest.com/bl...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, hosts Chris and Kim, along with ReliaQuest CISO Rick Holland, and Detection Researcher Corey Carter, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>CrowdStrike Global IT Outage breaks records in impacting 8.5 million devices (1:22)</li><li>The importance of accountability and trust when working with third party vendors</li><li>ReliaQuest research into threats facing Financial &amp; Insurance (18:46)</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/crowdstrike-outage-script-phishing-and-social-engineering-attacks/'>https://www.reliaquest.com/blog/crowdstrike-outage-script-phishing-and-social-engineering-attacks/</a></li></ul><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, hosts Chris and Kim, along with ReliaQuest CISO Rick Holland, and Detection Researcher Corey Carter, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>CrowdStrike Global IT Outage breaks records in impacting 8.5 million devices (1:22)</li><li>The importance of accountability and trust when working with third party vendors</li><li>ReliaQuest research into threats facing Financial &amp; Insurance (18:46)</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/crowdstrike-outage-script-phishing-and-social-engineering-attacks/'>https://www.reliaquest.com/blog/crowdstrike-outage-script-phishing-and-social-engineering-attacks/</a></li></ul><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15468695-crowdstrike-global-it-outage-finance-insurance-threats.mp3" length="19671488" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15468695</guid>
    <pubDate>Wed, 24 Jul 2024 13:00:00 -0400</pubDate>
    <itunes:duration>1631</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Guest Episode: Ransomware in Q2 2024, Disney/AT&amp;T Breach</itunes:title>
    <title>Guest Episode: Ransomware in Q2 2024, Disney/AT&amp;T Breach</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, hosts Chris and Kim, along with guest CISO Craig McEwen, discuss the latest news in cyber security and threat research. Topics this week include: ReliaQuest Research: Ransomware in Q2 2024Weekly roundup: Threat actors weaponizing exploits within 22 minutes, Disney/AT&amp;T breachesLinking security strategy to expenditureSupporting cyber apprenticeships and investing in peopleResources: https://www.reliaquest.com/blog/q2-2024-ransomware/https://app.galabid.com/sh...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, hosts Chris and Kim, along with guest CISO Craig McEwen, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>ReliaQuest Research: Ransomware in Q2 2024</li><li>Weekly roundup: Threat actors weaponizing exploits within 22 minutes, Disney/AT&amp;T breaches</li><li>Linking security strategy to expenditure</li><li>Supporting cyber apprenticeships and investing in people</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/q2-2024-ransomware/'>https://www.reliaquest.com/blog/q2-2024-ransomware/</a></li><li><a href='https://app.galabid.com/shawburyproms/items'>https://app.galabid.com/shawburyproms/items</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, hosts Chris and Kim, along with guest CISO Craig McEwen, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>ReliaQuest Research: Ransomware in Q2 2024</li><li>Weekly roundup: Threat actors weaponizing exploits within 22 minutes, Disney/AT&amp;T breaches</li><li>Linking security strategy to expenditure</li><li>Supporting cyber apprenticeships and investing in people</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/q2-2024-ransomware/'>https://www.reliaquest.com/blog/q2-2024-ransomware/</a></li><li><a href='https://app.galabid.com/shawburyproms/items'>https://app.galabid.com/shawburyproms/items</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15430053-guest-episode-ransomware-in-q2-2024-disney-at-t-breach.mp3" length="35511351" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15430053</guid>
    <pubDate>Wed, 17 Jul 2024 12:00:00 -0400</pubDate>
    <itunes:duration>2956</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>GenAI Powers Cybercrime, Cobalt Strike Takedown, Record-breaking DDoS Attack</itunes:title>
    <title>GenAI Powers Cybercrime, Cobalt Strike Takedown, Record-breaking DDoS Attack</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, hosts Chris and Kim, along with Brian, discuss the latest news in cyber security and threat research. The influence of Generative Artificial Intelligence (GenAI) on cybercrimeTango down: Law enforcement takedown over 600 Cobalt Strike serversRecord breaking DDoS attack disclosed by researchersRockyou2024: 9.9 Billion stolen passwords posted onto BreachForumsResource: AI-powered Cybercrime Report ]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, hosts Chris and Kim, along with Brian, discuss the latest news in cyber security and threat research.</p><ul><li>The influence of Generative Artificial Intelligence (GenAI) on cybercrime</li><li>Tango down: Law enforcement takedown over 600 Cobalt Strike servers</li><li>Record breaking DDoS attack disclosed by researchers</li><li>Rockyou2024: 9.9 Billion stolen passwords posted onto BreachForums</li></ul><p>Resource: <a href='https://www.reliaquest.com/blog/introducing-ai-powered-cybercrime-report/'>AI-powered Cybercrime Report</a></p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, hosts Chris and Kim, along with Brian, discuss the latest news in cyber security and threat research.</p><ul><li>The influence of Generative Artificial Intelligence (GenAI) on cybercrime</li><li>Tango down: Law enforcement takedown over 600 Cobalt Strike servers</li><li>Record breaking DDoS attack disclosed by researchers</li><li>Rockyou2024: 9.9 Billion stolen passwords posted onto BreachForums</li></ul><p>Resource: <a href='https://www.reliaquest.com/blog/introducing-ai-powered-cybercrime-report/'>AI-powered Cybercrime Report</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15393422-genai-powers-cybercrime-cobalt-strike-takedown-record-breaking-ddos-attack.mp3" length="20552434" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15393422</guid>
    <pubDate>Thu, 11 Jul 2024 03:00:00 -0400</pubDate>
    <itunes:duration>1709</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: TeamViewer Supply Chain Attack, MOVEit Horrors, Medusa Ransomware Case Study</itunes:title>
    <title>Weekly: TeamViewer Supply Chain Attack, MOVEit Horrors, Medusa Ransomware Case Study</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, hosts Chris and Kim, along with Marken, discuss the latest news in cyber security and threat research. Topics this week include: TeamViewer compromised by APT29 in supply chain attackMOVEit in the headlines again, critical severity vulnerability disclosedPopular Content Delivery Network (CDN) providers compromised in supply chain attacksReliaQuest research in a case study attributed to the Medusa ransomware groupResources:  https://www.reliaquest.com/blog/m...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, hosts Chris and Kim, along with Marken, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>TeamViewer compromised by APT29 in supply chain attack</li><li>MOVEit in the headlines again, critical severity vulnerability disclosed</li><li>Popular Content Delivery Network (CDN) providers compromised in supply chain attacks</li><li>ReliaQuest research in a case study attributed to the Medusa ransomware group</li></ul><p><b>Resources:</b> </p><ul><li><a href='https://www.reliaquest.com/blog/medusa-attack-analysis/'>https://www.reliaquest.com/blog/medusa-attack-analysis/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, hosts Chris and Kim, along with Marken, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>TeamViewer compromised by APT29 in supply chain attack</li><li>MOVEit in the headlines again, critical severity vulnerability disclosed</li><li>Popular Content Delivery Network (CDN) providers compromised in supply chain attacks</li><li>ReliaQuest research in a case study attributed to the Medusa ransomware group</li></ul><p><b>Resources:</b> </p><ul><li><a href='https://www.reliaquest.com/blog/medusa-attack-analysis/'>https://www.reliaquest.com/blog/medusa-attack-analysis/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15356988-weekly-teamviewer-supply-chain-attack-moveit-horrors-medusa-ransomware-case-study.mp3" length="26545030" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15356988</guid>
    <pubDate>Wed, 03 Jul 2024 12:00:00 -0400</pubDate>
    <itunes:duration>2208</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Lockbit Claim US Federal Reserve Breach, Protocol Tunneling, Kaspersky Banned in US</itunes:title>
    <title>Weekly: Lockbit Claim US Federal Reserve Breach, Protocol Tunneling, Kaspersky Banned in US</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, hosts Chris and Kim, along with Ivan and Gjergji, discuss the latest news in cyber security and threat research. Topics this week include: Lockbit claim breach of the US Federal Reserve, but are they telling the truth? ReliaQuest research into misuse of Protocol TunnelingFallout from the US Ban of KasperskyResources: https://www.reliaquest.com/blog/protocol-tunneling-tools-and-techniques/#:~:text=Protocol%20tunneling%20is%20a%20technique%20used%20to%20encap...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, hosts Chris and Kim, along with Ivan and Gjergji, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Lockbit claim breach of the US Federal Reserve, but are they telling the truth? </li><li>ReliaQuest research into misuse of Protocol Tunneling</li><li>Fallout from the US Ban of Kaspersky</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/protocol-tunneling-tools-and-techniques/#:~:text=Protocol%20tunneling%20is%20a%20technique%20used%20to%20encapsulate,be%20transmitted%20through%20a%20secure%20or%20otherwise-allowed%20protocol.'>https://www.reliaquest.com/blog/protocol-tunneling-tools-and-techniques/#:~:text=Protocol%20tunneling%20is%20a%20technique%20used%20to%20encapsulate,be%20transmitted%20through%20a%20secure%20or%20otherwise-allowed%20protocol.</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, hosts Chris and Kim, along with Ivan and Gjergji, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Lockbit claim breach of the US Federal Reserve, but are they telling the truth? </li><li>ReliaQuest research into misuse of Protocol Tunneling</li><li>Fallout from the US Ban of Kaspersky</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/protocol-tunneling-tools-and-techniques/#:~:text=Protocol%20tunneling%20is%20a%20technique%20used%20to%20encapsulate,be%20transmitted%20through%20a%20secure%20or%20otherwise-allowed%20protocol.'>https://www.reliaquest.com/blog/protocol-tunneling-tools-and-techniques/#:~:text=Protocol%20tunneling%20is%20a%20technique%20used%20to%20encapsulate,be%20transmitted%20through%20a%20secure%20or%20otherwise-allowed%20protocol.</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15322316-weekly-lockbit-claim-us-federal-reserve-breach-protocol-tunneling-kaspersky-banned-in-us.mp3" length="22973924" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15322316</guid>
    <pubDate>Thu, 27 Jun 2024 10:00:00 -0400</pubDate>
    <itunes:duration>1910</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Future of Scattered Spider, Supply Chain Compromise, Insider Threats</itunes:title>
    <title>Weekly: Future of Scattered Spider, Supply Chain Compromise, Insider Threats</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Marken, discuss the latest news in cyber security and threat research. Topics this week include: Scattered Spider leader reportedly arrested, as group pivot to target SaaS solutionsReliaQuest research into supply chain compromise. Detections to improve your resilienceClassifying insider threats and the difficulties of proving intentResources: https://www.reliaquest.com/blog/what-is-scattered-spider/https://www.reliaquest.com/blog/scattered...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Marken, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Scattered Spider leader reportedly arrested, as group pivot to target SaaS solutions</li><li>ReliaQuest research into supply chain compromise. Detections to improve your resilience</li><li>Classifying insider threats and the difficulties of proving intent</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/what-is-scattered-spider/'>https://www.reliaquest.com/blog/what-is-scattered-spider/</a></li><li><a href='https://www.reliaquest.com/blog/scattered-spider-attack-analysis-account-compromise/'>https://www.reliaquest.com/blog/scattered-spider-attack-analysis-account-compromise/</a></li><li><a href='https://www.reliaquest.com/blog/software-supply-chain-risk-management/'>https://www.reliaquest.com/blog/software-supply-chain-risk-management/</a></li><li><a href='https://www.reliaquest.com/blog/virtual-machines-defense-evasion/'>https://www.reliaquest.com/blog/virtual-machines-defense-evasion/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Marken, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Scattered Spider leader reportedly arrested, as group pivot to target SaaS solutions</li><li>ReliaQuest research into supply chain compromise. Detections to improve your resilience</li><li>Classifying insider threats and the difficulties of proving intent</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/what-is-scattered-spider/'>https://www.reliaquest.com/blog/what-is-scattered-spider/</a></li><li><a href='https://www.reliaquest.com/blog/scattered-spider-attack-analysis-account-compromise/'>https://www.reliaquest.com/blog/scattered-spider-attack-analysis-account-compromise/</a></li><li><a href='https://www.reliaquest.com/blog/software-supply-chain-risk-management/'>https://www.reliaquest.com/blog/software-supply-chain-risk-management/</a></li><li><a href='https://www.reliaquest.com/blog/virtual-machines-defense-evasion/'>https://www.reliaquest.com/blog/virtual-machines-defense-evasion/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15284041-weekly-future-of-scattered-spider-supply-chain-compromise-insider-threats.mp3" length="30918712" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15284041</guid>
    <pubDate>Thu, 20 Jun 2024 10:00:00 -0400</pubDate>
    <itunes:duration>2572</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Guest Episode: Cyber Threats Facing Healthcare, Optum Impact, Ransomware, AI and Automation</itunes:title>
    <title>Guest Episode: Cyber Threats Facing Healthcare, Optum Impact, Ransomware, AI and Automation</title>
    <itunes:summary><![CDATA[In this Special Guest Episode of ShadowTalk, host Chris and one of ReliaQuest's CISOs Rick Holland are joined by University of Kansas Health System (UKHS) CISO Michael Meis to discuss the latest news in cyber security and threat research. Topics this week include: Significant threats facing healthcare: Ransomware, accidental insidersThe influence of COVID on ransomware activityThe immediate and long term impact of the Optum breachThe importance of understanding your revenue cycle to weather t...]]></itunes:summary>
    <description><![CDATA[<p>In this Special Guest Episode of ShadowTalk, host Chris and one of ReliaQuest&apos;s CISOs Rick Holland are joined by University of Kansas Health System (UKHS) CISO Michael Meis to discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Significant threats facing healthcare: Ransomware, accidental insiders</li><li>The influence of COVID on ransomware activity</li><li>The immediate and long term impact of the Optum breach</li><li>The importance of understanding your revenue cycle to weather the storm of a breach</li><li>Methods of maintaining engagement and retaining staff</li><li>AI and automation: Improving timeliness and efficiency of incident response</li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this Special Guest Episode of ShadowTalk, host Chris and one of ReliaQuest&apos;s CISOs Rick Holland are joined by University of Kansas Health System (UKHS) CISO Michael Meis to discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Significant threats facing healthcare: Ransomware, accidental insiders</li><li>The influence of COVID on ransomware activity</li><li>The immediate and long term impact of the Optum breach</li><li>The importance of understanding your revenue cycle to weather the storm of a breach</li><li>Methods of maintaining engagement and retaining staff</li><li>AI and automation: Improving timeliness and efficiency of incident response</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15239307-guest-episode-cyber-threats-facing-healthcare-optum-impact-ransomware-ai-and-automation.mp3" length="30982689" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15239307</guid>
    <pubDate>Wed, 12 Jun 2024 14:00:00 -0400</pubDate>
    <itunes:duration>2578</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Live from InfoSec Europe 2024, Snowflake Breach, Cybercriminal AI reflections</itunes:title>
    <title>Special: Live from InfoSec Europe 2024, Snowflake Breach, Cybercriminal AI reflections</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris Morgan is joined by ReliaQuest Chief Strategy Officer Jason Pfeiffer LIVE on the InfoSec Europe show floor in London, UK to discuss: How InfoSec stacks up against the US cyber conferencesSnowflake data breach affecting TicketMaster and othersCybercriminal reflections on generative AIResources: https://www.reliaquest.com/blog/common-infostealers/]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris Morgan is joined by ReliaQuest Chief Strategy Officer Jason Pfeiffer LIVE on the InfoSec Europe show floor in London, UK to discuss:</p><ul><li>How InfoSec stacks up against the US cyber conferences</li><li>Snowflake data breach affecting TicketMaster and others</li><li>Cybercriminal reflections on generative AI</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/common-infostealers/'>https://www.reliaquest.com/blog/common-infostealers/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris Morgan is joined by ReliaQuest Chief Strategy Officer Jason Pfeiffer LIVE on the InfoSec Europe show floor in London, UK to discuss:</p><ul><li>How InfoSec stacks up against the US cyber conferences</li><li>Snowflake data breach affecting TicketMaster and others</li><li>Cybercriminal reflections on generative AI</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/common-infostealers/'>https://www.reliaquest.com/blog/common-infostealers/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15199315-special-live-from-infosec-europe-2024-snowflake-breach-cybercriminal-ai-reflections.mp3" length="19855000" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15199315</guid>
    <pubDate>Wed, 05 Jun 2024 12:00:00 -0400</pubDate>
    <itunes:duration>1649</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Microsoft Deprecates VBScript, Common Infostealers, GhostEngine Cryptominer, BlackSuit Attack Analysis </itunes:title>
    <title>Weekly: Microsoft Deprecates VBScript, Common Infostealers, GhostEngine Cryptominer, BlackSuit Attack Analysis </title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk host Corey, along with Gjergji and Brian, discuss the latest news in cyber security and threat research. Topics this week include: Microsoft set to begin the deprecation of VBScript in the second half of 2024 ReliaQuest research into the top three Infostealers Dive into a new crypto miner dubbed 'GhostEngine' ReliaQuest analysis of a BlackSuit ransomware attack Resources: https://techcommunity.microsoft.com/t5/windows-it-pro-blog/vbscript-depr...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk host Corey, along with Gjergji and Brian, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Microsoft set to begin the deprecation of VBScript in the second half of 2024 </li><li>ReliaQuest research into the top three Infostealers </li><li>Dive into a new crypto miner dubbed &apos;GhostEngine&apos; </li><li>ReliaQuest analysis of a BlackSuit ransomware attack </li></ul><p>Resources:</p><ul><li><a href='https://techcommunity.microsoft.com/t5/windows-it-pro-blog/vbscript-deprecation-timelines-and-next-steps/ba-p/4148301'>https://techcommunity.microsoft.com/t5/windows-it-pro-blog/vbscript-deprecation-timelines-and-next-steps/ba-p/4148301</a></li><li><a href='https://www.reliaquest.com/blog/common-infostealers/'>https://www.reliaquest.com/blog/common-infostealers/</a></li><li><a href='https://www.elastic.co/security-labs/invisible-miners-unveiling-ghostengine'>https://www.elastic.co/security-labs/invisible-miners-unveiling-ghostengine</a> </li><li><a href='https://www.reliaquest.com/blog/blacksuit-attack-analysis/'>https://www.reliaquest.com/blog/blacksuit-attack-analysis/</a> </li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk host Corey, along with Gjergji and Brian, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Microsoft set to begin the deprecation of VBScript in the second half of 2024 </li><li>ReliaQuest research into the top three Infostealers </li><li>Dive into a new crypto miner dubbed &apos;GhostEngine&apos; </li><li>ReliaQuest analysis of a BlackSuit ransomware attack </li></ul><p>Resources:</p><ul><li><a href='https://techcommunity.microsoft.com/t5/windows-it-pro-blog/vbscript-deprecation-timelines-and-next-steps/ba-p/4148301'>https://techcommunity.microsoft.com/t5/windows-it-pro-blog/vbscript-deprecation-timelines-and-next-steps/ba-p/4148301</a></li><li><a href='https://www.reliaquest.com/blog/common-infostealers/'>https://www.reliaquest.com/blog/common-infostealers/</a></li><li><a href='https://www.elastic.co/security-labs/invisible-miners-unveiling-ghostengine'>https://www.elastic.co/security-labs/invisible-miners-unveiling-ghostengine</a> </li><li><a href='https://www.reliaquest.com/blog/blacksuit-attack-analysis/'>https://www.reliaquest.com/blog/blacksuit-attack-analysis/</a> </li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15163277-weekly-microsoft-deprecates-vbscript-common-infostealers-ghostengine-cryptominer-blacksuit-attack-analysis.mp3" length="23720911" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15163277</guid>
    <pubDate>Thu, 30 May 2024 09:00:00 -0400</pubDate>
    <itunes:duration>1971</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Microsoft Enforce MFA, Fileless Malware, Rise of Deepfakes</itunes:title>
    <title>Weekly: Microsoft Enforce MFA, Fileless Malware, Rise of Deepfakes</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Director of Threat Research Brandon Tirado, discuss the latest news in cyber security and threat research. Topics this week include: Microsoft mandating multi-factor authentication across AzureReliaQuest research exploring fileless malware and living against the land (LoTL) techniques Use of deepfakes in social engineering in 2024Resources: https://www.reliaquest.com/blog/socgholish-fakeupdates/https://www.reliaquest.com/blog/new-pyth...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Director of Threat Research Brandon Tirado, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Microsoft mandating multi-factor authentication across Azure</li><li>ReliaQuest research exploring fileless malware and living against the land (LoTL) techniques </li><li>Use of deepfakes in social engineering in 2024</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/socgholish-fakeupdates/'>https://www.reliaquest.com/blog/socgholish-fakeupdates/</a></li><li><a href='https://www.reliaquest.com/blog/new-python-socgholish-infection-chain/'>https://www.reliaquest.com/blog/new-python-socgholish-infection-chain/</a></li><li><a href='https://www.reliaquest.com/blog/living-off-the-land-fileless-malware/'>https://www.reliaquest.com/blog/living-off-the-land-fileless-malware/</a><br/> </li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Director of Threat Research Brandon Tirado, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Microsoft mandating multi-factor authentication across Azure</li><li>ReliaQuest research exploring fileless malware and living against the land (LoTL) techniques </li><li>Use of deepfakes in social engineering in 2024</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/socgholish-fakeupdates/'>https://www.reliaquest.com/blog/socgholish-fakeupdates/</a></li><li><a href='https://www.reliaquest.com/blog/new-python-socgholish-infection-chain/'>https://www.reliaquest.com/blog/new-python-socgholish-infection-chain/</a></li><li><a href='https://www.reliaquest.com/blog/living-off-the-land-fileless-malware/'>https://www.reliaquest.com/blog/living-off-the-land-fileless-malware/</a><br/> </li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15117358-weekly-microsoft-enforce-mfa-fileless-malware-rise-of-deepfakes.mp3" length="30069772" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15117358</guid>
    <pubDate>Wed, 22 May 2024 12:00:00 -0400</pubDate>
    <itunes:duration>2499</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Ransomware Impacting Hospitals, Q1 Most Observed Attacker Techniques, BreachForums Advertise Access to Security Company</itunes:title>
    <title>Weekly: Ransomware Impacting Hospitals, Q1 Most Observed Attacker Techniques, BreachForums Advertise Access to Security Company</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Ivan and Marken, discuss the latest news in cyber security and threat research. Topics this week include: Recent ransomware attacks on the healthcare sector do not necessarily suggest a change in targeting preferencesBlack Basta pivot TTPs: New social engineering campaign using mass sign ups to mailing list spamPain on the adversary, in having multiple controls to slow down an attacker, can greatly improve cyber resilience when combined wi...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Ivan and Marken, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Recent ransomware attacks on the healthcare sector do not necessarily suggest a change in targeting preferences</li><li>Black Basta pivot TTPs: New social engineering campaign using mass sign ups to mailing list spam</li><li>Pain on the adversary, in having multiple controls to slow down an attacker, can greatly improve cyber resilience when combined with network visibility </li><li>Initial access brokers (IAB) continuing to play a crucial role in facilitating cybercrime</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/q1-2024-attacker-trends/'>https://www.reliaquest.com/blog/q1-2024-attacker-trends/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Ivan and Marken, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Recent ransomware attacks on the healthcare sector do not necessarily suggest a change in targeting preferences</li><li>Black Basta pivot TTPs: New social engineering campaign using mass sign ups to mailing list spam</li><li>Pain on the adversary, in having multiple controls to slow down an attacker, can greatly improve cyber resilience when combined with network visibility </li><li>Initial access brokers (IAB) continuing to play a crucial role in facilitating cybercrime</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/q1-2024-attacker-trends/'>https://www.reliaquest.com/blog/q1-2024-attacker-trends/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15076377-weekly-ransomware-impacting-hospitals-q1-most-observed-attacker-techniques-breachforums-advertise-access-to-security-company.mp3" length="25113146" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15076377</guid>
    <pubDate>Wed, 15 May 2024 17:00:00 -0400</pubDate>
    <itunes:duration>2089</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: AI and Automation at RSAC 2024</itunes:title>
    <title>Special: AI and Automation at RSAC 2024</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Rick Holland is joined by ReliaQuest CTO Joe Partlow and Chief Scientist Brian P. Murphy LIVE on the RSAC show floor in San Francisco, CA to discuss all things AI and automation. ]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Rick Holland is joined by ReliaQuest CTO Joe Partlow and Chief Scientist Brian P. Murphy LIVE on the RSAC show floor in San Francisco, CA to discuss all things AI and automation.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Rick Holland is joined by ReliaQuest CTO Joe Partlow and Chief Scientist Brian P. Murphy LIVE on the RSAC show floor in San Francisco, CA to discuss all things AI and automation.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/15037369-special-ai-and-automation-at-rsac-2024.mp3" length="19808457" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15037369</guid>
    <pubDate>Wed, 08 May 2024 21:00:00 -0400</pubDate>
    <itunes:duration>1646</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cracking the Code: Getting a Job in Cybersecurity</itunes:title>
    <title>Cracking the Code: Getting a Job in Cybersecurity</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Brian and Corey, discuss their career paths, as well as offering tips for individuals aiming to gain employment within cybersecurity. The importance of tact and developing both soft and hard skillsWorking around personnel constraints  Picking the right vendors to compliment your security modelRecommendations for advancing your own career]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Brian and Corey, discuss their career paths, as well as offering tips for individuals aiming to gain employment within cybersecurity.</p><ul><li>The importance of tact and developing both soft and hard skills</li><li>Working around personnel constraints  </li><li>Picking the right vendors to compliment your security model</li><li>Recommendations for advancing your own career</li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Brian and Corey, discuss their career paths, as well as offering tips for individuals aiming to gain employment within cybersecurity.</p><ul><li>The importance of tact and developing both soft and hard skills</li><li>Working around personnel constraints  </li><li>Picking the right vendors to compliment your security model</li><li>Recommendations for advancing your own career</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/14991223-cracking-the-code-getting-a-job-in-cybersecurity.mp3" length="28436049" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14991223</guid>
    <pubDate>Wed, 01 May 2024 12:00:00 -0400</pubDate>
    <itunes:duration>2365</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: APT28 Activity, Iran/Israel Tensions, Ransomware Rebrands</itunes:title>
    <title>Weekly: APT28 Activity, Iran/Israel Tensions, Ransomware Rebrands</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along Kim and one of ReliaQuest's CISO's Rick, discuss the latest news in cyber security and threat research. Topics this week include: APT28 Exploit 6 year old CISCO vulnerabilityReliaQuest research on Iran/Israel TensionsRansomware RebrandsApple notify users impacted by SpywareResources: https://www.reliaquest.com/blog/cyber-threats-linked-to-iran-israel-conflict/]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along Kim and one of ReliaQuest&apos;s CISO&apos;s Rick, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>APT28 Exploit 6 year old CISCO vulnerability</li><li>ReliaQuest research on Iran/Israel Tensions</li><li>Ransomware Rebrands</li><li>Apple notify users impacted by Spyware</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/cyber-threats-linked-to-iran-israel-conflict/'>https://www.reliaquest.com/blog/cyber-threats-linked-to-iran-israel-conflict/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along Kim and one of ReliaQuest&apos;s CISO&apos;s Rick, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>APT28 Exploit 6 year old CISCO vulnerability</li><li>ReliaQuest research on Iran/Israel Tensions</li><li>Ransomware Rebrands</li><li>Apple notify users impacted by Spyware</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/cyber-threats-linked-to-iran-israel-conflict/'>https://www.reliaquest.com/blog/cyber-threats-linked-to-iran-israel-conflict/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/14955925-weekly-apt28-activity-iran-israel-tensions-ransomware-rebrands.mp3" length="27616854" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14955925</guid>
    <pubDate>Thu, 25 Apr 2024 12:00:00 -0400</pubDate>
    <itunes:duration>2296</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Palo Alto Critical Exploit, VPN Management, RansomHub Leak Optum Data</itunes:title>
    <title>Weekly: Palo Alto Critical Exploit, VPN Management, RansomHub Leak Optum Data</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Marken, discuss the latest news in cyber security and threat research. This weeks topics include: Palo Alto Critical Vulnerability under active exploitation ReliaQuest research on VPN attack surface managementOptum Healthcare data breached by RansomHub group]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Marken, discuss the latest news in cyber security and threat research. This weeks topics include:</p><ul><li>Palo Alto Critical Vulnerability under active exploitation </li><li>ReliaQuest research on VPN attack surface management</li><li>Optum Healthcare data breached by RansomHub group</li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Marken, discuss the latest news in cyber security and threat research. This weeks topics include:</p><ul><li>Palo Alto Critical Vulnerability under active exploitation </li><li>ReliaQuest research on VPN attack surface management</li><li>Optum Healthcare data breached by RansomHub group</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/14907032-weekly-palo-alto-critical-exploit-vpn-management-ransomhub-leak-optum-data.mp3" length="32096001" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14907032</guid>
    <pubDate>Wed, 17 Apr 2024 12:00:00 -0400</pubDate>
    <itunes:duration>2670</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: HC3 Social Engineering Warning, ReliaQuest Q1 Phishing Report, Microsoft Copilot </itunes:title>
    <title>Weekly: HC3 Social Engineering Warning, ReliaQuest Q1 Phishing Report, Microsoft Copilot </title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Gjergji and James, discuss the latest news in cyber security and threat research. Topics this week include: Health sector Cybersecurity Coordination Center (HC3) issues alert warning regarding attackers using social engineering to target IT helpdesk's across the health sectorReliaQuest releases it's findings from it's Q1 Phishing reportHow improper permissions can lead to problems with new Microsoft Copilot AIResources: https://www.reliaqu...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Gjergji and James, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Health sector Cybersecurity Coordination Center (HC3) issues alert warning regarding attackers using social engineering to target IT helpdesk&apos;s across the health sector</li><li>ReliaQuest releases it&apos;s findings from it&apos;s Q1 Phishing report</li><li>How improper permissions can lead to problems with new Microsoft Copilot AI</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/health-care-social-engineering-campaign/'>https://www.reliaquest.com/blog/health-care-social-engineering-campaign/</a></li><li><a href='https://www.reliaquest.com/blog/phishing-tactics-and-trends-2024/'>https://www.reliaquest.com/blog/phishing-tactics-and-trends-2024/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Gjergji and James, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Health sector Cybersecurity Coordination Center (HC3) issues alert warning regarding attackers using social engineering to target IT helpdesk&apos;s across the health sector</li><li>ReliaQuest releases it&apos;s findings from it&apos;s Q1 Phishing report</li><li>How improper permissions can lead to problems with new Microsoft Copilot AI</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/health-care-social-engineering-campaign/'>https://www.reliaquest.com/blog/health-care-social-engineering-campaign/</a></li><li><a href='https://www.reliaquest.com/blog/phishing-tactics-and-trends-2024/'>https://www.reliaquest.com/blog/phishing-tactics-and-trends-2024/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/14865883-weekly-hc3-social-engineering-warning-reliaquest-q1-phishing-report-microsoft-copilot.mp3" length="29617552" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14865883</guid>
    <pubDate>Wed, 10 Apr 2024 14:00:00 -0400</pubDate>
    <itunes:duration>2463</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: New Backdoor in XZ Utils, SEO Poisoning, Impersonation Scams</itunes:title>
    <title>Weekly: New Backdoor in XZ Utils, SEO Poisoning, Impersonation Scams</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Kim, along with Brian, discuss the latest news in cyber security and threat research. Topics this week include: Sophisticated backdoor identified in XZ UtilsOur Spotlight report on SEO poisoningImpersonation scams cost $1.1 billion in 2023]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Kim, along with Brian, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Sophisticated backdoor identified in XZ Utils</li><li>Our Spotlight report on SEO poisoning</li><li>Impersonation scams cost $1.1 billion in 2023</li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Kim, along with Brian, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Sophisticated backdoor identified in XZ Utils</li><li>Our Spotlight report on SEO poisoning</li><li>Impersonation scams cost $1.1 billion in 2023</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/14822489-weekly-new-backdoor-in-xz-utils-seo-poisoning-impersonation-scams.mp3" length="18479421" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14822489</guid>
    <pubDate>Wed, 03 Apr 2024 14:00:00 -0400</pubDate>
    <itunes:duration>1536</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Google AI Search, Spain Telegram Ban, Speculative Execution Vulnerabilities</itunes:title>
    <title>Weekly: Google AI Search, Spain Telegram Ban, Speculative Execution Vulnerabilities</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with ReliaQuest Threat Hunter's Caroline and Corey discuss the latest news in cyber security and threat research. This week's topics include: Issues with Google AI-powered search generative experience recommending scam sitesSpain high court judge issues temporary ban on messaging platform 'Telegram'Speculative Execution vulnerabilities found on Apple M Series and Intel Raptor Lake CPU's]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with ReliaQuest Threat Hunter&apos;s Caroline and Corey discuss the latest news in cyber security and threat research. This week&apos;s topics include:</p><ul><li>Issues with Google AI-powered search generative experience recommending scam sites</li><li>Spain high court judge issues temporary ban on messaging platform &apos;Telegram&apos;</li><li>Speculative Execution vulnerabilities found on Apple M Series and Intel Raptor Lake CPU&apos;s</li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with ReliaQuest Threat Hunter&apos;s Caroline and Corey discuss the latest news in cyber security and threat research. This week&apos;s topics include:</p><ul><li>Issues with Google AI-powered search generative experience recommending scam sites</li><li>Spain high court judge issues temporary ban on messaging platform &apos;Telegram&apos;</li><li>Speculative Execution vulnerabilities found on Apple M Series and Intel Raptor Lake CPU&apos;s</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/14782314-weekly-google-ai-search-spain-telegram-ban-speculative-execution-vulnerabilities.mp3" length="22567876" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14782314</guid>
    <pubDate>Wed, 27 Mar 2024 17:00:00 -0400</pubDate>
    <itunes:duration>1877</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: AT&amp;T Breach, Magnet Goblin, ReliaQuest&#39;s Annual Threat Report (ATR)</itunes:title>
    <title>Weekly: AT&amp;T Breach, Magnet Goblin, ReliaQuest&#39;s Annual Threat Report (ATR)</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Marken and ReliaQuest CISO Rick, discuss the latest news in cyber security and threat research. This week's topics include: 2021 AT&amp;T breach released for free Magnet Goblin threat group exploiting 1-day vulnerabilitiesAn introduction to ReliaQuest's Annual Threat Report (ATR)]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Marken and ReliaQuest CISO Rick, discuss the latest news in cyber security and threat research. This week&apos;s topics include:</p><ul><li>2021 AT&amp;T breach released for free </li><li>Magnet Goblin threat group exploiting 1-day vulnerabilities</li><li>An introduction to ReliaQuest&apos;s Annual Threat Report (ATR)</li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Marken and ReliaQuest CISO Rick, discuss the latest news in cyber security and threat research. This week&apos;s topics include:</p><ul><li>2021 AT&amp;T breach released for free </li><li>Magnet Goblin threat group exploiting 1-day vulnerabilities</li><li>An introduction to ReliaQuest&apos;s Annual Threat Report (ATR)</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/14730507-weekly-at-t-breach-magnet-goblin-reliaquest-s-annual-threat-report-atr.mp3" length="26208329" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14730507</guid>
    <pubDate>Wed, 20 Mar 2024 11:00:00 -0400</pubDate>
    <itunes:duration>2172</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: TeamCity and Supply Chain Risk, BEC Detections, Midnight Blizzard</itunes:title>
    <title>Weekly: TeamCity and Supply Chain Risk, BEC Detections, Midnight Blizzard</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Corey and Caroline, discuss the latest news in cyber security and threat research. Topics this week include: TeamCity Server critical vulnerability leaves potential for supply chain riskReliaQuest research into advanced business email compromise (BEC) detectionsMicrosoft compromised by Midnight Blizzard password spraying attackResources:  https://www.rapid7.com/blog/post/2024/03/04/etr-cve-2024-27198-and-cve-2024-27199-jetbrains-teamc...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Corey and Caroline, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>TeamCity Server critical vulnerability leaves potential for supply chain risk</li><li>ReliaQuest research into advanced business email compromise (BEC) detections</li><li>Microsoft compromised by Midnight Blizzard password spraying attack</li></ul><p><b>Resources:</b> </p><ul><li><a href='https://www.rapid7.com/blog/post/2024/03/04/etr-cve-2024-27198-and-cve-2024-27199-jetbrains-teamcity-multiple-authentication-bypass-vulnerabilities-fixed/'>https://www.rapid7.com/blog/post/2024/03/04/etr-cve-2024-27198-and-cve-2024-27199-jetbrains-teamcity-multiple-authentication-bypass-vulnerabilities-fixed/</a> </li><li><a href='https://blog.jetbrains.com/teamcity/2024/03/our-approach-addressing-recently-discovered-vulnerabilities-in-teamcity-on-premises/'>https://blog.jetbrains.com/teamcity/2024/03/our-approach-addressing-recently-discovered-vulnerabilities-in-teamcity-on-premises/</a> </li><li><a href='https://blog.jetbrains.com/teamcity/2024/03/preventing-exploits-jetbrains-ethical-approach-to-vulnerability-disclosure/'>https://blog.jetbrains.com/teamcity/2024/03/preventing-exploits-jetbrains-ethical-approach-to-vulnerability-disclosure/</a> </li><li><a href='https://www.reliaquest.com/blog/business-email-compromise-detection/'>https://www.reliaquest.com/blog/business-email-compromise-detection/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Corey and Caroline, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>TeamCity Server critical vulnerability leaves potential for supply chain risk</li><li>ReliaQuest research into advanced business email compromise (BEC) detections</li><li>Microsoft compromised by Midnight Blizzard password spraying attack</li></ul><p><b>Resources:</b> </p><ul><li><a href='https://www.rapid7.com/blog/post/2024/03/04/etr-cve-2024-27198-and-cve-2024-27199-jetbrains-teamcity-multiple-authentication-bypass-vulnerabilities-fixed/'>https://www.rapid7.com/blog/post/2024/03/04/etr-cve-2024-27198-and-cve-2024-27199-jetbrains-teamcity-multiple-authentication-bypass-vulnerabilities-fixed/</a> </li><li><a href='https://blog.jetbrains.com/teamcity/2024/03/our-approach-addressing-recently-discovered-vulnerabilities-in-teamcity-on-premises/'>https://blog.jetbrains.com/teamcity/2024/03/our-approach-addressing-recently-discovered-vulnerabilities-in-teamcity-on-premises/</a> </li><li><a href='https://blog.jetbrains.com/teamcity/2024/03/preventing-exploits-jetbrains-ethical-approach-to-vulnerability-disclosure/'>https://blog.jetbrains.com/teamcity/2024/03/preventing-exploits-jetbrains-ethical-approach-to-vulnerability-disclosure/</a> </li><li><a href='https://www.reliaquest.com/blog/business-email-compromise-detection/'>https://www.reliaquest.com/blog/business-email-compromise-detection/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/14685949-weekly-teamcity-and-supply-chain-risk-bec-detections-midnight-blizzard.mp3" length="27925212" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14685949</guid>
    <pubDate>Wed, 13 Mar 2024 16:00:00 -0400</pubDate>
    <itunes:duration>2317</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: ConnectWise Critical Vulnerabilities , Credential Theft, NIST Frameworks</itunes:title>
    <title>Weekly: ConnectWise Critical Vulnerabilities , Credential Theft, NIST Frameworks</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Fearghal and Kim, discuss the latest news in cyber security and threat research. Topics include: An overview of the critical severity vulnerabilities affecting ConnectWise, patch now!ReliaQuest research into Browser Credential Dumping attacksThe latest in the world of ransomwareUpdate to National Institute of Standards and Technology (NIST) frameworkResources: https://www.reliaquest.com/blog/browser-credential-dumping/ ]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Fearghal and Kim, discuss the latest news in cyber security and threat research. Topics include:</p><ul><li>An overview of the critical severity vulnerabilities affecting ConnectWise, patch now!</li><li>ReliaQuest research into Browser Credential Dumping attacks</li><li>The latest in the world of ransomware</li><li>Update to National Institute of Standards and Technology (NIST) framework</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/browser-credential-dumping/'>https://www.reliaquest.com/blog/browser-credential-dumping/</a> </li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Fearghal and Kim, discuss the latest news in cyber security and threat research. Topics include:</p><ul><li>An overview of the critical severity vulnerabilities affecting ConnectWise, patch now!</li><li>ReliaQuest research into Browser Credential Dumping attacks</li><li>The latest in the world of ransomware</li><li>Update to National Institute of Standards and Technology (NIST) framework</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/browser-credential-dumping/'>https://www.reliaquest.com/blog/browser-credential-dumping/</a> </li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/14640701-weekly-connectwise-critical-vulnerabilities-credential-theft-nist-frameworks.mp3" length="16555776" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14640701</guid>
    <pubDate>Wed, 06 Mar 2024 13:00:00 -0500</pubDate>
    <itunes:duration>1373</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Lockbit Return, SAT Exercises, Optum Breach</itunes:title>
    <title>Weekly: Lockbit Return, SAT Exercises, Optum Breach</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Ivan, Caroline, and one of ReliaQuest's CISOs Rick, discuss the latest news in cyber security and threat research. This week's topics include: Lockbit return following law enforcement operationRecent Structured Analytical Technique (SAT) exercises ran by ReliaQuestThe Optum Breach and what you need to know'SubdoMailing' malvertising campaign leveraging compromised domainsResources: https://www.reliaquest.com/blog/lockbit-taken-down-what-co...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Ivan, Caroline, and one of ReliaQuest&apos;s CISOs Rick, discuss the latest news in cyber security and threat research. This week&apos;s topics include:</p><ul><li>Lockbit return following law enforcement operation</li><li>Recent Structured Analytical Technique (SAT) exercises ran by ReliaQuest</li><li>The Optum Breach and what you need to know</li><li>&apos;SubdoMailing&apos; malvertising campaign leveraging compromised domains</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/lockbit-taken-down-what-comes-next/'>https://www.reliaquest.com/blog/lockbit-taken-down-what-comes-next/</a></li><li><a href='https://www.reliaquest.com/blog/scattered-spider-attack-analysis-account-compromise/'>https://www.reliaquest.com/blog/scattered-spider-attack-analysis-account-compromise/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Ivan, Caroline, and one of ReliaQuest&apos;s CISOs Rick, discuss the latest news in cyber security and threat research. This week&apos;s topics include:</p><ul><li>Lockbit return following law enforcement operation</li><li>Recent Structured Analytical Technique (SAT) exercises ran by ReliaQuest</li><li>The Optum Breach and what you need to know</li><li>&apos;SubdoMailing&apos; malvertising campaign leveraging compromised domains</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/lockbit-taken-down-what-comes-next/'>https://www.reliaquest.com/blog/lockbit-taken-down-what-comes-next/</a></li><li><a href='https://www.reliaquest.com/blog/scattered-spider-attack-analysis-account-compromise/'>https://www.reliaquest.com/blog/scattered-spider-attack-analysis-account-compromise/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/14595214-weekly-lockbit-return-sat-exercises-optum-breach.mp3" length="24979695" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14595214</guid>
    <pubDate>Wed, 28 Feb 2024 13:00:00 -0500</pubDate>
    <itunes:duration>2075</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Lockbit Taken Down, RMM Tool Abuse, Chinese Gov&#39;t Documents Exposed</itunes:title>
    <title>Weekly: Lockbit Taken Down, RMM Tool Abuse, Chinese Gov&#39;t Documents Exposed</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Brian, Kim, and one of ReliaQuest's CISOs Rick, discuss the latest news in cyber security and threat research. Topics this week include: Lockbit taken down by NCA led operation. Does this spell the end for the ransomware group?ReliaQuest research into abuse of Remote monitoring and management (RMM) toolsInsider leaks Chinese government documents on GithubResources: https://www.reliaquest.com/blog/lockbit-taken-down-what-comes-next/]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Brian, Kim, and one of ReliaQuest&apos;s CISOs Rick, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Lockbit taken down by NCA led operation. Does this spell the end for the ransomware group?</li><li>ReliaQuest research into abuse of Remote monitoring and management (RMM) tools</li><li>Insider leaks Chinese government documents on Github</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/lockbit-taken-down-what-comes-next/'>https://www.reliaquest.com/blog/lockbit-taken-down-what-comes-next/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Brian, Kim, and one of ReliaQuest&apos;s CISOs Rick, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Lockbit taken down by NCA led operation. Does this spell the end for the ransomware group?</li><li>ReliaQuest research into abuse of Remote monitoring and management (RMM) tools</li><li>Insider leaks Chinese government documents on Github</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/lockbit-taken-down-what-comes-next/'>https://www.reliaquest.com/blog/lockbit-taken-down-what-comes-next/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/14548785-weekly-lockbit-taken-down-rmm-tool-abuse-chinese-gov-t-documents-exposed.mp3" length="27918422" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14548785</guid>
    <pubDate>Wed, 21 Feb 2024 14:00:00 -0500</pubDate>
    <itunes:duration>2320</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: SocGholish, Volt Typhoon, ToothBrush DDoS&#39; and Flipper Zero</itunes:title>
    <title>Weekly: SocGholish, Volt Typhoon, ToothBrush DDoS&#39; and Flipper Zero</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Marken and Corey, discuss the latest news in cyber security and threat research. Topics this week include: ReliaQuest research into changes observed on SocGholish infection chainUpdate to Volt Typhoon campaign affecting US CNIFurore over reporting on Toothbrush smart devices reportedly used in DDoS attacksCanada bans Flipper Zero consumer hacking device, over car theft concerns Resources: https://www.reliaquest.com/blog/new-python-soc...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Marken and Corey, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>ReliaQuest research into changes observed on SocGholish infection chain</li><li>Update to Volt Typhoon campaign affecting US CNI</li><li>Furore over reporting on Toothbrush smart devices reportedly used in DDoS attacks</li><li>Canada bans Flipper Zero consumer hacking device, over car theft concerns</li></ul><p><b> Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/new-python-socgholish-infection-chain/'>https://www.reliaquest.com/blog/new-python-socgholish-infection-chain/</a></li><li><a href='https://www.reliaquest.com/blog/socgholish-fakeupdates/'>https://www.reliaquest.com/blog/socgholish-fakeupdates/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Marken and Corey, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>ReliaQuest research into changes observed on SocGholish infection chain</li><li>Update to Volt Typhoon campaign affecting US CNI</li><li>Furore over reporting on Toothbrush smart devices reportedly used in DDoS attacks</li><li>Canada bans Flipper Zero consumer hacking device, over car theft concerns</li></ul><p><b> Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/new-python-socgholish-infection-chain/'>https://www.reliaquest.com/blog/new-python-socgholish-infection-chain/</a></li><li><a href='https://www.reliaquest.com/blog/socgholish-fakeupdates/'>https://www.reliaquest.com/blog/socgholish-fakeupdates/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/14504607-weekly-socgholish-volt-typhoon-toothbrush-ddos-and-flipper-zero.mp3" length="32555908" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14504607</guid>
    <pubDate>Wed, 14 Feb 2024 14:00:00 -0500</pubDate>
    <itunes:duration>2707</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: AnyDesk Breach, Deepfake Social Engineering, Q1 2024 Priorities</itunes:title>
    <title>Weekly: AnyDesk Breach, Deepfake Social Engineering, Q1 2024 Priorities</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris Morgan is joined by ReliaQuest CISO Rick Holland, Director of Threat Research Brandon Tirado and Intelligence Collection Analyst Fearghal Hughes to discuss the latest news in cyber security and threat research. Topics this week include: Breach of Remote Desktop Application 'AnyDesk' resultsContinued Ivanti vulnerability exploitationsThe rise of BEC deepfake social engineering attacksReliaQuest's top priorities for the remainder of Q1 2024Resources: ht...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris Morgan is joined by ReliaQuest CISO Rick Holland, Director of Threat Research Brandon Tirado and Intelligence Collection Analyst Fearghal Hughes to discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Breach of Remote Desktop Application &apos;AnyDesk&apos; results</li><li>Continued Ivanti vulnerability exploitations</li><li>The rise of BEC deepfake social engineering attacks</li><li>ReliaQuest&apos;s top priorities for the remainder of Q1 2024</li></ul><p><b>Resources:</b></p><ul><li><a href='https://event.on24.com/eventRegistration/EventLobbyServlet?target=reg20.jsp&amp;eventid=4448957&amp;sessionid=1&amp;key=3FBF0E608FF3216DD9F1526D92EE5CCE&amp;groupId=5180806&amp;partnerref=website&amp;sourcepage=register'>https://event.on24.com/eventRegistration/EventLobbyServlet?target=reg20.jsp&amp;eventid=4448957&amp;sessionid=1&amp;key=3FBF0E608FF3216DD9F1526D92EE5CCE&amp;groupId=5180806&amp;partnerref=website&amp;sourcepage=register</a></li><li><a href='https://event.on24.com/wcc/r/4387339/A63BC17298406ECD68AABFFEF416702B?partnerref=organic'>https://event.on24.com/wcc/r/4387339/A63BC17298406ECD68AABFFEF416702B?partnerref=organic</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris Morgan is joined by ReliaQuest CISO Rick Holland, Director of Threat Research Brandon Tirado and Intelligence Collection Analyst Fearghal Hughes to discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Breach of Remote Desktop Application &apos;AnyDesk&apos; results</li><li>Continued Ivanti vulnerability exploitations</li><li>The rise of BEC deepfake social engineering attacks</li><li>ReliaQuest&apos;s top priorities for the remainder of Q1 2024</li></ul><p><b>Resources:</b></p><ul><li><a href='https://event.on24.com/eventRegistration/EventLobbyServlet?target=reg20.jsp&amp;eventid=4448957&amp;sessionid=1&amp;key=3FBF0E608FF3216DD9F1526D92EE5CCE&amp;groupId=5180806&amp;partnerref=website&amp;sourcepage=register'>https://event.on24.com/eventRegistration/EventLobbyServlet?target=reg20.jsp&amp;eventid=4448957&amp;sessionid=1&amp;key=3FBF0E608FF3216DD9F1526D92EE5CCE&amp;groupId=5180806&amp;partnerref=website&amp;sourcepage=register</a></li><li><a href='https://event.on24.com/wcc/r/4387339/A63BC17298406ECD68AABFFEF416702B?partnerref=organic'>https://event.on24.com/wcc/r/4387339/A63BC17298406ECD68AABFFEF416702B?partnerref=organic</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/14452885-weekly-anydesk-breach-deepfake-social-engineering-q1-2024-priorities.mp3" length="34273320" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14452885</guid>
    <pubDate>Wed, 07 Feb 2024 04:00:00 -0500</pubDate>
    <itunes:duration>2850</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Killnet 2.0, Baselining Detection Rules, Ransomware in Q4 2023</itunes:title>
    <title>Weekly: Killnet 2.0, Baselining Detection Rules, Ransomware in Q4 2023</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with James and Ivan, discuss the latest news in cyber security and threat research. Topics this week include: The emergence of Killnet 2.0 Best practices for Baselining Detection RulesInsights from ReliaQuest's Q4 2023 Ransomware blogResources: https://www.reliaquest.com/blog/q4-2023-ransomware/]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with James and Ivan, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>The emergence of Killnet 2.0 </li><li>Best practices for Baselining Detection Rules</li><li>Insights from ReliaQuest&apos;s Q4 2023 Ransomware blog</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/q4-2023-ransomware/'>https://www.reliaquest.com/blog/q4-2023-ransomware/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with James and Ivan, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>The emergence of Killnet 2.0 </li><li>Best practices for Baselining Detection Rules</li><li>Insights from ReliaQuest&apos;s Q4 2023 Ransomware blog</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/q4-2023-ransomware/'>https://www.reliaquest.com/blog/q4-2023-ransomware/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/14413533-weekly-killnet-2-0-baselining-detection-rules-ransomware-in-q4-2023.mp3" length="21328248" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14413533</guid>
    <pubDate>Wed, 31 Jan 2024 10:00:00 -0500</pubDate>
    <itunes:duration>1771</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Midnight Blizzard Targets Microsoft, Recent Attacker Techniques, Citrix NetScaler Vulnerabilities</itunes:title>
    <title>Weekly: Midnight Blizzard Targets Microsoft, Recent Attacker Techniques, Citrix NetScaler Vulnerabilities</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Corey, along with Kim and Caroline, discuss the latest news in cyber security and threat research. Topics this week include:  Midnight Blizzard Targeting Microsoft Threat research on Attacker techniques observed from Customer incidents Two new Citrix NetScaler vulnerabilities being exploited in the wildResources: https://www.reliaquest.com/blog/top-cyber-threat-techniques-q4-2023https://msrc.microsoft.com/blog/2024/01/microsoft-actions-follow...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Corey, along with Kim and Caroline, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li> Midnight Blizzard Targeting Microsoft</li><li> Threat research on Attacker techniques observed from Customer incidents</li><li> Two new Citrix NetScaler vulnerabilities being exploited in the wild</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/top-cyber-threat-techniques-q4-2023'>https://www.reliaquest.com/blog/top-cyber-threat-techniques-q4-2023</a></li><li><a href='https://msrc.microsoft.com/blog/2024/01/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard/'>https://msrc.microsoft.com/blog/2024/01/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard/</a> </li><li><a href='https://www.theregister.com/2024/01/18/citrix_netscaler_bugs_attacked/'>https://www.theregister.com/2024/01/18/citrix_netscaler_bugs_attacked/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Corey, along with Kim and Caroline, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li> Midnight Blizzard Targeting Microsoft</li><li> Threat research on Attacker techniques observed from Customer incidents</li><li> Two new Citrix NetScaler vulnerabilities being exploited in the wild</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/top-cyber-threat-techniques-q4-2023'>https://www.reliaquest.com/blog/top-cyber-threat-techniques-q4-2023</a></li><li><a href='https://msrc.microsoft.com/blog/2024/01/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard/'>https://msrc.microsoft.com/blog/2024/01/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard/</a> </li><li><a href='https://www.theregister.com/2024/01/18/citrix_netscaler_bugs_attacked/'>https://www.theregister.com/2024/01/18/citrix_netscaler_bugs_attacked/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/14369650-weekly-midnight-blizzard-targets-microsoft-recent-attacker-techniques-citrix-netscaler-vulnerabilities.mp3" length="22521745" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14369650</guid>
    <pubDate>Wed, 24 Jan 2024 12:00:00 -0500</pubDate>
    <itunes:duration>1869</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Ivanti Zero-days, Valid Account Misuse, Emerging risk from (IoT) devices</itunes:title>
    <title>Weekly: Ivanti Zero-days, Valid Account Misuse, Emerging risk from (IoT) devices</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Brian, Gjergji and ReliaQuest CISO Rick Holland, discuss the latest news in cyber security and threat research. Topics this week include: Ivanti Zero-day vulnerabilities under mass exploitationReliaQuest research into misuse of Valid Accounts Risk posed through emerging Internet of Things (IoT) devicesResources: https://forums.ivanti.com/s/article/CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Brian, Gjergji and ReliaQuest CISO Rick Holland, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Ivanti Zero-day vulnerabilities under mass exploitation</li><li>ReliaQuest research into misuse of Valid Accounts </li><li>Risk posed through emerging Internet of Things (IoT) devices</li></ul><p><b>Resources:</b></p><ul><li><a href='https://forums.ivanti.com/s/article/CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US'>https://forums.ivanti.com/s/article/CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US</a> </li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Brian, Gjergji and ReliaQuest CISO Rick Holland, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Ivanti Zero-day vulnerabilities under mass exploitation</li><li>ReliaQuest research into misuse of Valid Accounts </li><li>Risk posed through emerging Internet of Things (IoT) devices</li></ul><p><b>Resources:</b></p><ul><li><a href='https://forums.ivanti.com/s/article/CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US'>https://forums.ivanti.com/s/article/CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US</a> </li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/14328796-weekly-ivanti-zero-days-valid-account-misuse-emerging-risk-from-iot-devices.mp3" length="29029742" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14328796</guid>
    <pubDate>Wed, 17 Jan 2024 14:00:00 -0500</pubDate>
    <itunes:duration>2414</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Cyber Threats Developments of 2023, Lockbit Targets Healthcare</itunes:title>
    <title>Weekly: Cyber Threats Developments of 2023, Lockbit Targets Healthcare</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Marken and Fearghal, discuss the latest news in cyber security and threat research.  Topics this week include: A recap of major developments in 2023: Ransomware, Business Email Compromise, Living off the land (LotL)The influence of Generative AI on cyber threatsLockbit targeting healthcare providers in Germany]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Marken and Fearghal, discuss the latest news in cyber security and threat research.  Topics this week include:</p><ul><li>A recap of major developments in 2023: Ransomware, Business Email Compromise, Living off the land (LotL)</li><li>The influence of Generative AI on cyber threats</li><li>Lockbit targeting healthcare providers in Germany</li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Marken and Fearghal, discuss the latest news in cyber security and threat research.  Topics this week include:</p><ul><li>A recap of major developments in 2023: Ransomware, Business Email Compromise, Living off the land (LotL)</li><li>The influence of Generative AI on cyber threats</li><li>Lockbit targeting healthcare providers in Germany</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/14286622-weekly-cyber-threats-developments-of-2023-lockbit-targets-healthcare.mp3" length="24115165" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14286622</guid>
    <pubDate>Wed, 10 Jan 2024 13:00:00 -0500</pubDate>
    <itunes:duration>2006</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: 2023 in Review, ALPHV Targeted by FBI, Predictions for 2024</itunes:title>
    <title>Weekly: 2023 in Review, ALPHV Targeted by FBI, Predictions for 2024</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Rick and Kim, discuss the latest news in cyber security and threat research.  Topics this week include: ALPHV targeted in law enforcement operationA look back at major events from the previous 12 monthsPredictions for the cyber threat landscape in 2024'Expense in depth' and maximising investmentsResources: https://www.reliaquest.com/blog/double-extortion-attack-analysis/https://www.reliaquest.com/blog/alphv-ransomware-site-outage/&nbs...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Rick and Kim, discuss the latest news in cyber security and threat research.  Topics this week include:</p><ul><li>ALPHV targeted in law enforcement operation</li><li>A look back at major events from the previous 12 months</li><li>Predictions for the cyber threat landscape in 2024</li><li>&apos;Expense in depth&apos; and maximising investments</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/double-extortion-attack-analysis/'>https://www.reliaquest.com/blog/double-extortion-attack-analysis/</a></li><li><a href='https://www.reliaquest.com/blog/alphv-ransomware-site-outage/'>https://www.reliaquest.com/blog/alphv-ransomware-site-outage/</a> </li><li><a href='https://www.justice.gov/media/1329536/dl?inline=&amp;utm_medium=email&amp;utm_source=govdelivery'>https://www.justice.gov/media/1329536/dl?inline=&amp;utm_medium=email&amp;utm_source=govdelivery</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Rick and Kim, discuss the latest news in cyber security and threat research.  Topics this week include:</p><ul><li>ALPHV targeted in law enforcement operation</li><li>A look back at major events from the previous 12 months</li><li>Predictions for the cyber threat landscape in 2024</li><li>&apos;Expense in depth&apos; and maximising investments</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/double-extortion-attack-analysis/'>https://www.reliaquest.com/blog/double-extortion-attack-analysis/</a></li><li><a href='https://www.reliaquest.com/blog/alphv-ransomware-site-outage/'>https://www.reliaquest.com/blog/alphv-ransomware-site-outage/</a> </li><li><a href='https://www.justice.gov/media/1329536/dl?inline=&amp;utm_medium=email&amp;utm_source=govdelivery'>https://www.justice.gov/media/1329536/dl?inline=&amp;utm_medium=email&amp;utm_source=govdelivery</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/14182107-weekly-2023-in-review-alphv-targeted-by-fbi-predictions-for-2024.mp3" length="34883417" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14182107</guid>
    <pubDate>Wed, 20 Dec 2023 14:00:00 -0500</pubDate>
    <itunes:duration>2900</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: BYOVD Report, Log4Shell Two Years Later, ALPHV Site Outage, Delaying SEC Disclosures</itunes:title>
    <title>Weekly: BYOVD Report, Log4Shell Two Years Later, ALPHV Site Outage, Delaying SEC Disclosures</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Corey Carter, along with ReliaQuest CISO Rick Holland and Gjergji Paco, discuss the latest news in cyber security and threat research.  Topics this week include: An overview of a ReliaQuest report on a sophisticated incident involving a technique known as Bring Your Own Vulnerable Driver (BYOVD).ALPHV ransomware site outage rumored to be caused by law enforcement.Apps vulnerable to Log4Shell still being exploited by Advanced Persistence Threats.FBI rel...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Corey Carter, along with ReliaQuest CISO Rick Holland and Gjergji Paco, discuss the latest news in cyber security and threat research.  Topics this week include:</p><ul><li>An overview of a ReliaQuest report on a sophisticated incident involving a technique known as Bring Your Own Vulnerable Driver (BYOVD).</li><li>ALPHV ransomware site outage rumored to be caused by law enforcement.</li><li>Apps vulnerable to Log4Shell still being exploited by Advanced Persistence Threats.</li><li>FBI releases policy notice that informs cyber victims how they can request to delay public disclosures to the Securities and Exchange Commission.</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.sonatype.com/resources/log4j-vulnerability-resource-center'>https://www.sonatype.com/resources/log4j-vulnerability-resource-center</a></li><li><a href='https://blog.talosintelligence.com/lazarus_new_rats_dlang_and_telegram/'>https://blog.talosintelligence.com/lazarus_new_rats_dlang_and_telegram/</a></li><li><a href='https://www.reliaquest.com/blog/alphv-ransomware-site-outage/'>https://www.reliaquest.com/blog/alphv-ransomware-site-outage/</a></li><li><a href='https://www.fbi.gov/file-repository/fbi-policy-notice-120623.pdf/view'>https://www.fbi.gov/file-repository/fbi-policy-notice-120623.pdf/view</a></li><li><a href='https://www.kovrr.com/blog-post/cybersecurity-legal-and-financial-experts-share-their-reactions-to-the-secs-latest-cyber-disclosure-regulations'>https://www.kovrr.com/blog-post/cybersecurity-legal-and-financial-experts-share-their-reactions-to-the-secs-latest-cyber-disclosure-regulations</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Corey Carter, along with ReliaQuest CISO Rick Holland and Gjergji Paco, discuss the latest news in cyber security and threat research.  Topics this week include:</p><ul><li>An overview of a ReliaQuest report on a sophisticated incident involving a technique known as Bring Your Own Vulnerable Driver (BYOVD).</li><li>ALPHV ransomware site outage rumored to be caused by law enforcement.</li><li>Apps vulnerable to Log4Shell still being exploited by Advanced Persistence Threats.</li><li>FBI releases policy notice that informs cyber victims how they can request to delay public disclosures to the Securities and Exchange Commission.</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.sonatype.com/resources/log4j-vulnerability-resource-center'>https://www.sonatype.com/resources/log4j-vulnerability-resource-center</a></li><li><a href='https://blog.talosintelligence.com/lazarus_new_rats_dlang_and_telegram/'>https://blog.talosintelligence.com/lazarus_new_rats_dlang_and_telegram/</a></li><li><a href='https://www.reliaquest.com/blog/alphv-ransomware-site-outage/'>https://www.reliaquest.com/blog/alphv-ransomware-site-outage/</a></li><li><a href='https://www.fbi.gov/file-repository/fbi-policy-notice-120623.pdf/view'>https://www.fbi.gov/file-repository/fbi-policy-notice-120623.pdf/view</a></li><li><a href='https://www.kovrr.com/blog-post/cybersecurity-legal-and-financial-experts-share-their-reactions-to-the-secs-latest-cyber-disclosure-regulations'>https://www.kovrr.com/blog-post/cybersecurity-legal-and-financial-experts-share-their-reactions-to-the-secs-latest-cyber-disclosure-regulations</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/14142354-weekly-byovd-report-log4shell-two-years-later-alphv-site-outage-delaying-sec-disclosures.mp3" length="25833412" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14142354</guid>
    <pubDate>Wed, 13 Dec 2023 13:00:00 -0500</pubDate>
    <itunes:duration>2147</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Ransomware Targeting ESXi, Threats to Airline Organizations, CNI Impacted</itunes:title>
    <title>Weekly: Ransomware Targeting ESXi, Threats to Airline Organizations, CNI Impacted</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Caroline and James, discuss the latest news in cyber security and threat research. Topics this week include: Ransomware groups increasingly targeting ESXiCyber Threats to the Airline industryIncidents affecting CNI in the US, UK, and IsraelResources: https://www.gov.uk/government/news/response-to-a-news-report-on-cyber-security-at-sellafieldhttps://www.cshub.com/attacks/news/lockbit-hackers-publish-43gb-of-stolen-boeing-data-following-cybe...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Caroline and James, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Ransomware groups increasingly targeting ESXi</li><li>Cyber Threats to the Airline industry</li><li>Incidents affecting CNI in the US, UK, and Israel</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.gov.uk/government/news/response-to-a-news-report-on-cyber-security-at-sellafield'>https://www.gov.uk/government/news/response-to-a-news-report-on-cyber-security-at-sellafield</a></li><li><a href='https://www.cshub.com/attacks/news/lockbit-hackers-publish-43gb-of-stolen-boeing-data-following-cyber-attack'>https://www.cshub.com/attacks/news/lockbit-hackers-publish-43gb-of-stolen-boeing-data-following-cyber-attack</a></li><li><a href='https://www.theregister.com/2023/11/29/water_authority_ciso_iran/'>https://www.theregister.com/2023/11/29/water_authority_ciso_iran/</a></li><li><a href='https://www.bleepingcomputer.com/news/security/linux-version-of-qilin-ransomware-focuses-on-vmware-esxi/'>https://www.bleepingcomputer.com/news/security/linux-version-of-qilin-ransomware-focuses-on-vmware-esxi/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Caroline and James, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Ransomware groups increasingly targeting ESXi</li><li>Cyber Threats to the Airline industry</li><li>Incidents affecting CNI in the US, UK, and Israel</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.gov.uk/government/news/response-to-a-news-report-on-cyber-security-at-sellafield'>https://www.gov.uk/government/news/response-to-a-news-report-on-cyber-security-at-sellafield</a></li><li><a href='https://www.cshub.com/attacks/news/lockbit-hackers-publish-43gb-of-stolen-boeing-data-following-cyber-attack'>https://www.cshub.com/attacks/news/lockbit-hackers-publish-43gb-of-stolen-boeing-data-following-cyber-attack</a></li><li><a href='https://www.theregister.com/2023/11/29/water_authority_ciso_iran/'>https://www.theregister.com/2023/11/29/water_authority_ciso_iran/</a></li><li><a href='https://www.bleepingcomputer.com/news/security/linux-version-of-qilin-ransomware-focuses-on-vmware-esxi/'>https://www.bleepingcomputer.com/news/security/linux-version-of-qilin-ransomware-focuses-on-vmware-esxi/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/14101991-weekly-ransomware-targeting-esxi-threats-to-airline-organizations-cni-impacted.mp3" length="21351549" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14101991</guid>
    <pubDate>Wed, 06 Dec 2023 15:00:00 -0500</pubDate>
    <itunes:duration>1772</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: EDR Pitfalls, Okta Intrusion Update, Secure AI Guidelines, Expired Google Cookies</itunes:title>
    <title>Weekly: EDR Pitfalls, Okta Intrusion Update, Secure AI Guidelines, Expired Google Cookies</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Corey, along with Rick, Marken, and James, discuss the latest news in cyber security and threat research.   Topics this week include: An overview of ReliaQuest's latest report covering EDR Pitfalls and Best Practices.Latest updates to Okta's Support Case Management System intrusion that occurred in October.Discussion on guidelines released for secure AI system development by CISA and UK NCSC.Infostealers making headlines after allegedly being able...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Corey, along with Rick, Marken, and James, discuss the latest news in cyber security and threat research. <br/> Topics this week include:</p><ul><li>An overview of ReliaQuest&apos;s latest report covering EDR Pitfalls and Best Practices.</li><li>Latest updates to Okta&apos;s Support Case Management System intrusion that occurred in October.</li><li>Discussion on guidelines released for secure AI system development by CISA and UK NCSC.</li><li>Infostealers making headlines after allegedly being able to restore expired Google cookies.</li></ul><p> </p><p><b>Resources:</b></p><p>Okta&apos;s Support Case Management System Intrusion Update-<br/><a href='https://sec.okta.com/harfiles'>https://sec.okta.com/harfiles</a></p><p>Proactive Defense: Positioning your IR Team for Success webinar-<br/><a href='https://event.on24.com/wcc/r/4388361/F9C6D55AEEB34F33683F29973F48D174?partnerref=shadowtalk'>https://event.on24.com/wcc/r/4388361/F9C6D55AEEB34F33683F29973F48D174?partnerref=shadowtalk</a></p><p> CISA and UK NCSC Joint Guidelines-<br/><a href='https://www.cisa.gov/news-events/alerts/2023/11/26/cisa-and-uk-ncsc-unveil-joint-guidelines-secure-ai-system-development'>https://www.cisa.gov/news-events/alerts/2023/11/26/cisa-and-uk-ncsc-unveil-joint-guidelines-secure-ai-system-development</a></p><p> Scattered Spider Blog-<br/><a href='https://www.reliaquest.com/blog/scattered-spider-attack-analysis-account-compromise/'>https://www.reliaquest.com/blog/scattered-spider-attack-analysis-account-compromise/</a></p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Corey, along with Rick, Marken, and James, discuss the latest news in cyber security and threat research. <br/> Topics this week include:</p><ul><li>An overview of ReliaQuest&apos;s latest report covering EDR Pitfalls and Best Practices.</li><li>Latest updates to Okta&apos;s Support Case Management System intrusion that occurred in October.</li><li>Discussion on guidelines released for secure AI system development by CISA and UK NCSC.</li><li>Infostealers making headlines after allegedly being able to restore expired Google cookies.</li></ul><p> </p><p><b>Resources:</b></p><p>Okta&apos;s Support Case Management System Intrusion Update-<br/><a href='https://sec.okta.com/harfiles'>https://sec.okta.com/harfiles</a></p><p>Proactive Defense: Positioning your IR Team for Success webinar-<br/><a href='https://event.on24.com/wcc/r/4388361/F9C6D55AEEB34F33683F29973F48D174?partnerref=shadowtalk'>https://event.on24.com/wcc/r/4388361/F9C6D55AEEB34F33683F29973F48D174?partnerref=shadowtalk</a></p><p> CISA and UK NCSC Joint Guidelines-<br/><a href='https://www.cisa.gov/news-events/alerts/2023/11/26/cisa-and-uk-ncsc-unveil-joint-guidelines-secure-ai-system-development'>https://www.cisa.gov/news-events/alerts/2023/11/26/cisa-and-uk-ncsc-unveil-joint-guidelines-secure-ai-system-development</a></p><p> Scattered Spider Blog-<br/><a href='https://www.reliaquest.com/blog/scattered-spider-attack-analysis-account-compromise/'>https://www.reliaquest.com/blog/scattered-spider-attack-analysis-account-compromise/</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/14058655-weekly-edr-pitfalls-okta-intrusion-update-secure-ai-guidelines-expired-google-cookies.mp3" length="31549948" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14058655</guid>
    <pubDate>Wed, 29 Nov 2023 15:00:00 -0500</pubDate>
    <itunes:duration>2626</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: ALPHV SEC Complaint, Scattered Spider Case Study, Sandworm Attacks</itunes:title>
    <title>Weekly: ALPHV SEC Complaint, Scattered Spider Case Study, Sandworm Attacks</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Ivan, along with Brandon and Colin discuss the latest news in cyber security and threat research. Topics this week include: AlphaV filing a complaint with the SECReliaQuest case study on the Scattered Spider attackSandworm hacker group conducts "largest ever" attack on Danish infrastructureResources: https://www.reliaquest.com/blog/scattered-spider-attack-analysis-account-compromise/]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Ivan, along with Brandon and Colin discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>AlphaV filing a complaint with the SEC</li><li>ReliaQuest case study on the Scattered Spider attack</li><li>Sandworm hacker group conducts &quot;largest ever&quot; attack on Danish infrastructure</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/scattered-spider-attack-analysis-account-compromise/'>https://www.reliaquest.com/blog/scattered-spider-attack-analysis-account-compromise/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Ivan, along with Brandon and Colin discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>AlphaV filing a complaint with the SEC</li><li>ReliaQuest case study on the Scattered Spider attack</li><li>Sandworm hacker group conducts &quot;largest ever&quot; attack on Danish infrastructure</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/scattered-spider-attack-analysis-account-compromise/'>https://www.reliaquest.com/blog/scattered-spider-attack-analysis-account-compromise/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/14020163-weekly-alphv-sec-complaint-scattered-spider-case-study-sandworm-attacks.mp3" length="23559285" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14020163</guid>
    <pubDate>Wed, 22 Nov 2023 13:00:00 -0500</pubDate>
    <itunes:duration>1955</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: CitrixBleed, Taking a Proactive Approach to IR, BiBi wiper targets Israeli Organizations</itunes:title>
    <title>Weekly: CitrixBleed, Taking a Proactive Approach to IR, BiBi wiper targets Israeli Organizations</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Kim, discuss the latest news in cyber security and threat research. Topics this week include: CitrixBleed vulnerability mass targeted by threat actorsTaking the burden from incidents responders by taking proactive stepsHacktivists targeting Israeli organizations with "BiBi" data wiping malware Resources:   https://www.reliaquest.com/blog/citrix-bleed-vulnerability-background-and-recommendations/ ]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Kim, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>CitrixBleed vulnerability mass targeted by threat actors</li><li>Taking the burden from incidents responders by taking proactive steps</li><li>Hacktivists targeting Israeli organizations with &quot;BiBi&quot; data wiping malware</li></ul><p><br/><b>Resources:</b><br/><br/> <a href='https://www.reliaquest.com/blog/citrix-bleed-vulnerability-background-and-recommendations/'>https://www.reliaquest.com/blog/citrix-bleed-vulnerability-background-and-recommendations/</a></p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Kim, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>CitrixBleed vulnerability mass targeted by threat actors</li><li>Taking the burden from incidents responders by taking proactive steps</li><li>Hacktivists targeting Israeli organizations with &quot;BiBi&quot; data wiping malware</li></ul><p><br/><b>Resources:</b><br/><br/> <a href='https://www.reliaquest.com/blog/citrix-bleed-vulnerability-background-and-recommendations/'>https://www.reliaquest.com/blog/citrix-bleed-vulnerability-background-and-recommendations/</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13979138-weekly-citrixbleed-taking-a-proactive-approach-to-ir-bibi-wiper-targets-israeli-organizations.mp3" length="21281770" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13979138</guid>
    <pubDate>Wed, 15 Nov 2023 13:00:00 -0500</pubDate>
    <itunes:duration>1770</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Apache ActiveMQ and Atlassian Confluence, SEC files charges, QR code phishing</itunes:title>
    <title>Weekly: Apache ActiveMQ and Atlassian Confluence, SEC files charges, QR code phishing</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Ivan Righi, along with ReliaQuest's CISO Rick Holland and Detection Researcher Marken Teder, discuss the latest news in cyber security and threat research. Topics this week include: Apache ActiveMQ vulnerability (CVE-2023-46604) exploited by ransomware gangsDiscussion over charges filed by the US SEC against SolarWindsActive exploitation of a Critical Atlassian Confluence flaw (CVE-2023-22518)An overview of QR code phishing threatsResources: https://event.o...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Ivan Righi, along with ReliaQuest&apos;s CISO Rick Holland and Detection Researcher Marken Teder, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Apache ActiveMQ vulnerability (CVE-2023-46604) exploited by ransomware gangs</li><li>Discussion over charges filed by the US SEC against SolarWinds</li><li>Active exploitation of a Critical Atlassian Confluence flaw (CVE-2023-22518)</li><li>An overview of QR code phishing threats</li></ul><p><b>Resources:</b></p><ul><li><a href='https://event.on24.com/wcc/r/4387339/A63BC17298406ECD68AABFFEF416702B?partnerref=organic'>https://event.on24.com/wcc/r/4387339/A63BC17298406ECD68AABFFEF416702B?partnerref=organic</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Ivan Righi, along with ReliaQuest&apos;s CISO Rick Holland and Detection Researcher Marken Teder, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Apache ActiveMQ vulnerability (CVE-2023-46604) exploited by ransomware gangs</li><li>Discussion over charges filed by the US SEC against SolarWinds</li><li>Active exploitation of a Critical Atlassian Confluence flaw (CVE-2023-22518)</li><li>An overview of QR code phishing threats</li></ul><p><b>Resources:</b></p><ul><li><a href='https://event.on24.com/wcc/r/4387339/A63BC17298406ECD68AABFFEF416702B?partnerref=organic'>https://event.on24.com/wcc/r/4387339/A63BC17298406ECD68AABFFEF416702B?partnerref=organic</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13935377-weekly-apache-activemq-and-atlassian-confluence-sec-files-charges-qr-code-phishing.mp3" length="25845446" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13935377</guid>
    <pubDate>Wed, 08 Nov 2023 14:00:00 -0500</pubDate>
    <itunes:duration>2150</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: SolarWinds SEC Charges, Vulnerabilities Roundup, AI Executive Order</itunes:title>
    <title>Weekly: SolarWinds SEC Charges, Vulnerabilities Roundup, AI Executive Order</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Kim, along with Caroline and Corey, discuss the latest news in cyber security and threat research. Topics this week include: The charges filed by the US SEC against SolarWindsA sneak-peak of the findings from our Vulnerabilities Roundup blogAn overview of some vulnerabilities impacting users right nowThe Executive Order issued by the Biden administration on artificial intelligence.  ]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Kim, along with Caroline and Corey, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>The charges filed by the US SEC against SolarWinds</li><li>A sneak-peak of the findings from our Vulnerabilities Roundup blog</li><li>An overview of some vulnerabilities impacting users right now</li><li>The Executive Order issued by the Biden administration on artificial intelligence.</li></ul><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Kim, along with Caroline and Corey, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>The charges filed by the US SEC against SolarWinds</li><li>A sneak-peak of the findings from our Vulnerabilities Roundup blog</li><li>An overview of some vulnerabilities impacting users right now</li><li>The Executive Order issued by the Biden administration on artificial intelligence.</li></ul><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13895597-weekly-solarwinds-sec-charges-vulnerabilities-roundup-ai-executive-order.mp3" length="24106333" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13895597</guid>
    <pubDate>Thu, 02 Nov 2023 10:00:00 -0400</pubDate>
    <itunes:duration>2003</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Q3 Ransomware Report, ServiceNow Vulnerability, Okta Incident</itunes:title>
    <title>Weekly: Q3 Ransomware Report, ServiceNow Vulnerability, Okta Incident</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, Host Chris Morgan is joined by one of ReliaQuest's CISO's Rick Holland, Threat Hunter Brian Kelly and Threat Intelligence Analyst Ivan Righi to discuss the latest news in cyber security and threat research. Topics this week include: The findings of ReliaQuest's Quarterly Ransomware Report recapping Q3 2023 activity. ServiceNow vulnerability and what it means for youThe latest on a security incident pertaining to authentication provider, Okta.Resources: http...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, Host Chris Morgan is joined by one of ReliaQuest&apos;s CISO&apos;s Rick Holland, Threat Hunter Brian Kelly and Threat Intelligence Analyst Ivan Righi to discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>The findings of ReliaQuest&apos;s Quarterly Ransomware Report recapping Q3 2023 activity.</li><li> ServiceNow vulnerability and what it means for you</li><li>The latest on a security incident pertaining to authentication provider, Okta.</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/ransomware-trends-q3-2023/'>https://www.reliaquest.com/blog/ransomware-trends-q3-2023/</a></li></ul><p><br/></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, Host Chris Morgan is joined by one of ReliaQuest&apos;s CISO&apos;s Rick Holland, Threat Hunter Brian Kelly and Threat Intelligence Analyst Ivan Righi to discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>The findings of ReliaQuest&apos;s Quarterly Ransomware Report recapping Q3 2023 activity.</li><li> ServiceNow vulnerability and what it means for you</li><li>The latest on a security incident pertaining to authentication provider, Okta.</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/ransomware-trends-q3-2023/'>https://www.reliaquest.com/blog/ransomware-trends-q3-2023/</a></li></ul><p><br/></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13846048-weekly-q3-ransomware-report-servicenow-vulnerability-okta-incident.mp3" length="25447755" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13846048</guid>
    <pubDate>Thu, 26 Oct 2023 05:00:00 -0400</pubDate>
    <itunes:duration>2116</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Critical CISCO IOS XE Vuln, Business Email Compromise (BEC) activity, malicious use of Discord</itunes:title>
    <title>Weekly: Critical CISCO IOS XE Vuln, Business Email Compromise (BEC) activity, malicious use of Discord</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Kim and Gjergji, discuss the latest news in cyber security and threat research. Topics this week include: Threat actors exploiting Critical CISCO IOS XE Vuln Increase in Business Email Compromise (BEC) activitySocial media platform Discord being used for malicious activity]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Kim and Gjergji, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Threat actors exploiting Critical CISCO IOS XE Vuln </li><li>Increase in Business Email Compromise (BEC) activity</li><li>Social media platform Discord being used for malicious activity</li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Kim and Gjergji, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Threat actors exploiting Critical CISCO IOS XE Vuln </li><li>Increase in Business Email Compromise (BEC) activity</li><li>Social media platform Discord being used for malicious activity</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13816335-weekly-critical-cisco-ios-xe-vuln-business-email-compromise-bec-activity-malicious-use-of-discord.mp3" length="31393942" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13816335</guid>
    <pubDate>Fri, 20 Oct 2023 14:00:00 -0400</pubDate>
    <itunes:duration>2613</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Hamas Cyber Threat Implications, Top Adversary Techniques, Qakbot</itunes:title>
    <title>Weekly: Hamas Cyber Threat Implications, Top Adversary Techniques, Qakbot</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris Morgan, along with ReliaQuest CISO Rick Holland, James Xiang and Caroline Fenstermacher, discuss the latest news in cyber security and threat research. Topics this week include: Cyber threat implications from the Hamas - Israel ConflictTop Adversary Techniques: What We're Seeing Right NowHas Qakbot returned? Resources: https://www.reliaquest.com/blog/iranian-cyber-threats-practical-advice-for-security-professionals/]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris Morgan, along with ReliaQuest CISO Rick Holland, James Xiang and Caroline Fenstermacher, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Cyber threat implications from the Hamas - Israel Conflict</li><li>Top Adversary Techniques: What We&apos;re Seeing Right Now</li><li>Has Qakbot returned? </li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/iranian-cyber-threats-practical-advice-for-security-professionals/'>https://www.reliaquest.com/blog/iranian-cyber-threats-practical-advice-for-security-professionals/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris Morgan, along with ReliaQuest CISO Rick Holland, James Xiang and Caroline Fenstermacher, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Cyber threat implications from the Hamas - Israel Conflict</li><li>Top Adversary Techniques: What We&apos;re Seeing Right Now</li><li>Has Qakbot returned? </li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/iranian-cyber-threats-practical-advice-for-security-professionals/'>https://www.reliaquest.com/blog/iranian-cyber-threats-practical-advice-for-security-professionals/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13772441-weekly-hamas-cyber-threat-implications-top-adversary-techniques-qakbot.mp3" length="26146546" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13772441</guid>
    <pubDate>Fri, 13 Oct 2023 11:00:00 -0400</pubDate>
    <itunes:duration>2172</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: National Cyber Security Awareness Month (NCSAM), Progress FTP Server, RDP Sessions, IronNet</itunes:title>
    <title>Weekly: National Cyber Security Awareness Month (NCSAM), Progress FTP Server, RDP Sessions, IronNet</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris Morgan, along with ReliaQuest CISO Rick Holland and Corey Carter discuss the latest news in cyber security and threat research. Topics this week include: 2023 National Cyber Security Awareness Month (NCSAM) Progress FTP ServerThe risk posed by open Remote Desktop Protocol (RDP) SessionsIronNet ceasure operationsResources:  https://www.reliaquest.com/blog/cybersecurity-awareness-automation/ https://www.reliaquest.com/blog/israel-hamas-im...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris Morgan, along with ReliaQuest CISO Rick Holland and Corey Carter discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>2023 National Cyber Security Awareness Month (NCSAM) </li><li>Progress FTP Server</li><li>The risk posed by open Remote Desktop Protocol (RDP) Sessions</li><li>IronNet ceasure operations</li></ul><p><b>Resources:</b></p><ul><li> <a href='https://www.reliaquest.com/blog/cybersecurity-awareness-automation/'>https://www.reliaquest.com/blog/cybersecurity-awareness-automation/</a> </li><li><a href='https://www.reliaquest.com/blog/israel-hamas-implications-for-cyber-threats/'>https://www.reliaquest.com/blog/israel-hamas-implications-for-cyber-threats/</a> </li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris Morgan, along with ReliaQuest CISO Rick Holland and Corey Carter discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>2023 National Cyber Security Awareness Month (NCSAM) </li><li>Progress FTP Server</li><li>The risk posed by open Remote Desktop Protocol (RDP) Sessions</li><li>IronNet ceasure operations</li></ul><p><b>Resources:</b></p><ul><li> <a href='https://www.reliaquest.com/blog/cybersecurity-awareness-automation/'>https://www.reliaquest.com/blog/cybersecurity-awareness-automation/</a> </li><li><a href='https://www.reliaquest.com/blog/israel-hamas-implications-for-cyber-threats/'>https://www.reliaquest.com/blog/israel-hamas-implications-for-cyber-threats/</a> </li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13729739-weekly-national-cyber-security-awareness-month-ncsam-progress-ftp-server-rdp-sessions-ironnet.mp3" length="26534836" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13729739</guid>
    <pubDate>Fri, 06 Oct 2023 12:00:00 -0400</pubDate>
    <itunes:duration>2205</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Hunting for MFA bypass techniques, Libwebp Vuln exploited, VMWare ESXi </itunes:title>
    <title>Weekly: Hunting for MFA bypass techniques, Libwebp Vuln exploited, VMWare ESXi </title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Gjergji and James, discuss the latest news in cyber security and threat research. Topics this week include: Hunting for MFA bypass techniquesExploitation of a Zero-day LibWebP VulnerabilityThreat actors targeting VMWare ESXIResources: https://www.reliaquest.com/blog/mfa-bypass-techniques/#:~:text=Attackers%20also%20bypass%20MFA%20by,for%20sale%20on%20cybercriminal%20platforms.  ]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Gjergji and James, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Hunting for MFA bypass techniques</li><li>Exploitation of a Zero-day LibWebP Vulnerability</li><li>Threat actors targeting VMWare ESXI</li></ul><p>Resources:</p><p><a href='https://www.reliaquest.com/blog/mfa-bypass-techniques/#:~:text=Attackers%20also%20bypass%20MFA%20by,for%20sale%20on%20cybercriminal%20platforms.'>https://www.reliaquest.com/blog/mfa-bypass-techniques/#:~:text=Attackers%20also%20bypass%20MFA%20by,for%20sale%20on%20cybercriminal%20platforms.</a> </p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Gjergji and James, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Hunting for MFA bypass techniques</li><li>Exploitation of a Zero-day LibWebP Vulnerability</li><li>Threat actors targeting VMWare ESXI</li></ul><p>Resources:</p><p><a href='https://www.reliaquest.com/blog/mfa-bypass-techniques/#:~:text=Attackers%20also%20bypass%20MFA%20by,for%20sale%20on%20cybercriminal%20platforms.'>https://www.reliaquest.com/blog/mfa-bypass-techniques/#:~:text=Attackers%20also%20bypass%20MFA%20by,for%20sale%20on%20cybercriminal%20platforms.</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13686193-weekly-hunting-for-mfa-bypass-techniques-libwebp-vuln-exploited-vmware-esxi.mp3" length="21424872" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13686193</guid>
    <pubDate>Fri, 29 Sep 2023 11:00:00 -0400</pubDate>
    <itunes:duration>1782</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: MFA Bypass Techniques, Microsoft Data Leak, Latest ALPHV Attack</itunes:title>
    <title>Weekly: MFA Bypass Techniques, Microsoft Data Leak, Latest ALPHV Attack</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Kim, along with Caroline and Brian, discuss the latest news in cyber security and threat research. Topics this week include: A deep dive into popular MFA bypass techniques and how to mitigate themHow a misconfigured SAS token led to a big Microsoft data breachThe latest ALPHV ransomware attackResources: https://www.reliaquest.com/blog/domain-redirection-attacks-wrong-turns-in-cyberspace/]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Kim, along with Caroline and Brian, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>A deep dive into popular MFA bypass techniques and how to mitigate them</li><li>How a misconfigured SAS token led to a big Microsoft data breach</li><li>The latest ALPHV ransomware attack</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/domain-redirection-attacks-wrong-turns-in-cyberspace/'>https://www.reliaquest.com/blog/domain-redirection-attacks-wrong-turns-in-cyberspace/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Kim, along with Caroline and Brian, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>A deep dive into popular MFA bypass techniques and how to mitigate them</li><li>How a misconfigured SAS token led to a big Microsoft data breach</li><li>The latest ALPHV ransomware attack</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/domain-redirection-attacks-wrong-turns-in-cyberspace/'>https://www.reliaquest.com/blog/domain-redirection-attacks-wrong-turns-in-cyberspace/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13636287-weekly-mfa-bypass-techniques-microsoft-data-leak-latest-alphv-attack.mp3" length="19821725" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13636287</guid>
    <pubDate>Fri, 22 Sep 2023 04:00:00 -0400</pubDate>
    <itunes:duration>1646</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Anonymous Sudan, Domain Redirection Attacks, UK Ransomware Report and Managed Engine Zero-Day Exploit</itunes:title>
    <title>Weekly: Anonymous Sudan, Domain Redirection Attacks, UK Ransomware Report and Managed Engine Zero-Day Exploit</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host and ReliaQuest CISO Rick Holand and ReliaQuest Threat Research team members Corey Carter and Gjergji Paco discuss the latest news in cyber security and threat research. Topics this week include:  A deep dive on domain redirection attacksNew ransomware report from the UK governmentNew Managed Engine zero-day exploited by multiple threat actorsAnonymous Sudan Telegram bans and DDoS attacks.Resources: https://www.ncsc.gov.uk/whitepaper/ransomware-extortio...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host and ReliaQuest CISO Rick Holand and ReliaQuest Threat Research team members Corey Carter and Gjergji Paco discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li> A deep dive on domain redirection attacks</li><li>New ransomware report from the UK government</li><li>New Managed Engine zero-day exploited by multiple threat actors</li><li>Anonymous Sudan Telegram bans and DDoS attacks.</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.ncsc.gov.uk/whitepaper/ransomware-extortion-and-the-cyber-crime-ecosystem'>https://www.ncsc.gov.uk/whitepaper/ransomware-extortion-and-the-cyber-crime-ecosystem</a></li><li><a href='https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-250a'>https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-250a</a></li><li><a href='https://www.reliaquest.com/blog/5-macos-infostealers/'>https://www.reliaquest.com/blog/5-macos-infostealers/</a></li><li><a href='https://www.reliaquest.com/blog/cisos-guide-six-steps-to-start-adopting-ai/'>https://www.reliaquest.com/blog/cisos-guide-six-steps-to-start-adopting-ai/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host and ReliaQuest CISO Rick Holand and ReliaQuest Threat Research team members Corey Carter and Gjergji Paco discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li> A deep dive on domain redirection attacks</li><li>New ransomware report from the UK government</li><li>New Managed Engine zero-day exploited by multiple threat actors</li><li>Anonymous Sudan Telegram bans and DDoS attacks.</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.ncsc.gov.uk/whitepaper/ransomware-extortion-and-the-cyber-crime-ecosystem'>https://www.ncsc.gov.uk/whitepaper/ransomware-extortion-and-the-cyber-crime-ecosystem</a></li><li><a href='https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-250a'>https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-250a</a></li><li><a href='https://www.reliaquest.com/blog/5-macos-infostealers/'>https://www.reliaquest.com/blog/5-macos-infostealers/</a></li><li><a href='https://www.reliaquest.com/blog/cisos-guide-six-steps-to-start-adopting-ai/'>https://www.reliaquest.com/blog/cisos-guide-six-steps-to-start-adopting-ai/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13593508-weekly-anonymous-sudan-domain-redirection-attacks-uk-ransomware-report-and-managed-engine-zero-day-exploit.mp3" length="25013381" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13593508</guid>
    <pubDate>Thu, 14 Sep 2023 16:00:00 -0400</pubDate>
    <itunes:duration>2081</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: SocGhoulish deep dive, AI security concerns, LockBit vs. UK MOD</itunes:title>
    <title>Weekly: SocGhoulish deep dive, AI security concerns, LockBit vs. UK MOD</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Roman, along with Corey and Ivan, discuss the latest news in cyber security and threat research. Topics this week include: A deep dive of malware loader SocGhoulishArtificial intelligence: implications, security concerns, and use by cybercriminalsLockBit leaking top secret information from the UK’s Ministry of DefenceResources:  https://www.reliaquest.com/blog/the-3-malware-loaders-behind-80-of-incidentshttps://www.reliaquest.com/blog/socgholish-fakeup...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Roman, along with Corey and Ivan, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>A deep dive of malware loader SocGhoulish</li><li>Artificial intelligence: implications, security concerns, and use by cybercriminals</li><li>LockBit leaking top secret information from the UK’s Ministry of Defence</li></ul><p>Resources: </p><ul><li><a href='https://www.reliaquest.com/blog/the-3-malware-loaders-behind-80-of-incidents/'>https://www.reliaquest.com/blog/the-3-malware-loaders-behind-80-of-incidents</a></li><li><a href='https://www.reliaquest.com/blog/socgholish-fakeupdates/'>https://www.reliaquest.com/blog/socgholish-fakeupdates</a></li><li><a href='https://www.reliaquest.com/blog/lockbit-ransomware-2023/'>https://www.reliaquest.com/blog/lockbit-ransomware-2023</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Roman, along with Corey and Ivan, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>A deep dive of malware loader SocGhoulish</li><li>Artificial intelligence: implications, security concerns, and use by cybercriminals</li><li>LockBit leaking top secret information from the UK’s Ministry of Defence</li></ul><p>Resources: </p><ul><li><a href='https://www.reliaquest.com/blog/the-3-malware-loaders-behind-80-of-incidents/'>https://www.reliaquest.com/blog/the-3-malware-loaders-behind-80-of-incidents</a></li><li><a href='https://www.reliaquest.com/blog/socgholish-fakeupdates/'>https://www.reliaquest.com/blog/socgholish-fakeupdates</a></li><li><a href='https://www.reliaquest.com/blog/lockbit-ransomware-2023/'>https://www.reliaquest.com/blog/lockbit-ransomware-2023</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13549674-weekly-socghoulish-deep-dive-ai-security-concerns-lockbit-vs-uk-mod.mp3" length="24812708" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13549674</guid>
    <pubDate>Fri, 08 Sep 2023 04:00:00 -0400</pubDate>
    <itunes:duration>2064</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Qakbot Takedown, New Barracuda Zero-Day, Resurgence of Hacktivism</itunes:title>
    <title>Weekly: Qakbot Takedown, New Barracuda Zero-Day, Resurgence of Hacktivism</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris Morgan, along with ReliaQuest CISO Rick Holland and Gjergji Paco, discuss the latest news in cyber security and threat research. Topics this week include: The FBI operation targeting Qakbot infrastructureBarracuda Zero-Day targeted by Peoples Republic of China (PRC) aligned actorsThe resurgence and future of Hacktivism]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris Morgan, along with ReliaQuest CISO Rick Holland and Gjergji Paco, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>The FBI operation targeting Qakbot infrastructure</li><li>Barracuda Zero-Day targeted by Peoples Republic of China (PRC) aligned actors</li><li>The resurgence and future of Hacktivism</li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris Morgan, along with ReliaQuest CISO Rick Holland and Gjergji Paco, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>The FBI operation targeting Qakbot infrastructure</li><li>Barracuda Zero-Day targeted by Peoples Republic of China (PRC) aligned actors</li><li>The resurgence and future of Hacktivism</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13513135-weekly-qakbot-takedown-new-barracuda-zero-day-resurgence-of-hacktivism.mp3" length="28769689" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13513135</guid>
    <pubDate>Fri, 01 Sep 2023 13:00:00 -0400</pubDate>
    <itunes:duration>2392</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Malware Loaders, Ransomware Runbooks, Generative AI and Barracuda ESG</itunes:title>
    <title>Weekly: Malware Loaders, Ransomware Runbooks, Generative AI and Barracuda ESG</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Dean Murphy, along with one of ReliaQuest's CISO's Rick Holland and Threat Hunter Brian Kelly, discuss the latest news in cyber security and threat research. Topics this week include: Malware LoadersRansomware Runbooks Generative AI Barracuda ESG - Zero-DayResources: https://www.reliaquest.com/blog/lockbit-ransomware-2023/https://analyst1.com/ransomware-diaries-volume-1/https://www.bleepingcomputer.com/news/security/angry-conti-ransomware-affiliat...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Dean Murphy, along with one of ReliaQuest&apos;s CISO&apos;s Rick Holland and Threat Hunter Brian Kelly, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Malware Loaders</li><li>Ransomware Runbooks </li><li>Generative AI </li><li>Barracuda ESG - Zero-Day</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/lockbit-ransomware-2023/'>https://www.reliaquest.com/blog/lockbit-ransomware-2023/</a></li><li><a href='https://analyst1.com/ransomware-diaries-volume-1/'>https://analyst1.com/ransomware-diaries-volume-1/</a></li><li><a href='https://www.bleepingcomputer.com/news/security/angry-conti-ransomware-affiliate-leaks-gangs-attack-playbook/'>https://www.bleepingcomputer.com/news/security/angry-conti-ransomware-affiliate-leaks-gangs-attack-playbook/</a></li><li><a href='https://www.reliaquest.com/news-and-press/reliaquest-adds-ai-capabilities-to-greymatter-intelligent-analysis/'>https://www.reliaquest.com/news-and-press/reliaquest-adds-ai-capabilities-to-greymatter-intelligent-analysis/</a></li><li><a href='https://www.reliaquest.com/blog/understanding-generative-ai-in-cybersecurity/'>https://www.reliaquest.com/blog/understanding-generative-ai-in-cybersecurity/</a></li><li><a href='https://www.reliaquest.com/blog/intersection-generative-ai-cybersecurity/'>https://www.reliaquest.com/blog/intersection-generative-ai-cybersecurity/</a></li><li><a href='https://www.mandiant.com/resources/blog/threat-actors-generative-ai-limited'>https://www.mandiant.com/resources/blog/threat-actors-generative-ai-limited</a></li><li><a href='https://www.ic3.gov/Media/News/2023/230823.pdf'>https://www.ic3.gov/Media/News/2023/230823.pdf</a> </li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Dean Murphy, along with one of ReliaQuest&apos;s CISO&apos;s Rick Holland and Threat Hunter Brian Kelly, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Malware Loaders</li><li>Ransomware Runbooks </li><li>Generative AI </li><li>Barracuda ESG - Zero-Day</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/lockbit-ransomware-2023/'>https://www.reliaquest.com/blog/lockbit-ransomware-2023/</a></li><li><a href='https://analyst1.com/ransomware-diaries-volume-1/'>https://analyst1.com/ransomware-diaries-volume-1/</a></li><li><a href='https://www.bleepingcomputer.com/news/security/angry-conti-ransomware-affiliate-leaks-gangs-attack-playbook/'>https://www.bleepingcomputer.com/news/security/angry-conti-ransomware-affiliate-leaks-gangs-attack-playbook/</a></li><li><a href='https://www.reliaquest.com/news-and-press/reliaquest-adds-ai-capabilities-to-greymatter-intelligent-analysis/'>https://www.reliaquest.com/news-and-press/reliaquest-adds-ai-capabilities-to-greymatter-intelligent-analysis/</a></li><li><a href='https://www.reliaquest.com/blog/understanding-generative-ai-in-cybersecurity/'>https://www.reliaquest.com/blog/understanding-generative-ai-in-cybersecurity/</a></li><li><a href='https://www.reliaquest.com/blog/intersection-generative-ai-cybersecurity/'>https://www.reliaquest.com/blog/intersection-generative-ai-cybersecurity/</a></li><li><a href='https://www.mandiant.com/resources/blog/threat-actors-generative-ai-limited'>https://www.mandiant.com/resources/blog/threat-actors-generative-ai-limited</a></li><li><a href='https://www.ic3.gov/Media/News/2023/230823.pdf'>https://www.ic3.gov/Media/News/2023/230823.pdf</a> </li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13466203-weekly-malware-loaders-ransomware-runbooks-generative-ai-and-barracuda-esg.mp3" length="20429961" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13466203</guid>
    <pubDate>Fri, 25 Aug 2023 04:00:00 -0400</pubDate>
    <itunes:duration>1698</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: DefCon, Cl0p, Raccoon Stealer</itunes:title>
    <title>Weekly: DefCon, Cl0p, Raccoon Stealer</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with one of Brandon and Gjergji, discuss the latest news in cyber security and threat research. Topics this week include: Recap of DefCon conferenceThe latest updates regarding Clop's exploitation of MOVEit zero-dayThe return of the infamous Raccoon Stealer]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with one of Brandon and Gjergji, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Recap of DefCon conference</li><li>The latest updates regarding Clop&apos;s exploitation of MOVEit zero-day</li><li>The return of the infamous Raccoon Stealer</li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with one of Brandon and Gjergji, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Recap of DefCon conference</li><li>The latest updates regarding Clop&apos;s exploitation of MOVEit zero-day</li><li>The return of the infamous Raccoon Stealer</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13428880-weekly-defcon-cl0p-raccoon-stealer.mp3" length="23428335" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13428880</guid>
    <pubDate>Fri, 18 Aug 2023 10:00:00 -0400</pubDate>
    <itunes:duration>1949</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: AI at BlackHat, Device Code Phishing, Russia-Ukraine War Trends and DEF CON Tips</itunes:title>
    <title>Weekly: AI at BlackHat, Device Code Phishing, Russia-Ukraine War Trends and DEF CON Tips</title>
    <itunes:summary><![CDATA[In this episode, one of ReliaQuest's CISO's Rick Holland is joined by threat hunters Colin Ferris and Caroline Fenstermacher to discuss the presence of AI at BlackHat, Device Code Phishing, trends from the Russia-Ukraine War and lastly how to make the most of a visit to DEF CON. ]]></itunes:summary>
    <description><![CDATA[<p>In this episode, one of ReliaQuest&apos;s CISO&apos;s Rick Holland is joined by threat hunters Colin Ferris and Caroline Fenstermacher to discuss the presence of AI at BlackHat, Device Code Phishing, trends from the Russia-Ukraine War and lastly how to make the most of a visit to DEF CON.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, one of ReliaQuest&apos;s CISO&apos;s Rick Holland is joined by threat hunters Colin Ferris and Caroline Fenstermacher to discuss the presence of AI at BlackHat, Device Code Phishing, trends from the Russia-Ukraine War and lastly how to make the most of a visit to DEF CON.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13386938-weekly-ai-at-blackhat-device-code-phishing-russia-ukraine-war-trends-and-def-con-tips.mp3" length="23771877" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13386938</guid>
    <pubDate>Fri, 11 Aug 2023 04:00:00 -0400</pubDate>
    <itunes:duration>1978</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: CISO Chat Live from BlackHat 2023</itunes:title>
    <title>Special: CISO Chat Live from BlackHat 2023</title>
    <itunes:summary><![CDATA[In this episode, one of ReliaQuest's CISO's Rick Holland and Chief Technology Officer Joe Partlow are joined by Freeport LNG CISO, Todd Beebe and Ciena CISO Ryan Hammer to discuss all things BlackHat 2023. ]]></itunes:summary>
    <description><![CDATA[<p>In this episode, one of ReliaQuest&apos;s CISO&apos;s Rick Holland and Chief Technology Officer Joe Partlow are joined by Freeport LNG CISO, Todd Beebe and Ciena CISO Ryan Hammer to discuss all things BlackHat 2023.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, one of ReliaQuest&apos;s CISO&apos;s Rick Holland and Chief Technology Officer Joe Partlow are joined by Freeport LNG CISO, Todd Beebe and Ciena CISO Ryan Hammer to discuss all things BlackHat 2023.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13383393-special-ciso-chat-live-from-blackhat-2023.mp3" length="10490836" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13383393</guid>
    <pubDate>Thu, 10 Aug 2023 11:00:00 -0400</pubDate>
    <itunes:duration>872</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Business Email Compromise (BEC), ReliaQuest Bi-Annual threat reports, influence of AI on the Cyber Threat Landscape</itunes:title>
    <title>Weekly: Business Email Compromise (BEC), ReliaQuest Bi-Annual threat reports, influence of AI on the Cyber Threat Landscape</title>
    <itunes:summary><![CDATA[ In this episode of ShadowTalk, host Chris, along with one of ReliaQuest's CISOs Rick, and James, discuss the latest news in cyber security and threat research. Topics this week include: Themes in recent Business Email Compromise (BEC) activityA breakdown of ReliaQuest research into threats facing the Professional, Scientific, and Technical Services (PSTS) sectorThe influence of AI on the cyber threat landscape ReliaQuest activities at BlackHat 2023 conference]]></itunes:summary>
    <description><![CDATA[<p><b> </b>In this episode of ShadowTalk, host Chris, along with one of ReliaQuest&apos;s CISOs Rick, and James, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Themes in recent Business Email Compromise (BEC) activity</li><li>A breakdown of ReliaQuest research into threats facing the Professional, Scientific, and Technical Services (PSTS) sector</li><li>The influence of AI on the cyber threat landscape </li><li>ReliaQuest activities at BlackHat 2023 conference</li></ul>]]></description>
    <content:encoded><![CDATA[<p><b> </b>In this episode of ShadowTalk, host Chris, along with one of ReliaQuest&apos;s CISOs Rick, and James, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Themes in recent Business Email Compromise (BEC) activity</li><li>A breakdown of ReliaQuest research into threats facing the Professional, Scientific, and Technical Services (PSTS) sector</li><li>The influence of AI on the cyber threat landscape </li><li>ReliaQuest activities at BlackHat 2023 conference</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13350779-weekly-business-email-compromise-bec-reliaquest-bi-annual-threat-reports-influence-of-ai-on-the-cyber-threat-landscape.mp3" length="29015502" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13350779</guid>
    <pubDate>Fri, 04 Aug 2023 15:00:00 -0400</pubDate>
    <itunes:duration>2415</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: What We&#39;re Seeing Right Now, Cl0p Cycle Continues, Ivanti Zero-Day, ALPHV API</itunes:title>
    <title>Weekly: What We&#39;re Seeing Right Now, Cl0p Cycle Continues, Ivanti Zero-Day, ALPHV API</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Roman, along with Ivan and Brandon, discuss the latest news in cyber security and threat research. Topics this week include: Twitter becoming X security concernsCl0p names 71 new victimsReliaQuest releases Q2 ransomware reportHackers target Norwegian government ministries with Ivanti zero-day exploitALPHV ransomware group creates API key for its data leak siteResources: https://www.bleepingcomputer.com/news/security/norway-says-ivanti-zero-day-was-used-to-h...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Roman, along with Ivan and Brandon, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Twitter becoming X security concerns</li><li>Cl0p names 71 new victims</li><li>ReliaQuest releases Q2 ransomware report</li><li>Hackers target Norwegian government ministries with Ivanti zero-day exploit</li><li>ALPHV ransomware group creates API key for its data leak site</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.bleepingcomputer.com/news/security/norway-says-ivanti-zero-day-was-used-to-hack-govt-it-systems/'>https://www.bleepingcomputer.com/news/security/norway-says-ivanti-zero-day-was-used-to-hack-govt-it-systems/</a></li><li><a href='https://www.bleepingcomputer.com/news/security/alphv-ransomware-adds-data-leak-api-in-new-extortion-strategy/'>https://www.bleepingcomputer.com/news/security/alphv-ransomware-adds-data-leak-api-in-new-extortion-strategy/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Roman, along with Ivan and Brandon, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Twitter becoming X security concerns</li><li>Cl0p names 71 new victims</li><li>ReliaQuest releases Q2 ransomware report</li><li>Hackers target Norwegian government ministries with Ivanti zero-day exploit</li><li>ALPHV ransomware group creates API key for its data leak site</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.bleepingcomputer.com/news/security/norway-says-ivanti-zero-day-was-used-to-hack-govt-it-systems/'>https://www.bleepingcomputer.com/news/security/norway-says-ivanti-zero-day-was-used-to-hack-govt-it-systems/</a></li><li><a href='https://www.bleepingcomputer.com/news/security/alphv-ransomware-adds-data-leak-api-in-new-extortion-strategy/'>https://www.bleepingcomputer.com/news/security/alphv-ransomware-adds-data-leak-api-in-new-extortion-strategy/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13301247-weekly-what-we-re-seeing-right-now-cl0p-cycle-continues-ivanti-zero-day-alphv-api.mp3" length="22062558" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13301247</guid>
    <pubDate>Fri, 28 Jul 2023 09:00:00 -0400</pubDate>
    <itunes:duration>1834</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: What We&#39;re Seeing Right Now, Cl0p Update, WormGPT</itunes:title>
    <title>Weekly: What We&#39;re Seeing Right Now, Cl0p Update, WormGPT</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Brian and James, discuss the latest news in cyber security and threat research. Topics this week include: ReliaQuest research into common attacker techniquesAn update on Clop's exploitation of the MOVEit vulnerability ChatGPT rival with ‘no ethical boundaries’ sold on dark webResources: https://www.reliaquest.com/blog/top-adversary-techniques-july-2023/https://www.reliaquest.com/blog/clop-leaks-first-victims/https://www.zdnet.com/arti...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Brian and James, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>ReliaQuest research into common attacker techniques</li><li>An update on Clop&apos;s exploitation of the MOVEit vulnerability </li><li>ChatGPT rival with ‘no ethical boundaries’ sold on dark web</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/top-adversary-techniques-july-2023/'>https://www.reliaquest.com/blog/top-adversary-techniques-july-2023/</a></li><li><a href='https://www.reliaquest.com/blog/clop-leaks-first-victims/'>https://www.reliaquest.com/blog/clop-leaks-first-victims/</a></li><li><a href='https://www.zdnet.com/article/wormgpt-what-to-know-about-chatgpts-malicious-cousin/'>https://www.zdnet.com/article/wormgpt-what-to-know-about-chatgpts-malicious-cousin/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Brian and James, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>ReliaQuest research into common attacker techniques</li><li>An update on Clop&apos;s exploitation of the MOVEit vulnerability </li><li>ChatGPT rival with ‘no ethical boundaries’ sold on dark web</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/top-adversary-techniques-july-2023/'>https://www.reliaquest.com/blog/top-adversary-techniques-july-2023/</a></li><li><a href='https://www.reliaquest.com/blog/clop-leaks-first-victims/'>https://www.reliaquest.com/blog/clop-leaks-first-victims/</a></li><li><a href='https://www.zdnet.com/article/wormgpt-what-to-know-about-chatgpts-malicious-cousin/'>https://www.zdnet.com/article/wormgpt-what-to-know-about-chatgpts-malicious-cousin/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13259461-weekly-what-we-re-seeing-right-now-cl0p-update-wormgpt.mp3" length="15591612" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13259461</guid>
    <pubDate>Fri, 21 Jul 2023 04:00:00 -0400</pubDate>
    <itunes:duration>1295</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Microsoft Cloud Breach, Strava App, Cl0p Update and Remote Management Monitoring</itunes:title>
    <title>Weekly: Microsoft Cloud Breach, Strava App, Cl0p Update and Remote Management Monitoring</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Dean Murphy, one of ReliaQuests CISO's Rick Holland and threat research teamers Colin Ferris and Gjergji Paco discuss the latest news in cyber security and threat research. Topics this week include: Chinese hackers breach Microsoft CloudStrava App – Tracked and KilledCl0p UpdateRemote Monitoring and Management Software – RMM Resources: https://www.cnn.com/2023/07/11/europe/russian-submarine-commander-killed-krasnador-intl/index.htmlhttps://www.telegraph.co....]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Dean Murphy, one of ReliaQuests CISO&apos;s Rick Holland and threat research teamers Colin Ferris and Gjergji Paco discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Chinese hackers breach Microsoft Cloud</li><li>Strava App – Tracked and Killed</li><li>Cl0p Update</li><li>Remote Monitoring and Management Software – RMM</li></ul><p><br/><b>Resources:</b></p><ul><li><a href='https://www.cnn.com/2023/07/11/europe/russian-submarine-commander-killed-krasnador-intl/index.html'>https://www.cnn.com/2023/07/11/europe/russian-submarine-commander-killed-krasnador-intl/index.html</a></li><li><a href='https://www.telegraph.co.uk/news/2023/07/11/russian-submarine-commander-shot-strava-krasnodar-vinnytsia/'>https://www.telegraph.co.uk/news/2023/07/11/russian-submarine-commander-shot-strava-krasnodar-vinnytsia/</a></li><li><a href='https://jsac.jpcert.or.jp/archive/2023/pdf/JSAC2023_1_1_yamashige-nakatani-tanaka_en.pdf'>https://jsac.jpcert.or.jp/archive/2023/pdf/JSAC2023_1_1_yamashige-nakatani-tanaka_en.pdf</a></li><li><a href='https://www.reliaquest.com/blog/clop-leaks-first-victims/'>https://www.reliaquest.com/blog/clop-leaks-first-victims/</a></li><li><a href='https://www.cisa.gov/sites/default/files/2023-07/aa23-193a_joint_csa_enhanced_monitoring_to_detect_apt_activity_targeting_outlook_online.pdf'>https://www.cisa.gov/sites/default/files/2023-07/aa23-193a_joint_csa_enhanced_monitoring_to_detect_apt_activity_targeting_outlook_online.pdf</a></li><li><a href='https://www.washingtonpost.com/national-security/2023/07/12/microsoft-hack-china/'>https://www.washingtonpost.com/national-security/2023/07/12/microsoft-hack-china/</a></li><li><a href='https://blogs.microsoft.com/on-the-issues/2023/07/11/mitigation-china-based-threat-actor/'>https://blogs.microsoft.com/on-the-issues/2023/07/11/mitigation-china-based-threat-actor/</a></li><li><a href='https://www.whitehouse.gov/briefing-room/statements-releases/2023/07/13/fact-sheet-biden-harrisadministration-publishes-thenational-cybersecurity-strategyimplementation-plan/'>https://www.whitehouse.gov/briefing-room/statements-releases/2023/07/13/fact-sheet-biden-harrisadministration-publishes-thenational-cybersecurity-strategyimplementation-plan/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Dean Murphy, one of ReliaQuests CISO&apos;s Rick Holland and threat research teamers Colin Ferris and Gjergji Paco discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Chinese hackers breach Microsoft Cloud</li><li>Strava App – Tracked and Killed</li><li>Cl0p Update</li><li>Remote Monitoring and Management Software – RMM</li></ul><p><br/><b>Resources:</b></p><ul><li><a href='https://www.cnn.com/2023/07/11/europe/russian-submarine-commander-killed-krasnador-intl/index.html'>https://www.cnn.com/2023/07/11/europe/russian-submarine-commander-killed-krasnador-intl/index.html</a></li><li><a href='https://www.telegraph.co.uk/news/2023/07/11/russian-submarine-commander-shot-strava-krasnodar-vinnytsia/'>https://www.telegraph.co.uk/news/2023/07/11/russian-submarine-commander-shot-strava-krasnodar-vinnytsia/</a></li><li><a href='https://jsac.jpcert.or.jp/archive/2023/pdf/JSAC2023_1_1_yamashige-nakatani-tanaka_en.pdf'>https://jsac.jpcert.or.jp/archive/2023/pdf/JSAC2023_1_1_yamashige-nakatani-tanaka_en.pdf</a></li><li><a href='https://www.reliaquest.com/blog/clop-leaks-first-victims/'>https://www.reliaquest.com/blog/clop-leaks-first-victims/</a></li><li><a href='https://www.cisa.gov/sites/default/files/2023-07/aa23-193a_joint_csa_enhanced_monitoring_to_detect_apt_activity_targeting_outlook_online.pdf'>https://www.cisa.gov/sites/default/files/2023-07/aa23-193a_joint_csa_enhanced_monitoring_to_detect_apt_activity_targeting_outlook_online.pdf</a></li><li><a href='https://www.washingtonpost.com/national-security/2023/07/12/microsoft-hack-china/'>https://www.washingtonpost.com/national-security/2023/07/12/microsoft-hack-china/</a></li><li><a href='https://blogs.microsoft.com/on-the-issues/2023/07/11/mitigation-china-based-threat-actor/'>https://blogs.microsoft.com/on-the-issues/2023/07/11/mitigation-china-based-threat-actor/</a></li><li><a href='https://www.whitehouse.gov/briefing-room/statements-releases/2023/07/13/fact-sheet-biden-harrisadministration-publishes-thenational-cybersecurity-strategyimplementation-plan/'>https://www.whitehouse.gov/briefing-room/statements-releases/2023/07/13/fact-sheet-biden-harrisadministration-publishes-thenational-cybersecurity-strategyimplementation-plan/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13218175-weekly-microsoft-cloud-breach-strava-app-cl0p-update-and-remote-management-monitoring.mp3" length="27895397" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13218175</guid>
    <pubDate>Fri, 14 Jul 2023 04:00:00 -0400</pubDate>
    <itunes:duration>2320</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Defense Evasion via Virtualization, LockBit target TSMC, CISA Identify New Exploited Vulnerabilities</itunes:title>
    <title>Weekly: Defense Evasion via Virtualization, LockBit target TSMC, CISA Identify New Exploited Vulnerabilities</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris Morgan, along with Corey Carter, Jonny Elrod, Gjergji Paco, and one of ReliaQuests CISO's Rick Holland, discuss the latest news in cyber security and threat research. Topics this week include: Threat actors obfuscating activity through virtualizationLockBit claim to have impacted Taiwanese semiconductor giant TSMCCISA identify new exploited vulnerabilitiesNew critical vulnerability impacting Fortinet, FortiOS and FortiProxy SSL-VPN appliancesResources...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris Morgan, along with Corey Carter, Jonny Elrod, Gjergji Paco, and one of ReliaQuests CISO&apos;s Rick Holland, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Threat actors obfuscating activity through virtualization</li><li>LockBit claim to have impacted Taiwanese semiconductor giant TSMC</li><li>CISA identify new exploited vulnerabilities</li><li>New critical vulnerability impacting Fortinet, FortiOS and FortiProxy SSL-VPN appliances</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/virtual-machines-defense-evasion/'>https://www.reliaquest.com/blog/virtual-machines-defense-evasion/</a></li><li><a href='https://www.bleepingcomputer.com/news/security/cisa-orders-govt-agencies-to-patch-bugs-exploited-by-russian-hackers/'>https://www.bleepingcomputer.com/news/security/cisa-orders-govt-agencies-to-patch-bugs-exploited-by-russian-hackers/</a></li><li><a href='https://thehackernews.com/2023/07/alert-330000-fortigate-firewalls-still.html'>https://thehackernews.com/2023/07/alert-330000-fortigate-firewalls-still.html</a></li><li><a href='https://www.scmagazine.com/brief/ransomware/tsmc-discloses-data-breach-from-lockbit-claimed-attack-against-third-party'>https://www.scmagazine.com/brief/ransomware/tsmc-discloses-data-breach-from-lockbit-claimed-attack-against-third-party</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris Morgan, along with Corey Carter, Jonny Elrod, Gjergji Paco, and one of ReliaQuests CISO&apos;s Rick Holland, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Threat actors obfuscating activity through virtualization</li><li>LockBit claim to have impacted Taiwanese semiconductor giant TSMC</li><li>CISA identify new exploited vulnerabilities</li><li>New critical vulnerability impacting Fortinet, FortiOS and FortiProxy SSL-VPN appliances</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/virtual-machines-defense-evasion/'>https://www.reliaquest.com/blog/virtual-machines-defense-evasion/</a></li><li><a href='https://www.bleepingcomputer.com/news/security/cisa-orders-govt-agencies-to-patch-bugs-exploited-by-russian-hackers/'>https://www.bleepingcomputer.com/news/security/cisa-orders-govt-agencies-to-patch-bugs-exploited-by-russian-hackers/</a></li><li><a href='https://thehackernews.com/2023/07/alert-330000-fortigate-firewalls-still.html'>https://thehackernews.com/2023/07/alert-330000-fortigate-firewalls-still.html</a></li><li><a href='https://www.scmagazine.com/brief/ransomware/tsmc-discloses-data-breach-from-lockbit-claimed-attack-against-third-party'>https://www.scmagazine.com/brief/ransomware/tsmc-discloses-data-breach-from-lockbit-claimed-attack-against-third-party</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13179274-weekly-defense-evasion-via-virtualization-lockbit-target-tsmc-cisa-identify-new-exploited-vulnerabilities.mp3" length="23901313" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13179274</guid>
    <pubDate>Fri, 07 Jul 2023 10:00:00 -0400</pubDate>
    <itunes:duration>1988</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Legal Developments, New APT29 Campaign and ReliaQuest&#39;s Annual Threat Report   </itunes:title>
    <title>Weekly: Legal Developments, New APT29 Campaign and ReliaQuest&#39;s Annual Threat Report   </title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Stefano, along with Kim Bromley, and one of ReliaQuests CISO's Rick Holland, discuss the latest news in cyber security and threat research. Topics this week include: The SEC reportedly charging SolarWinds executivesAPT29 hunting for credentialsOur new, shiny Annual Threat ReportResources: https://www.reuters.com/technology/solarwinds-executives-receive-wells-notice-us-sec-2023-06-23/https://www.scmagazine.com/brief/identity-and-access/apt29-intensifies-cred...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Stefano, along with Kim Bromley, and one of ReliaQuests CISO&apos;s Rick Holland, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>The SEC reportedly charging SolarWinds executives</li><li>APT29 hunting for credentials</li><li>Our new, shiny Annual Threat Report</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reuters.com/technology/solarwinds-executives-receive-wells-notice-us-sec-2023-06-23/'>https://www.reuters.com/technology/solarwinds-executives-receive-wells-notice-us-sec-2023-06-23/</a></li><li><a href='https://www.scmagazine.com/brief/identity-and-access/apt29-intensifies-credential-stealing-attacks'>https://www.scmagazine.com/brief/identity-and-access/apt29-intensifies-credential-stealing-attacks</a></li><li><a href='https://www.reliaquest.com/resources/research-reports/annual-threat-report/'>https://www.reliaquest.com/resources/research-reports/annual-threat-report/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Stefano, along with Kim Bromley, and one of ReliaQuests CISO&apos;s Rick Holland, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>The SEC reportedly charging SolarWinds executives</li><li>APT29 hunting for credentials</li><li>Our new, shiny Annual Threat Report</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reuters.com/technology/solarwinds-executives-receive-wells-notice-us-sec-2023-06-23/'>https://www.reuters.com/technology/solarwinds-executives-receive-wells-notice-us-sec-2023-06-23/</a></li><li><a href='https://www.scmagazine.com/brief/identity-and-access/apt29-intensifies-credential-stealing-attacks'>https://www.scmagazine.com/brief/identity-and-access/apt29-intensifies-credential-stealing-attacks</a></li><li><a href='https://www.reliaquest.com/resources/research-reports/annual-threat-report/'>https://www.reliaquest.com/resources/research-reports/annual-threat-report/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13132894-weekly-legal-developments-new-apt29-campaign-and-reliaquest-s-annual-threat-report.mp3" length="20528792" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13132894</guid>
    <pubDate>Fri, 30 Jun 2023 04:00:00 -0400</pubDate>
    <itunes:duration>1707</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Cl0p update, Killnet target European financial institutions, closed sources findings</itunes:title>
    <title>Weekly: Cl0p update, Killnet target European financial institutions, closed sources findings</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Dani, and one of ReliaQuests CISO's Rick Holland, discuss the latest news in cyber security and threat research. Topics this week include: The latest updates related to Cl0p's exploitation of MOVEit zero-dayKillnet targeting European financial institutionsInsights drawn from our closed sources teamThe team's observations on this years InfoSec conferenceResources: https://www.reliaquest.com/blog/clop-leaks-first-victims/ https://techmo...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Dani, and one of ReliaQuests CISO&apos;s Rick Holland, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>The latest updates related to Cl0p&apos;s exploitation of MOVEit zero-day</li><li>Killnet targeting European financial institutions</li><li>Insights drawn from our closed sources team</li><li>The team&apos;s observations on this years InfoSec conference</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/clop-leaks-first-victims/'>https://www.reliaquest.com/blog/clop-leaks-first-victims/</a> </li><li><a href='https://techmonitor.ai/technology/cybersecurity/killnet-revil-and-anonymous-threaten-swift-with-destructive-attack-in-48-hours'>https://techmonitor.ai/technology/cybersecurity/killnet-revil-and-anonymous-threaten-swift-with-destructive-attack-in-48-hours</a> </li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Dani, and one of ReliaQuests CISO&apos;s Rick Holland, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>The latest updates related to Cl0p&apos;s exploitation of MOVEit zero-day</li><li>Killnet targeting European financial institutions</li><li>Insights drawn from our closed sources team</li><li>The team&apos;s observations on this years InfoSec conference</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/clop-leaks-first-victims/'>https://www.reliaquest.com/blog/clop-leaks-first-victims/</a> </li><li><a href='https://techmonitor.ai/technology/cybersecurity/killnet-revil-and-anonymous-threaten-swift-with-destructive-attack-in-48-hours'>https://techmonitor.ai/technology/cybersecurity/killnet-revil-and-anonymous-threaten-swift-with-destructive-attack-in-48-hours</a> </li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13091407-weekly-cl0p-update-killnet-target-european-financial-institutions-closed-sources-findings.mp3" length="30440583" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13091407</guid>
    <pubDate>Fri, 23 Jun 2023 04:00:00 -0400</pubDate>
    <itunes:duration>2533</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Cl0p releases company names, Gootloader, new Fortinet RCE, Ukrainians hackers take down Infotel.</itunes:title>
    <title>Weekly: Cl0p releases company names, Gootloader, new Fortinet RCE, Ukrainians hackers take down Infotel.</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Colin and Caroline, discuss the latest news in cyber security and threat research. Topics this week include: The latest updates related to Clop's exploitation of MOVEit zero-dayAn overview of the Gootloader initial access malwareFortinet RCE CVE-2023-27997Ukraine's Cyber Anarchy Squad take down InfotelResources: https://www.reliaquest.com/blog/clop-leaks-first-victims/https://www.scmagazine.com/news/device-security/fortinet-patches-critica...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Colin and Caroline, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>The latest updates related to Clop&apos;s exploitation of MOVEit zero-day</li><li>An overview of the Gootloader initial access malware</li><li>Fortinet RCE CVE-2023-27997</li><li>Ukraine&apos;s Cyber Anarchy Squad take down Infotel</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/clop-leaks-first-victims/'>https://www.reliaquest.com/blog/clop-leaks-first-victims/</a></li><li><a href='https://www.scmagazine.com/news/device-security/fortinet-patches-critical-rce-fortigate-ssl-vpn-appliances'>https://www.scmagazine.com/news/device-security/fortinet-patches-critical-rce-fortigate-ssl-vpn-appliances</a></li><li><a href='https://www.bleepingcomputer.com/news/security/ukrainian-hackers-take-down-service-provider-for-russian-banks/'>https://www.bleepingcomputer.com/news/security/ukrainian-hackers-take-down-service-provider-for-russian-banks/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Colin and Caroline, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>The latest updates related to Clop&apos;s exploitation of MOVEit zero-day</li><li>An overview of the Gootloader initial access malware</li><li>Fortinet RCE CVE-2023-27997</li><li>Ukraine&apos;s Cyber Anarchy Squad take down Infotel</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/clop-leaks-first-victims/'>https://www.reliaquest.com/blog/clop-leaks-first-victims/</a></li><li><a href='https://www.scmagazine.com/news/device-security/fortinet-patches-critical-rce-fortigate-ssl-vpn-appliances'>https://www.scmagazine.com/news/device-security/fortinet-patches-critical-rce-fortigate-ssl-vpn-appliances</a></li><li><a href='https://www.bleepingcomputer.com/news/security/ukrainian-hackers-take-down-service-provider-for-russian-banks/'>https://www.bleepingcomputer.com/news/security/ukrainian-hackers-take-down-service-provider-for-russian-banks/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13068938-weekly-cl0p-releases-company-names-gootloader-new-fortinet-rce-ukrainians-hackers-take-down-infotel.mp3" length="23494048" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13068938</guid>
    <pubDate>Mon, 19 Jun 2023 16:00:00 -0400</pubDate>
    <itunes:duration>1954</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: MOVEit Zero-day and Cl0p attribution, Infostealing ecosystem, DBIR 2023 Report</itunes:title>
    <title>Weekly: MOVEit Zero-day and Cl0p attribution, Infostealing ecosystem, DBIR 2023 Report</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Stefano, along with Rick, Dean, and Ivan, discuss the latest news in cyber security and threat research. Topics this week include: What you need to know on the MOVEit Zero-day vulnerability and the latest Cl0p updates Infostealers ecosystem: most common malware, impact, and mitigation strategiesKey insights from the latest Verizon's DBIR issueResources: https://www.reliaquest.com/blog/moveit-vulnerability-update-clop-claims-responsibility/ https:/...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Stefano, along with Rick, Dean, and Ivan, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>What you need to know on the MOVEit Zero-day vulnerability and the latest Cl0p updates </li><li>Infostealers ecosystem: most common malware, impact, and mitigation strategies</li><li>Key insights from the latest Verizon&apos;s DBIR issue</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/moveit-vulnerability-update-clop-claims-responsibility/'>https://www.reliaquest.com/blog/moveit-vulnerability-update-clop-claims-responsibility/</a> </li><li><a href='https://www.verizon.com/business/resources/reports/dbir/'>https://www.verizon.com/business/resources/reports/dbir/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Stefano, along with Rick, Dean, and Ivan, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>What you need to know on the MOVEit Zero-day vulnerability and the latest Cl0p updates </li><li>Infostealers ecosystem: most common malware, impact, and mitigation strategies</li><li>Key insights from the latest Verizon&apos;s DBIR issue</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/moveit-vulnerability-update-clop-claims-responsibility/'>https://www.reliaquest.com/blog/moveit-vulnerability-update-clop-claims-responsibility/</a> </li><li><a href='https://www.verizon.com/business/resources/reports/dbir/'>https://www.verizon.com/business/resources/reports/dbir/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/13008562-weekly-moveit-zero-day-and-cl0p-attribution-infostealing-ecosystem-dbir-2023-report.mp3" length="23407834" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13008562</guid>
    <pubDate>Fri, 09 Jun 2023 10:00:00 -0400</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/2154459/13008562/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Intro" />
  <psc:chapter start="1:40" title="MOVEit &amp; Cl0p" />
  <psc:chapter start="13:45" title="Infostealers" />
  <psc:chapter start="26:30" title="DBIR Report" />
</psc:chapters>
    <itunes:duration>1947</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: MOVEit Zero-day, RaidForums Breach, Buhti Ransomware</itunes:title>
    <title>Weekly: MOVEit Zero-day, RaidForums Breach, Buhti Ransomware</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris, along with Gjergji and Ivan, discuss the latest news in cyber security and threat research. Topics this week include: What you need to know on the MOVEit Zero-day vulnerabilityRaidForums user's data breachedThe Buhti ransomware taking a unique approach to targeting victimsResources: https://www.reliaquest.com/blog/moveit-transfer-zero-day/https://www.bleepingcomputer.com/news/security/new-buhti-ransomware-gang-uses-leaked-windows-linux-encryptors/htt...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Gjergji and Ivan, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>What you need to know on the MOVEit Zero-day vulnerability</li><li>RaidForums user&apos;s data breached</li><li>The Buhti ransomware taking a unique approach to targeting victims</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/moveit-transfer-zero-day/'>https://www.reliaquest.com/blog/moveit-transfer-zero-day/</a></li><li><a href='https://www.bleepingcomputer.com/news/security/new-buhti-ransomware-gang-uses-leaked-windows-linux-encryptors/'>https://www.bleepingcomputer.com/news/security/new-buhti-ransomware-gang-uses-leaked-windows-linux-encryptors/</a></li><li><a href='https://www.bleepingcomputer.com/news/security/new-hacking-forum-leaks-data-of-478-000-raidforums-members/'>https://www.bleepingcomputer.com/news/security/new-hacking-forum-leaks-data-of-478-000-raidforums-members/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris, along with Gjergji and Ivan, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>What you need to know on the MOVEit Zero-day vulnerability</li><li>RaidForums user&apos;s data breached</li><li>The Buhti ransomware taking a unique approach to targeting victims</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/moveit-transfer-zero-day/'>https://www.reliaquest.com/blog/moveit-transfer-zero-day/</a></li><li><a href='https://www.bleepingcomputer.com/news/security/new-buhti-ransomware-gang-uses-leaked-windows-linux-encryptors/'>https://www.bleepingcomputer.com/news/security/new-buhti-ransomware-gang-uses-leaked-windows-linux-encryptors/</a></li><li><a href='https://www.bleepingcomputer.com/news/security/new-hacking-forum-leaks-data-of-478-000-raidforums-members/'>https://www.bleepingcomputer.com/news/security/new-hacking-forum-leaks-data-of-478-000-raidforums-members/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12969100-weekly-moveit-zero-day-raidforums-breach-buhti-ransomware.mp3" length="13326740" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12969100</guid>
    <pubDate>Fri, 02 Jun 2023 17:00:00 -0400</pubDate>
    <itunes:duration>1106</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: GootLoader, Intrusion Truth, Volt Typhoon, and Exponent conference debrief </itunes:title>
    <title>Weekly: GootLoader, Intrusion Truth, Volt Typhoon, and Exponent conference debrief </title>
    <itunes:summary><![CDATA[Summary: In this episode of ShadowTalk, host Stefano, along with Kim, Rick, and Dean, discuss the latest news in cyber security and threat research. Topics this week include: An investigation into the GootLoader malwareThe latest operation from hacktivist group Intrusion TruthA cyber espionage campaign conduct by Volt TyphoonRQ Exponent conference debriefResources: https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144ahttps://www.washingtonpost.com/politics/2023/05/15/they-dox-ch...]]></itunes:summary>
    <description><![CDATA[<p><b>Summary: </b>In this episode of ShadowTalk, host Stefano, along with Kim, Rick, and Dean, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>An investigation into the GootLoader malware</li><li>The latest operation from hacktivist group Intrusion Truth</li><li>A cyber espionage campaign conduct by Volt Typhoon</li><li>RQ Exponent conference debrief</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a'>https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a</a></li><li><a href='https://www.washingtonpost.com/politics/2023/05/15/they-dox-chinese-hackers-now-theyre-back/'>https://www.washingtonpost.com/politics/2023/05/15/they-dox-chinese-hackers-now-theyre-back/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p><b>Summary: </b>In this episode of ShadowTalk, host Stefano, along with Kim, Rick, and Dean, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>An investigation into the GootLoader malware</li><li>The latest operation from hacktivist group Intrusion Truth</li><li>A cyber espionage campaign conduct by Volt Typhoon</li><li>RQ Exponent conference debrief</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a'>https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a</a></li><li><a href='https://www.washingtonpost.com/politics/2023/05/15/they-dox-chinese-hackers-now-theyre-back/'>https://www.washingtonpost.com/politics/2023/05/15/they-dox-chinese-hackers-now-theyre-back/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12921069-weekly-gootloader-intrusion-truth-volt-typhoon-and-exponent-conference-debrief.mp3" length="21571634" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12921069</guid>
    <pubDate>Fri, 26 May 2023 04:00:00 -0400</pubDate>
    <itunes:duration>1795</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: SocGholish, Cactus Ransomware, Greatness Phishing-as-a-service</itunes:title>
    <title>Weekly: SocGholish, Cactus Ransomware, Greatness Phishing-as-a-service</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris Morgan , along with Caroline Fenstermacher and Gjergji Paco, discuss the latest news in cyber security and threat research. Topics this week include: Revisiting the SocGholish malware distribution framework Getting pricked by the Cactus ransomwareGreatness Phishing-as-a-service Resources: https://www.reliaquest.com/blog/socgholish-fakeupdates/https://thehackernews.com/2023/05/new-ransomware-strain-cactus-exploits.htmlhttps://www.bleepingcomp...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris Morgan , along with Caroline Fenstermacher and Gjergji Paco, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Revisiting the SocGholish malware distribution framework </li><li>Getting pricked by the Cactus ransomware</li><li>Greatness Phishing-as-a-service </li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/socgholish-fakeupdates/'>https://www.reliaquest.com/blog/socgholish-fakeupdates/</a></li><li><a href='https://thehackernews.com/2023/05/new-ransomware-strain-cactus-exploits.html'>https://thehackernews.com/2023/05/new-ransomware-strain-cactus-exploits.html</a></li><li><a href='https://www.bleepingcomputer.com/news/security/new-greatness-service-simplifies-microsoft-365-phishing-attacks/'>https://www.bleepingcomputer.com/news/security/new-greatness-service-simplifies-microsoft-365-phishing-attacks/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris Morgan , along with Caroline Fenstermacher and Gjergji Paco, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Revisiting the SocGholish malware distribution framework </li><li>Getting pricked by the Cactus ransomware</li><li>Greatness Phishing-as-a-service </li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/socgholish-fakeupdates/'>https://www.reliaquest.com/blog/socgholish-fakeupdates/</a></li><li><a href='https://thehackernews.com/2023/05/new-ransomware-strain-cactus-exploits.html'>https://thehackernews.com/2023/05/new-ransomware-strain-cactus-exploits.html</a></li><li><a href='https://www.bleepingcomputer.com/news/security/new-greatness-service-simplifies-microsoft-365-phishing-attacks/'>https://www.bleepingcomputer.com/news/security/new-greatness-service-simplifies-microsoft-365-phishing-attacks/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12877420-weekly-socgholish-cactus-ransomware-greatness-phishing-as-a-service.mp3" length="22079589" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12877420</guid>
    <pubDate>Fri, 19 May 2023 04:00:00 -0400</pubDate>
    <itunes:duration>1835</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Snake malware takedown, Kubernetes hunts, and Caffeine Phishing-as-a-Service</itunes:title>
    <title>Weekly: Snake malware takedown, Kubernetes hunts, and Caffeine Phishing-as-a-Service</title>
    <itunes:summary><![CDATA[Summary: In this episode of ShadowTalk, host Stefano, along with Caroline and Colin, discuss the latest news in cyber security and threat research. Topics this week include: Five Eyes agencies takedown FSB-linked Snake malwareHunting Kubernetes for privilege escalation techniquesInvestigation offers insights into Caffeine PhaaS platformResources: https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-129ahttps://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/conte...]]></itunes:summary>
    <description><![CDATA[<p><b>Summary: </b>In this episode of ShadowTalk, host Stefano, along with Caroline and Colin, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Five Eyes agencies takedown FSB-linked Snake malware</li><li>Hunting Kubernetes for privilege escalation techniques</li><li>Investigation offers insights into Caffeine PhaaS platform</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-129a'>https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-129a</a></li><li><a href='https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/whitepapers/kubernetes-privilege-escalation-excessive-permissions-in-popular-platforms'>https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/whitepapers/kubernetes-privilege-escalation-excessive-permissions-in-popular-platforms</a></li><li><a href='https://www.bleepingcomputer.com/news/security/caffeine-service-lets-anyone-launch-microsoft-365-phishing-attacks/'>https://www.bleepingcomputer.com/news/security/caffeine-service-lets-anyone-launch-microsoft-365-phishing-attacks/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p><b>Summary: </b>In this episode of ShadowTalk, host Stefano, along with Caroline and Colin, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Five Eyes agencies takedown FSB-linked Snake malware</li><li>Hunting Kubernetes for privilege escalation techniques</li><li>Investigation offers insights into Caffeine PhaaS platform</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-129a'>https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-129a</a></li><li><a href='https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/whitepapers/kubernetes-privilege-escalation-excessive-permissions-in-popular-platforms'>https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/whitepapers/kubernetes-privilege-escalation-excessive-permissions-in-popular-platforms</a></li><li><a href='https://www.bleepingcomputer.com/news/security/caffeine-service-lets-anyone-launch-microsoft-365-phishing-attacks/'>https://www.bleepingcomputer.com/news/security/caffeine-service-lets-anyone-launch-microsoft-365-phishing-attacks/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12830191-weekly-snake-malware-takedown-kubernetes-hunts-and-caffeine-phishing-as-a-service.mp3" length="26341863" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12830191</guid>
    <pubDate>Fri, 12 May 2023 04:00:00 -0400</pubDate>
    <itunes:duration>2192</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: ReliaQuest Threat Management, ALPHV, Veeam Vulnerability Exploited</itunes:title>
    <title>Weekly: ReliaQuest Threat Management, ALPHV, Veeam Vulnerability Exploited</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris Morgan is joined by Corey Carter and Ivan Righi to discuss: A day in the life of a Threat Engineer at ReliaQuestALPHV leaking internal comm's related to victims incident responseHigh Severity vulnerability affecting Veeam back servers exploited in the wild (CVE-2023-27532)]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris Morgan is joined by Corey Carter and Ivan Righi to discuss:</p><ul><li>A day in the life of a Threat Engineer at ReliaQuest</li><li>ALPHV leaking internal comm&apos;s related to victims incident response</li><li>High Severity vulnerability affecting Veeam back servers exploited in the wild (CVE-2023-27532)</li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris Morgan is joined by Corey Carter and Ivan Righi to discuss:</p><ul><li>A day in the life of a Threat Engineer at ReliaQuest</li><li>ALPHV leaking internal comm&apos;s related to victims incident response</li><li>High Severity vulnerability affecting Veeam back servers exploited in the wild (CVE-2023-27532)</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12783947-weekly-reliaquest-threat-management-alphv-veeam-vulnerability-exploited.mp3" length="18534306" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12783947</guid>
    <pubDate>Fri, 05 May 2023 04:00:00 -0400</pubDate>
    <itunes:duration>1539</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: RQ Ransomware Report, 3CX Update, Russia-Ukraine Cyber Operations, and Cybercriminal Ecosystems</itunes:title>
    <title>Weekly: RQ Ransomware Report, 3CX Update, Russia-Ukraine Cyber Operations, and Cybercriminal Ecosystems</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Stefano, along with Kim, Ivan, and Brandon, discuss the latest news in cyber security and threat research. Topics this week include: Highlights from the ReliaQuest Ransomware Quarterly Report Q1 2023A supply-chain of a supply-chain: 3CX UpdateAnalysis of Russia-Ukraine cyber operationsA look into recent shifts in the cybercriminal ecosystemResources: https://www.reliaquest.com/blog/2023-ransomware-attacks-q1/https://www.ncsc.gov.uk/news/new-analysis-eccri-h...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Stefano, along with Kim, Ivan, and Brandon, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Highlights from the ReliaQuest Ransomware Quarterly Report Q1 2023</li><li>A supply-chain of a supply-chain: 3CX Update</li><li>Analysis of Russia-Ukraine cyber operations</li><li>A look into recent shifts in the cybercriminal ecosystem</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/2023-ransomware-attacks-q1/'>https://www.reliaquest.com/blog/2023-ransomware-attacks-q1/</a></li><li><a href='https://www.ncsc.gov.uk/news/new-analysis-eccri-highlights-ukraine-defence-against-russian-offensive'>https://www.ncsc.gov.uk/news/new-analysis-eccri-highlights-ukraine-defence-against-russian-offensive</a></li><li><a href='https://www.mandiant.com/resources/blog/3cx-software-supply-chain-compromise'>https://www.mandiant.com/resources/blog/3cx-software-supply-chain-compromise</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Stefano, along with Kim, Ivan, and Brandon, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Highlights from the ReliaQuest Ransomware Quarterly Report Q1 2023</li><li>A supply-chain of a supply-chain: 3CX Update</li><li>Analysis of Russia-Ukraine cyber operations</li><li>A look into recent shifts in the cybercriminal ecosystem</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/2023-ransomware-attacks-q1/'>https://www.reliaquest.com/blog/2023-ransomware-attacks-q1/</a></li><li><a href='https://www.ncsc.gov.uk/news/new-analysis-eccri-highlights-ukraine-defence-against-russian-offensive'>https://www.ncsc.gov.uk/news/new-analysis-eccri-highlights-ukraine-defence-against-russian-offensive</a></li><li><a href='https://www.mandiant.com/resources/blog/3cx-software-supply-chain-compromise'>https://www.mandiant.com/resources/blog/3cx-software-supply-chain-compromise</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12744096-weekly-rq-ransomware-report-3cx-update-russia-ukraine-cyber-operations-and-cybercriminal-ecosystems.mp3" length="34002461" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12744096</guid>
    <pubDate>Fri, 28 Apr 2023 15:00:00 -0400</pubDate>
    <itunes:duration>2830</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: RSA Conference 2023</itunes:title>
    <title>Special: RSA Conference 2023</title>
    <itunes:summary><![CDATA[In this episode, host and CISO Rick Holland is joined by ReliaQuest's Chief Technical Officer Joe Partlow and Chief Strategy Officer Jason Pfeiffer to discuss  cyber trends they're seeing across RSA Conference 2023the benefits of such an eventAI in cyber and more.]]></itunes:summary>
    <description><![CDATA[<p>In this episode, host and CISO Rick Holland is joined by ReliaQuest&apos;s Chief Technical Officer Joe Partlow and Chief Strategy Officer Jason Pfeiffer to discuss </p><ul><li>cyber trends they&apos;re seeing across RSA Conference 2023</li><li>the benefits of such an event</li><li>AI in cyber and more.</li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode, host and CISO Rick Holland is joined by ReliaQuest&apos;s Chief Technical Officer Joe Partlow and Chief Strategy Officer Jason Pfeiffer to discuss </p><ul><li>cyber trends they&apos;re seeing across RSA Conference 2023</li><li>the benefits of such an event</li><li>AI in cyber and more.</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12730636-special-rsa-conference-2023.mp3" length="13342521" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12730636</guid>
    <pubDate>Wed, 26 Apr 2023 15:00:00 -0400</pubDate>
    <itunes:duration>1107</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Vulnerability Quarterly Roundup, Domino Backdoor, Lockbit Targeting MacOS</itunes:title>
    <title>Weekly: Vulnerability Quarterly Roundup, Domino Backdoor, Lockbit Targeting MacOS</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris Morgan, along with Dani and Dean Murphy, discuss the latest news in cyber security and threat research. Topics this week include: A breakdown of ReliaQuest's latest Vulnerability quarterly reportAftermath of the ransomware attack affecting CapitaThe "Domino" Backdoor and "Project Nemesis" information stealing malwareLockbit targeting macOSResources: https://www.reliaquest.com/blog/2023-q1-vulnerabilities-cves/https://www.reliaquest.com/blog/2023-ranso...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris Morgan, along with Dani and Dean Murphy, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>A breakdown of ReliaQuest&apos;s latest Vulnerability quarterly report</li><li>Aftermath of the ransomware attack affecting Capita</li><li>The &quot;Domino&quot; Backdoor and &quot;Project Nemesis&quot; information stealing malware</li><li>Lockbit targeting macOS</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/2023-q1-vulnerabilities-cves/'>https://www.reliaquest.com/blog/2023-q1-vulnerabilities-cves/</a></li><li><a href='https://www.reliaquest.com/blog/2023-ransomware-attacks-q1/'>https://www.reliaquest.com/blog/2023-ransomware-attacks-q1/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris Morgan, along with Dani and Dean Murphy, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>A breakdown of ReliaQuest&apos;s latest Vulnerability quarterly report</li><li>Aftermath of the ransomware attack affecting Capita</li><li>The &quot;Domino&quot; Backdoor and &quot;Project Nemesis&quot; information stealing malware</li><li>Lockbit targeting macOS</li></ul><p><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/2023-q1-vulnerabilities-cves/'>https://www.reliaquest.com/blog/2023-q1-vulnerabilities-cves/</a></li><li><a href='https://www.reliaquest.com/blog/2023-ransomware-attacks-q1/'>https://www.reliaquest.com/blog/2023-ransomware-attacks-q1/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12691213-weekly-vulnerability-quarterly-roundup-domino-backdoor-lockbit-targeting-macos.mp3" length="27367855" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12691213</guid>
    <pubDate>Fri, 21 Apr 2023 04:00:00 -0400</pubDate>
    <itunes:duration>2275</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Cobalt Strike takedown, latest MERCURY campaign, Patch Tuesday</itunes:title>
    <title>Weekly: Cobalt Strike takedown, latest MERCURY campaign, Patch Tuesday</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Stefano, along with Caroline and Kitch, discuss the latest news in cyber security and threat research. Topics this week include: A new approach in malicious infrastructure takedownThe latest TTPs of MERCURY aka MuddyWaterWhat's new on this Patch Tuesday?Resources: https://blogs.microsoft.com/on-the-issues/2023/04/06/stopping-cybercriminals-from-abusing-security-tools/https://www.microsoft.com/en-us/security/blog/2023/04/07/mercury-and-dev-1084-destructive-a...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Stefano, along with Caroline and Kitch, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>A new approach in malicious infrastructure takedown</li><li>The latest TTPs of MERCURY aka MuddyWater</li><li>What&apos;s new on this Patch Tuesday?</li></ul><p><b>Resources:</b></p><ul><li><a href='https://blogs.microsoft.com/on-the-issues/2023/04/06/stopping-cybercriminals-from-abusing-security-tools/'>https://blogs.microsoft.com/on-the-issues/2023/04/06/stopping-cybercriminals-from-abusing-security-tools/</a></li><li><a href='https://www.microsoft.com/en-us/security/blog/2023/04/07/mercury-and-dev-1084-destructive-attack-on-hybrid-environment/'>https://www.microsoft.com/en-us/security/blog/2023/04/07/mercury-and-dev-1084-destructive-attack-on-hybrid-environment/</a></li><li><a href='https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2023-patch-tuesday-fixes-1-zero-day-97-flaws/'>https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2023-patch-tuesday-fixes-1-zero-day-97-flaws/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Stefano, along with Caroline and Kitch, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>A new approach in malicious infrastructure takedown</li><li>The latest TTPs of MERCURY aka MuddyWater</li><li>What&apos;s new on this Patch Tuesday?</li></ul><p><b>Resources:</b></p><ul><li><a href='https://blogs.microsoft.com/on-the-issues/2023/04/06/stopping-cybercriminals-from-abusing-security-tools/'>https://blogs.microsoft.com/on-the-issues/2023/04/06/stopping-cybercriminals-from-abusing-security-tools/</a></li><li><a href='https://www.microsoft.com/en-us/security/blog/2023/04/07/mercury-and-dev-1084-destructive-attack-on-hybrid-environment/'>https://www.microsoft.com/en-us/security/blog/2023/04/07/mercury-and-dev-1084-destructive-attack-on-hybrid-environment/</a></li><li><a href='https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2023-patch-tuesday-fixes-1-zero-day-97-flaws/'>https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2023-patch-tuesday-fixes-1-zero-day-97-flaws/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12645010-weekly-cobalt-strike-takedown-latest-mercury-campaign-patch-tuesday.mp3" length="25150346" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12645010</guid>
    <pubDate>Fri, 14 Apr 2023 04:00:00 -0400</pubDate>
    <itunes:duration>2092</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Genesis Market seizure, Vulkan Files, and new Microsoft Security Update</itunes:title>
    <title>Weekly: Genesis Market seizure, Vulkan Files, and new Microsoft Security Update</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Stefano, along with Ivan and Corey, discuss the latest news in cyber security and threat research. Topics this week include: The prominent Genesis Market has been seized: What's next?Confidential Vulkan Files expose ties between Russian APTs and private sectorMicrosoft mitigates malicious attachments delivered via OneNoteResources: https://news.sky.com/story/notorious-criminal-marketplace-genesis-market-which-sold-stolen-bank-details-taken-down-12850517http...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Stefano, along with Ivan and Corey, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>The prominent Genesis Market has been seized: What&apos;s next?</li><li>Confidential Vulkan Files expose ties between Russian APTs and private sector</li><li>Microsoft mitigates malicious attachments delivered via OneNote</li></ul><p><b>Resources:</b></p><ul><li><a href='https://news.sky.com/story/notorious-criminal-marketplace-genesis-market-which-sold-stolen-bank-details-taken-down-12850517'>https://news.sky.com/story/notorious-criminal-marketplace-genesis-market-which-sold-stolen-bank-details-taken-down-12850517</a></li><li><a href='https://www.theguardian.com/technology/2023/mar/30/vulkan-files-leak-reveals-putins-global-and-domestic-cyberwarfare-tactics'>https://www.theguardian.com/technology/2023/mar/30/vulkan-files-leak-reveals-putins-global-and-domestic-cyberwarfare-tactics</a></li><li><a href='https://www.securityweek.com/microsoft-onenote-starts-blocking-dangerous-file-extensions/'>https://www.securityweek.com/microsoft-onenote-starts-blocking-dangerous-file-extensions/</a></li><li><a href='https://www.reliaquest.com/blog/top-reads-march-2023/'>https://www.reliaquest.com/blog/top-reads-march-2023/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Stefano, along with Ivan and Corey, discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>The prominent Genesis Market has been seized: What&apos;s next?</li><li>Confidential Vulkan Files expose ties between Russian APTs and private sector</li><li>Microsoft mitigates malicious attachments delivered via OneNote</li></ul><p><b>Resources:</b></p><ul><li><a href='https://news.sky.com/story/notorious-criminal-marketplace-genesis-market-which-sold-stolen-bank-details-taken-down-12850517'>https://news.sky.com/story/notorious-criminal-marketplace-genesis-market-which-sold-stolen-bank-details-taken-down-12850517</a></li><li><a href='https://www.theguardian.com/technology/2023/mar/30/vulkan-files-leak-reveals-putins-global-and-domestic-cyberwarfare-tactics'>https://www.theguardian.com/technology/2023/mar/30/vulkan-files-leak-reveals-putins-global-and-domestic-cyberwarfare-tactics</a></li><li><a href='https://www.securityweek.com/microsoft-onenote-starts-blocking-dangerous-file-extensions/'>https://www.securityweek.com/microsoft-onenote-starts-blocking-dangerous-file-extensions/</a></li><li><a href='https://www.reliaquest.com/blog/top-reads-march-2023/'>https://www.reliaquest.com/blog/top-reads-march-2023/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12602238-weekly-genesis-market-seizure-vulkan-files-and-new-microsoft-security-update.mp3" length="16530477" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12602238</guid>
    <pubDate>Fri, 07 Apr 2023 04:00:00 -0400</pubDate>
    <itunes:duration>1375</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: 3CX supply chain attack, Rostec deanonymize Telegram, IcedID</itunes:title>
    <title>Weekly: 3CX supply chain attack, Rostec deanonymize Telegram, IcedID</title>
    <itunes:summary><![CDATA[In this early released episode of ShadowTalk, host Chris Morgan, along with ReliaQuest CISO Rick Holland, Kim Bromley, and Colin Ferris discuss the latest news in cyber security and threat research. Topics this week include: Implications from the 3CX supply-chain attack and what you need to do going forwardRussian telco Rostec de-anonymizing Telegram usersUpdates to the IcedID malwareResources: https://www.3cx.com/community/threads/3cx-desktopapp-security-alert.119951/https://www.reliaquest.c...]]></itunes:summary>
    <description><![CDATA[<p>In this early released episode of ShadowTalk, host Chris Morgan, along with ReliaQuest CISO Rick Holland, Kim Bromley, and Colin Ferris discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Implications from the 3CX supply-chain attack and what you need to do going forward</li><li>Russian telco Rostec de-anonymizing Telegram users</li><li>Updates to the IcedID malware</li></ul><p><b>Resources:</b></p><ul><li>https://www.3cx.com/community/threads/3cx-desktopapp-security-alert.119951/</li><li>https://www.reliaquest.com/blog/3cx-trojan-attack/</li><li>https://www.bleepingcomputer.com/news/security/russia-s-rostec-allegedly-can-de-anonymize-telegram-users/</li><li>https://www.bleepingcomputer.com/news/security/new-icedid-variants-shift-from-bank-fraud-to-malware-delivery/</li></ul><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>In this early released episode of ShadowTalk, host Chris Morgan, along with ReliaQuest CISO Rick Holland, Kim Bromley, and Colin Ferris discuss the latest news in cyber security and threat research. Topics this week include:</p><ul><li>Implications from the 3CX supply-chain attack and what you need to do going forward</li><li>Russian telco Rostec de-anonymizing Telegram users</li><li>Updates to the IcedID malware</li></ul><p><b>Resources:</b></p><ul><li>https://www.3cx.com/community/threads/3cx-desktopapp-security-alert.119951/</li><li>https://www.reliaquest.com/blog/3cx-trojan-attack/</li><li>https://www.bleepingcomputer.com/news/security/russia-s-rostec-allegedly-can-de-anonymize-telegram-users/</li><li>https://www.bleepingcomputer.com/news/security/new-icedid-variants-shift-from-bank-fraud-to-malware-delivery/</li></ul><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12550450-weekly-3cx-supply-chain-attack-rostec-deanonymize-telegram-icedid.mp3" length="24279124" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12550450</guid>
    <pubDate>Thu, 30 Mar 2023 16:00:00 -0400</pubDate>
    <itunes:duration>2017</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Outlook Vulnerability, TeamTNT and Breachforums closure</itunes:title>
    <title>Weekly: Outlook Vulnerability, TeamTNT and Breachforums closure</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Chris Morgan, along with Ivan Righi and Caroline Fenstermacher, discuss the latest news in the cyber security and the information security landscape. Topics this week include: Implications following the arrest of BreachForums administrator PompompurinCryptojacking activity group the TeamTNT threat group Microsoft Outlook bug CVE-2023-23397 Resources: https://www.reliaquest.com/blog/breachforums-arrest-fbi/https://www.reliaquest.com/blog/cyber-threats-s...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Chris Morgan, along with Ivan Righi and Caroline Fenstermacher, discuss the latest news in the cyber security and the information security landscape. Topics this week include:</p><ul><li>Implications following the arrest of BreachForums administrator Pompompurin</li><li>Cryptojacking activity group the TeamTNT threat group </li><li>Microsoft Outlook bug CVE-2023-23397</li></ul><p><br/><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/breachforums-arrest-fbi/'>https://www.reliaquest.com/blog/breachforums-arrest-fbi/</a></li><li><a href='https://www.reliaquest.com/blog/cyber-threats-svb-collapse/'>https://www.reliaquest.com/blog/cyber-threats-svb-collapse/</a></li><li><a href='https://www.reliaquest.com/platform/phishing-analyzer/'>https://www.reliaquest.com/platform/phishing-analyzer/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Chris Morgan, along with Ivan Righi and Caroline Fenstermacher, discuss the latest news in the cyber security and the information security landscape. Topics this week include:</p><ul><li>Implications following the arrest of BreachForums administrator Pompompurin</li><li>Cryptojacking activity group the TeamTNT threat group </li><li>Microsoft Outlook bug CVE-2023-23397</li></ul><p><br/><b>Resources:</b></p><ul><li><a href='https://www.reliaquest.com/blog/breachforums-arrest-fbi/'>https://www.reliaquest.com/blog/breachforums-arrest-fbi/</a></li><li><a href='https://www.reliaquest.com/blog/cyber-threats-svb-collapse/'>https://www.reliaquest.com/blog/cyber-threats-svb-collapse/</a></li><li><a href='https://www.reliaquest.com/platform/phishing-analyzer/'>https://www.reliaquest.com/platform/phishing-analyzer/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12502756-weekly-outlook-vulnerability-teamtnt-and-breachforums-closure.mp3" length="19956541" type="audio/mpeg" />
    <itunes:author>ReliaQuest</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12502756</guid>
    <pubDate>Fri, 24 Mar 2023 04:00:00 -0400</pubDate>
    <itunes:duration>1658</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: SVB collapse, FBI IC3 report, and Cl0p update</itunes:title>
    <title>Weekly: SVB collapse, FBI IC3 report, and Cl0p update</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Stefano De Blasi, along with Rick Holland and Brandon Tirado, discuss cyber threats related to the SVB collapse, the FBI IC3 report and Cl0p ransomware: zero-day vulnerability and victims.  Resources:  https://www.reliaquest.com/blog/cyber-threats-svb-collapse/?https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdfhttps://www.reliaquest.com/blog/qbot-black-basta-ransomware/https://www.reliaquest.com/blog/html-smuggling-dark-web/]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Stefano De Blasi, along with Rick Holland and Brandon Tirado, discuss cyber threats related to the SVB collapse, the FBI IC3 report and Cl0p ransomware: zero-day vulnerability and victims.<br/><br/><b>Resources:</b> </p><ul><li><a href='https://www.reliaquest.com/blog/cyber-threats-svb-collapse/?'>https://www.reliaquest.com/blog/cyber-threats-svb-collapse/?</a></li><li><a href='https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf'>https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf</a></li><li><a href='https://www.reliaquest.com/blog/qbot-black-basta-ransomware/'>https://www.reliaquest.com/blog/qbot-black-basta-ransomware/</a></li><li><a href='https://www.reliaquest.com/blog/html-smuggling-dark-web/'>https://www.reliaquest.com/blog/html-smuggling-dark-web/</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Stefano De Blasi, along with Rick Holland and Brandon Tirado, discuss cyber threats related to the SVB collapse, the FBI IC3 report and Cl0p ransomware: zero-day vulnerability and victims.<br/><br/><b>Resources:</b> </p><ul><li><a href='https://www.reliaquest.com/blog/cyber-threats-svb-collapse/?'>https://www.reliaquest.com/blog/cyber-threats-svb-collapse/?</a></li><li><a href='https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf'>https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf</a></li><li><a href='https://www.reliaquest.com/blog/qbot-black-basta-ransomware/'>https://www.reliaquest.com/blog/qbot-black-basta-ransomware/</a></li><li><a href='https://www.reliaquest.com/blog/html-smuggling-dark-web/'>https://www.reliaquest.com/blog/html-smuggling-dark-web/</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461055-weekly-svb-collapse-fbi-ic3-report-and-cl0p-update.mp3" length="26666543" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/mf3k39cwl30v3vq5179flmqgb9g0?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1471155109</guid>
    <pubDate>Fri, 17 Mar 2023 11:00:40 -0400</pubDate>
    <itunes:duration>2219</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: US National Cybersecurity Strategy, Emotet and Cl0p return</itunes:title>
    <title>Weekly: US National Cybersecurity Strategy, Emotet and Cl0p return</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk, host Stefano, along with Caroline and Dean, discuss: the new US National Cybersecurity Strategythe return of Emotetzero-day exploited by the Cl0p ransomware group.]]></itunes:summary>
    <description><![CDATA[<p>In this episode of ShadowTalk, host Stefano, along with Caroline and Dean, discuss:</p><ul><li>the new US National Cybersecurity Strategy</li><li>the return of Emotet</li><li>zero-day exploited by the Cl0p ransomware group.</li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of ShadowTalk, host Stefano, along with Caroline and Dean, discuss:</p><ul><li>the new US National Cybersecurity Strategy</li><li>the return of Emotet</li><li>zero-day exploited by the Cl0p ransomware group.</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12460402-weekly-us-national-cybersecurity-strategy-emotet-and-cl0p-return.mp3" length="22930617" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/isyao080lfkqlo5mdxn8xzkxnv78?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1470651961</guid>
    <pubDate>Thu, 16 Mar 2023 20:06:07 -0400</pubDate>
    <itunes:duration>1908</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: HTML Smuggling, CISA Guidance on Logging</itunes:title>
    <title>Weekly: HTML Smuggling, CISA Guidance on Logging</title>
    <itunes:summary><![CDATA[This weeks ShadowTalk host Chris, along with Rick, Kitch and Corey, discuss: the email threat of HTML Smugglingthe latest guidance on logging from CISA.]]></itunes:summary>
    <description><![CDATA[<p>This weeks ShadowTalk host Chris, along with Rick, Kitch and Corey, discuss:</p><ul><li>the email threat of HTML Smuggling</li><li>the latest guidance on logging from CISA.</li></ul>]]></description>
    <content:encoded><![CDATA[<p>This weeks ShadowTalk host Chris, along with Rick, Kitch and Corey, discuss:</p><ul><li>the email threat of HTML Smuggling</li><li>the latest guidance on logging from CISA.</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12460403-weekly-html-smuggling-cisa-guidance-on-logging.mp3" length="28044846" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/i4v0a5avobot26n5vfum43j6f60p?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1470650485</guid>
    <pubDate>Thu, 16 Mar 2023 20:02:25 -0400</pubDate>
    <itunes:duration>2334</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Russia-Ukraine War - One-Year Later</itunes:title>
    <title>Weekly: Russia-Ukraine War - One-Year Later</title>
    <itunes:summary><![CDATA[This week's ShadowTalk podcast covers the latest developments and implications of the Russian-Urkaine War.  Resources: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-24-feb]]></itunes:summary>
    <description><![CDATA[<p>This week&apos;s ShadowTalk podcast covers the latest developments and implications of the Russian-Urkaine War.<br/><br/>Resources:</p><ul><li>https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-24-feb</li></ul>]]></description>
    <content:encoded><![CDATA[<p>This week&apos;s ShadowTalk podcast covers the latest developments and implications of the Russian-Urkaine War.<br/><br/>Resources:</p><ul><li>https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-24-feb</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461056-weekly-russia-ukraine-war-one-year-later.mp3" length="27025742" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/osl0x6tkrvdz8w7p4svkej9sieb6?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1455160591</guid>
    <pubDate>Fri, 24 Feb 2023 15:43:05 -0500</pubDate>
    <itunes:duration>2250</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Trickbot/Conti Sanctions, OneNote Documents, and NATO DDoS Attacks</itunes:title>
    <title>Weekly: Trickbot/Conti Sanctions, OneNote Documents, and NATO DDoS Attacks</title>
    <itunes:summary><![CDATA[This week's ShadowTalk podcast covers the latest in the Trickbot/Conti Sanctions, OneNote Documents, NATO DDoS Attacks.  Resources: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-17-feb]]></itunes:summary>
    <description><![CDATA[<p>This week&apos;s ShadowTalk podcast covers the latest in the Trickbot/Conti Sanctions, OneNote Documents, NATO DDoS Attacks.<br/><br/>Resources:</p><ul><li>https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-17-feb</li></ul>]]></description>
    <content:encoded><![CDATA[<p>This week&apos;s ShadowTalk podcast covers the latest in the Trickbot/Conti Sanctions, OneNote Documents, NATO DDoS Attacks.<br/><br/>Resources:</p><ul><li>https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-17-feb</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461057-weekly-trickbot-conti-sanctions-onenote-documents-and-nato-ddos-attacks.mp3" length="21389197" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/b5xzsjusc070kmxr9ez03cffm02a?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1449312919</guid>
    <pubDate>Fri, 17 Feb 2023 12:20:13 -0500</pubDate>
    <itunes:duration>1781</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: VMware ESXI campaign and SocGholish overview</itunes:title>
    <title>Weekly: VMware ESXI campaign and SocGholish overview</title>
    <itunes:summary><![CDATA[This week's ShadowTalk podcast covers the latest in the VMware ESXI Ransomware campaign, Killnet, SocGholish, and more.   Resources: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-10-feb]]></itunes:summary>
    <description><![CDATA[<p>This week&apos;s ShadowTalk podcast covers the latest in the VMware ESXI Ransomware campaign, Killnet, SocGholish, and more. <br/><br/>Resources:</p><ul><li>https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-10-feb</li></ul>]]></description>
    <content:encoded><![CDATA[<p>This week&apos;s ShadowTalk podcast covers the latest in the VMware ESXI Ransomware campaign, Killnet, SocGholish, and more. <br/><br/>Resources:</p><ul><li>https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-10-feb</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461058-weekly-vmware-esxi-campaign-and-socgholish-overview.mp3" length="30905457" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/sywb3yer5q8y1bf71runthl0krfi?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1444141717</guid>
    <pubDate>Fri, 10 Feb 2023 11:20:30 -0500</pubDate>
    <itunes:duration>2574</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Hive Ransomware Takedown and Dark Web Cybercriminal Jobs</itunes:title>
    <title>Weekly: Hive Ransomware Takedown and Dark Web Cybercriminal Jobs</title>
    <itunes:summary><![CDATA[This week's ShadowTalk podcast covers the latest in the Hive ransomware takedown and dark web cybercriminal forum.  Resources:  https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-3-feb]]></itunes:summary>
    <description><![CDATA[<p>This week&apos;s ShadowTalk podcast covers the latest in the Hive ransomware takedown and dark web cybercriminal forum.<br/><br/>Resources: </p><ul><li>https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-3-feb</li></ul>]]></description>
    <content:encoded><![CDATA[<p>This week&apos;s ShadowTalk podcast covers the latest in the Hive ransomware takedown and dark web cybercriminal forum.<br/><br/>Resources: </p><ul><li>https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-3-feb</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461059-weekly-hive-ransomware-takedown-and-dark-web-cybercriminal-jobs.mp3" length="23299233" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/y15kpzpje2x419on6kgpaah6fb77?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1439172232</guid>
    <pubDate>Fri, 03 Feb 2023 13:10:54 -0500</pubDate>
    <itunes:duration>1939</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Ransomware Profits Drop, Russian ISP, and Microsoft Investigation</itunes:title>
    <title>Weekly: Ransomware Profits Drop, Russian ISP, and Microsoft Investigation</title>
    <itunes:summary><![CDATA[This week's ShadowTalk podcast covers the drop in Ransomware profits, DDoS activity spikes against Russian ISP, and Microsoft implementing security changes following a months-long investigation.Get this week’s intelligence summary at: resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-27-janSubscribe to our threat intelligence email: info.digitalshadows.com/SubscribetoEm…cast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you ...]]></itunes:summary>
    <description><![CDATA[This week&apos;s ShadowTalk podcast covers the drop in Ransomware profits, DDoS activity spikes against Russian ISP, and Microsoft implementing security changes following a months-long investigation.Get this week’s intelligence summary at: resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-27-janSubscribe to our threat intelligence email: info.digitalshadows.com/SubscribetoEm…cast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[This week&apos;s ShadowTalk podcast covers the drop in Ransomware profits, DDoS activity spikes against Russian ISP, and Microsoft implementing security changes following a months-long investigation.Get this week’s intelligence summary at: resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-27-janSubscribe to our threat intelligence email: info.digitalshadows.com/SubscribetoEm…cast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461060-weekly-ransomware-profits-drop-russian-isp-and-microsoft-investigation.mp3" length="30072110" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/hbu22atpwli2enukh4qydy1dt1s8?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1433893237</guid>
    <pubDate>Fri, 27 Jan 2023 12:18:26 -0500</pubDate>
    <itunes:duration>2504</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: 2022 Recap and Forecasting 2023 Trends</itunes:title>
    <title>Weekly: 2022 Recap and Forecasting 2023 Trends</title>
    <itunes:summary><![CDATA[Looking Back, Moving Forward. As 2023 gets into full swing, listen to our recap of 2022 including trends in cybercrime, espionage, hacktivism, and more. Plus, global industry forecasting for 2023. Get this week’s intelligence summary at: resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-20-janSubscribe to our threat intelligence email: info.digitalshadows.com/SubscribetoEm…cast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if y...]]></itunes:summary>
    <description><![CDATA[Looking Back, Moving Forward. As 2023 gets into full swing, listen to our recap of 2022 including trends in cybercrime, espionage, hacktivism, and more. Plus, global industry forecasting for 2023. Get this week’s intelligence summary at: resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-20-janSubscribe to our threat intelligence email: info.digitalshadows.com/SubscribetoEm…cast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[Looking Back, Moving Forward. As 2023 gets into full swing, listen to our recap of 2022 including trends in cybercrime, espionage, hacktivism, and more. Plus, global industry forecasting for 2023. Get this week’s intelligence summary at: resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-20-janSubscribe to our threat intelligence email: info.digitalshadows.com/SubscribetoEm…cast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461061-weekly-2022-recap-and-forecasting-2023-trends.mp3" length="29189350" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/x4lhkwxe0h9s3spg7iluh0ucknts?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1428738946</guid>
    <pubDate>Fri, 20 Jan 2023 11:58:07 -0500</pubDate>
    <itunes:duration>2430</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Turla Target Ukraine, ChatGPT, and Lorenz Ransomware Activity</itunes:title>
    <title>Weekly: Turla Target Ukraine, ChatGPT, and Lorenz Ransomware Activity</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Ivan give you the latest in threat intelligence. This week they cover:-Russian APT Turla-Chat GPT-Ransomware Group Lorenz TTP ChangesGet this week’s intelligence summary at: resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-13-janSubscribe to our threat intelligence email: info.digitalshadows.com/SubscribetoEm…cast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments,...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Ivan give you the latest in threat intelligence. This week they cover:-Russian APT Turla-Chat GPT-Ransomware Group Lorenz TTP ChangesGet this week’s intelligence summary at: resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-13-janSubscribe to our threat intelligence email: info.digitalshadows.com/SubscribetoEm…cast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Ivan give you the latest in threat intelligence. This week they cover:-Russian APT Turla-Chat GPT-Ransomware Group Lorenz TTP ChangesGet this week’s intelligence summary at: resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-13-janSubscribe to our threat intelligence email: info.digitalshadows.com/SubscribetoEm…cast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461062-weekly-turla-target-ukraine-chatgpt-and-lorenz-ransomware-activity.mp3" length="14003797" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/7bfxv91p4ldxu6h6gmsu2b0rq2y4?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1423237735</guid>
    <pubDate>Fri, 13 Jan 2023 11:31:22 -0500</pubDate>
    <itunes:duration>1164</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Welcome to 2023!</itunes:title>
    <title>Weekly: Welcome to 2023!</title>
    <itunes:summary><![CDATA[The first ShadowTalk Podcast of the New Year is here. Join host Chris for the latest happenings in threat intelligence and cyber security.Get this week’s intelligence summary at: resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-6-janSubscribe to our threat intelligence email: info.digitalshadows.com/SubscribetoEm…cast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next...]]></itunes:summary>
    <description><![CDATA[The first ShadowTalk Podcast of the New Year is here. Join host Chris for the latest happenings in threat intelligence and cyber security.Get this week’s intelligence summary at: resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-6-janSubscribe to our threat intelligence email: info.digitalshadows.com/SubscribetoEm…cast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[The first ShadowTalk Podcast of the New Year is here. Join host Chris for the latest happenings in threat intelligence and cyber security.Get this week’s intelligence summary at: resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-6-janSubscribe to our threat intelligence email: info.digitalshadows.com/SubscribetoEm…cast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461063-weekly-welcome-to-2023.mp3" length="37508156" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/nnx5khzqlxg1as2d5jgzmecxvzhu?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1418053624</guid>
    <pubDate>Fri, 06 Jan 2023 11:19:47 -0500</pubDate>
    <itunes:duration>3123</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Recent Vulnerabilities, Clop Ransomware, New Year&#39;s Resolutions</itunes:title>
    <title>Weekly: Recent Vulnerabilities, Clop Ransomware, New Year&#39;s Resolutions</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside guests Ivan give you the latest in threat intelligence. This week they cover: -Recent Vulnerabilities-Clop Ransomware-New Year's ResolutionsGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-16-dec***Resources from this week’s podcast***Payment Declined: Carding Cyber Criminals Fears for Their Futurehttps://www.reliaquest.com/blog/web-carding-future/ Subscribe to our threat intel...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside guests Ivan give you the latest in threat intelligence. This week they cover: -Recent Vulnerabilities-Clop Ransomware-New Year&apos;s ResolutionsGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-16-dec***Resources from this week’s podcast***Payment Declined: Carding Cyber Criminals Fears for Their Futurehttps://www.reliaquest.com/blog/web-carding-future/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside guests Ivan give you the latest in threat intelligence. This week they cover: -Recent Vulnerabilities-Clop Ransomware-New Year&apos;s ResolutionsGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-16-dec***Resources from this week’s podcast***Payment Declined: Carding Cyber Criminals Fears for Their Futurehttps://www.reliaquest.com/blog/web-carding-future/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461064-weekly-recent-vulnerabilities-clop-ransomware-new-year-s-resolutions.mp3" length="13264375" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/t57br5u026b6hnfgkces85nlnbjl?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1404115573</guid>
    <pubDate>Fri, 16 Dec 2022 11:19:06 -0500</pubDate>
    <itunes:duration>1103</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Russian and Ukraine Roundup, Lazarus Group Cryptocurrency Activity, Apple’s Right to Repair</itunes:title>
    <title>Weekly: Russian and Ukraine Roundup, Lazarus Group Cryptocurrency Activity, Apple’s Right to Repair</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside guests Rick and Danny give you the latest in threat intelligence. This week they cover: -Russian and Ukraine Roundup-Lazarus Group Cryptocurrency Activity-Apple’s Right to Repair Get this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-9-dec***Resources from this week’s podcast***Vulnerability Intelligence Roundup: Five lessons learned since Log4Shellhttps://www.digitalshadows.com/blog...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside guests Rick and Danny give you the latest in threat intelligence. This week they cover: -Russian and Ukraine Roundup-Lazarus Group Cryptocurrency Activity-Apple’s Right to Repair Get this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-9-dec***Resources from this week’s podcast***Vulnerability Intelligence Roundup: Five lessons learned since Log4Shellhttps://www.digitalshadows.com/blog-and-research/vulnerability-intelligence-roundup-five-lessons-learned-since-log4shell/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside guests Rick and Danny give you the latest in threat intelligence. This week they cover: -Russian and Ukraine Roundup-Lazarus Group Cryptocurrency Activity-Apple’s Right to Repair Get this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-9-dec***Resources from this week’s podcast***Vulnerability Intelligence Roundup: Five lessons learned since Log4Shellhttps://www.digitalshadows.com/blog-and-research/vulnerability-intelligence-roundup-five-lessons-learned-since-log4shell/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461065-weekly-russian-and-ukraine-roundup-lazarus-group-cryptocurrency-activity-apple-s-right-to-repair.mp3" length="31842508" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/bxf3yugljs2guz6qot1dk5ms4f0h?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1399505449</guid>
    <pubDate>Fri, 09 Dec 2022 13:30:00 -0500</pubDate>
    <itunes:duration>2652</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Sandworm targets Ukraine, Oracle RCE vulnerability, 300th Episode</itunes:title>
    <title>Weekly: Sandworm targets Ukraine, Oracle RCE vulnerability, 300th Episode</title>
    <itunes:summary><![CDATA[ShadowTalk host Nicole alongside guests Rick, Ivan and Dean give you the latest in threat intelligence. This week they cover: -Sandworm deploying ransomware targeting Ukraine -Oracle RCE vulnerability actively exploited-300th Episode &amp; Look forward***Resources from this week’s podcast***Vulnerability Intelligence Roundup: Five lessons learned since Log4Shellhttps://www.digitalshadows.com/blog-and-research/vulnerability-intelligence-roundup-five-lessons-learned-since-log4shell/ Vice Societ...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Nicole alongside guests Rick, Ivan and Dean give you the latest in threat intelligence. This week they cover: -Sandworm deploying ransomware targeting Ukraine -Oracle RCE vulnerability actively exploited-300th Episode &amp; Look forward***Resources from this week’s podcast***Vulnerability Intelligence Roundup: Five lessons learned since Log4Shellhttps://www.digitalshadows.com/blog-and-research/vulnerability-intelligence-roundup-five-lessons-learned-since-log4shell/ Vice Society CISA advisoryhttps://www.cisa.gov/uscert/ncas/alerts/aa22-249a Five ways security leaders can prepare for economic uncertainty by Rick https://www.scmagazine.com/perspective/strategy/five-ways-security-leaders-can-prepare-for-economic-uncertainty SANS CTI Summithttps://www.sans.org/cyber-security-training-events/cyber-threat-intelligence-summit-2023/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Nicole alongside guests Rick, Ivan and Dean give you the latest in threat intelligence. This week they cover: -Sandworm deploying ransomware targeting Ukraine -Oracle RCE vulnerability actively exploited-300th Episode &amp; Look forward***Resources from this week’s podcast***Vulnerability Intelligence Roundup: Five lessons learned since Log4Shellhttps://www.digitalshadows.com/blog-and-research/vulnerability-intelligence-roundup-five-lessons-learned-since-log4shell/ Vice Society CISA advisoryhttps://www.cisa.gov/uscert/ncas/alerts/aa22-249a Five ways security leaders can prepare for economic uncertainty by Rick https://www.scmagazine.com/perspective/strategy/five-ways-security-leaders-can-prepare-for-economic-uncertainty SANS CTI Summithttps://www.sans.org/cyber-security-training-events/cyber-threat-intelligence-summit-2023/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461066-weekly-sandworm-targets-ukraine-oracle-rce-vulnerability-300th-episode.mp3" length="20764448" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/pgdr1j03cu43oen6cfp1rwdd176j?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1394965201</guid>
    <pubDate>Fri, 02 Dec 2022 14:43:11 -0500</pubDate>
    <itunes:duration>1728</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: LockBit Arrest, Tech Layoffs, Black Friday Risks</itunes:title>
    <title>Weekly: LockBit Arrest, Tech Layoffs, Black Friday Risks</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside guests Dani and Kim give you the latest in threat intelligence. This week they cover: -LockBit Arrest-Big Tech Layoffs-Black Friday Vulnerability Risks***Resources from this week’s podcast***Black Friday Webinarhttps://www.reliaquest.com/resource/webinar/soc-talk-keeping-black-friday-cyber-threats-at-bay/?utm_source=Digital+Shadows&amp;utm_medium=On-Demand+Webinar Keeping One Step Ahead of Black Friday Cyber Threats https://www.digitalshadows.com/blog-and-resea...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside guests Dani and Kim give you the latest in threat intelligence. This week they cover: -LockBit Arrest-Big Tech Layoffs-Black Friday Vulnerability Risks***Resources from this week’s podcast***Black Friday Webinarhttps://www.reliaquest.com/resource/webinar/soc-talk-keeping-black-friday-cyber-threats-at-bay/?utm_source=Digital+Shadows&amp;utm_medium=On-Demand+Webinar Keeping One Step Ahead of Black Friday Cyber Threats https://www.digitalshadows.com/blog-and-research/keeping-one-step-ahead-of-black-friday-cyber-threats/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside guests Dani and Kim give you the latest in threat intelligence. This week they cover: -LockBit Arrest-Big Tech Layoffs-Black Friday Vulnerability Risks***Resources from this week’s podcast***Black Friday Webinarhttps://www.reliaquest.com/resource/webinar/soc-talk-keeping-black-friday-cyber-threats-at-bay/?utm_source=Digital+Shadows&amp;utm_medium=On-Demand+Webinar Keeping One Step Ahead of Black Friday Cyber Threats https://www.digitalshadows.com/blog-and-research/keeping-one-step-ahead-of-black-friday-cyber-threats/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461067-weekly-lockbit-arrest-tech-layoffs-black-friday-risks.mp3" length="20570376" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/nao5jlxfv41ke8gobgd2f2winu50?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1389036229</guid>
    <pubDate>Wed, 23 Nov 2022 11:55:08 -0500</pubDate>
    <itunes:duration>1712</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: APT29 Credential Roaming, Russian Hacktivists Use Somnia Ransomware, Recent LockBit Activity</itunes:title>
    <title>Weekly: APT29 Credential Roaming, Russian Hacktivists Use Somnia Ransomware, Recent LockBit Activity</title>
    <itunes:summary><![CDATA[ShadowTalk host Nicole alongside guests Ivan, Rick and Andrew give you the latest in threat intelligence. This week they cover: -APT29 Windows Credential Roaming-Russian Hacktivists Targeting Ukraine with New Somnia Ransomware-LockBit Using Amadey Bot Malware, LockBit Affiliate ArrestedGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-18-nov ***Resources from this week’s podcast***Cyber Threats to the FIFA Wor...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Nicole alongside guests Ivan, Rick and Andrew give you the latest in threat intelligence. This week they cover: -APT29 Windows Credential Roaming-Russian Hacktivists Targeting Ukraine with New Somnia Ransomware-LockBit Using Amadey Bot Malware, LockBit Affiliate ArrestedGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-18-nov ***Resources from this week’s podcast***Cyber Threats to the FIFA World Cup Qatar 2022https://www.digitalshadows.com/blog-and-research/cyber-threats-to-the-fifa-world-cup-qatar-2022/ Keeping One Step Ahead of Black Friday Cyber Threats https://www.digitalshadows.com/blog-and-research/keeping-one-step-ahead-of-black-friday-cyber-threats/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Nicole alongside guests Ivan, Rick and Andrew give you the latest in threat intelligence. This week they cover: -APT29 Windows Credential Roaming-Russian Hacktivists Targeting Ukraine with New Somnia Ransomware-LockBit Using Amadey Bot Malware, LockBit Affiliate ArrestedGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-18-nov ***Resources from this week’s podcast***Cyber Threats to the FIFA World Cup Qatar 2022https://www.digitalshadows.com/blog-and-research/cyber-threats-to-the-fifa-world-cup-qatar-2022/ Keeping One Step Ahead of Black Friday Cyber Threats https://www.digitalshadows.com/blog-and-research/keeping-one-step-ahead-of-black-friday-cyber-threats/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461068-weekly-apt29-credential-roaming-russian-hacktivists-use-somnia-ransomware-recent-lockbit-activity.mp3" length="17617583" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/aga6rrxae4wjv9djc3i0bys4ahs2?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1385863366</guid>
    <pubDate>Fri, 18 Nov 2022 12:42:19 -0500</pubDate>
    <itunes:duration>1466</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: British Government Scanning UK Devices, Twitter&#39;s Verification Process, Latest Emotet Return</itunes:title>
    <title>Weekly: British Government Scanning UK Devices, Twitter&#39;s Verification Process, Latest Emotet Return</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside guests Kim gives you the latest in threat intelligence. This week they cover: -British Government Scanning UK Devices-Twitter's Verification Process-Latest Emotet ReturnGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-11-nov ***Resources from this week’s podcast***Cyber Threats to the FIFA World Cup Qatar 2022https://www.digitalshadows.com/blog-and-research/cyber-threats-to-the...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside guests Kim gives you the latest in threat intelligence. This week they cover: -British Government Scanning UK Devices-Twitter&apos;s Verification Process-Latest Emotet ReturnGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-11-nov ***Resources from this week’s podcast***Cyber Threats to the FIFA World Cup Qatar 2022https://www.digitalshadows.com/blog-and-research/cyber-threats-to-the-fifa-world-cup-qatar-2022/ Dark Web Recruitment: Malware, Phishing and Cardinghttps://www.digitalshadows.com/blog-and-research/dark-web-recruitment-malware-phishing-and-carding/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside guests Kim gives you the latest in threat intelligence. This week they cover: -British Government Scanning UK Devices-Twitter&apos;s Verification Process-Latest Emotet ReturnGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-11-nov ***Resources from this week’s podcast***Cyber Threats to the FIFA World Cup Qatar 2022https://www.digitalshadows.com/blog-and-research/cyber-threats-to-the-fifa-world-cup-qatar-2022/ Dark Web Recruitment: Malware, Phishing and Cardinghttps://www.digitalshadows.com/blog-and-research/dark-web-recruitment-malware-phishing-and-carding/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461069-weekly-british-government-scanning-uk-devices-twitter-s-verification-process-latest-emotet-return.mp3" length="19794001" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ky6ns9y9djmaphctsalnoezkwong?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1381008697</guid>
    <pubDate>Fri, 11 Nov 2022 11:45:26 -0500</pubDate>
    <itunes:duration>1648</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: APT10 Deploy LODEINFO Malware, New Azov Data Wiper, Emotet Malicious Spam</itunes:title>
    <title>Weekly: APT10 Deploy LODEINFO Malware, New Azov Data Wiper, Emotet Malicious Spam</title>
    <itunes:summary><![CDATA[ShadowTalk host Nicole alongside guests Ivan give you the latest in threat intelligence. This week they cover: -APT10 leveraging antivirus to deploy LODEINFO malware-New Azov data wiper attempting to frame security researchers-New Emotet malicious spam campaignGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-04-nov***Resources from this week’s podcast***Q3 2022 Vulnerability Rounduphttps://www.digitalshadows....]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Nicole alongside guests Ivan give you the latest in threat intelligence. This week they cover: -APT10 leveraging antivirus to deploy LODEINFO malware-New Azov data wiper attempting to frame security researchers-New Emotet malicious spam campaignGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-04-nov***Resources from this week’s podcast***Q3 2022 Vulnerability Rounduphttps://www.digitalshadows.com/blog-and-research/q3-2022-vulnerability-roundup/ 2023 Cyber Threat Predictions https://www.digitalshadows.com/blog-and-research/2023-cyber-threat-predictions/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Nicole alongside guests Ivan give you the latest in threat intelligence. This week they cover: -APT10 leveraging antivirus to deploy LODEINFO malware-New Azov data wiper attempting to frame security researchers-New Emotet malicious spam campaignGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-04-nov***Resources from this week’s podcast***Q3 2022 Vulnerability Rounduphttps://www.digitalshadows.com/blog-and-research/q3-2022-vulnerability-roundup/ 2023 Cyber Threat Predictions https://www.digitalshadows.com/blog-and-research/2023-cyber-threat-predictions/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461070-weekly-apt10-deploy-lodeinfo-malware-new-azov-data-wiper-emotet-malicious-spam.mp3" length="8318162" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/95pomven38b3tsqd01bq8zk0qnax?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1376517352</guid>
    <pubDate>Fri, 04 Nov 2022 12:54:30 -0400</pubDate>
    <itunes:duration>691</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Ukraine Activity Roundup, Vice Society Targeting Schools, Iranian Hacktivism</itunes:title>
    <title>Weekly: Ukraine Activity Roundup, Vice Society Targeting Schools, Iranian Hacktivism</title>
    <itunes:summary><![CDATA[Weekly: Ukraine Activity Roundup, Vice Society Targeting Schools, Iranian HacktivismShadowTalk host Chris alongside guests Stefano give you the latest in threat intelligence. This week they cover: -Ukraine Activity Roundup-Vice Society Targeting Schools-Iranian HacktivismGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-28-oct***Resources from this week’s podcast***Q3 2022 Vulnerability Rounduphttps://www.digi...]]></itunes:summary>
    <description><![CDATA[Weekly: Ukraine Activity Roundup, Vice Society Targeting Schools, Iranian HacktivismShadowTalk host Chris alongside guests Stefano give you the latest in threat intelligence. This week they cover: -Ukraine Activity Roundup-Vice Society Targeting Schools-Iranian HacktivismGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-28-oct***Resources from this week’s podcast***Q3 2022 Vulnerability Rounduphttps://www.digitalshadows.com/blog-and-research/q3-2022-vulnerability-roundup/ Have your Forgotten About Phishing?Ransomware in Q3 2022https://www.digitalshadows.com/blog-and-research/cybersecurity-awareness-month-2022-have-you-forgotten-about-phishing/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[Weekly: Ukraine Activity Roundup, Vice Society Targeting Schools, Iranian HacktivismShadowTalk host Chris alongside guests Stefano give you the latest in threat intelligence. This week they cover: -Ukraine Activity Roundup-Vice Society Targeting Schools-Iranian HacktivismGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-28-oct***Resources from this week’s podcast***Q3 2022 Vulnerability Rounduphttps://www.digitalshadows.com/blog-and-research/q3-2022-vulnerability-roundup/ Have your Forgotten About Phishing?Ransomware in Q3 2022https://www.digitalshadows.com/blog-and-research/cybersecurity-awareness-month-2022-have-you-forgotten-about-phishing/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461071-weekly-ukraine-activity-roundup-vice-society-targeting-schools-iranian-hacktivism.mp3" length="18037286" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/xlf6n3bnyw1kvg7yfzzy94hia947?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1371999091</guid>
    <pubDate>Fri, 28 Oct 2022 14:15:12 -0400</pubDate>
    <itunes:duration>1501</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: REvil connection to Ransom Cartel, Cryptocurrency hacks in Japan by Lazarus, Toyota T-Connect Attack</itunes:title>
    <title>Weekly: REvil connection to Ransom Cartel, Cryptocurrency hacks in Japan by Lazarus, Toyota T-Connect Attack</title>
    <itunes:summary><![CDATA[ShadowTalk host Nicole alongside guests Rick and Ivan give you the latest in threat intelligence.   This week they cover:  REvil connection to Ransom CartelCryptocurrency hacks in Japan by LazarusToyota T-Connect AttackResources: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-21-octoberhttps://www.digitalshadows.com/blog-and-research/ransomware-in-q3-2022/https://www.digitalshadows.com/blog-and-research/alternative-future-analysis-pro-ru...]]></itunes:summary>
    <description><![CDATA[<p>ShadowTalk host Nicole alongside guests Rick and Ivan give you the latest in threat intelligence. <br/><br/>This week they cover: </p><ul><li>REvil connection to Ransom Cartel</li><li>Cryptocurrency hacks in Japan by Lazarus</li><li>Toyota T-Connect Attack</li></ul><p>Resources:</p><ul><li>https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-21-october</li><li>https://www.digitalshadows.com/blog-and-research/ransomware-in-q3-2022/</li><li>https://www.digitalshadows.com/blog-and-research/alternative-future-analysis-pro-russian-hacktivism/</li><li>https://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk/special-geoff-white-and-the-lazarus-heist</li></ul>]]></description>
    <content:encoded><![CDATA[<p>ShadowTalk host Nicole alongside guests Rick and Ivan give you the latest in threat intelligence. <br/><br/>This week they cover: </p><ul><li>REvil connection to Ransom Cartel</li><li>Cryptocurrency hacks in Japan by Lazarus</li><li>Toyota T-Connect Attack</li></ul><p>Resources:</p><ul><li>https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-21-october</li><li>https://www.digitalshadows.com/blog-and-research/ransomware-in-q3-2022/</li><li>https://www.digitalshadows.com/blog-and-research/alternative-future-analysis-pro-russian-hacktivism/</li><li>https://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk/special-geoff-white-and-the-lazarus-heist</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461072-weekly-revil-connection-to-ransom-cartel-cryptocurrency-hacks-in-japan-by-lazarus-toyota-t-connect-attack.mp3" length="16670260" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/48wx5dh13obywms8asean1dxf0l1?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1367684170</guid>
    <pubDate>Fri, 21 Oct 2022 14:01:30 -0400</pubDate>
    <itunes:duration>1387</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: US Airports DDoS’d, Fortinet Vulnerability, Deep Dive Into Information Stealers</itunes:title>
    <title>Weekly: US Airports DDoS’d, Fortinet Vulnerability, Deep Dive Into Information Stealers</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside guests Kim give you the latest in threat intelligence. This week they cover: -Recent DDoS attacks on US Airports -Fortinet Vulnerability-A Deep Dive Into Information StealersGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-14-oct]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside guests Kim give you the latest in threat intelligence. This week they cover: -Recent DDoS attacks on US Airports -Fortinet Vulnerability-A Deep Dive Into Information StealersGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-14-oct]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside guests Kim give you the latest in threat intelligence. This week they cover: -Recent DDoS attacks on US Airports -Fortinet Vulnerability-A Deep Dive Into Information StealersGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-14-oct]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461073-weekly-us-airports-ddos-d-fortinet-vulnerability-deep-dive-into-information-stealers.mp3" length="18114406" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/q9zw37u6ybvud21adx78wc9t6jur?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1363101268</guid>
    <pubDate>Fri, 14 Oct 2022 13:59:40 -0400</pubDate>
    <itunes:duration>1508</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Rick Holland with Michael Farnum &amp; Greg Porterfield of Set Solutions: Uber breach &amp; 2023 predictions</itunes:title>
    <title>Rick Holland with Michael Farnum &amp; Greg Porterfield of Set Solutions: Uber breach &amp; 2023 predictions</title>
    <itunes:summary><![CDATA[ShadowTalk host and Digital Shadows CISO Rick Holland alongside Michael Farnum Chief Technology Officer at Set Solutions and Greg Porterfield, Senior Security Consultant at Set Solutions give you the latest in threat intelligence. This episode they cover: -How Defenders Should Respond to The Uber Breach-2023 planning For more information about Set Solutions, check out their podcast:https://www.setsolutions.com/category/podcast/Also, make sure you’ve looked at the details and have registered f...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host and Digital Shadows CISO Rick Holland alongside Michael Farnum Chief Technology Officer at Set Solutions and Greg Porterfield, Senior Security Consultant at Set Solutions give you the latest in threat intelligence. This episode they cover: -How Defenders Should Respond to The Uber Breach-2023 planning For more information about Set Solutions, check out their podcast:https://www.setsolutions.com/category/podcast/Also, make sure you’ve looked at the details and have registered for Hou.Sec.Con 2022:https://web.cvent.com/event/0ac8a54d-fbe9-4a16-8510-49dcf538389f/summary]]></description>
    <content:encoded><![CDATA[ShadowTalk host and Digital Shadows CISO Rick Holland alongside Michael Farnum Chief Technology Officer at Set Solutions and Greg Porterfield, Senior Security Consultant at Set Solutions give you the latest in threat intelligence. This episode they cover: -How Defenders Should Respond to The Uber Breach-2023 planning For more information about Set Solutions, check out their podcast:https://www.setsolutions.com/category/podcast/Also, make sure you’ve looked at the details and have registered for Hou.Sec.Con 2022:https://web.cvent.com/event/0ac8a54d-fbe9-4a16-8510-49dcf538389f/summary]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461074-rick-holland-with-michael-farnum-greg-porterfield-of-set-solutions-uber-breach-2023-predictions.mp3" length="35627026" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/fue6n3xz4zr2fnoody0tlxgrl0a3?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1354419853</guid>
    <pubDate>Fri, 30 Sep 2022 14:01:43 -0400</pubDate>
    <itunes:duration>2967</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>First use of LockBit Builder, Ransomware Groups Destroying vs. Encrypting Data, Domain Shadowing</itunes:title>
    <title>First use of LockBit Builder, Ransomware Groups Destroying vs. Encrypting Data, Domain Shadowing</title>
    <itunes:summary><![CDATA[ShadowTalk host Nicole alongside guests Stefano and Ivan give you the latest in threat intelligence. This week they cover: -Potential first use of LockBit Builder leak-Ransomware Groups Destroying vs. Encrypting Data-Increase in Domain ShadowingLockBit Builder leakGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/20220930-dsweeklyintsum ***Resources from this week’s podcast***Who’s Next In Lapsus$’ Crosshairs?https://www.digitalshadows.c...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Nicole alongside guests Stefano and Ivan give you the latest in threat intelligence. This week they cover: -Potential first use of LockBit Builder leak-Ransomware Groups Destroying vs. Encrypting Data-Increase in Domain ShadowingLockBit Builder leakGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/20220930-dsweeklyintsum ***Resources from this week’s podcast***Who’s Next In Lapsus$’ Crosshairs?https://www.digitalshadows.com/blog-and-research/whos-next-in-lapsus-crosshairs/ Dark Web Recruitment: How Ransomware Groups Hire Cybercriminal Talenthttps://www.digitalshadows.com/blog-and-research/dark-web-recruitment-how-ransomware-groups-hire-cybercriminal-talent/ Guide to Domain Shadowing Detectionhttps://ieeexplore.ieee.org/document/9148945]]></description>
    <content:encoded><![CDATA[ShadowTalk host Nicole alongside guests Stefano and Ivan give you the latest in threat intelligence. This week they cover: -Potential first use of LockBit Builder leak-Ransomware Groups Destroying vs. Encrypting Data-Increase in Domain ShadowingLockBit Builder leakGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/20220930-dsweeklyintsum ***Resources from this week’s podcast***Who’s Next In Lapsus$’ Crosshairs?https://www.digitalshadows.com/blog-and-research/whos-next-in-lapsus-crosshairs/ Dark Web Recruitment: How Ransomware Groups Hire Cybercriminal Talenthttps://www.digitalshadows.com/blog-and-research/dark-web-recruitment-how-ransomware-groups-hire-cybercriminal-talent/ Guide to Domain Shadowing Detectionhttps://ieeexplore.ieee.org/document/9148945]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461075-first-use-of-lockbit-builder-ransomware-groups-destroying-vs-encrypting-data-domain-shadowing.mp3" length="13747795" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/4sad3rm2nknkdf8glzignfhqj0xi?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1354356028</guid>
    <pubDate>Fri, 30 Sep 2022 12:02:44 -0400</pubDate>
    <itunes:duration>1144</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>LockBit Builder leak, Lapsus$ breaches Rockstar and Uber, Emotet pushes Quantum and Alphv ransomware</itunes:title>
    <title>LockBit Builder leak, Lapsus$ breaches Rockstar and Uber, Emotet pushes Quantum and Alphv ransomware</title>
    <itunes:summary><![CDATA[ShadowTalk host Nicole alongside Stefano give you the latest in threat intelligence. This week they cover:-LockBit Builder leak,-Lapsus$ breaches Rockstar Games and Uber,-Emotet pushes Quantum and Alphv ransomwareGet this week’s intelligence summary at: resources.digitalshadows.com/weekly-int…ry-23-sept]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Nicole alongside Stefano give you the latest in threat intelligence. This week they cover:-LockBit Builder leak,-Lapsus$ breaches Rockstar Games and Uber,-Emotet pushes Quantum and Alphv ransomwareGet this week’s intelligence summary at: resources.digitalshadows.com/weekly-int…ry-23-sept]]></description>
    <content:encoded><![CDATA[ShadowTalk host Nicole alongside Stefano give you the latest in threat intelligence. This week they cover:-LockBit Builder leak,-Lapsus$ breaches Rockstar Games and Uber,-Emotet pushes Quantum and Alphv ransomwareGet this week’s intelligence summary at: resources.digitalshadows.com/weekly-int…ry-23-sept]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461076-lockbit-builder-leak-lapsus-breaches-rockstar-and-uber-emotet-pushes-quantum-and-alphv-ransomware.mp3" length="17208899" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/rpee740e9o0moljftuw76artwfiv?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1349814775</guid>
    <pubDate>Fri, 23 Sep 2022 16:46:40 -0400</pubDate>
    <itunes:duration>1432</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Intermittent Encryption Tactics, Geopolitical Developments in Cyber Crime</itunes:title>
    <title>Weekly: Intermittent Encryption Tactics, Geopolitical Developments in Cyber Crime</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Danny give you the latest in threat intelligence. This week they cover: -Intermittent Encryption Tactics,-Geopolitical Developments in Cyber CrimeGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-16-sept***Resources from this week’s podcast***There’s No Honor Among Thieves: Carding Forum Staff Defraud Users In An ESCROW Scamhttps://www.digitalshadows.com/blog-and-research/theres...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Danny give you the latest in threat intelligence. This week they cover: -Intermittent Encryption Tactics,-Geopolitical Developments in Cyber CrimeGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-16-sept***Resources from this week’s podcast***There’s No Honor Among Thieves: Carding Forum Staff Defraud Users In An ESCROW Scamhttps://www.digitalshadows.com/blog-and-research/theres-no-honor-among-thieves-carding-forum-staff-defraud-users-in-an-escrow-scam/Ransomware Franchising: How Do Groups Get Startedhttps://www.digitalshadows.com/blog-and-research/ransomware-franchising-how-do-groups-get-started/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Danny give you the latest in threat intelligence. This week they cover: -Intermittent Encryption Tactics,-Geopolitical Developments in Cyber CrimeGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-16-sept***Resources from this week’s podcast***There’s No Honor Among Thieves: Carding Forum Staff Defraud Users In An ESCROW Scamhttps://www.digitalshadows.com/blog-and-research/theres-no-honor-among-thieves-carding-forum-staff-defraud-users-in-an-escrow-scam/Ransomware Franchising: How Do Groups Get Startedhttps://www.digitalshadows.com/blog-and-research/ransomware-franchising-how-do-groups-get-started/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461077-weekly-intermittent-encryption-tactics-geopolitical-developments-in-cyber-crime.mp3" length="18854181" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/0mqtonqwru6h78734hwcvkulokzb?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1345222870</guid>
    <pubDate>Fri, 16 Sep 2022 13:53:19 -0400</pubDate>
    <itunes:duration>1569</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Revival of Hacktivism, Targeting the Education Sector, Terror NFTs</itunes:title>
    <title>Weekly: Revival of Hacktivism, Targeting the Education Sector, Terror NFTs</title>
    <itunes:summary><![CDATA[ShadowTalk host Nicole alongside Ivan and Chris give you the latest in threat intelligence. This week they cover: -Increase in hacktivism since the Russian invasion of Ukraine -Threat Actors Targeting the Education Sector-New NTF Trends in Cyber Attacks Get this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-09-sept***Resources from this week’s podcast***APT Spotlight Series: APT41https://www.digitalshadows.com/blog...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Nicole alongside Ivan and Chris give you the latest in threat intelligence. This week they cover: -Increase in hacktivism since the Russian invasion of Ukraine -Threat Actors Targeting the Education Sector-New NTF Trends in Cyber Attacks Get this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-09-sept***Resources from this week’s podcast***APT Spotlight Series: APT41https://www.digitalshadows.com/blog-and-research/apt-spotlight-series-apt41/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Nicole alongside Ivan and Chris give you the latest in threat intelligence. This week they cover: -Increase in hacktivism since the Russian invasion of Ukraine -Threat Actors Targeting the Education Sector-New NTF Trends in Cyber Attacks Get this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-09-sept***Resources from this week’s podcast***APT Spotlight Series: APT41https://www.digitalshadows.com/blog-and-research/apt-spotlight-series-apt41/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461078-weekly-revival-of-hacktivism-targeting-the-education-sector-terror-nfts.mp3" length="17506249" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/qkbm59lc6n30o2qg4b7iugiluphs?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1340822182</guid>
    <pubDate>Fri, 09 Sep 2022 12:06:37 -0400</pubDate>
    <itunes:duration>1457</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: LastPass Incident, Montenegro Attacks</itunes:title>
    <title>Weekly: LastPass Incident, Montenegro Attacks</title>
    <itunes:summary><![CDATA[ShadowTalk host Stefano alongside Kim and Digital Shadows CISO Rick you the latest in threat intelligence. This week they cover: Details of the August attack on LastPassCoordinated and Precise Infrastructure Attacks in MontenegroGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-02-sept***Resources from this week’s podcast***“Looking For Pentesters”: How Forum Life Has Conformed To The Ransomware Banhttps://www...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Stefano alongside Kim and Digital Shadows CISO Rick you the latest in threat intelligence. This week they cover: Details of the August attack on LastPassCoordinated and Precise Infrastructure Attacks in MontenegroGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-02-sept***Resources from this week’s podcast***“Looking For Pentesters”: How Forum Life Has Conformed To The Ransomware Banhttps://www.digitalshadows.com/blog-and-research/looking-for-pentesters-how-forum-life-has-conformed-to-the-ransomware-ban/“I’m Tired Of Living In Poverty” – Russian-Speaking Cyber Criminals Feeling The Economic Pinchhttps://www.digitalshadows.com/blog-and-research/im-tired-of-living-in-poverty-russian-speaking-cyber-criminals-feeling-the-economic-pinch/]]></description>
    <content:encoded><![CDATA[ShadowTalk host Stefano alongside Kim and Digital Shadows CISO Rick you the latest in threat intelligence. This week they cover: Details of the August attack on LastPassCoordinated and Precise Infrastructure Attacks in MontenegroGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-02-sept***Resources from this week’s podcast***“Looking For Pentesters”: How Forum Life Has Conformed To The Ransomware Banhttps://www.digitalshadows.com/blog-and-research/looking-for-pentesters-how-forum-life-has-conformed-to-the-ransomware-ban/“I’m Tired Of Living In Poverty” – Russian-Speaking Cyber Criminals Feeling The Economic Pinchhttps://www.digitalshadows.com/blog-and-research/im-tired-of-living-in-poverty-russian-speaking-cyber-criminals-feeling-the-economic-pinch/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461079-weekly-lastpass-incident-montenegro-attacks.mp3" length="16055455" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/h98705d55t2ghyu63ebvypwoxn83?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1336500376</guid>
    <pubDate>Fri, 02 Sep 2022 12:50:45 -0400</pubDate>
    <itunes:duration>1336</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Cyber Threat Insurance, LockBit’s lockdown, Charming Kitten email attack</itunes:title>
    <title>Weekly: Cyber Threat Insurance, LockBit’s lockdown, Charming Kitten email attack</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Kim and Ivan bring you the latest in threat intelligence. This week they cover: - Lloyd’s of London Ltd. confirms policies state what they will and won’t cover- The LockBit sites have been shut down due to a DDoS attack- Charming Kitten uses a new tool to gather targeted email accountsGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-26-aug***Resources from this week’s podcast**...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Kim and Ivan bring you the latest in threat intelligence. This week they cover: - Lloyd’s of London Ltd. confirms policies state what they will and won’t cover- The LockBit sites have been shut down due to a DDoS attack- Charming Kitten uses a new tool to gather targeted email accountsGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-26-aug***Resources from this week’s podcast***Vulnerability Intelligence RoundUp: Cloudy With A Chance Of Zero Dayshttps://www.digitalshadows.com/blog-and-research/vulnerability-intelligence-roundup-cloudy-with-a-chance-of-zero-days/What We’re Reading This Month: August 2022https://www.digitalshadows.com/blog-and-research/what-were-reading-this-month-august-2022/]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Kim and Ivan bring you the latest in threat intelligence. This week they cover: - Lloyd’s of London Ltd. confirms policies state what they will and won’t cover- The LockBit sites have been shut down due to a DDoS attack- Charming Kitten uses a new tool to gather targeted email accountsGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-26-aug***Resources from this week’s podcast***Vulnerability Intelligence RoundUp: Cloudy With A Chance Of Zero Dayshttps://www.digitalshadows.com/blog-and-research/vulnerability-intelligence-roundup-cloudy-with-a-chance-of-zero-days/What We’re Reading This Month: August 2022https://www.digitalshadows.com/blog-and-research/what-were-reading-this-month-august-2022/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461080-weekly-cyber-threat-insurance-lockbit-s-lockdown-charming-kitten-email-attack.mp3" length="17706568" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/e04lrl763ayynkacp9sn409myq90?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1331940703</guid>
    <pubDate>Fri, 26 Aug 2022 13:49:16 -0400</pubDate>
    <itunes:duration>1474</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: BlackHat and Defcon Recap, Microsoft’s Patch Tuesday, North Korea Fake Coinbase Jobs</itunes:title>
    <title>Weekly: BlackHat and Defcon Recap, Microsoft’s Patch Tuesday, North Korea Fake Coinbase Jobs</title>
    <itunes:summary><![CDATA[ShadowTalk host Nicole alongside CISO Rick Holland bring you the latest in threat intelligence. This week they cover: - BlackHat and Defcon recap- Microsoft’s Patch Tuesday- North Korea fake Coinbase jobsGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-19-aug***Resources from this week’s podcast***Stop The Line: Cyber Threats Facing Manufacturinghttps://www.digitalshadows.com/blog-and-research/stop-the-line-c...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Nicole alongside CISO Rick Holland bring you the latest in threat intelligence. This week they cover: - BlackHat and Defcon recap- Microsoft’s Patch Tuesday- North Korea fake Coinbase jobsGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-19-aug***Resources from this week’s podcast***Stop The Line: Cyber Threats Facing Manufacturinghttps://www.digitalshadows.com/blog-and-research/stop-the-line-cyber-threats-facing-manufacturing/Honker Union: Has The Grandfather Of Chinese Hacktivism Returned?https://www.digitalshadows.com/blog-and-research/honker-union-has-the-grandfather-of-chinese-hacktivism-returned/]]></description>
    <content:encoded><![CDATA[ShadowTalk host Nicole alongside CISO Rick Holland bring you the latest in threat intelligence. This week they cover: - BlackHat and Defcon recap- Microsoft’s Patch Tuesday- North Korea fake Coinbase jobsGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-19-aug***Resources from this week’s podcast***Stop The Line: Cyber Threats Facing Manufacturinghttps://www.digitalshadows.com/blog-and-research/stop-the-line-cyber-threats-facing-manufacturing/Honker Union: Has The Grandfather Of Chinese Hacktivism Returned?https://www.digitalshadows.com/blog-and-research/honker-union-has-the-grandfather-of-chinese-hacktivism-returned/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461081-weekly-blackhat-and-defcon-recap-microsoft-s-patch-tuesday-north-korea-fake-coinbase-jobs.mp3" length="22830956" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/myz361fk1qez3nfr5h66cb7zfd1f?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1327145011</guid>
    <pubDate>Fri, 19 Aug 2022 10:54:03 -0400</pubDate>
    <itunes:duration>1901</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: A History of Ransomware, deBridge Hack Details, Advice for Multiple Ransomware Attacks</itunes:title>
    <title>Weekly: A History of Ransomware, deBridge Hack Details, Advice for Multiple Ransomware Attacks</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Stefano bring you the latest in threat intelligence. This week they cover: - History of ransomware- Details of the deBridge hack- Thoughts and recommendations for organizations targeted multiple timesGet this week’s intelligence summary at: ***Resources from this week’s podcast***Tensions Between The PRC And Taiwan: What’s Happening?https://www.digitalshadows.com/blog-and-research/tensions-between-the-prc-and-taiwan-whats-happening/Meet DUMPS Forum: A Pro-Ukrai...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Stefano bring you the latest in threat intelligence. This week they cover: - History of ransomware- Details of the deBridge hack- Thoughts and recommendations for organizations targeted multiple timesGet this week’s intelligence summary at: ***Resources from this week’s podcast***Tensions Between The PRC And Taiwan: What’s Happening?https://www.digitalshadows.com/blog-and-research/tensions-between-the-prc-and-taiwan-whats-happening/Meet DUMPS Forum: A Pro-Ukraine, Anti-Russia Cybercriminal Forumhttps://www.digitalshadows.com/blog-and-research/meet-dumps-forum-a-pro-ukraine-anti-russia-cybercriminal-forum/]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Stefano bring you the latest in threat intelligence. This week they cover: - History of ransomware- Details of the deBridge hack- Thoughts and recommendations for organizations targeted multiple timesGet this week’s intelligence summary at: ***Resources from this week’s podcast***Tensions Between The PRC And Taiwan: What’s Happening?https://www.digitalshadows.com/blog-and-research/tensions-between-the-prc-and-taiwan-whats-happening/Meet DUMPS Forum: A Pro-Ukraine, Anti-Russia Cybercriminal Forumhttps://www.digitalshadows.com/blog-and-research/meet-dumps-forum-a-pro-ukraine-anti-russia-cybercriminal-forum/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461082-weekly-a-history-of-ransomware-debridge-hack-details-advice-for-multiple-ransomware-attacks.mp3" length="23650683" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/idqchrjk3mnv5fwz4v0o0gpwfp8r?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1322496109</guid>
    <pubDate>Thu, 11 Aug 2022 17:36:16 -0400</pubDate>
    <itunes:duration>1969</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: 911 Proxy Service Ends, ALPHV claims attack on pipeline and Recent news from Taiwan &amp; China</itunes:title>
    <title>Weekly: 911 Proxy Service Ends, ALPHV claims attack on pipeline and Recent news from Taiwan &amp; China</title>
    <itunes:summary><![CDATA[ShadowTalk host Stefano alongside Chris bring you the latest in threat intelligence. This week they cover: - 911 proxy service ends protection for cybercriminals- ALPHV (aka BlackCat) ransomware claims attack on European gas pipeline- Cyber threat implications from recent news in Taiwan &amp; China Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-05-aug***Resources from this week’s podcast***The Boy Who Cried Ransomware: ...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Stefano alongside Chris bring you the latest in threat intelligence. This week they cover: - 911 proxy service ends protection for cybercriminals- ALPHV (aka BlackCat) ransomware claims attack on European gas pipeline- Cyber threat implications from recent news in Taiwan &amp; China Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-05-aug***Resources from this week’s podcast***The Boy Who Cried Ransomware: The Trustworthiness Of Ransomware Groupshttps://www.digitalshadows.com/blog-and-research/the-boy-who-cried-ransomware-the-trustworthiness-of-ransomware-groups/ReliaQuest And Digital Shadows – The Next Stage Of The Journeyhttps://www.digitalshadows.com/blog-and-research/reliaquest-and-digital-shadows-the-next-stage-of-the-journey/]]></description>
    <content:encoded><![CDATA[ShadowTalk host Stefano alongside Chris bring you the latest in threat intelligence. This week they cover: - 911 proxy service ends protection for cybercriminals- ALPHV (aka BlackCat) ransomware claims attack on European gas pipeline- Cyber threat implications from recent news in Taiwan &amp; China Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-05-aug***Resources from this week’s podcast***The Boy Who Cried Ransomware: The Trustworthiness Of Ransomware Groupshttps://www.digitalshadows.com/blog-and-research/the-boy-who-cried-ransomware-the-trustworthiness-of-ransomware-groups/ReliaQuest And Digital Shadows – The Next Stage Of The Journeyhttps://www.digitalshadows.com/blog-and-research/reliaquest-and-digital-shadows-the-next-stage-of-the-journey/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461083-weekly-911-proxy-service-ends-alphv-claims-attack-on-pipeline-and-recent-news-from-taiwan-china.mp3" length="23844103" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/hzczyutlgusu1ww30jkj17ibcr2j?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1318562707</guid>
    <pubDate>Fri, 05 Aug 2022 10:57:15 -0400</pubDate>
    <itunes:duration>1985</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Entrust Ransomware Attack, Coinbase Insider-Trading Case and Redeemer Ransomware Builder</itunes:title>
    <title>Weekly: Entrust Ransomware Attack, Coinbase Insider-Trading Case and Redeemer Ransomware Builder</title>
    <itunes:summary><![CDATA[ShadowTalk host Nicole alongside Ivan and CISO Rick Holland bring you the latest in threat intelligence. This week they cover: - Entrust suffered a ransomware attack- Ex-Coinbase manager charged in first crypto insider-trading case- Redeemer ransomware builderGet this week’s intelligence summary at: ***Resources from this week’s podcast***Holy Ghost’s Bargain Basement Approach To Ransomwarehttps://www.digitalshadows.com/blog-and-research/holy-ghosts-bargain-basement-approach-to-ransomware/Jul...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Nicole alongside Ivan and CISO Rick Holland bring you the latest in threat intelligence. This week they cover: - Entrust suffered a ransomware attack- Ex-Coinbase manager charged in first crypto insider-trading case- Redeemer ransomware builderGet this week’s intelligence summary at: ***Resources from this week’s podcast***Holy Ghost’s Bargain Basement Approach To Ransomwarehttps://www.digitalshadows.com/blog-and-research/holy-ghosts-bargain-basement-approach-to-ransomware/July edition of What we are reading this monthhttps://www.digitalshadows.com/blog-and-research/what-were-reading-this-month-july-2022/How To Paint Your Best Cyber Threat Landscape: My Three Top Tips From ENISA’s Methodology Reporthttps://www.digitalshadows.com/blog-and-research/how-to-paint-your-best-cyber-threat-landscape-my-three-top-tips-from-enisas-methodology-report/]]></description>
    <content:encoded><![CDATA[ShadowTalk host Nicole alongside Ivan and CISO Rick Holland bring you the latest in threat intelligence. This week they cover: - Entrust suffered a ransomware attack- Ex-Coinbase manager charged in first crypto insider-trading case- Redeemer ransomware builderGet this week’s intelligence summary at: ***Resources from this week’s podcast***Holy Ghost’s Bargain Basement Approach To Ransomwarehttps://www.digitalshadows.com/blog-and-research/holy-ghosts-bargain-basement-approach-to-ransomware/July edition of What we are reading this monthhttps://www.digitalshadows.com/blog-and-research/what-were-reading-this-month-july-2022/How To Paint Your Best Cyber Threat Landscape: My Three Top Tips From ENISA’s Methodology Reporthttps://www.digitalshadows.com/blog-and-research/how-to-paint-your-best-cyber-threat-landscape-my-three-top-tips-from-enisas-methodology-report/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461084-weekly-entrust-ransomware-attack-coinbase-insider-trading-case-and-redeemer-ransomware-builder.mp3" length="17753156" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ffztdypjkwpbnkacmlhbc7g40rr0?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1314113983</guid>
    <pubDate>Fri, 29 Jul 2022 09:11:08 -0400</pubDate>
    <itunes:duration>1478</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: North Korea Makes Comeback with Ransomware, How Malware is Distributed, Russia Fines Google</itunes:title>
    <title>Weekly: North Korea Makes Comeback with Ransomware, How Malware is Distributed, Russia Fines Google</title>
    <itunes:summary><![CDATA[ShadowTalk host Stefano alongside Chris and Dani bring you the latest in threat intelligence. This week they cover:* HolyGhost6 ransomware operation linked with North Korea* Explanation on how malware is created and distributed* Russia fines Google for failing to delete YouTube videos ***Resources from this week’s podcast***Q2 2022 Vulnerability Rounduphttps://www.digitalshadows.com/blog-and-research/q2-2022-vulnerability-roundup/Breach Forums – When Student Becomes The Teacherhttps://www.dig...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Stefano alongside Chris and Dani bring you the latest in threat intelligence. This week they cover:* HolyGhost6 ransomware operation linked with North Korea* Explanation on how malware is created and distributed* Russia fines Google for failing to delete YouTube videos ***Resources from this week’s podcast***Q2 2022 Vulnerability Rounduphttps://www.digitalshadows.com/blog-and-research/q2-2022-vulnerability-roundup/Breach Forums – When Student Becomes The Teacherhttps://www.digitalshadows.com/blog-and-research/breach-forums-when-student-becomes-the-teacher/How To Paint Your Best Cyber Threat Landscape: My Three Top Tips From ENISA’s Methodology Reporthttps://www.digitalshadows.com/blog-and-research/how-to-paint-your-best-cyber-threat-landscape-my-three-top-tips-from-enisas-methodology-report/Microsoft links Holy Ghost ransomware operation to North Korean hackershttps://www.bleepingcomputer.com/news/security/microsoft-links-holy-ghost-ransomware-operation-to-north-korean-hackers/Russia fines Google $358 million for not removing banned infohttps://www.bleepingcomputer.com/news/security/russia-fines-google-358-million-for-not-removing-banned-info/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Stefano alongside Chris and Dani bring you the latest in threat intelligence. This week they cover:* HolyGhost6 ransomware operation linked with North Korea* Explanation on how malware is created and distributed* Russia fines Google for failing to delete YouTube videos ***Resources from this week’s podcast***Q2 2022 Vulnerability Rounduphttps://www.digitalshadows.com/blog-and-research/q2-2022-vulnerability-roundup/Breach Forums – When Student Becomes The Teacherhttps://www.digitalshadows.com/blog-and-research/breach-forums-when-student-becomes-the-teacher/How To Paint Your Best Cyber Threat Landscape: My Three Top Tips From ENISA’s Methodology Reporthttps://www.digitalshadows.com/blog-and-research/how-to-paint-your-best-cyber-threat-landscape-my-three-top-tips-from-enisas-methodology-report/Microsoft links Holy Ghost ransomware operation to North Korean hackershttps://www.bleepingcomputer.com/news/security/microsoft-links-holy-ghost-ransomware-operation-to-north-korean-hackers/Russia fines Google $358 million for not removing banned infohttps://www.bleepingcomputer.com/news/security/russia-fines-google-358-million-for-not-removing-banned-info/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461085-weekly-north-korea-makes-comeback-with-ransomware-how-malware-is-distributed-russia-fines-google.mp3" length="33428672" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/6h1y6qs4t033pbmabiru2uewzlyv?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1310002585</guid>
    <pubDate>Fri, 22 Jul 2022 13:26:29 -0400</pubDate>
    <itunes:duration>2784</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Microsoft Patch Tuesday, Russia Targeted, Hive Ransomware Upgrade, TrickBot Attacks Ukraine</itunes:title>
    <title>Weekly: Microsoft Patch Tuesday, Russia Targeted, Hive Ransomware Upgrade, TrickBot Attacks Ukraine</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Nicole, Ivan, and Rick bring you the latest in threat intelligence. This week they cover:* Microsoft Patch Tuesday* Chinese cyber espionage groups target Russia* Hive ransomware group takes LockBit information to upgrade to Rust* IBM Security X-Force finds evidence on TrickBot attacking Ukraine***Resources from this week’s podcast***Ransomware in Q2 2022: Ransomware is Back in Businesshttps://www.digitalshadows.com/blog-and-research/ransomware-in-q2-2022-ransom...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Nicole, Ivan, and Rick bring you the latest in threat intelligence. This week they cover:* Microsoft Patch Tuesday* Chinese cyber espionage groups target Russia* Hive ransomware group takes LockBit information to upgrade to Rust* IBM Security X-Force finds evidence on TrickBot attacking Ukraine***Resources from this week’s podcast***Ransomware in Q2 2022: Ransomware is Back in Businesshttps://www.digitalshadows.com/blog-and-research/ransomware-in-q2-2022-ransomware-is-back-in-business/Offensive Nation-State Cyber Threats: Who Takes The Top Spot?https://www.digitalshadows.com/blog-and-research/offensive-nation-state-cyber-threats-who-takes-the-top-spot/Chinese Cyber Espionage Groups Increasingly Targeting Russiahttps://www.infosecurity-magazine.com/news/chinese-cyber-espionage-russia/Hive Ransomware Upgrades to Rust for More Sophisticated Encryption Methodhttps://thehackernews.com/2022/07/hive-ransomware-upgrades-to-rust-for.htmlUnprecedented Shift: The Trickbot Group is Systematically Attacking Ukrainehttps://securityintelligence.com/posts/trickbot-group-systematically-attacking-ukraine/Conti ransomware gang takes over TrickBot malware operationhttps://www.bleepingcomputer.com/news/security/conti-ransomware-gang-takes-over-trickbot-malware-operation/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Nicole, Ivan, and Rick bring you the latest in threat intelligence. This week they cover:* Microsoft Patch Tuesday* Chinese cyber espionage groups target Russia* Hive ransomware group takes LockBit information to upgrade to Rust* IBM Security X-Force finds evidence on TrickBot attacking Ukraine***Resources from this week’s podcast***Ransomware in Q2 2022: Ransomware is Back in Businesshttps://www.digitalshadows.com/blog-and-research/ransomware-in-q2-2022-ransomware-is-back-in-business/Offensive Nation-State Cyber Threats: Who Takes The Top Spot?https://www.digitalshadows.com/blog-and-research/offensive-nation-state-cyber-threats-who-takes-the-top-spot/Chinese Cyber Espionage Groups Increasingly Targeting Russiahttps://www.infosecurity-magazine.com/news/chinese-cyber-espionage-russia/Hive Ransomware Upgrades to Rust for More Sophisticated Encryption Methodhttps://thehackernews.com/2022/07/hive-ransomware-upgrades-to-rust-for.htmlUnprecedented Shift: The Trickbot Group is Systematically Attacking Ukrainehttps://securityintelligence.com/posts/trickbot-group-systematically-attacking-ukraine/Conti ransomware gang takes over TrickBot malware operationhttps://www.bleepingcomputer.com/news/security/conti-ransomware-gang-takes-over-trickbot-malware-operation/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461086-weekly-microsoft-patch-tuesday-russia-targeted-hive-ransomware-upgrade-trickbot-attacks-ukraine.mp3" length="23221482" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/4kp4g6uutwzajlsvsaxcmkk6lop7?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1305894403</guid>
    <pubDate>Fri, 15 Jul 2022 14:08:16 -0400</pubDate>
    <itunes:duration>1933</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Chinese Data Leaked, Crypto Scam Targets British Army, Bug Bounty Reports Insider Threat</itunes:title>
    <title>Weekly: Chinese Data Leaked, Crypto Scam Targets British Army, Bug Bounty Reports Insider Threat</title>
    <itunes:summary><![CDATA[ShadowTalk host Stefano alongside Dani bring you the latest in threat intelligence. This week they cover:* Roughly 1 billion Chinese citizens' data breached* British Army's Youtube and Twitter accounts hacked and used to promote cryptocurrency scams* HackerOne employee steals bug reports to sell ***Resources from this week’s podcast***What We’re Reading This Month: June 2022https://www.digitalshadows.com/blog-and-research/what-were-reading-this-month-june-2022/Hacker claims to have stolen 1 b...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Stefano alongside Dani bring you the latest in threat intelligence. This week they cover:* Roughly 1 billion Chinese citizens&apos; data breached* British Army&apos;s Youtube and Twitter accounts hacked and used to promote cryptocurrency scams* HackerOne employee steals bug reports to sell ***Resources from this week’s podcast***What We’re Reading This Month: June 2022https://www.digitalshadows.com/blog-and-research/what-were-reading-this-month-june-2022/Hacker claims to have stolen 1 bln records of Chinese citizens from policehttps://www.reuters.com/world/china/hacker-claims-have-stolen-1-bln-records-chinese-citizens-police-2022-07-04/British Army’s YouTube and Twitter accounts were hacked to promote crypto scamshttps://www.theverge.com/2022/7/3/23193668/british-army-youtube-twitter-accounts-hacked-promote-crypto-scam-fraudRogue HackerOne employee steals bug reports to sell on the sidehttps://www.bleepingcomputer.com/news/security/rogue-hackerone-employee-steals-bug-reports-to-sell-on-the-side/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Stefano alongside Dani bring you the latest in threat intelligence. This week they cover:* Roughly 1 billion Chinese citizens&apos; data breached* British Army&apos;s Youtube and Twitter accounts hacked and used to promote cryptocurrency scams* HackerOne employee steals bug reports to sell ***Resources from this week’s podcast***What We’re Reading This Month: June 2022https://www.digitalshadows.com/blog-and-research/what-were-reading-this-month-june-2022/Hacker claims to have stolen 1 bln records of Chinese citizens from policehttps://www.reuters.com/world/china/hacker-claims-have-stolen-1-bln-records-chinese-citizens-police-2022-07-04/British Army’s YouTube and Twitter accounts were hacked to promote crypto scamshttps://www.theverge.com/2022/7/3/23193668/british-army-youtube-twitter-accounts-hacked-promote-crypto-scam-fraudRogue HackerOne employee steals bug reports to sell on the sidehttps://www.bleepingcomputer.com/news/security/rogue-hackerone-employee-steals-bug-reports-to-sell-on-the-side/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461087-weekly-chinese-data-leaked-crypto-scam-targets-british-army-bug-bounty-reports-insider-threat.mp3" length="25679088" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/xkfc8jd21eqdg3eyjiu6rjjwx88s?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1301976022</guid>
    <pubDate>Fri, 08 Jul 2022 14:11:02 -0400</pubDate>
    <itunes:duration>2138</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Cyber Threat Intelligence Aids Ukraine, Conti Stops Data Leak, LockBit&#39;s New Bounty Program</itunes:title>
    <title>Weekly: Cyber Threat Intelligence Aids Ukraine, Conti Stops Data Leak, LockBit&#39;s New Bounty Program</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Stefano and Kim bring you the latest in threat intelligence. This week they cover:* Recent advances in cyber threat intelligence and end-point protection have helped Ukraine* Conti finally shuts down data leak and negotiates with victims* LockBit debuts ransomware bug bounty program***Resources from this week’s podcast***Market Differentiation: Cybercriminal Forums’ Unusual Features Designed To Attract Usershttps://www.digitalshadows.com/blog-and-research/marke...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Stefano and Kim bring you the latest in threat intelligence. This week they cover:* Recent advances in cyber threat intelligence and end-point protection have helped Ukraine* Conti finally shuts down data leak and negotiates with victims* LockBit debuts ransomware bug bounty program***Resources from this week’s podcast***Market Differentiation: Cybercriminal Forums’ Unusual Features Designed To Attract Usershttps://www.digitalshadows.com/blog-and-research/market-differentiation-cybercriminal-forums-unusual-features-designed-to-attract-users/NATO Leaders Are Meeting At The Madrid Summit 2022: What Is Going To Happen?https://www.digitalshadows.com/blog-and-research/nato-leaders-are-meeting-at-the-madrid-summit-2022-what-is-going-to-happen/Defending Ukraine: Early Lessons from the Cyber Warhttps://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/Conti ransomware finally shuts down data leak, negotiation siteshttps://www.bleepingcomputer.com/news/security/conti-ransomware-finally-shuts-down-data-leak-negotiation-sites/LockBit 3.0 Debuts With Ransomware Bug Bounty Programhttps://www.darkreading.com/threat-intelligence/lockbit-3-debut-bug-bounty-programSubscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Stefano and Kim bring you the latest in threat intelligence. This week they cover:* Recent advances in cyber threat intelligence and end-point protection have helped Ukraine* Conti finally shuts down data leak and negotiates with victims* LockBit debuts ransomware bug bounty program***Resources from this week’s podcast***Market Differentiation: Cybercriminal Forums’ Unusual Features Designed To Attract Usershttps://www.digitalshadows.com/blog-and-research/market-differentiation-cybercriminal-forums-unusual-features-designed-to-attract-users/NATO Leaders Are Meeting At The Madrid Summit 2022: What Is Going To Happen?https://www.digitalshadows.com/blog-and-research/nato-leaders-are-meeting-at-the-madrid-summit-2022-what-is-going-to-happen/Defending Ukraine: Early Lessons from the Cyber Warhttps://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/Conti ransomware finally shuts down data leak, negotiation siteshttps://www.bleepingcomputer.com/news/security/conti-ransomware-finally-shuts-down-data-leak-negotiation-sites/LockBit 3.0 Debuts With Ransomware Bug Bounty Programhttps://www.darkreading.com/threat-intelligence/lockbit-3-debut-bug-bounty-programSubscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461088-weekly-cyber-threat-intelligence-aids-ukraine-conti-stops-data-leak-lockbit-s-new-bounty-program.mp3" length="22127486" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ge8fizsopy7z9n818u94j1qwoytb?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1298124565</guid>
    <pubDate>Fri, 01 Jul 2022 14:26:37 -0400</pubDate>
    <itunes:duration>1842</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: AlphV Publishes Victims&#39; Data, &#39;BidenCash&#39; Website Sells Credit Card Info, ATO Paper</itunes:title>
    <title>Weekly: AlphV Publishes Victims&#39; Data, &#39;BidenCash&#39; Website Sells Credit Card Info, ATO Paper</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Stefano and Kim bring you the latest in threat intelligence. This week they cover:* AlphV breaching victims' data in open source* 'BidenCash' website sells your credit card information for only 15 cents* Account Takeover paper***Resources from this week’s podcast***POLONIUM: Proxy Warfare And Iran’s Cyber Strategyhttps://www.digitalshadows.com/blog-and-research/polonium-proxy-warfare-and-irans-cyber-strategy/Vulnerability Intelligence Roundup: Leveraging The OO...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Stefano and Kim bring you the latest in threat intelligence. This week they cover:* AlphV breaching victims&apos; data in open source* &apos;BidenCash&apos; website sells your credit card information for only 15 cents* Account Takeover paper***Resources from this week’s podcast***POLONIUM: Proxy Warfare And Iran’s Cyber Strategyhttps://www.digitalshadows.com/blog-and-research/polonium-proxy-warfare-and-irans-cyber-strategy/Vulnerability Intelligence Roundup: Leveraging The OODA Loop For Vulnerability Managementhttps://www.digitalshadows.com/blog-and-research/vulnerability-intelligence-roundup-leveraging-the-ooda-loop-for-vulnerability-management/Credential Stuffing: What Is It, Are You At Risk?https://www.digitalshadows.com/blog-and-research/credential-stuffing-what-is-it-are-you-at-risk/ALPHV/BlackCat ransomware gang starts publishing victims’ data on the clear webhttps://securityaffairs.co/wordpress/132339/malware/blackcat-ransomware-clear-web.htmlNew &apos;BidenCash&apos; site sells your stolen credit card for just 15 centshttps://www.bleepingcomputer.com/news/security/new-bidencash-site-sells-your-stolen-credit-card-for-just-15-cents/The Anatomy of a Cyberattackhttps://www.wsj.com/articles/anatomy-cyberattack-11654543046Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Stefano and Kim bring you the latest in threat intelligence. This week they cover:* AlphV breaching victims&apos; data in open source* &apos;BidenCash&apos; website sells your credit card information for only 15 cents* Account Takeover paper***Resources from this week’s podcast***POLONIUM: Proxy Warfare And Iran’s Cyber Strategyhttps://www.digitalshadows.com/blog-and-research/polonium-proxy-warfare-and-irans-cyber-strategy/Vulnerability Intelligence Roundup: Leveraging The OODA Loop For Vulnerability Managementhttps://www.digitalshadows.com/blog-and-research/vulnerability-intelligence-roundup-leveraging-the-ooda-loop-for-vulnerability-management/Credential Stuffing: What Is It, Are You At Risk?https://www.digitalshadows.com/blog-and-research/credential-stuffing-what-is-it-are-you-at-risk/ALPHV/BlackCat ransomware gang starts publishing victims’ data on the clear webhttps://securityaffairs.co/wordpress/132339/malware/blackcat-ransomware-clear-web.htmlNew &apos;BidenCash&apos; site sells your stolen credit card for just 15 centshttps://www.bleepingcomputer.com/news/security/new-bidencash-site-sells-your-stolen-credit-card-for-just-15-cents/The Anatomy of a Cyberattackhttps://www.wsj.com/articles/anatomy-cyberattack-11654543046Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461089-weekly-alphv-publishes-victims-data-bidencash-website-sells-credit-card-info-ato-paper.mp3" length="26008213" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/3hc34q9dfnd8lrwycgsiimd8c7wv?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1293794776</guid>
    <pubDate>Fri, 24 Jun 2022 14:59:40 -0400</pubDate>
    <itunes:duration>2165</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Follina Zero Day, Conti Shuts Down Affiliate Program, LockBit vs Mandiant Discussion</itunes:title>
    <title>Weekly: Follina Zero Day, Conti Shuts Down Affiliate Program, LockBit vs Mandiant Discussion</title>
    <itunes:summary><![CDATA[ShadowTalk host Stefano alongside Ivan, Nicole, and Rick bring you the latest in threat intelligence. This week they cover:* Cybersecurity researchers disclosed a new Windows zero-day vulnerability* Conti shuts down affiliate program* Cybercriminals discuss LockBit vs Mandiant***Resources from this week’s podcast***Weak Credentials Are Fueling A New Generation Of Cyber Threatshttps://www.digitalshadows.com/blog-and-research/weak-credentials-are-fueling-a-new-generation-of-cyber-threats/Subscr...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Stefano alongside Ivan, Nicole, and Rick bring you the latest in threat intelligence. This week they cover:* Cybersecurity researchers disclosed a new Windows zero-day vulnerability* Conti shuts down affiliate program* Cybercriminals discuss LockBit vs Mandiant***Resources from this week’s podcast***Weak Credentials Are Fueling A New Generation Of Cyber Threatshttps://www.digitalshadows.com/blog-and-research/weak-credentials-are-fueling-a-new-generation-of-cyber-threats/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Stefano alongside Ivan, Nicole, and Rick bring you the latest in threat intelligence. This week they cover:* Cybersecurity researchers disclosed a new Windows zero-day vulnerability* Conti shuts down affiliate program* Cybercriminals discuss LockBit vs Mandiant***Resources from this week’s podcast***Weak Credentials Are Fueling A New Generation Of Cyber Threatshttps://www.digitalshadows.com/blog-and-research/weak-credentials-are-fueling-a-new-generation-of-cyber-threats/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461090-weekly-follina-zero-day-conti-shuts-down-affiliate-program-lockbit-vs-mandiant-discussion.mp3" length="22526631" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/9kwmf9nhsvjiuwuixjlgs3zrg997?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1289463760</guid>
    <pubDate>Fri, 17 Jun 2022 12:48:45 -0400</pubDate>
    <itunes:duration>1875</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: LockBit PR Stunt Against Mandiant and Bohrium Targeted Users Via Spear-Phishing Operations</itunes:title>
    <title>Weekly: LockBit PR Stunt Against Mandiant and Bohrium Targeted Users Via Spear-Phishing Operations</title>
    <itunes:summary><![CDATA[ShadowTalk host Stefano alongside Xue, and Kim bring you the latest in threat intelligence. This week they cover:- LockBit x Mandiant PR stunt- Bohrium targets victims in various geographiesGet this week’s intelligence summary at:https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-10-jun/***Resources from this week’s podcast*** Killnet: The Hactivist Group That Started A Global Cyber War:https://www.digitalshadows.com/blog-and-research/killnet-the-hact...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Stefano alongside Xue, and Kim bring you the latest in threat intelligence. This week they cover:- LockBit x Mandiant PR stunt- Bohrium targets victims in various geographiesGet this week’s intelligence summary at:https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-10-jun/***Resources from this week’s podcast*** Killnet: The Hactivist Group That Started A Global Cyber War:https://www.digitalshadows.com/blog-and-research/killnet-the-hactivist-group-that-started-a-global-cyber-war/-Ransomware Gangs and PR Stunts: Why LockBit Faked a Ransomware Attack Against Mandianthttps://www.digitalshadows.com/blog-and-research/ransomware-gangs-and-pr-stunts-why-lockbit-faked-a-ransomware-attack-against-mandiant/]]></description>
    <content:encoded><![CDATA[ShadowTalk host Stefano alongside Xue, and Kim bring you the latest in threat intelligence. This week they cover:- LockBit x Mandiant PR stunt- Bohrium targets victims in various geographiesGet this week’s intelligence summary at:https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-10-jun/***Resources from this week’s podcast*** Killnet: The Hactivist Group That Started A Global Cyber War:https://www.digitalshadows.com/blog-and-research/killnet-the-hactivist-group-that-started-a-global-cyber-war/-Ransomware Gangs and PR Stunts: Why LockBit Faked a Ransomware Attack Against Mandianthttps://www.digitalshadows.com/blog-and-research/ransomware-gangs-and-pr-stunts-why-lockbit-faked-a-ransomware-attack-against-mandiant/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461091-weekly-lockbit-pr-stunt-against-mandiant-and-bohrium-targeted-users-via-spear-phishing-operations.mp3" length="22166505" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/0in9zbwvlx1kutjl2a166uijrty1?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1284979099</guid>
    <pubDate>Fri, 10 Jun 2022 11:33:09 -0400</pubDate>
    <itunes:duration>1845</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Geoff White and the Lazarus Heist</itunes:title>
    <title>Special: Geoff White and the Lazarus Heist</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Nicole and special guest Geoff White cover the cybercrime group Lazarus and their impact in cyber security.In this special episode, they discuss:* Geoff's new book 'The Lazarus Heist'* An overview of the Lazarus Group* How North Korea created one of the most sophisticated cyber crime groups in the world**Resources from this special podcast**Find Geoff on Twitter: https://twitter.com/geoffwhite247Find Geoff on LinkedIn: https://www.linkedin.com/in/geoffwhite247/...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Nicole and special guest Geoff White cover the cybercrime group Lazarus and their impact in cyber security.In this special episode, they discuss:* Geoff&apos;s new book &apos;The Lazarus Heist&apos;* An overview of the Lazarus Group* How North Korea created one of the most sophisticated cyber crime groups in the world**Resources from this special podcast**Find Geoff on Twitter: https://twitter.com/geoffwhite247Find Geoff on LinkedIn: https://www.linkedin.com/in/geoffwhite247/Pre-order Geoff&apos;s book &apos;The Lazarus Heist&apos; now:https://www.penguin.co.uk/books/447/447163/the-lazarus-heist/9780241554258.htmlSubscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Nicole and special guest Geoff White cover the cybercrime group Lazarus and their impact in cyber security.In this special episode, they discuss:* Geoff&apos;s new book &apos;The Lazarus Heist&apos;* An overview of the Lazarus Group* How North Korea created one of the most sophisticated cyber crime groups in the world**Resources from this special podcast**Find Geoff on Twitter: https://twitter.com/geoffwhite247Find Geoff on LinkedIn: https://www.linkedin.com/in/geoffwhite247/Pre-order Geoff&apos;s book &apos;The Lazarus Heist&apos; now:https://www.penguin.co.uk/books/447/447163/the-lazarus-heist/9780241554258.htmlSubscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461092-special-geoff-white-and-the-lazarus-heist.mp3" length="20888238" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/sbrni8ocdayapb1c5xo57g6rens9?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1278664069</guid>
    <pubDate>Tue, 31 May 2022 13:38:16 -0400</pubDate>
    <itunes:duration>1738</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: David Thejl-Clayton Talks Rolling Your Own Verizon DBIR</itunes:title>
    <title>Special: David Thejl-Clayton Talks Rolling Your Own Verizon DBIR</title>
    <itunes:summary><![CDATA[Digital Shadows CISO Rick Holland hosts this edition of ShadowTalk. Rick is joined by repeat special guest David Thejl-Clayton, Senior Advisor in Cyber Defense at Combitech. They discuss:- Rick and David's thoughts on the 2022 DBIR report (Full disclosure, they are fanboys) - Research that shows how APT groups primarily go after known vulnerabilities and not 0days- David's experience helping customers create their custom version of the DBIR***Resources from this week’s podcast***Find David on...]]></itunes:summary>
    <description><![CDATA[Digital Shadows CISO Rick Holland hosts this edition of ShadowTalk. Rick is joined by repeat special guest David Thejl-Clayton, Senior Advisor in Cyber Defense at Combitech. They discuss:- Rick and David&apos;s thoughts on the 2022 DBIR report (Full disclosure, they are fanboys) - Research that shows how APT groups primarily go after known vulnerabilities and not 0days- David&apos;s experience helping customers create their custom version of the DBIR***Resources from this week’s podcast***Find David on Twitter: https://twitter.com/DCSecuritydkFind David on LinkedIn: https://www.linkedin.com/in/davidclayton454/2022 Data Breach Investigations Report: https://www.verizon.com/business/resources/reports/dbir/Vocabulary for Event Recording and Information Sharing (VERIS): http://veriscommunity.net/SANS CTI Summit - VERISIZE your way into CTI: https://www.youtube.com/watch?v=AwMC6INC5TESoftware Updates Strategies: a Quantitative Evaluation against Advanced Persistent Threats https://arxiv.org/abs/2205.07759VSec Community: https://vsec.dk/about/Checkout the “Roll your own DBIR” Templates on GitHub here: https://github.com/cvpl-fdca/rollyourown-DBIR]]></description>
    <content:encoded><![CDATA[Digital Shadows CISO Rick Holland hosts this edition of ShadowTalk. Rick is joined by repeat special guest David Thejl-Clayton, Senior Advisor in Cyber Defense at Combitech. They discuss:- Rick and David&apos;s thoughts on the 2022 DBIR report (Full disclosure, they are fanboys) - Research that shows how APT groups primarily go after known vulnerabilities and not 0days- David&apos;s experience helping customers create their custom version of the DBIR***Resources from this week’s podcast***Find David on Twitter: https://twitter.com/DCSecuritydkFind David on LinkedIn: https://www.linkedin.com/in/davidclayton454/2022 Data Breach Investigations Report: https://www.verizon.com/business/resources/reports/dbir/Vocabulary for Event Recording and Information Sharing (VERIS): http://veriscommunity.net/SANS CTI Summit - VERISIZE your way into CTI: https://www.youtube.com/watch?v=AwMC6INC5TESoftware Updates Strategies: a Quantitative Evaluation against Advanced Persistent Threats https://arxiv.org/abs/2205.07759VSec Community: https://vsec.dk/about/Checkout the “Roll your own DBIR” Templates on GitHub here: https://github.com/cvpl-fdca/rollyourown-DBIR]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461093-special-david-thejl-clayton-talks-rolling-your-own-verizon-dbir.mp3" length="65205609" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/kt7cigtb7hz7lxf8b353ryeu4vtx?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1276290973</guid>
    <pubDate>Fri, 27 May 2022 09:36:21 -0400</pubDate>
    <itunes:duration>5432</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Insider Threat Actor is Sentenced, Microsoft Patch Tuesday Mishap and NFT Scams</itunes:title>
    <title>Weekly: Insider Threat Actor is Sentenced, Microsoft Patch Tuesday Mishap and NFT Scams</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Ivan, and Nicole bring you the latest in threat intelligence. This week they cover: - Insider Threat Actor at Chinese real estate brokerage is sentenced to 7 years in prison- Microsoft Patch Tuesday mishap- NFT scamsGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-20-may-2022***Resources from this week’s podcast***: Vulnerability Intelligence Round-Up: The Good, The Bad and The...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Ivan, and Nicole bring you the latest in threat intelligence. This week they cover: - Insider Threat Actor at Chinese real estate brokerage is sentenced to 7 years in prison- Microsoft Patch Tuesday mishap- NFT scamsGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-20-may-2022***Resources from this week’s podcast***: Vulnerability Intelligence Round-Up: The Good, The Bad and The Risky:https://www.digitalshadows.com/blog-and-research/vulnerability-intelligence-round-up-the-good-the-bad-and-the-risky/ Mustang Panda: https://www.digitalshadows.com/blog-and-research/advanced-persistent-threat-group-feature-mustang-panda/ What we’re reading this month: https://www.digitalshadows.com/blog-and-research/what-were-reading-this-month-may-2022/ Angry IT Admin Wipes Employers Databases Gets 7 Years in Prisonhttps://www.bleepingcomputer.com/news/security/angry-it-admin-wipes-employer-s-databases-gets-7-years-in-prison/Microsoft May Patch Tuesday Updates Cause Windows Ad Authentication Errorshttps://threatpost.com/microsofts-may-patch-tuesday-updates-cause-windows-ad-authentication-errors/179631/Fake Binance NFT Mystery Box Bots Steal Victims Crypto Walletshttps://www.bleepingcomputer.com/news/security/fake-binance-nft-mystery-box-bots-steal-victims-crypto-wallets/]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Ivan, and Nicole bring you the latest in threat intelligence. This week they cover: - Insider Threat Actor at Chinese real estate brokerage is sentenced to 7 years in prison- Microsoft Patch Tuesday mishap- NFT scamsGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-20-may-2022***Resources from this week’s podcast***: Vulnerability Intelligence Round-Up: The Good, The Bad and The Risky:https://www.digitalshadows.com/blog-and-research/vulnerability-intelligence-round-up-the-good-the-bad-and-the-risky/ Mustang Panda: https://www.digitalshadows.com/blog-and-research/advanced-persistent-threat-group-feature-mustang-panda/ What we’re reading this month: https://www.digitalshadows.com/blog-and-research/what-were-reading-this-month-may-2022/ Angry IT Admin Wipes Employers Databases Gets 7 Years in Prisonhttps://www.bleepingcomputer.com/news/security/angry-it-admin-wipes-employer-s-databases-gets-7-years-in-prison/Microsoft May Patch Tuesday Updates Cause Windows Ad Authentication Errorshttps://threatpost.com/microsofts-may-patch-tuesday-updates-cause-windows-ad-authentication-errors/179631/Fake Binance NFT Mystery Box Bots Steal Victims Crypto Walletshttps://www.bleepingcomputer.com/news/security/fake-binance-nft-mystery-box-bots-steal-victims-crypto-wallets/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461094-weekly-insider-threat-actor-is-sentenced-microsoft-patch-tuesday-mishap-and-nft-scams.mp3" length="20151016" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/lvadodkr2790ftb08yphs6ojpqia?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1272080350</guid>
    <pubDate>Fri, 20 May 2022 10:54:56 -0400</pubDate>
    <itunes:duration>1677</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Costa Rica Declares State of Emergency, EU Accuses Russia of Attack, 5 Years Since WannaCry</itunes:title>
    <title>Weekly: Costa Rica Declares State of Emergency, EU Accuses Russia of Attack, 5 Years Since WannaCry</title>
    <itunes:summary><![CDATA[ShadowTalk host Stefano alongside Kim bring you the latest in threat intelligence. This week they cover:* Costa Rica declares state of emergency because of Conti* The European Council formally attributes VIASAT attack to Russia* Five years since the WannaCry incident***Resources from this week’s podcast***Five Years After The WannaCry Dumpster Fire, Ransomware Remains A Global Threathttps://www.digitalshadows.com/blog-and-research/five-years-after-the-wannacry-dumpster-fire-ransomware-remains...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Stefano alongside Kim bring you the latest in threat intelligence. This week they cover:* Costa Rica declares state of emergency because of Conti* The European Council formally attributes VIASAT attack to Russia* Five years since the WannaCry incident***Resources from this week’s podcast***Five Years After The WannaCry Dumpster Fire, Ransomware Remains A Global Threathttps://www.digitalshadows.com/blog-and-research/five-years-after-the-wannacry-dumpster-fire-ransomware-remains-a-global-threat/US offers $15 million reward for info on Conti ransomware ganghttps://www.bleepingcomputer.com/news/security/us-offers-15-million-reward-for-info-on-conti-ransomware-gang/Viasat shares details on KA-SAT satellite service cyberattackhttps://www.bleepingcomputer.com/news/security/viasat-shares-details-on-ka-sat-satellite-service-cyberattack/Satellite outage knocks out thousands of Enercon&apos;s wind turbineshttps://www.reuters.com/business/energy/satellite-outage-knocks-out-control-enercon-wind-turbines-2022-02-28/Viasat confirms satellite modems were wiped with AcidRain malwarehttps://www.bleepingcomputer.com/news/security/viasat-confirms-satellite-modems-were-wiped-with-acidrain-malware/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Stefano alongside Kim bring you the latest in threat intelligence. This week they cover:* Costa Rica declares state of emergency because of Conti* The European Council formally attributes VIASAT attack to Russia* Five years since the WannaCry incident***Resources from this week’s podcast***Five Years After The WannaCry Dumpster Fire, Ransomware Remains A Global Threathttps://www.digitalshadows.com/blog-and-research/five-years-after-the-wannacry-dumpster-fire-ransomware-remains-a-global-threat/US offers $15 million reward for info on Conti ransomware ganghttps://www.bleepingcomputer.com/news/security/us-offers-15-million-reward-for-info-on-conti-ransomware-gang/Viasat shares details on KA-SAT satellite service cyberattackhttps://www.bleepingcomputer.com/news/security/viasat-shares-details-on-ka-sat-satellite-service-cyberattack/Satellite outage knocks out thousands of Enercon&apos;s wind turbineshttps://www.reuters.com/business/energy/satellite-outage-knocks-out-control-enercon-wind-turbines-2022-02-28/Viasat confirms satellite modems were wiped with AcidRain malwarehttps://www.bleepingcomputer.com/news/security/viasat-confirms-satellite-modems-were-wiped-with-acidrain-malware/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461095-weekly-costa-rica-declares-state-of-emergency-eu-accuses-russia-of-attack-5-years-since-wannacry.mp3" length="25485682" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/9qmuzfxi2nwf675yzrfv22g7bboc?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1267796503</guid>
    <pubDate>Fri, 13 May 2022 14:20:38 -0400</pubDate>
    <itunes:duration>2121</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: The Return of REvil, China APT Activity, Russia-Ukraine RoundUp</itunes:title>
    <title>Weekly: The Return of REvil, China APT Activity, Russia-Ukraine RoundUp</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Ivan and Nicole bring you the latest in threat intelligence. This week they cover:* REvil ransomware returns with new malware* Moshen Dragon targeting telecommunication service providers in Central Asia* Russian hackers utilize embassy emails to target governments***Resources from this week’s podcast***ALPHV: THE FIRST RUST-BASED RANSOMWAREhttps://www.digitalshadows.com/blog-and-research/alphv-the-first-rust-based-ransomware/Colonial Pipeline One Year Later: Wh...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Ivan and Nicole bring you the latest in threat intelligence. This week they cover:* REvil ransomware returns with new malware* Moshen Dragon targeting telecommunication service providers in Central Asia* Russian hackers utilize embassy emails to target governments***Resources from this week’s podcast***ALPHV: THE FIRST RUST-BASED RANSOMWAREhttps://www.digitalshadows.com/blog-and-research/alphv-the-first-rust-based-ransomware/Colonial Pipeline One Year Later: What’s Changed?https://www.digitalshadows.com/blog-and-research/colonial-pipeline-one-year-later-whats-changed/REvil ransomware returns: New malware sample confirms gang is backhttps://www.bleepingcomputer.com/news/security/revil-ransomware-returns-new-malware-sample-confirms-gang-is-back/Chinese cyber-espionage group Moshen Dragon targets Asian telcoshttps://www.bleepingcomputer.com/news/security/chinese-cyber-espionage-group-moshen-dragon-targets-asian-telcos/Russian hackers compromise embassy emails to target governmentshttps://www.bleepingcomputer.com/news/security/russian-hackers-compromise-embassy-emails-to-target-governments/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Ivan and Nicole bring you the latest in threat intelligence. This week they cover:* REvil ransomware returns with new malware* Moshen Dragon targeting telecommunication service providers in Central Asia* Russian hackers utilize embassy emails to target governments***Resources from this week’s podcast***ALPHV: THE FIRST RUST-BASED RANSOMWAREhttps://www.digitalshadows.com/blog-and-research/alphv-the-first-rust-based-ransomware/Colonial Pipeline One Year Later: What’s Changed?https://www.digitalshadows.com/blog-and-research/colonial-pipeline-one-year-later-whats-changed/REvil ransomware returns: New malware sample confirms gang is backhttps://www.bleepingcomputer.com/news/security/revil-ransomware-returns-new-malware-sample-confirms-gang-is-back/Chinese cyber-espionage group Moshen Dragon targets Asian telcoshttps://www.bleepingcomputer.com/news/security/chinese-cyber-espionage-group-moshen-dragon-targets-asian-telcos/Russian hackers compromise embassy emails to target governmentshttps://www.bleepingcomputer.com/news/security/russian-hackers-compromise-embassy-emails-to-target-governments/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461096-weekly-the-return-of-revil-china-apt-activity-russia-ukraine-roundup.mp3" length="14540840" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/g1wjddv2x00m0l4wiszwuk0aowht?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1263466408</guid>
    <pubDate>Fri, 06 May 2022 13:40:24 -0400</pubDate>
    <itunes:duration>1209</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: The Return of Lapsus$, 2 Months of Russia-Ukraine War</itunes:title>
    <title>Weekly: The Return of Lapsus$, 2 Months of Russia-Ukraine War</title>
    <itunes:summary><![CDATA[ShadowTalk host Stefano alongside Xue, Kim, &amp; Rory bring you the latest in threat intelligence. This week they cover:* Cybercrime group Lapsus$ is back* Cyber activity in the Russia-Ukraine war so far***Resources from this week’s podcast***The Russia – Ukraine War: Two Months Inhttps://www.digitalshadows.com/blog-and-research/the-russia-ukraine-war-two-months-in/Opportunity In The Midst Of Chaos: Russian-Speaking Cybercriminals Grapple With Sanctions And Forum Takedownshttps://www.digital...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Stefano alongside Xue, Kim, &amp; Rory bring you the latest in threat intelligence. This week they cover:* Cybercrime group Lapsus$ is back* Cyber activity in the Russia-Ukraine war so far***Resources from this week’s podcast***The Russia – Ukraine War: Two Months Inhttps://www.digitalshadows.com/blog-and-research/the-russia-ukraine-war-two-months-in/Opportunity In The Midst Of Chaos: Russian-Speaking Cybercriminals Grapple With Sanctions And Forum Takedownshttps://www.digitalshadows.com/blog-and-research/russian-speaking-cybercriminals-grapple-with-sanctions-and-forum-takedowns/Leaked Chats Show LAPSUS$ Stole T-Mobile Source Codehttps://krebsonsecurity.com/2022/04/leaked-chats-show-lapsus-stole-t-mobile-source-code/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Stefano alongside Xue, Kim, &amp; Rory bring you the latest in threat intelligence. This week they cover:* Cybercrime group Lapsus$ is back* Cyber activity in the Russia-Ukraine war so far***Resources from this week’s podcast***The Russia – Ukraine War: Two Months Inhttps://www.digitalshadows.com/blog-and-research/the-russia-ukraine-war-two-months-in/Opportunity In The Midst Of Chaos: Russian-Speaking Cybercriminals Grapple With Sanctions And Forum Takedownshttps://www.digitalshadows.com/blog-and-research/russian-speaking-cybercriminals-grapple-with-sanctions-and-forum-takedowns/Leaked Chats Show LAPSUS$ Stole T-Mobile Source Codehttps://krebsonsecurity.com/2022/04/leaked-chats-show-lapsus-stole-t-mobile-source-code/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461097-weekly-the-return-of-lapsus-2-months-of-russia-ukraine-war.mp3" length="23858073" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/i2m2or3hanrr7f49g7d9atj0dqxs?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1259330548</guid>
    <pubDate>Fri, 29 Apr 2022 10:27:10 -0400</pubDate>
    <itunes:duration>1986</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Connection Found Between Conti and Karakurt, ICS Networks Targeted, Lazarus Uses Crypto Apps</itunes:title>
    <title>Weekly: Connection Found Between Conti and Karakurt, ICS Networks Targeted, Lazarus Uses Crypto Apps</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Ivan, Rick, and Nicole bring you the latest in threat intelligence. This week they cover:* Security researchers find connection between Conti and Karakurt* Chernovite’s Pipedream malware targets ICS networks* Lazarus hacking group is targeting organizations in the cryptocurrency and blockchain industries***Resources from this week’s podcast***The Power Of Data Analysis In Threat Intelligence – Part 2: Machine Learninghttps://www.digitalshadows.com/blog-and-rese...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Ivan, Rick, and Nicole bring you the latest in threat intelligence. This week they cover:* Security researchers find connection between Conti and Karakurt* Chernovite’s Pipedream malware targets ICS networks* Lazarus hacking group is targeting organizations in the cryptocurrency and blockchain industries***Resources from this week’s podcast***The Power Of Data Analysis In Threat Intelligence – Part 2: Machine Learninghttps://www.digitalshadows.com/blog-and-research/the-power-of-data-analysis-in-threat-intelligence-part-2-machine-learning//What We’re Reading This Month: April 2022https://www.digitalshadows.com/blog-and-research/what-were-reading-this-month-april-2022/The Role Of Non-Fungible Tokens (NFTs) In Facilitating Cybercrimehttps://www.digitalshadows.com/blog-and-research/the-role-of-non-fungible-tokens-in-facilitating-cybercrime/Karakurt revealed as data extortion arm of Conti cybercrime syndicatehttps://www.bleepingcomputer.com/news/security/karakurt-revealed-as-data-extortion-arm-of-conti-cybercrime-syndicate/Dragos estimates that Chernovite’s Pipedream malware targets ICS networkshttps://industrialcyber.co/threats-attacks/dragos-estimates-that-chernovites-pipedream-malware-targets-ics-networks/US warns of Lazarus hackers using malicious cryptocurrency appshttps://www.bleepingcomputer.com/news/security/us-warns-of-lazarus-hackers-using-malicious-cryptocurrency-apps/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Ivan, Rick, and Nicole bring you the latest in threat intelligence. This week they cover:* Security researchers find connection between Conti and Karakurt* Chernovite’s Pipedream malware targets ICS networks* Lazarus hacking group is targeting organizations in the cryptocurrency and blockchain industries***Resources from this week’s podcast***The Power Of Data Analysis In Threat Intelligence – Part 2: Machine Learninghttps://www.digitalshadows.com/blog-and-research/the-power-of-data-analysis-in-threat-intelligence-part-2-machine-learning//What We’re Reading This Month: April 2022https://www.digitalshadows.com/blog-and-research/what-were-reading-this-month-april-2022/The Role Of Non-Fungible Tokens (NFTs) In Facilitating Cybercrimehttps://www.digitalshadows.com/blog-and-research/the-role-of-non-fungible-tokens-in-facilitating-cybercrime/Karakurt revealed as data extortion arm of Conti cybercrime syndicatehttps://www.bleepingcomputer.com/news/security/karakurt-revealed-as-data-extortion-arm-of-conti-cybercrime-syndicate/Dragos estimates that Chernovite’s Pipedream malware targets ICS networkshttps://industrialcyber.co/threats-attacks/dragos-estimates-that-chernovites-pipedream-malware-targets-ics-networks/US warns of Lazarus hackers using malicious cryptocurrency appshttps://www.bleepingcomputer.com/news/security/us-warns-of-lazarus-hackers-using-malicious-cryptocurrency-apps/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461098-weekly-connection-found-between-conti-and-karakurt-ics-networks-targeted-lazarus-uses-crypto-apps.mp3" length="23129640" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/rt0m5skgfikw7wh7q8i1k8d0pcyr?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1255111804</guid>
    <pubDate>Fri, 22 Apr 2022 13:17:12 -0400</pubDate>
    <itunes:duration>1925</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Cybercriminal Forums Go Down &amp; Cyber Activity in the Russia-Ukraine War Go Up</itunes:title>
    <title>Weekly: Cybercriminal Forums Go Down &amp; Cyber Activity in the Russia-Ukraine War Go Up</title>
    <itunes:summary><![CDATA[ShadowTalk host Stefano alongside Rory bring you the latest in threat intelligence. This week they cover:* 'RaidForums' has been shut down and seized* SandWorm targets electrical substations in Ukraine* The resurgence of hacktivism in the Russia-Ukraine conflict***Resources from this week’s podcast***Q1 2022 Vulnerability Rounduphttps://www.digitalshadows.com/blog-and-research/q1-2022-vulnerability-roundup/Q1 2022 Ransomware Rounduphttps://www.digitalshadows.com/blog-and-research/q1-2022-rans...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Stefano alongside Rory bring you the latest in threat intelligence. This week they cover:* &apos;RaidForums&apos; has been shut down and seized* SandWorm targets electrical substations in Ukraine* The resurgence of hacktivism in the Russia-Ukraine conflict***Resources from this week’s podcast***Q1 2022 Vulnerability Rounduphttps://www.digitalshadows.com/blog-and-research/q1-2022-vulnerability-roundup/Q1 2022 Ransomware Rounduphttps://www.digitalshadows.com/blog-and-research/q1-2022-ransomware-roundup/One of the world’s biggest hacker forums taken downhttps://www.europol.europa.eu/media-press/newsroom/news/one-of-world%E2%80%99s-biggest-hacker-forums-taken-downSubscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Stefano alongside Rory bring you the latest in threat intelligence. This week they cover:* &apos;RaidForums&apos; has been shut down and seized* SandWorm targets electrical substations in Ukraine* The resurgence of hacktivism in the Russia-Ukraine conflict***Resources from this week’s podcast***Q1 2022 Vulnerability Rounduphttps://www.digitalshadows.com/blog-and-research/q1-2022-vulnerability-roundup/Q1 2022 Ransomware Rounduphttps://www.digitalshadows.com/blog-and-research/q1-2022-ransomware-roundup/One of the world’s biggest hacker forums taken downhttps://www.europol.europa.eu/media-press/newsroom/news/one-of-world%E2%80%99s-biggest-hacker-forums-taken-downSubscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461099-weekly-cybercriminal-forums-go-down-cyber-activity-in-the-russia-ukraine-war-go-up.mp3" length="26316979" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/3fg3go389hw7b7vvyyrlokusuc7q?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1250324281</guid>
    <pubDate>Thu, 14 Apr 2022 15:37:51 -0400</pubDate>
    <itunes:duration>2191</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Spring4Shell, Borat RAT, FIN7 Evolves Toolset</itunes:title>
    <title>Weekly: Spring4Shell, Borat RAT, FIN7 Evolves Toolset</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Ivan and Austin bring you the latest in threat intelligence. This week they cover:* Spring4Shell: The Internet security disaster that wasn’t* New Borat remote access malware is no laughing matter* FIN7 hackers evolve toolset, work with multiple ransomware gangs***Resources from this week’s podcast***Intelligence Collection Plans: Preparation Breeds Successhttps://www.digitalshadows.com/blog-and-research/intelligence-collection-plans-preparation-breeds-success/T...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Ivan and Austin bring you the latest in threat intelligence. This week they cover:* Spring4Shell: The Internet security disaster that wasn’t* New Borat remote access malware is no laughing matter* FIN7 hackers evolve toolset, work with multiple ransomware gangs***Resources from this week’s podcast***Intelligence Collection Plans: Preparation Breeds Successhttps://www.digitalshadows.com/blog-and-research/intelligence-collection-plans-preparation-breeds-success/Team A Vs Team B: What Is Motivating Lapsus$?https://www.digitalshadows.com/blog-and-research/team-a-vs-team-b-what-is-motivating-lapsus/Five Things We Learned From The Conti Chat Logshttps://www.digitalshadows.com/blog-and-research/five-things-we-learned-from-the-conti-chat-logs/Explaining Spring4Shell: The Internet security disaster that wasn’thttps://arstechnica.com/information-technology/2022/04/explaining-spring4shell-the-internet-security-disaster-that-wasnt/New Borat remote access malware is no laughing matterhttps://www.bleepingcomputer.com/news/security/new-borat-remote-access-malware-is-no-laughing-matter/FIN7 hackers evolve toolset, work with multiple ransomware gangshttps://www.bleepingcomputer.com/news/security/fin7-hackers-evolve-toolset-work-with-multiple-ransomware-gangs/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Ivan and Austin bring you the latest in threat intelligence. This week they cover:* Spring4Shell: The Internet security disaster that wasn’t* New Borat remote access malware is no laughing matter* FIN7 hackers evolve toolset, work with multiple ransomware gangs***Resources from this week’s podcast***Intelligence Collection Plans: Preparation Breeds Successhttps://www.digitalshadows.com/blog-and-research/intelligence-collection-plans-preparation-breeds-success/Team A Vs Team B: What Is Motivating Lapsus$?https://www.digitalshadows.com/blog-and-research/team-a-vs-team-b-what-is-motivating-lapsus/Five Things We Learned From The Conti Chat Logshttps://www.digitalshadows.com/blog-and-research/five-things-we-learned-from-the-conti-chat-logs/Explaining Spring4Shell: The Internet security disaster that wasn’thttps://arstechnica.com/information-technology/2022/04/explaining-spring4shell-the-internet-security-disaster-that-wasnt/New Borat remote access malware is no laughing matterhttps://www.bleepingcomputer.com/news/security/new-borat-remote-access-malware-is-no-laughing-matter/FIN7 hackers evolve toolset, work with multiple ransomware gangshttps://www.bleepingcomputer.com/news/security/fin7-hackers-evolve-toolset-work-with-multiple-ransomware-gangs/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461100-weekly-spring4shell-borat-rat-fin7-evolves-toolset.mp3" length="14754279" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/7jnemk0jfd6ub3l9lh3q5xtoh94x?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1246737340</guid>
    <pubDate>Fri, 08 Apr 2022 11:03:18 -0400</pubDate>
    <itunes:duration>1227</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Structured Analytical Techniques and Office Banter</itunes:title>
    <title>Special: Structured Analytical Techniques and Office Banter</title>
    <itunes:summary><![CDATA[ShadowTalk host Stefano alongside Chris and Rick bring you the latest on structured analytical techniques. This episode they cover: *Why they use SATs in their intel team*How they came up with the idea to analyze Lapsus$*How they chose Team A/Team B and how they prepared it*How the exercise performed*Future research direction***Resources from this special podcast***Meet Lapsus$: An Unusual Group In The Cyber Extortion Business https://www.digitalshadows.com/blog-and-research/meet-lapsus-an-un...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Stefano alongside Chris and Rick bring you the latest on structured analytical techniques. This episode they cover: *Why they use SATs in their intel team*How they came up with the idea to analyze Lapsus$*How they chose Team A/Team B and how they prepared it*How the exercise performed*Future research direction***Resources from this special podcast***Meet Lapsus$: An Unusual Group In The Cyber Extortion Business https://www.digitalshadows.com/blog-and-research/meet-lapsus-an-unusual-group-in-the-cyber-extortion-business/The Okta Breach: What We Know So Farhttps://www.digitalshadows.com/blog-and-research/the-okta-breach-what-we-know-so-far/A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis https://www.stat.berkeley.edu/~aldous/157/Papers/Tradecraft%20Primer-apr09.pdfSubscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Stefano alongside Chris and Rick bring you the latest on structured analytical techniques. This episode they cover: *Why they use SATs in their intel team*How they came up with the idea to analyze Lapsus$*How they chose Team A/Team B and how they prepared it*How the exercise performed*Future research direction***Resources from this special podcast***Meet Lapsus$: An Unusual Group In The Cyber Extortion Business https://www.digitalshadows.com/blog-and-research/meet-lapsus-an-unusual-group-in-the-cyber-extortion-business/The Okta Breach: What We Know So Farhttps://www.digitalshadows.com/blog-and-research/the-okta-breach-what-we-know-so-far/A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis https://www.stat.berkeley.edu/~aldous/157/Papers/Tradecraft%20Primer-apr09.pdfSubscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461101-special-structured-analytical-techniques-and-office-banter.mp3" length="21905791" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/kerbyf5mh02vd1fcgzbjfyqx9m3e?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1244099746</guid>
    <pubDate>Mon, 04 Apr 2022 12:06:33 -0400</pubDate>
    <itunes:duration>1823</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Especial: Desvendando o Grupo de Hackers Lapsus$</itunes:title>
    <title>Especial: Desvendando o Grupo de Hackers Lapsus$</title>
    <itunes:summary><![CDATA[Bem-vindo ao Shadow Talk em Português! Neste episódio, Ivan, Matheus, e Daniel falam sobre:- A história do grupo Lapsus$ e como eles são diferentes- Conexões do Lapsus$ no Brasil- Reações de outros hackers sobre este grupo- Recomendações de como se proteger do Lapsus$***Recursos deste podcast***Meet Lapsus$: An Unusual Group In The Cyber Extortion Businesshttps://www.digitalshadows.com/blog-and-research/meet-lapsus-an-unusual-group-in-the-cyber-extortion-business/Weekly Intelligence Summary 2...]]></itunes:summary>
    <description><![CDATA[Bem-vindo ao Shadow Talk em Português! Neste episódio, Ivan, Matheus, e Daniel falam sobre:- A história do grupo Lapsus$ e como eles são diferentes- Conexões do Lapsus$ no Brasil- Reações de outros hackers sobre este grupo- Recomendações de como se proteger do Lapsus$***Recursos deste podcast***Meet Lapsus$: An Unusual Group In The Cyber Extortion Businesshttps://www.digitalshadows.com/blog-and-research/meet-lapsus-an-unusual-group-in-the-cyber-extortion-business/Weekly Intelligence Summary 25th Marhttps://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-25th-marAssine nosso e-mail de inteligência de ameaças:https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html]]></description>
    <content:encoded><![CDATA[Bem-vindo ao Shadow Talk em Português! Neste episódio, Ivan, Matheus, e Daniel falam sobre:- A história do grupo Lapsus$ e como eles são diferentes- Conexões do Lapsus$ no Brasil- Reações de outros hackers sobre este grupo- Recomendações de como se proteger do Lapsus$***Recursos deste podcast***Meet Lapsus$: An Unusual Group In The Cyber Extortion Businesshttps://www.digitalshadows.com/blog-and-research/meet-lapsus-an-unusual-group-in-the-cyber-extortion-business/Weekly Intelligence Summary 25th Marhttps://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-25th-marAssine nosso e-mail de inteligência de ameaças:https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461102-especial-desvendando-o-grupo-de-hackers-lapsus.mp3" length="24579659" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/0x4wpa37k6cshcua670q4v3f9sdz?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1244069998</guid>
    <pubDate>Mon, 04 Apr 2022 11:09:21 -0400</pubDate>
    <itunes:duration>2046</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Q1 Review Including Russia-Ukraine War, REvil Arrests, Emergence of Lapsus$ &amp; More!</itunes:title>
    <title>Weekly: Q1 Review Including Russia-Ukraine War, REvil Arrests, Emergence of Lapsus$ &amp; More!</title>
    <itunes:summary><![CDATA[ShadowTalk host Stefano alongside Kim, Xue, and Rick bring you the latest in threat intelligence. This week they cover a recap of a highly dynamic quarter including:* Log4j complex mitigation and remediation* REvil arrests* Cybercrime and Russia-Ukraine War* Extortion and the emergence of Lapsus$***Resources from this week’s podcast***Log4j: What’s Happened Sincehttps://www.digitalshadows.com/blog-and-research/log4j-whats-happened-since/The Log4j Zero-Day: What We Know So Farhttps://www.digit...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Stefano alongside Kim, Xue, and Rick bring you the latest in threat intelligence. This week they cover a recap of a highly dynamic quarter including:* Log4j complex mitigation and remediation* REvil arrests* Cybercrime and Russia-Ukraine War* Extortion and the emergence of Lapsus$***Resources from this week’s podcast***Log4j: What’s Happened Sincehttps://www.digitalshadows.com/blog-and-research/log4j-whats-happened-since/The Log4j Zero-Day: What We Know So Farhttps://www.digitalshadows.com/blog-and-research/the-log4j-zero-day-what-we-know-so-far/Meet Lapsus$: An Unusual Group In The Cyber Extortion Businesshttps://www.digitalshadows.com/blog-and-research/meet-lapsus-an-unusual-group-in-the-cyber-extortion-business/How Cybercriminals Are Using Messaging Platformshttps://www.digitalshadows.com/blog-and-research/how-cybercriminals-are-using-messaging-platforms/Ransomware Q4 Overviewhttps://www.digitalshadows.com/blog-and-research/ransomware-q4-overview/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Stefano alongside Kim, Xue, and Rick bring you the latest in threat intelligence. This week they cover a recap of a highly dynamic quarter including:* Log4j complex mitigation and remediation* REvil arrests* Cybercrime and Russia-Ukraine War* Extortion and the emergence of Lapsus$***Resources from this week’s podcast***Log4j: What’s Happened Sincehttps://www.digitalshadows.com/blog-and-research/log4j-whats-happened-since/The Log4j Zero-Day: What We Know So Farhttps://www.digitalshadows.com/blog-and-research/the-log4j-zero-day-what-we-know-so-far/Meet Lapsus$: An Unusual Group In The Cyber Extortion Businesshttps://www.digitalshadows.com/blog-and-research/meet-lapsus-an-unusual-group-in-the-cyber-extortion-business/How Cybercriminals Are Using Messaging Platformshttps://www.digitalshadows.com/blog-and-research/how-cybercriminals-are-using-messaging-platforms/Ransomware Q4 Overviewhttps://www.digitalshadows.com/blog-and-research/ransomware-q4-overview/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461103-weekly-q1-review-including-russia-ukraine-war-revil-arrests-emergence-of-lapsus-more.mp3" length="21868856" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/xddnszbyr9v6r8egeg21pfz83bcn?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1242713011</guid>
    <pubDate>Fri, 01 Apr 2022 12:46:37 -0400</pubDate>
    <itunes:duration>1820</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Especial: Lapsus$, Sus Ataques, y La Brecha de Okta</itunes:title>
    <title>Especial: Lapsus$, Sus Ataques, y La Brecha de Okta</title>
    <itunes:summary><![CDATA[Bienvenido a ShadowTalk en Español! En este episodio, Stefano y Dani van a discutir:* Lapsus$: Un grupo inusual en el negocio de la extorsión cibernética* Cómo Lapsus$ conducen sus ataques* Ataques de alto perfil y la brecha de Okta*** Si hoy has escuchado algo que te resulte curioso, no olvides consultar el contenido disponible en la sección de archivos adjuntos más abajo ***Los blogs de Digital Shadows en Lapsus$:Meet Lapsus$: An Unusual Group In The Cyber Extortion Businesshttps://www.digi...]]></itunes:summary>
    <description><![CDATA[Bienvenido a ShadowTalk en Español! En este episodio, Stefano y Dani van a discutir:* Lapsus$: Un grupo inusual en el negocio de la extorsión cibernética* Cómo Lapsus$ conducen sus ataques* Ataques de alto perfil y la brecha de Okta*** Si hoy has escuchado algo que te resulte curioso, no olvides consultar el contenido disponible en la sección de archivos adjuntos más abajo ***Los blogs de Digital Shadows en Lapsus$:Meet Lapsus$: An Unusual Group In The Cyber Extortion Businesshttps://www.digitalshadows.com/blog-and-research/meet-lapsus-an-unusual-group-in-the-cyber-extortion-business/The Okta Breach: What We Know So Farhttps://www.digitalshadows.com/blog-and-research/the-okta-breach-what-we-know-so-far/Come siempre, si teneis algún comentario sobre este episodio o si queréis saber mas de algún tema, escribenos a shadowtalk@digitalshadows.com y estaremos muy felices para tomar sus preguntas!]]></description>
    <content:encoded><![CDATA[Bienvenido a ShadowTalk en Español! En este episodio, Stefano y Dani van a discutir:* Lapsus$: Un grupo inusual en el negocio de la extorsión cibernética* Cómo Lapsus$ conducen sus ataques* Ataques de alto perfil y la brecha de Okta*** Si hoy has escuchado algo que te resulte curioso, no olvides consultar el contenido disponible en la sección de archivos adjuntos más abajo ***Los blogs de Digital Shadows en Lapsus$:Meet Lapsus$: An Unusual Group In The Cyber Extortion Businesshttps://www.digitalshadows.com/blog-and-research/meet-lapsus-an-unusual-group-in-the-cyber-extortion-business/The Okta Breach: What We Know So Farhttps://www.digitalshadows.com/blog-and-research/the-okta-breach-what-we-know-so-far/Come siempre, si teneis algún comentario sobre este episodio o si queréis saber mas de algún tema, escribenos a shadowtalk@digitalshadows.com y estaremos muy felices para tomar sus preguntas!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461104-especial-lapsus-sus-ataques-y-la-brecha-de-okta.mp3" length="21344659" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/k2gmmyeibcngzvjkfuhflzkk6fah?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1242076639</guid>
    <pubDate>Thu, 31 Mar 2022 12:53:18 -0400</pubDate>
    <itunes:duration>1776</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Lapsus$ Targets Large Companies, Russia/Ukraine Ongoing War, TransUnion Data Breach</itunes:title>
    <title>Weekly: Lapsus$ Targets Large Companies, Russia/Ukraine Ongoing War, TransUnion Data Breach</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Kim, Ivan, and Rick bring you the latest in threat intelligence. This week they cover:* Lapsus$ threat group targets several large companies* Russia/Ukraine war shows no sign of slowing down* TransUnion unveils enhanced data breach***Resources from this week’s podcast***Vulnerability Intelligence Round-Up: Russia-Ukraine Warhttps://www.digitalshadows.com/blog-and-research/vulnerability-intelligence-round-up-russia-ukraine-war/The Okta Breach: What We Know So Fa...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Kim, Ivan, and Rick bring you the latest in threat intelligence. This week they cover:* Lapsus$ threat group targets several large companies* Russia/Ukraine war shows no sign of slowing down* TransUnion unveils enhanced data breach***Resources from this week’s podcast***Vulnerability Intelligence Round-Up: Russia-Ukraine Warhttps://www.digitalshadows.com/blog-and-research/vulnerability-intelligence-round-up-russia-ukraine-war/The Okta Breach: What We Know So Farhttps://www.digitalshadows.com/blog-and-research/the-okta-breach-what-we-know-so-far/Russia’s Second Front: The War On Informationhttps://www.digitalshadows.com/blog-and-research/russias-second-front-the-war-on-information/Okta hack puts thousands of businesses on high alerthttps://www.theverge.com/2022/3/22/22990637/okta-breach-single-sign-on-lapsus-hacker-group?utm_campaign=theverge&amp;utm_content=chorus&amp;utm_medium=social&amp;utm_source=twitterStatement by President Biden on our Nation’s Cybersecurityhttps://www.whitehouse.gov/briefing-room/statements-releases/2022/03/21/statement-by-president-biden-on-our-nations-cybersecurity/TransUnion Unveils Enhanced Data Breach Support Service in the UKhttps://newsroom.transunion.co.uk/transunion-unveils-enhanced-data-breach-support-service-in-the-uk/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Kim, Ivan, and Rick bring you the latest in threat intelligence. This week they cover:* Lapsus$ threat group targets several large companies* Russia/Ukraine war shows no sign of slowing down* TransUnion unveils enhanced data breach***Resources from this week’s podcast***Vulnerability Intelligence Round-Up: Russia-Ukraine Warhttps://www.digitalshadows.com/blog-and-research/vulnerability-intelligence-round-up-russia-ukraine-war/The Okta Breach: What We Know So Farhttps://www.digitalshadows.com/blog-and-research/the-okta-breach-what-we-know-so-far/Russia’s Second Front: The War On Informationhttps://www.digitalshadows.com/blog-and-research/russias-second-front-the-war-on-information/Okta hack puts thousands of businesses on high alerthttps://www.theverge.com/2022/3/22/22990637/okta-breach-single-sign-on-lapsus-hacker-group?utm_campaign=theverge&amp;utm_content=chorus&amp;utm_medium=social&amp;utm_source=twitterStatement by President Biden on our Nation’s Cybersecurityhttps://www.whitehouse.gov/briefing-room/statements-releases/2022/03/21/statement-by-president-biden-on-our-nations-cybersecurity/TransUnion Unveils Enhanced Data Breach Support Service in the UKhttps://newsroom.transunion.co.uk/transunion-unveils-enhanced-data-breach-support-service-in-the-uk/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461105-weekly-lapsus-targets-large-companies-russia-ukraine-ongoing-war-transunion-data-breach.mp3" length="22127782" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/f4tpmn9q0873o6b3wsomasshuj7v?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1238710012</guid>
    <pubDate>Fri, 25 Mar 2022 11:25:16 -0400</pubDate>
    <itunes:duration>1842</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Russia-Ukraine War Update 22 March 2022</itunes:title>
    <title>Special: Russia-Ukraine War Update 22 March 2022</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Austin, Stefano, and Rick bring you the latest on the war between Russia and Ukraine. This episode they cover:* Putin and the Russian military forces * The cybersecurity realm in the midst of war* Continuation and timeline of the ongoing conflict ***Resources from this special podcast***Statement by President Biden on Our Nation's Cybersecurityhttps://www.whitehouse.gov/briefing-room/statements-releases/2022/03/21/statement-by-president-biden-on-our-nations-cyb...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Austin, Stefano, and Rick bring you the latest on the war between Russia and Ukraine. This episode they cover:* Putin and the Russian military forces * The cybersecurity realm in the midst of war* Continuation and timeline of the ongoing conflict ***Resources from this special podcast***Statement by President Biden on Our Nation&apos;s Cybersecurityhttps://www.whitehouse.gov/briefing-room/statements-releases/2022/03/21/statement-by-president-biden-on-our-nations-cybersecurity/News and Updates Related to the Russian Invasion of Ukrainehttps://resources.digitalshadows.com/russian-news-and-updatesDonate to the Ukraine crisis via Red Crosshttps://donate.redcross.org.uk/appeal/ukraine-crisis-appealDigital Forensic Research Labmedium.com/dfrlab]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Austin, Stefano, and Rick bring you the latest on the war between Russia and Ukraine. This episode they cover:* Putin and the Russian military forces * The cybersecurity realm in the midst of war* Continuation and timeline of the ongoing conflict ***Resources from this special podcast***Statement by President Biden on Our Nation&apos;s Cybersecurityhttps://www.whitehouse.gov/briefing-room/statements-releases/2022/03/21/statement-by-president-biden-on-our-nations-cybersecurity/News and Updates Related to the Russian Invasion of Ukrainehttps://resources.digitalshadows.com/russian-news-and-updatesDonate to the Ukraine crisis via Red Crosshttps://donate.redcross.org.uk/appeal/ukraine-crisis-appealDigital Forensic Research Labmedium.com/dfrlab]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461106-special-russia-ukraine-war-update-22-march-2022.mp3" length="32469987" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/lagup9lvl6l3j0di0ru282qj37m1?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1236886414</guid>
    <pubDate>Tue, 22 Mar 2022 13:54:03 -0400</pubDate>
    <itunes:duration>2703</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: New Malware &quot;CaddyWiper&quot;, Crypto ATM, Russia to Use TLS Certificates</itunes:title>
    <title>Weekly: New Malware &quot;CaddyWiper&quot;, Crypto ATM, Russia to Use TLS Certificates</title>
    <itunes:summary><![CDATA[ShadowTalk host Stefano alongside Kim and Dani bring you the latest in threat intelligence. This week they cover:* New Malware against Ukrainian targets: CaddyWiper* Crypto ATM and cybercriminals' reactions* Russia to start using homegrown TLS certificates***Resources from this week’s podcast***Meet Lapsus$: An Unusual Group In The Cyber Extortion Businesshttps://www.digitalshadows.com/blog-and-research/meet-lapsus-an-unusual-group-in-the-cyber-extortion-business/The Russia-Ukraine War And Th...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Stefano alongside Kim and Dani bring you the latest in threat intelligence. This week they cover:* New Malware against Ukrainian targets: CaddyWiper* Crypto ATM and cybercriminals&apos; reactions* Russia to start using homegrown TLS certificates***Resources from this week’s podcast***Meet Lapsus$: An Unusual Group In The Cyber Extortion Businesshttps://www.digitalshadows.com/blog-and-research/meet-lapsus-an-unusual-group-in-the-cyber-extortion-business/The Russia-Ukraine War And The Revival Of Hacktivismhttps://www.digitalshadows.com/blog-and-research/the-russia-ukraine-war-and-the-revival-of-hacktivism/Biden’s Executive Order On Crypto: What You Need To Knowhttps://www.digitalshadows.com/blog-and-research/bidens-executive-order-on-crypto-what-you-need-to-know/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Stefano alongside Kim and Dani bring you the latest in threat intelligence. This week they cover:* New Malware against Ukrainian targets: CaddyWiper* Crypto ATM and cybercriminals&apos; reactions* Russia to start using homegrown TLS certificates***Resources from this week’s podcast***Meet Lapsus$: An Unusual Group In The Cyber Extortion Businesshttps://www.digitalshadows.com/blog-and-research/meet-lapsus-an-unusual-group-in-the-cyber-extortion-business/The Russia-Ukraine War And The Revival Of Hacktivismhttps://www.digitalshadows.com/blog-and-research/the-russia-ukraine-war-and-the-revival-of-hacktivism/Biden’s Executive Order On Crypto: What You Need To Knowhttps://www.digitalshadows.com/blog-and-research/bidens-executive-order-on-crypto-what-you-need-to-know/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461107-weekly-new-malware-caddywiper-crypto-atm-russia-to-use-tls-certificates.mp3" length="25803170" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/lb05wnmef6cpwtjy1u5pqqsjcron?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1234742620</guid>
    <pubDate>Fri, 18 Mar 2022 14:35:32 -0400</pubDate>
    <itunes:duration>2148</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Linux Vulnerability &quot;Dirty Pipe&quot;, 2022 Ransomware Landscape So Far, Coinbase Blocks Russia</itunes:title>
    <title>Weekly: Linux Vulnerability &quot;Dirty Pipe&quot;, 2022 Ransomware Landscape So Far, Coinbase Blocks Russia</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Ivan and Austin bring you the latest in threat intelligence. This week they cover:* New Linux Vulnerability "Dirty Pipe"* Ransomware Landscape in 2022 So Far* Coinbase Blocks More than 25,000 Addresses Linked to Russia***Resources from this week’s podcast***Exploring SIM Swapping Services On Cybercriminal Forumshttps://www.digitalshadows.com/blog-and-research/exploring-sim-swapping-services-on-cybercriminal-forums/Can Cryptocurrency Be Used To Bypass The Impact...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Ivan and Austin bring you the latest in threat intelligence. This week they cover:* New Linux Vulnerability &quot;Dirty Pipe&quot;* Ransomware Landscape in 2022 So Far* Coinbase Blocks More than 25,000 Addresses Linked to Russia***Resources from this week’s podcast***Exploring SIM Swapping Services On Cybercriminal Forumshttps://www.digitalshadows.com/blog-and-research/exploring-sim-swapping-services-on-cybercriminal-forums/Can Cryptocurrency Be Used To Bypass The Impact Of Sanctions Being Applied Against Russia?https://www.digitalshadows.com/blog-and-research/can-cryptocurrency-be-used-to-bypass-the-impact-of-sanctions-being-applied-against-russia/New Linux bug gives root on all major distros, exploit releasedhttps://www.bleepingcomputer.com/news/security/new-linux-bug-gives-root-on-all-major-distros-exploit-released/FBI: Ragnar Locker ransomware breached 52 US critical infrastructure orgshttps://www.itpro.co.uk/security/ransomware/365375/fbi-ragnar-locker-ransomware-us-critical-infrastructureCoinbase blocks over 25,000 Russian-linked crypto addresseshttps://www.bleepingcomputer.com/news/security/coinbase-blocks-over-25-000-russian-linked-crypto-addresses/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Ivan and Austin bring you the latest in threat intelligence. This week they cover:* New Linux Vulnerability &quot;Dirty Pipe&quot;* Ransomware Landscape in 2022 So Far* Coinbase Blocks More than 25,000 Addresses Linked to Russia***Resources from this week’s podcast***Exploring SIM Swapping Services On Cybercriminal Forumshttps://www.digitalshadows.com/blog-and-research/exploring-sim-swapping-services-on-cybercriminal-forums/Can Cryptocurrency Be Used To Bypass The Impact Of Sanctions Being Applied Against Russia?https://www.digitalshadows.com/blog-and-research/can-cryptocurrency-be-used-to-bypass-the-impact-of-sanctions-being-applied-against-russia/New Linux bug gives root on all major distros, exploit releasedhttps://www.bleepingcomputer.com/news/security/new-linux-bug-gives-root-on-all-major-distros-exploit-released/FBI: Ragnar Locker ransomware breached 52 US critical infrastructure orgshttps://www.itpro.co.uk/security/ransomware/365375/fbi-ragnar-locker-ransomware-us-critical-infrastructureCoinbase blocks over 25,000 Russian-linked crypto addresseshttps://www.bleepingcomputer.com/news/security/coinbase-blocks-over-25-000-russian-linked-crypto-addresses/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461108-weekly-linux-vulnerability-dirty-pipe-2022-ransomware-landscape-so-far-coinbase-blocks-russia.mp3" length="15967182" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/e4kbl9qcwmn08cysl2r0l426tur4?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1230633736</guid>
    <pubDate>Fri, 11 Mar 2022 13:46:45 -0500</pubDate>
    <itunes:duration>1328</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Russia-Ukraine War Update 07 March 2022</itunes:title>
    <title>Special: Russia-Ukraine War Update 07 March 2022</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Stefano and Rory bring you the latest on the escalating tension between Russia and Ukraine. This episode they cover:* IDNS rejects Ukraine's request to block Russian Internet content* Anonymous claimed to have hacked Russian channels to broadcast footage from Ukraine***Resources from this special podcast***News and Updates Related to the Russian Invasion of Ukrainehttps://resources.digitalshadows.com/russian-news-and-updatesDonate to the Ukraine crisis via Red ...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Stefano and Rory bring you the latest on the escalating tension between Russia and Ukraine. This episode they cover:* IDNS rejects Ukraine&apos;s request to block Russian Internet content* Anonymous claimed to have hacked Russian channels to broadcast footage from Ukraine***Resources from this special podcast***News and Updates Related to the Russian Invasion of Ukrainehttps://resources.digitalshadows.com/russian-news-and-updatesDonate to the Ukraine crisis via Red Crosshttps://donate.redcross.org.uk/appeal/ukraine-crisis-appealDigital Forensic Research Labmedium.com/dfrlab]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Stefano and Rory bring you the latest on the escalating tension between Russia and Ukraine. This episode they cover:* IDNS rejects Ukraine&apos;s request to block Russian Internet content* Anonymous claimed to have hacked Russian channels to broadcast footage from Ukraine***Resources from this special podcast***News and Updates Related to the Russian Invasion of Ukrainehttps://resources.digitalshadows.com/russian-news-and-updatesDonate to the Ukraine crisis via Red Crosshttps://donate.redcross.org.uk/appeal/ukraine-crisis-appealDigital Forensic Research Labmedium.com/dfrlab]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461109-special-russia-ukraine-war-update-07-march-2022.mp3" length="17343215" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/tr3ri50az5lptfklkqmsixamq06n?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1228084753</guid>
    <pubDate>Mon, 07 Mar 2022 12:25:32 -0500</pubDate>
    <itunes:duration>1443</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Especial: Rusia y Ucrania Guerra, SWIFT, y Consejos de Mitigación y Reducción del Riesgo</itunes:title>
    <title>Especial: Rusia y Ucrania Guerra, SWIFT, y Consejos de Mitigación y Reducción del Riesgo</title>
    <itunes:summary><![CDATA[Bienvenido a ShadowTalk en Español! En este episodio, Stefano y Dani van a discutir:* Rusia y Ucrania crisis* Las reacciones de los cibercriminales a estos eventos* La Sociedad para las Comunicaciones Interbancarias y Financieras Mundiales (SWIFT)* Consejos de mitigación y reducción del riesgoCome siempre, si teneis algún comentario sobre este episodio o si queréis saber mas de algún tema, escribenos a shadowtalk@digitalshadows.com y estaremos muy felices para tomar sus preguntas!]]></itunes:summary>
    <description><![CDATA[Bienvenido a ShadowTalk en Español! En este episodio, Stefano y Dani van a discutir:* Rusia y Ucrania crisis* Las reacciones de los cibercriminales a estos eventos* La Sociedad para las Comunicaciones Interbancarias y Financieras Mundiales (SWIFT)* Consejos de mitigación y reducción del riesgoCome siempre, si teneis algún comentario sobre este episodio o si queréis saber mas de algún tema, escribenos a shadowtalk@digitalshadows.com y estaremos muy felices para tomar sus preguntas!]]></description>
    <content:encoded><![CDATA[Bienvenido a ShadowTalk en Español! En este episodio, Stefano y Dani van a discutir:* Rusia y Ucrania crisis* Las reacciones de los cibercriminales a estos eventos* La Sociedad para las Comunicaciones Interbancarias y Financieras Mundiales (SWIFT)* Consejos de mitigación y reducción del riesgoCome siempre, si teneis algún comentario sobre este episodio o si queréis saber mas de algún tema, escribenos a shadowtalk@digitalshadows.com y estaremos muy felices para tomar sus preguntas!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461110-especial-rusia-y-ucrania-guerra-swift-y-consejos-de-mitigacion-y-reduccion-del-riesgo.mp3" length="23314590" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/vi0r7z73zktdgweadv1cyik1g5bf?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1226431747</guid>
    <pubDate>Fri, 04 Mar 2022 13:01:44 -0500</pubDate>
    <itunes:duration>1940</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Conti Leaks, Reactions from Cybercriminals, &amp; Priority Intelligence Requirements</itunes:title>
    <title>Weekly: Conti Leaks, Reactions from Cybercriminals, &amp; Priority Intelligence Requirements</title>
    <itunes:summary><![CDATA[ShadowTalk host Stefano alongside Kim and Xue bring you the latest in threat intelligence. This week they cover:* Conti Leaks* Reactions from Cybercriminals* Priority Intelligence Requirements***Resources from this week’s podcast***Russian Cyber Threats: Practical Advice For Security Leadershttps://www.digitalshadows.com/blog-and-research/russian-cyber-threats-practical-advice-for-security-leaders/Cybercriminals React To Ukraine-Russia Conflicthttps://www.digitalshadows.com/blog-and-research/...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Stefano alongside Kim and Xue bring you the latest in threat intelligence. This week they cover:* Conti Leaks* Reactions from Cybercriminals* Priority Intelligence Requirements***Resources from this week’s podcast***Russian Cyber Threats: Practical Advice For Security Leadershttps://www.digitalshadows.com/blog-and-research/russian-cyber-threats-practical-advice-for-security-leaders/Cybercriminals React To Ukraine-Russia Conflicthttps://www.digitalshadows.com/blog-and-research/cybercriminals-react-to-ukraine-russia-conflict/Intelligence Requirements: Planning Your Cyber Response To The Russia-Ukraine Warhttps://www.digitalshadows.com/blog-and-research/planning-your-cyber-response-to-the-russia-ukraine-war/ Conti Ransomware Group Diaries, Part I: Evasionhttps://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-i-evasion/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Stefano alongside Kim and Xue bring you the latest in threat intelligence. This week they cover:* Conti Leaks* Reactions from Cybercriminals* Priority Intelligence Requirements***Resources from this week’s podcast***Russian Cyber Threats: Practical Advice For Security Leadershttps://www.digitalshadows.com/blog-and-research/russian-cyber-threats-practical-advice-for-security-leaders/Cybercriminals React To Ukraine-Russia Conflicthttps://www.digitalshadows.com/blog-and-research/cybercriminals-react-to-ukraine-russia-conflict/Intelligence Requirements: Planning Your Cyber Response To The Russia-Ukraine Warhttps://www.digitalshadows.com/blog-and-research/planning-your-cyber-response-to-the-russia-ukraine-war/ Conti Ransomware Group Diaries, Part I: Evasionhttps://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-i-evasion/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461111-weekly-conti-leaks-reactions-from-cybercriminals-priority-intelligence-requirements.mp3" length="22846274" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/97xhth7wl0xf7bquz4wgrc9om4sd?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1225781620</guid>
    <pubDate>Thu, 03 Mar 2022 13:19:00 -0500</pubDate>
    <itunes:duration>1902</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Russia-Ukraine War Update 02 March 2022</itunes:title>
    <title>Special: Russia-Ukraine War Update 02 March 2022</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Stefano, Rory, and Rick bring you the latest on the escalating tension between Russia and Ukraine. This episode they cover:* Recent cyber developments* Malware targeting Ukrainian organizations* New sanctions against Russia***Resources from this special podcast***Donate to the Ukraine crisis via Red Crosshttps://donate.redcross.org.uk/appeal/ukraine-crisis-appealDigital Forensic Research Labmedium.com/dfrlabPhoton BriefingSHAPING YOUR RESPONSE TO THE RUSSIA - U...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Stefano, Rory, and Rick bring you the latest on the escalating tension between Russia and Ukraine. This episode they cover:* Recent cyber developments* Malware targeting Ukrainian organizations* New sanctions against Russia***Resources from this special podcast***Donate to the Ukraine crisis via Red Crosshttps://donate.redcross.org.uk/appeal/ukraine-crisis-appealDigital Forensic Research Labmedium.com/dfrlabPhoton BriefingSHAPING YOUR RESPONSE TO THE RUSSIA - UKRAINE WAR SESSION DETAILS: 03 Mar 2022Session 1: 12pm GMT | Session 2: 8:30am PThttps://info.digitalshadows.com/PhotonIntelBriefing-RussiaUkraine.html]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Stefano, Rory, and Rick bring you the latest on the escalating tension between Russia and Ukraine. This episode they cover:* Recent cyber developments* Malware targeting Ukrainian organizations* New sanctions against Russia***Resources from this special podcast***Donate to the Ukraine crisis via Red Crosshttps://donate.redcross.org.uk/appeal/ukraine-crisis-appealDigital Forensic Research Labmedium.com/dfrlabPhoton BriefingSHAPING YOUR RESPONSE TO THE RUSSIA - UKRAINE WAR SESSION DETAILS: 03 Mar 2022Session 1: 12pm GMT | Session 2: 8:30am PThttps://info.digitalshadows.com/PhotonIntelBriefing-RussiaUkraine.html]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461112-special-russia-ukraine-war-update-02-march-2022.mp3" length="25991539" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/wa0w4bb45ps9jbo7ukpknyxl7omw?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1225653622</guid>
    <pubDate>Thu, 03 Mar 2022 10:30:19 -0500</pubDate>
    <itunes:duration>2164</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Russia and Ukraine - What We Know So Far - 28 February 2022</itunes:title>
    <title>Special: Russia and Ukraine - What We Know So Far - 28 February 2022</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Stefano, Rory, and Rick bring you the latest on the escalating tension between Russia and Ukraine. This episode they cover:* Continuing attacks between Russia and Ukraine* New sanctions against Russian banks* Cybercriminal developments * Nuclear forces on high alert/peace talks***Resources from this special podcast***Donate to the Ukraine crisis via Red Crosshttps://donate.redcross.org.uk/appeal/ukraine-crisis-appealDigital Forensic Research Labhttps://medium.c...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Stefano, Rory, and Rick bring you the latest on the escalating tension between Russia and Ukraine. This episode they cover:* Continuing attacks between Russia and Ukraine* New sanctions against Russian banks* Cybercriminal developments * Nuclear forces on high alert/peace talks***Resources from this special podcast***Donate to the Ukraine crisis via Red Crosshttps://donate.redcross.org.uk/appeal/ukraine-crisis-appealDigital Forensic Research Labhttps://medium.com/dfrlabWar via TikTok: Russia&apos;s new tool for propaganda machinehttps://apnews.com/article/russia-ukraine-technology-europe-media-nationalism-2186dbc533560cb666f59655ecf1ee8e]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Stefano, Rory, and Rick bring you the latest on the escalating tension between Russia and Ukraine. This episode they cover:* Continuing attacks between Russia and Ukraine* New sanctions against Russian banks* Cybercriminal developments * Nuclear forces on high alert/peace talks***Resources from this special podcast***Donate to the Ukraine crisis via Red Crosshttps://donate.redcross.org.uk/appeal/ukraine-crisis-appealDigital Forensic Research Labhttps://medium.com/dfrlabWar via TikTok: Russia&apos;s new tool for propaganda machinehttps://apnews.com/article/russia-ukraine-technology-europe-media-nationalism-2186dbc533560cb666f59655ecf1ee8e]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461113-special-russia-and-ukraine-what-we-know-so-far-28-february-2022.mp3" length="24728283" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/rxtt9perblvpiqgcbfybjbxxke26?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1223929198</guid>
    <pubDate>Mon, 28 Feb 2022 11:28:45 -0500</pubDate>
    <itunes:duration>2058</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Russian Offensive Cyber-Team, Conti-Trickbot, OpenSea NFT Breach, &amp; More!</itunes:title>
    <title>Weekly: Russian Offensive Cyber-Team, Conti-Trickbot, OpenSea NFT Breach, &amp; More!</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Ivan, Austin, and Rick bring you the latest in threat intelligence. This week they cover:* Russian Offensive Cyber-Team* Conti-Trickbot* OpenSea NFT Breach***Resources from this week’s podcast***Russia Invades Ukraine: What Happens Next?https://www.digitalshadows.com/blog-and-research/russia-invades-ukraine-what-happens-next/Recruitment Fraud In 2022https://www.digitalshadows.com/blog-and-research/recruitment-fraud-in-2022/Of Death And Taxes: File Early To Beat...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Ivan, Austin, and Rick bring you the latest in threat intelligence. This week they cover:* Russian Offensive Cyber-Team* Conti-Trickbot* OpenSea NFT Breach***Resources from this week’s podcast***Russia Invades Ukraine: What Happens Next?https://www.digitalshadows.com/blog-and-research/russia-invades-ukraine-what-happens-next/Recruitment Fraud In 2022https://www.digitalshadows.com/blog-and-research/recruitment-fraud-in-2022/Of Death And Taxes: File Early To Beat The Scammershttps://www.digitalshadows.com/blog-and-research/of-death-and-taxes-file-early-to-beat-the-scammers/Russia unleashed data-wiper malware on Ukraine, say cyber expertshttps://www.theguardian.com/world/2022/feb/24/russia-unleashed-data-wiper-virus-on-ukraine-say-cyber-expertsConti ransomware gang takes over TrickBot malware operationhttps://www.bleepingcomputer.com/news/security/conti-ransomware-gang-takes-over-trickbot-malware-operation/OpenSea users lose $2 million worth of NFTs in phishing attackhttps://www.bleepingcomputer.com/news/security/opensea-users-lose-2-million-worth-of-nfts-in-phishing-attack/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Ivan, Austin, and Rick bring you the latest in threat intelligence. This week they cover:* Russian Offensive Cyber-Team* Conti-Trickbot* OpenSea NFT Breach***Resources from this week’s podcast***Russia Invades Ukraine: What Happens Next?https://www.digitalshadows.com/blog-and-research/russia-invades-ukraine-what-happens-next/Recruitment Fraud In 2022https://www.digitalshadows.com/blog-and-research/recruitment-fraud-in-2022/Of Death And Taxes: File Early To Beat The Scammershttps://www.digitalshadows.com/blog-and-research/of-death-and-taxes-file-early-to-beat-the-scammers/Russia unleashed data-wiper malware on Ukraine, say cyber expertshttps://www.theguardian.com/world/2022/feb/24/russia-unleashed-data-wiper-virus-on-ukraine-say-cyber-expertsConti ransomware gang takes over TrickBot malware operationhttps://www.bleepingcomputer.com/news/security/conti-ransomware-gang-takes-over-trickbot-malware-operation/OpenSea users lose $2 million worth of NFTs in phishing attackhttps://www.bleepingcomputer.com/news/security/opensea-users-lose-2-million-worth-of-nfts-in-phishing-attack/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461114-weekly-russian-offensive-cyber-team-conti-trickbot-opensea-nft-breach-more.mp3" length="26218865" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/9itthzgz5ag05pdznkm4sjydpdip?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1222460170</guid>
    <pubDate>Fri, 25 Feb 2022 12:54:28 -0500</pubDate>
    <itunes:duration>2183</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Russia and Ukraine Conflict</itunes:title>
    <title>Special: Russia and Ukraine Conflict</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Stefano, Rory, and Austin bring you the latest on the escalating tension between Russia and Ukraine. This episode they cover:* The current situation between Russia and Ukraine* Reasons for Russia’s invasions* International reactions to the escalation* Future projections and likely cybersecurity outcomes]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Stefano, Rory, and Austin bring you the latest on the escalating tension between Russia and Ukraine. This episode they cover:* The current situation between Russia and Ukraine* Reasons for Russia’s invasions* International reactions to the escalation* Future projections and likely cybersecurity outcomes]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Stefano, Rory, and Austin bring you the latest on the escalating tension between Russia and Ukraine. This episode they cover:* The current situation between Russia and Ukraine* Reasons for Russia’s invasions* International reactions to the escalation* Future projections and likely cybersecurity outcomes]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461115-special-russia-and-ukraine-conflict.mp3" length="23253329" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/yxmrgry5dyyx9ilajjzz661u1u25?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1221275743</guid>
    <pubDate>Wed, 23 Feb 2022 13:51:07 -0500</pubDate>
    <itunes:duration>1935</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: US DoJ Indictment, Grey Hat &amp; ETH&#39;s Bounty, Crypto Ads</itunes:title>
    <title>Weekly: US DoJ Indictment, Grey Hat &amp; ETH&#39;s Bounty, Crypto Ads</title>
    <itunes:summary><![CDATA[ShadowTalk host Stefano alongside Saul, Rory, and Dylan bring you the latest in threat intelligence. This week they cover:* US DoJ Indictment Against Weird-Acting BTC Laundering Couple* Grey Hat and ETH's Phat Bug Bounty* Crypto Superbowl Ads***Resources from this week’s podcast***Automate Alert Investigation And Response With XSOAR And SearchLighthttps://www.digitalshadows.com/blog-and-research/automate-alert-investigation-and-response-with-xsoar-and-searchlight/Initial Access Brokers In 202...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Stefano alongside Saul, Rory, and Dylan bring you the latest in threat intelligence. This week they cover:* US DoJ Indictment Against Weird-Acting BTC Laundering Couple* Grey Hat and ETH&apos;s Phat Bug Bounty* Crypto Superbowl Ads***Resources from this week’s podcast***Automate Alert Investigation And Response With XSOAR And SearchLighthttps://www.digitalshadows.com/blog-and-research/automate-alert-investigation-and-response-with-xsoar-and-searchlight/Initial Access Brokers In 2021: An Ever Expanding Threathttps://www.digitalshadows.com/blog-and-research/initial-access-brokers-in-2021-an-ever-expanding-threat/“No Cards = No Work = No Money”: Russian Law Enforcement’s Assault On Carding Platformshttps://www.digitalshadows.com/blog-and-research/russian-law-enforcements-assault-on-carding-platforms/Two Arrested for Alleged Conspiracy to Launder $4.5 Billion in Stolen Cryptocurrencyhttps://www.justice.gov/opa/pr/two-arrested-alleged-conspiracy-launder-45-billion-stolen-cryptocurrencyDeFi Takes on Bigger Role in Money Laundering But Small Group of Centralized Services Still Dominatehttps://blog.chainalysis.com/reports/2022-crypto-crime-report-preview-cryptocurrency-money-laundering/Hacker could’ve printed unlimited ‘Ether’ but chose $2M bug bounty insteadhttps://protos.com/ether-hacker-optimism-ethereum-layer2-scaling-bug-bounty/Coinbase’s bouncing QR code Super Bowl ad was so popular it crashed the apphttps://www.theverge.com/2022/2/13/22932397/coinbases-qr-code-super-bowl-ad-app-crashSubscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Stefano alongside Saul, Rory, and Dylan bring you the latest in threat intelligence. This week they cover:* US DoJ Indictment Against Weird-Acting BTC Laundering Couple* Grey Hat and ETH&apos;s Phat Bug Bounty* Crypto Superbowl Ads***Resources from this week’s podcast***Automate Alert Investigation And Response With XSOAR And SearchLighthttps://www.digitalshadows.com/blog-and-research/automate-alert-investigation-and-response-with-xsoar-and-searchlight/Initial Access Brokers In 2021: An Ever Expanding Threathttps://www.digitalshadows.com/blog-and-research/initial-access-brokers-in-2021-an-ever-expanding-threat/“No Cards = No Work = No Money”: Russian Law Enforcement’s Assault On Carding Platformshttps://www.digitalshadows.com/blog-and-research/russian-law-enforcements-assault-on-carding-platforms/Two Arrested for Alleged Conspiracy to Launder $4.5 Billion in Stolen Cryptocurrencyhttps://www.justice.gov/opa/pr/two-arrested-alleged-conspiracy-launder-45-billion-stolen-cryptocurrencyDeFi Takes on Bigger Role in Money Laundering But Small Group of Centralized Services Still Dominatehttps://blog.chainalysis.com/reports/2022-crypto-crime-report-preview-cryptocurrency-money-laundering/Hacker could’ve printed unlimited ‘Ether’ but chose $2M bug bounty insteadhttps://protos.com/ether-hacker-optimism-ethereum-layer2-scaling-bug-bounty/Coinbase’s bouncing QR code Super Bowl ad was so popular it crashed the apphttps://www.theverge.com/2022/2/13/22932397/coinbases-qr-code-super-bowl-ad-app-crashSubscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461116-weekly-us-doj-indictment-grey-hat-eth-s-bounty-crypto-ads.mp3" length="30957188" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/9i4otsqdgi7kx2c1wiiia8kjaaod?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1218446011</guid>
    <pubDate>Fri, 18 Feb 2022 16:10:21 -0500</pubDate>
    <itunes:duration>2577</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Microsoft to Enable Macros in Office, Russia Arrests Hacking Group, Valentine&#39;s Day Concerns</itunes:title>
    <title>Weekly: Microsoft to Enable Macros in Office, Russia Arrests Hacking Group, Valentine&#39;s Day Concerns</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Ivan and Austin bring you the latest in threat intelligence. This week they cover:* Microsoft Announces Plans to Enable Macros in Office Applications* Russia Arrests Six People Linking to Hacking Group* Things To Be Aware of This Valentine's Day ***Resources from this week’s podcast***Valentine's Day: Share Your Love, Not Your Credentialshttps://www.digitalshadows.com/blog-and-research/valentines-day-share-your-love-not-your-credentials/Growing Tension Between ...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Ivan and Austin bring you the latest in threat intelligence. This week they cover:* Microsoft Announces Plans to Enable Macros in Office Applications* Russia Arrests Six People Linking to Hacking Group* Things To Be Aware of This Valentine&apos;s Day ***Resources from this week’s podcast***Valentine&apos;s Day: Share Your Love, Not Your Credentialshttps://www.digitalshadows.com/blog-and-research/valentines-day-share-your-love-not-your-credentials/Growing Tension Between Russia And Ukraine: Should You Be Concerned?https://www.digitalshadows.com/blog-and-research/growing-tension-between-russia-and-ukraine/CVEs You Might Have Missed While Log4j Stole The Headlineshttps://www.digitalshadows.com/blog-and-research/cves-you-might-have-missed-whilst-log4j-stole-the-headlines/Microsoft plans to kill malware delivery via Office macroshttps://www.bleepingcomputer.com/news/microsoft/microsoft-plans-to-kill-malware-delivery-via-office-macros/Russia arrests third hacking group, seizes carding forumshttps://www.bleepingcomputer.com/news/security/russia-arrests-third-hacking-group-seizes-carding-forums/FBI Warns of Romance Scams Ahead of Valentine’s Dayhttps://www.fbi.gov/contact-us/field-offices/columbia/news/press-releases/fbi-warns-of-romance-scams-ahead-of-valentines-dayWest Mercia Police issue romance fraud warning to online daters in the run up to Valentine&apos;s Dayhttps://worcesterobserver.co.uk/news/west-mercia-police-issue-romance-fraud-warning-to-online-daters-in-the-run-up-to-valentines-day-35613/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Ivan and Austin bring you the latest in threat intelligence. This week they cover:* Microsoft Announces Plans to Enable Macros in Office Applications* Russia Arrests Six People Linking to Hacking Group* Things To Be Aware of This Valentine&apos;s Day ***Resources from this week’s podcast***Valentine&apos;s Day: Share Your Love, Not Your Credentialshttps://www.digitalshadows.com/blog-and-research/valentines-day-share-your-love-not-your-credentials/Growing Tension Between Russia And Ukraine: Should You Be Concerned?https://www.digitalshadows.com/blog-and-research/growing-tension-between-russia-and-ukraine/CVEs You Might Have Missed While Log4j Stole The Headlineshttps://www.digitalshadows.com/blog-and-research/cves-you-might-have-missed-whilst-log4j-stole-the-headlines/Microsoft plans to kill malware delivery via Office macroshttps://www.bleepingcomputer.com/news/microsoft/microsoft-plans-to-kill-malware-delivery-via-office-macros/Russia arrests third hacking group, seizes carding forumshttps://www.bleepingcomputer.com/news/security/russia-arrests-third-hacking-group-seizes-carding-forums/FBI Warns of Romance Scams Ahead of Valentine’s Dayhttps://www.fbi.gov/contact-us/field-offices/columbia/news/press-releases/fbi-warns-of-romance-scams-ahead-of-valentines-dayWest Mercia Police issue romance fraud warning to online daters in the run up to Valentine&apos;s Dayhttps://worcesterobserver.co.uk/news/west-mercia-police-issue-romance-fraud-warning-to-online-daters-in-the-run-up-to-valentines-day-35613/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461117-weekly-microsoft-to-enable-macros-in-office-russia-arrests-hacking-group-valentine-s-day-concerns.mp3" length="15034608" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/kgxj21x6j5xqxepz30g4dpwqsoad?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1214251534</guid>
    <pubDate>Fri, 11 Feb 2022 16:34:57 -0500</pubDate>
    <itunes:duration>1251</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Cyber Operations As Part of Hybrid Warfare in Russia-Ukraine Context</itunes:title>
    <title>Weekly: Cyber Operations As Part of Hybrid Warfare in Russia-Ukraine Context</title>
    <itunes:summary><![CDATA[ShadowTalk host Stefano alongside Saul and Rory bring you the latest in threat intelligence. This week they cover:*Cyber Operations as part of Hybrid Warfare in the Russia-Ukraine context***Resources from this week’s podcast***Beijing 2022: Why You Should Or Shouldn’t Care About The Winter Olympicshttps://www.digitalshadows.com/blog-and-research/beijing-2022-why-you-should-or-shouldnt-care-about-the-winter-olympics/What We’re Reading This Month – January 2022https://www.digitalshadows.com/blo...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Stefano alongside Saul and Rory bring you the latest in threat intelligence. This week they cover:*Cyber Operations as part of Hybrid Warfare in the Russia-Ukraine context***Resources from this week’s podcast***Beijing 2022: Why You Should Or Shouldn’t Care About The Winter Olympicshttps://www.digitalshadows.com/blog-and-research/beijing-2022-why-you-should-or-shouldnt-care-about-the-winter-olympics/What We’re Reading This Month – January 2022https://www.digitalshadows.com/blog-and-research/what-were-reading-this-month-january-2022/Vulnerability Intelligence: Introducing SearchLight’s Newest Capabilityhttps://www.digitalshadows.com/blog-and-research/vulnerability-intelligence-introducing-searchlights-newest-capability/Destructive malware targeting Ukrainian organizationshttps://www.microsoft.com/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations/Putin Says the U.S. Wants to Push Russia into Warhttps://www.nytimes.com/live/2022/02/01/world/russia-ukraine-news#putin-accuses-the-united-states-of-trying-to-goad-russia-into-starting-a-conflict-in-ukraineLessons Learned From Successive Use of Offensive Cyber Operations Against Ukraine and What May Be Nexthttps://www.crowdstrike.com/blog/lessons-from-past-cyber-operations-against-ukraine/Proactive Preparation and Hardening to Protect Against Destructive Attackshttps://www.mandiant.com/resources/protect-against-destructive-attacksSubscribe to our threat intelligence email: info.digitalshadows.com/SubscribetoEm…cast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Stefano alongside Saul and Rory bring you the latest in threat intelligence. This week they cover:*Cyber Operations as part of Hybrid Warfare in the Russia-Ukraine context***Resources from this week’s podcast***Beijing 2022: Why You Should Or Shouldn’t Care About The Winter Olympicshttps://www.digitalshadows.com/blog-and-research/beijing-2022-why-you-should-or-shouldnt-care-about-the-winter-olympics/What We’re Reading This Month – January 2022https://www.digitalshadows.com/blog-and-research/what-were-reading-this-month-january-2022/Vulnerability Intelligence: Introducing SearchLight’s Newest Capabilityhttps://www.digitalshadows.com/blog-and-research/vulnerability-intelligence-introducing-searchlights-newest-capability/Destructive malware targeting Ukrainian organizationshttps://www.microsoft.com/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations/Putin Says the U.S. Wants to Push Russia into Warhttps://www.nytimes.com/live/2022/02/01/world/russia-ukraine-news#putin-accuses-the-united-states-of-trying-to-goad-russia-into-starting-a-conflict-in-ukraineLessons Learned From Successive Use of Offensive Cyber Operations Against Ukraine and What May Be Nexthttps://www.crowdstrike.com/blog/lessons-from-past-cyber-operations-against-ukraine/Proactive Preparation and Hardening to Protect Against Destructive Attackshttps://www.mandiant.com/resources/protect-against-destructive-attacksSubscribe to our threat intelligence email: info.digitalshadows.com/SubscribetoEm…cast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461118-weekly-cyber-operations-as-part-of-hybrid-warfare-in-russia-ukraine-context.mp3" length="18513126" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/4n7capm7keq2ogenkf0acyuu0f5n?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1209922348</guid>
    <pubDate>Fri, 04 Feb 2022 14:11:15 -0500</pubDate>
    <itunes:duration>1541</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Malicious QR Codes, Ransomware Insider Attacks, Russia/Ukraine Conflict Escalates</itunes:title>
    <title>Weekly: Malicious QR Codes, Ransomware Insider Attacks, Russia/Ukraine Conflict Escalates</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Austin and Ivan bring you the latest in threat intelligence. This week they cover:* Maliciously crafted Quick Response (QR) Codes* Ransomware Insider Attacks* Growing Russia/Ukraine Conflict***Resources from this week’s podcast***Life In Prison: The Cybercriminal Perspectivehttps://www.digitalshadows.com/blog-and-research/life-in-prison-the-cybercriminal-perspective/Vulnerability Intelligence: A Best Practice Guidehttps://www.digitalshadows.com/blog-and-researc...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Austin and Ivan bring you the latest in threat intelligence. This week they cover:* Maliciously crafted Quick Response (QR) Codes* Ransomware Insider Attacks* Growing Russia/Ukraine Conflict***Resources from this week’s podcast***Life In Prison: The Cybercriminal Perspectivehttps://www.digitalshadows.com/blog-and-research/life-in-prison-the-cybercriminal-perspective/Vulnerability Intelligence: A Best Practice Guidehttps://www.digitalshadows.com/blog-and-research/vulnerability-intelligence-a-best-practice-guide/FBI warns of malicious QR codes used to steal your moneyhttps://www.bleepingcomputer.com/news/security/fbi-warns-of-malicious-qr-codes-used-to-steal-your-money/Ransomware gangs increase efforts to enlist insiders for attackshttps://www.bleepingcomputer.com/news/security/ransomware-gangs-increase-efforts-to-enlist-insiders-for-attacks/Belarusian hacktivist group attacks Belarusian Railways as military frictions mounthttps://www.cyberscoop.com/cyber-partisans-belarus-russia-ukraine/Subscribe to our threat intelligence email: info.digitalshadows.com/SubscribetoEm…cast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Austin and Ivan bring you the latest in threat intelligence. This week they cover:* Maliciously crafted Quick Response (QR) Codes* Ransomware Insider Attacks* Growing Russia/Ukraine Conflict***Resources from this week’s podcast***Life In Prison: The Cybercriminal Perspectivehttps://www.digitalshadows.com/blog-and-research/life-in-prison-the-cybercriminal-perspective/Vulnerability Intelligence: A Best Practice Guidehttps://www.digitalshadows.com/blog-and-research/vulnerability-intelligence-a-best-practice-guide/FBI warns of malicious QR codes used to steal your moneyhttps://www.bleepingcomputer.com/news/security/fbi-warns-of-malicious-qr-codes-used-to-steal-your-money/Ransomware gangs increase efforts to enlist insiders for attackshttps://www.bleepingcomputer.com/news/security/ransomware-gangs-increase-efforts-to-enlist-insiders-for-attacks/Belarusian hacktivist group attacks Belarusian Railways as military frictions mounthttps://www.cyberscoop.com/cyber-partisans-belarus-russia-ukraine/Subscribe to our threat intelligence email: info.digitalshadows.com/SubscribetoEm…cast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461119-weekly-malicious-qr-codes-ransomware-insider-attacks-russia-ukraine-conflict-escalates.mp3" length="17942637" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/u3t2mclcmzndbaa0vfzq58z02vt0?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1205549548</guid>
    <pubDate>Fri, 28 Jan 2022 12:19:16 -0500</pubDate>
    <itunes:duration>1493</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Attacks Against Ukrainian Websites, REvil Arrests, and Microsoft Wiper</itunes:title>
    <title>Weekly: Attacks Against Ukrainian Websites, REvil Arrests, and Microsoft Wiper</title>
    <itunes:summary><![CDATA[ShadowTalk host Stefano alongside Kimberley, Dani, Rory, and Xueyin bring you the latest in threat intelligence. This week they cover:* Defacement attack against Ukrainian government websites* REvil arrests* Microsoft Wiper***Resources from this week’s podcast***Navigating The Threat Intelligence Market In 2022https://www.digitalshadows.com/blog-and-research/navigating-the-threat-intelligence-market-in-2022/Ransomware Q4 Overviewhttps://www.digitalshadows.com/blog-and-research/ransomware-q4-o...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Stefano alongside Kimberley, Dani, Rory, and Xueyin bring you the latest in threat intelligence. This week they cover:* Defacement attack against Ukrainian government websites* REvil arrests* Microsoft Wiper***Resources from this week’s podcast***Navigating The Threat Intelligence Market In 2022https://www.digitalshadows.com/blog-and-research/navigating-the-threat-intelligence-market-in-2022/Ransomware Q4 Overviewhttps://www.digitalshadows.com/blog-and-research/ransomware-q4-overview/More than 70 Ukrainian government websites have been defaced in cyberattackshttps://www.npr.org/2022/01/19/1074172805/more-than-70-ukrainian-government-websites-have-been-defaced-in-cyber-attacks#:~:text=About%2070%20Ukrainian%20government%20websites,system%20for%20all%20those%20websites.Russia arrests 14 alleged members of REvil ransomware gang, including hacker U.S. says conducted Colonial Pipeline attackhttps://www.washingtonpost.com/world/2022/01/14/russia-hacker-revil/Destructive malware targeting Ukrainian organizationshttps://www.microsoft.com/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations/Subscribe to our threat intelligence email: info.digitalshadows.com/SubscribetoEm…cast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Stefano alongside Kimberley, Dani, Rory, and Xueyin bring you the latest in threat intelligence. This week they cover:* Defacement attack against Ukrainian government websites* REvil arrests* Microsoft Wiper***Resources from this week’s podcast***Navigating The Threat Intelligence Market In 2022https://www.digitalshadows.com/blog-and-research/navigating-the-threat-intelligence-market-in-2022/Ransomware Q4 Overviewhttps://www.digitalshadows.com/blog-and-research/ransomware-q4-overview/More than 70 Ukrainian government websites have been defaced in cyberattackshttps://www.npr.org/2022/01/19/1074172805/more-than-70-ukrainian-government-websites-have-been-defaced-in-cyber-attacks#:~:text=About%2070%20Ukrainian%20government%20websites,system%20for%20all%20those%20websites.Russia arrests 14 alleged members of REvil ransomware gang, including hacker U.S. says conducted Colonial Pipeline attackhttps://www.washingtonpost.com/world/2022/01/14/russia-hacker-revil/Destructive malware targeting Ukrainian organizationshttps://www.microsoft.com/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations/Subscribe to our threat intelligence email: info.digitalshadows.com/SubscribetoEm…cast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461120-weekly-attacks-against-ukrainian-websites-revil-arrests-and-microsoft-wiper.mp3" length="24494233" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/jkb9bgcrk0sp6e8pvfre5221wc1n?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1201056523</guid>
    <pubDate>Fri, 21 Jan 2022 12:32:06 -0500</pubDate>
    <itunes:duration>2038</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: H2 Database Vulnerability, DDoS Extortion, and Alternate ransomware techniques</itunes:title>
    <title>Weekly: H2 Database Vulnerability, DDoS Extortion, and Alternate ransomware techniques</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Ivan and Austin bring you the latest in threat intelligence. This week they cover: * A Critical H2 Database Vulnerability* DDoS Extortion* Alternate ransomware techniques***Resources from this week’s podcast***Cyber Threats to the Education Systemhttps://www.digitalshadows.com/blog-and-research/cyber-threats-to-education/How Do Ransomware Groups Launder Paymentshttps://www.digitalshadows.com/blog-and-research/how-do-ransomware-groups-launder-payments/JFrog rese...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Ivan and Austin bring you the latest in threat intelligence. This week they cover: * A Critical H2 Database Vulnerability* DDoS Extortion* Alternate ransomware techniques***Resources from this week’s podcast***Cyber Threats to the Education Systemhttps://www.digitalshadows.com/blog-and-research/cyber-threats-to-education/How Do Ransomware Groups Launder Paymentshttps://www.digitalshadows.com/blog-and-research/how-do-ransomware-groups-launder-payments/JFrog researchers find JNDI vulnerability in H2 database consoles similar to Log4Shellhttps://www.zdnet.com/article/jfrog-researchers-find-jndi-vulnerability-in-h2-database-consoles-similar-to-log4shell/ Extortion DDoS attacks grow stronger and more commonhttps://www.bleepingcomputer.com/news/security/extortion-ddos-attacks-grow-stronger-and-more-commonFBI: Hackers use BadUSB to target defense firms with ransomwarehttps://www.bleepingcomputer.com/news/security/fbi-hackers-use-badusb-to-target-defense-firms-with-ransomware/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Ivan and Austin bring you the latest in threat intelligence. This week they cover: * A Critical H2 Database Vulnerability* DDoS Extortion* Alternate ransomware techniques***Resources from this week’s podcast***Cyber Threats to the Education Systemhttps://www.digitalshadows.com/blog-and-research/cyber-threats-to-education/How Do Ransomware Groups Launder Paymentshttps://www.digitalshadows.com/blog-and-research/how-do-ransomware-groups-launder-payments/JFrog researchers find JNDI vulnerability in H2 database consoles similar to Log4Shellhttps://www.zdnet.com/article/jfrog-researchers-find-jndi-vulnerability-in-h2-database-consoles-similar-to-log4shell/ Extortion DDoS attacks grow stronger and more commonhttps://www.bleepingcomputer.com/news/security/extortion-ddos-attacks-grow-stronger-and-more-commonFBI: Hackers use BadUSB to target defense firms with ransomwarehttps://www.bleepingcomputer.com/news/security/fbi-hackers-use-badusb-to-target-defense-firms-with-ransomware/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461121-weekly-h2-database-vulnerability-ddos-extortion-and-alternate-ransomware-techniques.mp3" length="15137071" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/zg5isf7q64u3ek5sajp9kbxix8iy?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1196660692</guid>
    <pubDate>Fri, 14 Jan 2022 14:48:55 -0500</pubDate>
    <itunes:duration>1260</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Especial: Servicios financieros, ransomware, y ciberdelincuencia</itunes:title>
    <title>Especial: Servicios financieros, ransomware, y ciberdelincuencia</title>
    <itunes:summary><![CDATA[Bienvenido a ShadowTalk en Español! En este episodio, Stefano y Dani van a discutir: Amenazas a los servicios financierosLas tres áreas de riesgo El desarrollo del ransomware El desarollo de la ciberdelincuencia Come siempre, si teneis algún comentario sobre este episodio o si queréis saber mas de algún tema, escribenos a shadowtalk@digitalshadows.com y estaremos muy felices para tomar sus preguntas!]]></itunes:summary>
    <description><![CDATA[Bienvenido a ShadowTalk en Español! En este episodio, Stefano y Dani van a discutir: Amenazas a los servicios financierosLas tres áreas de riesgo El desarrollo del ransomware El desarollo de la ciberdelincuencia Come siempre, si teneis algún comentario sobre este episodio o si queréis saber mas de algún tema, escribenos a shadowtalk@digitalshadows.com y estaremos muy felices para tomar sus preguntas!]]></description>
    <content:encoded><![CDATA[Bienvenido a ShadowTalk en Español! En este episodio, Stefano y Dani van a discutir: Amenazas a los servicios financierosLas tres áreas de riesgo El desarrollo del ransomware El desarollo de la ciberdelincuencia Come siempre, si teneis algún comentario sobre este episodio o si queréis saber mas de algún tema, escribenos a shadowtalk@digitalshadows.com y estaremos muy felices para tomar sus preguntas!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461122-especial-servicios-financieros-ransomware-y-ciberdelincuencia.mp3" length="25922882" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/w7cutxoxcobocduosjr9i99pyw23?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1192219177</guid>
    <pubDate>Fri, 07 Jan 2022 13:35:44 -0500</pubDate>
    <itunes:duration>2158</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Closing out 2021 with Log4j Updates, Karakurt News, and a Cybercriminal Arrest</itunes:title>
    <title>Weekly: Closing out 2021 with Log4j Updates, Karakurt News, and a Cybercriminal Arrest</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris is joined by both the US and UK teams for the last podcast episode of 2021. This episode they cover: * The Log4j vulnerability and what has happened since its discovery* The Karakurt extortion group is making headlines* An individual considered the most prolific cybercriminal to date has been arrestedCheck out the latest Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-17th-dec Don’t forget to si...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris is joined by both the US and UK teams for the last podcast episode of 2021. This episode they cover: * The Log4j vulnerability and what has happened since its discovery* The Karakurt extortion group is making headlines* An individual considered the most prolific cybercriminal to date has been arrestedCheck out the latest Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-17th-dec Don’t forget to sign up for Nifty Gifty 2021 for a chance to win 15 daily prizes (we’re giving away a Microsoft Surface Pro on Dec. 17!). Don’t miss out, register now: https://lp.auvik.com/nifty-gifty/?utm_campaign=L-O-PTNR-U-All-NG2021_DigitalShadows&amp;utm_source=DigitalShadows***Resources from this week’s podcast***Cone of Plausibility: Forecasting Ransomware Scenarios in 2022https://www.digitalshadows.com/blog-and-research/forecasting-ransomware-scenarios-in-2022/Log4j: What’s Happened Sincehttps://www.digitalshadows.com/blog-and-research/log4j-whats-happened-since/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris is joined by both the US and UK teams for the last podcast episode of 2021. This episode they cover: * The Log4j vulnerability and what has happened since its discovery* The Karakurt extortion group is making headlines* An individual considered the most prolific cybercriminal to date has been arrestedCheck out the latest Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-17th-dec Don’t forget to sign up for Nifty Gifty 2021 for a chance to win 15 daily prizes (we’re giving away a Microsoft Surface Pro on Dec. 17!). Don’t miss out, register now: https://lp.auvik.com/nifty-gifty/?utm_campaign=L-O-PTNR-U-All-NG2021_DigitalShadows&amp;utm_source=DigitalShadows***Resources from this week’s podcast***Cone of Plausibility: Forecasting Ransomware Scenarios in 2022https://www.digitalshadows.com/blog-and-research/forecasting-ransomware-scenarios-in-2022/Log4j: What’s Happened Sincehttps://www.digitalshadows.com/blog-and-research/log4j-whats-happened-since/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461123-weekly-closing-out-2021-with-log4j-updates-karakurt-news-and-a-cybercriminal-arrest.mp3" length="26569300" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/kicqv85861tke4w9hpmz61s7qfrm?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1179716083</guid>
    <pubDate>Fri, 17 Dec 2021 12:13:14 -0500</pubDate>
    <itunes:duration>2212</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Log4j Zero-day Vulnerability</itunes:title>
    <title>Special: Log4j Zero-day Vulnerability</title>
    <itunes:summary><![CDATA[ShadowTalk host Sean alongside Rick, Chris and Rob bring you the latest on the recent Log4j Zero-day Vulnerability. This episode they cover: * The background of the vulnerability* What’s happening now* Long-tail strategic implications ***Resources from this week’s podcast***Curated List of Log4j IOCs https://github.com/curated-intel/Log4Shell-IOCsLog4j: What We Know So Farhttps://www.digitalshadows.com/blog-and-research/the-log4j-zero-day-what-we-know-so-far/ Subscribe to our threat inte...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Sean alongside Rick, Chris and Rob bring you the latest on the recent Log4j Zero-day Vulnerability. This episode they cover: * The background of the vulnerability* What’s happening now* Long-tail strategic implications ***Resources from this week’s podcast***Curated List of Log4j IOCs https://github.com/curated-intel/Log4Shell-IOCsLog4j: What We Know So Farhttps://www.digitalshadows.com/blog-and-research/the-log4j-zero-day-what-we-know-so-far/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Sean alongside Rick, Chris and Rob bring you the latest on the recent Log4j Zero-day Vulnerability. This episode they cover: * The background of the vulnerability* What’s happening now* Long-tail strategic implications ***Resources from this week’s podcast***Curated List of Log4j IOCs https://github.com/curated-intel/Log4Shell-IOCsLog4j: What We Know So Farhttps://www.digitalshadows.com/blog-and-research/the-log4j-zero-day-what-we-know-so-far/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461124-special-log4j-zero-day-vulnerability.mp3" length="16619057" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/0fp20m48dohu5f6tmaf5jsypz15j?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1177147606</guid>
    <pubDate>Mon, 13 Dec 2021 12:11:12 -0500</pubDate>
    <itunes:duration>1383</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: NICKEL Targets LATAM and Europe, Quantum Computing, and UK Cyberattack</itunes:title>
    <title>Weekly: NICKEL Targets LATAM and Europe, Quantum Computing, and UK Cyberattack</title>
    <itunes:summary><![CDATA[ShadowTalk host Stefano alongside Chris and Dani bring you the latest in threat intelligence. This episode they cover: * NICKEL’s campaign targets Latin America and Europe* What on earth is Quantum computing and why should we pay attention to it* A cyberattack has paralyzed a UK supermarket infrastructure; would you consider that critical infrastructure?Check out the latest Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-10th-...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Stefano alongside Chris and Dani bring you the latest in threat intelligence. This episode they cover: * NICKEL’s campaign targets Latin America and Europe* What on earth is Quantum computing and why should we pay attention to it* A cyberattack has paralyzed a UK supermarket infrastructure; would you consider that critical infrastructure?Check out the latest Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-10th-dec***Resources from this week’s podcast***2021: An APAC Cybersecurity Odysseyhttps://www.digitalshadows.com/blog-and-research/2021-an-apac-cyber-security-odyssey/ Latin American Financial Services and Cybercrimehttps://www.digitalshadows.com/blog-and-research/latin-american-financial-services-sunny-climes-and-cybercrimes/Outside the Perimeter: The New Digital Risk Landscapehttps://www.digitalshadows.com/blog-and-research/outside-the-perimeter-the-new-digital-risk-landscape/ ALSO: Don’t forget to sign up for Nifty Gifty 2021 for a chance to win 15 daily prizes (we’re giving away a Microsoft Surface Pro on Dec. 17!). Don’t miss out, register now: https://lp.auvik.com/nifty-gifty/?utm_campaign=L-O-PTNR-U-All-NG2021_DigitalShadows&amp;utm_source=DigitalShadowsSubscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Stefano alongside Chris and Dani bring you the latest in threat intelligence. This episode they cover: * NICKEL’s campaign targets Latin America and Europe* What on earth is Quantum computing and why should we pay attention to it* A cyberattack has paralyzed a UK supermarket infrastructure; would you consider that critical infrastructure?Check out the latest Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-10th-dec***Resources from this week’s podcast***2021: An APAC Cybersecurity Odysseyhttps://www.digitalshadows.com/blog-and-research/2021-an-apac-cyber-security-odyssey/ Latin American Financial Services and Cybercrimehttps://www.digitalshadows.com/blog-and-research/latin-american-financial-services-sunny-climes-and-cybercrimes/Outside the Perimeter: The New Digital Risk Landscapehttps://www.digitalshadows.com/blog-and-research/outside-the-perimeter-the-new-digital-risk-landscape/ ALSO: Don’t forget to sign up for Nifty Gifty 2021 for a chance to win 15 daily prizes (we’re giving away a Microsoft Surface Pro on Dec. 17!). Don’t miss out, register now: https://lp.auvik.com/nifty-gifty/?utm_campaign=L-O-PTNR-U-All-NG2021_DigitalShadows&amp;utm_source=DigitalShadowsSubscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461125-weekly-nickel-targets-latam-and-europe-quantum-computing-and-uk-cyberattack.mp3" length="22313624" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/brn3i2pmkyxpbk4wqgt4dm326wi0?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1175550661</guid>
    <pubDate>Fri, 10 Dec 2021 11:04:10 -0500</pubDate>
    <itunes:duration>1858</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: IKEA Hack, Sabbath Ransomware Group, Proofpoint Rich Text Format and More!</itunes:title>
    <title>Weekly: IKEA Hack, Sabbath Ransomware Group, Proofpoint Rich Text Format and More!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Sean, Alec and Ivan, bring you the latest in threat intelligence. This week they cover: - The rise of Sabbath ransomware group - IKEA email hack- Proofpoint finds the Rich Text Format still delivers]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Sean, Alec and Ivan, bring you the latest in threat intelligence. This week they cover: - The rise of Sabbath ransomware group - IKEA email hack- Proofpoint finds the Rich Text Format still delivers]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Sean, Alec and Ivan, bring you the latest in threat intelligence. This week they cover: - The rise of Sabbath ransomware group - IKEA email hack- Proofpoint finds the Rich Text Format still delivers]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461126-weekly-ikea-hack-sabbath-ransomware-group-proofpoint-rich-text-format-and-more.mp3" length="16635424" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/kaqvla4u48b57lus2vyltq060nf4?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1171299796</guid>
    <pubDate>Fri, 03 Dec 2021 09:30:27 -0500</pubDate>
    <itunes:duration>1384</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: GoDaddy Breach, MosesStaff Political Attacks, and Conti Orchestrates Emotet Comeback</itunes:title>
    <title>Weekly: GoDaddy Breach, MosesStaff Political Attacks, and Conti Orchestrates Emotet Comeback</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Rory, Dylan and Xue, bring you the latest in threat intelligence. This episode they cover: * Emotet botnet comeback orchestrated by Conti ransomware gang* GoDaddy Breach* MosesStaff conducting politically motivated attacksCheck out the latest Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-26th-nov***Resources from this week’s podcast***Black Friday: Is there a threat actor in. Your shopping car...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Rory, Dylan and Xue, bring you the latest in threat intelligence. This episode they cover: * Emotet botnet comeback orchestrated by Conti ransomware gang* GoDaddy Breach* MosesStaff conducting politically motivated attacksCheck out the latest Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-26th-nov***Resources from this week’s podcast***Black Friday: Is there a threat actor in. Your shopping cart?https://www.digitalshadows.com/blog-and-research/black-friday-is-there-a-threat-actor-in-your-shopping-cart/The Patching Nightmarehttps://www.digitalshadows.com/blog-and-research/the-patching-nightmare/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Rory, Dylan and Xue, bring you the latest in threat intelligence. This episode they cover: * Emotet botnet comeback orchestrated by Conti ransomware gang* GoDaddy Breach* MosesStaff conducting politically motivated attacksCheck out the latest Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-26th-nov***Resources from this week’s podcast***Black Friday: Is there a threat actor in. Your shopping cart?https://www.digitalshadows.com/blog-and-research/black-friday-is-there-a-threat-actor-in-your-shopping-cart/The Patching Nightmarehttps://www.digitalshadows.com/blog-and-research/the-patching-nightmare/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461127-weekly-godaddy-breach-mosesstaff-political-attacks-and-conti-orchestrates-emotet-comeback.mp3" length="23134634" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/xhkb3y7heo15khosb5ct82y4reli?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1167252688</guid>
    <pubDate>Fri, 26 Nov 2021 09:53:29 -0500</pubDate>
    <itunes:duration>1926</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Exploit-as-a-Service, Emotet’s Return, and FBI Fake Email Campaign</itunes:title>
    <title>Weekly: Exploit-as-a-Service, Emotet’s Return, and FBI Fake Email Campaign</title>
    <itunes:summary><![CDATA[ShadowTalk host Stefano alongside Saul, Kim and Xue, bring you the latest in threat intelligence. This episode they cover: * Vulnerability Intelligence: Exploit-as-a-Service* Emotet’s return* FBI fake emails campaign***Resources from this week’s podcast***NEW! Vulnerability Intelligence Reporthttps://resources.digitalshadows.com/whitepapers-and-reports/vulnerability-intelligence-do-you-know-where-your-flaws-are?utm_source=blog&amp;utm_medium=website&amp;utm_campaign=vulnerability-reportEmotet...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Stefano alongside Saul, Kim and Xue, bring you the latest in threat intelligence. This episode they cover: * Vulnerability Intelligence: Exploit-as-a-Service* Emotet’s return* FBI fake emails campaign***Resources from this week’s podcast***NEW! Vulnerability Intelligence Reporthttps://resources.digitalshadows.com/whitepapers-and-reports/vulnerability-intelligence-do-you-know-where-your-flaws-are?utm_source=blog&amp;utm_medium=website&amp;utm_campaign=vulnerability-reportEmotet is Back Againhttps://www.digitalshadows.com/blog-and-research/emotet-is-back-again-what-does-it-mean/Vulnerability Intelligence: What’s the Word in Dark Web Forumshttps://www.digitalshadows.com/blog-and-research/vulnerability-intelligence-whats-the-word-in-dark-web-forums/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Stefano alongside Saul, Kim and Xue, bring you the latest in threat intelligence. This episode they cover: * Vulnerability Intelligence: Exploit-as-a-Service* Emotet’s return* FBI fake emails campaign***Resources from this week’s podcast***NEW! Vulnerability Intelligence Reporthttps://resources.digitalshadows.com/whitepapers-and-reports/vulnerability-intelligence-do-you-know-where-your-flaws-are?utm_source=blog&amp;utm_medium=website&amp;utm_campaign=vulnerability-reportEmotet is Back Againhttps://www.digitalshadows.com/blog-and-research/emotet-is-back-again-what-does-it-mean/Vulnerability Intelligence: What’s the Word in Dark Web Forumshttps://www.digitalshadows.com/blog-and-research/vulnerability-intelligence-whats-the-word-in-dark-web-forums/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461128-weekly-exploit-as-a-service-emotet-s-return-and-fbi-fake-email-campaign.mp3" length="26021338" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5uj5reh8npd1z1tqn7f0bd4xsmt2?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1163157340</guid>
    <pubDate>Fri, 19 Nov 2021 10:53:21 -0500</pubDate>
    <itunes:duration>2166</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: NCSAM Takeaways and Key Resources</itunes:title>
    <title>Special: NCSAM Takeaways and Key Resources</title>
    <itunes:summary><![CDATA[ShadowTalk host Chris alongside Kim and Xue are covering the key takeaways from this year’s NCSAM and share several best-practice pieces released by the security experts at Digital Shadows throughout the month including: * Managing Your Digital Shadow* Phight the Phish * Putting Cybersecurity First***Resources from this week’s podcast***Managing Your Digital Shadow:https://www.digitalshadows.com/blog-and-research/cybersecurity-awareness-month-week-1-managing-your-digital-shadow/ Phight t...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Chris alongside Kim and Xue are covering the key takeaways from this year’s NCSAM and share several best-practice pieces released by the security experts at Digital Shadows throughout the month including: * Managing Your Digital Shadow* Phight the Phish * Putting Cybersecurity First***Resources from this week’s podcast***Managing Your Digital Shadow:https://www.digitalshadows.com/blog-and-research/cybersecurity-awareness-month-week-1-managing-your-digital-shadow/ Phight the Phish:https://www.digitalshadows.com/blog-and-research/week-2-ncsam-fight-the-phish/ Explore, Experience, Share: https://www.digitalshadows.com/blog-and-research/cybersecurity-awareness-month-week-3-explore-experience-share/ Putting Cybersecurity First: https://www.digitalshadows.com/blog-and-research/cybersecurity-awareness-month-cybersecurity-first/ ENISA 2021 Threat Landscape: Initial Thoughtshttps://www.digitalshadows.com/blog-and-research/enisa-2021-threat-landscape/IABs in Q3 2021: https://www.digitalshadows.com/blog-and-research/initial-access-brokers-in-q3-2021/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Chris alongside Kim and Xue are covering the key takeaways from this year’s NCSAM and share several best-practice pieces released by the security experts at Digital Shadows throughout the month including: * Managing Your Digital Shadow* Phight the Phish * Putting Cybersecurity First***Resources from this week’s podcast***Managing Your Digital Shadow:https://www.digitalshadows.com/blog-and-research/cybersecurity-awareness-month-week-1-managing-your-digital-shadow/ Phight the Phish:https://www.digitalshadows.com/blog-and-research/week-2-ncsam-fight-the-phish/ Explore, Experience, Share: https://www.digitalshadows.com/blog-and-research/cybersecurity-awareness-month-week-3-explore-experience-share/ Putting Cybersecurity First: https://www.digitalshadows.com/blog-and-research/cybersecurity-awareness-month-cybersecurity-first/ ENISA 2021 Threat Landscape: Initial Thoughtshttps://www.digitalshadows.com/blog-and-research/enisa-2021-threat-landscape/IABs in Q3 2021: https://www.digitalshadows.com/blog-and-research/initial-access-brokers-in-q3-2021/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461129-special-ncsam-takeaways-and-key-resources.mp3" length="27659779" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/fr27aasbw8k1bhwdzyjvg06kes4f?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1160431402</guid>
    <pubDate>Mon, 15 Nov 2021 10:35:43 -0500</pubDate>
    <itunes:duration>2303</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Robinhood data leak, NSO in US Appeals Court and Iranian-linked hackers target ISPs</itunes:title>
    <title>Weekly: Robinhood data leak, NSO in US Appeals Court and Iranian-linked hackers target ISPs</title>
    <itunes:summary><![CDATA[ShadowTalk host Sean alongside Austin and Ivan bring you the latest in threat intelligence. This week they cover:* NSO gets dunked on in US appeals court* Iranian-linked hackers go after ISPs and telcos across MENA  * Robinhood leaks data for 7 million customers***Resources from this week’s podcast***What We’re Reading This Month: https://www.digitalshadows.com/blog-and-research/what-were-reading-this-month-nov-2021/The dangers of fake blockchains: https://www.digitalshadows.com/blo...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Sean alongside Austin and Ivan bring you the latest in threat intelligence. This week they cover:* NSO gets dunked on in US appeals court* Iranian-linked hackers go after ISPs and telcos across MENA  * Robinhood leaks data for 7 million customers***Resources from this week’s podcast***What We’re Reading This Month: https://www.digitalshadows.com/blog-and-research/what-were-reading-this-month-nov-2021/The dangers of fake blockchains: https://www.digitalshadows.com/blog-and-research/vulnerable-smart-contracts-and-fake-blockchains-what-investors-need-to-know/What is Vulnerability Intelligence?https://www.digitalshadows.com/blog-and-research/what-is-vulnerability-intelligence/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Sean alongside Austin and Ivan bring you the latest in threat intelligence. This week they cover:* NSO gets dunked on in US appeals court* Iranian-linked hackers go after ISPs and telcos across MENA  * Robinhood leaks data for 7 million customers***Resources from this week’s podcast***What We’re Reading This Month: https://www.digitalshadows.com/blog-and-research/what-were-reading-this-month-nov-2021/The dangers of fake blockchains: https://www.digitalshadows.com/blog-and-research/vulnerable-smart-contracts-and-fake-blockchains-what-investors-need-to-know/What is Vulnerability Intelligence?https://www.digitalshadows.com/blog-and-research/what-is-vulnerability-intelligence/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com - if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461130-weekly-robinhood-data-leak-nso-in-us-appeals-court-and-iranian-linked-hackers-target-isps.mp3" length="12884179" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/jvyweyj40x3o5t6zge8ppnhaub5b?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1158783412</guid>
    <pubDate>Fri, 12 Nov 2021 06:45:31 -0500</pubDate>
    <itunes:duration>1071</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: NRA under the gun, Groove hoax, and Conti gulf apology</itunes:title>
    <title>Weekly: NRA under the gun, Groove hoax, and Conti gulf apology</title>
    <itunes:summary><![CDATA[ShadowTalk host Sean alongside Ivan and Austin bring you the latest in threat intelligence. This week they cover:* Grief gets NRA under the gun  * Is Groove a hoax?* Conti apologizes to the Gulf &amp; FBI warns against inside data used to target victims***Resources from this week’s podcast***Splunk’s Threat Research Team delivers detections based on CISA’s top exploited vulns list: https://www.splunk.com/en_us/blog/security/cisa-s-known-exploited-vulnerabilities-catalog-and-splunk.html C...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Sean alongside Ivan and Austin bring you the latest in threat intelligence. This week they cover:* Grief gets NRA under the gun  * Is Groove a hoax?* Conti apologizes to the Gulf &amp; FBI warns against inside data used to target victims***Resources from this week’s podcast***Splunk’s Threat Research Team delivers detections based on CISA’s top exploited vulns list: https://www.splunk.com/en_us/blog/security/cisa-s-known-exploited-vulnerabilities-catalog-and-splunk.html CISA bulletin: https://www.cisa.gov/known-exploited-vulnerabilities-catalog ENISA 2021 Threat Landscape blog: https://www.digitalshadows.com/blog-and-research/enisa-2021-threat-landscape/ Managing your external attack surface with Searchlight: https://www.digitalshadows.com/blog-and-research/managing-your-external-attack-surface-with-searchlight/ Q3 IAB blog: https://www.digitalshadows.com/blog-and-research/initial-access-brokers-in-q3-2021/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Sean alongside Ivan and Austin bring you the latest in threat intelligence. This week they cover:* Grief gets NRA under the gun  * Is Groove a hoax?* Conti apologizes to the Gulf &amp; FBI warns against inside data used to target victims***Resources from this week’s podcast***Splunk’s Threat Research Team delivers detections based on CISA’s top exploited vulns list: https://www.splunk.com/en_us/blog/security/cisa-s-known-exploited-vulnerabilities-catalog-and-splunk.html CISA bulletin: https://www.cisa.gov/known-exploited-vulnerabilities-catalog ENISA 2021 Threat Landscape blog: https://www.digitalshadows.com/blog-and-research/enisa-2021-threat-landscape/ Managing your external attack surface with Searchlight: https://www.digitalshadows.com/blog-and-research/managing-your-external-attack-surface-with-searchlight/ Q3 IAB blog: https://www.digitalshadows.com/blog-and-research/initial-access-brokers-in-q3-2021/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461131-weekly-nra-under-the-gun-groove-hoax-and-conti-gulf-apology.mp3" length="17358897" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/xbfsxotnq5678jcsvbac2ocmixk7?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1154590705</guid>
    <pubDate>Fri, 05 Nov 2021 14:59:57 -0400</pubDate>
    <itunes:duration>1444</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: NOBELIUM is back, Ransomware Decryptors and Employers, and Spooky Halloween Tales</itunes:title>
    <title>Weekly: NOBELIUM is back, Ransomware Decryptors and Employers, and Spooky Halloween Tales</title>
    <itunes:summary><![CDATA[ShadowTalk host Stefano alongside Adam, Kim, Rory, and Dylan bring you the latest in threat intelligence. This week they cover:* NOBELIUM targets Global IT Supply Chain again* A tale of Ransomware Employers and Decryptors * Spooky Halloween tales * PLUS we say goodbye to one of the podcast favs ***Resources from this week’s podcast***NCASM: Cybersecurity First https://www.digitalshadows.com/blog-and-research/cybersecurity-awareness-month-cybersecurity-first/ Subscribe to our threat intel...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Stefano alongside Adam, Kim, Rory, and Dylan bring you the latest in threat intelligence. This week they cover:* NOBELIUM targets Global IT Supply Chain again* A tale of Ransomware Employers and Decryptors * Spooky Halloween tales * PLUS we say goodbye to one of the podcast favs ***Resources from this week’s podcast***NCASM: Cybersecurity First https://www.digitalshadows.com/blog-and-research/cybersecurity-awareness-month-cybersecurity-first/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Stefano alongside Adam, Kim, Rory, and Dylan bring you the latest in threat intelligence. This week they cover:* NOBELIUM targets Global IT Supply Chain again* A tale of Ransomware Employers and Decryptors * Spooky Halloween tales * PLUS we say goodbye to one of the podcast favs ***Resources from this week’s podcast***NCASM: Cybersecurity First https://www.digitalshadows.com/blog-and-research/cybersecurity-awareness-month-cybersecurity-first/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461132-weekly-nobelium-is-back-ransomware-decryptors-and-employers-and-spooky-halloween-tales.mp3" length="36736999" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/pvg7mycidrae5mcps0gw6o8b61yh?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1150311304</guid>
    <pubDate>Fri, 29 Oct 2021 12:03:08 -0400</pubDate>
    <itunes:duration>3060</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: REvil Rep Death, Ransomware Trends, and BlackMatter Advisory</itunes:title>
    <title>Weekly: REvil Rep Death, Ransomware Trends, and BlackMatter Advisory</title>
    <itunes:summary><![CDATA[Weekly: REvil Rep Death, Ransomware Trends, and BlackMatter Advisory ShadowTalk host Sean alongside Austin and Ivan bring you the latest in threat intelligence. This week they cover:* REvil rep death* Q3 Ransomware trends* BlackMatter CISA advisory***Resources from this week’s podcast***REvil Domain Hackedhttps://www.digitalshadows.com/blog-and-research/revil-domains-hijacked/ CISA Alertshttps://us-cert.cisa.gov/ncas/alerts/aa21-291a Subscribe to our threat intelligence email: https://in...]]></itunes:summary>
    <description><![CDATA[Weekly: REvil Rep Death, Ransomware Trends, and BlackMatter Advisory ShadowTalk host Sean alongside Austin and Ivan bring you the latest in threat intelligence. This week they cover:* REvil rep death* Q3 Ransomware trends* BlackMatter CISA advisory***Resources from this week’s podcast***REvil Domain Hackedhttps://www.digitalshadows.com/blog-and-research/revil-domains-hijacked/ CISA Alertshttps://us-cert.cisa.gov/ncas/alerts/aa21-291a Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[Weekly: REvil Rep Death, Ransomware Trends, and BlackMatter Advisory ShadowTalk host Sean alongside Austin and Ivan bring you the latest in threat intelligence. This week they cover:* REvil rep death* Q3 Ransomware trends* BlackMatter CISA advisory***Resources from this week’s podcast***REvil Domain Hackedhttps://www.digitalshadows.com/blog-and-research/revil-domains-hijacked/ CISA Alertshttps://us-cert.cisa.gov/ncas/alerts/aa21-291a Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461133-weekly-revil-rep-death-ransomware-trends-and-blackmatter-advisory.mp3" length="18167344" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/q2esa1x8cyd0nd6vf4anqqh8x1hc?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1146171598</guid>
    <pubDate>Fri, 22 Oct 2021 11:16:56 -0400</pubDate>
    <itunes:duration>1512</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: FIN12 targets healthcare, Google Phishing, and Pentagon Official Resigns</itunes:title>
    <title>Weekly: FIN12 targets healthcare, Google Phishing, and Pentagon Official Resigns</title>
    <itunes:summary><![CDATA[ShadowTalk host Stefano alongside Adam, Kim, and Chris bring you the latest in threat intelligence. This week they cover:* FIN12 targets healthcare sector and make extensive use of IAB* Google alerts 14,000 users about being targets of APT phishing campaign* APT41 use COVID-19 lures in latest phishing attacks* US Official resign over US-Chinese AI &amp; cybersecurity differenceCheck out our latest Weekly Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/we...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Stefano alongside Adam, Kim, and Chris bring you the latest in threat intelligence. This week they cover:* FIN12 targets healthcare sector and make extensive use of IAB* Google alerts 14,000 users about being targets of APT phishing campaign* APT41 use COVID-19 lures in latest phishing attacks* US Official resign over US-Chinese AI &amp; cybersecurity differenceCheck out our latest Weekly Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-15th-oct***Resources from this week’s podcast***NCSAM Week 2: Fight the Phishhttps://www.digitalshadows.com/blog-and-research/week-2-ncsam-fight-the-phish/Strategic Treat Intelligence and You: What Does It All Mean?https://www.digitalshadows.com/blog-and-research/strategic-threat-intelligence-and-you-what-does-it-all-mean/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Stefano alongside Adam, Kim, and Chris bring you the latest in threat intelligence. This week they cover:* FIN12 targets healthcare sector and make extensive use of IAB* Google alerts 14,000 users about being targets of APT phishing campaign* APT41 use COVID-19 lures in latest phishing attacks* US Official resign over US-Chinese AI &amp; cybersecurity differenceCheck out our latest Weekly Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-15th-oct***Resources from this week’s podcast***NCSAM Week 2: Fight the Phishhttps://www.digitalshadows.com/blog-and-research/week-2-ncsam-fight-the-phish/Strategic Treat Intelligence and You: What Does It All Mean?https://www.digitalshadows.com/blog-and-research/strategic-threat-intelligence-and-you-what-does-it-all-mean/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461134-weekly-fin12-targets-healthcare-google-phishing-and-pentagon-official-resigns.mp3" length="36016942" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/jz4vy3f4xwl07x07sx4as1ist9vr?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1142413642</guid>
    <pubDate>Fri, 15 Oct 2021 12:13:36 -0400</pubDate>
    <itunes:duration>3000</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Twitch Hack, Facebook blackout, and Pandora Papers</itunes:title>
    <title>Weekly: Twitch Hack, Facebook blackout, and Pandora Papers</title>
    <itunes:summary><![CDATA[ShadowTalk host Sean alongside Rick, Ivan, and Austin bring you the latest in threat intelligence. This week they cover:Twitch hacked! Facebook takes a day offRansomware roundup - revelations from REvil, LockBit, and Conti Pandora Papers releasedCheck out our latest Weekly Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-8th-oct***Resources from this week’s podcast***Kick off Cyber Security Awareness Month with our latest blog ...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Sean alongside Rick, Ivan, and Austin bring you the latest in threat intelligence. This week they cover:Twitch hacked! Facebook takes a day offRansomware roundup - revelations from REvil, LockBit, and Conti Pandora Papers releasedCheck out our latest Weekly Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-8th-oct***Resources from this week’s podcast***Kick off Cyber Security Awareness Month with our latest blog - Protecting Your Own Digital Shadowhttps://www.digitalshadows.com/blog-and-research/cybersecurity-awareness-month-week-1-managing-your-digital-shadow/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Sean alongside Rick, Ivan, and Austin bring you the latest in threat intelligence. This week they cover:Twitch hacked! Facebook takes a day offRansomware roundup - revelations from REvil, LockBit, and Conti Pandora Papers releasedCheck out our latest Weekly Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-8th-oct***Resources from this week’s podcast***Kick off Cyber Security Awareness Month with our latest blog - Protecting Your Own Digital Shadowhttps://www.digitalshadows.com/blog-and-research/cybersecurity-awareness-month-week-1-managing-your-digital-shadow/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461135-weekly-twitch-hack-facebook-blackout-and-pandora-papers.mp3" length="19769153" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/rm0fay695yd8of852m3yjb9c7065?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1138426774</guid>
    <pubDate>Fri, 08 Oct 2021 12:04:37 -0400</pubDate>
    <itunes:duration>1646</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: NOBELIUM Malware, BEC scheme, and EU Condemns Russian Cyberactivity</itunes:title>
    <title>Weekly: NOBELIUM Malware, BEC scheme, and EU Condemns Russian Cyberactivity</title>
    <itunes:summary><![CDATA[ShadowTalk host Adam alongside Kim, and Saul bring you the latest in threat intelligence. This week they cover:* Newly detected NOBELIUM malware creates persistent backdoor* Four individuals charged with wide-ranging BEC scheme* EU condemns Russian cyber activity ahead of electionsCheck out our latest Weekly Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-1st-oct***Resources from this week’s podcast***[Digital Shadows Blog]Wha...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Adam alongside Kim, and Saul bring you the latest in threat intelligence. This week they cover:* Newly detected NOBELIUM malware creates persistent backdoor* Four individuals charged with wide-ranging BEC scheme* EU condemns Russian cyber activity ahead of electionsCheck out our latest Weekly Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-1st-oct***Resources from this week’s podcast***[Digital Shadows Blog]What We’re Reading This Month[Digital Shadows Blog]Tactical Threat Intelligence and YouSubscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Adam alongside Kim, and Saul bring you the latest in threat intelligence. This week they cover:* Newly detected NOBELIUM malware creates persistent backdoor* Four individuals charged with wide-ranging BEC scheme* EU condemns Russian cyber activity ahead of electionsCheck out our latest Weekly Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-1st-oct***Resources from this week’s podcast***[Digital Shadows Blog]What We’re Reading This Month[Digital Shadows Blog]Tactical Threat Intelligence and YouSubscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461136-weekly-nobelium-malware-bec-scheme-and-eu-condemns-russian-cyberactivity.mp3" length="20869151" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/gg9kcyv0edzme7euqkjaijr0sfr4?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1134514414</guid>
    <pubDate>Fri, 01 Oct 2021 15:12:01 -0400</pubDate>
    <itunes:duration>1737</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: FBI under fire, Microsoft goes passwordless, and RaidForums</itunes:title>
    <title>Weekly: FBI under fire, Microsoft goes passwordless, and RaidForums</title>
    <itunes:summary><![CDATA[ShadowTalk host Sean alongside Rick, Alec, and Ivan bring you the latest in threat intelligence. This week they cover:* FBI under fire about decryption keys * Microsoft goes passwordless* RaidForums left restricted area openhttps://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-24th-sept***Resources from this week’s podcast***[Digital Shadows Blog]Ukrainian-language Cybercriminal Markets: Do They Still Exist? https://www.digitalshadows.com/blog-and-resear...]]></itunes:summary>
    <description><![CDATA[ShadowTalk host Sean alongside Rick, Alec, and Ivan bring you the latest in threat intelligence. This week they cover:* FBI under fire about decryption keys * Microsoft goes passwordless* RaidForums left restricted area openhttps://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-24th-sept***Resources from this week’s podcast***[Digital Shadows Blog]Ukrainian-language Cybercriminal Markets: Do They Still Exist? https://www.digitalshadows.com/blog-and-research/ukrainian-language-cybercriminal-platforms/ [Digital Shadows Blog]Data Leakage Detection Best Practices: https://www.digitalshadows.com/blog-and-research/data-leakage-detection-best-practices/ [Digital Shadows Blog]Why CISOs Need to Understand IABs: https://www.digitalshadows.com/blog-and-research/why-cisos-and-executives-should-care-about-iabs/[Article]New Malware Attacking South American Organizations: https://thehackernews.com/2021/09/a-new-wave-of-malware-attack-targeting.html  Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk host Sean alongside Rick, Alec, and Ivan bring you the latest in threat intelligence. This week they cover:* FBI under fire about decryption keys * Microsoft goes passwordless* RaidForums left restricted area openhttps://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-24th-sept***Resources from this week’s podcast***[Digital Shadows Blog]Ukrainian-language Cybercriminal Markets: Do They Still Exist? https://www.digitalshadows.com/blog-and-research/ukrainian-language-cybercriminal-platforms/ [Digital Shadows Blog]Data Leakage Detection Best Practices: https://www.digitalshadows.com/blog-and-research/data-leakage-detection-best-practices/ [Digital Shadows Blog]Why CISOs Need to Understand IABs: https://www.digitalshadows.com/blog-and-research/why-cisos-and-executives-should-care-about-iabs/[Article]New Malware Attacking South American Organizations: https://thehackernews.com/2021/09/a-new-wave-of-malware-attack-targeting.html  Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461137-weekly-fbi-under-fire-microsoft-goes-passwordless-and-raidforums.mp3" length="18491469" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ipcdwvvv9ajudsils1fwzsb5sqek?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1133109973</guid>
    <pubDate>Wed, 29 Sep 2021 12:18:45 -0400</pubDate>
    <itunes:duration>1539</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Dr. Tom Robinson - Threats to Crypto and Tracking Ransomware with Blockchain Analytics</itunes:title>
    <title>Special: Dr. Tom Robinson - Threats to Crypto and Tracking Ransomware with Blockchain Analytics</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Sean Nikkel and CISO, Rick Holland sit down with Dr. Tom Robinson, Chief Scientist and Co-Founder of Elliptic. They cover:* Dr. Robinson’s early days as a physicist before getting into the world of cybersecurity* Cyberthreats to Bitcoin and the Cryptocurrency landscape* Tracking Ransomware with Blockchain Analytics ***Resources from this week’s podcast***[Blog] Liquid Exchange Hack https://www.elliptic.co/blog/liquid-exchange-hacked-94-million-stolen[Blog] Cybercriminals Buil...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Sean Nikkel and CISO, Rick Holland sit down with Dr. Tom Robinson, Chief Scientist and Co-Founder of Elliptic. They cover:* Dr. Robinson’s early days as a physicist before getting into the world of cybersecurity* Cyberthreats to Bitcoin and the Cryptocurrency landscape* Tracking Ransomware with Blockchain Analytics ***Resources from this week’s podcast***[Blog] Liquid Exchange Hack https://www.elliptic.co/blog/liquid-exchange-hacked-94-million-stolen[Blog] Cybercriminals Build Blockchain Analytics Toolhttps://www.elliptic.co/blog/cybercriminals-have-built-their-own-blockchain-analytics-tool [Blog] $600M In Cyrpto Stolenhttps://www.elliptic.co/blog/the-poly-network-hack-600-million-in-crypto-stolen-and-returned-in-24-hours [Webinar] Tracking Ransomware with Blockchain Analyticshttps://www.elliptic.co/webinars-events/tracking-ransomware-with-blockchain-analytics  Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes. Be sure to follow Dr. Tom Robinson on Twitter @tomrobin!]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Sean Nikkel and CISO, Rick Holland sit down with Dr. Tom Robinson, Chief Scientist and Co-Founder of Elliptic. They cover:* Dr. Robinson’s early days as a physicist before getting into the world of cybersecurity* Cyberthreats to Bitcoin and the Cryptocurrency landscape* Tracking Ransomware with Blockchain Analytics ***Resources from this week’s podcast***[Blog] Liquid Exchange Hack https://www.elliptic.co/blog/liquid-exchange-hacked-94-million-stolen[Blog] Cybercriminals Build Blockchain Analytics Toolhttps://www.elliptic.co/blog/cybercriminals-have-built-their-own-blockchain-analytics-tool [Blog] $600M In Cyrpto Stolenhttps://www.elliptic.co/blog/the-poly-network-hack-600-million-in-crypto-stolen-and-returned-in-24-hours [Webinar] Tracking Ransomware with Blockchain Analyticshttps://www.elliptic.co/webinars-events/tracking-ransomware-with-blockchain-analytics  Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes. Be sure to follow Dr. Tom Robinson on Twitter @tomrobin!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461138-special-dr-tom-robinson-threats-to-crypto-and-tracking-ransomware-with-blockchain-analytics.mp3" length="29633795" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/nodhb5coaxe6i37ux9bz3iaw41gy?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1120428964</guid>
    <pubDate>Tue, 14 Sep 2021 20:00:00 -0400</pubDate>
    <itunes:duration>2468</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Mozi arrest, Fortinet credentials, and Splunk PowerShell Release</itunes:title>
    <title>Weekly: Mozi arrest, Fortinet credentials, and Splunk PowerShell Release</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Sean, Rick, Ivan, and Austin bring you the latest in threat intelligence. This week they cover:* Mozi botnet operators arrested in China, &gt;1.5M devices since 2019* Groove gang releases creds of comp’d Fortinet appliances, ~500k * Splunk releases new PowerShell analytics for threat hunters, includes support for SOAR responsesGet this week's Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-10th-september*...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Sean, Rick, Ivan, and Austin bring you the latest in threat intelligence. This week they cover:* Mozi botnet operators arrested in China, &gt;1.5M devices since 2019* Groove gang releases creds of comp’d Fortinet appliances, ~500k * Splunk releases new PowerShell analytics for threat hunters, includes support for SOAR responsesGet this week&apos;s Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-10th-september***Resources from this week’s podcast***Microsoft Advisory  https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444 CISA Advisoryhttps://twitter.com/USCERT_gov/status/1435342618704191491 [Blog] Splunk’s PowerShell Analytics https://www.splunk.com/en_us/blog/security/powershell-detections-threat-research-release-august-2021.html [Digital Shadows Blogs]The Neverending Ransomware Storyhttps://www.digitalshadows.com/blog-and-research/the-never-ending-ransomware-story/ Preventing Ransomwarehttps://www.digitalshadows.com/blog-and-research/preventing-ransomware-preventing-the-300-at-thermopylae/ Ransomware and Threat Intelhttps://www.digitalshadows.com/blog-and-research/protecting-against-ransomware-what-role-does-threat-intelligence-play/ What We’re Reading this Month https://www.digitalshadows.com/blog-and-research/what-were-reading-this-month-august-2021/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Sean, Rick, Ivan, and Austin bring you the latest in threat intelligence. This week they cover:* Mozi botnet operators arrested in China, &gt;1.5M devices since 2019* Groove gang releases creds of comp’d Fortinet appliances, ~500k * Splunk releases new PowerShell analytics for threat hunters, includes support for SOAR responsesGet this week&apos;s Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-10th-september***Resources from this week’s podcast***Microsoft Advisory  https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444 CISA Advisoryhttps://twitter.com/USCERT_gov/status/1435342618704191491 [Blog] Splunk’s PowerShell Analytics https://www.splunk.com/en_us/blog/security/powershell-detections-threat-research-release-august-2021.html [Digital Shadows Blogs]The Neverending Ransomware Storyhttps://www.digitalshadows.com/blog-and-research/the-never-ending-ransomware-story/ Preventing Ransomwarehttps://www.digitalshadows.com/blog-and-research/preventing-ransomware-preventing-the-300-at-thermopylae/ Ransomware and Threat Intelhttps://www.digitalshadows.com/blog-and-research/protecting-against-ransomware-what-role-does-threat-intelligence-play/ What We’re Reading this Month https://www.digitalshadows.com/blog-and-research/what-were-reading-this-month-august-2021/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461139-weekly-mozi-arrest-fortinet-credentials-and-splunk-powershell-release.mp3" length="12775052" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/zqmb95q1dcnt5mmyv0ea43xums89?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1122373852</guid>
    <pubDate>Fri, 10 Sep 2021 11:16:08 -0400</pubDate>
    <itunes:duration>1063</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: ProxyToken and Lockfile, AlphaBay’s Comeback</itunes:title>
    <title>Weekly: ProxyToken and Lockfile, AlphaBay’s Comeback</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Stefano, Chris, Kim, and Adam bring you the latest in threat intelligence. This week they cover:* The greatest comeback since Ronaldo rejoined UTD* ProxyToken and Lockfile* AlphaBay’s comeback***Resources from this week’s podcast***Social Media Monitoring Solutions Guidehttps://resources.digitalshadows.com/whitepapers-and-reports/social-media-monitoring-solutions-guideThe Never-ending Ransomware Storyhttps://www.digitalshadows.com/blog-and-research/the-never-ending-ransomware...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Stefano, Chris, Kim, and Adam bring you the latest in threat intelligence. This week they cover:* The greatest comeback since Ronaldo rejoined UTD* ProxyToken and Lockfile* AlphaBay’s comeback***Resources from this week’s podcast***Social Media Monitoring Solutions Guidehttps://resources.digitalshadows.com/whitepapers-and-reports/social-media-monitoring-solutions-guideThe Never-ending Ransomware Storyhttps://www.digitalshadows.com/blog-and-research/the-never-ending-ransomware-story/LockFile Intermittent Encryption and Evasionhttps://news.sophos.com/en-us/2021/08/27/lockfile-ransomwares-box-of-tricks-intermittent-encryption-and-evasion/ProxyToken Lets Hackers Steal User Emailhttps://www.bleepingcomputer.com/news/security/microsoft-exchange-proxytoken-bug-can-let-hackers-steal-user-email/AlphaBay Rebootshttps://threatpost.com/rogue-marketplace-alphabay-reboots/168648/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Stefano, Chris, Kim, and Adam bring you the latest in threat intelligence. This week they cover:* The greatest comeback since Ronaldo rejoined UTD* ProxyToken and Lockfile* AlphaBay’s comeback***Resources from this week’s podcast***Social Media Monitoring Solutions Guidehttps://resources.digitalshadows.com/whitepapers-and-reports/social-media-monitoring-solutions-guideThe Never-ending Ransomware Storyhttps://www.digitalshadows.com/blog-and-research/the-never-ending-ransomware-story/LockFile Intermittent Encryption and Evasionhttps://news.sophos.com/en-us/2021/08/27/lockfile-ransomwares-box-of-tricks-intermittent-encryption-and-evasion/ProxyToken Lets Hackers Steal User Emailhttps://www.bleepingcomputer.com/news/security/microsoft-exchange-proxytoken-bug-can-let-hackers-steal-user-email/AlphaBay Rebootshttps://threatpost.com/rogue-marketplace-alphabay-reboots/168648/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461140-weekly-proxytoken-and-lockfile-alphabay-s-comeback.mp3" length="29665056" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/3c8oob73087z0gc1rfo4xfyjo9av?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1118294551</guid>
    <pubDate>Fri, 03 Sep 2021 13:41:15 -0400</pubDate>
    <itunes:duration>2470</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: #tbt Throwback Thursday Edition</itunes:title>
    <title>Weekly: #tbt Throwback Thursday Edition</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Sean, Ivan, Alec, and Rick Holland bring you the latest in threat intelligence. This week they cover:- Botnets are still the hotness - Mirai is growing again and Mozi’s made new moves- ShinyHunters are back!- Hacktivists take on governmentsGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-august-27***Resources from this week’s podcast***ShinyHuntershttps://www.digitalshadows.com/blog-and-resea...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Sean, Ivan, Alec, and Rick Holland bring you the latest in threat intelligence. This week they cover:- Botnets are still the hotness - Mirai is growing again and Mozi’s made new moves- ShinyHunters are back!- Hacktivists take on governmentsGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-august-27***Resources from this week’s podcast***ShinyHuntershttps://www.digitalshadows.com/blog-and-research/the-eeveelution-of-shinyhunters-from-data-leaks-to-extortions/ Criminals weaponize social mediahttps://www.digitalshadows.com/blog-and-research/how-cybercriminals-weaponize-social-media/ Reverse scamshttps://www.digitalshadows.com/blog-and-research/no-honor-among-thieves-scamming-the-scammers/ Mirai &amp; Mozi: https://www.microsoft.com/security/blog/2021/08/19/how-to-proactively-defend-against-mozi-iot-botnet/ https://securingsam.com/realtek-vulnerabilities-weaponized/ https://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities/ https://www.digitalshadows.com/blog-and-research/you-should-consider-forecasts-not-predictions/ HactivistsIran: https://zetter.substack.com/p/hackers-leak-surveillance-camera https://research.checkpoint.com/2021/indra-hackers-behind-recent-attacks-on-iran/ Belarus: https://www.bloomberg.com/news/articles/2021-08-24/belarus-hackers-seek-to-overthrow-local-government https://www.technologyreview.com/2021/08/26/1033205/belarus-cyber-partisans-lukashenko-hack-opposition/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Sean, Ivan, Alec, and Rick Holland bring you the latest in threat intelligence. This week they cover:- Botnets are still the hotness - Mirai is growing again and Mozi’s made new moves- ShinyHunters are back!- Hacktivists take on governmentsGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-august-27***Resources from this week’s podcast***ShinyHuntershttps://www.digitalshadows.com/blog-and-research/the-eeveelution-of-shinyhunters-from-data-leaks-to-extortions/ Criminals weaponize social mediahttps://www.digitalshadows.com/blog-and-research/how-cybercriminals-weaponize-social-media/ Reverse scamshttps://www.digitalshadows.com/blog-and-research/no-honor-among-thieves-scamming-the-scammers/ Mirai &amp; Mozi: https://www.microsoft.com/security/blog/2021/08/19/how-to-proactively-defend-against-mozi-iot-botnet/ https://securingsam.com/realtek-vulnerabilities-weaponized/ https://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities/ https://www.digitalshadows.com/blog-and-research/you-should-consider-forecasts-not-predictions/ HactivistsIran: https://zetter.substack.com/p/hackers-leak-surveillance-camera https://research.checkpoint.com/2021/indra-hackers-behind-recent-attacks-on-iran/ Belarus: https://www.bloomberg.com/news/articles/2021-08-24/belarus-hackers-seek-to-overthrow-local-government https://www.technologyreview.com/2021/08/26/1033205/belarus-cyber-partisans-lukashenko-hack-opposition/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461141-weekly-tbt-throwback-thursday-edition.mp3" length="21226252" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/c3p4ftyh7mp4gwr8z7sj4xbnn1dw?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1114077799</guid>
    <pubDate>Fri, 27 Aug 2021 11:45:27 -0400</pubDate>
    <itunes:duration>1767</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Prometheus, Ransomware Updates, and Microsoft Morse Code</itunes:title>
    <title>Weekly: Prometheus, Ransomware Updates, and Microsoft Morse Code</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Adam, Chris, and Kim bring you the latest in threat intelligence. This week they cover:- Malicious use of TDS and the newly reported Prometheus TDS- Ransomware updates: Synack release decryption key and Vice Society targets PrintNightmare- The Microsoft phishing campaign that utilized morse code as an encryption mechanism Get this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-august-20***Resources ...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Adam, Chris, and Kim bring you the latest in threat intelligence. This week they cover:- Malicious use of TDS and the newly reported Prometheus TDS- Ransomware updates: Synack release decryption key and Vice Society targets PrintNightmare- The Microsoft phishing campaign that utilized morse code as an encryption mechanism Get this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-august-20***Resources from this week’s podcast***The Phight Against Phishing: https://www.digitalshadows.com/blog-and-research/the-phight-against-phishing/Leveraging Digital Shadows Premium Services: https://www.digitalshadows.com/blog-and-research/leveraging-digital-shadows-premium-services/ Prometheus TDS: https://blog.group-ib.com/prometheus-tdsSync Ransomware Releases Decryption Keys: https://www.bleepingcomputer.com/news/security/synack-ransomware-releases-decryption-keys-after-el-cometa-rebrand/PrintNightmare Attacks: https://www.bleepingcomputer.com/news/security/vice-society-ransomware-joins-ongoing-printnightmare-attacks/Microsoft Attackers Use Morse Code: https://www.microsoft.com/security/blog/2021/08/12/attackers-use-morse-code-other-encryption-methods-in-evasive-phishing-campaign/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Adam, Chris, and Kim bring you the latest in threat intelligence. This week they cover:- Malicious use of TDS and the newly reported Prometheus TDS- Ransomware updates: Synack release decryption key and Vice Society targets PrintNightmare- The Microsoft phishing campaign that utilized morse code as an encryption mechanism Get this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-august-20***Resources from this week’s podcast***The Phight Against Phishing: https://www.digitalshadows.com/blog-and-research/the-phight-against-phishing/Leveraging Digital Shadows Premium Services: https://www.digitalshadows.com/blog-and-research/leveraging-digital-shadows-premium-services/ Prometheus TDS: https://blog.group-ib.com/prometheus-tdsSync Ransomware Releases Decryption Keys: https://www.bleepingcomputer.com/news/security/synack-ransomware-releases-decryption-keys-after-el-cometa-rebrand/PrintNightmare Attacks: https://www.bleepingcomputer.com/news/security/vice-society-ransomware-joins-ongoing-printnightmare-attacks/Microsoft Attackers Use Morse Code: https://www.microsoft.com/security/blog/2021/08/12/attackers-use-morse-code-other-encryption-methods-in-evasive-phishing-campaign/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461142-weekly-prometheus-ransomware-updates-and-microsoft-morse-code.mp3" length="24997834" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/lxd4uo254linqa1l3teu9v7peiq0?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1109630494</guid>
    <pubDate>Fri, 20 Aug 2021 11:59:45 -0400</pubDate>
    <itunes:duration>2081</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Phishing Site Targets Scammers, China Pulls False Flag in Israel, $600 Million Crypto Hack</itunes:title>
    <title>Weekly: Phishing Site Targets Scammers, China Pulls False Flag in Israel, $600 Million Crypto Hack</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Sean, Ivan, Charles, and CISO Rick Holland bring you the latest in threat intelligence. This week they cover:- CISO Rick Holland touches on the latest news on AlphaBay - could the forum be back? - The team chat about LockBit’s big hit on Accenture- Charles runs through Krebs Security run-in with a scammer who had been targeted by a phishing site for BriansClub- Ivan talks about the Chinese espionage group that pulled a false flag to Iran and Israel - Sean delves into the late...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Sean, Ivan, Charles, and CISO Rick Holland bring you the latest in threat intelligence. This week they cover:- CISO Rick Holland touches on the latest news on AlphaBay - could the forum be back? - The team chat about LockBit’s big hit on Accenture- Charles runs through Krebs Security run-in with a scammer who had been targeted by a phishing site for BriansClub- Ivan talks about the Chinese espionage group that pulled a false flag to Iran and Israel - Sean delves into the latest news on the $600 Million crypto hackGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-13th-august***Resources from this week’s podcast***The State of APTs in 2021https://www.digitalshadows.com/blog-and-research/the-nation-state-of-apts-in-2021/ Understanding Smishing Attackshttps://www.digitalshadows.com/blog-and-research/understanding-smishing-attacks/ Krebs Security Run-in with Scammed Scammer https://krebsonsecurity.com/2021/08/phishing-sites-targeting-scammers-and-thieves/Chinese Espionage Campaign in Israel https://www.fireeye.com/blog/threat-research/2021/08/unc215-chinese-espionage-campaign-in-israel.html$600 Million Crypto Hack https://www.bleepingcomputer.com/news/security/over-600-million-reportedly-stolen-in-cryptocurrency-hack/Other Resources:  https://www.bbc.com/news/business-58180692]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Sean, Ivan, Charles, and CISO Rick Holland bring you the latest in threat intelligence. This week they cover:- CISO Rick Holland touches on the latest news on AlphaBay - could the forum be back? - The team chat about LockBit’s big hit on Accenture- Charles runs through Krebs Security run-in with a scammer who had been targeted by a phishing site for BriansClub- Ivan talks about the Chinese espionage group that pulled a false flag to Iran and Israel - Sean delves into the latest news on the $600 Million crypto hackGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-13th-august***Resources from this week’s podcast***The State of APTs in 2021https://www.digitalshadows.com/blog-and-research/the-nation-state-of-apts-in-2021/ Understanding Smishing Attackshttps://www.digitalshadows.com/blog-and-research/understanding-smishing-attacks/ Krebs Security Run-in with Scammed Scammer https://krebsonsecurity.com/2021/08/phishing-sites-targeting-scammers-and-thieves/Chinese Espionage Campaign in Israel https://www.fireeye.com/blog/threat-research/2021/08/unc215-chinese-espionage-campaign-in-israel.html$600 Million Crypto Hack https://www.bleepingcomputer.com/news/security/over-600-million-reportedly-stolen-in-cryptocurrency-hack/Other Resources:  https://www.bbc.com/news/business-58180692]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461143-weekly-phishing-site-targets-scammers-china-pulls-false-flag-in-israel-600-million-crypto-hack.mp3" length="21167282" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ara36yn5db1yj8gcyri00suc4nqu?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1105405153</guid>
    <pubDate>Fri, 13 Aug 2021 11:23:44 -0400</pubDate>
    <itunes:duration>1762</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Wiper Malware Targets Tokyo Olympics, MeteorExpress Attack, PwnedPiper, Hopper and More!</itunes:title>
    <title>Weekly: Wiper Malware Targets Tokyo Olympics, MeteorExpress Attack, PwnedPiper, Hopper and More!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Adam, Dylan and Kim bring you the latest in threat intelligence. This week they cover:- Recent Wiper malware targeting the 2020 Tokyo Olympics - Dylan dives into the MeteorExpress attack, which targeted Iranian transport systems - Kim runs through PwnedPiper vulnerabilities that impact pneumatic tube systems in hospitals - could this lead to a ransomware attack? - Adam and the team discuss a new machine learning security tool called Hopper, which is used to detect lateral mov...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Adam, Dylan and Kim bring you the latest in threat intelligence. This week they cover:- Recent Wiper malware targeting the 2020 Tokyo Olympics - Dylan dives into the MeteorExpress attack, which targeted Iranian transport systems - Kim runs through PwnedPiper vulnerabilities that impact pneumatic tube systems in hospitals - could this lead to a ransomware attack? - Adam and the team discuss a new machine learning security tool called Hopper, which is used to detect lateral movement - before discussing the future of machine learning and AI in cyber security- Plus, the team answers some of your questions!Get this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-6th-august***Resources from this week’s podcast***IAB Q2 roundup https://www.digitalshadows.com/blog-and-research/initial-access-brokers-in-q2-2021/ Supply chain attacks in 2021 https://www.digitalshadows.com/blog-and-research/supply-chain-attacks-in-2021/ MeteorExpress Attackhttps://www.mbsd.jp/research/20210721/blog/ https://labs.sentinelone.com/meteorexpress-mysterious-wiper-paralyzes-iranian-trains-with-epic-troll/PwnedPiperhttps://threatpost.com/pwnedpiper-bugs-hospital-pneumatics/168277/ https://arxiv.org/abs/2105.13442Hopper Security Toolhttps://latesthackingnews.com/2021/08/02/hopper-the-security-tool-that-protects-enterprises-from-lateral-network-movement/Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Adam, Dylan and Kim bring you the latest in threat intelligence. This week they cover:- Recent Wiper malware targeting the 2020 Tokyo Olympics - Dylan dives into the MeteorExpress attack, which targeted Iranian transport systems - Kim runs through PwnedPiper vulnerabilities that impact pneumatic tube systems in hospitals - could this lead to a ransomware attack? - Adam and the team discuss a new machine learning security tool called Hopper, which is used to detect lateral movement - before discussing the future of machine learning and AI in cyber security- Plus, the team answers some of your questions!Get this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-6th-august***Resources from this week’s podcast***IAB Q2 roundup https://www.digitalshadows.com/blog-and-research/initial-access-brokers-in-q2-2021/ Supply chain attacks in 2021 https://www.digitalshadows.com/blog-and-research/supply-chain-attacks-in-2021/ MeteorExpress Attackhttps://www.mbsd.jp/research/20210721/blog/ https://labs.sentinelone.com/meteorexpress-mysterious-wiper-paralyzes-iranian-trains-with-epic-troll/PwnedPiperhttps://threatpost.com/pwnedpiper-bugs-hospital-pneumatics/168277/ https://arxiv.org/abs/2105.13442Hopper Security Toolhttps://latesthackingnews.com/2021/08/02/hopper-the-security-tool-that-protects-enterprises-from-lateral-network-movement/Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461144-weekly-wiper-malware-targets-tokyo-olympics-meteorexpress-attack-pwnedpiper-hopper-and-more.mp3" length="35206440" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/wm4emgnwmnkgilnso85dt829sv49?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1101343579</guid>
    <pubDate>Fri, 06 Aug 2021 10:51:13 -0400</pubDate>
    <itunes:duration>2932</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: CISA guidelines, Q2 Ransomware roundup, and PunkSpider’s back!</itunes:title>
    <title>Weekly: CISA guidelines, Q2 Ransomware roundup, and PunkSpider’s back!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Sean, Alec, Rick, and Ivan bring you the latest in threat intelligence. This week they cover:- CISA guidelines on frequently exploited vulnerabilities- Q2 Ransomware roundup/BlackMatter &amp; Haron (new darkside/revil and avaddon), REvil ACH- With PunkSpider back, what are the implications of using this tech?Get this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-30th-july***Resources from this week...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Sean, Alec, Rick, and Ivan bring you the latest in threat intelligence. This week they cover:- CISA guidelines on frequently exploited vulnerabilities- Q2 Ransomware roundup/BlackMatter &amp; Haron (new darkside/revil and avaddon), REvil ACH- With PunkSpider back, what are the implications of using this tech?Get this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-30th-july***Resources from this week’s podcast***Domain monitoring solution guide: https://www.digitalshadows.com/blog-and-research/getting-started-with-domain-monitoring-part-3-remediation/REvil: Analysis of Competing Hypotheses: https://www.digitalshadows.com/blog-and-research/revil-analysis-of-competing-hypotheses/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Sean, Alec, Rick, and Ivan bring you the latest in threat intelligence. This week they cover:- CISA guidelines on frequently exploited vulnerabilities- Q2 Ransomware roundup/BlackMatter &amp; Haron (new darkside/revil and avaddon), REvil ACH- With PunkSpider back, what are the implications of using this tech?Get this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-30th-july***Resources from this week’s podcast***Domain monitoring solution guide: https://www.digitalshadows.com/blog-and-research/getting-started-with-domain-monitoring-part-3-remediation/REvil: Analysis of Competing Hypotheses: https://www.digitalshadows.com/blog-and-research/revil-analysis-of-competing-hypotheses/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461145-weekly-cisa-guidelines-q2-ransomware-roundup-and-punkspider-s-back.mp3" length="20233425" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/mgp4ejf5yb113hehtcncpky6um2t?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1097156017</guid>
    <pubDate>Fri, 30 Jul 2021 12:31:58 -0400</pubDate>
    <itunes:duration>1684</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Microsoft Exchange attribution, NSO Spyware, Zero-days, and Clippy</itunes:title>
    <title>Weekly: Microsoft Exchange attribution, NSO Spyware, Zero-days, and Clippy</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Stefano, Saul, Rory, and Kim bring you the latest in threat intelligence. This week they cover:- Microsoft Exchange server attach attributed to China- At least 180 journalists have been selected as targets by clients of the cybersurveillance company NSO Group- Zero-day exploits in 2021- Tor gets an update***Resources from this week’s podcast**** 2021 Ransomware Roll Up - https://www.digitalshadows.com/blog-and-research/q2-2021-ransomware-roll-up/* Blog: Cyber threats to Tokyo...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Stefano, Saul, Rory, and Kim bring you the latest in threat intelligence. This week they cover:- Microsoft Exchange server attach attributed to China- At least 180 journalists have been selected as targets by clients of the cybersurveillance company NSO Group- Zero-day exploits in 2021- Tor gets an update***Resources from this week’s podcast**** 2021 Ransomware Roll Up - https://www.digitalshadows.com/blog-and-research/q2-2021-ransomware-roll-up/* Blog: Cyber threats to Tokyo 2020 - https://www.digitalshadows.com/blog-and-research/cyber-threats-to-the-tokyo-2020-olympic-games/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Stefano, Saul, Rory, and Kim bring you the latest in threat intelligence. This week they cover:- Microsoft Exchange server attach attributed to China- At least 180 journalists have been selected as targets by clients of the cybersurveillance company NSO Group- Zero-day exploits in 2021- Tor gets an update***Resources from this week’s podcast**** 2021 Ransomware Roll Up - https://www.digitalshadows.com/blog-and-research/q2-2021-ransomware-roll-up/* Blog: Cyber threats to Tokyo 2020 - https://www.digitalshadows.com/blog-and-research/cyber-threats-to-the-tokyo-2020-olympic-games/Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.htmlAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com- if you have any questions, comments, or suggestions for the next episodes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461146-weekly-microsoft-exchange-attribution-nso-spyware-zero-days-and-clippy.mp3" length="36299993" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/y55w6xsfd9rmgzqpz3uay3iwsya6?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1092817189</guid>
    <pubDate>Fri, 23 Jul 2021 10:33:57 -0400</pubDate>
    <itunes:duration>3023</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Bryson Bort, Cyber Gandalf and MORE!</itunes:title>
    <title>Special: Bryson Bort, Cyber Gandalf and MORE!</title>
    <itunes:summary><![CDATA[Digital Shadow’s CISO Rick Holland and Senior Cyber Threat Intel Analyst Sean Nikkel host this special edition of ShadowTalk. They are joined by special guest CEO and Founder at SCYTHE, Bryson Bort.]]></itunes:summary>
    <description><![CDATA[Digital Shadow’s CISO Rick Holland and Senior Cyber Threat Intel Analyst Sean Nikkel host this special edition of ShadowTalk. They are joined by special guest CEO and Founder at SCYTHE, Bryson Bort.]]></description>
    <content:encoded><![CDATA[Digital Shadow’s CISO Rick Holland and Senior Cyber Threat Intel Analyst Sean Nikkel host this special edition of ShadowTalk. They are joined by special guest CEO and Founder at SCYTHE, Bryson Bort.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461147-special-bryson-bort-cyber-gandalf-and-more.mp3" length="35307491" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/wtoo91oeg8nev8ohgdf5rsf922hm?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1088111944</guid>
    <pubDate>Thu, 15 Jul 2021 12:55:25 -0400</pubDate>
    <itunes:duration>2940</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Kaseya Attack Updates, Fancy Lazarus, and Spyware on Google Play</itunes:title>
    <title>Weekly: Kaseya Attack Updates, Fancy Lazarus, and Spyware on Google Play</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Stefano, Dylan, Adam, and Xue, bring you the latest in threat intelligence. This week they cover:- Xue takes us through the Kaseya ransomware supply-chain attack -REvil’s involvement and “Happy Blog” - Adam discusses a new threat group, Fancy Lazarus - where did they come from and what are their methods?- Dylan dives into malicious spyware apps found on Google Play that steal Facebook users’ logins and passwords - what we know so far - Plus, Adam’s malware name of the week an...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Stefano, Dylan, Adam, and Xue, bring you the latest in threat intelligence. This week they cover:- Xue takes us through the Kaseya ransomware supply-chain attack -REvil’s involvement and “Happy Blog” - Adam discusses a new threat group, Fancy Lazarus - where did they come from and what are their methods?- Dylan dives into malicious spyware apps found on Google Play that steal Facebook users’ logins and passwords - what we know so far - Plus, Adam’s malware name of the week and more!Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-9th-july ***Resources from this week’s podcast***Fancy Lazarus: https://www.proofpoint.com/uk/blog/threat-insight/ransom-ddos-extortion-actor-fancy-lazarus-returns Spyware Apps: https://news.drweb.com/show/?i=14244&amp;lng=en Kaseya Blog: https://www.digitalshadows.com/blog-and-research/kaseya-ransomware-supply-chain-attack/ Domain Monitoring Part 2 Blog: https://www.digitalshadows.com/blog-and-research/getting-started-with-domain-monitoring-part-2-detection/ Marketo Blog: https://www.digitalshadows.com/blog-and-research/marketo-a-return-to-simple-extortion/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Stefano, Dylan, Adam, and Xue, bring you the latest in threat intelligence. This week they cover:- Xue takes us through the Kaseya ransomware supply-chain attack -REvil’s involvement and “Happy Blog” - Adam discusses a new threat group, Fancy Lazarus - where did they come from and what are their methods?- Dylan dives into malicious spyware apps found on Google Play that steal Facebook users’ logins and passwords - what we know so far - Plus, Adam’s malware name of the week and more!Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-9th-july ***Resources from this week’s podcast***Fancy Lazarus: https://www.proofpoint.com/uk/blog/threat-insight/ransom-ddos-extortion-actor-fancy-lazarus-returns Spyware Apps: https://news.drweb.com/show/?i=14244&amp;lng=en Kaseya Blog: https://www.digitalshadows.com/blog-and-research/kaseya-ransomware-supply-chain-attack/ Domain Monitoring Part 2 Blog: https://www.digitalshadows.com/blog-and-research/getting-started-with-domain-monitoring-part-2-detection/ Marketo Blog: https://www.digitalshadows.com/blog-and-research/marketo-a-return-to-simple-extortion/ Subscribe to our threat intelligence email: https://info.digitalshadows.com/SubscribetoEmail-Podcast_Reg.html Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461148-weekly-kaseya-attack-updates-fancy-lazarus-and-spyware-on-google-play.mp3" length="41501428" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/13mcw2dq31k25iiqkbst0hpjs5qy?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1084594624</guid>
    <pubDate>Fri, 09 Jul 2021 11:08:23 -0400</pubDate>
    <itunes:duration>3457</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: LinkedIn Breach, Marketo Marketplace, Playstation Breach, Western Digital MyBook, Nobelium</itunes:title>
    <title>Weekly: LinkedIn Breach, Marketo Marketplace, Playstation Breach, Western Digital MyBook, Nobelium</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Sean, Ivan and  Digital Shadows CISO, Rick Holland, bring you the latest in threat intelligence. This week they cover:- The team touch on the most recent LinkedIn breach exposing 700 Million user details- Sean and Rick talk about the latest developments of the PrintNightmare incident- Ivan dives into the Marketo data theft marketplace  - What’s the future for this group?- Rick discusses the latest PlayStation 3 console ID’s leak and how it’s different to previous breaches- Wh...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Sean, Ivan and  Digital Shadows CISO, Rick Holland, bring you the latest in threat intelligence. This week they cover:- The team touch on the most recent LinkedIn breach exposing 700 Million user details- Sean and Rick talk about the latest developments of the PrintNightmare incident- Ivan dives into the Marketo data theft marketplace  - What’s the future for this group?- Rick discusses the latest PlayStation 3 console ID’s leak and how it’s different to previous breaches- What we know about the mysterious Western Digital MyBook attack Get this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-2nd-july***Resources from this week’s podcast***What We’re Reading this month: https://www.digitalshadows.com/blog-and-research/what-were-reading-this-month-june-2021/ Why Do Users Get Banned From Cybercriminal Forums https://www.digitalshadows.com/blog-and-research/why-do-users-get-banned-from-cybercriminal-forums/ Typosquatting Protection 101:https://www.digitalshadows.com/blog-and-research/typosquatting-protection-101/ Getting Started with Domain Monitoring: Part 1, Collectionhttps://www.digitalshadows.com/blog-and-research/getting-started-with-domain-monitoring-part-1/ Special guest podcasts:Gert-Jan Bruggink, and presenter at last year’s SANS CTI Summithttps://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk/special-cyber-threat-intel-leader-gert-jan-bruggink-legos-and-more Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Sean, Ivan and  Digital Shadows CISO, Rick Holland, bring you the latest in threat intelligence. This week they cover:- The team touch on the most recent LinkedIn breach exposing 700 Million user details- Sean and Rick talk about the latest developments of the PrintNightmare incident- Ivan dives into the Marketo data theft marketplace  - What’s the future for this group?- Rick discusses the latest PlayStation 3 console ID’s leak and how it’s different to previous breaches- What we know about the mysterious Western Digital MyBook attack Get this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-2nd-july***Resources from this week’s podcast***What We’re Reading this month: https://www.digitalshadows.com/blog-and-research/what-were-reading-this-month-june-2021/ Why Do Users Get Banned From Cybercriminal Forums https://www.digitalshadows.com/blog-and-research/why-do-users-get-banned-from-cybercriminal-forums/ Typosquatting Protection 101:https://www.digitalshadows.com/blog-and-research/typosquatting-protection-101/ Getting Started with Domain Monitoring: Part 1, Collectionhttps://www.digitalshadows.com/blog-and-research/getting-started-with-domain-monitoring-part-1/ Special guest podcasts:Gert-Jan Bruggink, and presenter at last year’s SANS CTI Summithttps://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk/special-cyber-threat-intel-leader-gert-jan-bruggink-legos-and-more Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461149-weekly-linkedin-breach-marketo-marketplace-playstation-breach-western-digital-mybook-nobelium.mp3" length="25929770" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/a3ge810arp0505obtsrbszrcv464?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1080260764</guid>
    <pubDate>Fri, 02 Jul 2021 12:03:14 -0400</pubDate>
    <itunes:duration>2159</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Cyber Threat Intel Leader Gert-Jan Bruggink, legos, and MORE!</itunes:title>
    <title>Special: Cyber Threat Intel Leader Gert-Jan Bruggink, legos, and MORE!</title>
    <itunes:summary><![CDATA[Digital Shadows’ CISO Rick hosts this edition of ShadowTalk. He is joined by special guest Gert-Jan Bruggink. They discuss:●Gert-Jan’s origin story●Legos●Threat intelligence-based pen testing and red-teaming●Writing better threat landscape reports]]></itunes:summary>
    <description><![CDATA[Digital Shadows’ CISO Rick hosts this edition of ShadowTalk. He is joined by special guest Gert-Jan Bruggink. They discuss:●Gert-Jan’s origin story●Legos●Threat intelligence-based pen testing and red-teaming●Writing better threat landscape reports]]></description>
    <content:encoded><![CDATA[Digital Shadows’ CISO Rick hosts this edition of ShadowTalk. He is joined by special guest Gert-Jan Bruggink. They discuss:●Gert-Jan’s origin story●Legos●Threat intelligence-based pen testing and red-teaming●Writing better threat landscape reports]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461150-special-cyber-threat-intel-leader-gert-jan-bruggink-legos-and-more.mp3" length="30387059" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/k7m5rrfg81cvs4ijzmyhqeugp9ut?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1078900552</guid>
    <pubDate>Wed, 30 Jun 2021 11:01:41 -0400</pubDate>
    <itunes:duration>2530</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Google Releases Supply-Chain Framework, New NATO Agreements, and More!</itunes:title>
    <title>Weekly: Google Releases Supply-Chain Framework, New NATO Agreements, and More!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Stefano, Chris, and Kim, bring you the latest in threat intelligence. This week they cover:- Kim dives into Google’s new Supply Chain Attack framework - how will it operate?- Chris discusses South Korea's energy research institute networks being compromised by North Korean threat actors - how did they gain access?- The team talk new NATO agreements that put cybersecurity at the forefrontGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshado...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Stefano, Chris, and Kim, bring you the latest in threat intelligence. This week they cover:- Kim dives into Google’s new Supply Chain Attack framework - how will it operate?- Chris discusses South Korea&apos;s energy research institute networks being compromised by North Korean threat actors - how did they gain access?- The team talk new NATO agreements that put cybersecurity at the forefrontGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-25-june ***Resources from this week’s podcast***Google Supply Chain Attach Framework - https://security.googleblog.com/2021/06/introducing-slsa-end-to-end-framework.html Supply Chain Awareness: https://www.sonatype.com/hubfs/Corporate/Software%20Supply%20Chain/2020/SON_SSSC-Report-2020_final_aug11.pdf South Korea Energy Compromise: https://www.bleepingcomputer.com/news/security/south-koreas-nuclear-research-agency-hacked-using-vpn-flaw/ VPN Attack Study: https://www.helpnetsecurity.com/2021/06/15/vpn-attacks-up/ NATO Agreements: https://www.nytimes.com/2021/06/15/world/europe/biden-putin-cyberweapons.html Intel Requirements Blog: https://www.digitalshadows.com/blog-and-research/lets-talk-about-intel-requirements/ Threat Actors Blog: https://www.digitalshadows.com/blog-and-research/threat-actors-living-off-the-land/Banned From Cybercriminal Forums Blog: https://www.digitalshadows.com/blog-and-research/why-do-users-get-banned-from-cybercriminal-forums/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Stefano, Chris, and Kim, bring you the latest in threat intelligence. This week they cover:- Kim dives into Google’s new Supply Chain Attack framework - how will it operate?- Chris discusses South Korea&apos;s energy research institute networks being compromised by North Korean threat actors - how did they gain access?- The team talk new NATO agreements that put cybersecurity at the forefrontGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-25-june ***Resources from this week’s podcast***Google Supply Chain Attach Framework - https://security.googleblog.com/2021/06/introducing-slsa-end-to-end-framework.html Supply Chain Awareness: https://www.sonatype.com/hubfs/Corporate/Software%20Supply%20Chain/2020/SON_SSSC-Report-2020_final_aug11.pdf South Korea Energy Compromise: https://www.bleepingcomputer.com/news/security/south-koreas-nuclear-research-agency-hacked-using-vpn-flaw/ VPN Attack Study: https://www.helpnetsecurity.com/2021/06/15/vpn-attacks-up/ NATO Agreements: https://www.nytimes.com/2021/06/15/world/europe/biden-putin-cyberweapons.html Intel Requirements Blog: https://www.digitalshadows.com/blog-and-research/lets-talk-about-intel-requirements/ Threat Actors Blog: https://www.digitalshadows.com/blog-and-research/threat-actors-living-off-the-land/Banned From Cybercriminal Forums Blog: https://www.digitalshadows.com/blog-and-research/why-do-users-get-banned-from-cybercriminal-forums/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461151-weekly-google-releases-supply-chain-framework-new-nato-agreements-and-more.mp3" length="21167990" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/kgsa61stx3ehianldm40buxac6kn?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1075853524</guid>
    <pubDate>Fri, 25 Jun 2021 11:24:36 -0400</pubDate>
    <itunes:duration>1762</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Pulsedive Founders Dan and Grace Talk Origins, IOCs, and More</itunes:title>
    <title>Special: Pulsedive Founders Dan and Grace Talk Origins, IOCs, and More</title>
    <itunes:summary><![CDATA[Digital Shadows CISO Rick and Senior Cyber Threat Intel Analyst Sean Nikkel host this edition of ShadowTalk. They're joined by special guests Dan Sherry and Grace Chi, founders of Pulsedive. They discuss:-Dan &amp; Grace's origin stories and how Pulsedive came to be -Grace's LinkedIn “Sides of Cyber” campaign, promoting unknown talents and how they enrich people's lives-IOCs aren't dead - how IOCs can be leveraged as part of a broader program-How to kick the tires on Pulsedive - they even inc...]]></itunes:summary>
    <description><![CDATA[Digital Shadows CISO Rick and Senior Cyber Threat Intel Analyst Sean Nikkel host this edition of ShadowTalk. They&apos;re joined by special guests Dan Sherry and Grace Chi, founders of Pulsedive. They discuss:-Dan &amp; Grace&apos;s origin stories and how Pulsedive came to be -Grace&apos;s LinkedIn “Sides of Cyber” campaign, promoting unknown talents and how they enrich people&apos;s lives-IOCs aren&apos;t dead - how IOCs can be leveraged as part of a broader program-How to kick the tires on Pulsedive - they even include free API access ***Resources from this special podcast***Find Dan on Twitter: https://twitter.com/netbroom Find Dan on LinkedIn: https://www.linkedin.com/in/netbroom/ Find Grace on Twitter: https://twitter.com/euphoricfall Find Grace on LinkedIn: https://www.linkedin.com/in/graceschi/ Company Homepage: https://pulsedive.com/about/]]></description>
    <content:encoded><![CDATA[Digital Shadows CISO Rick and Senior Cyber Threat Intel Analyst Sean Nikkel host this edition of ShadowTalk. They&apos;re joined by special guests Dan Sherry and Grace Chi, founders of Pulsedive. They discuss:-Dan &amp; Grace&apos;s origin stories and how Pulsedive came to be -Grace&apos;s LinkedIn “Sides of Cyber” campaign, promoting unknown talents and how they enrich people&apos;s lives-IOCs aren&apos;t dead - how IOCs can be leveraged as part of a broader program-How to kick the tires on Pulsedive - they even include free API access ***Resources from this special podcast***Find Dan on Twitter: https://twitter.com/netbroom Find Dan on LinkedIn: https://www.linkedin.com/in/netbroom/ Find Grace on Twitter: https://twitter.com/euphoricfall Find Grace on LinkedIn: https://www.linkedin.com/in/graceschi/ Company Homepage: https://pulsedive.com/about/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461152-special-pulsedive-founders-dan-and-grace-talk-origins-iocs-and-more.mp3" length="30979100" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/eyx5qehh64z8gy4dqpsfnhuu759z?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1075020748</guid>
    <pubDate>Thu, 24 Jun 2021 10:42:48 -0400</pubDate>
    <itunes:duration>2580</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: VPN Vulnerabilities, EA Gets Attacked, Plus Clop Deals With Affiliate Arrests</itunes:title>
    <title>Weekly: VPN Vulnerabilities, EA Gets Attacked, Plus Clop Deals With Affiliate Arrests</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Sean, Ivan, and Charles bring you the latest in threat intelligence. This week they cover:- The team discusses the most recent EA breach - what’s the history of attacks against software/game developers?- Charles dives into the latest on VPN vulnerabilities - why does this problem persist? - Ivan talks about Clop arrests - how big of a player is Clop in the world of cyber crime?- Predictions for the ransomware scene in the future - can we expect more intervention by law enforc...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Sean, Ivan, and Charles bring you the latest in threat intelligence. This week they cover:- The team discusses the most recent EA breach - what’s the history of attacks against software/game developers?- Charles dives into the latest on VPN vulnerabilities - why does this problem persist? - Ivan talks about Clop arrests - how big of a player is Clop in the world of cyber crime?- Predictions for the ransomware scene in the future - can we expect more intervention by law enforcement? Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-18-june ***Resources from this week’s podcast***EA Breach: https://www.vice.com/en/article/7kvkqb/how-ea-games-was-hacked-slack https://www.vice.com/en/article/wx5xpx/hackers-steal-data-electronic-arts-ea-fifa-source-code VPN Vulnerabilities: https://apnews.com/article/government-and-politics-hacking-technology-business-7350235e07d46ba5afc1238b553ea4b9 Clop arrests: https://krebsonsecurity.com/2021/06/ukrainian-police-nab-six-tied-to-clop-ransomware/#more-55973 Euro 2020 blog - https://www.digitalshadows.com/blog-and-research/cyber-threats-to-the-uefa-euro-2020-championship/ Let’s Talk About Intel Requirements blog - https://www.digitalshadows.com/blog-and-research/lets-talk-about-intel-requirements/ Dark Web Monitoring Blog https://www.digitalshadows.com/blog-and-research/lets-talk-about-intel-requirements/   Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Sean, Ivan, and Charles bring you the latest in threat intelligence. This week they cover:- The team discusses the most recent EA breach - what’s the history of attacks against software/game developers?- Charles dives into the latest on VPN vulnerabilities - why does this problem persist? - Ivan talks about Clop arrests - how big of a player is Clop in the world of cyber crime?- Predictions for the ransomware scene in the future - can we expect more intervention by law enforcement? Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-18-june ***Resources from this week’s podcast***EA Breach: https://www.vice.com/en/article/7kvkqb/how-ea-games-was-hacked-slack https://www.vice.com/en/article/wx5xpx/hackers-steal-data-electronic-arts-ea-fifa-source-code VPN Vulnerabilities: https://apnews.com/article/government-and-politics-hacking-technology-business-7350235e07d46ba5afc1238b553ea4b9 Clop arrests: https://krebsonsecurity.com/2021/06/ukrainian-police-nab-six-tied-to-clop-ransomware/#more-55973 Euro 2020 blog - https://www.digitalshadows.com/blog-and-research/cyber-threats-to-the-uefa-euro-2020-championship/ Let’s Talk About Intel Requirements blog - https://www.digitalshadows.com/blog-and-research/lets-talk-about-intel-requirements/ Dark Web Monitoring Blog https://www.digitalshadows.com/blog-and-research/lets-talk-about-intel-requirements/   Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461153-weekly-vpn-vulnerabilities-ea-gets-attacked-plus-clop-deals-with-affiliate-arrests.mp3" length="15125314" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/6b1alqtxvl6gnozjg6zqey3dzsl5?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1071315769</guid>
    <pubDate>Fri, 18 Jun 2021 10:52:15 -0400</pubDate>
    <itunes:duration>1259</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Anomali’s AJ Nash Talks Origin Story, Building Threat Intel Teams, and More!</itunes:title>
    <title>Special: Anomali’s AJ Nash Talks Origin Story, Building Threat Intel Teams, and More!</title>
    <itunes:summary><![CDATA[Digital Shadows CISO Rick and Senior Cyber Threat Intel Analyst Sean host this guest edition of ShadowTalk. Anomali's Sr. Director of Cyber Intelligence Strategy, AJ Nash, joined them to discuss:- AJ's origin story with the U.S. Air Force  - AJ's lessons from building threat intelligence teams - The need for intelligence leaders to be more strategic and move beyond IOCs and the SOC - AJ's new blog where he proposed the Chief Intelligence Officer (CINO)***Resources from this special podcast***...]]></itunes:summary>
    <description><![CDATA[Digital Shadows CISO Rick and Senior Cyber Threat Intel Analyst Sean host this guest edition of ShadowTalk. Anomali&apos;s Sr. Director of Cyber Intelligence Strategy, AJ Nash, joined them to discuss:- AJ&apos;s origin story with the U.S. Air Force  - AJ&apos;s lessons from building threat intelligence teams - The need for intelligence leaders to be more strategic and move beyond IOCs and the SOC - AJ&apos;s new blog where he proposed the Chief Intelligence Officer (CINO)***Resources from this special podcast***Find AJ on LinkedIn: https://www.linkedin.com/in/nashaj/Rise of the Chief Intelligence Officer (CINO): https://www.anomali.com/blog/rise-of-the-chief-intelligence-officer-cino]]></description>
    <content:encoded><![CDATA[Digital Shadows CISO Rick and Senior Cyber Threat Intel Analyst Sean host this guest edition of ShadowTalk. Anomali&apos;s Sr. Director of Cyber Intelligence Strategy, AJ Nash, joined them to discuss:- AJ&apos;s origin story with the U.S. Air Force  - AJ&apos;s lessons from building threat intelligence teams - The need for intelligence leaders to be more strategic and move beyond IOCs and the SOC - AJ&apos;s new blog where he proposed the Chief Intelligence Officer (CINO)***Resources from this special podcast***Find AJ on LinkedIn: https://www.linkedin.com/in/nashaj/Rise of the Chief Intelligence Officer (CINO): https://www.anomali.com/blog/rise-of-the-chief-intelligence-officer-cino]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461154-special-anomali-s-aj-nash-talks-origin-story-building-threat-intel-teams-and-more.mp3" length="36863556" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/joggfghr64d59c61nwk8fv8glns5?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1069704094</guid>
    <pubDate>Wed, 16 Jun 2021 10:17:14 -0400</pubDate>
    <itunes:duration>3070</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Chinese Cyber Espionage, GitHub Takedowns, and EURO 2020 Predictions</itunes:title>
    <title>Weekly: Chinese Cyber Espionage, GitHub Takedowns, and EURO 2020 Predictions</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Stefano, Adam, Chris, and newcomer, Rory, bring you the latest in threat intelligence. This week they cover:-Adam takes us through the latest cyber espionage campaigns attributed to Chinese-state-sponsored APT groups-Rory discusses a sophisticated law enforcement campaign targeting criminal syndicates all over the world-Chris dives into the new GitHub policies - what led to these new guidelines?-The team talks about updates on the Colonial Pipeline incident - what’s the lates...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Stefano, Adam, Chris, and newcomer, Rory, bring you the latest in threat intelligence. This week they cover:-Adam takes us through the latest cyber espionage campaigns attributed to Chinese-state-sponsored APT groups-Rory discusses a sophisticated law enforcement campaign targeting criminal syndicates all over the world-Chris dives into the new GitHub policies - what led to these new guidelines?-The team talks about updates on the Colonial Pipeline incident - what’s the latest?-Plus, the group makes EURO 2020 predictionsGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-11-june ***Resources from this week’s podcast***SharpPanda/Chinese APT - https://research.checkpoint.com/2021/chinese-apt-group-targets-southeast-asian-government-with-previously-unknown-backdoorLaw Enforcement Op - https://www.bleepingcomputer.com/news/security/fbi-and-afp-created-a-fake-encrypted-chat-platform-to-catch-criminals/ GitHub Takedown Policy: https://www.bleepingcomputer.com/news/security/githubs-new-policies-allow-removal-of-poc-exploits-used-in-attacks Colonial Updates: https://www.theverge.com/2021/6/5/22520297/compromised-password-reportedly-allowed-hackers-colonial-pipeline-cyberattack https://www.justice.gov/opa/pr/department-justice-seizes-23-million-cryptocurrency-paid-ransomware-extortionists-darkside Crypto Blog: https://www.digitalshadows.com/blog-and-research/cryptocurrency-attacks-to-be-aware-of-2021/  Extortion Blog: https://www.digitalshadows.com/blog-and-research/the-business-of-extortion-how-ransomware-makes-money/   Cyber Threats to EURO 2020: https://www.digitalshadows.com/blog-and-research/cyber-threats-to-the-uefa-euro-2020-championship/   Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Stefano, Adam, Chris, and newcomer, Rory, bring you the latest in threat intelligence. This week they cover:-Adam takes us through the latest cyber espionage campaigns attributed to Chinese-state-sponsored APT groups-Rory discusses a sophisticated law enforcement campaign targeting criminal syndicates all over the world-Chris dives into the new GitHub policies - what led to these new guidelines?-The team talks about updates on the Colonial Pipeline incident - what’s the latest?-Plus, the group makes EURO 2020 predictionsGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-11-june ***Resources from this week’s podcast***SharpPanda/Chinese APT - https://research.checkpoint.com/2021/chinese-apt-group-targets-southeast-asian-government-with-previously-unknown-backdoorLaw Enforcement Op - https://www.bleepingcomputer.com/news/security/fbi-and-afp-created-a-fake-encrypted-chat-platform-to-catch-criminals/ GitHub Takedown Policy: https://www.bleepingcomputer.com/news/security/githubs-new-policies-allow-removal-of-poc-exploits-used-in-attacks Colonial Updates: https://www.theverge.com/2021/6/5/22520297/compromised-password-reportedly-allowed-hackers-colonial-pipeline-cyberattack https://www.justice.gov/opa/pr/department-justice-seizes-23-million-cryptocurrency-paid-ransomware-extortionists-darkside Crypto Blog: https://www.digitalshadows.com/blog-and-research/cryptocurrency-attacks-to-be-aware-of-2021/  Extortion Blog: https://www.digitalshadows.com/blog-and-research/the-business-of-extortion-how-ransomware-makes-money/   Cyber Threats to EURO 2020: https://www.digitalshadows.com/blog-and-research/cyber-threats-to-the-uefa-euro-2020-championship/   Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461155-weekly-chinese-cyber-espionage-github-takedowns-and-euro-2020-predictions.mp3" length="40570686" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/29rrknc4ix4iw3ize3l6a8n8tuj9?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1066593196</guid>
    <pubDate>Fri, 11 Jun 2021 10:58:48 -0400</pubDate>
    <itunes:duration>3379</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Nobelium Attacks, VMWare Exploits, and the Biden Administration’s Letter on Ransomware</itunes:title>
    <title>Weekly: Nobelium Attacks, VMWare Exploits, and the Biden Administration’s Letter on Ransomware</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Sean, Alec, Charles, and Digital Shadows CISO, Rick Holland, bring you the latest in threat intelligence. This week they cover:- Alec dives into Nobelium - who are they and what happened in the latest attack?- Charles takes us through VMWare exploits - how does it compare to earlier vulnerabilities?- Rick discusses the Biden Administration’s open letter to business leaders on the state of ransomware - Plus, check out our latest content including thoughts on the 2021 Verizon D...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Sean, Alec, Charles, and Digital Shadows CISO, Rick Holland, bring you the latest in threat intelligence. This week they cover:- Alec dives into Nobelium - who are they and what happened in the latest attack?- Charles takes us through VMWare exploits - how does it compare to earlier vulnerabilities?- Rick discusses the Biden Administration’s open letter to business leaders on the state of ransomware - Plus, check out our latest content including thoughts on the 2021 Verizon DBIRGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-04-june ***Resources from this week’s podcast***Nobelium: https://www.techrepublic.com/article/solarwinds-hackers-resurface-to-attack-government-agencies-and-think-tanks/  VMWare: https://arstechnica.com/gadgets/2021/05/vulnerability-in-vmware-product-has-severity-rating-of-9-8-out-of-10/ https://www.vmware.com/security/advisories/VMSA-2021-0010.html President’s Note on Ransomware Threats: https://www.documentcloud.org/documents/20796934-memo-what-we-urge-you-to-do-to-protect-against-the-threat-of-ransomwareCyber Attacks: The Problem with Attribution and Response Blog: https://www.digitalshadows.com/blog-and-research/cyber-attacks-the-challenge-of-attribution-and-response/ Verizon DBIR Perspective Blog: https://www.digitalshadows.com/blog-and-research/the-top-three-cybercrime-takeaways-from-the-2021-verizon-dbir/ Ransomware and Law Firms Blog: https://www.digitalshadows.com/blog-and-research/ransomware-and-the-legal-services-sector/ Jeff Stone Podcast: https://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk/special-jeff-stone-discusses-his-origin-story-interviewing-cybercriminals-and-more Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Sean, Alec, Charles, and Digital Shadows CISO, Rick Holland, bring you the latest in threat intelligence. This week they cover:- Alec dives into Nobelium - who are they and what happened in the latest attack?- Charles takes us through VMWare exploits - how does it compare to earlier vulnerabilities?- Rick discusses the Biden Administration’s open letter to business leaders on the state of ransomware - Plus, check out our latest content including thoughts on the 2021 Verizon DBIRGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-04-june ***Resources from this week’s podcast***Nobelium: https://www.techrepublic.com/article/solarwinds-hackers-resurface-to-attack-government-agencies-and-think-tanks/  VMWare: https://arstechnica.com/gadgets/2021/05/vulnerability-in-vmware-product-has-severity-rating-of-9-8-out-of-10/ https://www.vmware.com/security/advisories/VMSA-2021-0010.html President’s Note on Ransomware Threats: https://www.documentcloud.org/documents/20796934-memo-what-we-urge-you-to-do-to-protect-against-the-threat-of-ransomwareCyber Attacks: The Problem with Attribution and Response Blog: https://www.digitalshadows.com/blog-and-research/cyber-attacks-the-challenge-of-attribution-and-response/ Verizon DBIR Perspective Blog: https://www.digitalshadows.com/blog-and-research/the-top-three-cybercrime-takeaways-from-the-2021-verizon-dbir/ Ransomware and Law Firms Blog: https://www.digitalshadows.com/blog-and-research/ransomware-and-the-legal-services-sector/ Jeff Stone Podcast: https://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk/special-jeff-stone-discusses-his-origin-story-interviewing-cybercriminals-and-more Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461156-weekly-nobelium-attacks-vmware-exploits-and-the-biden-administration-s-letter-on-ransomware.mp3" length="17280849" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/dbu60whvysqi3hm6lhkqk2h0hwju?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1062002668</guid>
    <pubDate>Fri, 04 Jun 2021 11:14:48 -0400</pubDate>
    <itunes:duration>1438</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: The State of the APAC Cyber Threat Landscape</itunes:title>
    <title>Special: The State of the APAC Cyber Threat Landscape</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Stefano, Adam, and Xue bring you the latest in threat intelligence for the APAC region. They cover:- Xue take us through how the APAC threat landscape has changed in the last 18 months- What are the prominent ransomware and APT groups and what are they up to?- The team discusses how cybersec institutions are using new regulations to offset some traditional challenges- Adam talks about the Tokyo 2020 threat landscape and how it's been shaped by the event postponement due to CO...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Stefano, Adam, and Xue bring you the latest in threat intelligence for the APAC region. They cover:- Xue take us through how the APAC threat landscape has changed in the last 18 months- What are the prominent ransomware and APT groups and what are they up to?- The team discusses how cybersec institutions are using new regulations to offset some traditional challenges- Adam talks about the Tokyo 2020 threat landscape and how it&apos;s been shaped by the event postponement due to COVID-19***Resources from this week’s podcast***State of APAC: https://www.paloaltonetworks.com/blog/2020/03/policy-asia-pacific/ https://techwireasia.com/2019/10/cybersecurity-customer-experience-trust-asia-apac/ https://techwireasia.com/2021/03/apac-is-in-need-for-more-cybersecurity-experts/ https://www.zdnet.com/article/colonial-pipeline-attack-used-to-justify-australias-critical-infrastructure-bill/ https://www.zdnet.com/article/security-crucial-as-5g-connects-more-industries-devices/ https://www.zdnet.com/article/apac-firms-face-growing-cyberattacks-take-more-than-a-week-to-remediate/ Covid-19 and APAC Cyber Security: https://www.computerweekly.com/news/252494801/APAC-firms-grapple-with-cyber-security-amid-pandemicAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Stefano, Adam, and Xue bring you the latest in threat intelligence for the APAC region. They cover:- Xue take us through how the APAC threat landscape has changed in the last 18 months- What are the prominent ransomware and APT groups and what are they up to?- The team discusses how cybersec institutions are using new regulations to offset some traditional challenges- Adam talks about the Tokyo 2020 threat landscape and how it&apos;s been shaped by the event postponement due to COVID-19***Resources from this week’s podcast***State of APAC: https://www.paloaltonetworks.com/blog/2020/03/policy-asia-pacific/ https://techwireasia.com/2019/10/cybersecurity-customer-experience-trust-asia-apac/ https://techwireasia.com/2021/03/apac-is-in-need-for-more-cybersecurity-experts/ https://www.zdnet.com/article/colonial-pipeline-attack-used-to-justify-australias-critical-infrastructure-bill/ https://www.zdnet.com/article/security-crucial-as-5g-connects-more-industries-devices/ https://www.zdnet.com/article/apac-firms-face-growing-cyberattacks-take-more-than-a-week-to-remediate/ Covid-19 and APAC Cyber Security: https://www.computerweekly.com/news/252494801/APAC-firms-grapple-with-cyber-security-amid-pandemicAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461157-special-the-state-of-the-apac-cyber-threat-landscape.mp3" length="37112887" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/kd4qx6vup9113hjhzlys3j5tuvi3?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1061520583</guid>
    <pubDate>Thu, 03 Jun 2021 16:54:45 -0400</pubDate>
    <itunes:duration>3091</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Drug Kingpin Taken Down by Cheese and Ransomware Makes a Comeback</itunes:title>
    <title>Weekly: Drug Kingpin Taken Down by Cheese and Ransomware Makes a Comeback</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Stefano, Adam, Kim, and Dylan bring you the latest in threat intelligence. This week they cover:- Dylan discusses how cheese was the downfall of a drug dealer in the UK and how a cybercriminal messaging forum contributed- Kim talks ransomware - how ransom demands stole the spotlight from supply-chain attacks- Avaddon victims refuse to pay ransom demands - what happened?- Adam dives into politically motivated ransomware Get this week’s intelligence summary at: https://resource...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Stefano, Adam, Kim, and Dylan bring you the latest in threat intelligence. This week they cover:- Dylan discusses how cheese was the downfall of a drug dealer in the UK and how a cybercriminal messaging forum contributed- Kim talks ransomware - how ransom demands stole the spotlight from supply-chain attacks- Avaddon victims refuse to pay ransom demands - what happened?- Adam dives into politically motivated ransomware Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-28-may ***Resources from this week’s podcast***Stilton Incident: https://en.wikipedia.org/wiki/Geronimo_Stilton  https://www.theguardian.com/food/2021/may/24/feeling-blue-drug-dealers-love-of-stilton-leads-to-his-arrest Politically Motivated Ransomware: https://assets.sentinelone.com/sentinellabs/evol-agrius MTNOW: https://blog.malwarebytes.com/cybercrime/malware/2021/05/bizarro-a-banking-trojan-full-of-nasty-tricks/ MTTPOTW: https://attack.mitre.org/techniques/T1568/002/ FUNNIES: https://www.runnersworld.com/runners-stories/a32433537/strava-art/ Cybercriminal Forum Death Blog: https://www.digitalshadows.com/blog-and-research/how-cybercriminal-platforms-meet-their-end/  Intelligence Cycle Blog: https://www.digitalshadows.com/blog-and-research/how-the-intelligence-cycle-can-help-defend-against-ransomware-attack/ What We’re Reading Blog: https://www.digitalshadows.com/blog-and-research/what-were-reading-this-month-may-2021/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Stefano, Adam, Kim, and Dylan bring you the latest in threat intelligence. This week they cover:- Dylan discusses how cheese was the downfall of a drug dealer in the UK and how a cybercriminal messaging forum contributed- Kim talks ransomware - how ransom demands stole the spotlight from supply-chain attacks- Avaddon victims refuse to pay ransom demands - what happened?- Adam dives into politically motivated ransomware Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-28-may ***Resources from this week’s podcast***Stilton Incident: https://en.wikipedia.org/wiki/Geronimo_Stilton  https://www.theguardian.com/food/2021/may/24/feeling-blue-drug-dealers-love-of-stilton-leads-to-his-arrest Politically Motivated Ransomware: https://assets.sentinelone.com/sentinellabs/evol-agrius MTNOW: https://blog.malwarebytes.com/cybercrime/malware/2021/05/bizarro-a-banking-trojan-full-of-nasty-tricks/ MTTPOTW: https://attack.mitre.org/techniques/T1568/002/ FUNNIES: https://www.runnersworld.com/runners-stories/a32433537/strava-art/ Cybercriminal Forum Death Blog: https://www.digitalshadows.com/blog-and-research/how-cybercriminal-platforms-meet-their-end/  Intelligence Cycle Blog: https://www.digitalshadows.com/blog-and-research/how-the-intelligence-cycle-can-help-defend-against-ransomware-attack/ What We’re Reading Blog: https://www.digitalshadows.com/blog-and-research/what-were-reading-this-month-may-2021/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461158-weekly-drug-kingpin-taken-down-by-cheese-and-ransomware-makes-a-comeback.mp3" length="32527497" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/jmpconadh39ljh3wi72ddsb101by?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1057418899</guid>
    <pubDate>Fri, 28 May 2021 11:43:04 -0400</pubDate>
    <itunes:duration>2709</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Jeff Stone Discusses His Origin Story, Interviewing Cybercriminals, and More!</itunes:title>
    <title>Special: Jeff Stone Discusses His Origin Story, Interviewing Cybercriminals, and More!</title>
    <itunes:summary><![CDATA[Digital Shadows CISO Rick hosts this edition of ShadowTalk. He’s joined by special guest and friend Jeff Stone, Editor at CyberScoop News. They discuss: - Jeff's origin story - Parallels between journalism and threat intelligence - How journalists validate sources - Why "It's better to be right than first"- The go-to defense lawyer for Russian and Eastern European cybercriminals- The nuance around interviewing cybercriminals***Resources from this special podcast*** Find Jeff on Twitter: https...]]></itunes:summary>
    <description><![CDATA[Digital Shadows CISO Rick hosts this edition of ShadowTalk. He’s joined by special guest and friend Jeff Stone, Editor at CyberScoop News. They discuss: - Jeff&apos;s origin story - Parallels between journalism and threat intelligence - How journalists validate sources - Why &quot;It&apos;s better to be right than first&quot;- The go-to defense lawyer for Russian and Eastern European cybercriminals- The nuance around interviewing cybercriminals***Resources from this special podcast*** Find Jeff on Twitter: https://twitter.com/jeffstone500 CyberScoop:https://www.cyberscoop.com/ https://twitter.com/CyberScoopNews CyberScoop CyberTalks Virtual Summit https://www.cyberscoop.com/events/cybertalks/ &quot;How Arkady Bukh, a New York-based immigrant from the former Soviet bloc, emerged as the go-to defense lawyer for the cybercrime underworld.&quot;https://www.cyberscoop.com/story/arkady-bukh-man-in-the-middle/]]></description>
    <content:encoded><![CDATA[Digital Shadows CISO Rick hosts this edition of ShadowTalk. He’s joined by special guest and friend Jeff Stone, Editor at CyberScoop News. They discuss: - Jeff&apos;s origin story - Parallels between journalism and threat intelligence - How journalists validate sources - Why &quot;It&apos;s better to be right than first&quot;- The go-to defense lawyer for Russian and Eastern European cybercriminals- The nuance around interviewing cybercriminals***Resources from this special podcast*** Find Jeff on Twitter: https://twitter.com/jeffstone500 CyberScoop:https://www.cyberscoop.com/ https://twitter.com/CyberScoopNews CyberScoop CyberTalks Virtual Summit https://www.cyberscoop.com/events/cybertalks/ &quot;How Arkady Bukh, a New York-based immigrant from the former Soviet bloc, emerged as the go-to defense lawyer for the cybercrime underworld.&quot;https://www.cyberscoop.com/story/arkady-bukh-man-in-the-middle/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461159-special-jeff-stone-discusses-his-origin-story-interviewing-cybercriminals-and-more.mp3" length="32458329" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/49fsp6qw9ghv5mu6lvya03kcuyuu?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1055429971</guid>
    <pubDate>Tue, 25 May 2021 13:25:33 -0400</pubDate>
    <itunes:duration>2703</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Colonial Pipeline Updates, DarkSide Feels the Pressure, and More!</itunes:title>
    <title>Weekly: Colonial Pipeline Updates, DarkSide Feels the Pressure, and More!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Sean, Alec, Ivan, and Charles bring you the latest in threat intelligence. This week they cover:- Ivan takes us through the latest updates on DarkSide and the Colonial Pipeline incident - DarkSide faces consequences  - The team talks about new legislation from the US government - better late than never?- Plus, our hosts dive into all things ransomware - what’s happening with the cyber threat landscape?- Alec brings us the latest on Conti ransomware targeting Ireland's Departm...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Sean, Alec, Ivan, and Charles bring you the latest in threat intelligence. This week they cover:- Ivan takes us through the latest updates on DarkSide and the Colonial Pipeline incident - DarkSide faces consequences  - The team talks about new legislation from the US government - better late than never?- Plus, our hosts dive into all things ransomware - what’s happening with the cyber threat landscape?- Alec brings us the latest on Conti ransomware targeting Ireland&apos;s Department of Health - what was the impact?- Charles discusses a new web skimmer indicating ongoing Magecart activityGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-21-may ***Resources from this week’s podcast***Colonial Pipeline Updates: https://www.bankinfosecurity.com/2-bills-introduced-in-wake-colonial-pipeline-attack-a-16666 Conti Ransomware: https://www.bleepingcomputer.com/news/security/conti-ransomware-also-targeted-irelands-department-of-health/ PHP Skimmer: https://blog.malwarebytes.com/cybercrime/2021/05/newly-observed-php-based-skimmer-shows-ongoing-magecart-group-12-activity/ Verizon DBIR: https://enterprise.verizon.com/resources/reports/2021-data-breach-investigations-report.pdfAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Sean, Alec, Ivan, and Charles bring you the latest in threat intelligence. This week they cover:- Ivan takes us through the latest updates on DarkSide and the Colonial Pipeline incident - DarkSide faces consequences  - The team talks about new legislation from the US government - better late than never?- Plus, our hosts dive into all things ransomware - what’s happening with the cyber threat landscape?- Alec brings us the latest on Conti ransomware targeting Ireland&apos;s Department of Health - what was the impact?- Charles discusses a new web skimmer indicating ongoing Magecart activityGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-21-may ***Resources from this week’s podcast***Colonial Pipeline Updates: https://www.bankinfosecurity.com/2-bills-introduced-in-wake-colonial-pipeline-attack-a-16666 Conti Ransomware: https://www.bleepingcomputer.com/news/security/conti-ransomware-also-targeted-irelands-department-of-health/ PHP Skimmer: https://blog.malwarebytes.com/cybercrime/2021/05/newly-observed-php-based-skimmer-shows-ongoing-magecart-group-12-activity/ Verizon DBIR: https://enterprise.verizon.com/resources/reports/2021-data-breach-investigations-report.pdfAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461160-weekly-colonial-pipeline-updates-darkside-feels-the-pressure-and-more.mp3" length="21524408" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/mxsrt6y2czlks036dit1x855nfgf?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1052958277</guid>
    <pubDate>Fri, 21 May 2021 11:20:16 -0400</pubDate>
    <itunes:duration>1792</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: The Colonial Pipeline Incident, BEC Gift Card Campaigns, and More!</itunes:title>
    <title>Weekly: The Colonial Pipeline Incident, BEC Gift Card Campaigns, and More!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Stefano, Chris, Kim, and Xue bring you the latest in threat intelligence. This week they cover:- Xue takes us through the Colonial Pipeline ransomware incident - DarkSide’s involvement and more - What does the attack on the Colonial Pipeline indicate for future cyber threats against critical infrastructure?- Chris dives into the BEC incident - what does it mean and what happened? - Kim discusses the Bulletproof Hosting indictment - what is the impact?Get this week’s intellige...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Stefano, Chris, Kim, and Xue bring you the latest in threat intelligence. This week they cover:- Xue takes us through the Colonial Pipeline ransomware incident - DarkSide’s involvement and more - What does the attack on the Colonial Pipeline indicate for future cyber threats against critical infrastructure?- Chris dives into the BEC incident - what does it mean and what happened? - Kim discusses the Bulletproof Hosting indictment - what is the impact?Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-14-may ***Resources from this week’s podcast***Colonial Pipeline: https://www.fbi.gov/news/pressrel/press-releases/fbi-statement-on-compromise-of-colonial-pipeline-networksDarkSide: https://www.digitalshadows.com/blog-and-research/darkside-the-new-ransomware-group-behind-highly-targeted-attacks/ Gift Card Scam: https://www.microsoft.com/security/blog/2021/05/06/business-email-compromise-campaign-targets-wide-range-of-orgs-with-gift-card-scam/ Bulletproof Hosting: https://www.justice.gov/opa/pr/four-individuals-plead-guilty-rico-conspiracy-involving-bulletproof-hosting-cybercriminals Bitcoin Blog: https://www.digitalshadows.com/blog-and-research/bitcoin-and-alternative-cryptos-in-the-cybercriminal-underground/ Colonial Pipeline Blog: https://www.digitalshadows.com/blog-and-research/colonial-pipeline-ransomware-attack/ Vaccine Card Blog: https://www.digitalshadows.com/blog-and-research/how-cybercriminals-can-leverage-your-vaccination-card-selfie/ Mapping MITRE to Wannacry Blog: https://www.digitalshadows.com/blog-and-research/mapping-mitre-attck-to-the-wannacry-campaign/]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Stefano, Chris, Kim, and Xue bring you the latest in threat intelligence. This week they cover:- Xue takes us through the Colonial Pipeline ransomware incident - DarkSide’s involvement and more - What does the attack on the Colonial Pipeline indicate for future cyber threats against critical infrastructure?- Chris dives into the BEC incident - what does it mean and what happened? - Kim discusses the Bulletproof Hosting indictment - what is the impact?Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-14-may ***Resources from this week’s podcast***Colonial Pipeline: https://www.fbi.gov/news/pressrel/press-releases/fbi-statement-on-compromise-of-colonial-pipeline-networksDarkSide: https://www.digitalshadows.com/blog-and-research/darkside-the-new-ransomware-group-behind-highly-targeted-attacks/ Gift Card Scam: https://www.microsoft.com/security/blog/2021/05/06/business-email-compromise-campaign-targets-wide-range-of-orgs-with-gift-card-scam/ Bulletproof Hosting: https://www.justice.gov/opa/pr/four-individuals-plead-guilty-rico-conspiracy-involving-bulletproof-hosting-cybercriminals Bitcoin Blog: https://www.digitalshadows.com/blog-and-research/bitcoin-and-alternative-cryptos-in-the-cybercriminal-underground/ Colonial Pipeline Blog: https://www.digitalshadows.com/blog-and-research/colonial-pipeline-ransomware-attack/ Vaccine Card Blog: https://www.digitalshadows.com/blog-and-research/how-cybercriminals-can-leverage-your-vaccination-card-selfie/ Mapping MITRE to Wannacry Blog: https://www.digitalshadows.com/blog-and-research/mapping-mitre-attck-to-the-wannacry-campaign/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461161-weekly-the-colonial-pipeline-incident-bec-gift-card-campaigns-and-more.mp3" length="33975183" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/vvmqlf4tr52t3ur8k3j7hpmtu5jj?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1048764217</guid>
    <pubDate>Fri, 14 May 2021 11:45:34 -0400</pubDate>
    <itunes:duration>2829</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: David Thejl-Clayton Talks Data Driven Incident Response and Verizon DBIR</itunes:title>
    <title>Special: David Thejl-Clayton Talks Data Driven Incident Response and Verizon DBIR</title>
    <itunes:summary><![CDATA[Digital Shadows CISO Rick hosts this edition of ShadowTalk. He’s joined by special guest David Thejl-Clayton , Senior Advisor in Cyber Defense at Combitech. They discuss: - David talks origin story, his journey through CTI, and his current role at Combitech - His obsession with data driven response and how that data-love came to be- He and Rick reminisce about favorite speakers at SANS- They discuss the Verizon DBIR - what’s to come?- Purple-teaming - how to bring value to organizations throu...]]></itunes:summary>
    <description><![CDATA[Digital Shadows CISO Rick hosts this edition of ShadowTalk. He’s joined by special guest David Thejl-Clayton , Senior Advisor in Cyber Defense at Combitech. They discuss: - David talks origin story, his journey through CTI, and his current role at Combitech - His obsession with data driven response and how that data-love came to be- He and Rick reminisce about favorite speakers at SANS- They discuss the Verizon DBIR - what’s to come?- Purple-teaming - how to bring value to organizations through data***Resources from this week’s podcast***Find David on Twitter: https://twitter.com/DCSecuritydk Find David on LinkedIn: https://www.linkedin.com/in/davidclayton454/ Data Driven Incident Response: https://www.youtube.com/watch?v=Ll60XUJnRTw SANS CTI Summit - VERISIZE your way into CTI: https://www.youtube.com/watch?v=AwMC6INC5TE https://www.sans.org/blog/a-visual-summary-of-sans-cyber-threat-intelligence-summit/ Vocabulary for Event Recording and Information Sharing (VERIS): http://veriscommunity.net/ 2020 Data Breach Investigations Report: https://enterprise.verizon.com/resources/reports/dbir/]]></description>
    <content:encoded><![CDATA[Digital Shadows CISO Rick hosts this edition of ShadowTalk. He’s joined by special guest David Thejl-Clayton , Senior Advisor in Cyber Defense at Combitech. They discuss: - David talks origin story, his journey through CTI, and his current role at Combitech - His obsession with data driven response and how that data-love came to be- He and Rick reminisce about favorite speakers at SANS- They discuss the Verizon DBIR - what’s to come?- Purple-teaming - how to bring value to organizations through data***Resources from this week’s podcast***Find David on Twitter: https://twitter.com/DCSecuritydk Find David on LinkedIn: https://www.linkedin.com/in/davidclayton454/ Data Driven Incident Response: https://www.youtube.com/watch?v=Ll60XUJnRTw SANS CTI Summit - VERISIZE your way into CTI: https://www.youtube.com/watch?v=AwMC6INC5TE https://www.sans.org/blog/a-visual-summary-of-sans-cyber-threat-intelligence-summit/ Vocabulary for Event Recording and Information Sharing (VERIS): http://veriscommunity.net/ 2020 Data Breach Investigations Report: https://enterprise.verizon.com/resources/reports/dbir/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461162-special-david-thejl-clayton-talks-data-driven-incident-response-and-verizon-dbir.mp3" length="31653330" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/wiyuyz1kctzwm7osebo9q3xd6unw?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1048728832</guid>
    <pubDate>Fri, 14 May 2021 10:34:15 -0400</pubDate>
    <itunes:duration>2636</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: VPN Vulnerabilities, Supply Chain Attacks, and Babuk Says “Bye”!</itunes:title>
    <title>Weekly: VPN Vulnerabilities, Supply Chain Attacks, and Babuk Says “Bye”!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Alec, Ivan, Sean, and Digital Shadows CISO, Rick, bring you the latest in threat intelligence. This week they cover:- Sean discusses Pulse Secure VPN vulnerabilities - what are the latest updates and who is being targeted?- The team talks about supply chain compromise - what is it?- Sean takes us through the DDoS attack on Belnet - Babuk is hanging up their hat - Ivan brings us the latest- Ryuk gets ahold of bio research through a studentGet this week’s intelligence summary a...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Alec, Ivan, Sean, and Digital Shadows CISO, Rick, bring you the latest in threat intelligence. This week they cover:- Sean discusses Pulse Secure VPN vulnerabilities - what are the latest updates and who is being targeted?- The team talks about supply chain compromise - what is it?- Sean takes us through the DDoS attack on Belnet - Babuk is hanging up their hat - Ivan brings us the latest- Ryuk gets ahold of bio research through a studentGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-07-may ***Resources from this week’s podcast***Pulse Secure: https://www.bleepingcomputer.com/news/security/pulse-secure-fixes-vpn-zero-day-used-to-hack-high-value-targets/ Belnet: https://www.zdnet.com/article/this-massive-ddos-attack-took-large-sections-of-a-countrys-internet-offline/ Babuk: https://threatpost.com/babuk-ransomware-gang-mulls-retirement/165742/ Ryuk: https://www.zdnet.com/article/ryuk-ransomware-finds-foothold-in-bio-research-institute-through-a-student-who-wouldnt-pay-for-software/#ftag=RSSbaffb68 The Technology Adoption Lifecycle Of Genesis Market Blog: https://www.digitalshadows.com/blog-and-research/the-technology-adoption-lifecycle-of-genesis-market/ The Top 5 Dark Web Monitoring Use Cases Blog: https://www.digitalshadows.com/blog-and-research/the-top-5-dark-web-monitoring-use-cases/ Password Day Blog: https://www.digitalshadows.com/blog-and-research/creating-security-aware-passwords/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Alec, Ivan, Sean, and Digital Shadows CISO, Rick, bring you the latest in threat intelligence. This week they cover:- Sean discusses Pulse Secure VPN vulnerabilities - what are the latest updates and who is being targeted?- The team talks about supply chain compromise - what is it?- Sean takes us through the DDoS attack on Belnet - Babuk is hanging up their hat - Ivan brings us the latest- Ryuk gets ahold of bio research through a studentGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-07-may ***Resources from this week’s podcast***Pulse Secure: https://www.bleepingcomputer.com/news/security/pulse-secure-fixes-vpn-zero-day-used-to-hack-high-value-targets/ Belnet: https://www.zdnet.com/article/this-massive-ddos-attack-took-large-sections-of-a-countrys-internet-offline/ Babuk: https://threatpost.com/babuk-ransomware-gang-mulls-retirement/165742/ Ryuk: https://www.zdnet.com/article/ryuk-ransomware-finds-foothold-in-bio-research-institute-through-a-student-who-wouldnt-pay-for-software/#ftag=RSSbaffb68 The Technology Adoption Lifecycle Of Genesis Market Blog: https://www.digitalshadows.com/blog-and-research/the-technology-adoption-lifecycle-of-genesis-market/ The Top 5 Dark Web Monitoring Use Cases Blog: https://www.digitalshadows.com/blog-and-research/the-top-5-dark-web-monitoring-use-cases/ Password Day Blog: https://www.digitalshadows.com/blog-and-research/creating-security-aware-passwords/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461163-weekly-vpn-vulnerabilities-supply-chain-attacks-and-babuk-says-bye.mp3" length="24609572" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/jxxbosoef4m2rkbbdboydfoe741o?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1044595300</guid>
    <pubDate>Fri, 07 May 2021 11:10:34 -0400</pubDate>
    <itunes:duration>2049</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Amy Bejtlich Talks Culture of Candor Within Intel Teams and More!</itunes:title>
    <title>Special: Amy Bejtlich Talks Culture of Candor Within Intel Teams and More!</title>
    <itunes:summary><![CDATA[Digital Shadows CISO, Rick, hosts this edition of ShadowTalk. He’s joined by special guest Amy Bejtlich, Director of Intelligence Analysis at Dragos, Inc. They discuss: - Amy’s origin story and journey from traditional intelligence to cyber intelligence- How to "bloom where you are planted" - Her various SANS cyber threat intel presentations- How to build a "culture of candor" within an intel team - Minimizing burnout and supporting the mental health of teams***Resources from this week’s podc...]]></itunes:summary>
    <description><![CDATA[Digital Shadows CISO, Rick, hosts this edition of ShadowTalk. He’s joined by special guest Amy Bejtlich, Director of Intelligence Analysis at Dragos, Inc. They discuss: - Amy’s origin story and journey from traditional intelligence to cyber intelligence- How to &quot;bloom where you are planted&quot; - Her various SANS cyber threat intel presentations- How to build a &quot;culture of candor&quot; within an intel team - Minimizing burnout and supporting the mental health of teams***Resources from this week’s podcast***Find Amy on Twitter: https://twitter.com/_Silent_J Find Amy on LinkedIn: https://www.linkedin.com/in/amybejtlich/ SANS New to Cyber Summit: &quot;Job Role Spotlight - Cyber Threat Intelligence&quot;: https://sansorg.egnyte.com/dl/TjsPnHluNo/? SANS 2019 CTI Summit Video: &quot;Analytic Tradecraft In The Real World&quot;: https://www.youtube.com/watch?v=MWJZsW9HooY SANS 2019 CTI Summit slides: Analytic Tradecraft In The Real World&quot;:  https://sansorg.egnyte.com/dl/MnytUZPcOU/?]]></description>
    <content:encoded><![CDATA[Digital Shadows CISO, Rick, hosts this edition of ShadowTalk. He’s joined by special guest Amy Bejtlich, Director of Intelligence Analysis at Dragos, Inc. They discuss: - Amy’s origin story and journey from traditional intelligence to cyber intelligence- How to &quot;bloom where you are planted&quot; - Her various SANS cyber threat intel presentations- How to build a &quot;culture of candor&quot; within an intel team - Minimizing burnout and supporting the mental health of teams***Resources from this week’s podcast***Find Amy on Twitter: https://twitter.com/_Silent_J Find Amy on LinkedIn: https://www.linkedin.com/in/amybejtlich/ SANS New to Cyber Summit: &quot;Job Role Spotlight - Cyber Threat Intelligence&quot;: https://sansorg.egnyte.com/dl/TjsPnHluNo/? SANS 2019 CTI Summit Video: &quot;Analytic Tradecraft In The Real World&quot;: https://www.youtube.com/watch?v=MWJZsW9HooY SANS 2019 CTI Summit slides: Analytic Tradecraft In The Real World&quot;:  https://sansorg.egnyte.com/dl/MnytUZPcOU/?]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461164-special-amy-bejtlich-talks-culture-of-candor-within-intel-teams-and-more.mp3" length="24112843" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/b94gjeqnfiwbtdozulfiycj8nbak?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1044049102</guid>
    <pubDate>Thu, 06 May 2021 15:53:45 -0400</pubDate>
    <itunes:duration>2007</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: ShadowTalk’s 200th Episode!</itunes:title>
    <title>Special: ShadowTalk’s 200th Episode!</title>
    <itunes:summary><![CDATA[It’s a full house with ShadowTalk hosts Stefano, Alec, Charles, Kim, Dylan, Adam, and Digital Shadows CISO, Rick! The team is looking back at three years of ShadowTalk and taking us on a journey through changes in the threat landscape. They discuss: - Adam and Alec take us through ransomware heavy hitters from the last few years - Big game hunting, double-extortion, and more- The team reminisce about their first time joining ShadowTalk - Kim and Rick tackle supply-chain attacks - looking back...]]></itunes:summary>
    <description><![CDATA[It’s a full house with ShadowTalk hosts Stefano, Alec, Charles, Kim, Dylan, Adam, and Digital Shadows CISO, Rick! The team is looking back at three years of ShadowTalk and taking us on a journey through changes in the threat landscape. They discuss: - Adam and Alec take us through ransomware heavy hitters from the last few years - Big game hunting, double-extortion, and more- The team reminisce about their first time joining ShadowTalk - Kim and Rick tackle supply-chain attacks - looking back at SolarWinds and the role of trust- Most embarrassing moments in ShadowTalk history- Dylan and Charles talk CVE’s - more on opportunistic attackers taking advantage of Covid-19 and remote work- Final thoughts from the team - what would you tell your 2018 self?Check out the video recording of the podcast here: https://resources.digitalshadows.com/digitalshadows/special-shadowtalk-s-200th-episode Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-30-april***Resources from this week’s podcast***Phineas Fisher And The Hacking Team Investigation:https://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk/episode-51-phineas-fisher-and-the-hacking-team-investigationSolarWinds Supply Chain Attack Round-Up:https://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk/weekly-solarwinds-supply-chain-attack-round-upElectricFish Malware Attributed To “Lazarus Group” :https://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk/electricfish-malware-attributed-to-lazarus-groupThreat Report ATT&amp;CK Mapping (TRAM) with MITRE’s Sarah Yoder And Jackie Lasky:https://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk/threat-report-attck-mapping-tram-with-mitre-sarah-yoder-and-jackie-laskyCVE 2019-0708 RDP Vulnerability and GDPR’s Anniversary:https://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk/cve-2019-0708-rdp-vulnerability-and-gdpr-s-anniversaryAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[It’s a full house with ShadowTalk hosts Stefano, Alec, Charles, Kim, Dylan, Adam, and Digital Shadows CISO, Rick! The team is looking back at three years of ShadowTalk and taking us on a journey through changes in the threat landscape. They discuss: - Adam and Alec take us through ransomware heavy hitters from the last few years - Big game hunting, double-extortion, and more- The team reminisce about their first time joining ShadowTalk - Kim and Rick tackle supply-chain attacks - looking back at SolarWinds and the role of trust- Most embarrassing moments in ShadowTalk history- Dylan and Charles talk CVE’s - more on opportunistic attackers taking advantage of Covid-19 and remote work- Final thoughts from the team - what would you tell your 2018 self?Check out the video recording of the podcast here: https://resources.digitalshadows.com/digitalshadows/special-shadowtalk-s-200th-episode Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-30-april***Resources from this week’s podcast***Phineas Fisher And The Hacking Team Investigation:https://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk/episode-51-phineas-fisher-and-the-hacking-team-investigationSolarWinds Supply Chain Attack Round-Up:https://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk/weekly-solarwinds-supply-chain-attack-round-upElectricFish Malware Attributed To “Lazarus Group” :https://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk/electricfish-malware-attributed-to-lazarus-groupThreat Report ATT&amp;CK Mapping (TRAM) with MITRE’s Sarah Yoder And Jackie Lasky:https://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk/threat-report-attck-mapping-tram-with-mitre-sarah-yoder-and-jackie-laskyCVE 2019-0708 RDP Vulnerability and GDPR’s Anniversary:https://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk/cve-2019-0708-rdp-vulnerability-and-gdpr-s-anniversaryAlso, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461165-special-shadowtalk-s-200th-episode.mp3" length="50307197" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8pybmy9xn8e4qpbe8x24gx0ip29v?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1039931761</guid>
    <pubDate>Fri, 30 Apr 2021 09:54:32 -0400</pubDate>
    <itunes:duration>4190</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Supply Chain Attacks Rule The Day, Plus The FBI Takes On Web-Shells</itunes:title>
    <title>Weekly: Supply Chain Attacks Rule The Day, Plus The FBI Takes On Web-Shells</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Alec, Ivan, Charles, and newcomer, Sean, bring you the latest in threat intelligence. This week they cover:- Ivan dives into FBI actions against web-shells from compromised Exchange servers- Codecov supply chain attacks - Charles brings us the latest - The team discuss the Pulse Secure VPN bug - Plus, don’t forget our special 200th episode next week! Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-23-apr...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Alec, Ivan, Charles, and newcomer, Sean, bring you the latest in threat intelligence. This week they cover:- Ivan dives into FBI actions against web-shells from compromised Exchange servers- Codecov supply chain attacks - Charles brings us the latest - The team discuss the Pulse Secure VPN bug - Plus, don’t forget our special 200th episode next week! Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-23-april ***Resources from this week’s podcast***FBI Web Shells: https://www.welivesecurity.com/2021/04/14/fbi-removes-malware-compromised-exchange-servers/Codecov: https://www.bleepingcomputer.com/news/security/hundreds-of-networks-reportedly-hacked-in-codecov-supply-chain-attack/REvil vs. Apple: https://www.bleepingcomputer.com/news/security/revil-gang-tries-to-extort-apple-threatens-to-sell-stolen-blueprints/Pulse Secure VPN: https://www.bleepingcomputer.com/news/security/pulse-secure-vpn-zero-day-used-to-hack-defense-firms-govt-orgs/https://www.bleepingcomputer.com/news/security/cisa-orders-federal-orgs-to-mitigate-pulse-secure-vpn-bug-by-friday/ Q1 Vulnerability Blog: https://www.digitalshadows.com/blog-and-research/q1-vulnerability-roundup/Emotet Shutdown Blog: https://www.digitalshadows.com/blog-and-research/the-emotet-shutdown-explained/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Alec, Ivan, Charles, and newcomer, Sean, bring you the latest in threat intelligence. This week they cover:- Ivan dives into FBI actions against web-shells from compromised Exchange servers- Codecov supply chain attacks - Charles brings us the latest - The team discuss the Pulse Secure VPN bug - Plus, don’t forget our special 200th episode next week! Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-23-april ***Resources from this week’s podcast***FBI Web Shells: https://www.welivesecurity.com/2021/04/14/fbi-removes-malware-compromised-exchange-servers/Codecov: https://www.bleepingcomputer.com/news/security/hundreds-of-networks-reportedly-hacked-in-codecov-supply-chain-attack/REvil vs. Apple: https://www.bleepingcomputer.com/news/security/revil-gang-tries-to-extort-apple-threatens-to-sell-stolen-blueprints/Pulse Secure VPN: https://www.bleepingcomputer.com/news/security/pulse-secure-vpn-zero-day-used-to-hack-defense-firms-govt-orgs/https://www.bleepingcomputer.com/news/security/cisa-orders-federal-orgs-to-mitigate-pulse-secure-vpn-bug-by-friday/ Q1 Vulnerability Blog: https://www.digitalshadows.com/blog-and-research/q1-vulnerability-roundup/Emotet Shutdown Blog: https://www.digitalshadows.com/blog-and-research/the-emotet-shutdown-explained/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461166-weekly-supply-chain-attacks-rule-the-day-plus-the-fbi-takes-on-web-shells.mp3" length="17643788" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/aznceast14qa25ijcs3q68gwj649?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1035333091</guid>
    <pubDate>Fri, 23 Apr 2021 11:17:50 -0400</pubDate>
    <itunes:duration>1468</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Q1 Ransomware Round-Up - Looking Back at Early 2021</itunes:title>
    <title>Weekly: Q1 Ransomware Round-Up - Looking Back at Early 2021</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Stefano, Adam, Kim, and Chris bring you the latest in threat intelligence. This week they cover:- Kim takes us back to SolarWinds, the Centreon breach, the Accellion incident, and the Microsoft Exchange supply chain attack- The team discusses attributing attacks - state sponsored threat actors leverage sophisticated tactics, allowing lower level cybercriminals to ride their coattails - Chris takes the teams through mitigating risks and proxy logon vulnerabilities- How Covid-1...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Stefano, Adam, Kim, and Chris bring you the latest in threat intelligence. This week they cover:- Kim takes us back to SolarWinds, the Centreon breach, the Accellion incident, and the Microsoft Exchange supply chain attack- The team discusses attributing attacks - state sponsored threat actors leverage sophisticated tactics, allowing lower level cybercriminals to ride their coattails - Chris takes the teams through mitigating risks and proxy logon vulnerabilities- How Covid-19 and WFH has affected the threat landscape - VPN vulnerabilities - Advice for security teams - what to prioritize- Adam discusses ransomware trends in Q1 2021- The team touches on law enforcement activity and more! Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/20210416-ds-weekly-intsum-updated ***Resources from this week’s podcast*** Q1 Ransomware Blog: https://www.digitalshadows.com/blog-and-research/q1-ransomware-roundup/ IABs Q1 Blog: https://www.digitalshadows.com/blog-and-research/initial-access-brokers-listings-increasing-in-2021/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Stefano, Adam, Kim, and Chris bring you the latest in threat intelligence. This week they cover:- Kim takes us back to SolarWinds, the Centreon breach, the Accellion incident, and the Microsoft Exchange supply chain attack- The team discusses attributing attacks - state sponsored threat actors leverage sophisticated tactics, allowing lower level cybercriminals to ride their coattails - Chris takes the teams through mitigating risks and proxy logon vulnerabilities- How Covid-19 and WFH has affected the threat landscape - VPN vulnerabilities - Advice for security teams - what to prioritize- Adam discusses ransomware trends in Q1 2021- The team touches on law enforcement activity and more! Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/20210416-ds-weekly-intsum-updated ***Resources from this week’s podcast*** Q1 Ransomware Blog: https://www.digitalshadows.com/blog-and-research/q1-ransomware-roundup/ IABs Q1 Blog: https://www.digitalshadows.com/blog-and-research/initial-access-brokers-listings-increasing-in-2021/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461167-weekly-q1-ransomware-round-up-looking-back-at-early-2021.mp3" length="50916023" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/j1djj6frc6zoodzjzobdig9brx20?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1030993753</guid>
    <pubDate>Fri, 16 Apr 2021 14:37:18 -0400</pubDate>
    <itunes:duration>4241</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Facebook Data Breach, Ransomware Cartel, and More!</itunes:title>
    <title>Weekly: Facebook Data Breach, Ransomware Cartel, and More!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:- Ivan talks through the latest updates on the Facebook data breach - threat actors selling old data for cheap and what was potentially exposed- Charles discusses Fortinet vulnerabilities - what are the technical details and how do defenders protect their data?- The team dives deeper into the ransomware cartel - Clop updates - what’s the latest and who are they...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:- Ivan talks through the latest updates on the Facebook data breach - threat actors selling old data for cheap and what was potentially exposed- Charles discusses Fortinet vulnerabilities - what are the technical details and how do defenders protect their data?- The team dives deeper into the ransomware cartel - Clop updates - what’s the latest and who are they targeting?Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-09-april ***Resources from this week’s podcast***Facebook Breach: https://www.theguardian.com/technology/2021/apr/06/facebook-breach-data-leak  Fortinet Vulnerabilities: https://www.ic3.gov/Media/News/2021/210402.pdfhttps://www.bleepingcomputer.com/news/security/fbi-and-cisa-warn-of-state-hackers-attacking-fortinet-fortios-servers/ Ransomware Cartel: https://analyst1.com/file-assets/RANSOM-MAFIA-ANALYSIS-OF-THE-WORLD%E2%80%99S-FIRST-RANSOMWARE-CARTEL.pdf https://www.scmagazine.com/home/security-news/ransomware/ransomware-cartel-model-didnt-fulfill-potential-yet-but-served-as-cybercrime-proving-ground/ Stanford Breach: https://www.bleepingcomputer.com/news/security/ransomware-gang-leaks-data-from-stanford-maryland-universities/ Actionable Threat Intel: https://www.digitalshadows.com/blog-and-research/new-release-actionable-threat-intelligence-with-searchlight/ MITRE and CTI: https://www.digitalshadows.com/blog-and-research/applying-mitre-attck-to-your-cti-program/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:- Ivan talks through the latest updates on the Facebook data breach - threat actors selling old data for cheap and what was potentially exposed- Charles discusses Fortinet vulnerabilities - what are the technical details and how do defenders protect their data?- The team dives deeper into the ransomware cartel - Clop updates - what’s the latest and who are they targeting?Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-09-april ***Resources from this week’s podcast***Facebook Breach: https://www.theguardian.com/technology/2021/apr/06/facebook-breach-data-leak  Fortinet Vulnerabilities: https://www.ic3.gov/Media/News/2021/210402.pdfhttps://www.bleepingcomputer.com/news/security/fbi-and-cisa-warn-of-state-hackers-attacking-fortinet-fortios-servers/ Ransomware Cartel: https://analyst1.com/file-assets/RANSOM-MAFIA-ANALYSIS-OF-THE-WORLD%E2%80%99S-FIRST-RANSOMWARE-CARTEL.pdf https://www.scmagazine.com/home/security-news/ransomware/ransomware-cartel-model-didnt-fulfill-potential-yet-but-served-as-cybercrime-proving-ground/ Stanford Breach: https://www.bleepingcomputer.com/news/security/ransomware-gang-leaks-data-from-stanford-maryland-universities/ Actionable Threat Intel: https://www.digitalshadows.com/blog-and-research/new-release-actionable-threat-intelligence-with-searchlight/ MITRE and CTI: https://www.digitalshadows.com/blog-and-research/applying-mitre-attck-to-your-cti-program/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461168-weekly-facebook-data-breach-ransomware-cartel-and-more.mp3" length="26695996" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ks31w483uvz3lv0ved4xdefmmc1u?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1026086500</guid>
    <pubDate>Fri, 09 Apr 2021 12:28:30 -0400</pubDate>
    <itunes:duration>2223</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: It’s A Ransomware Round-Up - CNA , Clop, and Much More!</itunes:title>
    <title>Weekly: It’s A Ransomware Round-Up - CNA , Clop, and Much More!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Stefano, Dylan, Kim, and Chris bring you the latest in threat intelligence. This week they cover:- Kim and her recent ransomware round-up - insurance company CNA suffers attack, Clop holds victims for ransom, and more- Chris takes the team through the PHP Git Server backdoor - Dylan and the group talk pandemic, remote-working, and cyber hygiene Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-02-april ***...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Stefano, Dylan, Kim, and Chris bring you the latest in threat intelligence. This week they cover:- Kim and her recent ransomware round-up - insurance company CNA suffers attack, Clop holds victims for ransom, and more- Chris takes the team through the PHP Git Server backdoor - Dylan and the group talk pandemic, remote-working, and cyber hygiene Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-02-april ***Resources from this week’s podcast***Tax Fraud 2021 Blog: https://www.digitalshadows.com/blog-and-research/tax-and-unemployment-fraud-in-2021/   Microsoft Exchange Hafnium Blog: https://www.digitalshadows.com/blog-and-research/microsoft-exchange-server-exploit-what-happened-next/ Cyber Threat Intelligence: Solutions Guide and Best Practices: https://resources.digitalshadows.com/digitalshadows/cyber-threat-intelligence-solutions-guide Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Stefano, Dylan, Kim, and Chris bring you the latest in threat intelligence. This week they cover:- Kim and her recent ransomware round-up - insurance company CNA suffers attack, Clop holds victims for ransom, and more- Chris takes the team through the PHP Git Server backdoor - Dylan and the group talk pandemic, remote-working, and cyber hygiene Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-02-april ***Resources from this week’s podcast***Tax Fraud 2021 Blog: https://www.digitalshadows.com/blog-and-research/tax-and-unemployment-fraud-in-2021/   Microsoft Exchange Hafnium Blog: https://www.digitalshadows.com/blog-and-research/microsoft-exchange-server-exploit-what-happened-next/ Cyber Threat Intelligence: Solutions Guide and Best Practices: https://resources.digitalshadows.com/digitalshadows/cyber-threat-intelligence-solutions-guide Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461169-weekly-it-s-a-ransomware-round-up-cna-clop-and-much-more.mp3" length="35880472" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/zizfg463jir2wqqth97pse7hxs6k?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1021055347</guid>
    <pubDate>Fri, 02 Apr 2021 11:13:08 -0400</pubDate>
    <itunes:duration>2988</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Dr. Chase Cunningham Talks Zero Trust, His Book on Cyber Warfare, and More!</itunes:title>
    <title>Special: Dr. Chase Cunningham Talks Zero Trust, His Book on Cyber Warfare, and More!</title>
    <itunes:summary><![CDATA[Digital Shadows CISO Rick hosts this edition of ShadowTalk. He’s joined by special guest Dr. Chase Cunningham, author, Retired Navy Chief Cryptologist, and Chief Strategy Officer at Ericom Software. They discuss: -Dr. Chase's origin story -How to use Zero Trust to take back initiative from the adversary -How the VPN is the Palm Pilot of your network infrastructure -Why there is no Zero Trust easy button -Chase's romance novel on cyber warfare -Threat modeling vacations***Resources from this w...]]></itunes:summary>
    <description><![CDATA[Digital Shadows CISO Rick hosts this edition of ShadowTalk. He’s joined by special guest Dr. Chase Cunningham, author, Retired Navy Chief Cryptologist, and Chief Strategy Officer at Ericom Software. They discuss: -Dr. Chase&apos;s origin story -How to use Zero Trust to take back initiative from the adversary -How the VPN is the Palm Pilot of your network infrastructure -Why there is no Zero Trust easy button -Chase&apos;s romance novel on cyber warfare -Threat modeling vacations***Resources from this week’s podcast***Find Dr. Chase Cunningham on LinkedIn: https://www.linkedin.com/in/dr-chase-cunningham-54b26243/ Find Dr. Chase Cunningham on Twitter: https://twitter.com/CynjaChaseCCyber Warfare – Truth, Tactics, and Strategies: Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare: https://www.amazon.com/gp/product/B084ZN2HBD/ref=dbs_a_def_rwt_bibl_vppi_i0Ericom Software: https://www.ericom.com/r/dr-zero-trust/ZT Edge: https://www.zerotrustedge.com/]]></description>
    <content:encoded><![CDATA[Digital Shadows CISO Rick hosts this edition of ShadowTalk. He’s joined by special guest Dr. Chase Cunningham, author, Retired Navy Chief Cryptologist, and Chief Strategy Officer at Ericom Software. They discuss: -Dr. Chase&apos;s origin story -How to use Zero Trust to take back initiative from the adversary -How the VPN is the Palm Pilot of your network infrastructure -Why there is no Zero Trust easy button -Chase&apos;s romance novel on cyber warfare -Threat modeling vacations***Resources from this week’s podcast***Find Dr. Chase Cunningham on LinkedIn: https://www.linkedin.com/in/dr-chase-cunningham-54b26243/ Find Dr. Chase Cunningham on Twitter: https://twitter.com/CynjaChaseCCyber Warfare – Truth, Tactics, and Strategies: Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare: https://www.amazon.com/gp/product/B084ZN2HBD/ref=dbs_a_def_rwt_bibl_vppi_i0Ericom Software: https://www.ericom.com/r/dr-zero-trust/ZT Edge: https://www.zerotrustedge.com/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461170-special-dr-chase-cunningham-talks-zero-trust-his-book-on-cyber-warfare-and-more.mp3" length="25769246" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/08q0dv015x78388audply5xnr42w?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1019207164</guid>
    <pubDate>Tue, 30 Mar 2021 12:01:07 -0400</pubDate>
    <itunes:duration>2145</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: More on Microsoft and Acer Receives $50 Million in Ransom Demands</itunes:title>
    <title>Weekly: More on Microsoft and Acer Receives $50 Million in Ransom Demands</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Alec, Austin, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:-The team discusses the latest on Exchange Servers vulnerabilities - should guards still be up? -Austin takes us through the timeline of ransomware taking advantage of vulnerabilities regarding Microsoft -Austin talks $50 million ransom against Acer - biggest known ransom request in modern history. What does this mean for the threat landscape going forward? -...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Alec, Austin, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:-The team discusses the latest on Exchange Servers vulnerabilities - should guards still be up? -Austin takes us through the timeline of ransomware taking advantage of vulnerabilities regarding Microsoft -Austin talks $50 million ransom against Acer - biggest known ransom request in modern history. What does this mean for the threat landscape going forward? -A phishing campaign has stolen 400,000 OWA/O365 creds - how to make yourself the hardest target possibleGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-26-march ***Resources from this week’s podcast***Microsoft Vulnerabilities: https://www.bleepingcomputer.com/news/security/microsoft-92-percent-of-exchange-servers-safe-from-proxylogon-attacks/ Acer Ransom: https://www.bleepingcomputer.com/news/security/computer-giant-acer-hit-by-50-million-ransomware-attack/Black Kingdom Ransomware: https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-now-targeted-by-black-kingdom-ransomware/ Office 365 Phishing: https://www.bleepingcomputer.com/news/security/microsoft-warns-of-phishing-attacks-bypassing-email-gateways/ 2021 Tax Blog: https://www.digitalshadows.com/blog-and-research/tax-and-unemployment-fraud-in-2021/ Cybercriminal Perspective Blog: https://www.digitalshadows.com/blog-and-research/the-cybercriminal-perspective/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Alec, Austin, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:-The team discusses the latest on Exchange Servers vulnerabilities - should guards still be up? -Austin takes us through the timeline of ransomware taking advantage of vulnerabilities regarding Microsoft -Austin talks $50 million ransom against Acer - biggest known ransom request in modern history. What does this mean for the threat landscape going forward? -A phishing campaign has stolen 400,000 OWA/O365 creds - how to make yourself the hardest target possibleGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-26-march ***Resources from this week’s podcast***Microsoft Vulnerabilities: https://www.bleepingcomputer.com/news/security/microsoft-92-percent-of-exchange-servers-safe-from-proxylogon-attacks/ Acer Ransom: https://www.bleepingcomputer.com/news/security/computer-giant-acer-hit-by-50-million-ransomware-attack/Black Kingdom Ransomware: https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-now-targeted-by-black-kingdom-ransomware/ Office 365 Phishing: https://www.bleepingcomputer.com/news/security/microsoft-warns-of-phishing-attacks-bypassing-email-gateways/ 2021 Tax Blog: https://www.digitalshadows.com/blog-and-research/tax-and-unemployment-fraud-in-2021/ Cybercriminal Perspective Blog: https://www.digitalshadows.com/blog-and-research/the-cybercriminal-perspective/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461171-weekly-more-on-microsoft-and-acer-receives-50-million-in-ransom-demands.mp3" length="15283452" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/by86075n8i5qx5xesrq8i4p6g58z?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1016850061</guid>
    <pubDate>Fri, 26 Mar 2021 12:27:18 -0400</pubDate>
    <itunes:duration>1272</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Creator of Zero Trust John Kindervag Talks Origins and the Future of Zero Trust!</itunes:title>
    <title>Special: Creator of Zero Trust John Kindervag Talks Origins and the Future of Zero Trust!</title>
    <itunes:summary><![CDATA[Digital Shadows CISO Rick hosts this edition of ShadowTalk. He’s joined by special guest John Kindervag, creator of Zero Trust and Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow at ON2IT Cybersecurity. They discuss: -John’s origin story and influences - what led to the creation of Zero Trust?- Zero Trust - origin, design principles, and terminology - What are your protect surfaces? - using Zero Trust- John’s new position at ON2IT***Resources from this week’s podcast***Find ...]]></itunes:summary>
    <description><![CDATA[Digital Shadows CISO Rick hosts this edition of ShadowTalk. He’s joined by special guest John Kindervag, creator of Zero Trust and Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow at ON2IT Cybersecurity. They discuss: -John’s origin story and influences - what led to the creation of Zero Trust?- Zero Trust - origin, design principles, and terminology - What are your protect surfaces? - using Zero Trust- John’s new position at ON2IT***Resources from this week’s podcast***Find John Kindervag on LinkedIn: https://www.linkedin.com/in/john-kindervag-40572b1/ Find John Kindervag on Twitter: https://twitter.com/Kindervag Understanding Zero Trust Terminology: https://www.paloaltonetworks.com/resources/zero-trust Antifragile: Things That Gain from Disorder: https://www.amazon.com/Antifragile-Things-That-Disorder-Incerto/dp/0812979680]]></description>
    <content:encoded><![CDATA[Digital Shadows CISO Rick hosts this edition of ShadowTalk. He’s joined by special guest John Kindervag, creator of Zero Trust and Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow at ON2IT Cybersecurity. They discuss: -John’s origin story and influences - what led to the creation of Zero Trust?- Zero Trust - origin, design principles, and terminology - What are your protect surfaces? - using Zero Trust- John’s new position at ON2IT***Resources from this week’s podcast***Find John Kindervag on LinkedIn: https://www.linkedin.com/in/john-kindervag-40572b1/ Find John Kindervag on Twitter: https://twitter.com/Kindervag Understanding Zero Trust Terminology: https://www.paloaltonetworks.com/resources/zero-trust Antifragile: Things That Gain from Disorder: https://www.amazon.com/Antifragile-Things-That-Disorder-Incerto/dp/0812979680]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461172-special-creator-of-zero-trust-john-kindervag-talks-origins-and-the-future-of-zero-trust.mp3" length="28628190" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/losdzyly9k8x4xbwwy6edztqnk0p?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1014901576</guid>
    <pubDate>Tue, 23 Mar 2021 15:29:03 -0400</pubDate>
    <itunes:duration>2384</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Ransomware Resurgence - The Return of FIN8, DarkSide, and More!</itunes:title>
    <title>Weekly: Ransomware Resurgence - The Return of FIN8, DarkSide, and More!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Stefano, Adam, Kim, and first-timer Chris bring you the latest in threat intelligence. This week they cover:-Kim takes us through the return of FIN8 - what are the updates to the “BadHatch” backdoor-Chris discusses DarkSides recent resurgence after a quiet period - what’s the latest?-Microsoft Exchange exploit update - the team discuss -How are threat actors and cybercriminals using ProxyLogon vulnerabilities?Get this week’s intelligence summary at: https://resources.digitals...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Stefano, Adam, Kim, and first-timer Chris bring you the latest in threat intelligence. This week they cover:-Kim takes us through the return of FIN8 - what are the updates to the “BadHatch” backdoor-Chris discusses DarkSides recent resurgence after a quiet period - what’s the latest?-Microsoft Exchange exploit update - the team discuss -How are threat actors and cybercriminals using ProxyLogon vulnerabilities?Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-19-march ***Resources from this week’s podcast***FIN8: https://labs.bitdefender.com/2021/03/fin8-group-is-back-in-business-with-improved-badhatch-kit/ DarkSide: https://www.infosecurity-magazine.com/news/darkside-20-ransomware-fastest/ ProxyLogon: https://www.welivesecurity.com/2021/03/10/exchange-servers-under-siege-10-apt-groups/ https://www.vice.com/en/article/n7vpaz/researcher-publishes-code-to-exploit-microsoft-exchange-vulnerabilities-on-github AC Features: https://www.vice.com/en/article/pkdnkz/escape-zoom-meetings-by-faking-technical-issues-and-crying-with-this-apphttps://attack.mitre.org/techniques/T1090/003/https://attack.mitre.org/software/S0398/Mapping MITRE to Microsoft Blog: https://www.digitalshadows.com/blog-and-research/mapping-mitre-attack-to-microsoft-exchange-zero-day-exploits/Revisiting Spectre Blog: https://www.digitalshadows.com/blog-and-research/revisiting-the-spectre-and-meltdown-vulnerabilities/  Monitoring for Supplier Risks Blog: https://www.digitalshadows.com/blog-and-research/monitoring-for-risks-coming-from-suppliers/FBI IC3 Blog: https://www.digitalshadows.com/blog-and-research/fbi-ic3-2020/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Stefano, Adam, Kim, and first-timer Chris bring you the latest in threat intelligence. This week they cover:-Kim takes us through the return of FIN8 - what are the updates to the “BadHatch” backdoor-Chris discusses DarkSides recent resurgence after a quiet period - what’s the latest?-Microsoft Exchange exploit update - the team discuss -How are threat actors and cybercriminals using ProxyLogon vulnerabilities?Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-19-march ***Resources from this week’s podcast***FIN8: https://labs.bitdefender.com/2021/03/fin8-group-is-back-in-business-with-improved-badhatch-kit/ DarkSide: https://www.infosecurity-magazine.com/news/darkside-20-ransomware-fastest/ ProxyLogon: https://www.welivesecurity.com/2021/03/10/exchange-servers-under-siege-10-apt-groups/ https://www.vice.com/en/article/n7vpaz/researcher-publishes-code-to-exploit-microsoft-exchange-vulnerabilities-on-github AC Features: https://www.vice.com/en/article/pkdnkz/escape-zoom-meetings-by-faking-technical-issues-and-crying-with-this-apphttps://attack.mitre.org/techniques/T1090/003/https://attack.mitre.org/software/S0398/Mapping MITRE to Microsoft Blog: https://www.digitalshadows.com/blog-and-research/mapping-mitre-attack-to-microsoft-exchange-zero-day-exploits/Revisiting Spectre Blog: https://www.digitalshadows.com/blog-and-research/revisiting-the-spectre-and-meltdown-vulnerabilities/  Monitoring for Supplier Risks Blog: https://www.digitalshadows.com/blog-and-research/monitoring-for-risks-coming-from-suppliers/FBI IC3 Blog: https://www.digitalshadows.com/blog-and-research/fbi-ic3-2020/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461173-weekly-ransomware-resurgence-the-return-of-fin8-darkside-and-more.mp3" length="30280545" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ib7zwatx0rcgh04oqt6msed358iv?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1011291082</guid>
    <pubDate>Fri, 19 Mar 2021 12:21:25 -0400</pubDate>
    <itunes:duration>2521</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Supply Chain Compromise Round-Up - Microsoft, Verkada, and More!</itunes:title>
    <title>Weekly: Supply Chain Compromise Round-Up - Microsoft, Verkada, and More!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Alec, Ivan, Charles, and Austin bring you the latest in threat intelligence. This week they cover:- The team discuss HAFNIUM and Microsoft Servers Exchange- Updates on the Accellion incident - what’s the latest regarding   Flagstar?- The Verkada compromise - who were the victims affected by the   breach of private video footage?Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-12-march ***Resources from th...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Alec, Ivan, Charles, and Austin bring you the latest in threat intelligence. This week they cover:- The team discuss HAFNIUM and Microsoft Servers Exchange- Updates on the Accellion incident - what’s the latest regarding   Flagstar?- The Verkada compromise - who were the victims affected by the   breach of private video footage?Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-12-march ***Resources from this week’s podcast***Hafnium: https://krebsonsecurity.com/2021/03/a-basic-timeline-of-the-exchange-mass-hack/Microsoft Exchange Compromise: https://www.ic3.gov/Media/News/2021/210310.pdfFlagstar: https://www.cyberscoop.com/flagstar-bank-accellion-breach-clop/Verkada: https://www.washingtonpost.com/technology/2021/03/10/verkada-hack-surveillance-risk/ Mapping MITRE ATT&amp;CK To The DPRK Blog: https://www.digitalshadows.com/blog-and-research/mapping-mitre-attack-to-dprk-financial-crime-indictment/ Year In Review: COVID-19 Concerns For Cybersecurity Blog: https://www.digitalshadows.com/blog-and-research/covid-19-concerns-for-cybersecurity/ Mapping MITRE ATT&amp;CK To The Microsoft Exchange Exploits Blog: https://www.digitalshadows.com/blog-and-research/mapping-mitre-attack-to-microsoft-exchange-zero-day-exploits/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Alec, Ivan, Charles, and Austin bring you the latest in threat intelligence. This week they cover:- The team discuss HAFNIUM and Microsoft Servers Exchange- Updates on the Accellion incident - what’s the latest regarding   Flagstar?- The Verkada compromise - who were the victims affected by the   breach of private video footage?Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-12-march ***Resources from this week’s podcast***Hafnium: https://krebsonsecurity.com/2021/03/a-basic-timeline-of-the-exchange-mass-hack/Microsoft Exchange Compromise: https://www.ic3.gov/Media/News/2021/210310.pdfFlagstar: https://www.cyberscoop.com/flagstar-bank-accellion-breach-clop/Verkada: https://www.washingtonpost.com/technology/2021/03/10/verkada-hack-surveillance-risk/ Mapping MITRE ATT&amp;CK To The DPRK Blog: https://www.digitalshadows.com/blog-and-research/mapping-mitre-attack-to-dprk-financial-crime-indictment/ Year In Review: COVID-19 Concerns For Cybersecurity Blog: https://www.digitalshadows.com/blog-and-research/covid-19-concerns-for-cybersecurity/ Mapping MITRE ATT&amp;CK To The Microsoft Exchange Exploits Blog: https://www.digitalshadows.com/blog-and-research/mapping-mitre-attack-to-microsoft-exchange-zero-day-exploits/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461174-weekly-supply-chain-compromise-round-up-microsoft-verkada-and-more.mp3" length="17030509" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/grfaqsydw7w8iuc1hjs1zdwo5bgh?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/1005590902</guid>
    <pubDate>Fri, 12 Mar 2021 13:01:04 -0500</pubDate>
    <itunes:duration>1417</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: New Australian Legislature, VMware Bugs, and More!</itunes:title>
    <title>Weekly: New Australian Legislature, VMware Bugs, and More!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Stefano, Adam, Dylan, and Kim bring you the latest in threat intelligence. This week they cover:- The Australian Criminal Intelligence Commission (ACIC) issues three   new warrants for dealing with cybercrime - how does this new   legislation increase law enforcement powers?- VMware has revealed a critical-rated bug - what should security teams   know?- Adam covers ICEDID Infection and ransomware - The team discuss the DPRK IndictmentGet this week’s intelligence summary at: h...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Stefano, Adam, Dylan, and Kim bring you the latest in threat intelligence. This week they cover:- The Australian Criminal Intelligence Commission (ACIC) issues three   new warrants for dealing with cybercrime - how does this new   legislation increase law enforcement powers?- VMware has revealed a critical-rated bug - what should security teams   know?- Adam covers ICEDID Infection and ransomware - The team discuss the DPRK IndictmentGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-05-march ***Resources from this week’s podcast***New Australian Legislature: https://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/Bills_Search_Results/Result?bId=r6623https://www.zdnet.com/article/australias-new-hacking-powers-considered-too-wide-ranging-and-coercive-by-oaic/ Vulnerability Round-Up: https://www.vmware.com/security/advisories/VMSA-2021-0002.html https://www.bleepingcomputer.com/news/security/working-windows-and-linux-spectre-exploits-found-on-virustotal/ ICEDID: https://www.fireeye.com/blog/threat-research/2021/02/melting-unc2198-icedid-to-ransomware-operations.html DPRK: https://www.justice.gov/opa/pr/three-north-korean-military-hackers-indicted-wide-ranging-scheme-commit-cyberattacks-and Law Enforcement Blog: https://www.digitalshadows.com/blog-and-research/cybercriminal-law-enforcement-crackdowns-in-2021/No Time For Threat Intel Noise Blog: https://www.digitalshadows.com/blog-and-research/no-time-for-threat-intel-noise/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Stefano, Adam, Dylan, and Kim bring you the latest in threat intelligence. This week they cover:- The Australian Criminal Intelligence Commission (ACIC) issues three   new warrants for dealing with cybercrime - how does this new   legislation increase law enforcement powers?- VMware has revealed a critical-rated bug - what should security teams   know?- Adam covers ICEDID Infection and ransomware - The team discuss the DPRK IndictmentGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-05-march ***Resources from this week’s podcast***New Australian Legislature: https://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/Bills_Search_Results/Result?bId=r6623https://www.zdnet.com/article/australias-new-hacking-powers-considered-too-wide-ranging-and-coercive-by-oaic/ Vulnerability Round-Up: https://www.vmware.com/security/advisories/VMSA-2021-0002.html https://www.bleepingcomputer.com/news/security/working-windows-and-linux-spectre-exploits-found-on-virustotal/ ICEDID: https://www.fireeye.com/blog/threat-research/2021/02/melting-unc2198-icedid-to-ransomware-operations.html DPRK: https://www.justice.gov/opa/pr/three-north-korean-military-hackers-indicted-wide-ranging-scheme-commit-cyberattacks-and Law Enforcement Blog: https://www.digitalshadows.com/blog-and-research/cybercriminal-law-enforcement-crackdowns-in-2021/No Time For Threat Intel Noise Blog: https://www.digitalshadows.com/blog-and-research/no-time-for-threat-intel-noise/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461175-weekly-new-australian-legislature-vmware-bugs-and-more.mp3" length="33116382" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/eo4y0gvjcwmgy2wronzbvy6pi8wt?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/999264691</guid>
    <pubDate>Fri, 05 Mar 2021 11:21:40 -0500</pubDate>
    <itunes:duration>2758</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: When Initial Access Brokers Attack</itunes:title>
    <title>Weekly: When Initial Access Brokers Attack</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:- The team talks Initial Access Brokers (IAB) - what role do these   middle- men play in the ransomware game?- How can your company mitigate risks against IABs?- The latest on the Accellion incident - Third party attacks - where does the blame fall?Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-s...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:- The team talks Initial Access Brokers (IAB) - what role do these   middle- men play in the ransomware game?- How can your company mitigate risks against IABs?- The latest on the Accellion incident - Third party attacks - where does the blame fall?Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-26-february ***Resources from this week’s podcast***Accellion: https://www.zdnet.com/article/fireeye-links-0-day-attacks-on-fta-servers-extortion-campaign-to-fin11-group/https://www.fireeye.com/blog/threat-research/2021/02/accellion-fta-exploited-for-data-theft-and-extortion.htmlIAB Report: https://resources.digitalshadows.com/whitepapers-and-reports/initial-access-brokers-report Monitoring IABs in SearchLight: https://www.digitalshadows.com/blog-and-research/how-to-monitor-initial-access-broker-listings/ 5 Ways To Take Action Blog: https://www.digitalshadows.com/blog-and-research/5-ways-to-optimize-threat-intelligence/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:- The team talks Initial Access Brokers (IAB) - what role do these   middle- men play in the ransomware game?- How can your company mitigate risks against IABs?- The latest on the Accellion incident - Third party attacks - where does the blame fall?Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-26-february ***Resources from this week’s podcast***Accellion: https://www.zdnet.com/article/fireeye-links-0-day-attacks-on-fta-servers-extortion-campaign-to-fin11-group/https://www.fireeye.com/blog/threat-research/2021/02/accellion-fta-exploited-for-data-theft-and-extortion.htmlIAB Report: https://resources.digitalshadows.com/whitepapers-and-reports/initial-access-brokers-report Monitoring IABs in SearchLight: https://www.digitalshadows.com/blog-and-research/how-to-monitor-initial-access-broker-listings/ 5 Ways To Take Action Blog: https://www.digitalshadows.com/blog-and-research/5-ways-to-optimize-threat-intelligence/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461176-weekly-when-initial-access-brokers-attack.mp3" length="18564024" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/64ta3sx9xa0898vhki9pkwbtgb9v?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/993657046</guid>
    <pubDate>Fri, 26 Feb 2021 12:31:00 -0500</pubDate>
    <itunes:duration>1545</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Egregor Arrests, SIM-Swapping, and Oldsmar Updates!</itunes:title>
    <title>Weekly: Egregor Arrests, SIM-Swapping, and Oldsmar Updates!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Stefano, Adam, Dylan, and Kim bring you the latest in threat intelligence. This week they cover:- Adam takes us through the latest on Egregor and related arrests - is the threat group down but not out?- Dylan talks SIM-swapping - who was targeted?- Kim brings us the most recent news on the Centreon breach- Plus, the team reviews the Oldsmar water treatment facility attackGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intell...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Stefano, Adam, Dylan, and Kim bring you the latest in threat intelligence. This week they cover:- Adam takes us through the latest on Egregor and related arrests - is the threat group down but not out?- Dylan talks SIM-swapping - who was targeted?- Kim brings us the most recent news on the Centreon breach- Plus, the team reviews the Oldsmar water treatment facility attackGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-19-february ***Resources from this week’s podcast***Egregor operators arrested: https://www.zdnet.com/article/egregor-ransomware-operators-arrested-in-ukraine/SIM Swapping: https://www.europol.europa.eu/newsroom/news/ten-hackers-arrested-for-string-of-sim-swapping-attacks-against-celebrities https://www.youtube.com/watch?v=fHhNWAKw0bY Centreon breach: https://www.zdnet.com/article/france-russian-state-hackers-targeted-centreon-servers-in-years-long-campaign/ Oldsmar updates: https://www.mass.gov/service-details/cybersecurity-advisory-for-public-water-suppliers Threat Intel Can Be Noisy Blog: https://www.digitalshadows.com/blog-and-research/threat-intelligence-can-be-noisy-searchlight-helps/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Stefano, Adam, Dylan, and Kim bring you the latest in threat intelligence. This week they cover:- Adam takes us through the latest on Egregor and related arrests - is the threat group down but not out?- Dylan talks SIM-swapping - who was targeted?- Kim brings us the most recent news on the Centreon breach- Plus, the team reviews the Oldsmar water treatment facility attackGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-19-february ***Resources from this week’s podcast***Egregor operators arrested: https://www.zdnet.com/article/egregor-ransomware-operators-arrested-in-ukraine/SIM Swapping: https://www.europol.europa.eu/newsroom/news/ten-hackers-arrested-for-string-of-sim-swapping-attacks-against-celebrities https://www.youtube.com/watch?v=fHhNWAKw0bY Centreon breach: https://www.zdnet.com/article/france-russian-state-hackers-targeted-centreon-servers-in-years-long-campaign/ Oldsmar updates: https://www.mass.gov/service-details/cybersecurity-advisory-for-public-water-suppliers Threat Intel Can Be Noisy Blog: https://www.digitalshadows.com/blog-and-research/threat-intelligence-can-be-noisy-searchlight-helps/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461177-weekly-egregor-arrests-sim-swapping-and-oldsmar-updates.mp3" length="37699620" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5a0h3ra92grdxwd54cv2qvopnqol?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/988915807</guid>
    <pubDate>Fri, 19 Feb 2021 11:36:33 -0500</pubDate>
    <itunes:duration>3140</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Ransomware Updates - CDPR Victimized, Ziggy’s End, and the Oldsmar Water Incident</itunes:title>
    <title>Weekly: Ransomware Updates - CDPR Victimized, Ziggy’s End, and the Oldsmar Water Incident</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Alec, Ivan, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:- Cyberpunk and Witcher fans beware - threat actors target the CD Projekt Red source code- Ziggy ransomware calls it quits - is law enforcement activity driving this impact?- Oldsmar, FL water treatment facility gets hacked - could other critical infrastructure be at risk?- Researcher impacts dozens of tech firms through a supply chain attack, winning a $130,000...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Alec, Ivan, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:- Cyberpunk and Witcher fans beware - threat actors target the CD Projekt Red source code- Ziggy ransomware calls it quits - is law enforcement activity driving this impact?- Oldsmar, FL water treatment facility gets hacked - could other critical infrastructure be at risk?- Researcher impacts dozens of tech firms through a supply chain attack, winning a $130,000 ‘bug bounty’Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-12-february ***Resources from this week’s podcast***Cyberpunk hack: https://www.theverge.com/2021/2/10/22276664/cyberpunk-witcher-hackers-auction-source-code-ransomware-attack Ziggy: https://www.bleepingcomputer.com/news/security/ziggy-ransomware-shuts-down-and-releases-victims-decryption-keys/ Oldsmar: https://www.cnn.com/2021/02/08/us/oldsmar-florida-hack-water-poison/index.html Security researcher wins award: https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610 Valentine’s Blog: https://www.digitalshadows.com/blog-and-research/cybercrime-and-valentines-day/ Exposed Credential Guide: https://resources.digitalshadows.com/whitepapers-and-reports/exposed-credentials-solutions-guide Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Alec, Ivan, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:- Cyberpunk and Witcher fans beware - threat actors target the CD Projekt Red source code- Ziggy ransomware calls it quits - is law enforcement activity driving this impact?- Oldsmar, FL water treatment facility gets hacked - could other critical infrastructure be at risk?- Researcher impacts dozens of tech firms through a supply chain attack, winning a $130,000 ‘bug bounty’Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-12-february ***Resources from this week’s podcast***Cyberpunk hack: https://www.theverge.com/2021/2/10/22276664/cyberpunk-witcher-hackers-auction-source-code-ransomware-attack Ziggy: https://www.bleepingcomputer.com/news/security/ziggy-ransomware-shuts-down-and-releases-victims-decryption-keys/ Oldsmar: https://www.cnn.com/2021/02/08/us/oldsmar-florida-hack-water-poison/index.html Security researcher wins award: https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610 Valentine’s Blog: https://www.digitalshadows.com/blog-and-research/cybercrime-and-valentines-day/ Exposed Credential Guide: https://resources.digitalshadows.com/whitepapers-and-reports/exposed-credentials-solutions-guide Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461178-weekly-ransomware-updates-cdpr-victimized-ziggy-s-end-and-the-oldsmar-water-incident.mp3" length="16798658" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/cc7jbdyxip5fg5cyf6wd9b20kxtz?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/984291742</guid>
    <pubDate>Fri, 12 Feb 2021 13:04:02 -0500</pubDate>
    <itunes:duration>1398</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Lebanese Cedar, Nefilim Ghost Credentials, and More on SolarWinds and Emotet</itunes:title>
    <title>Weekly: Lebanese Cedar, Nefilim Ghost Credentials, and More on SolarWinds and Emotet</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Stefano, Adam, and Kim bring you the latest in threat intelligence. This week they cover:- More threat actors and attack vectors are being investigated in the SolarWinds compromise- Law enforcement officials in the Netherlands are delivering an Emotet update that will remove it from infected devices- Kim talks Lebanese Cedar - What’s new in their latest attack?- Adam reviews Nefilim ransomware - how were they able to gain access and why it reinforces the need for securing emp...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Stefano, Adam, and Kim bring you the latest in threat intelligence. This week they cover:- More threat actors and attack vectors are being investigated in the SolarWinds compromise- Law enforcement officials in the Netherlands are delivering an Emotet update that will remove it from infected devices- Kim talks Lebanese Cedar - What’s new in their latest attack?- Adam reviews Nefilim ransomware - how were they able to gain access and why it reinforces the need for securing employee accounts - Plus, don’t miss the malware name of the week! Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-05-february ***Resources from this week’s podcast***SolarWinds Update: https://www.wsj.com/articles/suspected-russian-hack-extends-far-beyond-solarwinds-software-investigators-say-11611921601 Lebanese Cedar: https://www.clearskysec.com/wp-content/uploads/2021/01/Lebanese-Cedar-APT.pdf Nefilim Ghost Credentials: https://news.sophos.com/en-us/2021/01/26/nefilim-ransomware-attack-uses-ghost-credentials/ Zinc Attacks: https://www.microsoft.com/security/blog/2021/01/28/zinc-attacks-against-security-researchers/ Emotet Disruption: https://www.digitalshadows.com/blog-and-research/emotet-disruption/ DarkMarket Seizure: https://www.digitalshadows.com/blog-and-research/darkmarkets-seizure/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Stefano, Adam, and Kim bring you the latest in threat intelligence. This week they cover:- More threat actors and attack vectors are being investigated in the SolarWinds compromise- Law enforcement officials in the Netherlands are delivering an Emotet update that will remove it from infected devices- Kim talks Lebanese Cedar - What’s new in their latest attack?- Adam reviews Nefilim ransomware - how were they able to gain access and why it reinforces the need for securing employee accounts - Plus, don’t miss the malware name of the week! Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-05-february ***Resources from this week’s podcast***SolarWinds Update: https://www.wsj.com/articles/suspected-russian-hack-extends-far-beyond-solarwinds-software-investigators-say-11611921601 Lebanese Cedar: https://www.clearskysec.com/wp-content/uploads/2021/01/Lebanese-Cedar-APT.pdf Nefilim Ghost Credentials: https://news.sophos.com/en-us/2021/01/26/nefilim-ransomware-attack-uses-ghost-credentials/ Zinc Attacks: https://www.microsoft.com/security/blog/2021/01/28/zinc-attacks-against-security-researchers/ Emotet Disruption: https://www.digitalshadows.com/blog-and-research/emotet-disruption/ DarkMarket Seizure: https://www.digitalshadows.com/blog-and-research/darkmarkets-seizure/ Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461179-weekly-lebanese-cedar-nefilim-ghost-credentials-and-more-on-solarwinds-and-emotet.mp3" length="30066471" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/115gilr6chd24sukiusqk3cesxvu?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/979776271</guid>
    <pubDate>Fri, 05 Feb 2021 12:05:27 -0500</pubDate>
    <itunes:duration>2504</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Law Enforcement Wins the Week - The Fall of NetWalker and Emotet!</itunes:title>
    <title>Weekly: Law Enforcement Wins the Week - The Fall of NetWalker and Emotet!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Alec, Charles, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:- Mimecast confirms SolarWinds attackers breached security certificate the latest updates- The rise and fall of Emotet plus unique video footage of the takedown- NetWalker ransomware targeted and taken down by US and Bulgarian Law Enforcement - Avaddon adopts a new tactic - could it become the MO of other threat groups?- North Korean threat actors go phishing...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Alec, Charles, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:- Mimecast confirms SolarWinds attackers breached security certificate the latest updates- The rise and fall of Emotet plus unique video footage of the takedown- NetWalker ransomware targeted and taken down by US and Bulgarian Law Enforcement - Avaddon adopts a new tactic - could it become the MO of other threat groups?- North Korean threat actors go phishing for security researchers with fake social media profilesGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-29-january ***Resources from this week’s podcast***Mimecast SolarWinds Update: https://www.mimecast.com/blog/important-security-update/ 23 Sunburst Targets Identified: https://www.netresec.com/?page=Blog&amp;month=2021-01&amp;post=Twenty-three-SUNBURST-Targets-Identified Emotet: https://www.zdnet.com/article/emotet-worlds-most-dangerous-malware-botnet-disrupted-by-international-police-operation/ Emotet Takedown Video: https://youtu.be/_BLOmClsSpc NetWalker: https://www.zdnet.com/article/us-and-bulgarian-authorities-dirsupt-netwalker-ransomware-operation/ Avaddon: https://www.bleepingcomputer.com/news/security/another-ransomware-now-uses-ddos-attacks-to-force-victims-to-pay/ NK Activity: https://www.bleepingcomputer.com/news/security/north-korean-hackers-are-targeting-security-researchers-with-malware-0-days/ Ransomware 2020 Blog: https://www.digitalshadows.com/blog-and-research/ransomware-analyzing-the-data-from-2020/Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Alec, Charles, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:- Mimecast confirms SolarWinds attackers breached security certificate the latest updates- The rise and fall of Emotet plus unique video footage of the takedown- NetWalker ransomware targeted and taken down by US and Bulgarian Law Enforcement - Avaddon adopts a new tactic - could it become the MO of other threat groups?- North Korean threat actors go phishing for security researchers with fake social media profilesGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-29-january ***Resources from this week’s podcast***Mimecast SolarWinds Update: https://www.mimecast.com/blog/important-security-update/ 23 Sunburst Targets Identified: https://www.netresec.com/?page=Blog&amp;month=2021-01&amp;post=Twenty-three-SUNBURST-Targets-Identified Emotet: https://www.zdnet.com/article/emotet-worlds-most-dangerous-malware-botnet-disrupted-by-international-police-operation/ Emotet Takedown Video: https://youtu.be/_BLOmClsSpc NetWalker: https://www.zdnet.com/article/us-and-bulgarian-authorities-dirsupt-netwalker-ransomware-operation/ Avaddon: https://www.bleepingcomputer.com/news/security/another-ransomware-now-uses-ddos-attacks-to-force-victims-to-pay/ NK Activity: https://www.bleepingcomputer.com/news/security/north-korean-hackers-are-targeting-security-researchers-with-malware-0-days/ Ransomware 2020 Blog: https://www.digitalshadows.com/blog-and-research/ransomware-analyzing-the-data-from-2020/Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461180-weekly-law-enforcement-wins-the-week-the-fall-of-netwalker-and-emotet.mp3" length="19776816" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/g0y7tm8k68b5egt8mxn00v29h53t?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/975305668</guid>
    <pubDate>Fri, 29 Jan 2021 14:04:34 -0500</pubDate>
    <itunes:duration>1646</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: CISA Security Advisory, IObit Attack, and more SolarWinds!</itunes:title>
    <title>Weekly: CISA Security Advisory, IObit Attack, and more SolarWinds!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Stefano, Adam, Kim, and Dylan bring you the latest in threat intelligence. This week they cover:- Adam and the team discuss more SolarWinds updates - what’s the latest?- Kim talks CISA security advisory - trends in recent attacks and cyber hygiene- Dylan dives into new ransomware attack on IObit - how threat actors spread the malware to its membersGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-22-januar...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Stefano, Adam, Kim, and Dylan bring you the latest in threat intelligence. This week they cover:- Adam and the team discuss more SolarWinds updates - what’s the latest?- Kim talks CISA security advisory - trends in recent attacks and cyber hygiene- Dylan dives into new ransomware attack on IObit - how threat actors spread the malware to its membersGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-22-january ***Resources from this week’s podcast***Cryptocurrency: https://www.bleepingcomputer.com/news/security/iobit-forums-hacked-to-spread-ransomware-to-its-members/https://twitter.com/BleepinComputer/status/1351261442536861697 Lokibot: https://blog.talosintelligence.com/2021/01/a-deep-dive-into-lokibot-infection-chain.html 3 Takeaways from Forrester: https://www.digitalshadows.com/blog-and-research/top-3-takeaways-from-forrester-ti-nowtech-2020/ AzureAD: https://www.digitalshadows.com/blog-and-research/azure-ad-auto-validate-exposed-credentials/Asset and Wealth Management: https://www.digitalshadows.com/blog-and-research/threats-to-asset-and-wealth-management-in-2020-2021/  Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Stefano, Adam, Kim, and Dylan bring you the latest in threat intelligence. This week they cover:- Adam and the team discuss more SolarWinds updates - what’s the latest?- Kim talks CISA security advisory - trends in recent attacks and cyber hygiene- Dylan dives into new ransomware attack on IObit - how threat actors spread the malware to its membersGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-22-january ***Resources from this week’s podcast***Cryptocurrency: https://www.bleepingcomputer.com/news/security/iobit-forums-hacked-to-spread-ransomware-to-its-members/https://twitter.com/BleepinComputer/status/1351261442536861697 Lokibot: https://blog.talosintelligence.com/2021/01/a-deep-dive-into-lokibot-infection-chain.html 3 Takeaways from Forrester: https://www.digitalshadows.com/blog-and-research/top-3-takeaways-from-forrester-ti-nowtech-2020/ AzureAD: https://www.digitalshadows.com/blog-and-research/azure-ad-auto-validate-exposed-credentials/Asset and Wealth Management: https://www.digitalshadows.com/blog-and-research/threats-to-asset-and-wealth-management-in-2020-2021/  Also, don’t forget to reach out to - shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461181-weekly-cisa-security-advisory-iobit-attack-and-more-solarwinds.mp3" length="28461912" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/4xfxaltclrvfll76bq7xwsb1enzq?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/970701067</guid>
    <pubDate>Fri, 22 Jan 2021 13:07:42 -0500</pubDate>
    <itunes:duration>2370</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Sunburst, Sunspot, and more on SolarWinds!</itunes:title>
    <title>Weekly: Sunburst, Sunspot, and more on SolarWinds!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Alec, Charles, Austin, and Ivan bring you the latest in threat intelligence. This week they cover:- Significant updates to the SolarWinds incident- Overlaps of the "Sunburst" backdoor and malware known to be used   by the believed Russia-affiliated APT "Turla"- Possible SolarWinds scam - SolarLeaks claiming to sell data stolen in   SolarWinds attacks- The newly identified Sunspot malware- Mimecast reporting of a compromised certificate possibly related to   SolarWinds - the t...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Alec, Charles, Austin, and Ivan bring you the latest in threat intelligence. This week they cover:- Significant updates to the SolarWinds incident- Overlaps of the &quot;Sunburst&quot; backdoor and malware known to be used   by the believed Russia-affiliated APT &quot;Turla&quot;- Possible SolarWinds scam - SolarLeaks claiming to sell data stolen in   SolarWinds attacks- The newly identified Sunspot malware- Mimecast reporting of a compromised certificate possibly related to   SolarWinds - the team dives deeper- DarkSide ransomware decryptor keys being released and how   DarkSide respondedGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-15-january ***Resources from this week’s podcast***Sunburst: https://securelist.com/sunburst-backdoor-kazuar/99981/SolarLeaks: https://www.bleepingcomputer.com/news/security/solarleaks-site-claims-to-sell-data-stolen-in-solarwinds-attacks/SolarWinds updates: https://orangematter.solarwinds.com/2021/01/11/new-findings-from-our-investigation-of-sunburst/ https://www.cyberscoop.com/mimecast-email-breach-solarwinds-russia/?category_news=technology Sunspot: https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/Covid-19 threat landscape updates: https://www.digitalshadows.com/blog-and-research/targets-and-predictions-for-the-covid-19-threat-landscape/Dark Web Marketplaces And Cybercriminal Forums: https://www.digitalshadows.com/blog-and-research/tracing-dark-web-marketplaces-and-cybercriminal-forums/ ShadowTalk Email: shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Alec, Charles, Austin, and Ivan bring you the latest in threat intelligence. This week they cover:- Significant updates to the SolarWinds incident- Overlaps of the &quot;Sunburst&quot; backdoor and malware known to be used   by the believed Russia-affiliated APT &quot;Turla&quot;- Possible SolarWinds scam - SolarLeaks claiming to sell data stolen in   SolarWinds attacks- The newly identified Sunspot malware- Mimecast reporting of a compromised certificate possibly related to   SolarWinds - the team dives deeper- DarkSide ransomware decryptor keys being released and how   DarkSide respondedGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-15-january ***Resources from this week’s podcast***Sunburst: https://securelist.com/sunburst-backdoor-kazuar/99981/SolarLeaks: https://www.bleepingcomputer.com/news/security/solarleaks-site-claims-to-sell-data-stolen-in-solarwinds-attacks/SolarWinds updates: https://orangematter.solarwinds.com/2021/01/11/new-findings-from-our-investigation-of-sunburst/ https://www.cyberscoop.com/mimecast-email-breach-solarwinds-russia/?category_news=technology Sunspot: https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/Covid-19 threat landscape updates: https://www.digitalshadows.com/blog-and-research/targets-and-predictions-for-the-covid-19-threat-landscape/Dark Web Marketplaces And Cybercriminal Forums: https://www.digitalshadows.com/blog-and-research/tracing-dark-web-marketplaces-and-cybercriminal-forums/ ShadowTalk Email: shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461182-weekly-sunburst-sunspot-and-more-on-solarwinds.mp3" length="20490667" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/v4hv7o92e5fbysjyh7kblye19k1u?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/966278884</guid>
    <pubDate>Fri, 15 Jan 2021 12:20:29 -0500</pubDate>
    <itunes:duration>1706</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: SolarWinds Updates, TicketMaster Fraud, Apex Cyber Attack, and More!</itunes:title>
    <title>Weekly: SolarWinds Updates, TicketMaster Fraud, Apex Cyber Attack, and More!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Stefano, Kim, Adam, and Dylan bring you the latest in threat intelligence. This week they cover:- Post-holiday updates on SolarWinds - what have we missed? - Ticketmaster gets fined $10 million for illegally accessing the internal   systems of a competitor, using the credentials of a former employee- Apex Laboratory announced that it was the victim of a cyber attack -   what we know so far- 2020 in review: What will the new year bring in the world of cyber   security?Get this...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Stefano, Kim, Adam, and Dylan bring you the latest in threat intelligence. This week they cover:- Post-holiday updates on SolarWinds - what have we missed? - Ticketmaster gets fined $10 million for illegally accessing the internal   systems of a competitor, using the credentials of a former employee- Apex Laboratory announced that it was the victim of a cyber attack -   what we know so far- 2020 in review: What will the new year bring in the world of cyber   security?Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-08-january ***Resources from this week’s podcast***SolarWinds:https://www.solarwinds.com/securityadvisorySolarWinds Blog: https://www.digitalshadows.com/blog-and-research/solarwinds-compromise-what-security-teams-need-to-know/ SolarWinds Update Blog: https://www.digitalshadows.com/blog-and-research/solarwinds-compromise-update/ TicketMaster Fraud: https://www.justice.gov/usao-edny/pr/ticketmaster-pays-10-million-criminal-fine-intrusions-competitor-s-computer-systems-0APT27: https://www.scmagazine.com/home/security-news/ransomware/chinese-espionage-group-apt27-moves-into-ransomware/ 2020 Lookback Blog: https://www.digitalshadows.com/blog-and-research/lookingback-at-2020/ 2021 Forecasts Blog: https://www.digitalshadows.com/blog-and-research/2021-forecasts/ ShadowTalk Email: shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Stefano, Kim, Adam, and Dylan bring you the latest in threat intelligence. This week they cover:- Post-holiday updates on SolarWinds - what have we missed? - Ticketmaster gets fined $10 million for illegally accessing the internal   systems of a competitor, using the credentials of a former employee- Apex Laboratory announced that it was the victim of a cyber attack -   what we know so far- 2020 in review: What will the new year bring in the world of cyber   security?Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-08-january ***Resources from this week’s podcast***SolarWinds:https://www.solarwinds.com/securityadvisorySolarWinds Blog: https://www.digitalshadows.com/blog-and-research/solarwinds-compromise-what-security-teams-need-to-know/ SolarWinds Update Blog: https://www.digitalshadows.com/blog-and-research/solarwinds-compromise-update/ TicketMaster Fraud: https://www.justice.gov/usao-edny/pr/ticketmaster-pays-10-million-criminal-fine-intrusions-competitor-s-computer-systems-0APT27: https://www.scmagazine.com/home/security-news/ransomware/chinese-espionage-group-apt27-moves-into-ransomware/ 2020 Lookback Blog: https://www.digitalshadows.com/blog-and-research/lookingback-at-2020/ 2021 Forecasts Blog: https://www.digitalshadows.com/blog-and-research/2021-forecasts/ ShadowTalk Email: shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461183-weekly-solarwinds-updates-ticketmaster-fraud-apex-cyber-attack-and-more.mp3" length="30905832" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/truk87feuupwa5vonnfg9e0b61tn?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/961892074</guid>
    <pubDate>Fri, 08 Jan 2021 12:00:37 -0500</pubDate>
    <itunes:duration>2574</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: SolarWinds Supply-Chain Attack Round-Up</itunes:title>
    <title>Weekly: SolarWinds Supply-Chain Attack Round-Up</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Kacey, Charles, Alec, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover all things SolarWinds:- An overview of the campaign and event timelines- SolarWinds' SEC filing and its implications- Early indicators of compromise, including public FTP creds and an   access listing- What we can expect from this attack as time goes onGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intellige...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Kacey, Charles, Alec, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover all things SolarWinds:- An overview of the campaign and event timelines- SolarWinds&apos; SEC filing and its implications- Early indicators of compromise, including public FTP creds and an   access listing- What we can expect from this attack as time goes onGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-18-december ***Resources from this week’s podcast***Microsoft: https://msrc-blog.microsoft.com/2020/12/13/customer-guidance-on-recent-nation-state-cyber-attacks/SolarWinds:https://www.solarwinds.com/securityadvisoryFireEye: https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.htmlDomainTools: https://www.domaintools.com/resources/blog/unraveling-network-infrastructure-linked-to-the-solarwinds-hack?utm_source=Social&amp;utm_medium=twitter&amp;utm_campaign=SUNBURST#FTP Creds (2019):https://savebreach.com/solarwinds-credentials-exposure-led-to-us-government-fireye-breach/ SEC Filinghttps://portal.pannus.uk/client/intelligence/incident/67083793 https://www.sec.gov/ix?doc=/Archives/edgar/data/1739942/000162828020017451/swi-20201214.htm Dark Halo: https://portal.pannus.uk/client/intelligence/incident/67128769https://www.volexity.com/blog/2020/12/14/dark-halo-leverages-solarwinds-compromise-to-breach-organizations/SolarWinds Blog: https://www.digitalshadows.com/blog-and-research/solarwinds-compromise-what-security-teams-need-to-know/]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Kacey, Charles, Alec, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover all things SolarWinds:- An overview of the campaign and event timelines- SolarWinds&apos; SEC filing and its implications- Early indicators of compromise, including public FTP creds and an   access listing- What we can expect from this attack as time goes onGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-18-december ***Resources from this week’s podcast***Microsoft: https://msrc-blog.microsoft.com/2020/12/13/customer-guidance-on-recent-nation-state-cyber-attacks/SolarWinds:https://www.solarwinds.com/securityadvisoryFireEye: https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.htmlDomainTools: https://www.domaintools.com/resources/blog/unraveling-network-infrastructure-linked-to-the-solarwinds-hack?utm_source=Social&amp;utm_medium=twitter&amp;utm_campaign=SUNBURST#FTP Creds (2019):https://savebreach.com/solarwinds-credentials-exposure-led-to-us-government-fireye-breach/ SEC Filinghttps://portal.pannus.uk/client/intelligence/incident/67083793 https://www.sec.gov/ix?doc=/Archives/edgar/data/1739942/000162828020017451/swi-20201214.htm Dark Halo: https://portal.pannus.uk/client/intelligence/incident/67128769https://www.volexity.com/blog/2020/12/14/dark-halo-leverages-solarwinds-compromise-to-breach-organizations/SolarWinds Blog: https://www.digitalshadows.com/blog-and-research/solarwinds-compromise-what-security-teams-need-to-know/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461184-weekly-solarwinds-supply-chain-attack-round-up.mp3" length="25898321" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/pnfh2saojhunws8gbq46ompcba6y?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/950146888</guid>
    <pubDate>Fri, 18 Dec 2020 12:24:55 -0500</pubDate>
    <itunes:duration>2156</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: FireEye Breach, Phishing for the Covid-19 Vaccine, and More!</itunes:title>
    <title>Weekly: FireEye Breach, Phishing for the Covid-19 Vaccine, and More!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Stefano, Kim, and Adam bring you the latest in threat intelligence. This week they cover:- FireEye, a top security firm, suffers a breach caused by a state-sponsored   attacker- Phishing campaigns target the distribution of the Covid-19 vaccine- Ransomware gangs resort to cold-calling victims in order to cash in - Plus, the very festive ‘Malware name of the week’Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-su...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Stefano, Kim, and Adam bring you the latest in threat intelligence. This week they cover:- FireEye, a top security firm, suffers a breach caused by a state-sponsored   attacker- Phishing campaigns target the distribution of the Covid-19 vaccine- Ransomware gangs resort to cold-calling victims in order to cash in - Plus, the very festive ‘Malware name of the week’Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-11-december ***Resources from this week’s podcast***FireEye breach: https://arstechnica.com/information-technology/2020/12/security-firm-fireeye-says-nation-state-hackers-stole-potent-attack-tools/  FireEye breach: https://www.fireeye.com/blog/products-and-services/2020/12/fireeye-shares-details-of-recent-cyber-attack-actions-to-protect-community.html Phishing targeting the vaccine: https://portal-digitalshadows.com/search/intelligenceincident/66425527 Phishing targeting the vaccine: https://securityintelligence.com/posts/ibm-uncovers-global-phishing-covid-19-vaccine-cold-chain/ Ransomware cold calls: https://www.zdnet.com/article/ransomware-gangs-are-now-cold-calling-victims-if-they-restore-from-backups-without-payingMalware name of the week: https://www.pcrisk.com/removal-guides/10819-merry-christmas-ransomware Egregor blog: https://www.digitalshadows.com/blog-and-research/egregor-the-new-ransomware-variant-to-watch/Holiday Cybercrime blog: https://www.digitalshadows.com/blog-and-research/holiday-cybercrime-retail-risks-and-dark-web-kicks/ Podcast email: shadowtalk@digitalshadows.com]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Stefano, Kim, and Adam bring you the latest in threat intelligence. This week they cover:- FireEye, a top security firm, suffers a breach caused by a state-sponsored   attacker- Phishing campaigns target the distribution of the Covid-19 vaccine- Ransomware gangs resort to cold-calling victims in order to cash in - Plus, the very festive ‘Malware name of the week’Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-11-december ***Resources from this week’s podcast***FireEye breach: https://arstechnica.com/information-technology/2020/12/security-firm-fireeye-says-nation-state-hackers-stole-potent-attack-tools/  FireEye breach: https://www.fireeye.com/blog/products-and-services/2020/12/fireeye-shares-details-of-recent-cyber-attack-actions-to-protect-community.html Phishing targeting the vaccine: https://portal-digitalshadows.com/search/intelligenceincident/66425527 Phishing targeting the vaccine: https://securityintelligence.com/posts/ibm-uncovers-global-phishing-covid-19-vaccine-cold-chain/ Ransomware cold calls: https://www.zdnet.com/article/ransomware-gangs-are-now-cold-calling-victims-if-they-restore-from-backups-without-payingMalware name of the week: https://www.pcrisk.com/removal-guides/10819-merry-christmas-ransomware Egregor blog: https://www.digitalshadows.com/blog-and-research/egregor-the-new-ransomware-variant-to-watch/Holiday Cybercrime blog: https://www.digitalshadows.com/blog-and-research/holiday-cybercrime-retail-risks-and-dark-web-kicks/ Podcast email: shadowtalk@digitalshadows.com]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461185-weekly-fireeye-breach-phishing-for-the-covid-19-vaccine-and-more.mp3" length="21898994" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/h17i6e0jgdkby8rp6lo48pojaf7i?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/945720880</guid>
    <pubDate>Fri, 11 Dec 2020 12:53:00 -0500</pubDate>
    <itunes:duration>1823</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Guest Brian Wrozek Talks Origin Story, Planning for 2021, and More!</itunes:title>
    <title>Special: Guest Brian Wrozek Talks Origin Story, Planning for 2021, and More!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Kacey, Charles, and Digital Shadows CISO Rick chat with Brian Wrozek of Optiv. They cover:  - Brian’s origin in cybersecurity - Looking forward to 2021 - what should we be focusing on and what do   we need to be prepared for?- Threat modeling and tabletop exercises - how do we prepare for the   worst?- Brian and the team talk degrees - how big of a role do they play when   recruiting?  ***Resources from this week’s podcast***Find Brian Wrozek on LinkedIn: https://www.linkedin...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Kacey, Charles, and Digital Shadows CISO Rick chat with Brian Wrozek of Optiv. They cover:  - Brian’s origin in cybersecurity - Looking forward to 2021 - what should we be focusing on and what do   we need to be prepared for?- Threat modeling and tabletop exercises - how do we prepare for the   worst?- Brian and the team talk degrees - how big of a role do they play when   recruiting?  ***Resources from this week’s podcast***Find Brian Wrozek on LinkedIn: https://www.linkedin.com/in/brianwrozek Find Brian Wrozek on Twitter: https://twitter.com/bdwtexas?lang=en University of Dallas link: https://udallas.edu/cob/about/adjunct-faculty/wrozek-brian.phpOptiv: https://www.optiv.com/]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Kacey, Charles, and Digital Shadows CISO Rick chat with Brian Wrozek of Optiv. They cover:  - Brian’s origin in cybersecurity - Looking forward to 2021 - what should we be focusing on and what do   we need to be prepared for?- Threat modeling and tabletop exercises - how do we prepare for the   worst?- Brian and the team talk degrees - how big of a role do they play when   recruiting?  ***Resources from this week’s podcast***Find Brian Wrozek on LinkedIn: https://www.linkedin.com/in/brianwrozek Find Brian Wrozek on Twitter: https://twitter.com/bdwtexas?lang=en University of Dallas link: https://udallas.edu/cob/about/adjunct-faculty/wrozek-brian.phpOptiv: https://www.optiv.com/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461186-special-guest-brian-wrozek-talks-origin-story-planning-for-2021-and-more.mp3" length="33568975" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/gqibl70zcqal9qrlifmx6bvef0wh?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/943273426</guid>
    <pubDate>Mon, 07 Dec 2020 18:03:19 -0500</pubDate>
    <itunes:duration>2795</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Gootkit &amp; REvil, Spam Haus Findings, and More!</itunes:title>
    <title>Weekly: Gootkit &amp; REvil, Spam Haus Findings, and More!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Kacey, Charles, Alec, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:- REvil ransomware breathes new life into Gootkit malware - C-level email credentials listed for sale on a cybercriminal marketplace- Does REvil have ties to Maze and Egregor? A conversation about   source evaluation and attribution.- Spam Haus reports that thousands of IPV4 addresses are suddenly   coming alive - is more BGP abuse on the horizon?Get this week...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Kacey, Charles, Alec, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:- REvil ransomware breathes new life into Gootkit malware - C-level email credentials listed for sale on a cybercriminal marketplace- Does REvil have ties to Maze and Egregor? A conversation about   source evaluation and attribution.- Spam Haus reports that thousands of IPV4 addresses are suddenly   coming alive - is more BGP abuse on the horizon?Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-4-december ***Resources from this week’s podcast***Gootkit: https://www.bleepingcomputer.com/news/security/gootkit-malware-returns-to-life-alongside-revil-ransomware/Threat actor sells accounts: https://www.zdnet.com/article/a-hacker-is-selling-access-to-the-email-accounts-of-hundreds-of-c-level-executives/REvil: https://twitter.com/campuscodi/status/1333462999105998848Spam Haus: https://www.reddit.com/r/blueteamsec/comments/k42sk7/suspicious_network_resurrections_spamhouse/?utm_source=share&amp;utm_medium=web2x&amp;context=32021 Predictions blog: https://www.digitalshadows.com/blog-and-research/2021-forecasts/2021 Predictions webinar: https://info.digitalshadows.com/2020Dec09-Live-Webinar-Predictions.htmlEgregor blog: https://www.digitalshadows.com/blog-and-research/egregor-the-new-ransomware-variant-to-watch/]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Kacey, Charles, Alec, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:- REvil ransomware breathes new life into Gootkit malware - C-level email credentials listed for sale on a cybercriminal marketplace- Does REvil have ties to Maze and Egregor? A conversation about   source evaluation and attribution.- Spam Haus reports that thousands of IPV4 addresses are suddenly   coming alive - is more BGP abuse on the horizon?Get this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-4-december ***Resources from this week’s podcast***Gootkit: https://www.bleepingcomputer.com/news/security/gootkit-malware-returns-to-life-alongside-revil-ransomware/Threat actor sells accounts: https://www.zdnet.com/article/a-hacker-is-selling-access-to-the-email-accounts-of-hundreds-of-c-level-executives/REvil: https://twitter.com/campuscodi/status/1333462999105998848Spam Haus: https://www.reddit.com/r/blueteamsec/comments/k42sk7/suspicious_network_resurrections_spamhouse/?utm_source=share&amp;utm_medium=web2x&amp;context=32021 Predictions blog: https://www.digitalshadows.com/blog-and-research/2021-forecasts/2021 Predictions webinar: https://info.digitalshadows.com/2020Dec09-Live-Webinar-Predictions.htmlEgregor blog: https://www.digitalshadows.com/blog-and-research/egregor-the-new-ransomware-variant-to-watch/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461187-weekly-gootkit-revil-spam-haus-findings-and-more.mp3" length="13963708" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/qt3wvbve0w12bzh0luenkd85rset?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/941373253</guid>
    <pubDate>Fri, 04 Dec 2020 10:29:59 -0500</pubDate>
    <itunes:duration>1162</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Egregor Ransomware, IoT Regulations, Black Friday Threats and More!</itunes:title>
    <title>Weekly: Egregor Ransomware, IoT Regulations, Black Friday Threats and More!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Stefano, Adam and Dylan bring you the latest in threat intelligence. This week they cover: - QBot drops Prolock for Egregor ransomware- IoT new regulations - Black Friday threats and opportunities- Plus: The team discuss the malware name of the weekGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-27-november***Resources from this week’s podcast***Holiday Cybercrime Blog: https://www.digitalsh...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Stefano, Adam and Dylan bring you the latest in threat intelligence. This week they cover: - QBot drops Prolock for Egregor ransomware- IoT new regulations - Black Friday threats and opportunities- Plus: The team discuss the malware name of the weekGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-27-november***Resources from this week’s podcast***Holiday Cybercrime Blog: https://www.digitalshadows.com/blog-and-research/holiday-cybercrime-retail-risks-and-dark-web-kicks/Egregor: https://www.digitalshadows.com/blog-and-research/egregor-the-new-ransomware-variant-to-watch/]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Stefano, Adam and Dylan bring you the latest in threat intelligence. This week they cover: - QBot drops Prolock for Egregor ransomware- IoT new regulations - Black Friday threats and opportunities- Plus: The team discuss the malware name of the weekGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-27-november***Resources from this week’s podcast***Holiday Cybercrime Blog: https://www.digitalshadows.com/blog-and-research/holiday-cybercrime-retail-risks-and-dark-web-kicks/Egregor: https://www.digitalshadows.com/blog-and-research/egregor-the-new-ransomware-variant-to-watch/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461188-weekly-egregor-ransomware-iot-regulations-black-friday-threats-and-more.mp3" length="34898598" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ld2j9do4q09ucl82sgx2tm8l52of?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/938627962</guid>
    <pubDate>Mon, 30 Nov 2020 07:06:00 -0500</pubDate>
    <itunes:duration>2906</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: FunnyDream, Ragnar Locker on Facebook, and Egregor Ransom Notes</itunes:title>
    <title>Weekly: FunnyDream, Ragnar Locker on Facebook, and Egregor Ransom Notes</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Kacey, Alec, and Charles, bring you the latest in threat intelligence. This week they cover: - New Chinese APT group, FunnyDream, conducts a sophisticated cyber   espionage campaign targeting SE Asian government entities.- Ransomware operators want to be heard - Ragnar Locker turns to Facebook and Egregor begins printing   ransom notes.- Is Egregor the new Maze? Let's unpack this.- Plus, the team talks about their favorite Thanksgiving dish, plus a side   of footballGet this ...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Kacey, Alec, and Charles, bring you the latest in threat intelligence. This week they cover: - New Chinese APT group, FunnyDream, conducts a sophisticated cyber   espionage campaign targeting SE Asian government entities.- Ransomware operators want to be heard - Ragnar Locker turns to Facebook and Egregor begins printing   ransom notes.- Is Egregor the new Maze? Let&apos;s unpack this.- Plus, the team talks about their favorite Thanksgiving dish, plus a side   of footballGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-20-november ***Resources from this week’s podcast***FunnyDream: https://www.bitdefender.com/files/News/CaseStudies/study/379/Bitdefender-Whitepaper-Chinese-APT.pdfRagnar Locker: https://krebsonsecurity.com/2020/11/ransomware-group-turns-to-facebook-ads/Egregor: https://www.bleepingcomputer.com/news/security/retail-giant-cencosud-hit-by-egregor-ransomware-attack-stores-impacted/Darkside Blog: https://www.digitalshadows.com/blog-and-research/darkside-the-new-ransomware-group-behind-highly-targeted-attacks/Triangle InfoSecCons - Cybercrime Trends with Digital Shadows CISO Rick: https://www.youtube.com/watch?v=owBgVgiWFXMRansomware Trends in Q3 Webinar: https://resources.digitalshadows.com/webinars/ransomware-trends-in-q3Holiday Cybercrime Blog: https://www.digitalshadows.com/blog-and-research/holiday-cybercrime-retail-risks-and-dark-web-kicks/Digital Shadows in Security Mag: https://www.securitymagazine.com/articles/93950-cybercriminal-forum-offers-wisconsin-voter-data-for-free]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Kacey, Alec, and Charles, bring you the latest in threat intelligence. This week they cover: - New Chinese APT group, FunnyDream, conducts a sophisticated cyber   espionage campaign targeting SE Asian government entities.- Ransomware operators want to be heard - Ragnar Locker turns to Facebook and Egregor begins printing   ransom notes.- Is Egregor the new Maze? Let&apos;s unpack this.- Plus, the team talks about their favorite Thanksgiving dish, plus a side   of footballGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-20-november ***Resources from this week’s podcast***FunnyDream: https://www.bitdefender.com/files/News/CaseStudies/study/379/Bitdefender-Whitepaper-Chinese-APT.pdfRagnar Locker: https://krebsonsecurity.com/2020/11/ransomware-group-turns-to-facebook-ads/Egregor: https://www.bleepingcomputer.com/news/security/retail-giant-cencosud-hit-by-egregor-ransomware-attack-stores-impacted/Darkside Blog: https://www.digitalshadows.com/blog-and-research/darkside-the-new-ransomware-group-behind-highly-targeted-attacks/Triangle InfoSecCons - Cybercrime Trends with Digital Shadows CISO Rick: https://www.youtube.com/watch?v=owBgVgiWFXMRansomware Trends in Q3 Webinar: https://resources.digitalshadows.com/webinars/ransomware-trends-in-q3Holiday Cybercrime Blog: https://www.digitalshadows.com/blog-and-research/holiday-cybercrime-retail-risks-and-dark-web-kicks/Digital Shadows in Security Mag: https://www.securitymagazine.com/articles/93950-cybercriminal-forum-offers-wisconsin-voter-data-for-free]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461189-weekly-funnydream-ragnar-locker-on-facebook-and-egregor-ransom-notes.mp3" length="16142261" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/1w94vcaobb5jf9bu6wo3mw3ewqau?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/932954563</guid>
    <pubDate>Fri, 20 Nov 2020 11:51:43 -0500</pubDate>
    <itunes:duration>1343</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: RegretLocker, OceanLotus, Millions Seized in Cryptocurrency, and more!</itunes:title>
    <title>Weekly: RegretLocker, OceanLotus, Millions Seized in Cryptocurrency, and more!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Stefano, Kim, Dylan, and Adam bring you the latest in threat intelligence. This week they cover:  - RegretLocker’s approach to quickly encrypting files - how their   efficiency compares to counterpart Ryuk - Vx Underground’s code used in ransomware attacks- APT32, or OceanLotus, using social media and news sites to draw in   users and redirect them to phishing pages - U.S. DoJ seizes $24 Million in cryptocurrency, assisting the Brazilian   governmentGet this week’s intelligen...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Stefano, Kim, Dylan, and Adam bring you the latest in threat intelligence. This week they cover:  - RegretLocker’s approach to quickly encrypting files - how their   efficiency compares to counterpart Ryuk - Vx Underground’s code used in ransomware attacks- APT32, or OceanLotus, using social media and news sites to draw in   users and redirect them to phishing pages - U.S. DoJ seizes $24 Million in cryptocurrency, assisting the Brazilian   governmentGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-13-november ***Resources from this week’s podcast***RegretLocker Ransomware: https://www.bleepingcomputer.com/news/security/new-regretlocker-ransomware-targets-windows-virtual-machines/Vx Underground: https://twitter.com/smelly__vx/status/1323849544145211392https://twitter.com/vxunderground/status/1326055110292729856OceanLotus: https://www.volexity.com/blog/2020/11/06/oceanlotus-extending-cyber-espionage-operations-through-fake-websites/U.S. Seizes Virtual Currency: https://www.justice.gov/opa/pr/us-seizes-virtual-currencies-valued-24-million-assisting-brazil-major-internet-fraud)https://www.cyberscoop.com/silk-road-bitcoin-billion-wallet/Bitcoin vs. Monero Blog: https://www.digitalshadows.com/blog-and-research/bitcoin-vs-monero/ Evolution of DDoS: https://www.digitalshadows.com/blog-and-research/the-evolution-of-ddos-activity-in-2020]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Stefano, Kim, Dylan, and Adam bring you the latest in threat intelligence. This week they cover:  - RegretLocker’s approach to quickly encrypting files - how their   efficiency compares to counterpart Ryuk - Vx Underground’s code used in ransomware attacks- APT32, or OceanLotus, using social media and news sites to draw in   users and redirect them to phishing pages - U.S. DoJ seizes $24 Million in cryptocurrency, assisting the Brazilian   governmentGet this week’s intelligence summary at: https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-13-november ***Resources from this week’s podcast***RegretLocker Ransomware: https://www.bleepingcomputer.com/news/security/new-regretlocker-ransomware-targets-windows-virtual-machines/Vx Underground: https://twitter.com/smelly__vx/status/1323849544145211392https://twitter.com/vxunderground/status/1326055110292729856OceanLotus: https://www.volexity.com/blog/2020/11/06/oceanlotus-extending-cyber-espionage-operations-through-fake-websites/U.S. Seizes Virtual Currency: https://www.justice.gov/opa/pr/us-seizes-virtual-currencies-valued-24-million-assisting-brazil-major-internet-fraud)https://www.cyberscoop.com/silk-road-bitcoin-billion-wallet/Bitcoin vs. Monero Blog: https://www.digitalshadows.com/blog-and-research/bitcoin-vs-monero/ Evolution of DDoS: https://www.digitalshadows.com/blog-and-research/the-evolution-of-ddos-activity-in-2020]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461190-weekly-regretlocker-oceanlotus-millions-seized-in-cryptocurrency-and-more.mp3" length="36361991" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/al0rdrm7tg1hr19pr3s13f419477?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/928708174</guid>
    <pubDate>Fri, 13 Nov 2020 12:17:42 -0500</pubDate>
    <itunes:duration>3028</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Election Update, Kimsuky Activity, Maze Group Announces Closing, Wroba Mobile Malware</itunes:title>
    <title>Weekly: Election Update, Kimsuky Activity, Maze Group Announces Closing, Wroba Mobile Malware</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Kacey, Alec, Charles and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:- Election update - Because that’s what’s on many people’s minds right now- North Korean Group Kimsuky Targets Government Agencies With New Malware - Maze Group announces closing of its operations- Wroba mobile malware targets US smartphones - Plus: Group discusses Guy FawkesGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-in...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Kacey, Alec, Charles and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:- Election update - Because that’s what’s on many people’s minds right now- North Korean Group Kimsuky Targets Government Agencies With New Malware - Maze Group announces closing of its operations- Wroba mobile malware targets US smartphones - Plus: Group discusses Guy FawkesGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-06-november-2020***Resources from this week’s podcast***Clickbait to Checkmate: https://www.digitalshadows.com/blog-and-research/sms-based-scam-targets-us-smartphones-and-accesses-victim-locations/Glossary: https://www.digitalshadows.com/blog-and-research/a-glossary-of-cybercriminal-access-offerings/Phillip Wylie Podcast: https://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk/special-guest-phillip-wylie-talks-origin-story-bear-wrestling-and-much-more]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Kacey, Alec, Charles and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:- Election update - Because that’s what’s on many people’s minds right now- North Korean Group Kimsuky Targets Government Agencies With New Malware - Maze Group announces closing of its operations- Wroba mobile malware targets US smartphones - Plus: Group discusses Guy FawkesGet this week’s intelligence summary at: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-06-november-2020***Resources from this week’s podcast***Clickbait to Checkmate: https://www.digitalshadows.com/blog-and-research/sms-based-scam-targets-us-smartphones-and-accesses-victim-locations/Glossary: https://www.digitalshadows.com/blog-and-research/a-glossary-of-cybercriminal-access-offerings/Phillip Wylie Podcast: https://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk/special-guest-phillip-wylie-talks-origin-story-bear-wrestling-and-much-more]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461191-weekly-election-update-kimsuky-activity-maze-group-announces-closing-wroba-mobile-malware.mp3" length="14766268" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/tj2rrf5dcc7q0bpbk9p0akpuda4t?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/924662887</guid>
    <pubDate>Fri, 06 Nov 2020 16:50:04 -0500</pubDate>
    <itunes:duration>1229</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Guest Phillip Wylie Talks Origin Story, Bear Wrestling, and Much More!</itunes:title>
    <title>Special: Guest Phillip Wylie Talks Origin Story, Bear Wrestling, and Much More!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Kacey, Charles, and Digital Shadows CISO Rick chat with Phillip Wylie about his origin story, his brief foray into professional wrestling, and so much more. This isn’t one to miss!***Resources from this week’s podcast***Grab Phillip’s Book - The Pentester BluePrint: Your Guide to Being a Pentester: https://www.amazon.com/Pentester-BluePrint-Your-Guide-Being/dp/1119684307 Innocent Lives Foundation (@innocentorg): https://www.innocentlivesfoundation.org/donate/ Pwn School proje...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Kacey, Charles, and Digital Shadows CISO Rick chat with Phillip Wylie about his origin story, his brief foray into professional wrestling, and so much more. This isn’t one to miss!***Resources from this week’s podcast***Grab Phillip’s Book - The Pentester BluePrint: Your Guide to Being a Pentester: https://www.amazon.com/Pentester-BluePrint-Your-Guide-Being/dp/1119684307 Innocent Lives Foundation (@innocentorg): https://www.innocentlivesfoundation.org/donate/ Pwn School project: https://twitter.com/schoolpwn Follow Phillip on Twitter: https://twitter.com/PhillipWylie]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Kacey, Charles, and Digital Shadows CISO Rick chat with Phillip Wylie about his origin story, his brief foray into professional wrestling, and so much more. This isn’t one to miss!***Resources from this week’s podcast***Grab Phillip’s Book - The Pentester BluePrint: Your Guide to Being a Pentester: https://www.amazon.com/Pentester-BluePrint-Your-Guide-Being/dp/1119684307 Innocent Lives Foundation (@innocentorg): https://www.innocentlivesfoundation.org/donate/ Pwn School project: https://twitter.com/schoolpwn Follow Phillip on Twitter: https://twitter.com/PhillipWylie]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461192-special-guest-phillip-wylie-talks-origin-story-bear-wrestling-and-much-more.mp3" length="29589174" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/4pd1ag5wb4718qooz3l9asv5ozep?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/920444989</guid>
    <pubDate>Fri, 30 Oct 2020 13:06:27 -0400</pubDate>
    <itunes:duration>2464</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: The Team Gets Spooky with Fancy Bear, Ryuk, and More!</itunes:title>
    <title>Weekly: The Team Gets Spooky with Fancy Bear, Ryuk, and More!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Stefano, Dylan, Adam, and Kim bring you the latest in threat intelligence. This week they cover:- EU slaps sanctions on GRU leader, Fancy Bear- Kim discusses the latest on Ryuk and provides insight on its evolution- Breach against Finnish psychotherapy giant Vastaamo - patients   getting targeted for ransom- Plus, a little Halloween fun! Get this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-30-october-2020 ***R...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Stefano, Dylan, Adam, and Kim bring you the latest in threat intelligence. This week they cover:- EU slaps sanctions on GRU leader, Fancy Bear- Kim discusses the latest on Ryuk and provides insight on its evolution- Breach against Finnish psychotherapy giant Vastaamo - patients   getting targeted for ransom- Plus, a little Halloween fun! Get this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-30-october-2020 ***Resources from this week’s podcast***Sanctions on Fancy Bear: https://www.cyberscoop.com/eu-gru-fancy-bear-bundestag-russia/Ryuk: https://labs.sentinelone.com/an-inside-look-at-how-ryuk-evolved-its-encryption-and-evasion-techniques/  and https://www.soprasteria.com/newsroom/press-releases/details/cyberattack-information-update Hackers blackmailing patients: https://threatpost.com/vastaamo-hackers-blackmailing-therapy-patients/160536/ NCSAM - Future of Connected Devices: https://www.digitalshadows.com/blog-and-research/cybersecurity-awareness-month-week-4-the-future-of-connected-devices/]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Stefano, Dylan, Adam, and Kim bring you the latest in threat intelligence. This week they cover:- EU slaps sanctions on GRU leader, Fancy Bear- Kim discusses the latest on Ryuk and provides insight on its evolution- Breach against Finnish psychotherapy giant Vastaamo - patients   getting targeted for ransom- Plus, a little Halloween fun! Get this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-30-october-2020 ***Resources from this week’s podcast***Sanctions on Fancy Bear: https://www.cyberscoop.com/eu-gru-fancy-bear-bundestag-russia/Ryuk: https://labs.sentinelone.com/an-inside-look-at-how-ryuk-evolved-its-encryption-and-evasion-techniques/  and https://www.soprasteria.com/newsroom/press-releases/details/cyberattack-information-update Hackers blackmailing patients: https://threatpost.com/vastaamo-hackers-blackmailing-therapy-patients/160536/ NCSAM - Future of Connected Devices: https://www.digitalshadows.com/blog-and-research/cybersecurity-awareness-month-week-4-the-future-of-connected-devices/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461193-weekly-the-team-gets-spooky-with-fancy-bear-ryuk-and-more.mp3" length="32848999" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/grr7rysrymfzymbb9k1bgw6llr4e?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/920422165</guid>
    <pubDate>Fri, 30 Oct 2020 12:25:18 -0400</pubDate>
    <itunes:duration>2735</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: SandWorm Indicted by DOJ, Darkside Has A Soft Spot, and Ryuk&#39;s Super Speedy Attack!</itunes:title>
    <title>Weekly: SandWorm Indicted by DOJ, Darkside Has A Soft Spot, and Ryuk&#39;s Super Speedy Attack!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Kacey, Alec, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:- SandWorm and its link to Russia’s GRU - what’s their history and what   does this mean?- The Darkside ransomware group takes a philanthropic approach to   cybercrime- Ryuk leverages Bazar Loader and Zerologon vulnerability in their   recent (and very speedy) attack- Plus: The group discusses their favorite WiFi namesGet this week’s intelligence summary at htt...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Kacey, Alec, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:- SandWorm and its link to Russia’s GRU - what’s their history and what   does this mean?- The Darkside ransomware group takes a philanthropic approach to   cybercrime- Ryuk leverages Bazar Loader and Zerologon vulnerability in their   recent (and very speedy) attack- Plus: The group discusses their favorite WiFi namesGet this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-23-october-2020 ***Resources from this week’s podcast***GRU Indictment: https://www.justice.gov/opa/press-release/file/1328521/downloadDarkside: https://www.zdnet.com/article/ransomware-gang-donates-part-of-ransom-demands-to-charity-organizations/Ryuk: https://thedfirreport.com/2020/10/18/ryuk-in-5-hours/Charitable Cybercriminals Blog: https://www.digitalshadows.com/blog-and-research/charitable-endeavors-on-cybercriminal-forums/Digital Shadows Darkside Blog: https://www.digitalshadows.com/blog-and-research/darkside-the-new-ransomware-group-behind-highly-targeted-attacks/High Profile Arrests Blog: https://www.digitalshadows.com/blog-and-research/recent-arrests-and-high-profile-convictions-what-does-it-mean-for-the-cyber-threat-landscape/Ransomware Trend Q3 Blog: https://www.digitalshadows.com/blog-and-research/ransomware-trends-in-q3/Dark Pathways Into Cybercrime Blog: https://www.digitalshadows.com/blog-and-research/dark-pathways-into-cybercrime-minding-the-threat-actor-talent-gap/]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Kacey, Alec, Austin, and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:- SandWorm and its link to Russia’s GRU - what’s their history and what   does this mean?- The Darkside ransomware group takes a philanthropic approach to   cybercrime- Ryuk leverages Bazar Loader and Zerologon vulnerability in their   recent (and very speedy) attack- Plus: The group discusses their favorite WiFi namesGet this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-23-october-2020 ***Resources from this week’s podcast***GRU Indictment: https://www.justice.gov/opa/press-release/file/1328521/downloadDarkside: https://www.zdnet.com/article/ransomware-gang-donates-part-of-ransom-demands-to-charity-organizations/Ryuk: https://thedfirreport.com/2020/10/18/ryuk-in-5-hours/Charitable Cybercriminals Blog: https://www.digitalshadows.com/blog-and-research/charitable-endeavors-on-cybercriminal-forums/Digital Shadows Darkside Blog: https://www.digitalshadows.com/blog-and-research/darkside-the-new-ransomware-group-behind-highly-targeted-attacks/High Profile Arrests Blog: https://www.digitalshadows.com/blog-and-research/recent-arrests-and-high-profile-convictions-what-does-it-mean-for-the-cyber-threat-landscape/Ransomware Trend Q3 Blog: https://www.digitalshadows.com/blog-and-research/ransomware-trends-in-q3/Dark Pathways Into Cybercrime Blog: https://www.digitalshadows.com/blog-and-research/dark-pathways-into-cybercrime-minding-the-threat-actor-talent-gap/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461194-weekly-sandworm-indicted-by-doj-darkside-has-a-soft-spot-and-ryuk-s-super-speedy-attack.mp3" length="18279629" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/413pbeonwwevblbjw29zm4xhp7f0?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/916662631</guid>
    <pubDate>Fri, 23 Oct 2020 12:48:36 -0400</pubDate>
    <itunes:duration>1521</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Microsoft Derails Trickbot, Ransomware Running Rampant, Fitbit Customers At Risk, and More!</itunes:title>
    <title>Weekly: Microsoft Derails Trickbot, Ransomware Running Rampant, Fitbit Customers At Risk, and More!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Viktoria, Adam, Stefano, and Dylan bring you the latest in threat intelligence. This week they cover:- Microsoft: Derailing trickbot, which threatened the US election- Ransomware: The stories that go unreported and why we should care- Fitbit: Customers data at risk following spyware creation by   researchers- “Data” - Can the team resist saying it?Get this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-16-october...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Viktoria, Adam, Stefano, and Dylan bring you the latest in threat intelligence. This week they cover:- Microsoft: Derailing trickbot, which threatened the US election- Ransomware: The stories that go unreported and why we should care- Fitbit: Customers data at risk following spyware creation by   researchers- “Data” - Can the team resist saying it?Get this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-16-october-2020 ***Resources from this week’s podcast***Microsoft Take Down: https://www.microsoft.com/security/blog/2020/10/12/trickbot-disrupted/Europol: https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2020Fitbit: https://threatpost.com/fitbit-personal-data-watch-face/160003/ Europol Analysis: https://www.digitalshadows.com/blog-and-research/digital-shadows-analysis-of-europols-cybercrime-report/ NCSA Month Week 2 - Security Devices at Home: https://www.digitalshadows.com/blog-and-research/cybersecurity-awareness-month-week-2-security-devices-at-home-and-work/ US SMS Scam: https://www.digitalshadows.com/blog-and-research/sms-based-scam-targets-us-smartphones-and-accesses-victim-locations/]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Viktoria, Adam, Stefano, and Dylan bring you the latest in threat intelligence. This week they cover:- Microsoft: Derailing trickbot, which threatened the US election- Ransomware: The stories that go unreported and why we should care- Fitbit: Customers data at risk following spyware creation by   researchers- “Data” - Can the team resist saying it?Get this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-16-october-2020 ***Resources from this week’s podcast***Microsoft Take Down: https://www.microsoft.com/security/blog/2020/10/12/trickbot-disrupted/Europol: https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2020Fitbit: https://threatpost.com/fitbit-personal-data-watch-face/160003/ Europol Analysis: https://www.digitalshadows.com/blog-and-research/digital-shadows-analysis-of-europols-cybercrime-report/ NCSA Month Week 2 - Security Devices at Home: https://www.digitalshadows.com/blog-and-research/cybersecurity-awareness-month-week-2-security-devices-at-home-and-work/ US SMS Scam: https://www.digitalshadows.com/blog-and-research/sms-based-scam-targets-us-smartphones-and-accesses-victim-locations/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461195-weekly-microsoft-derails-trickbot-ransomware-running-rampant-fitbit-customers-at-risk-and-more.mp3" length="28091017" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/7c5gszpuyzxd9b6zrjtdflg42tv2?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/911699950</guid>
    <pubDate>Fri, 16 Oct 2020 11:17:23 -0400</pubDate>
    <itunes:duration>2339</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Guest Marcus Carey Talks Origin Story, BBQ, Diversity, and More!</itunes:title>
    <title>Special: Guest Marcus Carey Talks Origin Story, BBQ, Diversity, and More!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Kacey, Charles, and Digital Shadows CISO Rick are joined by special guest Marcus Carey. In this episode they cover:- Marcus’s origin story including his time in the Navy and the NSA- The Austin food scene - BBQ is always on the menu- Marcus talks mentoring and helping others find their “superpower”- The team discusses Marcus’s books for children and how to ensure   diversity in the workplaceVisit the blog for this episode by Digital Shadows CISO Rick: www.digitalshadows.com/b...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Kacey, Charles, and Digital Shadows CISO Rick are joined by special guest Marcus Carey. In this episode they cover:- Marcus’s origin story including his time in the Navy and the NSA- The Austin food scene - BBQ is always on the menu- Marcus talks mentoring and helping others find their “superpower”- The team discusses Marcus’s books for children and how to ensure   diversity in the workplaceVisit the blog for this episode by Digital Shadows CISO Rick: www.digitalshadows.com/blog-and-research/marcus-carey-joins-shadowtalk/***Resources from this week’s podcast***Twitter: https://twitter.com/marcusjcareyLinkedIn: https://www.linkedin.com/in/marcuscarey/Tribe of Hackers: https://www.tribeofhackers.comAn Anti-Racism Checklist: Supporting Black Employees in Tech https://venturebeat.com/2020/09/19/an-anti-racism-checklist-supporting-black-employees-in-tech/Marcus’s Books on Amazon: https://www.amazon.com/Marcus-J-Carey/e/B07MFWJPGV/ref=dp_byline_cont_book_1]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Kacey, Charles, and Digital Shadows CISO Rick are joined by special guest Marcus Carey. In this episode they cover:- Marcus’s origin story including his time in the Navy and the NSA- The Austin food scene - BBQ is always on the menu- Marcus talks mentoring and helping others find their “superpower”- The team discusses Marcus’s books for children and how to ensure   diversity in the workplaceVisit the blog for this episode by Digital Shadows CISO Rick: www.digitalshadows.com/blog-and-research/marcus-carey-joins-shadowtalk/***Resources from this week’s podcast***Twitter: https://twitter.com/marcusjcareyLinkedIn: https://www.linkedin.com/in/marcuscarey/Tribe of Hackers: https://www.tribeofhackers.comAn Anti-Racism Checklist: Supporting Black Employees in Tech https://venturebeat.com/2020/09/19/an-anti-racism-checklist-supporting-black-employees-in-tech/Marcus’s Books on Amazon: https://www.amazon.com/Marcus-J-Carey/e/B07MFWJPGV/ref=dp_byline_cont_book_1]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461196-special-guest-marcus-carey-talks-origin-story-bbq-diversity-and-more.mp3" length="35969518" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/qw7tcc2ay2087nw139gfeqyvyzgr?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/909863332</guid>
    <pubDate>Tue, 13 Oct 2020 11:05:43 -0400</pubDate>
    <itunes:duration>2996</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Sanctions from the DOT, Fancy Bear Targets the US Government, and Foreign Spies in Disguise!</itunes:title>
    <title>Weekly: Sanctions from the DOT, Fancy Bear Targets the US Government, and Foreign Spies in Disguise!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Kacey, Alec, Charles and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover: - The US Department of Treasury sends a message about negotiating   with ransomware operators - APT28 compromises a US federal agency- Foreign spies use fronts to hide cyber espionage operations- Iranian nation-state threat actors leverage Zerologon flaw to carry out   attacksGet this week’s intelligence summary at https://resources.digitalshadows.com/digitals...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Kacey, Alec, Charles and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover: - The US Department of Treasury sends a message about negotiating   with ransomware operators - APT28 compromises a US federal agency- Foreign spies use fronts to hide cyber espionage operations- Iranian nation-state threat actors leverage Zerologon flaw to carry out   attacksGet this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-09-october-2020 ***Resources from this week’s podcast***Sanctions for ransomware: https://threatpost.com/mixed-sanctions-ransomware-negotiators/159795/APT28: https://www.wired.com/story/russias-fancy-bear-hack-us-federal-agency/Foreign spies: https://www.cyberscoop.com/chinese-iranian-hackers-front-companies/Zerologon: https://threatpost.com/microsoft-zerologon-attack-iranian-actors/159874/Bitcoin vs. Monero Blog: https://www.digitalshadows.com/blog-and-research/bitcoin-vs-monero/]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Kacey, Alec, Charles and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover: - The US Department of Treasury sends a message about negotiating   with ransomware operators - APT28 compromises a US federal agency- Foreign spies use fronts to hide cyber espionage operations- Iranian nation-state threat actors leverage Zerologon flaw to carry out   attacksGet this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-09-october-2020 ***Resources from this week’s podcast***Sanctions for ransomware: https://threatpost.com/mixed-sanctions-ransomware-negotiators/159795/APT28: https://www.wired.com/story/russias-fancy-bear-hack-us-federal-agency/Foreign spies: https://www.cyberscoop.com/chinese-iranian-hackers-front-companies/Zerologon: https://threatpost.com/microsoft-zerologon-attack-iranian-actors/159874/Bitcoin vs. Monero Blog: https://www.digitalshadows.com/blog-and-research/bitcoin-vs-monero/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461197-weekly-sanctions-from-the-dot-fancy-bear-targets-the-us-government-and-foreign-spies-in-disguise.mp3" length="15216266" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ax4yrzuie6vzqh34qjecgwxv76h9?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/907749952</guid>
    <pubDate>Fri, 09 Oct 2020 11:10:57 -0400</pubDate>
    <itunes:duration>1266</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: It’s A Ransomware Roundup: Mount Locker, Old Gremlin, REvil, and More!</itunes:title>
    <title>Weekly: It’s A Ransomware Roundup: Mount Locker, Old Gremlin, REvil, and More!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Adam, Kim, Stefano and Dylan bring you the latest in threat intelligence. This week they cover:- Mount Locker trying to extort 7+ figures from its victims- Old Gremlin - the team talks new activity attributed to this group- REvil looking for new affiliates and flexing with bitcoin - Healthcare hack has severe repercussions  - Attackers exploit Zerologon vulnerability - Joker Trojan infects Google Play Store for Android - what we know- Celebrating Cyber Awareness Month with ga...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Adam, Kim, Stefano and Dylan bring you the latest in threat intelligence. This week they cover:- Mount Locker trying to extort 7+ figures from its victims- Old Gremlin - the team talks new activity attributed to this group- REvil looking for new affiliates and flexing with bitcoin - Healthcare hack has severe repercussions  - Attackers exploit Zerologon vulnerability - Joker Trojan infects Google Play Store for Android - what we know- Celebrating Cyber Awareness Month with games and moreGet this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-02-october-2020***Resources from this week’s podcast***Old Gremlin: https://www.group-ib.com/blog/oldgremlin Mount Locker Ransomware: https://www.bleepingcomputer.com/news/security/mount-locker-ransomware-joins-the-multi-million-dollar-ransom-game/ REvil Ransomware: https://www.bleepingcomputer.com/news/security/revil-ransomware-deposits-1-million-in-hacker-recruitment-drive/ Zerologon: https://www.infosecurity-magazine.com/news/zerologon-windows-server-flaw/ Joker Trojan: https://threatpost.com/joker-trojans-android/159595/ Most Hacked Passwords: https://www.ncsc.gov.uk/news/most-hacked-passwords-revealed-as-uk-cyber-survey-exposes-gaps-in-online-security Pwned Websites: https://haveibeenpwned.com/PwnedWebsites Darkside blog: https://www.digitalshadows.com/blog-and-research/darkside-the-new-ransomware-group-behind-highly-targeted-attacks/]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Adam, Kim, Stefano and Dylan bring you the latest in threat intelligence. This week they cover:- Mount Locker trying to extort 7+ figures from its victims- Old Gremlin - the team talks new activity attributed to this group- REvil looking for new affiliates and flexing with bitcoin - Healthcare hack has severe repercussions  - Attackers exploit Zerologon vulnerability - Joker Trojan infects Google Play Store for Android - what we know- Celebrating Cyber Awareness Month with games and moreGet this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-02-october-2020***Resources from this week’s podcast***Old Gremlin: https://www.group-ib.com/blog/oldgremlin Mount Locker Ransomware: https://www.bleepingcomputer.com/news/security/mount-locker-ransomware-joins-the-multi-million-dollar-ransom-game/ REvil Ransomware: https://www.bleepingcomputer.com/news/security/revil-ransomware-deposits-1-million-in-hacker-recruitment-drive/ Zerologon: https://www.infosecurity-magazine.com/news/zerologon-windows-server-flaw/ Joker Trojan: https://threatpost.com/joker-trojans-android/159595/ Most Hacked Passwords: https://www.ncsc.gov.uk/news/most-hacked-passwords-revealed-as-uk-cyber-survey-exposes-gaps-in-online-security Pwned Websites: https://haveibeenpwned.com/PwnedWebsites Darkside blog: https://www.digitalshadows.com/blog-and-research/darkside-the-new-ransomware-group-behind-highly-targeted-attacks/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461198-weekly-it-s-a-ransomware-roundup-mount-locker-old-gremlin-revil-and-more.mp3" length="28747193" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/crysrh37rlwyh8quzrt7lr1c6r6w?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/903411703</guid>
    <pubDate>Fri, 02 Oct 2020 09:33:01 -0400</pubDate>
    <itunes:duration>2394</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Law Enforcement Cracks Down On Cybercriminals, Fancy Bear Goes Phishing, And More</itunes:title>
    <title>Weekly: Law Enforcement Cracks Down On Cybercriminals, Fancy Bear Goes Phishing, And More</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Kacey, Charles, Alec and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:-A member of TheDarkOverlord was sentenced to multiple years in  prison, APT41 members have been charged with computer crimes, and  179 cybercriminals have been arrested for pushing illicit drugs and  weapons on criminal marketplaces.-Fancy Bear activity uses NATO training documents for a phishing  campaign-Activision suffers a potential data breach - what we k...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Kacey, Charles, Alec and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:-A member of TheDarkOverlord was sentenced to multiple years in  prison, APT41 members have been charged with computer crimes, and  179 cybercriminals have been arrested for pushing illicit drugs and  weapons on criminal marketplaces.-Fancy Bear activity uses NATO training documents for a phishing  campaign-Activision suffers a potential data breach - what we know-University Hospital targeted by ransomware attack - the team discusses  the falloutGet this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-25-september-2020 ***Resources from this week’s podcast***Dark Overlord: https://securityaffairs.co/wordpress/108599/cyber-crime/the-dark-overlord-group-member-sentence.html?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=the-dark-overlord-group-member-sentenceAPT41: https://techcrunch.com/2020/09/16/justice-department-charges-apt41-chinese-hackers/?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAANj1ao-t2OsjXeOqgLz3US1ZkDpaX5RiLvv2kDHGEQV5BemCfHZcLxOmEja-NawLGOwxwCL8IwjIc5HN2Gl0gPjqYzRVUxyK8_vrC5XleANawX6KANKYzLUmnl9OSYTFtSOu6CGWx-pRNK12tKqvbvi5dsVEcQHotxktiwUv0DtaDark Web Drug Raid: https://www.bbc.com/news/technology-54247529 Fancy Bear: https://www.bleepingcomputer.com/news/security/russian-hackers-use-fake-nato-training-docs-to-breach-govt-networks/Activision Hack: https://www.forbes.com/sites/daveywinder/2020/09/21/activision-accounts-hacked-500000-call-of-duty-players-could-be-affected-report/#12ed502c7bbeUniversity Hospital Hack: https://www.cyberscoop.com/germany-ransomware-homicide-duesseldorf-hospital/]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Kacey, Charles, Alec and Digital Shadows CISO Rick bring you the latest in threat intelligence. This week they cover:-A member of TheDarkOverlord was sentenced to multiple years in  prison, APT41 members have been charged with computer crimes, and  179 cybercriminals have been arrested for pushing illicit drugs and  weapons on criminal marketplaces.-Fancy Bear activity uses NATO training documents for a phishing  campaign-Activision suffers a potential data breach - what we know-University Hospital targeted by ransomware attack - the team discusses  the falloutGet this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-25-september-2020 ***Resources from this week’s podcast***Dark Overlord: https://securityaffairs.co/wordpress/108599/cyber-crime/the-dark-overlord-group-member-sentence.html?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=the-dark-overlord-group-member-sentenceAPT41: https://techcrunch.com/2020/09/16/justice-department-charges-apt41-chinese-hackers/?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAANj1ao-t2OsjXeOqgLz3US1ZkDpaX5RiLvv2kDHGEQV5BemCfHZcLxOmEja-NawLGOwxwCL8IwjIc5HN2Gl0gPjqYzRVUxyK8_vrC5XleANawX6KANKYzLUmnl9OSYTFtSOu6CGWx-pRNK12tKqvbvi5dsVEcQHotxktiwUv0DtaDark Web Drug Raid: https://www.bbc.com/news/technology-54247529 Fancy Bear: https://www.bleepingcomputer.com/news/security/russian-hackers-use-fake-nato-training-docs-to-breach-govt-networks/Activision Hack: https://www.forbes.com/sites/daveywinder/2020/09/21/activision-accounts-hacked-500000-call-of-duty-players-could-be-affected-report/#12ed502c7bbeUniversity Hospital Hack: https://www.cyberscoop.com/germany-ransomware-homicide-duesseldorf-hospital/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461199-weekly-law-enforcement-cracks-down-on-cybercriminals-fancy-bear-goes-phishing-and-more.mp3" length="15729145" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/m9ho1atg3qx2pe4x26x8a7rjevsa?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/899554186</guid>
    <pubDate>Fri, 25 Sep 2020 14:12:59 -0400</pubDate>
    <itunes:duration>1309</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Discussing Deception with Chris Sanders</itunes:title>
    <title>Special: Discussing Deception with Chris Sanders</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Kacey, Charles, and Digital Shadows CISO Rick are joined by Information Security Analyst and author Chris Sanders. The team talk BBQ and Chris’s new book Intrusion Detection Honeypots: Detection through Deception. Resources from the podcast:-Read Rick's Blog Recap: www.digitalshadows.com/blog-and-  research/discussing-deception-with-chris-sanders/-Chris’s Book Intrusion Detection Honeypots: Detection through  Deception: https://www.amazon.com/Intrusion-Detection-Honeypots-  t...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Kacey, Charles, and Digital Shadows CISO Rick are joined by Information Security Analyst and author Chris Sanders. The team talk BBQ and Chris’s new book Intrusion Detection Honeypots: Detection through Deception. Resources from the podcast:-Read Rick&apos;s Blog Recap: www.digitalshadows.com/blog-and-  research/discussing-deception-with-chris-sanders/-Chris’s Book Intrusion Detection Honeypots: Detection through  Deception: https://www.amazon.com/Intrusion-Detection-Honeypots-  through-Deception-ebook/dp/B08GP8X86L -Rural Tech Fund: https://ruraltechfund.org/mission/ -The Cuckoo’s Egg Course:  https://chrissanders.org/training/cuckoosegg/ -Chris&apos;s Website: https://chrissanders.org/ -Chris’s Twitter: https://twitter.com/chrissanders88 -Chris’s LinkedIn: https://www.linkedin.com/in/chrissanders88/ -Email Chris at chrissanders.orgAdditional Links:-SANS CTI Summit Keynote Cliff Stoll: https://www.youtube.com/watch?  v=1h7rLHNXio8 -The Cuckoo’s Egg by Cliff Stoll: https://www.amazon.com/Cuckoos-Egg-  Tracking-Computer-Espionage/dp/1416507787]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Kacey, Charles, and Digital Shadows CISO Rick are joined by Information Security Analyst and author Chris Sanders. The team talk BBQ and Chris’s new book Intrusion Detection Honeypots: Detection through Deception. Resources from the podcast:-Read Rick&apos;s Blog Recap: www.digitalshadows.com/blog-and-  research/discussing-deception-with-chris-sanders/-Chris’s Book Intrusion Detection Honeypots: Detection through  Deception: https://www.amazon.com/Intrusion-Detection-Honeypots-  through-Deception-ebook/dp/B08GP8X86L -Rural Tech Fund: https://ruraltechfund.org/mission/ -The Cuckoo’s Egg Course:  https://chrissanders.org/training/cuckoosegg/ -Chris&apos;s Website: https://chrissanders.org/ -Chris’s Twitter: https://twitter.com/chrissanders88 -Chris’s LinkedIn: https://www.linkedin.com/in/chrissanders88/ -Email Chris at chrissanders.orgAdditional Links:-SANS CTI Summit Keynote Cliff Stoll: https://www.youtube.com/watch?  v=1h7rLHNXio8 -The Cuckoo’s Egg by Cliff Stoll: https://www.amazon.com/Cuckoos-Egg-  Tracking-Computer-Espionage/dp/1416507787]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461200-special-discussing-deception-with-chris-sanders.mp3" length="36700792" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/de4ykk2h4cj1grs9usxraqvf9pie?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/898971553</guid>
    <pubDate>Thu, 24 Sep 2020 15:08:14 -0400</pubDate>
    <itunes:duration>3056</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Ed Merrett Joins To Talk HackableYou And The Latest In Threat Intel</itunes:title>
    <title>Weekly: Ed Merrett Joins To Talk HackableYou And The Latest In Threat Intel</title>
    <itunes:summary><![CDATA[This week, Viktoria is joined by ShadowTalk residents Adam and Kim, and on this episode, they speak to guest Ed Merrett, founder of HackableYou, the cybersecurity podcast. Viktoria speaks to Ed Merrett about why he set up HackableYou, then together the team unpack the latest stories, including:-Magento Online Stores: 1,000 stores affected by card skimming-ZeroLogon (CVE-2020-1472) - Critical severity Vulnerability: Impact &amp;  Mitigation-US Election: New campaigns observed targeting politic...]]></itunes:summary>
    <description><![CDATA[This week, Viktoria is joined by ShadowTalk residents Adam and Kim, and on this episode, they speak to guest Ed Merrett, founder of HackableYou, the cybersecurity podcast. Viktoria speaks to Ed Merrett about why he set up HackableYou, then together the team unpack the latest stories, including:-Magento Online Stores: 1,000 stores affected by card skimming-ZeroLogon (CVE-2020-1472) - Critical severity Vulnerability: Impact &amp;  Mitigation-US Election: New campaigns observed targeting political candidatesGet our Weekly Intelligence Summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-18-september-2020To listen to Ed’s podcast, visit HackableYou: https://hackableyou.com/podcast/]]></description>
    <content:encoded><![CDATA[This week, Viktoria is joined by ShadowTalk residents Adam and Kim, and on this episode, they speak to guest Ed Merrett, founder of HackableYou, the cybersecurity podcast. Viktoria speaks to Ed Merrett about why he set up HackableYou, then together the team unpack the latest stories, including:-Magento Online Stores: 1,000 stores affected by card skimming-ZeroLogon (CVE-2020-1472) - Critical severity Vulnerability: Impact &amp;  Mitigation-US Election: New campaigns observed targeting political candidatesGet our Weekly Intelligence Summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-18-september-2020To listen to Ed’s podcast, visit HackableYou: https://hackableyou.com/podcast/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461201-weekly-ed-merrett-joins-to-talk-hackableyou-and-the-latest-in-threat-intel.mp3" length="24362877" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/q26mm4gbd3x933atq9v74675zei1?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/895533430</guid>
    <pubDate>Fri, 18 Sep 2020 13:09:59 -0400</pubDate>
    <itunes:duration>2028</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: The Team Talks Baka, Epic Manchego, and Smaug, Plus Emotet Rides Again</itunes:title>
    <title>Weekly: The Team Talks Baka, Epic Manchego, and Smaug, Plus Emotet Rides Again</title>
    <itunes:summary><![CDATA[This week’s host Kacey is joined by Charles and Alec to bring you the latest in threat intelligence. In this episode they cover: - Visa issues a warning about new credit card skimmer “Baka”- Epic Manchego - Atypical malicious document delivery- What is Smaug and how does it operate?- Emotet - are there new developments and why did France send an advisory?Get this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-11-september-2020 **...]]></itunes:summary>
    <description><![CDATA[This week’s host Kacey is joined by Charles and Alec to bring you the latest in threat intelligence. In this episode they cover: - Visa issues a warning about new credit card skimmer “Baka”- Epic Manchego - Atypical malicious document delivery- What is Smaug and how does it operate?- Emotet - are there new developments and why did France send an advisory?Get this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-11-september-2020 ***Resources from this week’s podcast***Baka: https://www.bleepingcomputer.com/news/security/visa-warns-of-new-baka-credit-card-javascript-skimmer/Epic Manchego: https://blog.nviso.eu/2020/09/01/epic-manchego-atypical-maldoc-delivery-brings-flurry-of-infostealers/Smaug: https://labs.sentinelone.com/multi-platform-smaug-raas-aims-to-see-off-competitors/France warns of Emotet: https://www.bleepingcomputer.com/news/security/france-warns-of-emotet-attacking-companies-administration/ Similar Advisories from Japan &amp; NZ: https://www.zdnet.com/article/france-japan-new-zealand-warn-of-sudden-spike-in-emotet-attacks/Cyber Espionage Blog: https://www.digitalshadows.com/blog-and-research/cyber-espionage-how-to-not-get-spooked-by-nation-state-actors/Not Another Ransomware Blog: https://www.digitalshadows.com/blog-and-research/not-another-ransomware-blog-initial-access-brokers-and-their-role/]]></description>
    <content:encoded><![CDATA[This week’s host Kacey is joined by Charles and Alec to bring you the latest in threat intelligence. In this episode they cover: - Visa issues a warning about new credit card skimmer “Baka”- Epic Manchego - Atypical malicious document delivery- What is Smaug and how does it operate?- Emotet - are there new developments and why did France send an advisory?Get this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-11-september-2020 ***Resources from this week’s podcast***Baka: https://www.bleepingcomputer.com/news/security/visa-warns-of-new-baka-credit-card-javascript-skimmer/Epic Manchego: https://blog.nviso.eu/2020/09/01/epic-manchego-atypical-maldoc-delivery-brings-flurry-of-infostealers/Smaug: https://labs.sentinelone.com/multi-platform-smaug-raas-aims-to-see-off-competitors/France warns of Emotet: https://www.bleepingcomputer.com/news/security/france-warns-of-emotet-attacking-companies-administration/ Similar Advisories from Japan &amp; NZ: https://www.zdnet.com/article/france-japan-new-zealand-warn-of-sudden-spike-in-emotet-attacks/Cyber Espionage Blog: https://www.digitalshadows.com/blog-and-research/cyber-espionage-how-to-not-get-spooked-by-nation-state-actors/Not Another Ransomware Blog: https://www.digitalshadows.com/blog-and-research/not-another-ransomware-blog-initial-access-brokers-and-their-role/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461202-weekly-the-team-talks-baka-epic-manchego-and-smaug-plus-emotet-rides-again.mp3" length="8810319" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/t6gfyf58t9896gghc69ueqqkpj55?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/891564838</guid>
    <pubDate>Fri, 11 Sep 2020 10:39:28 -0400</pubDate>
    <itunes:duration>732</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: New Zealand Stock Exchange faces DDoS, Tesla avoids cyberattack, and Pioneer Kitten updates</itunes:title>
    <title>Weekly: New Zealand Stock Exchange faces DDoS, Tesla avoids cyberattack, and Pioneer Kitten updates</title>
    <itunes:summary><![CDATA[Adam, Kim, Demelza and Stefano discuss the latest threat intel updates. On this episode, they cover:-      New Zealand Stock Exchange DDoS attacks: Services affected &amp; extent of impact-      Tesla employee thwarts cyberattack: Developments &amp; internal threats-      Pioneer Kitten observed monetizing cyber activity-      Information about Slack vulnerability:-      Tor projects launch membership program: why &amp; what does this mean?Get this week’s intelligence summary at https://resou...]]></itunes:summary>
    <description><![CDATA[Adam, Kim, Demelza and Stefano discuss the latest threat intel updates. On this episode, they cover:-      New Zealand Stock Exchange DDoS attacks: Services affected &amp; extent of impact-      Tesla employee thwarts cyberattack: Developments &amp; internal threats-      Pioneer Kitten observed monetizing cyber activity-      Information about Slack vulnerability:-      Tor projects launch membership program: why &amp; what does this mean?Get this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-04-september-2020***Resources from this week’s podcast***DDos Extortion: https://www.welivesecurity.com/2020/08/27/ddos-extortion-campaign-targets-financial-firms-retailers/Russian National Arrest: https://www.justice.gov/opa/press-release/file/1308766/downloadPioneer Kitten: https://www.crowdstrike.com/blog/who-is-pioneer-kitten/Remote Code Execution: https://hackerone.com/reports/783877 The Tor Project: https://blog.torproject.org/tor-project-membership-programSunCrypt: https://www.bleepingcomputer.com/news/security/suncrypt-ransomware-sheds-light-on-the-maze-ransomware-cartel/ Dread Take on Spammers: https://www.digitalshadows.com/blog-and-research/dread-takes-on-the-spammers-who-will-come-out-on-top/]]></description>
    <content:encoded><![CDATA[Adam, Kim, Demelza and Stefano discuss the latest threat intel updates. On this episode, they cover:-      New Zealand Stock Exchange DDoS attacks: Services affected &amp; extent of impact-      Tesla employee thwarts cyberattack: Developments &amp; internal threats-      Pioneer Kitten observed monetizing cyber activity-      Information about Slack vulnerability:-      Tor projects launch membership program: why &amp; what does this mean?Get this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-04-september-2020***Resources from this week’s podcast***DDos Extortion: https://www.welivesecurity.com/2020/08/27/ddos-extortion-campaign-targets-financial-firms-retailers/Russian National Arrest: https://www.justice.gov/opa/press-release/file/1308766/downloadPioneer Kitten: https://www.crowdstrike.com/blog/who-is-pioneer-kitten/Remote Code Execution: https://hackerone.com/reports/783877 The Tor Project: https://blog.torproject.org/tor-project-membership-programSunCrypt: https://www.bleepingcomputer.com/news/security/suncrypt-ransomware-sheds-light-on-the-maze-ransomware-cartel/ Dread Take on Spammers: https://www.digitalshadows.com/blog-and-research/dread-takes-on-the-spammers-who-will-come-out-on-top/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461203-weekly-new-zealand-stock-exchange-faces-ddos-tesla-avoids-cyberattack-and-pioneer-kitten-updates.mp3" length="25519534" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5u0lepgpzevmu9dpwkb4heuzu9pp?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/887610208</guid>
    <pubDate>Fri, 04 Sep 2020 11:12:13 -0400</pubDate>
    <itunes:duration>2125</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Photon Team Talks BeagleBoys, DarkSide, and DeathStalker, oh my!</itunes:title>
    <title>Weekly: Photon Team Talks BeagleBoys, DarkSide, and DeathStalker, oh my!</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Kacey, Alec, Charles, and Rick bring you the latest in threat intel. In this week’s episode they cover:- The Department of the Treasury, FBI, and the US Cyber Command issue an alert about North Korea's BeagleBoyz - what do we know and what does it mean?- DarkSide operation discovered attacking companies with ransom demands up to $2 Million- Charles discusses DeathStalker kill chain and their targets- Alec talks spy stories and potential internal threats to companiesGet this w...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Kacey, Alec, Charles, and Rick bring you the latest in threat intel. In this week’s episode they cover:- The Department of the Treasury, FBI, and the US Cyber Command issue an alert about North Korea&apos;s BeagleBoyz - what do we know and what does it mean?- DarkSide operation discovered attacking companies with ransom demands up to $2 Million- Charles discusses DeathStalker kill chain and their targets- Alec talks spy stories and potential internal threats to companiesGet this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-28-august-2020 ***Resources from this week’s podcast***BeagleBoyz: https://us-cert.cisa.gov/ncas/alerts/aa20-239aDarkSide: https://www.bleepingcomputer.com/news/security/darkside-new-targeted-ransomware-demands-million-dollar-ransoms/DeathStalker: https://securelist.com/deathstalker-mercenary-triumvirate/98177/Spy Story: https://www.zdnet.com/article/russian-arrested-for-trying-to-recruit-an-insider-and-hack-a-nevada-company/ Cybercriminal Forum Rankings Blog: https://www.digitalshadows.com/blog-and-research/alexa-who-is-the-number-one-cybercrminal-forum-to-rule-them-all/Empire Exit Scam Blog: https://www.digitalshadows.com/blog-and-research/cybercriminal-underground-rocked-by-empires-apparent-exit-scam/]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Kacey, Alec, Charles, and Rick bring you the latest in threat intel. In this week’s episode they cover:- The Department of the Treasury, FBI, and the US Cyber Command issue an alert about North Korea&apos;s BeagleBoyz - what do we know and what does it mean?- DarkSide operation discovered attacking companies with ransom demands up to $2 Million- Charles discusses DeathStalker kill chain and their targets- Alec talks spy stories and potential internal threats to companiesGet this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-28-august-2020 ***Resources from this week’s podcast***BeagleBoyz: https://us-cert.cisa.gov/ncas/alerts/aa20-239aDarkSide: https://www.bleepingcomputer.com/news/security/darkside-new-targeted-ransomware-demands-million-dollar-ransoms/DeathStalker: https://securelist.com/deathstalker-mercenary-triumvirate/98177/Spy Story: https://www.zdnet.com/article/russian-arrested-for-trying-to-recruit-an-insider-and-hack-a-nevada-company/ Cybercriminal Forum Rankings Blog: https://www.digitalshadows.com/blog-and-research/alexa-who-is-the-number-one-cybercrminal-forum-to-rule-them-all/Empire Exit Scam Blog: https://www.digitalshadows.com/blog-and-research/cybercriminal-underground-rocked-by-empires-apparent-exit-scam/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461204-weekly-photon-team-talks-beagleboys-darkside-and-deathstalker-oh-my.mp3" length="16175178" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/pldsdirwqwkz8etyws9gcr7xe8rs?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/883597585</guid>
    <pubDate>Fri, 28 Aug 2020 11:53:45 -0400</pubDate>
    <itunes:duration>1346</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Guest David Bianco Talks Origin Story, Pyramid of Pain, and More</itunes:title>
    <title>Special: Guest David Bianco Talks Origin Story, Pyramid of Pain, and More</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Alex and Digital Shadows CISO, Rick, talk to special guest David about his beginnings in the cybersecurity space, the Pyramid of Pain, and threat hunting.Pyramid of Pain: https://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.htmlDavid’s Twitter: https://twitter.com/DavidJBiancoDavid’s Sans Profile: https://www.sans.org/profiles/david-bianco/]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Alex and Digital Shadows CISO, Rick, talk to special guest David about his beginnings in the cybersecurity space, the Pyramid of Pain, and threat hunting.Pyramid of Pain: https://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.htmlDavid’s Twitter: https://twitter.com/DavidJBiancoDavid’s Sans Profile: https://www.sans.org/profiles/david-bianco/]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Alex and Digital Shadows CISO, Rick, talk to special guest David about his beginnings in the cybersecurity space, the Pyramid of Pain, and threat hunting.Pyramid of Pain: https://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.htmlDavid’s Twitter: https://twitter.com/DavidJBiancoDavid’s Sans Profile: https://www.sans.org/profiles/david-bianco/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461205-special-guest-david-bianco-talks-origin-story-pyramid-of-pain-and-more.mp3" length="32884758" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/f1awmzemeakxdac9mr5z83vumx4y?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/879079420</guid>
    <pubDate>Tue, 25 Aug 2020 14:24:37 -0400</pubDate>
    <itunes:duration>2738</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Emotet Gets a Vaccine, NSA Drovorub Advisory, and North Korean Activity plus Bureau 121</itunes:title>
    <title>Weekly: Emotet Gets a Vaccine, NSA Drovorub Advisory, and North Korean Activity plus Bureau 121</title>
    <itunes:summary><![CDATA[ShadowTalk hosts Viktoria, Adam, Dylan, and Stefano bring you the latest in threat intel. In this week’s episode they cover:- The ever-popular Emotet - does this dangerous malware have a vaccine? Adam and the team discuss how researchers found a cure.- What is the Drovorub malware and what is it trying to achieve?- Takeaways from the U.S. Army’s report on North Korean tactics - what do we know about North Korea’s cyber activity and Bureau 121?Get this week’s intelligence summary at https://re...]]></itunes:summary>
    <description><![CDATA[ShadowTalk hosts Viktoria, Adam, Dylan, and Stefano bring you the latest in threat intel. In this week’s episode they cover:- The ever-popular Emotet - does this dangerous malware have a vaccine? Adam and the team discuss how researchers found a cure.- What is the Drovorub malware and what is it trying to achieve?- Takeaways from the U.S. Army’s report on North Korean tactics - what do we know about North Korea’s cyber activity and Bureau 121?Get this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-21-august-2020***Resources from this week’s podcast***Emotet: https://www.binarydefense.com/emocrash-exploiting-a-vulnerability-in-emotet-malware-for-defense/Drovorub: https://www.fbi.gov/news/pressrel/press-releases/nsa-and-fbi-expose-russian-previously-undisclosed-malware-drovorub-in-cybersecurity-advisoryBureau 121: https://www.documentcloud.org/documents/7038686-US-Army-report-on-North-Korean-military.htmlOptiv CTIE Report: https://resources.digitalshadows.com/digitalshadows/optivctiereport2020]]></description>
    <content:encoded><![CDATA[ShadowTalk hosts Viktoria, Adam, Dylan, and Stefano bring you the latest in threat intel. In this week’s episode they cover:- The ever-popular Emotet - does this dangerous malware have a vaccine? Adam and the team discuss how researchers found a cure.- What is the Drovorub malware and what is it trying to achieve?- Takeaways from the U.S. Army’s report on North Korean tactics - what do we know about North Korea’s cyber activity and Bureau 121?Get this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-21-august-2020***Resources from this week’s podcast***Emotet: https://www.binarydefense.com/emocrash-exploiting-a-vulnerability-in-emotet-malware-for-defense/Drovorub: https://www.fbi.gov/news/pressrel/press-releases/nsa-and-fbi-expose-russian-previously-undisclosed-malware-drovorub-in-cybersecurity-advisoryBureau 121: https://www.documentcloud.org/documents/7038686-US-Army-report-on-North-Korean-military.htmlOptiv CTIE Report: https://resources.digitalshadows.com/digitalshadows/optivctiereport2020]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461206-weekly-emotet-gets-a-vaccine-nsa-drovorub-advisory-and-north-korean-activity-plus-bureau-121.mp3" length="20847578" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/wj9fm8zh1brsjy2mnnepoqia868p?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/879679576</guid>
    <pubDate>Fri, 21 Aug 2020 11:50:29 -0400</pubDate>
    <itunes:duration>1735</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Defaced Subreddits, Intel Leak Drama on Twitter, and HIBP Goes Open-Source</itunes:title>
    <title>Weekly: Defaced Subreddits, Intel Leak Drama on Twitter, and HIBP Goes Open-Source</title>
    <itunes:summary><![CDATA[Alex, Kacey, and Charles host this week’s ShadowTalk, bringing you the latest in threat intelligence. In this episode they cover:- Defaced subreddits - which accounts were impacted and what was the   cause?- An Intel Leak was exposed by a Twitter user - what was exposed and   how did it happen?- Troy Hunt's announcement on open-sourcing HIBP - our take on how it   will improve the community at largeGet this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/wee...]]></itunes:summary>
    <description><![CDATA[Alex, Kacey, and Charles host this week’s ShadowTalk, bringing you the latest in threat intelligence. In this episode they cover:- Defaced subreddits - which accounts were impacted and what was the   cause?- An Intel Leak was exposed by a Twitter user - what was exposed and   how did it happen?- Troy Hunt&apos;s announcement on open-sourcing HIBP - our take on how it   will improve the community at largeGet this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-14-august-2020***Resources from this week’s podcast***Reddit: https://www.reddit.com/r/ModSupport/comments/i5hhtf/ongoing_incident_with_compromised_mod_accounts/ https://www.bleepingcomputer.com/news/security/reddit-hit-by-coordinated-hack-promoting-trumps-reelection/Twitter Intel Leak: https://www.infosecurity-magazine.com/news/intel-investigates-20gb-internal/HIBP: https://www.troyhunt.com/im-open-sourcing-the-have-i-been-pwned-code-base/Escrow Systems On Cybercriminal Forums Blog: https://www.digitalshadows.com/blog-and-research/escrow-systems-on-cybercriminal-forums/]]></description>
    <content:encoded><![CDATA[Alex, Kacey, and Charles host this week’s ShadowTalk, bringing you the latest in threat intelligence. In this episode they cover:- Defaced subreddits - which accounts were impacted and what was the   cause?- An Intel Leak was exposed by a Twitter user - what was exposed and   how did it happen?- Troy Hunt&apos;s announcement on open-sourcing HIBP - our take on how it   will improve the community at largeGet this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-14-august-2020***Resources from this week’s podcast***Reddit: https://www.reddit.com/r/ModSupport/comments/i5hhtf/ongoing_incident_with_compromised_mod_accounts/ https://www.bleepingcomputer.com/news/security/reddit-hit-by-coordinated-hack-promoting-trumps-reelection/Twitter Intel Leak: https://www.infosecurity-magazine.com/news/intel-investigates-20gb-internal/HIBP: https://www.troyhunt.com/im-open-sourcing-the-have-i-been-pwned-code-base/Escrow Systems On Cybercriminal Forums Blog: https://www.digitalshadows.com/blog-and-research/escrow-systems-on-cybercriminal-forums/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461207-weekly-defaced-subreddits-intel-leak-drama-on-twitter-and-hibp-goes-open-source.mp3" length="16478885" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/rlhbjicss415rahadd6lea902745?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/875862571</guid>
    <pubDate>Fri, 14 Aug 2020 14:07:47 -0400</pubDate>
    <itunes:duration>1371</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: CWT pays ransom, data leaked for 900+ Pulse Secure Servers, EU issues first cyber sanctions</itunes:title>
    <title>Weekly: CWT pays ransom, data leaked for 900+ Pulse Secure Servers, EU issues first cyber sanctions</title>
    <itunes:summary><![CDATA[In this week’s episode, Viktoria is joined by Kim, Dylan and Demelza to discuss:- Ransomware negotiations between CWT and cyberattackers- Impact and severity of passwords leaked for 900+ pulse secure   enterprise servers to criminal forum- The Ghostwriter/disinformation campaign overview: series of   disinformation campaigns, aligned to Russian security interests -   activity and attribution- EU issues first sanctions against Russian and Chinese cyber actors:   Impact, effectiveness and reaso...]]></itunes:summary>
    <description><![CDATA[In this week’s episode, Viktoria is joined by Kim, Dylan and Demelza to discuss:- Ransomware negotiations between CWT and cyberattackers- Impact and severity of passwords leaked for 900+ pulse secure   enterprise servers to criminal forum- The Ghostwriter/disinformation campaign overview: series of   disinformation campaigns, aligned to Russian security interests -   activity and attribution- EU issues first sanctions against Russian and Chinese cyber actors:   Impact, effectiveness and reasoning behind thisGet this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-07-august-2020***Resources from this week’s podcast***CWT: https://uk.reuters.com/article/uk-cyber-cwt-ransom/payment-sent-travel-giant-cwt-pays-4-5-million-ransom-to-cyber-criminals-idUKKCN24W26PPulse Secure VPN: https://www.zdnet.com/article/hacker-leaks-passwords-for-900-enterprise-vpn-servers/#ftag=RSSbaffb68EU Sanctions: https://www.gov.uk/government/news/foreign-secretary-welcomes-first-eu-sanctions-against-malicious-cyber-actorshttps://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32020D1127&amp;from=EN]]></description>
    <content:encoded><![CDATA[In this week’s episode, Viktoria is joined by Kim, Dylan and Demelza to discuss:- Ransomware negotiations between CWT and cyberattackers- Impact and severity of passwords leaked for 900+ pulse secure   enterprise servers to criminal forum- The Ghostwriter/disinformation campaign overview: series of   disinformation campaigns, aligned to Russian security interests -   activity and attribution- EU issues first sanctions against Russian and Chinese cyber actors:   Impact, effectiveness and reasoning behind thisGet this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-07-august-2020***Resources from this week’s podcast***CWT: https://uk.reuters.com/article/uk-cyber-cwt-ransom/payment-sent-travel-giant-cwt-pays-4-5-million-ransom-to-cyber-criminals-idUKKCN24W26PPulse Secure VPN: https://www.zdnet.com/article/hacker-leaks-passwords-for-900-enterprise-vpn-servers/#ftag=RSSbaffb68EU Sanctions: https://www.gov.uk/government/news/foreign-secretary-welcomes-first-eu-sanctions-against-malicious-cyber-actorshttps://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32020D1127&amp;from=EN]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461208-weekly-cwt-pays-ransom-data-leaked-for-900-pulse-secure-servers-eu-issues-first-cyber-sanctions.mp3" length="15586629" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/y4xas603tlim8kd6j5z94tdogveh?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/871952674</guid>
    <pubDate>Fri, 07 Aug 2020 13:09:50 -0400</pubDate>
    <itunes:duration>1297</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special: Guest Geoff White Talks Best-Selling Book Crime Dot Com</itunes:title>
    <title>Special: Guest Geoff White Talks Best-Selling Book Crime Dot Com</title>
    <itunes:summary><![CDATA[On this ShadowTalk hosts Viktoria and James talk to special guest Geoff about his best selling book Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global and beyond that, themes within cybercrime, from the commodification of personal data to cybercrime tactics and tools. Find Geoff’s book here: https://www.amazon.co.uk/Crime-Dot-Com-Viruses-Rigging/dp/1789142857Visit Geoff’s website: https://geoffwhite.tech/]]></itunes:summary>
    <description><![CDATA[On this ShadowTalk hosts Viktoria and James talk to special guest Geoff about his best selling book Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global and beyond that, themes within cybercrime, from the commodification of personal data to cybercrime tactics and tools. Find Geoff’s book here: https://www.amazon.co.uk/Crime-Dot-Com-Viruses-Rigging/dp/1789142857Visit Geoff’s website: https://geoffwhite.tech/]]></description>
    <content:encoded><![CDATA[On this ShadowTalk hosts Viktoria and James talk to special guest Geoff about his best selling book Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global and beyond that, themes within cybercrime, from the commodification of personal data to cybercrime tactics and tools. Find Geoff’s book here: https://www.amazon.co.uk/Crime-Dot-Com-Viruses-Rigging/dp/1789142857Visit Geoff’s website: https://geoffwhite.tech/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461209-special-guest-geoff-white-talks-best-selling-book-crime-dot-com.mp3" length="30053171" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/btu8i6cdcx7b438l9tlryvgpwk58?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/867943642</guid>
    <pubDate>Fri, 31 Jul 2020 12:09:50 -0400</pubDate>
    <itunes:duration>2502</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Garmin ransomware attack, QSnatch malware, and ShinyHunters Stage 2</itunes:title>
    <title>Weekly: Garmin ransomware attack, QSnatch malware, and ShinyHunters Stage 2</title>
    <itunes:summary><![CDATA[This week it’s a full house with ShadowTalk hosts Alex, Kacey, Charles, Alec and Rick. During this episode they cover:- Garmin ransomware attacks - what happened?- Kacey talks QSnatch malware - history and new alerts- Stage 2 from ShinyHunters and the 50 high profile organizations that had information leakedGet this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-31-july-2020***Resources from this week’s podcast***Garmin ransomwar...]]></itunes:summary>
    <description><![CDATA[This week it’s a full house with ShadowTalk hosts Alex, Kacey, Charles, Alec and Rick. During this episode they cover:- Garmin ransomware attacks - what happened?- Kacey talks QSnatch malware - history and new alerts- Stage 2 from ShinyHunters and the 50 high profile organizations that had information leakedGet this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-31-july-2020***Resources from this week’s podcast***Garmin ransomware: https://www.zdnet.com/article/garmins-outage-ransomware-attack-response-lacking-as-earnings-loom/ QSnatch malware: https://www.zdnet.com/article/cisa-says-62000-qnap-nas-devices-have-been-infected-with-the-qsnatch-malware/#ftag=RSSbaffb68 ShinyHunters: https://www.bleepingcomputer.com/news/security/hacker-leaks-386-million-user-records-from-18-companies-for-free/]]></description>
    <content:encoded><![CDATA[This week it’s a full house with ShadowTalk hosts Alex, Kacey, Charles, Alec and Rick. During this episode they cover:- Garmin ransomware attacks - what happened?- Kacey talks QSnatch malware - history and new alerts- Stage 2 from ShinyHunters and the 50 high profile organizations that had information leakedGet this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-31-july-2020***Resources from this week’s podcast***Garmin ransomware: https://www.zdnet.com/article/garmins-outage-ransomware-attack-response-lacking-as-earnings-loom/ QSnatch malware: https://www.zdnet.com/article/cisa-says-62000-qnap-nas-devices-have-been-infected-with-the-qsnatch-malware/#ftag=RSSbaffb68 ShinyHunters: https://www.bleepingcomputer.com/news/security/hacker-leaks-386-million-user-records-from-18-companies-for-free/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461210-weekly-garmin-ransomware-attack-qsnatch-malware-and-shinyhunters-stage-2.mp3" length="17209412" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/7lqxm70fmpst9o8h459q5swoisyc?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/867933010</guid>
    <pubDate>Fri, 31 Jul 2020 11:50:32 -0400</pubDate>
    <itunes:duration>1432</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Trickbot trojan mishaps, Emotet resurgence, Twitter takeovers, and APT group updates</itunes:title>
    <title>Weekly: Trickbot trojan mishaps, Emotet resurgence, Twitter takeovers, and APT group updates</title>
    <itunes:summary><![CDATA[This week’s ShadowTalk hosts Adam, Demi, Stefano and Kim discuss the latest threat intelligence stories. In this episode they cover:-Trickbot trojan mishap causes wide-spread warnings, alerting users of threatening activity-Dangerous malware Emotet resurges and partners with Trickbot to infect a large number or users-Twitter takeover updates - what we know so far-NCSC advisory about APT29 targeting Covid-19 vaccine research -APT35 footage surfaces, exposing the group’s informationGet this wee...]]></itunes:summary>
    <description><![CDATA[This week’s ShadowTalk hosts Adam, Demi, Stefano and Kim discuss the latest threat intelligence stories. In this episode they cover:-Trickbot trojan mishap causes wide-spread warnings, alerting users of threatening activity-Dangerous malware Emotet resurges and partners with Trickbot to infect a large number or users-Twitter takeover updates - what we know so far-NCSC advisory about APT29 targeting Covid-19 vaccine research -APT35 footage surfaces, exposing the group’s informationGet this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-24-july-2020***Resources from this week&apos;s podcast***NCSC: https://www.ncsc.gov.uk/news/advisory-apt29-targets-covid-19-vaccine-development Twitter Updates: https://www.bleepingcomputer.com/news/security/coinbase-blocked-twitter-hackers-from-stealing-an-extra-280k/ Emotet: https://www.bleepingcomputer.com/news/security/emotet-trickbot-malware-duo-is-back-infecting-windows-machines/APT35: https://www.wired.com/story/iran-apt35-hacking-video/]]></description>
    <content:encoded><![CDATA[This week’s ShadowTalk hosts Adam, Demi, Stefano and Kim discuss the latest threat intelligence stories. In this episode they cover:-Trickbot trojan mishap causes wide-spread warnings, alerting users of threatening activity-Dangerous malware Emotet resurges and partners with Trickbot to infect a large number or users-Twitter takeover updates - what we know so far-NCSC advisory about APT29 targeting Covid-19 vaccine research -APT35 footage surfaces, exposing the group’s informationGet this week’s intelligence summary at https://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-24-july-2020***Resources from this week&apos;s podcast***NCSC: https://www.ncsc.gov.uk/news/advisory-apt29-targets-covid-19-vaccine-development Twitter Updates: https://www.bleepingcomputer.com/news/security/coinbase-blocked-twitter-hackers-from-stealing-an-extra-280k/ Emotet: https://www.bleepingcomputer.com/news/security/emotet-trickbot-malware-duo-is-back-infecting-windows-machines/APT35: https://www.wired.com/story/iran-apt35-hacking-video/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461211-weekly-trickbot-trojan-mishaps-emotet-resurgence-twitter-takeovers-and-apt-group-updates.mp3" length="13589502" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/2ykv7zpjtsf2xn6vaw6nvcxtktqy?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/863831230</guid>
    <pubDate>Fri, 24 Jul 2020 10:00:07 -0400</pubDate>
    <itunes:duration>1130</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Twitter takeovers, Data Viper breached by NightLion, and a look at CryptBB</itunes:title>
    <title>Weekly: Twitter takeovers, Data Viper breached by NightLion, and a look at CryptBB</title>
    <itunes:summary><![CDATA[This week’s ShadowTalk hosts Alex, Kacey, and Alec discuss the latest threat intelligence stories. In this epic episode they cover:-Top Twitter accounts that were accessed to promote a Bitcoin scam -Threat Intel platform Data Viper gets breached in revenge attack by threat actor NightLion -Updates on cybercriminal forum CryptBB - where are they now and what does the future hold?Get this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-inte...]]></itunes:summary>
    <description><![CDATA[This week’s ShadowTalk hosts Alex, Kacey, and Alec discuss the latest threat intelligence stories. In this epic episode they cover:-Top Twitter accounts that were accessed to promote a Bitcoin scam -Threat Intel platform Data Viper gets breached in revenge attack by threat actor NightLion -Updates on cybercriminal forum CryptBB - where are they now and what does the future hold?Get this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-17-july-2020***Resources from this week’s podcast***Twitter attack https://twitter.com/TwitterSupport/status/1283518038445223936?s=20 Data Viper breach https://krebsonsecurity.com/2020/07/breached-data-indexer-data-viper-hacked/ CryptBB blog by DS Photon Team https://www.digitalshadows.com/blog-and-research/cryptbb-demystifying-the-illusion-of-the-private-forum/]]></description>
    <content:encoded><![CDATA[This week’s ShadowTalk hosts Alex, Kacey, and Alec discuss the latest threat intelligence stories. In this epic episode they cover:-Top Twitter accounts that were accessed to promote a Bitcoin scam -Threat Intel platform Data Viper gets breached in revenge attack by threat actor NightLion -Updates on cybercriminal forum CryptBB - where are they now and what does the future hold?Get this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-17-july-2020***Resources from this week’s podcast***Twitter attack https://twitter.com/TwitterSupport/status/1283518038445223936?s=20 Data Viper breach https://krebsonsecurity.com/2020/07/breached-data-indexer-data-viper-hacked/ CryptBB blog by DS Photon Team https://www.digitalshadows.com/blog-and-research/cryptbb-demystifying-the-illusion-of-the-private-forum/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461212-weekly-twitter-takeovers-data-viper-breached-by-nightlion-and-a-look-at-cryptbb.mp3" length="18975293" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/werln9soykija1z0nkn9smp1tl9i?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/859869124</guid>
    <pubDate>Fri, 17 Jul 2020 14:22:13 -0400</pubDate>
    <itunes:duration>1579</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: PAN-OS Vulnerability, Lazarus Group, BEC scammer “Hushpuppi”, and New Photon ATO Research</itunes:title>
    <title>Weekly: PAN-OS Vulnerability, Lazarus Group, BEC scammer “Hushpuppi”, and New Photon ATO Research</title>
    <itunes:summary><![CDATA[This week, Digital Shadows team Viktoria, Demelza, Adam and Stefano cover:-PAN-OS Vulnerability (CVE-2020-2021): Impact &amp; Mitigation-Magecart Developments: Lazarus Group tied to Magecart-FBI arrests “Hushpuppi” for alleged BEC Cybercrime Scheme-Photon ATO Research: Overview + Key takeawaysGet this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-10-july-2020]]></itunes:summary>
    <description><![CDATA[This week, Digital Shadows team Viktoria, Demelza, Adam and Stefano cover:-PAN-OS Vulnerability (CVE-2020-2021): Impact &amp; Mitigation-Magecart Developments: Lazarus Group tied to Magecart-FBI arrests “Hushpuppi” for alleged BEC Cybercrime Scheme-Photon ATO Research: Overview + Key takeawaysGet this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-10-july-2020]]></description>
    <content:encoded><![CDATA[This week, Digital Shadows team Viktoria, Demelza, Adam and Stefano cover:-PAN-OS Vulnerability (CVE-2020-2021): Impact &amp; Mitigation-Magecart Developments: Lazarus Group tied to Magecart-FBI arrests “Hushpuppi” for alleged BEC Cybercrime Scheme-Photon ATO Research: Overview + Key takeawaysGet this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-10-july-2020]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461213-weekly-pan-os-vulnerability-lazarus-group-bec-scammer-hushpuppi-and-new-photon-ato-research.mp3" length="16103757" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/4whmf9er32qmwanzxf0jdtjtenmr?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/855728932</guid>
    <pubDate>Fri, 10 Jul 2020 14:30:49 -0400</pubDate>
    <itunes:duration>1340</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly: Torigon, Nulledflix, and BlueLeaks, Plus DevSecOps Insights From DS CISO Rick</itunes:title>
    <title>Weekly: Torigon, Nulledflix, and BlueLeaks, Plus DevSecOps Insights From DS CISO Rick</title>
    <itunes:summary><![CDATA[Alex, Kacey, Charles and Rick host this week’s ShadowTalk to bring you the latest threat intelligence stories. This week they cover: Torigon - What was Torigon and how did it fail to survive?Nulledflix - The Nulled-focused streaming service taken down immediately for maintenanceBlueLeaks exposing private law enforcement filesDevSecOps and how it can be useful to your organizationGet this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-int...]]></itunes:summary>
    <description><![CDATA[Alex, Kacey, Charles and Rick host this week’s ShadowTalk to bring you the latest threat intelligence stories. This week they cover: Torigon - What was Torigon and how did it fail to survive?Nulledflix - The Nulled-focused streaming service taken down immediately for maintenanceBlueLeaks exposing private law enforcement filesDevSecOps and how it can be useful to your organizationGet this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-26-june-2020Plus, check out this page for more on DevSecOps: https://www.digitalshadows.com/blog-and-research/devsecops-modern-software-development/To learn more about DevSecOps product updates in SearchLight, check out the webinar at: https://resources.digitalshadows.com/webinars/outside-in-intelligence-for-devsecops-digital-shadows***Resources From This Week***Torigon: https://www.digitalshadows.com/blog-and-research/torigon-forum/Nulledflix: https://www.digitalshadows.com/blog-and-research/nulledflix-nulled-forum-streaming-service/BlueLeaks: https://krebsonsecurity.com/2020/06/blueleaks-exposes-files-from-hundreds-of-police-departments/]]></description>
    <content:encoded><![CDATA[Alex, Kacey, Charles and Rick host this week’s ShadowTalk to bring you the latest threat intelligence stories. This week they cover: Torigon - What was Torigon and how did it fail to survive?Nulledflix - The Nulled-focused streaming service taken down immediately for maintenanceBlueLeaks exposing private law enforcement filesDevSecOps and how it can be useful to your organizationGet this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-26-june-2020Plus, check out this page for more on DevSecOps: https://www.digitalshadows.com/blog-and-research/devsecops-modern-software-development/To learn more about DevSecOps product updates in SearchLight, check out the webinar at: https://resources.digitalshadows.com/webinars/outside-in-intelligence-for-devsecops-digital-shadows***Resources From This Week***Torigon: https://www.digitalshadows.com/blog-and-research/torigon-forum/Nulledflix: https://www.digitalshadows.com/blog-and-research/nulledflix-nulled-forum-streaming-service/BlueLeaks: https://krebsonsecurity.com/2020/06/blueleaks-exposes-files-from-hundreds-of-police-departments/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461214-weekly-torigon-nulledflix-and-blueleaks-plus-devsecops-insights-from-ds-ciso-rick.mp3" length="15337927" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/0v78dr7lvaetiassdobn01p4tdj0?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/847475014</guid>
    <pubDate>Fri, 26 Jun 2020 15:10:59 -0400</pubDate>
    <itunes:duration>1276</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>SPECIAL: Guest Speaker Tom Schmitt Talks About His Origins in Cyber Threat Intel and TITO</itunes:title>
    <title>SPECIAL: Guest Speaker Tom Schmitt Talks About His Origins in Cyber Threat Intel and TITO</title>
    <itunes:summary><![CDATA[CISO Rick Holland and Host Alex Guirakhoo chat with this week's special guest Tom Schmitt, Global Director of Threat Intelligence at Anheuser-Busch InBev. They discuss Tom’s origin in the Cyber Threat Intelligence space and get his insight on TITO (or “Threat, Infrastructure, Targets, and Outcomes”), a platform and data-agnostic threat intelligence framework.Learn more about TITO at https://github.com/TITO-Threat-Intel/TITO-Framework]]></itunes:summary>
    <description><![CDATA[CISO Rick Holland and Host Alex Guirakhoo chat with this week&apos;s special guest Tom Schmitt, Global Director of Threat Intelligence at Anheuser-Busch InBev. They discuss Tom’s origin in the Cyber Threat Intelligence space and get his insight on TITO (or “Threat, Infrastructure, Targets, and Outcomes”), a platform and data-agnostic threat intelligence framework.Learn more about TITO at https://github.com/TITO-Threat-Intel/TITO-Framework]]></description>
    <content:encoded><![CDATA[CISO Rick Holland and Host Alex Guirakhoo chat with this week&apos;s special guest Tom Schmitt, Global Director of Threat Intelligence at Anheuser-Busch InBev. They discuss Tom’s origin in the Cyber Threat Intelligence space and get his insight on TITO (or “Threat, Infrastructure, Targets, and Outcomes”), a platform and data-agnostic threat intelligence framework.Learn more about TITO at https://github.com/TITO-Threat-Intel/TITO-Framework]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461215-special-guest-speaker-tom-schmitt-talks-about-his-origins-in-cyber-threat-intel-and-tito.mp3" length="32693981" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/24kzq6ud8zxcyfoyga6s24heh21w?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/845610781</guid>
    <pubDate>Tue, 23 Jun 2020 18:29:23 -0400</pubDate>
    <itunes:duration>2723</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WEEKLY: Lookback Operators Deploy New Malware Against US Utilities Sector And Honda Cyber Attack</itunes:title>
    <title>WEEKLY: Lookback Operators Deploy New Malware Against US Utilities Sector And Honda Cyber Attack</title>
    <itunes:summary><![CDATA[Demelza, Viktoria, Adam, and Stefano host this week’s ShadowTalk to bring you the latest threat intelligence stories from the week. This week they cover:- Honda technical details - cyber attack- LookBack, FlowCloud similarities point to a single perpetrator of utility attacks - TA410- Delivery of malware through cloud storage Get this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary***Resources From this Week***Recruiting Moderators on Cybercrimi...]]></itunes:summary>
    <description><![CDATA[Demelza, Viktoria, Adam, and Stefano host this week’s ShadowTalk to bring you the latest threat intelligence stories from the week. This week they cover:- Honda technical details - cyber attack- LookBack, FlowCloud similarities point to a single perpetrator of utility attacks - TA410- Delivery of malware through cloud storage Get this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary***Resources From this Week***Recruiting Moderators on Cybercriminal Forums: https://www.digitalshadows.com/blog-and-research/recruiting-moderators-on-cybercriminal-forums/Reducing Technical Leakage: https://www.digitalshadows.com/blog-and-research/reducing-technical-leakage-detecting-software-exposure-from-the-outside-in/]]></description>
    <content:encoded><![CDATA[Demelza, Viktoria, Adam, and Stefano host this week’s ShadowTalk to bring you the latest threat intelligence stories from the week. This week they cover:- Honda technical details - cyber attack- LookBack, FlowCloud similarities point to a single perpetrator of utility attacks - TA410- Delivery of malware through cloud storage Get this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary***Resources From this Week***Recruiting Moderators on Cybercriminal Forums: https://www.digitalshadows.com/blog-and-research/recruiting-moderators-on-cybercriminal-forums/Reducing Technical Leakage: https://www.digitalshadows.com/blog-and-research/reducing-technical-leakage-detecting-software-exposure-from-the-outside-in/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461216-weekly-lookback-operators-deploy-new-malware-against-us-utilities-sector-and-honda-cyber-attack.mp3" length="13695870" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/gbh33sgnsb3luhfu6xo2un41dodl?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/843315001</guid>
    <pubDate>Fri, 19 Jun 2020 16:33:25 -0400</pubDate>
    <itunes:duration>1139</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>SPECIAL: What Goes Into The Verizon DBIR With Alex Pinto</itunes:title>
    <title>SPECIAL: What Goes Into The Verizon DBIR With Alex Pinto</title>
    <itunes:summary><![CDATA[CISO Rick Holland and Host Alex Guirakhoo chat with Alex Pinto from Verizon around the Verizon DBIR. They talk through Pinto’s background, how the Verizon DBIR gets put together, findings from this year’s report, and of course, the best jokes found (or not found) in this year’s report.Get the full DBIR at https://enterprise.verizon.com/resources/reports/dbir/And check out Rick’s Blog here: https://www.digitalshadows.com/blog-and-research/2020-verizon-data-breach-investigations-report-dbir-cis...]]></itunes:summary>
    <description><![CDATA[CISO Rick Holland and Host Alex Guirakhoo chat with Alex Pinto from Verizon around the Verizon DBIR. They talk through Pinto’s background, how the Verizon DBIR gets put together, findings from this year’s report, and of course, the best jokes found (or not found) in this year’s report.Get the full DBIR at https://enterprise.verizon.com/resources/reports/dbir/And check out Rick’s Blog here: https://www.digitalshadows.com/blog-and-research/2020-verizon-data-breach-investigations-report-dbir-ciso-view/]]></description>
    <content:encoded><![CDATA[CISO Rick Holland and Host Alex Guirakhoo chat with Alex Pinto from Verizon around the Verizon DBIR. They talk through Pinto’s background, how the Verizon DBIR gets put together, findings from this year’s report, and of course, the best jokes found (or not found) in this year’s report.Get the full DBIR at https://enterprise.verizon.com/resources/reports/dbir/And check out Rick’s Blog here: https://www.digitalshadows.com/blog-and-research/2020-verizon-data-breach-investigations-report-dbir-ciso-view/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461217-special-what-goes-into-the-verizon-dbir-with-alex-pinto.mp3" length="27659410" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/9lv29kmptzy78wszym403ypnu4ko?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/842077348</guid>
    <pubDate>Wed, 17 Jun 2020 19:10:22 -0400</pubDate>
    <itunes:duration>2303</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WEEKLY: Maze Ransomware Alliance, EndGame DDoS Protection Tool, And Ransomware Disguises</itunes:title>
    <title>WEEKLY: Maze Ransomware Alliance, EndGame DDoS Protection Tool, And Ransomware Disguises</title>
    <itunes:summary><![CDATA[Alex is joined by Kacey and Charles this week to chat through the top threat intel stories of the week. This week’s highlights include: - Zorab Ransomware Disguised as STOP Djvu Ransomware- Endgame: New DDoS protection tool advertised on the dark web- Sodinokibi Ransomware Group updates and Maze ransomware allianceGet this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-12-june-2020***Resources From this Week***Endgam...]]></itunes:summary>
    <description><![CDATA[Alex is joined by Kacey and Charles this week to chat through the top threat intel stories of the week. This week’s highlights include: - Zorab Ransomware Disguised as STOP Djvu Ransomware- Endgame: New DDoS protection tool advertised on the dark web- Sodinokibi Ransomware Group updates and Maze ransomware allianceGet this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-12-june-2020***Resources From this Week***Endgame DDoS tool on dark web: https://www.digitalshadows.com/blog-and-research/ddos-attacks-dark-web-endgame/]]></description>
    <content:encoded><![CDATA[Alex is joined by Kacey and Charles this week to chat through the top threat intel stories of the week. This week’s highlights include: - Zorab Ransomware Disguised as STOP Djvu Ransomware- Endgame: New DDoS protection tool advertised on the dark web- Sodinokibi Ransomware Group updates and Maze ransomware allianceGet this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-12-june-2020***Resources From this Week***Endgame DDoS tool on dark web: https://www.digitalshadows.com/blog-and-research/ddos-attacks-dark-web-endgame/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461218-weekly-maze-ransomware-alliance-endgame-ddos-protection-tool-and-ransomware-disguises.mp3" length="12769051" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/i65rvjhro2imrogad8j8a1tphbec?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/840340744</guid>
    <pubDate>Sun, 14 Jun 2020 23:53:48 -0400</pubDate>
    <itunes:duration>1062</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WEEKLY: Hacktivist Chooses Destruction Over Profit w/ Ransomware and Collection 1 Hacker Identified</itunes:title>
    <title>WEEKLY: Hacktivist Chooses Destruction Over Profit w/ Ransomware and Collection 1 Hacker Identified</title>
    <itunes:summary><![CDATA[Pietro, Viktoria, Adam, and Demelza cover this week’s top threat intelligence stories, including a Hacktivist group choosing destruction over profit with ransomware.Other stories this week include- EasyJet breach- Collection 1 Hacker Identified- Fin7 Member Arrested- iOS Mail App VulnerabilityCheck out more in this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-29-may-2020***Resources From this Week***Dark Web Digest...]]></itunes:summary>
    <description><![CDATA[Pietro, Viktoria, Adam, and Demelza cover this week’s top threat intelligence stories, including a Hacktivist group choosing destruction over profit with ransomware.Other stories this week include- EasyJet breach- Collection 1 Hacker Identified- Fin7 Member Arrested- iOS Mail App VulnerabilityCheck out more in this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-29-may-2020***Resources From this Week***Dark Web Digest Recording: https://resources.digitalshadows.com/webinars/dark-web-digest-gaining-valuable-threat-intel-from-cybercriminal-forums-webinar]]></description>
    <content:encoded><![CDATA[Pietro, Viktoria, Adam, and Demelza cover this week’s top threat intelligence stories, including a Hacktivist group choosing destruction over profit with ransomware.Other stories this week include- EasyJet breach- Collection 1 Hacker Identified- Fin7 Member Arrested- iOS Mail App VulnerabilityCheck out more in this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-29-may-2020***Resources From this Week***Dark Web Digest Recording: https://resources.digitalshadows.com/webinars/dark-web-digest-gaining-valuable-threat-intel-from-cybercriminal-forums-webinar]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461219-weekly-hacktivist-chooses-destruction-over-profit-w-ransomware-and-collection-1-hacker-identified.mp3" length="19634680" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/vcfrjkz1dgjkv25ny7qwm734ts3d?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/830095705</guid>
    <pubDate>Thu, 28 May 2020 18:18:28 -0400</pubDate>
    <itunes:duration>1634</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WEEKLY: Verizon DBIR, ShinyHunters, Sodinokibi Ransomware, And More Phishing</itunes:title>
    <title>WEEKLY: Verizon DBIR, ShinyHunters, Sodinokibi Ransomware, And More Phishing</title>
    <itunes:summary><![CDATA[CISO Rick Holland kicks off this episode walking us through key findings and his take from the just-released 2020 Verizon DBIR.Then the team covers other top stories from the  week including:- The new threat group, ShinyHunters, exposing at least 18 companies- Phishing trends organizations should watch out for - Sodinokibi targets Grubman, Shire, Meiselas &amp; Sacks law firm, threatens to release data unless a USD 24 million extortion payment is metShout-out to this week’s ShadowTalk-ers: Ka...]]></itunes:summary>
    <description><![CDATA[CISO Rick Holland kicks off this episode walking us through key findings and his take from the just-released 2020 Verizon DBIR.Then the team covers other top stories from the  week including:- The new threat group, ShinyHunters, exposing at least 18 companies- Phishing trends organizations should watch out for - Sodinokibi targets Grubman, Shire, Meiselas &amp; Sacks law firm, threatens to release data unless a USD 24 million extortion payment is metShout-out to this week’s ShadowTalk-ers: Kacey, Charles, Rick, and AlexGet this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-22-may-2020***Resources from this Week***Rick’s DBIR Blog: https://www.digitalshadows.com/blog-and-research/2020-verizon-data-breach-investigations-report-dbir-ciso-view/Kacey’s Phishing Blog: https://www.digitalshadows.com/blog-and-research/3-phishing-trends-organizations-should-watch-out-for/Ecosystem of Phishing: https://www.digitalshadows.com/blog-and-research/the-ecosystem-of-phishing/]]></description>
    <content:encoded><![CDATA[CISO Rick Holland kicks off this episode walking us through key findings and his take from the just-released 2020 Verizon DBIR.Then the team covers other top stories from the  week including:- The new threat group, ShinyHunters, exposing at least 18 companies- Phishing trends organizations should watch out for - Sodinokibi targets Grubman, Shire, Meiselas &amp; Sacks law firm, threatens to release data unless a USD 24 million extortion payment is metShout-out to this week’s ShadowTalk-ers: Kacey, Charles, Rick, and AlexGet this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-22-may-2020***Resources from this Week***Rick’s DBIR Blog: https://www.digitalshadows.com/blog-and-research/2020-verizon-data-breach-investigations-report-dbir-ciso-view/Kacey’s Phishing Blog: https://www.digitalshadows.com/blog-and-research/3-phishing-trends-organizations-should-watch-out-for/Ecosystem of Phishing: https://www.digitalshadows.com/blog-and-research/the-ecosystem-of-phishing/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461220-weekly-verizon-dbir-shinyhunters-sodinokibi-ransomware-and-more-phishing.mp3" length="14444708" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/578skxalfclfhl204y73xqxqnssc?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/826765342</guid>
    <pubDate>Sat, 23 May 2020 19:57:27 -0400</pubDate>
    <itunes:duration>1202</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>SPECIAL EPISODE: Contact Tracing and COVID-19</itunes:title>
    <title>SPECIAL EPISODE: Contact Tracing and COVID-19</title>
    <itunes:summary><![CDATA[Physician-Scientist, Dr. Pratik Sinha, joins CEO and co-founder, Alastair Paterson, and CISO, Rick Holland, for this special guest episode of ShadowTalk. The group walks through Al and Pratik’s recent research together around contact tracing. They look at:- What is contact tracing and how does it work?- How have we done contact tracing in previous pandemics and will it work for COVID-19?- Privacy Risks and balancing the tradeoff between health and privacy- Big TechRead the full blog from Al a...]]></itunes:summary>
    <description><![CDATA[Physician-Scientist, Dr. Pratik Sinha, joins CEO and co-founder, Alastair Paterson, and CISO, Rick Holland, for this special guest episode of ShadowTalk. The group walks through Al and Pratik’s recent research together around contact tracing. They look at:- What is contact tracing and how does it work?- How have we done contact tracing in previous pandemics and will it work for COVID-19?- Privacy Risks and balancing the tradeoff between health and privacy- Big TechRead the full blog from Al and Pratik at https://www.digitalshadows.com/blog-and-research/contact-tracing-can-big-tech-come-to-the-rescue-and-at-what-cost/You can find Pratik on Twitter @progdoctalk or at https://profiles.ucsf.edu/pratik.sinha]]></description>
    <content:encoded><![CDATA[Physician-Scientist, Dr. Pratik Sinha, joins CEO and co-founder, Alastair Paterson, and CISO, Rick Holland, for this special guest episode of ShadowTalk. The group walks through Al and Pratik’s recent research together around contact tracing. They look at:- What is contact tracing and how does it work?- How have we done contact tracing in previous pandemics and will it work for COVID-19?- Privacy Risks and balancing the tradeoff between health and privacy- Big TechRead the full blog from Al and Pratik at https://www.digitalshadows.com/blog-and-research/contact-tracing-can-big-tech-come-to-the-rescue-and-at-what-cost/You can find Pratik on Twitter @progdoctalk or at https://profiles.ucsf.edu/pratik.sinha]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461221-special-episode-contact-tracing-and-covid-19.mp3" length="27552495" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/zfe81jxjdqoo2gmg3c60ostlrx94?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/825481936</guid>
    <pubDate>Thu, 21 May 2020 19:48:15 -0400</pubDate>
    <itunes:duration>2294</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>SPECIAL EPISODE: Remote Worker Security: Tech &amp; ISP Providers, Data Security, And The Future</itunes:title>
    <title>SPECIAL EPISODE: Remote Worker Security: Tech &amp; ISP Providers, Data Security, And The Future</title>
    <itunes:summary><![CDATA[We're pleased to have a special guest, Steve Marshall, CISO and Head of Cyber Consulting at Bytes- a Software Licensing Reseller &amp; IT Security Services.in this special episode, Steve Marshall, Viktoria Austin, and James Chappell look at the industry at a macro level - delving into stories and themes that have changed how we communicate, how we work, securely, but also what the future of remote working looks like. In the UK and across the world, remote working has become - for many -  the ...]]></itunes:summary>
    <description><![CDATA[We&apos;re pleased to have a special guest, Steve Marshall, CISO and Head of Cyber Consulting at Bytes- a Software Licensing Reseller &amp; IT Security Services.in this special episode, Steve Marshall, Viktoria Austin, and James Chappell look at the industry at a macro level - delving into stories and themes that have changed how we communicate, how we work, securely, but also what the future of remote working looks like. In the UK and across the world, remote working has become - for many -  the new norm. But how prepared were organizations for this change? Likewise, on the supplier side, were the technologies - such as video communications, ISP providers - prepared for this? What does the future of working look like now? For more threat intelligence resources around COVID-19, please visit https://resources.digitalshadows.com/coronavirus-threat-intelligence-resourcesThanks for listening and special shout out to Steve for joining. Cheers!]]></description>
    <content:encoded><![CDATA[We&apos;re pleased to have a special guest, Steve Marshall, CISO and Head of Cyber Consulting at Bytes- a Software Licensing Reseller &amp; IT Security Services.in this special episode, Steve Marshall, Viktoria Austin, and James Chappell look at the industry at a macro level - delving into stories and themes that have changed how we communicate, how we work, securely, but also what the future of remote working looks like. In the UK and across the world, remote working has become - for many -  the new norm. But how prepared were organizations for this change? Likewise, on the supplier side, were the technologies - such as video communications, ISP providers - prepared for this? What does the future of working look like now? For more threat intelligence resources around COVID-19, please visit https://resources.digitalshadows.com/coronavirus-threat-intelligence-resourcesThanks for listening and special shout out to Steve for joining. Cheers!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461222-special-episode-remote-worker-security-tech-isp-providers-data-security-and-the-future.mp3" length="42425144" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/x99i9rqjz2lu8wa04ufcgmo9rv0q?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/824796868</guid>
    <pubDate>Wed, 20 May 2020 20:15:19 -0400</pubDate>
    <itunes:duration>3533</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WEEKLY: WannaCry Anniversary, Wordpress Plugin Vuln, WeLeakData Compromised</itunes:title>
    <title>WEEKLY: WannaCry Anniversary, Wordpress Plugin Vuln, WeLeakData Compromised</title>
    <itunes:summary><![CDATA[The team starts this week’s episode with a retrospective look at WannaCry, discussing some core lessons learned from this ransomware attack. Viktoria, Demelza, Adam, and Jamie then dig through other top stories including:- A wordpress plugin vulnerability - WeLeakData[.]com compromised with the hackers’ messages leaked- BitBazaar Dark Web Market deception and manipulationGet this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary***Resources this W...]]></itunes:summary>
    <description><![CDATA[The team starts this week’s episode with a retrospective look at WannaCry, discussing some core lessons learned from this ransomware attack. Viktoria, Demelza, Adam, and Jamie then dig through other top stories including:- A wordpress plugin vulnerability - WeLeakData[.]com compromised with the hackers’ messages leaked- BitBazaar Dark Web Market deception and manipulationGet this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary***Resources this Week***BitBazaar: https://www.digitalshadows.com/blog-and-research/bitbazaar-market-deception-and-manipulation-on-the-dark-web/]]></description>
    <content:encoded><![CDATA[The team starts this week’s episode with a retrospective look at WannaCry, discussing some core lessons learned from this ransomware attack. Viktoria, Demelza, Adam, and Jamie then dig through other top stories including:- A wordpress plugin vulnerability - WeLeakData[.]com compromised with the hackers’ messages leaked- BitBazaar Dark Web Market deception and manipulationGet this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary***Resources this Week***BitBazaar: https://www.digitalshadows.com/blog-and-research/bitbazaar-market-deception-and-manipulation-on-the-dark-web/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461223-weekly-wannacry-anniversary-wordpress-plugin-vuln-weleakdata-compromised.mp3" length="17209319" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/rtzv61ptm17g41agjscokpihnoua?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/822434062</guid>
    <pubDate>Sun, 17 May 2020 13:26:25 -0400</pubDate>
    <itunes:duration>1432</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WEEKLY: Competitions On English Forums, Purple Teaming, &amp; Hacker Bribes &#39;Roblox&#39; Insider</itunes:title>
    <title>WEEKLY: Competitions On English Forums, Purple Teaming, &amp; Hacker Bribes &#39;Roblox&#39; Insider</title>
    <itunes:summary><![CDATA[This week Alex chats with Kacey, Charles, and Rick around competitions we’ve been seeing on English-language cybercriminal forums and how they compare to the ones on Russian-language forums, purple teaming, and how a hacker bribed a ‘Roblox’ insider to access user data. And finally… our thoughts on Elon Musk’s new baby’s name. Thanks for listening and stay safe out there!***Resources from This Week***Competitions on English-Language Forums: https://www.digitalshadows.com/blog-and-research/com...]]></itunes:summary>
    <description><![CDATA[This week Alex chats with Kacey, Charles, and Rick around competitions we’ve been seeing on English-language cybercriminal forums and how they compare to the ones on Russian-language forums, purple teaming, and how a hacker bribed a ‘Roblox’ insider to access user data. And finally… our thoughts on Elon Musk’s new baby’s name. Thanks for listening and stay safe out there!***Resources from This Week***Competitions on English-Language Forums: https://www.digitalshadows.com/blog-and-research/competitions-english-language-cybercriminal-forums/Hacker Bribed &apos;Roblox&apos; Insider to Access User Data: https://www.vice.com/en_us/article/qj4ddw/hacker-bribed-roblox-insider-accessed-user-data-reset-passwordsSANs Webinar: https://www.sans.org/webcasts/security-leadership-managing-turbulent-times-presented-summits-113310]]></description>
    <content:encoded><![CDATA[This week Alex chats with Kacey, Charles, and Rick around competitions we’ve been seeing on English-language cybercriminal forums and how they compare to the ones on Russian-language forums, purple teaming, and how a hacker bribed a ‘Roblox’ insider to access user data. And finally… our thoughts on Elon Musk’s new baby’s name. Thanks for listening and stay safe out there!***Resources from This Week***Competitions on English-Language Forums: https://www.digitalshadows.com/blog-and-research/competitions-english-language-cybercriminal-forums/Hacker Bribed &apos;Roblox&apos; Insider to Access User Data: https://www.vice.com/en_us/article/qj4ddw/hacker-bribed-roblox-insider-accessed-user-data-reset-passwordsSANs Webinar: https://www.sans.org/webcasts/security-leadership-managing-turbulent-times-presented-summits-113310]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461224-weekly-competitions-on-english-forums-purple-teaming-hacker-bribes-roblox-insider.mp3" length="13785527" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/h5yhdn4xcjmh3ifzgg76w2rh33vw?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/816560539</guid>
    <pubDate>Fri, 08 May 2020 18:45:22 -0400</pubDate>
    <itunes:duration>1147</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>SPECIAL EPISODE: The Human Element Of Cybersecurity Programs With Hacker Valley Studio</itunes:title>
    <title>SPECIAL EPISODE: The Human Element Of Cybersecurity Programs With Hacker Valley Studio</title>
    <itunes:summary><![CDATA[We’ve got a very special episode for you this week with Hacker Valley Studio guests Ron Eddings and Chris Cochran. CISO Rick Holland and Threat Researcher Alex Guirakhoo chat with Ron and Chris about their backstories and how they got into cybersecurity, their favorite topics from Hacker Valley Studio, and the human element of cybersecurity programs. You can find Ron and Chris at hackervalley.studio or on Twitter @TheHackerValley. And be sure to check out their LinkedIn to give them a vote fo...]]></itunes:summary>
    <description><![CDATA[We’ve got a very special episode for you this week with Hacker Valley Studio guests Ron Eddings and Chris Cochran. CISO Rick Holland and Threat Researcher Alex Guirakhoo chat with Ron and Chris about their backstories and how they got into cybersecurity, their favorite topics from Hacker Valley Studio, and the human element of cybersecurity programs. You can find Ron and Chris at hackervalley.studio or on Twitter @TheHackerValley. And be sure to check out their LinkedIn to give them a vote for the Best New Cybersecurity Podcast for the EU Cybersecurity Blogger Awards! Thanks for listening and have a great week.]]></description>
    <content:encoded><![CDATA[We’ve got a very special episode for you this week with Hacker Valley Studio guests Ron Eddings and Chris Cochran. CISO Rick Holland and Threat Researcher Alex Guirakhoo chat with Ron and Chris about their backstories and how they got into cybersecurity, their favorite topics from Hacker Valley Studio, and the human element of cybersecurity programs. You can find Ron and Chris at hackervalley.studio or on Twitter @TheHackerValley. And be sure to check out their LinkedIn to give them a vote for the Best New Cybersecurity Podcast for the EU Cybersecurity Blogger Awards! Thanks for listening and have a great week.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461225-special-episode-the-human-element-of-cybersecurity-programs-with-hacker-valley-studio.mp3" length="21382246" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/r0lmjhelqc38r0sipqwb3nvcs3go?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/816009850</guid>
    <pubDate>Fri, 08 May 2020 00:02:36 -0400</pubDate>
    <itunes:duration>1780</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WEEKLY: Microsoft Teams ATO Vulnerability, APT32, &amp; Uptick In Ransomware</itunes:title>
    <title>WEEKLY: Microsoft Teams ATO Vulnerability, APT32, &amp; Uptick In Ransomware</title>
    <itunes:summary><![CDATA[Jamie, Adam, and Demelza join Viktoria for this week’s threat intelligence updates.Top stories this week include:- Vulnerability allowed hijacking of Microsoft Teams account with a GIF- APT32 seeks pandemic intel from Wuhan government, Chinese ministry- Microsoft Intelligence team report on uptick in ransomwareCheck out our intelligence summary for more details here: https://resources.digitalshadows.com/weekly-intelligence-summary***Resources from this week***Charitable Endeavors on Cybercrim...]]></itunes:summary>
    <description><![CDATA[Jamie, Adam, and Demelza join Viktoria for this week’s threat intelligence updates.Top stories this week include:- Vulnerability allowed hijacking of Microsoft Teams account with a GIF- APT32 seeks pandemic intel from Wuhan government, Chinese ministry- Microsoft Intelligence team report on uptick in ransomwareCheck out our intelligence summary for more details here: https://resources.digitalshadows.com/weekly-intelligence-summary***Resources from this week***Charitable Endeavors on Cybercriminal Forums: https://www.digitalshadows.com/blog-and-research/charitable-endeavors-on-cybercriminal-forums/Krebs article that features our blog: https://krebsonsecurity.com/2020/04/how-cybercriminals-are-weathering-covid-19/SANS Webinar with Rick Holland: https://www.sans.org/webcasts/security-leadership-managing-turbulent-times-presented-summits-113310Microsoft Blog on Uptick in Ransomware: https://www.microsoft.com/security/blog/2020/04/28/ransomware-groups-continue-to-target-healthcare-critical-services-heres-how-to-reduce-risk/]]></description>
    <content:encoded><![CDATA[Jamie, Adam, and Demelza join Viktoria for this week’s threat intelligence updates.Top stories this week include:- Vulnerability allowed hijacking of Microsoft Teams account with a GIF- APT32 seeks pandemic intel from Wuhan government, Chinese ministry- Microsoft Intelligence team report on uptick in ransomwareCheck out our intelligence summary for more details here: https://resources.digitalshadows.com/weekly-intelligence-summary***Resources from this week***Charitable Endeavors on Cybercriminal Forums: https://www.digitalshadows.com/blog-and-research/charitable-endeavors-on-cybercriminal-forums/Krebs article that features our blog: https://krebsonsecurity.com/2020/04/how-cybercriminals-are-weathering-covid-19/SANS Webinar with Rick Holland: https://www.sans.org/webcasts/security-leadership-managing-turbulent-times-presented-summits-113310Microsoft Blog on Uptick in Ransomware: https://www.microsoft.com/security/blog/2020/04/28/ransomware-groups-continue-to-target-healthcare-critical-services-heres-how-to-reduce-risk/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461226-weekly-microsoft-teams-ato-vulnerability-apt32-uptick-in-ransomware.mp3" length="18314480" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/95olb18px5fjjdy021myapbzm233?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/811479748</guid>
    <pubDate>Fri, 01 May 2020 14:16:33 -0400</pubDate>
    <itunes:duration>1524</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WEEKLY: Maze Ransomware Infiltrates Cognizant, Czech NCISA Warning, And Third Party Risk Assessment</itunes:title>
    <title>WEEKLY: Maze Ransomware Infiltrates Cognizant, Czech NCISA Warning, And Third Party Risk Assessment</title>
    <itunes:summary><![CDATA[Maze Ransomware Infiltrates Cognizant, Czech NCISA Warning, And Third Party Risk Assessment PrioritiesAlex, Kacey, Charles, and Harrison host this week’s ShadowTalk for threat intel updates including Maze ransomware updates, a warning of an imminent threat from the Czech NCISA, priorities for third party risks assessments, and the Nulled Cracking Forum going mobile. Finally, Harrison passes the torch to Alex for hosting ShadowTalk. We’ll miss you, HVR!  Grab this week’s full intelligence summ...]]></itunes:summary>
    <description><![CDATA[Maze Ransomware Infiltrates Cognizant, Czech NCISA Warning, And Third Party Risk Assessment PrioritiesAlex, Kacey, Charles, and Harrison host this week’s ShadowTalk for threat intel updates including Maze ransomware updates, a warning of an imminent threat from the Czech NCISA, priorities for third party risks assessments, and the Nulled Cracking Forum going mobile. Finally, Harrison passes the torch to Alex for hosting ShadowTalk. We’ll miss you, HVR!  Grab this week’s full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary***Resources From this Week***Top Priorities for 3rd Party Risk Assessments: https://www.digitalshadows.com/blog-and-research/top-priorities-for-3rd-party-risk-assessments/Zoom Security and Privacy Issues: https://www.digitalshadows.com/blog-and-research/zoom-security-privacy-issues/Nulled Cracking Forum Going Mobile: https://www.digitalshadows.com/blog-and-research/nulled-modern-cybercriminal-forum-mobile/What the Wire Can Teach us About Cybersecurity: https://www.digitalshadows.com/blog-and-research/what-the-wire-can-teach-us-about-cybersecurity/]]></description>
    <content:encoded><![CDATA[Maze Ransomware Infiltrates Cognizant, Czech NCISA Warning, And Third Party Risk Assessment PrioritiesAlex, Kacey, Charles, and Harrison host this week’s ShadowTalk for threat intel updates including Maze ransomware updates, a warning of an imminent threat from the Czech NCISA, priorities for third party risks assessments, and the Nulled Cracking Forum going mobile. Finally, Harrison passes the torch to Alex for hosting ShadowTalk. We’ll miss you, HVR!  Grab this week’s full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary***Resources From this Week***Top Priorities for 3rd Party Risk Assessments: https://www.digitalshadows.com/blog-and-research/top-priorities-for-3rd-party-risk-assessments/Zoom Security and Privacy Issues: https://www.digitalshadows.com/blog-and-research/zoom-security-privacy-issues/Nulled Cracking Forum Going Mobile: https://www.digitalshadows.com/blog-and-research/nulled-modern-cybercriminal-forum-mobile/What the Wire Can Teach us About Cybersecurity: https://www.digitalshadows.com/blog-and-research/what-the-wire-can-teach-us-about-cybersecurity/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461227-weekly-maze-ransomware-infiltrates-cognizant-czech-ncisa-warning-and-third-party-risk-assessment.mp3" length="24022894" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/et3bsgatja068p2lg8bjv4f9y1lg?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/806300740</guid>
    <pubDate>Fri, 24 Apr 2020 14:36:42 -0400</pubDate>
    <itunes:duration>2000</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WEEKLY: SFO Airport Hack, Fin6, And Sodinokibi Switching From Bitcoin To Monero</itunes:title>
    <title>WEEKLY: SFO Airport Hack, Fin6, And Sodinokibi Switching From Bitcoin To Monero</title>
    <itunes:summary><![CDATA[This week we have new ShadowTalk guest joining us from London, Demelza! She joins Viktoria and Jamie for our threat intel update this week to cover a data breach at the San Francisco airport, Fin6 updates, and how Sodinokibi is attempting to hide their money trail by switching form Bitcoin to Monero.Check out this week’s Intelligence Summary at https://resources.digitalshadows.com/weekly-intelligence-summaryThanks for tuning in, and stay safe out there!***Resources This Week***Remote Working ...]]></itunes:summary>
    <description><![CDATA[This week we have new ShadowTalk guest joining us from London, Demelza! She joins Viktoria and Jamie for our threat intel update this week to cover a data breach at the San Francisco airport, Fin6 updates, and how Sodinokibi is attempting to hide their money trail by switching form Bitcoin to Monero.Check out this week’s Intelligence Summary at https://resources.digitalshadows.com/weekly-intelligence-summaryThanks for tuning in, and stay safe out there!***Resources This Week***Remote Working Threat Model Webinar: https://resources.digitalshadows.com/webinars/threat-model-of-a-remote-worker-recorded-webinar SFO Breach: https://threatpost.com/sfo-websites-hacked-airport-discloses-data-breach/154709/Remote Working and the Future of Cyber Security [Blog]: https://www.digitalshadows.com/blog-and-research/covid-19-remote-working-and-the-future-of-cyber-security/ More COVID19 Threat Intel Resources: https://resources.digitalshadows.com/coronavirus-threat-intelligence-resources]]></description>
    <content:encoded><![CDATA[This week we have new ShadowTalk guest joining us from London, Demelza! She joins Viktoria and Jamie for our threat intel update this week to cover a data breach at the San Francisco airport, Fin6 updates, and how Sodinokibi is attempting to hide their money trail by switching form Bitcoin to Monero.Check out this week’s Intelligence Summary at https://resources.digitalshadows.com/weekly-intelligence-summaryThanks for tuning in, and stay safe out there!***Resources This Week***Remote Working Threat Model Webinar: https://resources.digitalshadows.com/webinars/threat-model-of-a-remote-worker-recorded-webinar SFO Breach: https://threatpost.com/sfo-websites-hacked-airport-discloses-data-breach/154709/Remote Working and the Future of Cyber Security [Blog]: https://www.digitalshadows.com/blog-and-research/covid-19-remote-working-and-the-future-of-cyber-security/ More COVID19 Threat Intel Resources: https://resources.digitalshadows.com/coronavirus-threat-intelligence-resources]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461228-weekly-sfo-airport-hack-fin6-and-sodinokibi-switching-from-bitcoin-to-monero.mp3" length="15551074" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/47ip6q1rj6avptjadr2ul7ml0fio?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/800979568</guid>
    <pubDate>Fri, 17 Apr 2020 13:42:42 -0400</pubDate>
    <itunes:duration>1294</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WEEKLY: COVID-19 Third Party App Risks, Zoom, And DarkHotel Hackers</itunes:title>
    <title>WEEKLY: COVID-19 Third Party App Risks, Zoom, And DarkHotel Hackers</title>
    <itunes:summary><![CDATA[Coming to you from Dallas this week - we have Kacey, Harrison, Alex, and Charles. This week the team talks through third party app risks as they relate to COVID-19, as well as touch on security considerations for video conferencing platforms. We also talk through the latest story around the DarkHotel hackers using a VPN zero-day to compromise Chinese government agencies. Check out this week’s Intelligence Summary at https://resources.digitalshadows.com/weekly-intelligence-summaryAnd for all o...]]></itunes:summary>
    <description><![CDATA[Coming to you from Dallas this week - we have Kacey, Harrison, Alex, and Charles. This week the team talks through third party app risks as they relate to COVID-19, as well as touch on security considerations for video conferencing platforms. We also talk through the latest story around the DarkHotel hackers using a VPN zero-day to compromise Chinese government agencies. Check out this week’s Intelligence Summary at https://resources.digitalshadows.com/weekly-intelligence-summaryAnd for all of our threat intel resources around COVID-19: https://resources.digitalshadows.com/coronavirus-threat-intelligence-resources***Resources from this week***Third party app risks blog from Kacey: https://www.digitalshadows.com/blog-and-research/covid-19-risks-of-third-party-apps/Webinar: Threat Model of a Remote Worker (April 16th): https://info.digitalshadows.com/Webinar-Threat-Model-of-a-Remote-Worker.html?Source=podcastSANS webinar recording with Alex: https://www.sans.org/webcasts/archive/2020DarkHotel news: https://www.zdnet.com/article/darkhotel-hackers-use-vpn-zero-day-to-compromise-chinese-government-agencies/]]></description>
    <content:encoded><![CDATA[Coming to you from Dallas this week - we have Kacey, Harrison, Alex, and Charles. This week the team talks through third party app risks as they relate to COVID-19, as well as touch on security considerations for video conferencing platforms. We also talk through the latest story around the DarkHotel hackers using a VPN zero-day to compromise Chinese government agencies. Check out this week’s Intelligence Summary at https://resources.digitalshadows.com/weekly-intelligence-summaryAnd for all of our threat intel resources around COVID-19: https://resources.digitalshadows.com/coronavirus-threat-intelligence-resources***Resources from this week***Third party app risks blog from Kacey: https://www.digitalshadows.com/blog-and-research/covid-19-risks-of-third-party-apps/Webinar: Threat Model of a Remote Worker (April 16th): https://info.digitalshadows.com/Webinar-Threat-Model-of-a-Remote-Worker.html?Source=podcastSANS webinar recording with Alex: https://www.sans.org/webcasts/archive/2020DarkHotel news: https://www.zdnet.com/article/darkhotel-hackers-use-vpn-zero-day-to-compromise-chinese-government-agencies/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461229-weekly-covid-19-third-party-app-risks-zoom-and-darkhotel-hackers.mp3" length="16566878" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/797011c35v4bfvanuaejizm2zxmg?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/795519124</guid>
    <pubDate>Fri, 10 Apr 2020 14:33:44 -0400</pubDate>
    <itunes:duration>1379</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WEEKLY: Zoom Zero-Day Vulnerabilities and Fin7 Delivering Malware Via Snail Mail</itunes:title>
    <title>WEEKLY: Zoom Zero-Day Vulnerabilities and Fin7 Delivering Malware Via Snail Mail</title>
    <itunes:summary><![CDATA[Hey all you cool cats and kittens! We’ve got a brand-new threat intel episode for you coming from our virtual podcast studio with Adam, Jamie, and Viktoria.The team chat through the latest Zoom zero-day flaws discovered, and the story around Fin7 delivering malware via USB sticks and teddy bears in the mail. Get this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summaryStay safe out there!***Resources From this Week***Dig...]]></itunes:summary>
    <description><![CDATA[Hey all you cool cats and kittens! We’ve got a brand-new threat intel episode for you coming from our virtual podcast studio with Adam, Jamie, and Viktoria.The team chat through the latest Zoom zero-day flaws discovered, and the story around Fin7 delivering malware via USB sticks and teddy bears in the mail. Get this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summaryStay safe out there!***Resources From this Week***Digital Risk Remediation blog: https://www.digitalshadows.com/blog-and-research/the-digital-risk-underdog-remediation/Webinar ‘Operationalizing Alerts: The Problem with Sitting in Triage’: https://info.digitalshadows.com/Operationalizing-Alerts_Reg.html?Source=podcastMore COVID-19 Content: https://resources.digitalshadows.com/coronavirus-threat-intelligence-resources]]></description>
    <content:encoded><![CDATA[Hey all you cool cats and kittens! We’ve got a brand-new threat intel episode for you coming from our virtual podcast studio with Adam, Jamie, and Viktoria.The team chat through the latest Zoom zero-day flaws discovered, and the story around Fin7 delivering malware via USB sticks and teddy bears in the mail. Get this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summaryStay safe out there!***Resources From this Week***Digital Risk Remediation blog: https://www.digitalshadows.com/blog-and-research/the-digital-risk-underdog-remediation/Webinar ‘Operationalizing Alerts: The Problem with Sitting in Triage’: https://info.digitalshadows.com/Operationalizing-Alerts_Reg.html?Source=podcastMore COVID-19 Content: https://resources.digitalshadows.com/coronavirus-threat-intelligence-resources]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461230-weekly-zoom-zero-day-vulnerabilities-and-fin7-delivering-malware-via-snail-mail.mp3" length="15782290" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/j5r6bauqho69zspdry4n4u2burk0?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/790048996</guid>
    <pubDate>Fri, 03 Apr 2020 12:23:04 -0400</pubDate>
    <itunes:duration>1313</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WEEKLY: Remote Worker Threat Model And Cybercrime Updates</itunes:title>
    <title>WEEKLY: Remote Worker Threat Model And Cybercrime Updates</title>
    <itunes:summary><![CDATA[This week the team looks at some Coronavirus threat intel updates including a Threat Model of the Remote Worker and the top businesses and industries most likely to be targeted by cyber attacks. Then the team looks at some cybercrime stories including how the Kapusta service is using marketing tactics, and a story around FSB arresting a cybercrime group. Finally … an advanced persistent… cow?Hear this and more from Kacey, Alex, Harrison, and Rick in this week’s episode!***Resources from this ...]]></itunes:summary>
    <description><![CDATA[This week the team looks at some Coronavirus threat intel updates including a Threat Model of the Remote Worker and the top businesses and industries most likely to be targeted by cyber attacks. Then the team looks at some cybercrime stories including how the Kapusta service is using marketing tactics, and a story around FSB arresting a cybercrime group. Finally … an advanced persistent… cow?Hear this and more from Kacey, Alex, Harrison, and Rick in this week’s episode!***Resources from this week***COVID-19 (Coronavirus) Resources: https://resources.digitalshadows.com/coronavirus-threat-intelligence-resourcesThreat Model of a Remote Worker: https://www.digitalshadows.com/blog-and-research/threat-model-of-a-remote-worker/Phishing Research Webinar Recording: https://resources.digitalshadows.com/webinars/beware-of-phishers-research-webinarKapusta: https://www.digitalshadows.com/blog-and-research/kapusta-world-exemplifying-cybercriminal-marketing-in-the-modern-era/FSB Arrests Cybercrime Group: https://www.cyberscoop.com/buybest-hackers-arrested-fsb-russia/]]></description>
    <content:encoded><![CDATA[This week the team looks at some Coronavirus threat intel updates including a Threat Model of the Remote Worker and the top businesses and industries most likely to be targeted by cyber attacks. Then the team looks at some cybercrime stories including how the Kapusta service is using marketing tactics, and a story around FSB arresting a cybercrime group. Finally … an advanced persistent… cow?Hear this and more from Kacey, Alex, Harrison, and Rick in this week’s episode!***Resources from this week***COVID-19 (Coronavirus) Resources: https://resources.digitalshadows.com/coronavirus-threat-intelligence-resourcesThreat Model of a Remote Worker: https://www.digitalshadows.com/blog-and-research/threat-model-of-a-remote-worker/Phishing Research Webinar Recording: https://resources.digitalshadows.com/webinars/beware-of-phishers-research-webinarKapusta: https://www.digitalshadows.com/blog-and-research/kapusta-world-exemplifying-cybercriminal-marketing-in-the-modern-era/FSB Arrests Cybercrime Group: https://www.cyberscoop.com/buybest-hackers-arrested-fsb-russia/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461231-weekly-remote-worker-threat-model-and-cybercrime-updates.mp3" length="16210570" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ygqknywxi1lghoervs72mfbl02nw?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/784760824</guid>
    <pubDate>Fri, 27 Mar 2020 14:55:32 -0400</pubDate>
    <itunes:duration>1349</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WEEKLY: Slack Vulnerability, Apollon Dark Web Exit Scam, And Online Brand Protection</itunes:title>
    <title>WEEKLY: Slack Vulnerability, Apollon Dark Web Exit Scam, And Online Brand Protection</title>
    <itunes:summary><![CDATA[We’ve got Adam and Jamie joining Viktoria remotely for this week’s ShadowTalk! The London crew chats through the Slack vulnerability story, the news around the Dutch government losing hard drives with data of 6.9 million registered donors, the Apollon Dark Web Exit Scam, and who should own brand protection within an organization. Don’t miss our special episode this week with CISO Rick Holland, Alex, and Harrison on Coronavirus Threat Intel updates and advice. Thanks for listening and stay saf...]]></itunes:summary>
    <description><![CDATA[We’ve got Adam and Jamie joining Viktoria remotely for this week’s ShadowTalk! The London crew chats through the Slack vulnerability story, the news around the Dutch government losing hard drives with data of 6.9 million registered donors, the Apollon Dark Web Exit Scam, and who should own brand protection within an organization. Don’t miss our special episode this week with CISO Rick Holland, Alex, and Harrison on Coronavirus Threat Intel updates and advice. Thanks for listening and stay safe out there! ***Resources from this week***Coronavirus Threat Intel Resources: https://resources.digitalshadows.com/coronavirus-threat-intelligence-resourcesApollon Dark Web Exit Scam: https://www.digitalshadows.com/blog-and-research/apollon-dark-web-marketplace-exit-scams-and-ddos-campaigns/Online Brand Protection Guide (from Viktoria herself!): https://www.digitalshadows.com/blog-and-research/the-complete-guide-to-online-brand-protection/We’ve also got a few webinars coming up if you’re interested in our online events. Check them out at https://resources.digitalshadows.com/webinars]]></description>
    <content:encoded><![CDATA[We’ve got Adam and Jamie joining Viktoria remotely for this week’s ShadowTalk! The London crew chats through the Slack vulnerability story, the news around the Dutch government losing hard drives with data of 6.9 million registered donors, the Apollon Dark Web Exit Scam, and who should own brand protection within an organization. Don’t miss our special episode this week with CISO Rick Holland, Alex, and Harrison on Coronavirus Threat Intel updates and advice. Thanks for listening and stay safe out there! ***Resources from this week***Coronavirus Threat Intel Resources: https://resources.digitalshadows.com/coronavirus-threat-intelligence-resourcesApollon Dark Web Exit Scam: https://www.digitalshadows.com/blog-and-research/apollon-dark-web-marketplace-exit-scams-and-ddos-campaigns/Online Brand Protection Guide (from Viktoria herself!): https://www.digitalshadows.com/blog-and-research/the-complete-guide-to-online-brand-protection/We’ve also got a few webinars coming up if you’re interested in our online events. Check them out at https://resources.digitalshadows.com/webinars]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461232-weekly-slack-vulnerability-apollon-dark-web-exit-scam-and-online-brand-protection.mp3" length="16317159" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/qt9q90rqnjxljetykq57f6tyslgd?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/779865373</guid>
    <pubDate>Fri, 20 Mar 2020 16:42:52 -0400</pubDate>
    <itunes:duration>1358</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>SPECIAL EPISODE: Coronavirus: Cybercrime Reactions And CISO Advice</itunes:title>
    <title>SPECIAL EPISODE: Coronavirus: Cybercrime Reactions And CISO Advice</title>
    <itunes:summary><![CDATA[CISO and VP of Strategy, Rick Holland, joins Alex and Harrison for this special episode to discuss how cybercriminals are exploiting Coronavirus (COVID-19). With regards to Coronavirus, the team looks at:- What kinds of discussions are taking place right now on the dark web and other criminal outposts?- What should organizations be on the lookout for right now?- Advice for other CISOs and security practitioners For more information, check out our Coronavirus threat intelligence resources at h...]]></itunes:summary>
    <description><![CDATA[CISO and VP of Strategy, Rick Holland, joins Alex and Harrison for this special episode to discuss how cybercriminals are exploiting Coronavirus (COVID-19). With regards to Coronavirus, the team looks at:- What kinds of discussions are taking place right now on the dark web and other criminal outposts?- What should organizations be on the lookout for right now?- Advice for other CISOs and security practitioners For more information, check out our Coronavirus threat intelligence resources at https://resources.digitalshadows.com/coronavirus-threat-intelligence-resourcesWe’ll continue to update this page with new content as we see further developments, so check back for more. Thanks for listening and stay safe!]]></description>
    <content:encoded><![CDATA[CISO and VP of Strategy, Rick Holland, joins Alex and Harrison for this special episode to discuss how cybercriminals are exploiting Coronavirus (COVID-19). With regards to Coronavirus, the team looks at:- What kinds of discussions are taking place right now on the dark web and other criminal outposts?- What should organizations be on the lookout for right now?- Advice for other CISOs and security practitioners For more information, check out our Coronavirus threat intelligence resources at https://resources.digitalshadows.com/coronavirus-threat-intelligence-resourcesWe’ll continue to update this page with new content as we see further developments, so check back for more. Thanks for listening and stay safe!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461233-special-episode-coronavirus-cybercrime-reactions-and-ciso-advice.mp3" length="14284725" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/uqa2xg3yi26j4ub1r06uzn93tgdd?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/779305603</guid>
    <pubDate>Thu, 19 Mar 2020 19:43:33 -0400</pubDate>
    <itunes:duration>1188</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WEEKLY: Necurs Botnet, SMB Vulnerability, Coronavirus Scams, And Dark Web Updates</itunes:title>
    <title>WEEKLY: Necurs Botnet, SMB Vulnerability, Coronavirus Scams, And Dark Web Updates</title>
    <itunes:summary><![CDATA[Dallas is packing up the podcast… don’t fret. The team is just moving offices. RIP (rest in podcast).The team also packs a ton of news updates in this week. (Yeah, we went there). Here’s this week’s highlights:- Necurs Botnet Indictment- TA505- SMB Vulnerability: Cve 2020 0796- Coronavirus Scams, Fraud, and Misinformation- New cybercrime findings from the team on Envoy and KilosRounding up this week, we have some Pi Day history (and jokes of course!). Thanks for listening. Check out this week...]]></itunes:summary>
    <description><![CDATA[Dallas is packing up the podcast… don’t fret. The team is just moving offices. RIP (rest in podcast).The team also packs a ton of news updates in this week. (Yeah, we went there). Here’s this week’s highlights:- Necurs Botnet Indictment- TA505- SMB Vulnerability: Cve 2020 0796- Coronavirus Scams, Fraud, and Misinformation- New cybercrime findings from the team on Envoy and KilosRounding up this week, we have some Pi Day history (and jokes of course!). Thanks for listening. Check out this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary. ***Resources From this Week***Coronavirus Scams, Fraud, and Misinformation Findings: https://www.digitalshadows.com/blog-and-research/how-cybercriminals-are-taking-advantage-of-covid-19-scams-fraud-misinformation/Envoy Addressing Suicide Awareness: https://www.digitalshadows.com/blog-and-research/how-one-cybercriminal-forum-is-helping-to-address-suicide-awareness-envoy/Kilos Dark Web Search Engine: https://www.digitalshadows.com/blog-and-research/dark-web-search-engine-kilos/]]></description>
    <content:encoded><![CDATA[Dallas is packing up the podcast… don’t fret. The team is just moving offices. RIP (rest in podcast).The team also packs a ton of news updates in this week. (Yeah, we went there). Here’s this week’s highlights:- Necurs Botnet Indictment- TA505- SMB Vulnerability: Cve 2020 0796- Coronavirus Scams, Fraud, and Misinformation- New cybercrime findings from the team on Envoy and KilosRounding up this week, we have some Pi Day history (and jokes of course!). Thanks for listening. Check out this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary. ***Resources From this Week***Coronavirus Scams, Fraud, and Misinformation Findings: https://www.digitalshadows.com/blog-and-research/how-cybercriminals-are-taking-advantage-of-covid-19-scams-fraud-misinformation/Envoy Addressing Suicide Awareness: https://www.digitalshadows.com/blog-and-research/how-one-cybercriminal-forum-is-helping-to-address-suicide-awareness-envoy/Kilos Dark Web Search Engine: https://www.digitalshadows.com/blog-and-research/dark-web-search-engine-kilos/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461234-weekly-necurs-botnet-smb-vulnerability-coronavirus-scams-and-dark-web-updates.mp3" length="22612476" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/3shq1639x2he495uvd9vxzybggv6?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/775611340</guid>
    <pubDate>Fri, 13 Mar 2020 14:14:11 -0400</pubDate>
    <itunes:duration>1882</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WEEKLY: Banking Trojan Steals Google Authen Codes, Ransomware Attacks Epiq, &amp; Tesco Clubcard Fraud</itunes:title>
    <title>WEEKLY: Banking Trojan Steals Google Authen Codes, Ransomware Attacks Epiq, &amp; Tesco Clubcard Fraud</title>
    <itunes:summary><![CDATA[Lots of threat intelligence news updates in this week’s ShadowTalk episode with Jamie Collier, Adam Cook, and Viktoria Austin. Top stories this week include:- NCSC advising consumers on security precautions around smart cameras and baby monitors- Banking Trojan steals Google Authenticator app codes- Ransomware Attack on Epiq Legal Services- Tesco Clubcard fraud warning- Boots Advantage Card hit by cyber attack Get this week’s Intelligence Summary at https://resources.digitalshadows.com/weekly...]]></itunes:summary>
    <description><![CDATA[Lots of threat intelligence news updates in this week’s ShadowTalk episode with Jamie Collier, Adam Cook, and Viktoria Austin. Top stories this week include:- NCSC advising consumers on security precautions around smart cameras and baby monitors- Banking Trojan steals Google Authenticator app codes- Ransomware Attack on Epiq Legal Services- Tesco Clubcard fraud warning- Boots Advantage Card hit by cyber attack Get this week’s Intelligence Summary at https://resources.digitalshadows.com/weekly-intelligence-summary***Resources From This Week***NCSC smart camera and baby monitor warning: https://www.bbc.com/news/technology-517066312FA in Review: https://resources.digitalshadows.com/whitepapers-and-reports/two-factor-in-review Dark Web Search Engine Kilos: https://www.digitalshadows.com/blog-and-research/dark-web-search-engine-kilos/]]></description>
    <content:encoded><![CDATA[Lots of threat intelligence news updates in this week’s ShadowTalk episode with Jamie Collier, Adam Cook, and Viktoria Austin. Top stories this week include:- NCSC advising consumers on security precautions around smart cameras and baby monitors- Banking Trojan steals Google Authenticator app codes- Ransomware Attack on Epiq Legal Services- Tesco Clubcard fraud warning- Boots Advantage Card hit by cyber attack Get this week’s Intelligence Summary at https://resources.digitalshadows.com/weekly-intelligence-summary***Resources From This Week***NCSC smart camera and baby monitor warning: https://www.bbc.com/news/technology-517066312FA in Review: https://resources.digitalshadows.com/whitepapers-and-reports/two-factor-in-review Dark Web Search Engine Kilos: https://www.digitalshadows.com/blog-and-research/dark-web-search-engine-kilos/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461235-weekly-banking-trojan-steals-google-authen-codes-ransomware-attacks-epiq-tesco-clubcard-fraud.mp3" length="19956171" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/81cl9ne0r58expr9u15mtof2h0um?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/771815773</guid>
    <pubDate>Fri, 06 Mar 2020 12:00:00 -0500</pubDate>
    <itunes:duration>1661</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>SPECIAL EPISODE: FBI Releases Its Internet Crime Complaint Center (IC3) Report 2019</itunes:title>
    <title>SPECIAL EPISODE: FBI Releases Its Internet Crime Complaint Center (IC3) Report 2019</title>
    <itunes:summary><![CDATA[Alex, Harrison, and Rick discuss this year’s FBI IC3 (Internet Crime Complaint Center) report. In 2019, the FBI responded to over 460,000 complaints and observed estimated losses of over $3.5 billion across all instances of reported cybercrime. In comparison, there were over 350,000 complaints and $2.7 billion in losses, as reported in the previous year’s 2018 IC3 report. That’s a 33% increase in the number of reports and a 30% increase in total reported losses from 2018 to 2019.The team cove...]]></itunes:summary>
    <description><![CDATA[Alex, Harrison, and Rick discuss this year’s FBI IC3 (Internet Crime Complaint Center) report. In 2019, the FBI responded to over 460,000 complaints and observed estimated losses of over $3.5 billion across all instances of reported cybercrime. In comparison, there were over 350,000 complaints and $2.7 billion in losses, as reported in the previous year’s 2018 IC3 report. That’s a 33% increase in the number of reports and a 30% increase in total reported losses from 2018 to 2019.The team covers:- Business Email Compromise- Phishing- Reported Financial Losses skyrocketing for victims under 20- RansomwareCheck out our blog for more here: https://www.digitalshadows.com/blog-and-research/Check out the full FBI IC3 report here: https://pdf.ic3.gov/2019_IC3Report.pdf]]></description>
    <content:encoded><![CDATA[Alex, Harrison, and Rick discuss this year’s FBI IC3 (Internet Crime Complaint Center) report. In 2019, the FBI responded to over 460,000 complaints and observed estimated losses of over $3.5 billion across all instances of reported cybercrime. In comparison, there were over 350,000 complaints and $2.7 billion in losses, as reported in the previous year’s 2018 IC3 report. That’s a 33% increase in the number of reports and a 30% increase in total reported losses from 2018 to 2019.The team covers:- Business Email Compromise- Phishing- Reported Financial Losses skyrocketing for victims under 20- RansomwareCheck out our blog for more here: https://www.digitalshadows.com/blog-and-research/Check out the full FBI IC3 report here: https://pdf.ic3.gov/2019_IC3Report.pdf]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461236-special-episode-fbi-releases-its-internet-crime-complaint-center-ic3-report-2019.mp3" length="15961100" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/yvqcta6axajyo7qo0dfc71yf97hd?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/770230732</guid>
    <pubDate>Tue, 03 Mar 2020 13:49:29 -0500</pubDate>
    <itunes:duration>1328</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WEEKLY: Data Breaches, Stalkerware, and Dopplepaymer ransomware</itunes:title>
    <title>WEEKLY: Data Breaches, Stalkerware, and Dopplepaymer ransomware</title>
    <itunes:summary><![CDATA[Coming to you from Dallas this week - we’ve got Charles, Kacey, Harrison, and Alex.First up - 3 data breaches this week:1. Decathlon Spain (and also potentially their UK entity)2. Clevguard3. Department of Defense’s Defense Information Systems Agency (DISA)Then we look at the Dopplepaymer ransomware, who launched a site this week. Finally Harrison shares some details around his new blog mapping MITRE ATT&amp;CK to the Equifax Indictment. To check out this week’s intelligence summary, visit ht...]]></itunes:summary>
    <description><![CDATA[Coming to you from Dallas this week - we’ve got Charles, Kacey, Harrison, and Alex.First up - 3 data breaches this week:1. Decathlon Spain (and also potentially their UK entity)2. Clevguard3. Department of Defense’s Defense Information Systems Agency (DISA)Then we look at the Dopplepaymer ransomware, who launched a site this week. Finally Harrison shares some details around his new blog mapping MITRE ATT&amp;CK to the Equifax Indictment. To check out this week’s intelligence summary, visit https://resources.digitalshadows.com/weekly-intelligence-summary***Resources From this Week***Equifax Indictment Blog: https://www.digitalshadows.com/blog-and-research/mapping-mitre-attck-to-the-equifax-indictment/]]></description>
    <content:encoded><![CDATA[Coming to you from Dallas this week - we’ve got Charles, Kacey, Harrison, and Alex.First up - 3 data breaches this week:1. Decathlon Spain (and also potentially their UK entity)2. Clevguard3. Department of Defense’s Defense Information Systems Agency (DISA)Then we look at the Dopplepaymer ransomware, who launched a site this week. Finally Harrison shares some details around his new blog mapping MITRE ATT&amp;CK to the Equifax Indictment. To check out this week’s intelligence summary, visit https://resources.digitalshadows.com/weekly-intelligence-summary***Resources From this Week***Equifax Indictment Blog: https://www.digitalshadows.com/blog-and-research/mapping-mitre-attck-to-the-equifax-indictment/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461237-weekly-data-breaches-stalkerware-and-dopplepaymer-ransomware.mp3" length="21649902" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5rc2247j4tzs6s1h86kiou61lz4f?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/767841241</guid>
    <pubDate>Fri, 28 Feb 2020 01:26:36 -0500</pubDate>
    <itunes:duration>1802</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WEEKLY: OurMine hacks FC Barcelona &amp; Olympics twitter handles, Adsense email extortion, &amp; phishing</itunes:title>
    <title>WEEKLY: OurMine hacks FC Barcelona &amp; Olympics twitter handles, Adsense email extortion, &amp; phishing</title>
    <itunes:summary><![CDATA[Adam and Phil join Viktoria to ‘cause a storm’ on this week’s episode. But first - we get a rundown of the brand new Photon research blog this week around phishing from Harrison and Alex. This Week’s Agenda:1. New phishing ecosystem research we just dropped this week - check it out for some interesting new data findings: https://www.digitalshadows.com/blog-and-research/the-ecosystem-of-phishing/2. OurMine Hacks FC Barcelona and Olympics Twitter Handles 3. Google AdSense Email Extortion Scam4....]]></itunes:summary>
    <description><![CDATA[Adam and Phil join Viktoria to ‘cause a storm’ on this week’s episode. But first - we get a rundown of the brand new Photon research blog this week around phishing from Harrison and Alex. This Week’s Agenda:1. New phishing ecosystem research we just dropped this week - check it out for some interesting new data findings: https://www.digitalshadows.com/blog-and-research/the-ecosystem-of-phishing/2. OurMine Hacks FC Barcelona and Olympics Twitter Handles 3. Google AdSense Email Extortion Scam4. FBI IC3 ReportCheck out this week’s Intelligence Summary (INTSUM) at https://resources.digitalshadows.com/weekly-intelligence-summaryIf you’re headed to RSA Conference, don’t miss meeting the team! Stop by Booth 4617 or our Security Leaders Party Wednesday night! ***Resources From this Week***Phishing Research: https://www.digitalshadows.com/blog-and-research/the-ecosystem-of-phishing/RSA party registration:  https://info.digitalshadows.com/RSASecurityLeadersParty2020.html?source=DS-team]]></description>
    <content:encoded><![CDATA[Adam and Phil join Viktoria to ‘cause a storm’ on this week’s episode. But first - we get a rundown of the brand new Photon research blog this week around phishing from Harrison and Alex. This Week’s Agenda:1. New phishing ecosystem research we just dropped this week - check it out for some interesting new data findings: https://www.digitalshadows.com/blog-and-research/the-ecosystem-of-phishing/2. OurMine Hacks FC Barcelona and Olympics Twitter Handles 3. Google AdSense Email Extortion Scam4. FBI IC3 ReportCheck out this week’s Intelligence Summary (INTSUM) at https://resources.digitalshadows.com/weekly-intelligence-summaryIf you’re headed to RSA Conference, don’t miss meeting the team! Stop by Booth 4617 or our Security Leaders Party Wednesday night! ***Resources From this Week***Phishing Research: https://www.digitalshadows.com/blog-and-research/the-ecosystem-of-phishing/RSA party registration:  https://info.digitalshadows.com/RSASecurityLeadersParty2020.html?source=DS-team]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461238-weekly-ourmine-hacks-fc-barcelona-olympics-twitter-handles-adsense-email-extortion-phishing.mp3" length="22363208" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/4jn9lz3uoe5z9xz4ds48i4n5q0mo?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/764368906</guid>
    <pubDate>Fri, 21 Feb 2020 11:27:47 -0500</pubDate>
    <itunes:duration>1862</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WEEKLY: yOurMine, Equifax Indictment, and SWIFT POC attack</itunes:title>
    <title>WEEKLY: yOurMine, Equifax Indictment, and SWIFT POC attack</title>
    <itunes:summary><![CDATA[Roses are red, violets are blue, here’s our threat intel podcast, just for you!Kacey, Charles, Alex, and Harrison have a Valentine’s special for you all. This week the team covers:- OurMine hacks- The Equifax Indictment- SWIFT POC attackGet this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary***Resources from this Week***ACH paper: https://resources.digitalshadows.com/whitepapers-and-reports/applying-the-analysis-of-competing-hypotheses-to-the-c...]]></itunes:summary>
    <description><![CDATA[Roses are red, violets are blue, here’s our threat intel podcast, just for you!Kacey, Charles, Alex, and Harrison have a Valentine’s special for you all. This week the team covers:- OurMine hacks- The Equifax Indictment- SWIFT POC attackGet this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary***Resources from this Week***ACH paper: https://resources.digitalshadows.com/whitepapers-and-reports/applying-the-analysis-of-competing-hypotheses-to-the-cyber-domain]]></description>
    <content:encoded><![CDATA[Roses are red, violets are blue, here’s our threat intel podcast, just for you!Kacey, Charles, Alex, and Harrison have a Valentine’s special for you all. This week the team covers:- OurMine hacks- The Equifax Indictment- SWIFT POC attackGet this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary***Resources from this Week***ACH paper: https://resources.digitalshadows.com/whitepapers-and-reports/applying-the-analysis-of-competing-hypotheses-to-the-cyber-domain]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461239-weekly-yourmine-equifax-indictment-and-swift-poc-attack.mp3" length="21542246" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/cf54ch10ivev8w36pyplgicx3akn?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/760616125</guid>
    <pubDate>Fri, 14 Feb 2020 10:39:04 -0500</pubDate>
    <itunes:duration>1793</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>SPECIAL EPISODE: Threat Report ATT&amp;CK Mapping (TRAM) With MITRE’s Sarah Yoder &amp; Jackie Lasky</itunes:title>
    <title>SPECIAL EPISODE: Threat Report ATT&amp;CK Mapping (TRAM) With MITRE’s Sarah Yoder &amp; Jackie Lasky</title>
    <itunes:summary><![CDATA[Sarah Yoder and Jackie Lasky from MITRE join Rick Holland and Harrison Van Riper in this guest episode to talk through their tool, Threat Report ATT&amp;CK Mapping (TRAM). Both Sarah and Jackie are Cyber Security Engineers at The MITRE Corporation and presented this new tool at the recent SANS CTI Summit. During the discussion, they talk through:- What brought them to MITRE- TRAM - what it is, goals that the project was designed to address, and how to get involved- Highlights and key takeaway...]]></itunes:summary>
    <description><![CDATA[Sarah Yoder and Jackie Lasky from MITRE join Rick Holland and Harrison Van Riper in this guest episode to talk through their tool, Threat Report ATT&amp;CK Mapping (TRAM). Both Sarah and Jackie are Cyber Security Engineers at The MITRE Corporation and presented this new tool at the recent SANS CTI Summit. During the discussion, they talk through:- What brought them to MITRE- TRAM - what it is, goals that the project was designed to address, and how to get involved- Highlights and key takeaways from the SANS CTI SummitHuge thanks to Sarah and Jackie for joining! ***Resources From this Episode***Slides from SANS Session: https://www.sans.org/cyber-security-summit/archives/file/summit-archive-1579547257.pdfGithub page: github.com/mitre-attack/tram Sarah’s Twitter: https://twitter.com/sarah__yoder]]></description>
    <content:encoded><![CDATA[Sarah Yoder and Jackie Lasky from MITRE join Rick Holland and Harrison Van Riper in this guest episode to talk through their tool, Threat Report ATT&amp;CK Mapping (TRAM). Both Sarah and Jackie are Cyber Security Engineers at The MITRE Corporation and presented this new tool at the recent SANS CTI Summit. During the discussion, they talk through:- What brought them to MITRE- TRAM - what it is, goals that the project was designed to address, and how to get involved- Highlights and key takeaways from the SANS CTI SummitHuge thanks to Sarah and Jackie for joining! ***Resources From this Episode***Slides from SANS Session: https://www.sans.org/cyber-security-summit/archives/file/summit-archive-1579547257.pdfGithub page: github.com/mitre-attack/tram Sarah’s Twitter: https://twitter.com/sarah__yoder]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461240-special-episode-threat-report-att-ck-mapping-tram-with-mitre-s-sarah-yoder-jackie-lasky.mp3" length="19188472" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/task1xw2dtdcmnq1knmv0t6rpoya?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/758630761</guid>
    <pubDate>Tue, 11 Feb 2020 07:00:30 -0500</pubDate>
    <itunes:duration>1597</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WEEKLY: CTI Frameworks, Wawa Breach Updates, APT34, And Coronavirus Phishing Scams</itunes:title>
    <title>WEEKLY: CTI Frameworks, Wawa Breach Updates, APT34, And Coronavirus Phishing Scams</title>
    <itunes:summary><![CDATA[January was a looooong year. Anyone else? In this week’s episode, Jamie starts by talking about his recent blog, Cyber Threat Intelligence Frameworks, with 5 rules for integrating these frameworks within your organization. Viktoria and Jamie also discuss:- APT34, where Iranian hackers targeted U.S. Gov vendor, Westat- Wawa Breach Developments- Coronavirus Phishing Scams- Winnti Group targeting Hong Kong universitiesCheck out this week’s intelligence summary at https://resources.digitalshadows...]]></itunes:summary>
    <description><![CDATA[January was a looooong year. Anyone else? In this week’s episode, Jamie starts by talking about his recent blog, Cyber Threat Intelligence Frameworks, with 5 rules for integrating these frameworks within your organization. Viktoria and Jamie also discuss:- APT34, where Iranian hackers targeted U.S. Gov vendor, Westat- Wawa Breach Developments- Coronavirus Phishing Scams- Winnti Group targeting Hong Kong universitiesCheck out this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary***Resources From this Week***Jamie’s CTI Blog: https://www.digitalshadows.com/blog-and-research/cyber-threat-intelligence-frameworks-5-rules-for-integrating-these-frameworks/]]></description>
    <content:encoded><![CDATA[January was a looooong year. Anyone else? In this week’s episode, Jamie starts by talking about his recent blog, Cyber Threat Intelligence Frameworks, with 5 rules for integrating these frameworks within your organization. Viktoria and Jamie also discuss:- APT34, where Iranian hackers targeted U.S. Gov vendor, Westat- Wawa Breach Developments- Coronavirus Phishing Scams- Winnti Group targeting Hong Kong universitiesCheck out this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary***Resources From this Week***Jamie’s CTI Blog: https://www.digitalshadows.com/blog-and-research/cyber-threat-intelligence-frameworks-5-rules-for-integrating-these-frameworks/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461241-weekly-cti-frameworks-wawa-breach-updates-apt34-and-coronavirus-phishing-scams.mp3" length="12554940" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/paufcazvmcd9jloapn51exenkz44?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/756703708</guid>
    <pubDate>Fri, 07 Feb 2020 10:52:50 -0500</pubDate>
    <itunes:duration>1044</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WEEKLY: SANS CTI Summit, Snake Ransomware, CacheOut, And Citrix Vuln Update</itunes:title>
    <title>WEEKLY: SANS CTI Summit, Snake Ransomware, CacheOut, And Citrix Vuln Update</title>
    <itunes:summary><![CDATA[Rick Holland jumps in to kick-off this week’s episode to recap the 2020 SANS CTI Summit with Harrison. Then Harrison, Alex, Kacey, and Charles talk through other top stories of the week including: - Snake Malware- Competitions we’re seeing on Russian-language cybercriminal forums- Citrix Vulnerability Update - New ‘CacheOut’ Attack Targets Intel CPUsRounding off the episode, the team shares their favorite infosec twitter post of the week to spice up the episode. Have a great week!  ***Resourc...]]></itunes:summary>
    <description><![CDATA[Rick Holland jumps in to kick-off this week’s episode to recap the 2020 SANS CTI Summit with Harrison. Then Harrison, Alex, Kacey, and Charles talk through other top stories of the week including: - Snake Malware- Competitions we’re seeing on Russian-language cybercriminal forums- Citrix Vulnerability Update - New ‘CacheOut’ Attack Targets Intel CPUsRounding off the episode, the team shares their favorite infosec twitter post of the week to spice up the episode. Have a great week!  ***Resources From this Week*** - SANS CTI Summit Recap: https://www.digitalshadows.com/blog-and-research/sans-cyber-threat-intelligence-summit-2020-a-recap/- Competitions on Russian-language cybercriminal forums blog: https://www.digitalshadows.com/blog-and-research/competitions-on-russian-language-cybercriminal-forums-sharing-expertise-or-threat-actor-showboating/- Cyber Threat Intel Frameworks blog: https://www.digitalshadows.com/blog-and-research/cyber-threat-intelligence-frameworks-5-rules-for-integrating-these-frameworks/- CVE-2019-19781: Analyzing the Exploit: https://www.digitalshadows.com/blog-and-research/cve-2019-19781-analyzing-the-exploit/]]></description>
    <content:encoded><![CDATA[Rick Holland jumps in to kick-off this week’s episode to recap the 2020 SANS CTI Summit with Harrison. Then Harrison, Alex, Kacey, and Charles talk through other top stories of the week including: - Snake Malware- Competitions we’re seeing on Russian-language cybercriminal forums- Citrix Vulnerability Update - New ‘CacheOut’ Attack Targets Intel CPUsRounding off the episode, the team shares their favorite infosec twitter post of the week to spice up the episode. Have a great week!  ***Resources From this Week*** - SANS CTI Summit Recap: https://www.digitalshadows.com/blog-and-research/sans-cyber-threat-intelligence-summit-2020-a-recap/- Competitions on Russian-language cybercriminal forums blog: https://www.digitalshadows.com/blog-and-research/competitions-on-russian-language-cybercriminal-forums-sharing-expertise-or-threat-actor-showboating/- Cyber Threat Intel Frameworks blog: https://www.digitalshadows.com/blog-and-research/cyber-threat-intelligence-frameworks-5-rules-for-integrating-these-frameworks/- CVE-2019-19781: Analyzing the Exploit: https://www.digitalshadows.com/blog-and-research/cve-2019-19781-analyzing-the-exploit/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461242-weekly-sans-cti-summit-snake-ransomware-cacheout-and-citrix-vuln-update.mp3" length="27980001" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/lkpq0f99c9uawp6pjoc72zstoz3i?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/752770726</guid>
    <pubDate>Fri, 31 Jan 2020 10:38:04 -0500</pubDate>
    <itunes:duration>2330</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WEEKLY: Citrix Vulnerability, Microsoft Data Breach, and Telnet Credentials Published</itunes:title>
    <title>WEEKLY: Citrix Vulnerability, Microsoft Data Breach, and Telnet Credentials Published</title>
    <itunes:summary><![CDATA[Following on from last week, Citrix released a first set of patches to fix a vulnerability (CVE-2019 -19781) affecting the company’s NetScaler ADC Application Delivery Controller and it’s Citrix Gateway. Viktoria and Richard Gold discuss how organizations can mitigate the risk.Adam and Phil then join Viktoria to discuss other top stories of the week including 250 million Microsoft customer service and support records exposed on the web. The team also discusses a story where a list of Telnet c...]]></itunes:summary>
    <description><![CDATA[Following on from last week, Citrix released a first set of patches to fix a vulnerability (CVE-2019 -19781) affecting the company’s NetScaler ADC Application Delivery Controller and it’s Citrix Gateway. Viktoria and Richard Gold discuss how organizations can mitigate the risk.Adam and Phil then join Viktoria to discuss other top stories of the week including 250 million Microsoft customer service and support records exposed on the web. The team also discusses a story where a list of Telnet credentials for more than 515,000 servers, home routers, and IoT devices was published on a hacking forum last week and how this story demonstrates the risk posed when threat actors are able to compromise large collections of IoT devices. ***Resources from this week***Charles’ Blog: https://www.digitalshadows.com/blog-and-research/cve-2019-19781-analyzing-the-exploit/Weekly Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-24-jan-2020]]></description>
    <content:encoded><![CDATA[Following on from last week, Citrix released a first set of patches to fix a vulnerability (CVE-2019 -19781) affecting the company’s NetScaler ADC Application Delivery Controller and it’s Citrix Gateway. Viktoria and Richard Gold discuss how organizations can mitigate the risk.Adam and Phil then join Viktoria to discuss other top stories of the week including 250 million Microsoft customer service and support records exposed on the web. The team also discusses a story where a list of Telnet credentials for more than 515,000 servers, home routers, and IoT devices was published on a hacking forum last week and how this story demonstrates the risk posed when threat actors are able to compromise large collections of IoT devices. ***Resources from this week***Charles’ Blog: https://www.digitalshadows.com/blog-and-research/cve-2019-19781-analyzing-the-exploit/Weekly Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-24-jan-2020]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461243-weekly-citrix-vulnerability-microsoft-data-breach-and-telnet-credentials-published.mp3" length="22594617" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/0exwvbdpn0bl1exrg3t7bjkipzb8?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/750062374</guid>
    <pubDate>Sun, 26 Jan 2020 21:00:15 -0500</pubDate>
    <itunes:duration>1881</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WEEKLY: NSA Vulnerability Disclosure, Ransomware News, And Iran Updates</itunes:title>
    <title>WEEKLY: NSA Vulnerability Disclosure, Ransomware News, And Iran Updates</title>
    <itunes:summary><![CDATA[Kacey, Charles, Alex, and Harrison host this week’s threat intelligence update from Dallas. We kick off with vulnerabilities from the week. This includes both the NSA CVE and Citrix CVE. The team talks through what the vulnerabilities are and why they’re important. Then the team talks through ransomware updates including Cryptonite ransomware as a service, Sodinokibi operators threatening to release Travelex data, and Nemty operators threatening to release victim data. Finally Harrison gives ...]]></itunes:summary>
    <description><![CDATA[Kacey, Charles, Alex, and Harrison host this week’s threat intelligence update from Dallas. We kick off with vulnerabilities from the week. This includes both the NSA CVE and Citrix CVE. The team talks through what the vulnerabilities are and why they’re important. Then the team talks through ransomware updates including Cryptonite ransomware as a service, Sodinokibi operators threatening to release Travelex data, and Nemty operators threatening to release victim data. Finally Harrison gives a quick update around Iran.To access this week’s intelligence summary, visit https://resources.digitalshadows.com/weekly-intelligence-summary***Resources from this Week***Rick’s Blog on NSA Vulnerability Disclosure: https://www.digitalshadows.com/blog-and-research/nsa-vulnerability-disclosure-pros-and-cons/CVE-2019-19781: Analyzing the Exploit: https://www.digitalshadows.com/blog-and-research/cve-2019-19781-analyzing-the-exploit/Cryptonite Ransomware as a Service: https://www.digitalshadows.com/blog-and-research/cryptonite-ransomwares-answer-to-superman/]]></description>
    <content:encoded><![CDATA[Kacey, Charles, Alex, and Harrison host this week’s threat intelligence update from Dallas. We kick off with vulnerabilities from the week. This includes both the NSA CVE and Citrix CVE. The team talks through what the vulnerabilities are and why they’re important. Then the team talks through ransomware updates including Cryptonite ransomware as a service, Sodinokibi operators threatening to release Travelex data, and Nemty operators threatening to release victim data. Finally Harrison gives a quick update around Iran.To access this week’s intelligence summary, visit https://resources.digitalshadows.com/weekly-intelligence-summary***Resources from this Week***Rick’s Blog on NSA Vulnerability Disclosure: https://www.digitalshadows.com/blog-and-research/nsa-vulnerability-disclosure-pros-and-cons/CVE-2019-19781: Analyzing the Exploit: https://www.digitalshadows.com/blog-and-research/cve-2019-19781-analyzing-the-exploit/Cryptonite Ransomware as a Service: https://www.digitalshadows.com/blog-and-research/cryptonite-ransomwares-answer-to-superman/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461244-weekly-nsa-vulnerability-disclosure-ransomware-news-and-iran-updates.mp3" length="19385102" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/159mbkkppbcw6fmrlsjwvbowxhky?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/745012312</guid>
    <pubDate>Fri, 17 Jan 2020 11:28:21 -0500</pubDate>
    <itunes:duration>1613</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WEEKLY: Iranian Cyber Threats, Travelex Ransomware Attack, And Exploit Forum Updates</itunes:title>
    <title>WEEKLY: Iranian Cyber Threats, Travelex Ransomware Attack, And Exploit Forum Updates</title>
    <itunes:summary><![CDATA[We’re back with our weekly ShadowTalk episodes! Viktoria hosts this week and introduces the episode bringing Sammy on to provide some regional insight and context around the Iranian cyber threat and discusses whether a cyber response is likely. Then Adam and Viktoria discuss other tops stories from the week including a ransomware outage for Travelex, Xiaomi Mijia camera data exposed, and bc[.]monster updates on Exploit forum.Check out our Intelligence Summary at https://resources.digitalshado...]]></itunes:summary>
    <description><![CDATA[We’re back with our weekly ShadowTalk episodes! Viktoria hosts this week and introduces the episode bringing Sammy on to provide some regional insight and context around the Iranian cyber threat and discusses whether a cyber response is likely. Then Adam and Viktoria discuss other tops stories from the week including a ransomware outage for Travelex, Xiaomi Mijia camera data exposed, and bc[.]monster updates on Exploit forum.Check out our Intelligence Summary at https://resources.digitalshadows.com/weekly-intelligence-summaryExcited for what 2020 will bring - thanks for listening! ***Resources from this Week***Practical Advice around Iranian Cyber Threats: https://www.digitalshadows.com/blog-and-research/iranian-cyber-threats-practical-advice-for-security-professionals/Iranian APT Groups’ Tradecraft Styles: https://www.digitalshadows.com/blog-and-research/iranian-apt-groups-tradecraft-styles-using-mitre-attck-and-the-asd-essential-8/Iran and Soleimani: Monitoring the Situation: https://www.digitalshadows.com/blog-and-research/iran-and-soleimani-monitoring-the-situation/]]></description>
    <content:encoded><![CDATA[We’re back with our weekly ShadowTalk episodes! Viktoria hosts this week and introduces the episode bringing Sammy on to provide some regional insight and context around the Iranian cyber threat and discusses whether a cyber response is likely. Then Adam and Viktoria discuss other tops stories from the week including a ransomware outage for Travelex, Xiaomi Mijia camera data exposed, and bc[.]monster updates on Exploit forum.Check out our Intelligence Summary at https://resources.digitalshadows.com/weekly-intelligence-summaryExcited for what 2020 will bring - thanks for listening! ***Resources from this Week***Practical Advice around Iranian Cyber Threats: https://www.digitalshadows.com/blog-and-research/iranian-cyber-threats-practical-advice-for-security-professionals/Iranian APT Groups’ Tradecraft Styles: https://www.digitalshadows.com/blog-and-research/iranian-apt-groups-tradecraft-styles-using-mitre-attck-and-the-asd-essential-8/Iran and Soleimani: Monitoring the Situation: https://www.digitalshadows.com/blog-and-research/iran-and-soleimani-monitoring-the-situation/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461245-weekly-iranian-cyber-threats-travelex-ransomware-attack-and-exploit-forum-updates.mp3" length="19833169" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/0zh8jea6hhmto2ogidcrs8p14dgg?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/741384091</guid>
    <pubDate>Fri, 10 Jan 2020 11:49:52 -0500</pubDate>
    <itunes:duration>1651</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>SPECIAL EPISODE: Iranian Cyber Threats: Practical Advice From CISO Rick Holland</itunes:title>
    <title>SPECIAL EPISODE: Iranian Cyber Threats: Practical Advice From CISO Rick Holland</title>
    <itunes:summary><![CDATA[Rick Holland (CISO at Digital Shadows) joins Harrison to share his thoughts on the Iranian cyber threat and what it means for cyber defenders. What should security practitioners be concerned with within the cyber sphere? Rick and Harrison discuss:- How threat du jour thinking isn’t an adequate defense model- Communicating up the chain of command effectively - Attack Techniques used by Iranian State Actors - What you can do proactively as a Security Practitioner- Why haven’t we seen any signif...]]></itunes:summary>
    <description><![CDATA[Rick Holland (CISO at Digital Shadows) joins Harrison to share his thoughts on the Iranian cyber threat and what it means for cyber defenders. What should security practitioners be concerned with within the cyber sphere? Rick and Harrison discuss:- How threat du jour thinking isn’t an adequate defense model- Communicating up the chain of command effectively - Attack Techniques used by Iranian State Actors - What you can do proactively as a Security Practitioner- Why haven’t we seen any significant cyberattacks yet? We’re continuing to monitor the situation, so check back at https://www.digitalshadows.com/blog-and-research/ for more info from our team. ***Resources This Episode***Rick’s blog on the topic: https://www.digitalshadows.com/blog-and-research/iranian-cyber-threats-practical-advice-for-security-professionals/ Rich Gold’s blog on Mapping the ASD Essential 8 to the Mitre ATT&amp;CK™ framework: https://www.digitalshadows.com/blog-and-research/mapping-the-asd-essential-8-to-the-mitre-attck-framework/]]></description>
    <content:encoded><![CDATA[Rick Holland (CISO at Digital Shadows) joins Harrison to share his thoughts on the Iranian cyber threat and what it means for cyber defenders. What should security practitioners be concerned with within the cyber sphere? Rick and Harrison discuss:- How threat du jour thinking isn’t an adequate defense model- Communicating up the chain of command effectively - Attack Techniques used by Iranian State Actors - What you can do proactively as a Security Practitioner- Why haven’t we seen any significant cyberattacks yet? We’re continuing to monitor the situation, so check back at https://www.digitalshadows.com/blog-and-research/ for more info from our team. ***Resources This Episode***Rick’s blog on the topic: https://www.digitalshadows.com/blog-and-research/iranian-cyber-threats-practical-advice-for-security-professionals/ Rich Gold’s blog on Mapping the ASD Essential 8 to the Mitre ATT&amp;CK™ framework: https://www.digitalshadows.com/blog-and-research/mapping-the-asd-essential-8-to-the-mitre-attck-framework/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461246-special-episode-iranian-cyber-threats-practical-advice-from-ciso-rick-holland.mp3" length="16924163" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/n5pw9xg52s2zb3h0qilhdlugb5wk?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/739455364</guid>
    <pubDate>Mon, 06 Jan 2020 19:20:46 -0500</pubDate>
    <itunes:duration>1408</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Jingle Bell Ryuk: NOLA Ransomware, Ring Doorbells, And 2020 Predictions</itunes:title>
    <title>Jingle Bell Ryuk: NOLA Ransomware, Ring Doorbells, And 2020 Predictions</title>
    <itunes:summary><![CDATA[CISO Rick Holland joins our ShadowTalk hosts (Viktoria, Alex, and Harrison) for our holiday special! This week the team covers:- Ring Doorbell security- New Orleans victim of Ryuk Ransomware- Predictions for 2020 in cybersecurity- A lightning round of holiday questionsThanks to all of you listeners for tuning in each week in 2019. We’ve had a great time chatting each week across the globe, and we’re looking forward to another great year of ShadowTalk in 2020!Cheers!P.S. Check out our holiday ...]]></itunes:summary>
    <description><![CDATA[CISO Rick Holland joins our ShadowTalk hosts (Viktoria, Alex, and Harrison) for our holiday special! This week the team covers:- Ring Doorbell security- New Orleans victim of Ryuk Ransomware- Predictions for 2020 in cybersecurity- A lightning round of holiday questionsThanks to all of you listeners for tuning in each week in 2019. We’ve had a great time chatting each week across the globe, and we’re looking forward to another great year of ShadowTalk in 2020!Cheers!P.S. Check out our holiday photo on Twitter @digitalshadows! ***Resources From the Week***2020 Cybersecurity Forecasts blog from Alex: https://www.digitalshadows.com/blog-and-research/2020-cybersecurity-forecasts-5-trends-and-predictions-for-the-new-year/Download our intelligence summaries at https://resources.digitalshadows.com/weekly-intelligence-summary]]></description>
    <content:encoded><![CDATA[CISO Rick Holland joins our ShadowTalk hosts (Viktoria, Alex, and Harrison) for our holiday special! This week the team covers:- Ring Doorbell security- New Orleans victim of Ryuk Ransomware- Predictions for 2020 in cybersecurity- A lightning round of holiday questionsThanks to all of you listeners for tuning in each week in 2019. We’ve had a great time chatting each week across the globe, and we’re looking forward to another great year of ShadowTalk in 2020!Cheers!P.S. Check out our holiday photo on Twitter @digitalshadows! ***Resources From the Week***2020 Cybersecurity Forecasts blog from Alex: https://www.digitalshadows.com/blog-and-research/2020-cybersecurity-forecasts-5-trends-and-predictions-for-the-new-year/Download our intelligence summaries at https://resources.digitalshadows.com/weekly-intelligence-summary]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461247-jingle-bell-ryuk-nola-ransomware-ring-doorbells-and-2020-predictions.mp3" length="13243610" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/7v2mooqcnblyv8zgzeurim38rkqv?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/730288153</guid>
    <pubDate>Wed, 18 Dec 2019 11:53:52 -0500</pubDate>
    <itunes:duration>1102</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Tochka Dark Web Market Offline, Market.ms Closes, And Data Leakage Stories</itunes:title>
    <title>Tochka Dark Web Market Offline, Market.ms Closes, And Data Leakage Stories</title>
    <itunes:summary><![CDATA[Alex, Harrison, Kacey, and Charles chat this week on some dark web and cybercriminal updates, data leakage stories that have hit the news, plus a GDPR story where an ISP was hit with a €9.6 Million Fine.We’ve got a new format for our weekly intelligence summary report. Check it out at https://resources.digitalshadows.com/weekly-intelligence-summaryThanks for listening and look out for our special (holiday-themed) final ShadowTalk episode of the year next week! ***More Resources This Week***TM...]]></itunes:summary>
    <description><![CDATA[Alex, Harrison, Kacey, and Charles chat this week on some dark web and cybercriminal updates, data leakage stories that have hit the news, plus a GDPR story where an ISP was hit with a €9.6 Million Fine.We’ve got a new format for our weekly intelligence summary report. Check it out at https://resources.digitalshadows.com/weekly-intelligence-summaryThanks for listening and look out for our special (holiday-themed) final ShadowTalk episode of the year next week! ***More Resources This Week***TMI blog on data leakage: https://www.digitalshadows.com/blog-and-research/2-billion-files-exposed-across-online-file-storage-technologies/ Over One Billion Email-Password Combos Leaked Online: -https://www.infosecurity-magazine.com/news/one-billion-email-password-combos/ Data Leak Exposes 750K Birth Certificate Applications https://www.infosecurity-magazine.com/news/data-leak-exposes-750k-birth-cert/ Microsoft: 44 Million User Passwords Have Been Breached https://www.infosecurity-magazine.com/news/microsoft-44-million-passwords/ ISP 1&amp;1 Hit With €9.6 Million GDPR Fine: https://www.infosecurity-magazine.com/news/isp-11-hit-with-96-million-gdpr/]]></description>
    <content:encoded><![CDATA[Alex, Harrison, Kacey, and Charles chat this week on some dark web and cybercriminal updates, data leakage stories that have hit the news, plus a GDPR story where an ISP was hit with a €9.6 Million Fine.We’ve got a new format for our weekly intelligence summary report. Check it out at https://resources.digitalshadows.com/weekly-intelligence-summaryThanks for listening and look out for our special (holiday-themed) final ShadowTalk episode of the year next week! ***More Resources This Week***TMI blog on data leakage: https://www.digitalshadows.com/blog-and-research/2-billion-files-exposed-across-online-file-storage-technologies/ Over One Billion Email-Password Combos Leaked Online: -https://www.infosecurity-magazine.com/news/one-billion-email-password-combos/ Data Leak Exposes 750K Birth Certificate Applications https://www.infosecurity-magazine.com/news/data-leak-exposes-750k-birth-cert/ Microsoft: 44 Million User Passwords Have Been Breached https://www.infosecurity-magazine.com/news/microsoft-44-million-passwords/ ISP 1&amp;1 Hit With €9.6 Million GDPR Fine: https://www.infosecurity-magazine.com/news/isp-11-hit-with-96-million-gdpr/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461248-tochka-dark-web-market-offline-market-ms-closes-and-data-leakage-stories.mp3" length="19940042" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/osynbv247f031ay8srkb2e1x983h?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/727432948</guid>
    <pubDate>Fri, 13 Dec 2019 14:24:46 -0500</pubDate>
    <itunes:duration>1660</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybercriminal Forum Research, Mixcloud Breach, and International Crackdown On RAT Spyware</itunes:title>
    <title>Cybercriminal Forum Research, Mixcloud Breach, and International Crackdown On RAT Spyware</title>
    <itunes:summary><![CDATA[Viktoria invites Stewart Bertram to kick-off this week’s episode around new cybercrime research we put out on the Modern Cybercriminal Forum and how the rise of alternative technologies hasn’t spelled the end of forums, which seem to be prospering against all odds.You can check out the research findings here: https://www.digitalshadows.com/blog-and-research/forums-are-forever-part-1-cybercrime-never-dies/Next Adam Cook joins to discuss the weekly highlights including the Mixcloud Breach and a...]]></itunes:summary>
    <description><![CDATA[Viktoria invites Stewart Bertram to kick-off this week’s episode around new cybercrime research we put out on the Modern Cybercriminal Forum and how the rise of alternative technologies hasn’t spelled the end of forums, which seem to be prospering against all odds.You can check out the research findings here: https://www.digitalshadows.com/blog-and-research/forums-are-forever-part-1-cybercrime-never-dies/Next Adam Cook joins to discuss the weekly highlights including the Mixcloud Breach and an international crackdown on RAT spyware. Finally, our Intelligence team gives a wider analytical piece on the topic of social media exposure and security standards in this week’s intelligence summary report (INTSUM), so make sure to check out that piece in this week’s report. Weekly Intelligence Summary (INTSUM): https://resources.digitalshadows.com/weekly-intelligence-summary***More Resources From this Week***Modern Cybercriminal Forum Research Report: https://resources.digitalshadows.com/whitepapers-and-reports/the-modern-cybercriminal-forumMixcloud Breach: https://www.infosecurity-magazine.com/news/mixcloud-breach-hits-millions-of/International Crackdown on RAT Spyware: https://www.europol.europa.eu/newsroom/news/international-crackdown-rat-spyware-which-takes-total-control-of-victims%E2%80%99-pcs]]></description>
    <content:encoded><![CDATA[Viktoria invites Stewart Bertram to kick-off this week’s episode around new cybercrime research we put out on the Modern Cybercriminal Forum and how the rise of alternative technologies hasn’t spelled the end of forums, which seem to be prospering against all odds.You can check out the research findings here: https://www.digitalshadows.com/blog-and-research/forums-are-forever-part-1-cybercrime-never-dies/Next Adam Cook joins to discuss the weekly highlights including the Mixcloud Breach and an international crackdown on RAT spyware. Finally, our Intelligence team gives a wider analytical piece on the topic of social media exposure and security standards in this week’s intelligence summary report (INTSUM), so make sure to check out that piece in this week’s report. Weekly Intelligence Summary (INTSUM): https://resources.digitalshadows.com/weekly-intelligence-summary***More Resources From this Week***Modern Cybercriminal Forum Research Report: https://resources.digitalshadows.com/whitepapers-and-reports/the-modern-cybercriminal-forumMixcloud Breach: https://www.infosecurity-magazine.com/news/mixcloud-breach-hits-millions-of/International Crackdown on RAT Spyware: https://www.europol.europa.eu/newsroom/news/international-crackdown-rat-spyware-which-takes-total-control-of-victims%E2%80%99-pcs]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461249-cybercriminal-forum-research-mixcloud-breach-and-international-crackdown-on-rat-spyware.mp3" length="19010635" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/sro1bapogjxp6noymzowtg9a8oqg?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/723323053</guid>
    <pubDate>Thu, 05 Dec 2019 16:09:25 -0500</pubDate>
    <itunes:duration>1582</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Black Friday Deals On The Dark Web, Phineas Fisher Manifesto, And DarkMarket</itunes:title>
    <title>Black Friday Deals On The Dark Web, Phineas Fisher Manifesto, And DarkMarket</title>
    <itunes:summary><![CDATA[Adam Cook and Viktoria Austin talk through the security and threat intelligence stories of this week including an update around Phineas Fisher, where the hacker offered up to $100k in what they called the “Hacktivist Bug Hunting Program”.  The team also chats through a recent ransomware attack on Veterinary hospitals in the U.S., and some other ransomware updates. Then Viktoria and Adam touch upon some research from our own threat intelligence team (Photon Research), specifically around the d...]]></itunes:summary>
    <description><![CDATA[Adam Cook and Viktoria Austin talk through the security and threat intelligence stories of this week including an update around Phineas Fisher, where the hacker offered up to $100k in what they called the “Hacktivist Bug Hunting Program”.  The team also chats through a recent ransomware attack on Veterinary hospitals in the U.S., and some other ransomware updates. Then Viktoria and Adam touch upon some research from our own threat intelligence team (Photon Research), specifically around the dark web, including research into Black Friday deals on the dark web, and a look at DarkMarket. To see more threat intelligence updates from the week, make sure to check out this week’s intelligence summary report at https://resources.digitalshadows.com/weekly-intelligence-summary.Heads-up! We’re taking a break next week with the U.S. Holiday, so we’ll be back in 2 weeks. Have a great Thanksgiving! ***Resources From this Week***Phineas Fisher Manifesto - https://www.vice.com/en_us/article/vb5agy/phineas-fisher-offers-dollar100000-bounty-for-hacks-against-banks-and-oil-companiesVeterinary Hospitals Ransomware Attacks: https://krebsonsecurity.com/2019/11/ransomware-bites-400-veterinary-hospitals/DarkMarket: https://www.digitalshadows.com/blog-and-research/darkmarkets-feminist-flight-towards-equality-and-the-curious-case-of-canaries/Black Friday Deals on the Dark Web: https://www.digitalshadows.com/blog-and-research/black-friday-deals-on-the-dark-web-a-cybercriminal-shopper-paradise/]]></description>
    <content:encoded><![CDATA[Adam Cook and Viktoria Austin talk through the security and threat intelligence stories of this week including an update around Phineas Fisher, where the hacker offered up to $100k in what they called the “Hacktivist Bug Hunting Program”.  The team also chats through a recent ransomware attack on Veterinary hospitals in the U.S., and some other ransomware updates. Then Viktoria and Adam touch upon some research from our own threat intelligence team (Photon Research), specifically around the dark web, including research into Black Friday deals on the dark web, and a look at DarkMarket. To see more threat intelligence updates from the week, make sure to check out this week’s intelligence summary report at https://resources.digitalshadows.com/weekly-intelligence-summary.Heads-up! We’re taking a break next week with the U.S. Holiday, so we’ll be back in 2 weeks. Have a great Thanksgiving! ***Resources From this Week***Phineas Fisher Manifesto - https://www.vice.com/en_us/article/vb5agy/phineas-fisher-offers-dollar100000-bounty-for-hacks-against-banks-and-oil-companiesVeterinary Hospitals Ransomware Attacks: https://krebsonsecurity.com/2019/11/ransomware-bites-400-veterinary-hospitals/DarkMarket: https://www.digitalshadows.com/blog-and-research/darkmarkets-feminist-flight-towards-equality-and-the-curious-case-of-canaries/Black Friday Deals on the Dark Web: https://www.digitalshadows.com/blog-and-research/black-friday-deals-on-the-dark-web-a-cybercriminal-shopper-paradise/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461250-black-friday-deals-on-the-dark-web-phineas-fisher-manifesto-and-darkmarket.mp3" length="13714137" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/naplwihsjp3jup71poin1fqrl4dg?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/717002146</guid>
    <pubDate>Fri, 22 Nov 2019 13:48:54 -0500</pubDate>
    <itunes:duration>1141</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>BSidesDFW Recap, Dynamic CVV Analysis, And The Facebook Camera Bug</itunes:title>
    <title>BSidesDFW Recap, Dynamic CVV Analysis, And The Facebook Camera Bug</title>
    <itunes:summary><![CDATA[Dallas is sound effects and all this week with Kacey, Charles, Alex, and Harrison. The team discusses their recent OSINT workshop at BSidesDFW and how you can access the training materials, plus Harrison reviews his latest research into dynamic CVVs within the security realm. Finally the team looks at the recent news around the Facebook camera bug and how the public is reacting. Download the full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summaryHave a gr...]]></itunes:summary>
    <description><![CDATA[Dallas is sound effects and all this week with Kacey, Charles, Alex, and Harrison. The team discusses their recent OSINT workshop at BSidesDFW and how you can access the training materials, plus Harrison reviews his latest research into dynamic CVVs within the security realm. Finally the team looks at the recent news around the Facebook camera bug and how the public is reacting. Download the full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summaryHave a great week, everyone, and check out our resources below for more details. ***Resources from this week****BSidesDFW 2019 Recap: https://www.digitalshadows.com/blog-and-research/bsidesdfw-2019-osint-workshop-recap/* BSidesDFW OSINT GitHub: https://github.com/digitalshadows/virtualwhale-osint-ctf * Orca: https://github.com/digitalshadows/orca Dynamic CVV Blog* https://www.digitalshadows.com/blog-and-research/dynamic-cvvs-2fa-2furiousFacebook Camera Bug* https://www.scmagazine.com/home/security-news/vulnerabilities/system-bug-gives-facebook-access-to-iphone-cameras/]]></description>
    <content:encoded><![CDATA[Dallas is sound effects and all this week with Kacey, Charles, Alex, and Harrison. The team discusses their recent OSINT workshop at BSidesDFW and how you can access the training materials, plus Harrison reviews his latest research into dynamic CVVs within the security realm. Finally the team looks at the recent news around the Facebook camera bug and how the public is reacting. Download the full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summaryHave a great week, everyone, and check out our resources below for more details. ***Resources from this week****BSidesDFW 2019 Recap: https://www.digitalshadows.com/blog-and-research/bsidesdfw-2019-osint-workshop-recap/* BSidesDFW OSINT GitHub: https://github.com/digitalshadows/virtualwhale-osint-ctf * Orca: https://github.com/digitalshadows/orca Dynamic CVV Blog* https://www.digitalshadows.com/blog-and-research/dynamic-cvvs-2fa-2furiousFacebook Camera Bug* https://www.scmagazine.com/home/security-news/vulnerabilities/system-bug-gives-facebook-access-to-iphone-cameras/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461251-bsidesdfw-recap-dynamic-cvv-analysis-and-the-facebook-camera-bug.mp3" length="24040926" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/yifmyqz6abpzlryhy56rga3gi8x1?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/713824486</guid>
    <pubDate>Sat, 16 Nov 2019 14:13:11 -0500</pubDate>
    <itunes:duration>2001</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>BlueKeep Attacks, Megacortex Ransomware, and Web.com Breach</itunes:title>
    <title>BlueKeep Attacks, Megacortex Ransomware, and Web.com Breach</title>
    <itunes:summary><![CDATA[This week the London team looks at the following stories:- BlueKeep Exploit Could Rapidly Spread- Megacortex Ransomware Changes Windows Passwords- Japanese Media Company Nikkei - $29 million lost to BEC scam- Web.com Breach- 21 million employee accounts for Fortune 500 companies offered on the dark web Get the full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary***Resources from this week***https://www.bleepingcomputer.com/news/security/new-megacortex-...]]></itunes:summary>
    <description><![CDATA[This week the London team looks at the following stories:- BlueKeep Exploit Could Rapidly Spread- Megacortex Ransomware Changes Windows Passwords- Japanese Media Company Nikkei - $29 million lost to BEC scam- Web.com Breach- 21 million employee accounts for Fortune 500 companies offered on the dark web Get the full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary***Resources from this week***https://www.bleepingcomputer.com/news/security/new-megacortex-ransomware-changes-windows-passwords-threatens-to-publish-data/https://www.cyberscoop.com/nikkei-email-scam-bec-29-million/https://krebsonsecurity.com/2019/10/breaches-at-networksolutions-register-com-and-web-com/]]></description>
    <content:encoded><![CDATA[This week the London team looks at the following stories:- BlueKeep Exploit Could Rapidly Spread- Megacortex Ransomware Changes Windows Passwords- Japanese Media Company Nikkei - $29 million lost to BEC scam- Web.com Breach- 21 million employee accounts for Fortune 500 companies offered on the dark web Get the full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary***Resources from this week***https://www.bleepingcomputer.com/news/security/new-megacortex-ransomware-changes-windows-passwords-threatens-to-publish-data/https://www.cyberscoop.com/nikkei-email-scam-bec-29-million/https://krebsonsecurity.com/2019/10/breaches-at-networksolutions-register-com-and-web-com/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461252-bluekeep-attacks-megacortex-ransomware-and-web-com-breach.mp3" length="15051677" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/sjftka6rtxkpoj6txgj3h1kffenf?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/709894900</guid>
    <pubDate>Fri, 08 Nov 2019 13:40:51 -0500</pubDate>
    <itunes:duration>1252</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>7.5M Adobe Creative Cloud User Records Exposed, City Of Joburg Ransomware Attack, and APT28 Updates</itunes:title>
    <title>7.5M Adobe Creative Cloud User Records Exposed, City Of Joburg Ransomware Attack, and APT28 Updates</title>
    <itunes:summary><![CDATA[Adam Cook, Philip Doherty, and Viktoria Austin host this week’s ShadowTalk update around an unsecured Elasticsearch database exposing account information of about 7.5 million Adobe Creative Cloud users. The team then looks at the news story around the City of Johannesburg experiencing a ransomware attack as well as APT28 (aka Fancy Bear) targeting anti-doping authorities and sporting organizations. ***Resources from this week’s episode***- BriansClub Blog from Viktoria: https://www.digitalsha...]]></itunes:summary>
    <description><![CDATA[Adam Cook, Philip Doherty, and Viktoria Austin host this week’s ShadowTalk update around an unsecured Elasticsearch database exposing account information of about 7.5 million Adobe Creative Cloud users. The team then looks at the news story around the City of Johannesburg experiencing a ransomware attack as well as APT28 (aka Fancy Bear) targeting anti-doping authorities and sporting organizations. ***Resources from this week’s episode***- BriansClub Blog from Viktoria: https://www.digitalshadows.com/blog-and-research/cybercriminal-credit-card-stores-is-brian-out-of-the-club/ - Understanding Different Cybercriminal Platforms: https://www.digitalshadows.com/blog-and-research/understanding-the-different-cybercriminal-platforms-avcs-marketplaces-and-forums/- Too Much Information - The Sequel: https://resources.digitalshadows.com/whitepapers-and-reports/too-much-information-the-sequel- Adam’s World Cup Blog: https://www.digitalshadows.com/blog-and-research/threats-to-the-2018-football-world-cup/ News Stories:https://www.zdnet.com/article/adobe-left-7-5-million-creative-cloud-user-records-exposed-online/https://www.ccn.com/johannesburg-shuts-down-bitcoin-ransomware-attack/]]></description>
    <content:encoded><![CDATA[Adam Cook, Philip Doherty, and Viktoria Austin host this week’s ShadowTalk update around an unsecured Elasticsearch database exposing account information of about 7.5 million Adobe Creative Cloud users. The team then looks at the news story around the City of Johannesburg experiencing a ransomware attack as well as APT28 (aka Fancy Bear) targeting anti-doping authorities and sporting organizations. ***Resources from this week’s episode***- BriansClub Blog from Viktoria: https://www.digitalshadows.com/blog-and-research/cybercriminal-credit-card-stores-is-brian-out-of-the-club/ - Understanding Different Cybercriminal Platforms: https://www.digitalshadows.com/blog-and-research/understanding-the-different-cybercriminal-platforms-avcs-marketplaces-and-forums/- Too Much Information - The Sequel: https://resources.digitalshadows.com/whitepapers-and-reports/too-much-information-the-sequel- Adam’s World Cup Blog: https://www.digitalshadows.com/blog-and-research/threats-to-the-2018-football-world-cup/ News Stories:https://www.zdnet.com/article/adobe-left-7-5-million-creative-cloud-user-records-exposed-online/https://www.ccn.com/johannesburg-shuts-down-bitcoin-ransomware-attack/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461253-7-5m-adobe-creative-cloud-user-records-exposed-city-of-joburg-ransomware-attack-and-apt28-updates.mp3" length="16816777" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/3y1xx4mpb9vphuxthue19xf5gibm?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/706494247</guid>
    <pubDate>Fri, 01 Nov 2019 13:41:37 -0400</pubDate>
    <itunes:duration>1399</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Avast Breach Attempt, NordVPN Breach, And Wifi Security Risks</itunes:title>
    <title>Avast Breach Attempt, NordVPN Breach, And Wifi Security Risks</title>
    <itunes:summary><![CDATA[We’ve got all 3 ShadowTalk hosts in Dallas this week: Harrison Van Riper, Viktoria Austin, and Alex Guirakhoo. The team first looks at Avast, which encountered a cyber espionage attempt. Then NordVPN announced that a hacker had breached servers used by NordVPN. And finally Dr. Richard Gold put out a new blog this week on dispelling the myths around using public wifi, so the team helps summarize some of the key points. Check out the full blog at https://www.digitalshadows.com/blog-and-research...]]></itunes:summary>
    <description><![CDATA[We’ve got all 3 ShadowTalk hosts in Dallas this week: Harrison Van Riper, Viktoria Austin, and Alex Guirakhoo. The team first looks at Avast, which encountered a cyber espionage attempt. Then NordVPN announced that a hacker had breached servers used by NordVPN. And finally Dr. Richard Gold put out a new blog this week on dispelling the myths around using public wifi, so the team helps summarize some of the key points. Check out the full blog at https://www.digitalshadows.com/blog-and-research/wifi-security-dispelling-myths-of-using-public-networks/To check out our weekly intelligence summary, visit https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-17-oct-24-oct-2019More Resources from this week’s episode:- Avast breach attempt: https://blog.avast.com/ccleaner-fights-off-cyberespionage-attempt-abiss- NordVPN breach &amp; PR nightmare: https://nakedsecurity.sophos.com/2019/10/23/hacker-breached-servers-used-by-nordvpn/- Krebs: https://krebsonsecurity.com/2019/10/avast-nordvpn-breaches-tied-to-phantom-user-accounts/]]></description>
    <content:encoded><![CDATA[We’ve got all 3 ShadowTalk hosts in Dallas this week: Harrison Van Riper, Viktoria Austin, and Alex Guirakhoo. The team first looks at Avast, which encountered a cyber espionage attempt. Then NordVPN announced that a hacker had breached servers used by NordVPN. And finally Dr. Richard Gold put out a new blog this week on dispelling the myths around using public wifi, so the team helps summarize some of the key points. Check out the full blog at https://www.digitalshadows.com/blog-and-research/wifi-security-dispelling-myths-of-using-public-networks/To check out our weekly intelligence summary, visit https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-17-oct-24-oct-2019More Resources from this week’s episode:- Avast breach attempt: https://blog.avast.com/ccleaner-fights-off-cyberespionage-attempt-abiss- NordVPN breach &amp; PR nightmare: https://nakedsecurity.sophos.com/2019/10/23/hacker-breached-servers-used-by-nordvpn/- Krebs: https://krebsonsecurity.com/2019/10/avast-nordvpn-breaches-tied-to-phantom-user-accounts/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461254-avast-breach-attempt-nordvpn-breach-and-wifi-security-risks.mp3" length="19723503" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ip0knhz38sbscujxc3nabxokdim4?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/701748049</guid>
    <pubDate>Fri, 25 Oct 2019 16:51:36 -0400</pubDate>
    <itunes:duration>1642</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Singapore Cyber Threat Landscape Updates 1H 2019</itunes:title>
    <title>Singapore Cyber Threat Landscape Updates 1H 2019</title>
    <itunes:summary><![CDATA[Adam Cook, Philip Doherty, and Xueyin Peh join Viktoria Austin for a special ShadowTalk episode around the Singapore Cyber Threat Landscape. The team looks at the heightened threat level for Singapore, why it’s being targeted, and the types of organizations being impacted. Read the full analysis in our blog post here: https://www.digitalshadows.com/blog-and-research/singapore-cyber-threat-landscape-report-h1-2019/]]></itunes:summary>
    <description><![CDATA[Adam Cook, Philip Doherty, and Xueyin Peh join Viktoria Austin for a special ShadowTalk episode around the Singapore Cyber Threat Landscape. The team looks at the heightened threat level for Singapore, why it’s being targeted, and the types of organizations being impacted. Read the full analysis in our blog post here: https://www.digitalshadows.com/blog-and-research/singapore-cyber-threat-landscape-report-h1-2019/]]></description>
    <content:encoded><![CDATA[Adam Cook, Philip Doherty, and Xueyin Peh join Viktoria Austin for a special ShadowTalk episode around the Singapore Cyber Threat Landscape. The team looks at the heightened threat level for Singapore, why it’s being targeted, and the types of organizations being impacted. Read the full analysis in our blog post here: https://www.digitalshadows.com/blog-and-research/singapore-cyber-threat-landscape-report-h1-2019/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461255-singapore-cyber-threat-landscape-updates-1h-2019.mp3" length="17641853" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/krmojmh8gjzj42d59rczr12m9bxm?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/700650355</guid>
    <pubDate>Wed, 23 Oct 2019 13:41:19 -0400</pubDate>
    <itunes:duration>1468</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Typosquatting and the 2020 U.S. Election, Honeypots, And Sudo Vulnerability</itunes:title>
    <title>Typosquatting and the 2020 U.S. Election, Honeypots, And Sudo Vulnerability</title>
    <itunes:summary><![CDATA[Fall is upon us! Kacey, Charles, Harrison, and Alex kick off this week’s episode talking about our Fall Dallas team event (an amateur version of Chopped). We’re now all professional chefs. Then the team dives into this week’s hot topics:- Typosquatting and the 2020 Elections: https://www.digitalshadows.com/blog-and-research/typosquatting-and-the-2020-u-s-presidential-election/- Honeypots: https://www.digitalshadows.com/blog-and-research/honeypots-tracking-attacks-against-misconfigured-or-expo...]]></itunes:summary>
    <description><![CDATA[Fall is upon us! Kacey, Charles, Harrison, and Alex kick off this week’s episode talking about our Fall Dallas team event (an amateur version of Chopped). We’re now all professional chefs. Then the team dives into this week’s hot topics:- Typosquatting and the 2020 Elections: https://www.digitalshadows.com/blog-and-research/typosquatting-and-the-2020-u-s-presidential-election/- Honeypots: https://www.digitalshadows.com/blog-and-research/honeypots-tracking-attacks-against-misconfigured-or-exposed-services/- The Sudo Vulnerability: https://threatpost.com/sudo-bug-root-access-linux/149169/- Security Bsides Workshop Talk: http://www.securitybsides.com/w/page/134870340/DFW_2019- Orca: https://github.com/digitalshadows/orcahttps://twitter.com/maxdose_/status/1184429401338982401?s=12 Finally with the Chopped event on our minds, we round off the episode with our favorite dishes we want to learn to cook. Thanks for listening and don’t forget to rate us on iTunes and let us know how we’re doing.]]></description>
    <content:encoded><![CDATA[Fall is upon us! Kacey, Charles, Harrison, and Alex kick off this week’s episode talking about our Fall Dallas team event (an amateur version of Chopped). We’re now all professional chefs. Then the team dives into this week’s hot topics:- Typosquatting and the 2020 Elections: https://www.digitalshadows.com/blog-and-research/typosquatting-and-the-2020-u-s-presidential-election/- Honeypots: https://www.digitalshadows.com/blog-and-research/honeypots-tracking-attacks-against-misconfigured-or-exposed-services/- The Sudo Vulnerability: https://threatpost.com/sudo-bug-root-access-linux/149169/- Security Bsides Workshop Talk: http://www.securitybsides.com/w/page/134870340/DFW_2019- Orca: https://github.com/digitalshadows/orcahttps://twitter.com/maxdose_/status/1184429401338982401?s=12 Finally with the Chopped event on our minds, we round off the episode with our favorite dishes we want to learn to cook. Thanks for listening and don’t forget to rate us on iTunes and let us know how we’re doing.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461256-typosquatting-and-the-2020-u-s-election-honeypots-and-sudo-vulnerability.mp3" length="21774687" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/c4gic6n4l5zq5q43gfdz2eqnah9k?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/698282866</guid>
    <pubDate>Fri, 18 Oct 2019 11:54:06 -0400</pubDate>
    <itunes:duration>1813</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Iran-Linked APT35, Skimming By Magecart 4, Rancour, And Emotet Resurgence</itunes:title>
    <title>Iran-Linked APT35, Skimming By Magecart 4, Rancour, And Emotet Resurgence</title>
    <itunes:summary><![CDATA[We’re back in London this week! Viktoria chats with Adam Cook, Philip Doherty, and Josh Poole on this week’s top stories:- APT35 Targets Email of US political figures &amp; prominent Iranians - Skimming activity by Magecart 4 reveals potential link to Cobalt Group- Chinese threat group Rancour casts phishing line to South-East Asian government- Emotet Resurgence Resources From This Week: Account Takeover Kill Chain 5 Step Analysis: https://www.digitalshadows.com/blog-and-research/the-account-...]]></itunes:summary>
    <description><![CDATA[We’re back in London this week! Viktoria chats with Adam Cook, Philip Doherty, and Josh Poole on this week’s top stories:- APT35 Targets Email of US political figures &amp; prominent Iranians - Skimming activity by Magecart 4 reveals potential link to Cobalt Group- Chinese threat group Rancour casts phishing line to South-East Asian government- Emotet Resurgence Resources From This Week: Account Takeover Kill Chain 5 Step Analysis: https://www.digitalshadows.com/blog-and-research/the-account-takeover-kill-chain-a-five-step-analysis/Weekly Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summaryMake sure to subscribe to us wherever you listen to your podcasts for the latest episodes. Thanks for listening!- ShadowTalk team]]></description>
    <content:encoded><![CDATA[We’re back in London this week! Viktoria chats with Adam Cook, Philip Doherty, and Josh Poole on this week’s top stories:- APT35 Targets Email of US political figures &amp; prominent Iranians - Skimming activity by Magecart 4 reveals potential link to Cobalt Group- Chinese threat group Rancour casts phishing line to South-East Asian government- Emotet Resurgence Resources From This Week: Account Takeover Kill Chain 5 Step Analysis: https://www.digitalshadows.com/blog-and-research/the-account-takeover-kill-chain-a-five-step-analysis/Weekly Intelligence Summary: https://resources.digitalshadows.com/weekly-intelligence-summaryMake sure to subscribe to us wherever you listen to your podcasts for the latest episodes. Thanks for listening!- ShadowTalk team]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461257-iran-linked-apt35-skimming-by-magecart-4-rancour-and-emotet-resurgence.mp3" length="13500032" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/hfmioirgwe6zos65dyda312yaufr?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/694319668</guid>
    <pubDate>Fri, 11 Oct 2019 12:58:39 -0400</pubDate>
    <itunes:duration>1123</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Tyurin Indictment- Mapping To The Mitre ATT&amp;CK™ Framework</itunes:title>
    <title>The Tyurin Indictment- Mapping To The Mitre ATT&amp;CK™ Framework</title>
    <itunes:summary><![CDATA[Director of Security Engineering, Richard Gold, joins Viktoria Austin in this special episode of ShadowTalk to look at the attacker goals, their TTPs, and map this to the Mitre PRE-ATT&amp;CK and ATT&amp;CK framework.Some Background…Between 2012 to mid-2015, U.S. financial institutions, financial services corporations and financial news publishers fell victim to one of the largest computer hacking crimes. The hacking resulted in the theft of information belonging to 100 million customers...]]></itunes:summary>
    <description><![CDATA[Director of Security Engineering, Richard Gold, joins Viktoria Austin in this special episode of ShadowTalk to look at the attacker goals, their TTPs, and map this to the Mitre PRE-ATT&amp;CK and ATT&amp;CK framework.Some Background…Between 2012 to mid-2015, U.S. financial institutions, financial services corporations and financial news publishers fell victim to one of the largest computer hacking crimes. The hacking resulted in the theft of information belonging to 100 million customers of the victim companies (including the theft of personal data from 83 million customer accounts at JPMorgan Chase), and securities fraud, in the form of stock market manipulation. While the crimes committed date back to 2015, this week, one of the hackers involved, identified as Andrei Tyurin, pleaded guilty to the following charges:  computer intrusion, wire fraud, bank fraud, and illegal online gambling offenses in connection with his involvement in a massive computer hacking campaign targeting U.S. financial institutions, brokerage firms, financial news publishers, and other American companies.Learn more in Richard Gold’s blog here: https://www.digitalshadows.com/blog-and-research/mapping-the-tyurin-indictment-to-the-mitre-attck-framework/]]></description>
    <content:encoded><![CDATA[Director of Security Engineering, Richard Gold, joins Viktoria Austin in this special episode of ShadowTalk to look at the attacker goals, their TTPs, and map this to the Mitre PRE-ATT&amp;CK and ATT&amp;CK framework.Some Background…Between 2012 to mid-2015, U.S. financial institutions, financial services corporations and financial news publishers fell victim to one of the largest computer hacking crimes. The hacking resulted in the theft of information belonging to 100 million customers of the victim companies (including the theft of personal data from 83 million customer accounts at JPMorgan Chase), and securities fraud, in the form of stock market manipulation. While the crimes committed date back to 2015, this week, one of the hackers involved, identified as Andrei Tyurin, pleaded guilty to the following charges:  computer intrusion, wire fraud, bank fraud, and illegal online gambling offenses in connection with his involvement in a massive computer hacking campaign targeting U.S. financial institutions, brokerage firms, financial news publishers, and other American companies.Learn more in Richard Gold’s blog here: https://www.digitalshadows.com/blog-and-research/mapping-the-tyurin-indictment-to-the-mitre-attck-framework/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461258-the-tyurin-indictment-mapping-to-the-mitre-att-ck-framework.mp3" length="14605707" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ijv7yv9nr4jwcdt0vqst66iwjaio?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/693486196</guid>
    <pubDate>Wed, 09 Oct 2019 18:58:32 -0400</pubDate>
    <itunes:duration>1215</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Magecart Five Widens Attack Vectors, Targeting of Airbus Suppliers, &amp; Tortoiseshell Developments</itunes:title>
    <title>Magecart Five Widens Attack Vectors, Targeting of Airbus Suppliers, &amp; Tortoiseshell Developments</title>
    <itunes:summary><![CDATA[Coming to you from London this week, Jamie Collier, Philip Doherty, and Josh Poole join Viktoria Austin for our weekly threat intelligence updates. The team kicks off with a discussion around the top story of the week - Magecart Five Widens Attack Vectors.Recent Magecart Five activity has included loading malicious Javascript files onto commercial-grade Layer 7 routers, injecting malicious code into a free, open-source app module, distributing phishing emails via an unspecified spamming servi...]]></itunes:summary>
    <description><![CDATA[Coming to you from London this week, Jamie Collier, Philip Doherty, and Josh Poole join Viktoria Austin for our weekly threat intelligence updates. The team kicks off with a discussion around the top story of the week - Magecart Five Widens Attack Vectors.Recent Magecart Five activity has included loading malicious Javascript files onto commercial-grade Layer 7 routers, injecting malicious code into a free, open-source app module, distributing phishing emails via an unspecified spamming service containing the KPOT trojan,  embedding compromised websites with redirect code that results in the download of the RIG or Fallout exploit toolkits onto a target machine, and creating a phishing website imitating “G-Cleaner”, a w Windows garbage cleanup tool. The team also discussed the other top stories of the week including:- Suspected Chinese Threat Actor Targets Airbus Suppliers- Tortoiseshell Lures American military-veteran job seekers- Zendesk discloses 2016 data breachCheck out the full threat intelligence summary report at https://resources.digitalshadows.com/weekly-intelligence-summary]]></description>
    <content:encoded><![CDATA[Coming to you from London this week, Jamie Collier, Philip Doherty, and Josh Poole join Viktoria Austin for our weekly threat intelligence updates. The team kicks off with a discussion around the top story of the week - Magecart Five Widens Attack Vectors.Recent Magecart Five activity has included loading malicious Javascript files onto commercial-grade Layer 7 routers, injecting malicious code into a free, open-source app module, distributing phishing emails via an unspecified spamming service containing the KPOT trojan,  embedding compromised websites with redirect code that results in the download of the RIG or Fallout exploit toolkits onto a target machine, and creating a phishing website imitating “G-Cleaner”, a w Windows garbage cleanup tool. The team also discussed the other top stories of the week including:- Suspected Chinese Threat Actor Targets Airbus Suppliers- Tortoiseshell Lures American military-veteran job seekers- Zendesk discloses 2016 data breachCheck out the full threat intelligence summary report at https://resources.digitalshadows.com/weekly-intelligence-summary]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461259-magecart-five-widens-attack-vectors-targeting-of-airbus-suppliers-tortoiseshell-developments.mp3" length="12661734" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8s3sjz5m19z4bk5k36xflrkrhzn1?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/691080037</guid>
    <pubDate>Fri, 04 Oct 2019 14:33:05 -0400</pubDate>
    <itunes:duration>1053</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Tortoiseshell Targets IT Providers, The Tyurin Indictment, And Emotet’s Return</itunes:title>
    <title>Tortoiseshell Targets IT Providers, The Tyurin Indictment, And Emotet’s Return</title>
    <itunes:summary><![CDATA[Viktoria hosts this week’s episode in London with Phillip Doherty and Adam Cook. After a quick debate around the top trending sports at the moment, the team digs into the first story of the week: Tortoiseshell Group (a newly identified threat group) has reportedly conducted some supply chain attack campaigns against 11 IT providers in Saudi Arabia. Next they look at two new malware variants that have emerged, attributed to North Korean-associated Lazarus Group. Emotet botnet has been hot...]]></itunes:summary>
    <description><![CDATA[Viktoria hosts this week’s episode in London with Phillip Doherty and Adam Cook. After a quick debate around the top trending sports at the moment, the team digs into the first story of the week: Tortoiseshell Group (a newly identified threat group) has reportedly conducted some supply chain attack campaigns against 11 IT providers in Saudi Arabia. Next they look at two new malware variants that have emerged, attributed to North Korean-associated Lazarus Group. Emotet botnet has been hot in the news lately, so the team also talks about its emergence.  Finally the team rounds up the week with the Tyurin indictment, where Andrei Tyurin pleaded guilty to one of the largest computer hacking crimes involving US financial institutions, financial services, and news publishers. Our own Richard Gold published a blog mapping the indictment to the MITRE ATT&amp;CK framework - definitely worth a read below. To learn more, check out our weekly intelligence summary report at https://resources.digitalshadows.com/weekly-intelligence-summary. Mapping the Tyurin Indictment to the Mitre ATT&amp;CK™ framework: https://www.digitalshadows.com/blog-and-research/mapping-the-tyurin-indictment-to-the-mitre-attck-framework/]]></description>
    <content:encoded><![CDATA[Viktoria hosts this week’s episode in London with Phillip Doherty and Adam Cook. After a quick debate around the top trending sports at the moment, the team digs into the first story of the week: Tortoiseshell Group (a newly identified threat group) has reportedly conducted some supply chain attack campaigns against 11 IT providers in Saudi Arabia. Next they look at two new malware variants that have emerged, attributed to North Korean-associated Lazarus Group. Emotet botnet has been hot in the news lately, so the team also talks about its emergence.  Finally the team rounds up the week with the Tyurin indictment, where Andrei Tyurin pleaded guilty to one of the largest computer hacking crimes involving US financial institutions, financial services, and news publishers. Our own Richard Gold published a blog mapping the indictment to the MITRE ATT&amp;CK framework - definitely worth a read below. To learn more, check out our weekly intelligence summary report at https://resources.digitalshadows.com/weekly-intelligence-summary. Mapping the Tyurin Indictment to the Mitre ATT&amp;CK™ framework: https://www.digitalshadows.com/blog-and-research/mapping-the-tyurin-indictment-to-the-mitre-attck-framework/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461260-tortoiseshell-targets-it-providers-the-tyurin-indictment-and-emotet-s-return.mp3" length="18083371" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/2o6lb3jom3k0jsqjbn1x4othsp32?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/687721918</guid>
    <pubDate>Fri, 27 Sep 2019 14:01:03 -0400</pubDate>
    <itunes:duration>1505</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>NCSC Threat Trends And Ransomware Updates</itunes:title>
    <title>NCSC Threat Trends And Ransomware Updates</title>
    <itunes:summary><![CDATA[It’s Harrison and Alex this week for your threat intelligence updates. The guys first dig into the NCSC’s recent threat trends report, the first of these that the NCSC has put out. It’s UK-specific, so just like we’ve shared thoughts around the FBI IC3 annual report in the past, which is heavily geared toward the US, it’s good to look across the pond as well. The team digs into 3 main areas: - Office365- Ransomware trends including updates on Emotet, Ryuk, LockerGoga, Bitpaymer, Nemty, and Ga...]]></itunes:summary>
    <description><![CDATA[It’s Harrison and Alex this week for your threat intelligence updates. The guys first dig into the NCSC’s recent threat trends report, the first of these that the NCSC has put out. It’s UK-specific, so just like we’ve shared thoughts around the FBI IC3 annual report in the past, which is heavily geared toward the US, it’s good to look across the pond as well. The team digs into 3 main areas: - Office365- Ransomware trends including updates on Emotet, Ryuk, LockerGoga, Bitpaymer, Nemty, and GandCrab- Supply Chain AttacksThe team also digs into some recent research around B.Wanted. A few weeks ago, there was a story that Brian Krebs reported on: essentially a user on a dark web forum was offering to sell access to a federal contractor who managed 20+ different federal agencies. Specifically we were looking into the threat actor responsible for selling the access, who goes by the name B.Wanted. The guys dig into some different theories.Finally we round out the episode with some top shows on Netflix to add to your lists. Enjoy your weekends! Get the weekly intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summaryResources from this week:NCSC Cyber Threat Trends: https://www.digitalshadows.com/blog-and-research/ncsc-cyber-threat-trends-report-analysis-of-attacks-across-uk-industries/Nemty Ransomware: https://www.digitalshadows.com/blog-and-research/nemty-ransomware-slow-and-steady-wins-the-race/Purple Teaming podcast episode with Eliza May Austin: https://dts.podtrac.com/redirect.mp3/podcasts.apple.com/us/podcast/purple-teaming-an-interview-with-eliza-may-austin/id1326304686?i=1000450023564]]></description>
    <content:encoded><![CDATA[It’s Harrison and Alex this week for your threat intelligence updates. The guys first dig into the NCSC’s recent threat trends report, the first of these that the NCSC has put out. It’s UK-specific, so just like we’ve shared thoughts around the FBI IC3 annual report in the past, which is heavily geared toward the US, it’s good to look across the pond as well. The team digs into 3 main areas: - Office365- Ransomware trends including updates on Emotet, Ryuk, LockerGoga, Bitpaymer, Nemty, and GandCrab- Supply Chain AttacksThe team also digs into some recent research around B.Wanted. A few weeks ago, there was a story that Brian Krebs reported on: essentially a user on a dark web forum was offering to sell access to a federal contractor who managed 20+ different federal agencies. Specifically we were looking into the threat actor responsible for selling the access, who goes by the name B.Wanted. The guys dig into some different theories.Finally we round out the episode with some top shows on Netflix to add to your lists. Enjoy your weekends! Get the weekly intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summaryResources from this week:NCSC Cyber Threat Trends: https://www.digitalshadows.com/blog-and-research/ncsc-cyber-threat-trends-report-analysis-of-attacks-across-uk-industries/Nemty Ransomware: https://www.digitalshadows.com/blog-and-research/nemty-ransomware-slow-and-steady-wins-the-race/Purple Teaming podcast episode with Eliza May Austin: https://dts.podtrac.com/redirect.mp3/podcasts.apple.com/us/podcast/purple-teaming-an-interview-with-eliza-may-austin/id1326304686?i=1000450023564]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461261-ncsc-threat-trends-and-ransomware-updates.mp3" length="17690740" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5jvcrg8ev5zct9g3cfviyvaj24cu?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/684154925</guid>
    <pubDate>Fri, 20 Sep 2019 13:58:29 -0400</pubDate>
    <itunes:duration>1472</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Purple Teaming: An Interview With Eliza May Austin</itunes:title>
    <title>Purple Teaming: An Interview With Eliza May Austin</title>
    <itunes:summary><![CDATA[In this episode, Viktoria interviews Eliza May Austin (CEO &amp; Co-Founder of th4ts3cur1ty.company), and our own Richard Gold and James Chappell on Purple Teaming, a security assessment that combines both blue teaming and red teaming. The team discusses:- How do we make the blue and red teams collaborate better?- Is purple teaming a cost-effective measure when it comes to a less mature organization?- Why Purple Teaming needs to be at the forefront- What systems would you start testing with t...]]></itunes:summary>
    <description><![CDATA[In this episode, Viktoria interviews Eliza May Austin (CEO &amp; Co-Founder of th4ts3cur1ty.company), and our own Richard Gold and James Chappell on Purple Teaming, a security assessment that combines both blue teaming and red teaming. The team discusses:- How do we make the blue and red teams collaborate better?- Is purple teaming a cost-effective measure when it comes to a less mature organization?- Why Purple Teaming needs to be at the forefront- What systems would you start testing with the purple team approach? - And more! We end the discussion with a quick overview of Eliza’s other passion: Ladies of London Hacking Society.To learn more, check out this episode’s resources:- https://th4ts3cur1ty.company/- Ladies Hacking Society: https://llhs.com/- Purple Team like you’re preparing for war: https://medium.com/@always0ddba1l/purple-team-like-your-preparing-for-war-ea17cd4d4a91- Purple Teaming with Vector, Cobalt Strike, and MITRE ATT&amp;CK: https://www.digitalshadows.com/blog-and-research/purple-teaming-with-vectr-cobalt-strike-and-mitre-attck/]]></description>
    <content:encoded><![CDATA[In this episode, Viktoria interviews Eliza May Austin (CEO &amp; Co-Founder of th4ts3cur1ty.company), and our own Richard Gold and James Chappell on Purple Teaming, a security assessment that combines both blue teaming and red teaming. The team discusses:- How do we make the blue and red teams collaborate better?- Is purple teaming a cost-effective measure when it comes to a less mature organization?- Why Purple Teaming needs to be at the forefront- What systems would you start testing with the purple team approach? - And more! We end the discussion with a quick overview of Eliza’s other passion: Ladies of London Hacking Society.To learn more, check out this episode’s resources:- https://th4ts3cur1ty.company/- Ladies Hacking Society: https://llhs.com/- Purple Team like you’re preparing for war: https://medium.com/@always0ddba1l/purple-team-like-your-preparing-for-war-ea17cd4d4a91- Purple Teaming with Vector, Cobalt Strike, and MITRE ATT&amp;CK: https://www.digitalshadows.com/blog-and-research/purple-teaming-with-vectr-cobalt-strike-and-mitre-attck/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461262-purple-teaming-an-interview-with-eliza-may-austin.mp3" length="32674580" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/xai2wap1jwm2cbss8fdq9k6jhj6s?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/682055171</guid>
    <pubDate>Mon, 16 Sep 2019 16:05:35 -0400</pubDate>
    <itunes:duration>2721</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Metasploit Project Publishes Exploit For Bluekeep, plus APT3 and Silence Cybercrime Group Updates</itunes:title>
    <title>Metasploit Project Publishes Exploit For Bluekeep, plus APT3 and Silence Cybercrime Group Updates</title>
    <itunes:summary><![CDATA[Viktoria Austin is joined by Adam Cook and Phil Dohetry this week in the London office to talk about the top story this week: Metasploit Project publishes exploit for Bluekeep bug. Our Photon Research Team tested the Metasploit exploit in their lab environment and has successfully exploited an unpatched Windows 7 machine. “The exploit not only gives the attacker remote access to a target system, but also gives the attacker the highest level of privilege on the target.” - Dr. Richard GoldThe t...]]></itunes:summary>
    <description><![CDATA[Viktoria Austin is joined by Adam Cook and Phil Dohetry this week in the London office to talk about the top story this week: Metasploit Project publishes exploit for Bluekeep bug. Our Photon Research Team tested the Metasploit exploit in their lab environment and has successfully exploited an unpatched Windows 7 machine. “The exploit not only gives the attacker remote access to a target system, but also gives the attacker the highest level of privilege on the target.” - Dr. Richard GoldThe team then shares updates around APT3 and the Silence cybercrime group.To learn more, check out the full weekly intelligence report at https://resources.digitalshadows.com/weekly-intelligence-summary. Interested in more threat intelligence updates? Sign up to receive our weekly updates at https://info.digitalshadows.com/EmailSubscription-Podcast_Reg.html.]]></description>
    <content:encoded><![CDATA[Viktoria Austin is joined by Adam Cook and Phil Dohetry this week in the London office to talk about the top story this week: Metasploit Project publishes exploit for Bluekeep bug. Our Photon Research Team tested the Metasploit exploit in their lab environment and has successfully exploited an unpatched Windows 7 machine. “The exploit not only gives the attacker remote access to a target system, but also gives the attacker the highest level of privilege on the target.” - Dr. Richard GoldThe team then shares updates around APT3 and the Silence cybercrime group.To learn more, check out the full weekly intelligence report at https://resources.digitalshadows.com/weekly-intelligence-summary. Interested in more threat intelligence updates? Sign up to receive our weekly updates at https://info.digitalshadows.com/EmailSubscription-Podcast_Reg.html.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461263-metasploit-project-publishes-exploit-for-bluekeep-plus-apt3-and-silence-cybercrime-group-updates.mp3" length="16746354" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/tito0tidap35ul9a3u5wy5ud9qlk?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/680420639</guid>
    <pubDate>Fri, 13 Sep 2019 01:09:35 -0400</pubDate>
    <itunes:duration>1394</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ryuk Ransomware, Twitter Rids SMS Tweets, And Facebook Records Exposed</itunes:title>
    <title>Ryuk Ransomware, Twitter Rids SMS Tweets, And Facebook Records Exposed</title>
    <itunes:summary><![CDATA[Alex, Alec, and Harrison are in the room today discussing 3 top stories from the week. First up - a hacker deploys Ryuk ransomware against the city of New Bedford, Massachusetts, demanding $5.3 million. What was interesting, though, was that the city tried to negotiate with the attackers for a lower ransom of $400k, but the attackers didn’t want it and ended up cutting off communications. Next the guys chat through the suspension of Twitter’s SMS-based tweet function after the news of Twitter...]]></itunes:summary>
    <description><![CDATA[Alex, Alec, and Harrison are in the room today discussing 3 top stories from the week. First up - a hacker deploys Ryuk ransomware against the city of New Bedford, Massachusetts, demanding $5.3 million. What was interesting, though, was that the city tried to negotiate with the attackers for a lower ransom of $400k, but the attackers didn’t want it and ended up cutting off communications. Next the guys chat through the suspension of Twitter’s SMS-based tweet function after the news of Twitter CEO Jack Dorsey’s Twitter account was “hacked”. An interesting attack surface incident for phone numbers. Finally the team discusses an exposure incident where 419 million Facebook records were exposed. So “Come on down” and listen to this week’s ShadowTalk. (The guys thought it would be fun to play The Price is Right at the end … do we like it? Let us know what fun questions you want answered each week).Get the weekly intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summaryResources from this week:https://www.bleepingcomputer.com/news/security/hackers-ask-for-53-million-ransom-turn-down-400k-get-nothing/https://www.bleepingcomputer.com/news/security/twitter-suspends-sms-based-tweeting-after-high-profile-account-hacks/https://techcrunch.com/2019/09/04/facebook-phone-numbers-exposed/]]></description>
    <content:encoded><![CDATA[Alex, Alec, and Harrison are in the room today discussing 3 top stories from the week. First up - a hacker deploys Ryuk ransomware against the city of New Bedford, Massachusetts, demanding $5.3 million. What was interesting, though, was that the city tried to negotiate with the attackers for a lower ransom of $400k, but the attackers didn’t want it and ended up cutting off communications. Next the guys chat through the suspension of Twitter’s SMS-based tweet function after the news of Twitter CEO Jack Dorsey’s Twitter account was “hacked”. An interesting attack surface incident for phone numbers. Finally the team discusses an exposure incident where 419 million Facebook records were exposed. So “Come on down” and listen to this week’s ShadowTalk. (The guys thought it would be fun to play The Price is Right at the end … do we like it? Let us know what fun questions you want answered each week).Get the weekly intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summaryResources from this week:https://www.bleepingcomputer.com/news/security/hackers-ask-for-53-million-ransom-turn-down-400k-get-nothing/https://www.bleepingcomputer.com/news/security/twitter-suspends-sms-based-tweeting-after-high-profile-account-hacks/https://techcrunch.com/2019/09/04/facebook-phone-numbers-exposed/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461264-ryuk-ransomware-twitter-rids-sms-tweets-and-facebook-records-exposed.mp3" length="16549757" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/fyhfjyi3py31r5t0p4ttmrdiswdw?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/677528907</guid>
    <pubDate>Sat, 07 Sep 2019 01:48:55 -0400</pubDate>
    <itunes:duration>1377</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>More Sodinokibi Activity, Imperva Breach, And Weirdest Food At The Texas State Fair</itunes:title>
    <title>More Sodinokibi Activity, Imperva Breach, And Weirdest Food At The Texas State Fair</title>
    <itunes:summary><![CDATA[Rick Holland and Alex Guirakhoo join Harrison Van Riper this week to talk through more Sodinokibi activity. Just yesterday, a cloud hosting provider for Digital Dental Records was hit with Sodinokibi, apparently affecting around 400 different dental providers around the US. It seems like were hearing about more and more people actually paying out these ransom demands. Do we think it’s just a reporting bias or do we think they’re actually paying out more often? Then the team looks at the Imper...]]></itunes:summary>
    <description><![CDATA[Rick Holland and Alex Guirakhoo join Harrison Van Riper this week to talk through more Sodinokibi activity. Just yesterday, a cloud hosting provider for Digital Dental Records was hit with Sodinokibi, apparently affecting around 400 different dental providers around the US. It seems like were hearing about more and more people actually paying out these ransom demands. Do we think it’s just a reporting bias or do we think they’re actually paying out more often? Then the team looks at the Imperva breach, where its Incapsula Web Application Firewall product was inadvertently exposing some data, including email addresses, hashed and salted passwords, API keys and SSL certificates. Google’s Project Zero also discovered a series of 0-day exploits being actively used in the wild targeting iPhones. The team discuses how this will factor into risk models moving forward. We close out with everyone’s top (and weirdest) choices at the Texas State Fair. Yummmmm. Enjoy :) Resources From this Week’s Episode:More Sodinokibi activityhttps://www.scmagazine.com/home/security-news/dentist-offices-nationwide-hit-with-revil-ransomware-attacks/   https://krebsonsecurity.com/2019/08/ransomware-bites-dental-data-backup-firm/  https://www.bleepingcomputer.com/news/security/a-look-inside-the-highly-profitable-sodinokibi-ransomware-business/Imperva breachhttps://krebsonsecurity.com/2019/08/cybersecurity-firm-imperva-discloses-breach/iOS exploits discovered https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html?m=1]]></description>
    <content:encoded><![CDATA[Rick Holland and Alex Guirakhoo join Harrison Van Riper this week to talk through more Sodinokibi activity. Just yesterday, a cloud hosting provider for Digital Dental Records was hit with Sodinokibi, apparently affecting around 400 different dental providers around the US. It seems like were hearing about more and more people actually paying out these ransom demands. Do we think it’s just a reporting bias or do we think they’re actually paying out more often? Then the team looks at the Imperva breach, where its Incapsula Web Application Firewall product was inadvertently exposing some data, including email addresses, hashed and salted passwords, API keys and SSL certificates. Google’s Project Zero also discovered a series of 0-day exploits being actively used in the wild targeting iPhones. The team discuses how this will factor into risk models moving forward. We close out with everyone’s top (and weirdest) choices at the Texas State Fair. Yummmmm. Enjoy :) Resources From this Week’s Episode:More Sodinokibi activityhttps://www.scmagazine.com/home/security-news/dentist-offices-nationwide-hit-with-revil-ransomware-attacks/   https://krebsonsecurity.com/2019/08/ransomware-bites-dental-data-backup-firm/  https://www.bleepingcomputer.com/news/security/a-look-inside-the-highly-profitable-sodinokibi-ransomware-business/Imperva breachhttps://krebsonsecurity.com/2019/08/cybersecurity-firm-imperva-discloses-breach/iOS exploits discovered https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html?m=1]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461265-more-sodinokibi-activity-imperva-breach-and-weirdest-food-at-the-texas-state-fair.mp3" length="22094495" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/fvssenb756o9i1uhge8ll7se3sq7?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/673437590</guid>
    <pubDate>Fri, 30 Aug 2019 17:05:44 -0400</pubDate>
    <itunes:duration>1839</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Approaching Cybersecurity As A Third Party Defense Contractor</itunes:title>
    <title>Approaching Cybersecurity As A Third Party Defense Contractor</title>
    <itunes:summary><![CDATA[Brian Neely, CIO and CISO at American Systems and Rick Holland, CISO at Digital Shadows join Harrison for a discussion around how Brian approaches cybersecurity as a defense contractor. American Systems has been delivering complex IT and engineering solutions to national priority programs since 1975 and has some interesting use cases.The group discusses:- Top cybersecurity concerns as a third party defense contractor - Advice for listeners with similar threat models where sophisticated, well-...]]></itunes:summary>
    <description><![CDATA[Brian Neely, CIO and CISO at American Systems and Rick Holland, CISO at Digital Shadows join Harrison for a discussion around how Brian approaches cybersecurity as a defense contractor. American Systems has been delivering complex IT and engineering solutions to national priority programs since 1975 and has some interesting use cases.The group discusses:- Top cybersecurity concerns as a third party defense contractor - Advice for listeners with similar threat models where sophisticated, well-resourced adversaries are targeting your environment- Where digital risk protection comes into play including asset exposure, site impersonation, phishing campaigns, and brand misuse online- Managing 2FA company-wide- And more! Resources from this Episode: 2FA research: https://resources.digitalshadows.com/whitepapers-and-reports/two-factor-in-review]]></description>
    <content:encoded><![CDATA[Brian Neely, CIO and CISO at American Systems and Rick Holland, CISO at Digital Shadows join Harrison for a discussion around how Brian approaches cybersecurity as a defense contractor. American Systems has been delivering complex IT and engineering solutions to national priority programs since 1975 and has some interesting use cases.The group discusses:- Top cybersecurity concerns as a third party defense contractor - Advice for listeners with similar threat models where sophisticated, well-resourced adversaries are targeting your environment- Where digital risk protection comes into play including asset exposure, site impersonation, phishing campaigns, and brand misuse online- Managing 2FA company-wide- And more! Resources from this Episode: 2FA research: https://resources.digitalshadows.com/whitepapers-and-reports/two-factor-in-review]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461266-approaching-cybersecurity-as-a-third-party-defense-contractor.mp3" length="14837065" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/uim0esc321pikwz0akroveg949z3?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/671750441</guid>
    <pubDate>Tue, 27 Aug 2019 11:27:04 -0400</pubDate>
    <itunes:duration>1235</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Texas Ransomware Outbreaks And Phishing Attacks Using Custom 404 Pages</itunes:title>
    <title>Texas Ransomware Outbreaks And Phishing Attacks Using Custom 404 Pages</title>
    <itunes:summary><![CDATA[Charles Ragland (a brand new ShadowTalk-er!) and Christian Rencken join Harrison this week to discuss an outbreak of ransomware attacks impacting local government entities across Texas. The team also discusses some phishing attacks that are using custom 404 pages and how Google is starting to remove FTP support from Chrome. They wrap up this episode with the question of the week: Which future technology most worries you from a cyber security perspective? Check out this week’s full intelligenc...]]></itunes:summary>
    <description><![CDATA[Charles Ragland (a brand new ShadowTalk-er!) and Christian Rencken join Harrison this week to discuss an outbreak of ransomware attacks impacting local government entities across Texas. The team also discusses some phishing attacks that are using custom 404 pages and how Google is starting to remove FTP support from Chrome. They wrap up this episode with the question of the week: Which future technology most worries you from a cyber security perspective? Check out this week’s full intelligence summary at resources.digitalshadows.com Share feedback with us! DM us @digitalshadows on Twitter or email us at messages@digitalshadows.com. Some resources to check out this week:- https://www.bleepingcomputer.com/news/security/hackers-want-25-million-ransom-for-texas-ransomware-attacks/ - https://www.us-cert.gov/ncas/current-activity/2019/08/21/cisa-insights-ransomware-outbreak - https://www.bleepingcomputer.com/news/security/microsoft-warns-of-phishing-attacks-using-custom-404-pages/- https://www.bleepingcomputer.com/news/google/google-has-started-removing-ftp-support-from-chrome/]]></description>
    <content:encoded><![CDATA[Charles Ragland (a brand new ShadowTalk-er!) and Christian Rencken join Harrison this week to discuss an outbreak of ransomware attacks impacting local government entities across Texas. The team also discusses some phishing attacks that are using custom 404 pages and how Google is starting to remove FTP support from Chrome. They wrap up this episode with the question of the week: Which future technology most worries you from a cyber security perspective? Check out this week’s full intelligence summary at resources.digitalshadows.com Share feedback with us! DM us @digitalshadows on Twitter or email us at messages@digitalshadows.com. Some resources to check out this week:- https://www.bleepingcomputer.com/news/security/hackers-want-25-million-ransom-for-texas-ransomware-attacks/ - https://www.us-cert.gov/ncas/current-activity/2019/08/21/cisa-insights-ransomware-outbreak - https://www.bleepingcomputer.com/news/security/microsoft-warns-of-phishing-attacks-using-custom-404-pages/- https://www.bleepingcomputer.com/news/google/google-has-started-removing-ftp-support-from-chrome/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461267-texas-ransomware-outbreaks-and-phishing-attacks-using-custom-404-pages.mp3" length="27873045" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/hk7lu3nqo0ew1l6gzkpwsig63uzy?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/669822635</guid>
    <pubDate>Fri, 23 Aug 2019 01:10:44 -0400</pubDate>
    <itunes:duration>2321</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Breach! Exploring The Modern Digital Breach With Cyber Defense Lab’s CEO Bob Anderson: Part 2</itunes:title>
    <title>Breach! Exploring The Modern Digital Breach With Cyber Defense Lab’s CEO Bob Anderson: Part 2</title>
    <itunes:summary><![CDATA[What practical steps should organizations and the professionals within them be thinking about in this new world? We have a special two-part series where Rick Holland, VP Intelligence and CISO at Digital Shadows, interviews Bob Anderson, CEO at Cyber Defense Labs and James Chappell, co-founder and Chief Innovation Officer at Digital Shadows.In part 2, the team looks at:- Steps you can take into your programs today as a security or business leader- Advice for boards on how to do to deal with br...]]></itunes:summary>
    <description><![CDATA[What practical steps should organizations and the professionals within them be thinking about in this new world? We have a special two-part series where Rick Holland, VP Intelligence and CISO at Digital Shadows, interviews Bob Anderson, CEO at Cyber Defense Labs and James Chappell, co-founder and Chief Innovation Officer at Digital Shadows.In part 2, the team looks at:- Steps you can take into your programs today as a security or business leader- Advice for boards on how to do to deal with breaches- Knowing your data - What do organizations need to be doing when it comes to understanding and protecting their digital footprint? - Mistakes organizations make in the response stage Bob Anderson’s Bio:Anderson is a former national security executive, serving 20+ years with the Federal Bureau of Investigation (FBI). During this time, Anderson served in several senior level positions, ultimately rising to become executive assistant director of the FBI&apos;s Criminal, Cyber, Response and Services Branch where he oversaw all FBI criminal and cyber investigations worldwide, international operations, critical incident response, and victim assistance. Anderson has directed strategic initiatives and operations for high-profile international investigations in partnership with several Fortune 50 companies, along with U.S. Departments of Defense, Justice, Energy, and Treasury, the U.S. Intelligence Community, and other federal agencies.Having been directly involved in investigating and prosecuting some of the most famous spies in U.S. history as part of his law enforcement career, Anderson is an expert in cybercrimes, counterintelligence, economic espionage, theft of proprietary information and trade secrets, critical incident management, and has been retained as an expert witness in several ongoing litigations.]]></description>
    <content:encoded><![CDATA[What practical steps should organizations and the professionals within them be thinking about in this new world? We have a special two-part series where Rick Holland, VP Intelligence and CISO at Digital Shadows, interviews Bob Anderson, CEO at Cyber Defense Labs and James Chappell, co-founder and Chief Innovation Officer at Digital Shadows.In part 2, the team looks at:- Steps you can take into your programs today as a security or business leader- Advice for boards on how to do to deal with breaches- Knowing your data - What do organizations need to be doing when it comes to understanding and protecting their digital footprint? - Mistakes organizations make in the response stage Bob Anderson’s Bio:Anderson is a former national security executive, serving 20+ years with the Federal Bureau of Investigation (FBI). During this time, Anderson served in several senior level positions, ultimately rising to become executive assistant director of the FBI&apos;s Criminal, Cyber, Response and Services Branch where he oversaw all FBI criminal and cyber investigations worldwide, international operations, critical incident response, and victim assistance. Anderson has directed strategic initiatives and operations for high-profile international investigations in partnership with several Fortune 50 companies, along with U.S. Departments of Defense, Justice, Energy, and Treasury, the U.S. Intelligence Community, and other federal agencies.Having been directly involved in investigating and prosecuting some of the most famous spies in U.S. history as part of his law enforcement career, Anderson is an expert in cybercrimes, counterintelligence, economic espionage, theft of proprietary information and trade secrets, critical incident management, and has been retained as an expert witness in several ongoing litigations.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461268-breach-exploring-the-modern-digital-breach-with-cyber-defense-lab-s-ceo-bob-anderson-part-2.mp3" length="20436632" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/nnyc93zifrh1vbu0ufk08j5rchaj?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/668550305</guid>
    <pubDate>Tue, 20 Aug 2019 12:00:28 -0400</pubDate>
    <itunes:duration>1701</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Nightmare Market In Disarray And SEC Investigation Into Data Leak At First American Financial Corp</itunes:title>
    <title>Nightmare Market In Disarray And SEC Investigation Into Data Leak At First American Financial Corp</title>
    <itunes:summary><![CDATA[Harrison is back! Alex and Christian join this week to discuss how Black Hat and DEFCON went last week, analyze the irregularities of the dark web criminal market, Nightmare, and explore the story reported by Krebs on the SEC investigation into the data leak at First American Financial Corp. Shout-out to all of our new listeners - thanks for your interest and let us know what we can do to continue improving the podcast! Check out the blog on Nightmare Market at https://www.digitalshadows.com/...]]></itunes:summary>
    <description><![CDATA[Harrison is back! Alex and Christian join this week to discuss how Black Hat and DEFCON went last week, analyze the irregularities of the dark web criminal market, Nightmare, and explore the story reported by Krebs on the SEC investigation into the data leak at First American Financial Corp. Shout-out to all of our new listeners - thanks for your interest and let us know what we can do to continue improving the podcast! Check out the blog on Nightmare Market at https://www.digitalshadows.com/blog-and-research/fresh-blow-for-dark-web-markets-nightmare-market-in-disarray/KrebsonSecurity article: https://krebsonsecurity.com/tag/first-american-financial-corp/Find the full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-08-aug-15-aug-2019]]></description>
    <content:encoded><![CDATA[Harrison is back! Alex and Christian join this week to discuss how Black Hat and DEFCON went last week, analyze the irregularities of the dark web criminal market, Nightmare, and explore the story reported by Krebs on the SEC investigation into the data leak at First American Financial Corp. Shout-out to all of our new listeners - thanks for your interest and let us know what we can do to continue improving the podcast! Check out the blog on Nightmare Market at https://www.digitalshadows.com/blog-and-research/fresh-blow-for-dark-web-markets-nightmare-market-in-disarray/KrebsonSecurity article: https://krebsonsecurity.com/tag/first-american-financial-corp/Find the full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-08-aug-15-aug-2019]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461269-nightmare-market-in-disarray-and-sec-investigation-into-data-leak-at-first-american-financial-corp.mp3" length="23613530" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/60vohpqahzhv5a7odmyrv1ubgv3b?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/666788924</guid>
    <pubDate>Fri, 16 Aug 2019 13:52:56 -0400</pubDate>
    <itunes:duration>1966</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Breach! Exploring The Modern Digital Breach With Cyber Defense Lab’s CEO Bob Anderson - Part 1</itunes:title>
    <title>Breach! Exploring The Modern Digital Breach With Cyber Defense Lab’s CEO Bob Anderson - Part 1</title>
    <itunes:summary><![CDATA[It seems like we read about new breaches every day. What’s changing? How is exposure and the adoption of digital technology changing the breach landscape? We have a special two-part series where Rick Holland, VP Intelligence and CISO at Digital Shadows, interviews Bob Anderson, CEO at Cyber Defense Labs (https://cyberdefenselabs.com/) and James Chappell, co-founder and Chief Innovation Officer at Digital Shadows. In Part 1, the team looks at:- How the breach landscape has evolved- The role of...]]></itunes:summary>
    <description><![CDATA[It seems like we read about new breaches every day. What’s changing? How is exposure and the adoption of digital technology changing the breach landscape? We have a special two-part series where Rick Holland, VP Intelligence and CISO at Digital Shadows, interviews Bob Anderson, CEO at Cyber Defense Labs (https://cyberdefenselabs.com/) and James Chappell, co-founder and Chief Innovation Officer at Digital Shadows. In Part 1, the team looks at:- How the breach landscape has evolved- The role of the dark web in a data breach- Are we seeing more breaches or are they getting reported more?- And other war stories from the folks in the room In Part 2, the team will give guidance and suggestions for enterprises trying to deal with the threat landscape. Stay tuned! ***About Bob Anderson:Anderson is a former national security executive, serving 20+ years with the Federal Bureau of Investigation (FBI). During this time, Anderson served in several senior level positions, ultimately rising to become executive assistant director of the FBI&apos;s Criminal, Cyber, Response and Services Branch where he oversaw all FBI criminal and cyber investigations worldwide, international operations, critical incident response, and victim assistance. Anderson has directed strategic initiatives and operations for high-profile international investigations in partnership with several Fortune 50 companies, along with U.S. Departments of Defense, Justice, Energy, and Treasury, the U.S. Intelligence Community, and other federal agencies.Having been directly involved in investigating and prosecuting some of the most famous spies in U.S. history as part of his law enforcement career, Anderson is an expert in cybercrimes, counterintelligence, economic espionage, theft of proprietary information and trade secrets, critical incident management, and has been retained as an expert witness in several ongoing litigations.]]></description>
    <content:encoded><![CDATA[It seems like we read about new breaches every day. What’s changing? How is exposure and the adoption of digital technology changing the breach landscape? We have a special two-part series where Rick Holland, VP Intelligence and CISO at Digital Shadows, interviews Bob Anderson, CEO at Cyber Defense Labs (https://cyberdefenselabs.com/) and James Chappell, co-founder and Chief Innovation Officer at Digital Shadows. In Part 1, the team looks at:- How the breach landscape has evolved- The role of the dark web in a data breach- Are we seeing more breaches or are they getting reported more?- And other war stories from the folks in the room In Part 2, the team will give guidance and suggestions for enterprises trying to deal with the threat landscape. Stay tuned! ***About Bob Anderson:Anderson is a former national security executive, serving 20+ years with the Federal Bureau of Investigation (FBI). During this time, Anderson served in several senior level positions, ultimately rising to become executive assistant director of the FBI&apos;s Criminal, Cyber, Response and Services Branch where he oversaw all FBI criminal and cyber investigations worldwide, international operations, critical incident response, and victim assistance. Anderson has directed strategic initiatives and operations for high-profile international investigations in partnership with several Fortune 50 companies, along with U.S. Departments of Defense, Justice, Energy, and Treasury, the U.S. Intelligence Community, and other federal agencies.Having been directly involved in investigating and prosecuting some of the most famous spies in U.S. history as part of his law enforcement career, Anderson is an expert in cybercrimes, counterintelligence, economic espionage, theft of proprietary information and trade secrets, critical incident management, and has been retained as an expert witness in several ongoing litigations.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461270-breach-exploring-the-modern-digital-breach-with-cyber-defense-lab-s-ceo-bob-anderson-part-1.mp3" length="22864455" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/gnbpvpsrbuug52inqb9jz3ywxsis?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/665207345</guid>
    <pubDate>Tue, 13 Aug 2019 10:46:31 -0400</pubDate>
    <itunes:duration>1903</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Capital One Breach, Ransomware Trends, and Threat Actors</itunes:title>
    <title>Capital One Breach, Ransomware Trends, and Threat Actors</title>
    <itunes:summary><![CDATA[Move out of the way, Harrison! We have a brand new host this week: Viktoria Austin, Strategy and Research Analyst, and Photon Research Team member. Viktoria is joined this week by Rose Bernard and Xueyin Peh in the London office. In a malspam campaign, “Sodinokibi” targeted users in Germany using a spoofed Federal Office for Information Security (BSI) email domain and a data breach-themed lure, while in other countries ransomware attacks have been conducted against local government networks a...]]></itunes:summary>
    <description><![CDATA[Move out of the way, Harrison! We have a brand new host this week: Viktoria Austin, Strategy and Research Analyst, and Photon Research Team member. Viktoria is joined this week by Rose Bernard and Xueyin Peh in the London office. In a malspam campaign, “Sodinokibi” targeted users in Germany using a spoofed Federal Office for Information Security (BSI) email domain and a data breach-themed lure, while in other countries ransomware attacks have been conducted against local government networks and a utility provider.Capital One reported a data breach after an individual accessed an Amazon Web Services (AWS) server used by the organization, cyber espionage operations associated with China-linked “Winnti Group” reportedly targeted chemical and manufacturing organizations in Germany, and a campaign by Chinese state-affiliated threat actor “TA428” dubbed Operation LagTime IT has targeted government entities in East Asia since early 2019.All this and more fun in this week’s ShadowTalk. *Apologies for some audio issues this week - we are working on a fix! The content is still just as great, though :)Read this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summaryHeading to Black Hat or DEF CON? Stop by our booth #1014 or catch our party Wednesday night. RSVP at https://info.digitalshadows.com/BlackHat-SecurityLeadersParty2019.html?SourceCode=shadowtalk]]></description>
    <content:encoded><![CDATA[Move out of the way, Harrison! We have a brand new host this week: Viktoria Austin, Strategy and Research Analyst, and Photon Research Team member. Viktoria is joined this week by Rose Bernard and Xueyin Peh in the London office. In a malspam campaign, “Sodinokibi” targeted users in Germany using a spoofed Federal Office for Information Security (BSI) email domain and a data breach-themed lure, while in other countries ransomware attacks have been conducted against local government networks and a utility provider.Capital One reported a data breach after an individual accessed an Amazon Web Services (AWS) server used by the organization, cyber espionage operations associated with China-linked “Winnti Group” reportedly targeted chemical and manufacturing organizations in Germany, and a campaign by Chinese state-affiliated threat actor “TA428” dubbed Operation LagTime IT has targeted government entities in East Asia since early 2019.All this and more fun in this week’s ShadowTalk. *Apologies for some audio issues this week - we are working on a fix! The content is still just as great, though :)Read this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summaryHeading to Black Hat or DEF CON? Stop by our booth #1014 or catch our party Wednesday night. RSVP at https://info.digitalshadows.com/BlackHat-SecurityLeadersParty2019.html?SourceCode=shadowtalk]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461271-capital-one-breach-ransomware-trends-and-threat-actors.mp3" length="13094421" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/wglk4awvi4uot2w7l524xa9mrzpa?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/660183983</guid>
    <pubDate>Fri, 02 Aug 2019 12:55:00 -0400</pubDate>
    <itunes:duration>1089</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>2FA - Advice For Deployment &amp; A Technical Assessment</itunes:title>
    <title>2FA - Advice For Deployment &amp; A Technical Assessment</title>
    <itunes:summary><![CDATA[Thinking about deploying 2FA? In this special interview, our Head of Cyber Security &amp; IT, Craig Ellis, and our Head of Security Engineering, Dr. Richard Gold, chat with Harrison around how they implemented 2FA internally. The guys discuss proper ways to go about implementing 2FA, some of the issues with implementing 2FA, what happens when things break, and other advice they wish they were given before implementing 2FA. Then Rich and Harrison deep dive into our latest paper, Two-Factor in ...]]></itunes:summary>
    <description><![CDATA[Thinking about deploying 2FA? In this special interview, our Head of Cyber Security &amp; IT, Craig Ellis, and our Head of Security Engineering, Dr. Richard Gold, chat with Harrison around how they implemented 2FA internally. The guys discuss proper ways to go about implementing 2FA, some of the issues with implementing 2FA, what happens when things break, and other advice they wish they were given before implementing 2FA. Then Rich and Harrison deep dive into our latest paper, Two-Factor in Review, a technical assessment of the most popular mitigation for account takeover attacks. Check out the full report below to read for yourself. Blog on 2FA: https://www.digitalshadows.com/blog-and-research/the-account-takeover-kill-chain-a-five-step-analysis/Report on Account Takeover: https://resources.digitalshadows.com/whitepapers-and-reports/two-factor-in-review]]></description>
    <content:encoded><![CDATA[Thinking about deploying 2FA? In this special interview, our Head of Cyber Security &amp; IT, Craig Ellis, and our Head of Security Engineering, Dr. Richard Gold, chat with Harrison around how they implemented 2FA internally. The guys discuss proper ways to go about implementing 2FA, some of the issues with implementing 2FA, what happens when things break, and other advice they wish they were given before implementing 2FA. Then Rich and Harrison deep dive into our latest paper, Two-Factor in Review, a technical assessment of the most popular mitigation for account takeover attacks. Check out the full report below to read for yourself. Blog on 2FA: https://www.digitalshadows.com/blog-and-research/the-account-takeover-kill-chain-a-five-step-analysis/Report on Account Takeover: https://resources.digitalshadows.com/whitepapers-and-reports/two-factor-in-review]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461272-2fa-advice-for-deployment-a-technical-assessment.mp3" length="28835592" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/uqk9nefyabrm33q58awscoaozf7x?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/658666403</guid>
    <pubDate>Tue, 30 Jul 2019 15:14:40 -0400</pubDate>
    <itunes:duration>2401</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>More BlueKeep updates, FSB contractor hacked, and the Enigma Market</itunes:title>
    <title>More BlueKeep updates, FSB contractor hacked, and the Enigma Market</title>
    <itunes:summary><![CDATA[Christian (@Chrencken14) and Travis (@puppyozone) sit down with Harrison (@pseudohvr) to discuss even more BlueKeep updates since last week, as a technical presentation gets uploaded to Github, inching us closer to a full-blown public PoC. the breach and subsequent release of documents from a contractor working with Russia’s FSB intelligence services, and research from the Digital Shadows team about a new marketplace we’ve had our eye on for a few months called Enigma. **Housekeeping note** W...]]></itunes:summary>
    <description><![CDATA[Christian (@Chrencken14) and Travis (@puppyozone) sit down with Harrison (@pseudohvr) to discuss even more BlueKeep updates since last week, as a technical presentation gets uploaded to Github, inching us closer to a full-blown public PoC. the breach and subsequent release of documents from a contractor working with Russia’s FSB intelligence services, and research from the Digital Shadows team about a new marketplace we’ve had our eye on for a few months called Enigma. **Housekeeping note** We’re trying out a new format for the show, and we are keen to get some feedback from you listeners. Tweet @pseudohvr for comments or email messages@digitalshadows.com**Party alert** If you’re heading to Black Hat or Def Con - listen up. We have a party happening Wednesday night of Black Hat at Mandalay Bay you won’t want to miss. It’s right in the middle of the hotel, at Eyecandy Sound Lounge on August 7th, from 7-10pm. Make sure to get on the list before so you avoid the lines: https://info.digitalshadows.com/BlackHat-SecurityLeadersParty2019.html?SourceCode=podcast https://arstechnica.com/information-technology/2019/07/explainer-for-exploiting-wormable-bluekeep-flaw-posted-on-github/https://support.microsoft.com/en-us/help/4500705/customer-guidance-for-cve-2019-0708 https://www.zdnet.com/article/us-company-selling-weaponized-bluekeep-exploit/https://www.zdnet.com/article/hackers-breach-fsb-contractor-expose-tor-deanonymization-project/https://www.digitalshadows.com/blog-and-research/a-growing-enigma-new-avc-on-the-block/]]></description>
    <content:encoded><![CDATA[Christian (@Chrencken14) and Travis (@puppyozone) sit down with Harrison (@pseudohvr) to discuss even more BlueKeep updates since last week, as a technical presentation gets uploaded to Github, inching us closer to a full-blown public PoC. the breach and subsequent release of documents from a contractor working with Russia’s FSB intelligence services, and research from the Digital Shadows team about a new marketplace we’ve had our eye on for a few months called Enigma. **Housekeeping note** We’re trying out a new format for the show, and we are keen to get some feedback from you listeners. Tweet @pseudohvr for comments or email messages@digitalshadows.com**Party alert** If you’re heading to Black Hat or Def Con - listen up. We have a party happening Wednesday night of Black Hat at Mandalay Bay you won’t want to miss. It’s right in the middle of the hotel, at Eyecandy Sound Lounge on August 7th, from 7-10pm. Make sure to get on the list before so you avoid the lines: https://info.digitalshadows.com/BlackHat-SecurityLeadersParty2019.html?SourceCode=podcast https://arstechnica.com/information-technology/2019/07/explainer-for-exploiting-wormable-bluekeep-flaw-posted-on-github/https://support.microsoft.com/en-us/help/4500705/customer-guidance-for-cve-2019-0708 https://www.zdnet.com/article/us-company-selling-weaponized-bluekeep-exploit/https://www.zdnet.com/article/hackers-breach-fsb-contractor-expose-tor-deanonymization-project/https://www.digitalshadows.com/blog-and-research/a-growing-enigma-new-avc-on-the-block/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461273-more-bluekeep-updates-fsb-contractor-hacked-and-the-enigma-market.mp3" length="23824187" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/4o6a0j11itcsoida84ri254r0nmk?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/656880353</guid>
    <pubDate>Fri, 26 Jul 2019 14:51:49 -0400</pubDate>
    <itunes:duration>1984</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Interview With Dir Of Threat Intelligence At McDonalds, Brian Hillegas</itunes:title>
    <title>Interview With Dir Of Threat Intelligence At McDonalds, Brian Hillegas</title>
    <itunes:summary><![CDATA[Director of Threat Intelligence at McDonald’s, Brian Hillegas, speaks with Harrison (@pseudohvr) and CISO Rick Holland (@rickhholland) about where to align your security priorities, the importance of operating cross-functionally in your organization, what the biggest threats are in the cyber landscape at the moment, and what they’re looking forward to at Black Hat and DEF CON this year. The team will be at both events in Vegas this year! Check out what we have planned and RSVP for our party W...]]></itunes:summary>
    <description><![CDATA[Director of Threat Intelligence at McDonald’s, Brian Hillegas, speaks with Harrison (@pseudohvr) and CISO Rick Holland (@rickhholland) about where to align your security priorities, the importance of operating cross-functionally in your organization, what the biggest threats are in the cyber landscape at the moment, and what they’re looking forward to at Black Hat and DEF CON this year. The team will be at both events in Vegas this year! Check out what we have planned and RSVP for our party Wednesday night here: https://info.digitalshadows.com/BlackHat2019-Hub.html]]></description>
    <content:encoded><![CDATA[Director of Threat Intelligence at McDonald’s, Brian Hillegas, speaks with Harrison (@pseudohvr) and CISO Rick Holland (@rickhholland) about where to align your security priorities, the importance of operating cross-functionally in your organization, what the biggest threats are in the cyber landscape at the moment, and what they’re looking forward to at Black Hat and DEF CON this year. The team will be at both events in Vegas this year! Check out what we have planned and RSVP for our party Wednesday night here: https://info.digitalshadows.com/BlackHat2019-Hub.html]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461274-interview-with-dir-of-threat-intelligence-at-mcdonalds-brian-hillegas.mp3" length="13944892" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/yu5lptbmzhkk4ep3sfz4lm7lmct0?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/655959512</guid>
    <pubDate>Wed, 24 Jul 2019 19:49:14 -0400</pubDate>
    <itunes:duration>1160</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>FaceApp Overblown, BlueKeep Updates, And Libra’s Lawmaker Showdown</itunes:title>
    <title>FaceApp Overblown, BlueKeep Updates, And Libra’s Lawmaker Showdown</title>
    <itunes:summary><![CDATA[Harrison (@pseudohvr), Alex, and Travis (@puppyozone) talk about the recent FaceApp shenanigans and why they’re actually not that shocking as some reports indicate. Researchers indicate that thousands of systems are still vulnerable to the BlueKeep RDP vulnerability. With a public proof of concept yet to be released, could this be the reason why? Finally, Harrison loves some cryptocurrency news, so the guys chat about Facebook’s cryptocurrency head speaking to US lawmakers about Libra and hav...]]></itunes:summary>
    <description><![CDATA[Harrison (@pseudohvr), Alex, and Travis (@puppyozone) talk about the recent FaceApp shenanigans and why they’re actually not that shocking as some reports indicate. Researchers indicate that thousands of systems are still vulnerable to the BlueKeep RDP vulnerability. With a public proof of concept yet to be released, could this be the reason why? Finally, Harrison loves some cryptocurrency news, so the guys chat about Facebook’s cryptocurrency head speaking to US lawmakers about Libra and having a not-so-great time.Cyberwire article with Alex:https://thecyberwire.com/podcasts/cw-podcasts-daily-2019-07-17.html Download this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-11-jul-18-jul-2019FaceApp: https://techcrunch.com/2019/07/17/faceapp-responds-to-privacy-concerns/ **Housekeeping note** We’re trying out a new format for the show, and we are keen to get some feedback from you listeners. Tweet @pseudohvr for comments or email messages@digitalshadows.com**Party alert** If you’re heading to Black Hat or Def Con - listen up. We have a party happening Wednesday night of Black Hat at Mandalay Bay you won’t want to miss. It’s right in the middle of the hotel, at Eyecandy Sound Lounge on August 7th, from 7-10pm. Make sure to get on the list before so you avoid the lines: https://info.digitalshadows.com/BlackHat-SecurityLeadersParty2019.html?SourceCode=podcast]]></description>
    <content:encoded><![CDATA[Harrison (@pseudohvr), Alex, and Travis (@puppyozone) talk about the recent FaceApp shenanigans and why they’re actually not that shocking as some reports indicate. Researchers indicate that thousands of systems are still vulnerable to the BlueKeep RDP vulnerability. With a public proof of concept yet to be released, could this be the reason why? Finally, Harrison loves some cryptocurrency news, so the guys chat about Facebook’s cryptocurrency head speaking to US lawmakers about Libra and having a not-so-great time.Cyberwire article with Alex:https://thecyberwire.com/podcasts/cw-podcasts-daily-2019-07-17.html Download this week’s intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-11-jul-18-jul-2019FaceApp: https://techcrunch.com/2019/07/17/faceapp-responds-to-privacy-concerns/ **Housekeeping note** We’re trying out a new format for the show, and we are keen to get some feedback from you listeners. Tweet @pseudohvr for comments or email messages@digitalshadows.com**Party alert** If you’re heading to Black Hat or Def Con - listen up. We have a party happening Wednesday night of Black Hat at Mandalay Bay you won’t want to miss. It’s right in the middle of the hotel, at Eyecandy Sound Lounge on August 7th, from 7-10pm. Make sure to get on the list before so you avoid the lines: https://info.digitalshadows.com/BlackHat-SecurityLeadersParty2019.html?SourceCode=podcast]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461275-faceapp-overblown-bluekeep-updates-and-libra-s-lawmaker-showdown.mp3" length="28817439" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/hgvlk58jbid6xidihyb407k1cbfg?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/653728049</guid>
    <pubDate>Fri, 19 Jul 2019 20:34:19 -0400</pubDate>
    <itunes:duration>2400</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Interview With Deputy CISO At Accenture, Jason Lewkowicz</itunes:title>
    <title>Interview With Deputy CISO At Accenture, Jason Lewkowicz</title>
    <itunes:summary><![CDATA[Harrison interviews Deputy CISO at Accenture, Jason Lewkowicz, and CISO at Digital Shadows, Rick Holland. The group discusses the importance of working functionally as a security team, cyber response plans, and how to keep your security playbooks up to date. Jason also discusses how his team uses Digital Shadows SearchLight™ within their day to day processes. Heading to Black Hat and/or DefCon? Meet the ShadowTalk team at our party Wednesday night at Eyecandy Sound Lounge. Details and guest l...]]></itunes:summary>
    <description><![CDATA[Harrison interviews Deputy CISO at Accenture, Jason Lewkowicz, and CISO at Digital Shadows, Rick Holland. The group discusses the importance of working functionally as a security team, cyber response plans, and how to keep your security playbooks up to date. Jason also discusses how his team uses Digital Shadows SearchLight™ within their day to day processes. Heading to Black Hat and/or DefCon? Meet the ShadowTalk team at our party Wednesday night at Eyecandy Sound Lounge. Details and guest list here: https://info.digitalshadows.com/BlackHat-SecurityLeadersParty2019.html?SourceCode=shadowtalk]]></description>
    <content:encoded><![CDATA[Harrison interviews Deputy CISO at Accenture, Jason Lewkowicz, and CISO at Digital Shadows, Rick Holland. The group discusses the importance of working functionally as a security team, cyber response plans, and how to keep your security playbooks up to date. Jason also discusses how his team uses Digital Shadows SearchLight™ within their day to day processes. Heading to Black Hat and/or DefCon? Meet the ShadowTalk team at our party Wednesday night at Eyecandy Sound Lounge. Details and guest list here: https://info.digitalshadows.com/BlackHat-SecurityLeadersParty2019.html?SourceCode=shadowtalk]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461276-interview-with-deputy-ciso-at-accenture-jason-lewkowicz.mp3" length="14140782" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/fl8zvyxorurdvrquiqfp8i6fzh3y?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/652216646</guid>
    <pubDate>Tue, 16 Jul 2019 20:28:05 -0400</pubDate>
    <itunes:duration>1177</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>TA505 Global Attacks, Zoom 0-Day, and New Magecart Activity</itunes:title>
    <title>TA505 Global Attacks, Zoom 0-Day, and New Magecart Activity</title>
    <itunes:summary><![CDATA[Kacey (@sudosu_kacey) and Alex join Harrison (@pseudohvr) to walk through this week’s threat intelligence stories. Alex walks us through the highlight story this week: TA505 uses new tools, old tactics in global attacks. Kacey then digs into the zero-day vulnerability identified in Zoom’s macOS software. We also discuss new Magecart activity, the Sodinokibi ransomware, and what our ShadowTalk-ers would name their own ransomware. Get the full intelligence summary at https://resources.digitalsh...]]></itunes:summary>
    <description><![CDATA[Kacey (@sudosu_kacey) and Alex join Harrison (@pseudohvr) to walk through this week’s threat intelligence stories. Alex walks us through the highlight story this week: TA505 uses new tools, old tactics in global attacks. Kacey then digs into the zero-day vulnerability identified in Zoom’s macOS software. We also discuss new Magecart activity, the Sodinokibi ransomware, and what our ShadowTalk-ers would name their own ransomware. Get the full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-04-jul-11-jul-2019]]></description>
    <content:encoded><![CDATA[Kacey (@sudosu_kacey) and Alex join Harrison (@pseudohvr) to walk through this week’s threat intelligence stories. Alex walks us through the highlight story this week: TA505 uses new tools, old tactics in global attacks. Kacey then digs into the zero-day vulnerability identified in Zoom’s macOS software. We also discuss new Magecart activity, the Sodinokibi ransomware, and what our ShadowTalk-ers would name their own ransomware. Get the full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-04-jul-11-jul-2019]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461277-ta505-global-attacks-zoom-0-day-and-new-magecart-activity.mp3" length="8223427" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5m38v2p2tmw8twedra5phssowsqx?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/650264786</guid>
    <pubDate>Fri, 12 Jul 2019 16:14:15 -0400</pubDate>
    <itunes:duration>683</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Marriott Faces GDPR Fines - A DPO and CISO Discussion</itunes:title>
    <title>Marriott Faces GDPR Fines - A DPO and CISO Discussion</title>
    <itunes:summary><![CDATA[Harrison (@pseudohvr) is joined by Digital Shadows co-founder and Data Privacy Officer, James Chappell (@jimmychappell), as well as CISO Rick Holland (@rickhholland), to discuss the news this week around Marriott’s GDPR fines. The team talks through initial thoughts and observations, what it means for global privacy and regulation, and what we can expect moving forward.  And if you have examples of best practices around breach notification, hit up our Photon Research team on twitter...]]></itunes:summary>
    <description><![CDATA[Harrison (@pseudohvr) is joined by Digital Shadows co-founder and Data Privacy Officer, James Chappell (@jimmychappell), as well as CISO Rick Holland (@rickhholland), to discuss the news this week around Marriott’s GDPR fines. The team talks through initial thoughts and observations, what it means for global privacy and regulation, and what we can expect moving forward.  And if you have examples of best practices around breach notification, hit up our Photon Research team on twitter (@photon_research). Look out for a blog post in the coming weeks around this.]]></description>
    <content:encoded><![CDATA[Harrison (@pseudohvr) is joined by Digital Shadows co-founder and Data Privacy Officer, James Chappell (@jimmychappell), as well as CISO Rick Holland (@rickhholland), to discuss the news this week around Marriott’s GDPR fines. The team talks through initial thoughts and observations, what it means for global privacy and regulation, and what we can expect moving forward.  And if you have examples of best practices around breach notification, hit up our Photon Research team on twitter (@photon_research). Look out for a blog post in the coming weeks around this.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461278-marriott-faces-gdpr-fines-a-dpo-and-ciso-discussion.mp3" length="18795170" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/di8nrk92rd1tj03jrzp44k22114n?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/649957025</guid>
    <pubDate>Fri, 12 Jul 2019 00:43:00 -0400</pubDate>
    <itunes:duration>1564</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Operation Soft Cell, Libra Cryptocurrency Impersonations, and New Cyber Espionage Activity</itunes:title>
    <title>Operation Soft Cell, Libra Cryptocurrency Impersonations, and New Cyber Espionage Activity</title>
    <itunes:summary><![CDATA[This week Alex and Phil join Harrison to discuss Operation Soft Cell, a campaign that has been actively compromising telecommunications organizations since early 2017. Other highlights from the week include focus on a new cyber espionage campaign, known as Operation BouncingGolf, targeting Middle Eastern individuals’ mobile devices; the Russia-associated threat group “Turla”, which has demonstrated new tools and capabilities in three campaigns; and media allegations that the United States Cyb...]]></itunes:summary>
    <description><![CDATA[This week Alex and Phil join Harrison to discuss Operation Soft Cell, a campaign that has been actively compromising telecommunications organizations since early 2017. Other highlights from the week include focus on a new cyber espionage campaign, known as Operation BouncingGolf, targeting Middle Eastern individuals’ mobile devices; the Russia-associated threat group “Turla”, which has demonstrated new tools and capabilities in three campaigns; and media allegations that the United States Cyber Command has targeted Iranian espionage groups. The team ends the week with a discussion around some new research Alex put out around Libra cryptocurrency impersonations. Check out Alex’s blog at https://www.digitalshadows.com/blog-and-research/facebooks-libra-cryptocurrency-cybercriminals-tipping-the-scales-in-their-favor/Full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-20-jun-27-jun-2019.Heads-up, we’ll be off for the 4th of July next week, but check out our intelligence summary report at https://resources.digitalshadows.com/weekly-intelligence-summary.]]></description>
    <content:encoded><![CDATA[This week Alex and Phil join Harrison to discuss Operation Soft Cell, a campaign that has been actively compromising telecommunications organizations since early 2017. Other highlights from the week include focus on a new cyber espionage campaign, known as Operation BouncingGolf, targeting Middle Eastern individuals’ mobile devices; the Russia-associated threat group “Turla”, which has demonstrated new tools and capabilities in three campaigns; and media allegations that the United States Cyber Command has targeted Iranian espionage groups. The team ends the week with a discussion around some new research Alex put out around Libra cryptocurrency impersonations. Check out Alex’s blog at https://www.digitalshadows.com/blog-and-research/facebooks-libra-cryptocurrency-cybercriminals-tipping-the-scales-in-their-favor/Full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-20-jun-27-jun-2019.Heads-up, we’ll be off for the 4th of July next week, but check out our intelligence summary report at https://resources.digitalshadows.com/weekly-intelligence-summary.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461279-operation-soft-cell-libra-cryptocurrency-impersonations-and-new-cyber-espionage-activity.mp3" length="12234956" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/4avlls882izugol84q0fgbhiq45t?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/643517022</guid>
    <pubDate>Fri, 28 Jun 2019 14:28:53 -0400</pubDate>
    <itunes:duration>1018</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Google Calendar Phishing, Exim Email Server Vulnerability, and Diversity in Cybersecurity</itunes:title>
    <title>Google Calendar Phishing, Exim Email Server Vulnerability, and Diversity in Cybersecurity</title>
    <itunes:summary><![CDATA[This week Alex and Jamie (@TheCollierJam) chat with Harrison (@pseudohvr) on a cyber-threat campaign involving the abuse of legitimate features in Google Calendar. Then they dive into other highlights from the week including the expansion of sector targeting by destructive threat group “Xenotime”, exploitation of a vulnerability affecting Exim email servers, and continued targeting of the transportation sector by the Iran-associated threat group “APT39”. Then we hear Part II of Rick Holland (...]]></itunes:summary>
    <description><![CDATA[This week Alex and Jamie (@TheCollierJam) chat with Harrison (@pseudohvr) on a cyber-threat campaign involving the abuse of legitimate features in Google Calendar. Then they dive into other highlights from the week including the expansion of sector targeting by destructive threat group “Xenotime”, exploitation of a vulnerability affecting Exim email servers, and continued targeting of the transportation sector by the Iran-associated threat group “APT39”. Then we hear Part II of Rick Holland (@rickhholland) and Harrison’s interview with Ryan Kovar (@meansec) of Splunk. This time they talk about badass women in cybersecurity, mentorship, and how to become a bigger advocate for diversity in infused. A must listen. Get the weekly intelligence summary report at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-13-jun-20-jun-2019.]]></description>
    <content:encoded><![CDATA[This week Alex and Jamie (@TheCollierJam) chat with Harrison (@pseudohvr) on a cyber-threat campaign involving the abuse of legitimate features in Google Calendar. Then they dive into other highlights from the week including the expansion of sector targeting by destructive threat group “Xenotime”, exploitation of a vulnerability affecting Exim email servers, and continued targeting of the transportation sector by the Iran-associated threat group “APT39”. Then we hear Part II of Rick Holland (@rickhholland) and Harrison’s interview with Ryan Kovar (@meansec) of Splunk. This time they talk about badass women in cybersecurity, mentorship, and how to become a bigger advocate for diversity in infused. A must listen. Get the weekly intelligence summary report at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-13-jun-20-jun-2019.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461280-google-calendar-phishing-exim-email-server-vulnerability-and-diversity-in-cybersecurity.mp3" length="24252117" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/bs2elcxffyf5nzfrtpwzgv79l9xm?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/640087494</guid>
    <pubDate>Fri, 21 Jun 2019 10:41:07 -0400</pubDate>
    <itunes:duration>2019</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>XMRig Cryptocurrency Mining, FIN8 Backdoor, and Attacks Against Office 365</itunes:title>
    <title>XMRig Cryptocurrency Mining, FIN8 Backdoor, and Attacks Against Office 365</title>
    <itunes:summary><![CDATA[This week Harrison (@pseudohvr)  is joined by Travis (@puppyozone) and Alec to discuss the security stories of the week including a fileless malware attack delivers cryptocurrency miner to China, a return from FIN8 with a backdoor for the hospitality industry, a popular flaw exploited in a tailored spam campaign, and MuddyWater expanding tactic repertoire in Middle Eastern attacks. Then Digital Shadows CISO Rick Holland (@rickhholland)  joins Harrison to chat with principal security strategis...]]></itunes:summary>
    <description><![CDATA[This week Harrison (@pseudohvr)  is joined by Travis (@puppyozone) and Alec to discuss the security stories of the week including a fileless malware attack delivers cryptocurrency miner to China, a return from FIN8 with a backdoor for the hospitality industry, a popular flaw exploited in a tailored spam campaign, and MuddyWater expanding tactic repertoire in Middle Eastern attacks. Then Digital Shadows CISO Rick Holland (@rickhholland)  joins Harrison to chat with principal security strategist at Splunk, Ryan Kovar (@meansec) on Ryan&apos;s research around machine learning and attacks against Office 365. Download the full Intelligence Summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-06-jun-13-jun-2019Blog on Infosec Burnout: https://www.digitalshadows.com/blog-and-research/managing-infosec-burnout-the-hidden-perpetrator/]]></description>
    <content:encoded><![CDATA[This week Harrison (@pseudohvr)  is joined by Travis (@puppyozone) and Alec to discuss the security stories of the week including a fileless malware attack delivers cryptocurrency miner to China, a return from FIN8 with a backdoor for the hospitality industry, a popular flaw exploited in a tailored spam campaign, and MuddyWater expanding tactic repertoire in Middle Eastern attacks. Then Digital Shadows CISO Rick Holland (@rickhholland)  joins Harrison to chat with principal security strategist at Splunk, Ryan Kovar (@meansec) on Ryan&apos;s research around machine learning and attacks against Office 365. Download the full Intelligence Summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-06-jun-13-jun-2019Blog on Infosec Burnout: https://www.digitalshadows.com/blog-and-research/managing-infosec-burnout-the-hidden-perpetrator/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461281-xmrig-cryptocurrency-mining-fin8-backdoor-and-attacks-against-office-365.mp3" length="30288286" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/26nrqqr3258yo2vemvp85zi35ma3?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/636740226</guid>
    <pubDate>Fri, 14 Jun 2019 15:34:59 -0400</pubDate>
    <itunes:duration>2522</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>“HiddenWasp” and “BlackSquid” malware, TA505 and Turla actvity, and Too Much Information: The Sequel</itunes:title>
    <title>“HiddenWasp” and “BlackSquid” malware, TA505 and Turla actvity, and Too Much Information: The Sequel</title>
    <itunes:summary><![CDATA[Alex and Christian join HVR this week to discuss the Linux malware “HiddenWasp” (along with HVR’s hatred of the insect), the BlackSquid malware, and updated campaign activity from TA505 and Turla threat groups. Then, Harrison sits down with Dr. Richard Gold, head of Security Engineering at Digital Shadows, to discuss Photon Research’s most recent report Too Much Information: The Sequel. Be sure to download the full report at https://info.digitalshadows.com/TooMuchInfoTheSequel-podcast.html an...]]></itunes:summary>
    <description><![CDATA[Alex and Christian join HVR this week to discuss the Linux malware “HiddenWasp” (along with HVR’s hatred of the insect), the BlackSquid malware, and updated campaign activity from TA505 and Turla threat groups. Then, Harrison sits down with Dr. Richard Gold, head of Security Engineering at Digital Shadows, to discuss Photon Research’s most recent report Too Much Information: The Sequel. Be sure to download the full report at https://info.digitalshadows.com/TooMuchInfoTheSequel-podcast.html and the intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-30-may-06-jun-2019]]></description>
    <content:encoded><![CDATA[Alex and Christian join HVR this week to discuss the Linux malware “HiddenWasp” (along with HVR’s hatred of the insect), the BlackSquid malware, and updated campaign activity from TA505 and Turla threat groups. Then, Harrison sits down with Dr. Richard Gold, head of Security Engineering at Digital Shadows, to discuss Photon Research’s most recent report Too Much Information: The Sequel. Be sure to download the full report at https://info.digitalshadows.com/TooMuchInfoTheSequel-podcast.html and the intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-30-may-06-jun-2019]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461282-hiddenwasp-and-blacksquid-malware-ta505-and-turla-actvity-and-too-much-information-the-sequel.mp3" length="19652602" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ad5o13btr7mt6uziozbpuale76fp?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/633250260</guid>
    <pubDate>Fri, 07 Jun 2019 12:55:27 -0400</pubDate>
    <itunes:duration>1636</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>JasperLoader, APT28 URL shortening, and RDP vulnerability discussion</itunes:title>
    <title>JasperLoader, APT28 URL shortening, and RDP vulnerability discussion</title>
    <itunes:summary><![CDATA[Alex Guirakhoo and newcomer to the pod Travis Randall (@puppyozone) join HVR this week to discuss updates to the JasperLoader malware loader, APT28’s newly observed link shortening technique, Gnosticplayers allegedly stole information from an Australian graphics design companies, and APT10 malware loaders. After that, Richard Gold (@drshellface) and Simon Hall (@5ecur1tySi) discuss the Remote Desktop Protocol vulnerability that everyone has been hyped up about in the last couple of weeks. Be ...]]></itunes:summary>
    <description><![CDATA[Alex Guirakhoo and newcomer to the pod Travis Randall (@puppyozone) join HVR this week to discuss updates to the JasperLoader malware loader, APT28’s newly observed link shortening technique, Gnosticplayers allegedly stole information from an Australian graphics design companies, and APT10 malware loaders. After that, Richard Gold (@drshellface) and Simon Hall (@5ecur1tySi) discuss the Remote Desktop Protocol vulnerability that everyone has been hyped up about in the last couple of weeks. Be sure to download the full intelligence summary at resources.digitalshadows.com. In more news, Photon Research Team has published a new report! The overall main finding of the paper is that Photon found there were 2.3 billion files currently being exposed online via file shares like SMB or Amazon S3 buckets. We are going to do a deep dive episode about that for next week’s episode. (Report) Too Much Information: The Sequel: https://info.digitalshadows.com/TooMuchInfoTheSequel-podcast.html(Blog) 2.3 billion files exposed across online file storage technologies: https://www.digitalshadows.com/blog-and-research/2-billion-files-exposed-across-online-file-storage-technologies/]]></description>
    <content:encoded><![CDATA[Alex Guirakhoo and newcomer to the pod Travis Randall (@puppyozone) join HVR this week to discuss updates to the JasperLoader malware loader, APT28’s newly observed link shortening technique, Gnosticplayers allegedly stole information from an Australian graphics design companies, and APT10 malware loaders. After that, Richard Gold (@drshellface) and Simon Hall (@5ecur1tySi) discuss the Remote Desktop Protocol vulnerability that everyone has been hyped up about in the last couple of weeks. Be sure to download the full intelligence summary at resources.digitalshadows.com. In more news, Photon Research Team has published a new report! The overall main finding of the paper is that Photon found there were 2.3 billion files currently being exposed online via file shares like SMB or Amazon S3 buckets. We are going to do a deep dive episode about that for next week’s episode. (Report) Too Much Information: The Sequel: https://info.digitalshadows.com/TooMuchInfoTheSequel-podcast.html(Blog) 2.3 billion files exposed across online file storage technologies: https://www.digitalshadows.com/blog-and-research/2-billion-files-exposed-across-online-file-storage-technologies/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461283-jasperloader-apt28-url-shortening-and-rdp-vulnerability-discussion.mp3" length="18082057" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/9lwgxq8j8br01ztz0r1bcepsdhog?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/629570511</guid>
    <pubDate>Fri, 31 May 2019 11:16:59 -0400</pubDate>
    <itunes:duration>1505</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CVE-2019-0708 RDP vulnerability and GDPR’s anniversary</itunes:title>
    <title>CVE-2019-0708 RDP vulnerability and GDPR’s anniversary</title>
    <itunes:summary><![CDATA[Jamie Collier and Phil Doherty join HVR on this week’s ShadowTalk, discussing the RDP vulnerability that has everyone sweating, CVE-2019-0708. Patch those systems, because there’s a few different proof of concept exploits circulating around online. Then, the guys discuss a new MuddyWater obfuscation technique, updates to the Trickbot banking trojan, and there’s some sad MongoDB owners out there following a wipe of over 12,000 databases by an extortionist. Then, happy anniversary, GDPR! Digita...]]></itunes:summary>
    <description><![CDATA[Jamie Collier and Phil Doherty join HVR on this week’s ShadowTalk, discussing the RDP vulnerability that has everyone sweating, CVE-2019-0708. Patch those systems, because there’s a few different proof of concept exploits circulating around online. Then, the guys discuss a new MuddyWater obfuscation technique, updates to the Trickbot banking trojan, and there’s some sad MongoDB owners out there following a wipe of over 12,000 databases by an extortionist. Then, happy anniversary, GDPR! Digital Shadows’ Chief Innovation Officer James Chappell sits down with James Boyle of Taylor Vinters, a law firm who focuses on supporting technology rich businesses and the entrepreneurs who make great things happen, for an extended discussion of the current state of GDPR one year on and all things data privacy related. Follow @digitalshadows, @photon_research, @pseudohvr, @thecollierjam, and @jimmychappell on Twitter. Be sure to download the full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-16-may-23-may-2019.]]></description>
    <content:encoded><![CDATA[Jamie Collier and Phil Doherty join HVR on this week’s ShadowTalk, discussing the RDP vulnerability that has everyone sweating, CVE-2019-0708. Patch those systems, because there’s a few different proof of concept exploits circulating around online. Then, the guys discuss a new MuddyWater obfuscation technique, updates to the Trickbot banking trojan, and there’s some sad MongoDB owners out there following a wipe of over 12,000 databases by an extortionist. Then, happy anniversary, GDPR! Digital Shadows’ Chief Innovation Officer James Chappell sits down with James Boyle of Taylor Vinters, a law firm who focuses on supporting technology rich businesses and the entrepreneurs who make great things happen, for an extended discussion of the current state of GDPR one year on and all things data privacy related. Follow @digitalshadows, @photon_research, @pseudohvr, @thecollierjam, and @jimmychappell on Twitter. Be sure to download the full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-16-may-23-may-2019.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461284-cve-2019-0708-rdp-vulnerability-and-gdpr-s-anniversary.mp3" length="33921950" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/iw6niwjk6a0rf0ewvfdt7upae09g?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/626059248</guid>
    <pubDate>Fri, 24 May 2019 15:38:32 -0400</pubDate>
    <itunes:duration>2825</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>ElectricFish malware attributed to &quot;Lazarus Group&quot;</itunes:title>
    <title>ElectricFish malware attributed to &quot;Lazarus Group&quot;</title>
    <itunes:summary><![CDATA[Alex and Christian join Harrison this week to discuss the attribution of the ElectricFish malware to the "Lazarus Group" and the highlights from this week included the exploited vulnerability in WhatsApp, the dark web sale offering access to major antivirus companies, and the "Plead" malware being distributed via ASUS software updates. Then, Dr. Richard Gold and Simon Hall join the show to discuss the NCSC's password expiration guidance and share their opinions on the topic. Read the full fin...]]></itunes:summary>
    <description><![CDATA[Alex and Christian join Harrison this week to discuss the attribution of the ElectricFish malware to the &quot;Lazarus Group&quot; and the highlights from this week included the exploited vulnerability in WhatsApp, the dark web sale offering access to major antivirus companies, and the &quot;Plead&quot; malware being distributed via ASUS software updates. Then, Dr. Richard Gold and Simon Hall join the show to discuss the NCSC&apos;s password expiration guidance and share their opinions on the topic. Read the full findings athttps://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-09-may-16-may-2019.]]></description>
    <content:encoded><![CDATA[Alex and Christian join Harrison this week to discuss the attribution of the ElectricFish malware to the &quot;Lazarus Group&quot; and the highlights from this week included the exploited vulnerability in WhatsApp, the dark web sale offering access to major antivirus companies, and the &quot;Plead&quot; malware being distributed via ASUS software updates. Then, Dr. Richard Gold and Simon Hall join the show to discuss the NCSC&apos;s password expiration guidance and share their opinions on the topic. Read the full findings athttps://resources.digitalshadows.com/digitalshadows/weekly-intelligence-summary-09-may-16-may-2019.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461285-electricfish-malware-attributed-to-lazarus-group.mp3" length="27622462" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/73llo4hixy0yelt736nsxm1vjql9?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/622337298</guid>
    <pubDate>Fri, 17 May 2019 17:47:23 -0400</pubDate>
    <itunes:duration>2300</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>“Buckeye” APT group used Equation Group tools before 2017 leak</itunes:title>
    <title>“Buckeye” APT group used Equation Group tools before 2017 leak</title>
    <itunes:summary><![CDATA[Kacey and Alex join HVR to talk through the key stories this week including a new threat group called “Mirrorthief” conducting “Magecart”-like digital skimming attacks against university websites, various code-sharing repositories being targeted and held for ransom by an unknown threat actor; and new ransomware, “Sodinokibi”, which used a zero-day vulnerability in Oracle WebLogic. Simon Hall and Dr. Richard Gold then join to dive deeper into the “Buckeye” APT group, which has recently been sa...]]></itunes:summary>
    <description><![CDATA[Kacey and Alex join HVR to talk through the key stories this week including a new threat group called “Mirrorthief” conducting “Magecart”-like digital skimming attacks against university websites, various code-sharing repositories being targeted and held for ransom by an unknown threat actor; and new ransomware, “Sodinokibi”, which used a zero-day vulnerability in Oracle WebLogic. Simon Hall and Dr. Richard Gold then join to dive deeper into the “Buckeye” APT group, which has recently been said to develop its own version of a tool that was likely created by the U.S. National Security Agency (NSA) prior to being leaked by the “ShadowBrokers” in 2017.  Read the full findings at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-02-may-09-may-2019.]]></description>
    <content:encoded><![CDATA[Kacey and Alex join HVR to talk through the key stories this week including a new threat group called “Mirrorthief” conducting “Magecart”-like digital skimming attacks against university websites, various code-sharing repositories being targeted and held for ransom by an unknown threat actor; and new ransomware, “Sodinokibi”, which used a zero-day vulnerability in Oracle WebLogic. Simon Hall and Dr. Richard Gold then join to dive deeper into the “Buckeye” APT group, which has recently been said to develop its own version of a tool that was likely created by the U.S. National Security Agency (NSA) prior to being leaked by the “ShadowBrokers” in 2017.  Read the full findings at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-02-may-09-may-2019.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461286-buckeye-apt-group-used-equation-group-tools-before-2017-leak.mp3" length="20123077" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/7m779vrnf0mwaqqampexjsps19if?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/618771645</guid>
    <pubDate>Fri, 10 May 2019 17:26:19 -0400</pubDate>
    <itunes:duration>1675</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly Intelligence Summary: Ep 17</itunes:title>
    <title>Weekly Intelligence Summary: Ep 17</title>
    <itunes:summary><![CDATA[Phil and newcomer Benjamin Newman join Harrison for another edition of the Weekly Intelligence Summary. The guys cover two distinct attack campaigns which used uncommon and underreported social engineering and malware delivery techniques, as well as attempts to automate these attacks in the future. Other highlights from this week include a cryptojacking campaigns using the ETERNALBLUE and DOUBLEPULSAR exploits, new reports of Magecart activity, and more extortionists leaking sensitive informa...]]></itunes:summary>
    <description><![CDATA[Phil and newcomer Benjamin Newman join Harrison for another edition of the Weekly Intelligence Summary. The guys cover two distinct attack campaigns which used uncommon and underreported social engineering and malware delivery techniques, as well as attempts to automate these attacks in the future. Other highlights from this week include a cryptojacking campaigns using the ETERNALBLUE and DOUBLEPULSAR exploits, new reports of Magecart activity, and more extortionists leaking sensitive information following failed ransom attempts. To download the full intelligence summary, please visit resources.digitalshadows.com.]]></description>
    <content:encoded><![CDATA[Phil and newcomer Benjamin Newman join Harrison for another edition of the Weekly Intelligence Summary. The guys cover two distinct attack campaigns which used uncommon and underreported social engineering and malware delivery techniques, as well as attempts to automate these attacks in the future. Other highlights from this week include a cryptojacking campaigns using the ETERNALBLUE and DOUBLEPULSAR exploits, new reports of Magecart activity, and more extortionists leaking sensitive information following failed ransom attempts. To download the full intelligence summary, please visit resources.digitalshadows.com.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461287-weekly-intelligence-summary-ep-17.mp3" length="10038084" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/lru8e0y6vrazik558fdiybpvt3zh?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/615233691</guid>
    <pubDate>Fri, 03 May 2019 13:05:19 -0400</pubDate>
    <itunes:duration>835</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly Intelligence Summary: Ep 16</itunes:title>
    <title>Weekly Intelligence Summary: Ep 16</title>
    <itunes:summary><![CDATA[Jamie and Alex are back with Harrison this week to talk about the leak of information related to APT34 on Telegram, including victim data, personally identifiable information and the group's tools. Other highlights from this week include a phishing campaign delivering RevengeRAT, more information about the Wipro breach, and details about the threat actors responsible for the previously reported ASUS server compromise. Get the full intelligence summary at https://resources.digitalshadows.com/w...]]></itunes:summary>
    <description><![CDATA[Jamie and Alex are back with Harrison this week to talk about the leak of information related to APT34 on Telegram, including victim data, personally identifiable information and the group&apos;s tools. Other highlights from this week include a phishing campaign delivering RevengeRAT, more information about the Wipro breach, and details about the threat actors responsible for the previously reported ASUS server compromise. Get the full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary.]]></description>
    <content:encoded><![CDATA[Jamie and Alex are back with Harrison this week to talk about the leak of information related to APT34 on Telegram, including victim data, personally identifiable information and the group&apos;s tools. Other highlights from this week include a phishing campaign delivering RevengeRAT, more information about the Wipro breach, and details about the threat actors responsible for the previously reported ASUS server compromise. Get the full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461288-weekly-intelligence-summary-ep-16.mp3" length="10703734" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/o1p34vyanh450f8umt2dmxrv5sva?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/611941182</guid>
    <pubDate>Fri, 26 Apr 2019 17:10:39 -0400</pubDate>
    <itunes:duration>890</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly Intelligence Summary: Ep 15</itunes:title>
    <title>Weekly Intelligence Summary: Ep 15</title>
    <itunes:summary><![CDATA[This week the team discusses an unidentified threat actor that has obtained data from various personal Outlook, MSN, and Hotmail email accounts by compromising a Microsoft customer support account. Also, the “Triton” malware was detected at a critical infrastructure facility, an IT outsourcing company experienced a potential network intrusion linked to a supply-chain attack, and a new trojan referred to as Hoplight has been attributed to the “Lazarus Group”. Check out the full intelligence su...]]></itunes:summary>
    <description><![CDATA[This week the team discusses an unidentified threat actor that has obtained data from various personal Outlook, MSN, and Hotmail email accounts by compromising a Microsoft customer support account. Also, the “Triton” malware was detected at a critical infrastructure facility, an IT outsourcing company experienced a potential network intrusion linked to a supply-chain attack, and a new trojan referred to as Hoplight has been attributed to the “Lazarus Group”. Check out the full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-11-apr-18-apr-2019]]></description>
    <content:encoded><![CDATA[This week the team discusses an unidentified threat actor that has obtained data from various personal Outlook, MSN, and Hotmail email accounts by compromising a Microsoft customer support account. Also, the “Triton” malware was detected at a critical infrastructure facility, an IT outsourcing company experienced a potential network intrusion linked to a supply-chain attack, and a new trojan referred to as Hoplight has been attributed to the “Lazarus Group”. Check out the full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-11-apr-18-apr-2019]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461289-weekly-intelligence-summary-ep-15.mp3" length="10698438" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/rvvd8wcu8309k216bqygrttykh2x?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/608366751</guid>
    <pubDate>Fri, 19 Apr 2019 10:11:12 -0400</pubDate>
    <itunes:duration>889</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly Intelligence Summary: Ep 14</itunes:title>
    <title>Weekly Intelligence Summary: Ep 14</title>
    <itunes:summary><![CDATA[Christian and Jamie join Harrison for another week of ShadowTalk to discuss the FIN6 threat actor reportedly widening its range of attacks to include ransomware, potentially inciting the threat group to extend targeting beyond retail and hospitality entities. The highlights from this week include a Chinese advanced persistent threat (APT) campaign against a German pharmaceutical company, likely to steal intellectual property; a mass phishing campaign that used US servers to host malware; and ...]]></itunes:summary>
    <description><![CDATA[Christian and Jamie join Harrison for another week of ShadowTalk to discuss the FIN6 threat actor reportedly widening its range of attacks to include ransomware, potentially inciting the threat group to extend targeting beyond retail and hospitality entities. The highlights from this week include a Chinese advanced persistent threat (APT) campaign against a German pharmaceutical company, likely to steal intellectual property; a mass phishing campaign that used US servers to host malware; and a Domain Name Server (DNS) hijacking campaign aimed at online services and Brazilian financial institutions. No Zuko this week unfortunately, and we ask Christian what his theory is for Game of Thrones which starts up on Sunday.Download the full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-04-apr-11-apr-2019.]]></description>
    <content:encoded><![CDATA[Christian and Jamie join Harrison for another week of ShadowTalk to discuss the FIN6 threat actor reportedly widening its range of attacks to include ransomware, potentially inciting the threat group to extend targeting beyond retail and hospitality entities. The highlights from this week include a Chinese advanced persistent threat (APT) campaign against a German pharmaceutical company, likely to steal intellectual property; a mass phishing campaign that used US servers to host malware; and a Domain Name Server (DNS) hijacking campaign aimed at online services and Brazilian financial institutions. No Zuko this week unfortunately, and we ask Christian what his theory is for Game of Thrones which starts up on Sunday.Download the full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-04-apr-11-apr-2019.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461290-weekly-intelligence-summary-ep-14.mp3" length="12147920" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/403wma7z0loxmdihxgbikwbmfdw2?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/605089704</guid>
    <pubDate>Fri, 12 Apr 2019 15:33:45 -0400</pubDate>
    <itunes:duration>1010</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly Intelligence Summary: Ep 13</itunes:title>
    <title>Weekly Intelligence Summary: Ep 13</title>
    <itunes:summary><![CDATA[Jamie, Alex and Zuko sit down with Harrison to talk about a story that flew a little under the radar this week; Russia has allegedly been conducting a widespread satellite spoofing campaign since 2016, sending false positional data to ships and planes. Other highlights from this week include APT33 activity targeting engineering and manufacturing organizations, popular restaurant chains report some point of sale malware attacks, and South Korean websites being used in watering hole attacks. Al...]]></itunes:summary>
    <description><![CDATA[Jamie, Alex and Zuko sit down with Harrison to talk about a story that flew a little under the radar this week; Russia has allegedly been conducting a widespread satellite spoofing campaign since 2016, sending false positional data to ships and planes. Other highlights from this week include APT33 activity targeting engineering and manufacturing organizations, popular restaurant chains report some point of sale malware attacks, and South Korean websites being used in watering hole attacks. Also, Game of Thrones theories, Alex realizes he’s way late to the #GoT party, and more on this week’s ShadowTalk. Download the full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-28-mar-04-apr-2019.]]></description>
    <content:encoded><![CDATA[Jamie, Alex and Zuko sit down with Harrison to talk about a story that flew a little under the radar this week; Russia has allegedly been conducting a widespread satellite spoofing campaign since 2016, sending false positional data to ships and planes. Other highlights from this week include APT33 activity targeting engineering and manufacturing organizations, popular restaurant chains report some point of sale malware attacks, and South Korean websites being used in watering hole attacks. Also, Game of Thrones theories, Alex realizes he’s way late to the #GoT party, and more on this week’s ShadowTalk. Download the full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-28-mar-04-apr-2019.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461291-weekly-intelligence-summary-ep-13.mp3" length="11252338" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/d5o6mm3y4ypfa0hxcvv7i1ruba8x?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/601470330</guid>
    <pubDate>Fri, 05 Apr 2019 12:40:51 -0400</pubDate>
    <itunes:duration>935</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly Intelligence Summary: Ep 12</itunes:title>
    <title>Weekly Intelligence Summary: Ep 12</title>
    <itunes:summary><![CDATA[Christian and Jamie sit down with Harrison to talk about the compromised Asus server used to distribute backdoor malware to at least 500,000 users’ devices, more LockerGoga ransomware attacks, a new Magecart skimming attack, and FIN7 back in the news. Busy week! Also, Jamie gives hair product tips and the guys discuss what Twitter handle they would choose in an ideal world.Read this week’s intelligence summary here: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intel...]]></itunes:summary>
    <description><![CDATA[Christian and Jamie sit down with Harrison to talk about the compromised Asus server used to distribute backdoor malware to at least 500,000 users’ devices, more LockerGoga ransomware attacks, a new Magecart skimming attack, and FIN7 back in the news. Busy week! Also, Jamie gives hair product tips and the guys discuss what Twitter handle they would choose in an ideal world.Read this week’s intelligence summary here: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-21-mar-28-mar-2019]]></description>
    <content:encoded><![CDATA[Christian and Jamie sit down with Harrison to talk about the compromised Asus server used to distribute backdoor malware to at least 500,000 users’ devices, more LockerGoga ransomware attacks, a new Magecart skimming attack, and FIN7 back in the news. Busy week! Also, Jamie gives hair product tips and the guys discuss what Twitter handle they would choose in an ideal world.Read this week’s intelligence summary here: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-21-mar-28-mar-2019]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461292-weekly-intelligence-summary-ep-12.mp3" length="14619313" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/3f71524pxlv82jv6yfcxq5aweeo2?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/597984369</guid>
    <pubDate>Fri, 29 Mar 2019 15:00:07 -0400</pubDate>
    <itunes:duration>1216</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 60: Cyber Risks and High-frequency Trading</itunes:title>
    <title>Episode 60: Cyber Risks and High-frequency Trading</title>
    <itunes:summary><![CDATA[With new research this week warning that state-sponsored cyber attacks against financial systems are on the rise, the ShadowTalk team focus on one area of the financial services sector in particular: high-frequency trading (HFT). Richard Gold and Rafael Amado are joined by a guest HFT expert to discuss mergers and acquisition information, sharing insider secrets, and manipulating stock prices. The team look at what attacks are possible, what the consequences would be for the financial service...]]></itunes:summary>
    <description><![CDATA[With new research this week warning that state-sponsored cyber attacks against financial systems are on the rise, the ShadowTalk team focus on one area of the financial services sector in particular: high-frequency trading (HFT). Richard Gold and Rafael Amado are joined by a guest HFT expert to discuss mergers and acquisition information, sharing insider secrets, and manipulating stock prices. The team look at what attacks are possible, what the consequences would be for the financial services industry at large, and why attacks against trading platforms and the industry itself have been so few and far between.]]></description>
    <content:encoded><![CDATA[With new research this week warning that state-sponsored cyber attacks against financial systems are on the rise, the ShadowTalk team focus on one area of the financial services sector in particular: high-frequency trading (HFT). Richard Gold and Rafael Amado are joined by a guest HFT expert to discuss mergers and acquisition information, sharing insider secrets, and manipulating stock prices. The team look at what attacks are possible, what the consequences would be for the financial services industry at large, and why attacks against trading platforms and the industry itself have been so few and far between.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461293-episode-60-cyber-risks-and-high-frequency-trading.mp3" length="30876808" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/lpamzr05wtbb6qe8n2qwemqutpcd?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/595738845</guid>
    <pubDate>Mon, 25 Mar 2019 16:16:38 -0400</pubDate>
    <itunes:duration>2571</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly Intelligence Summary: Ep 11</itunes:title>
    <title>Weekly Intelligence Summary: Ep 11</title>
    <itunes:summary><![CDATA[Harrison chats with Jamie and Alex this week on an attack on Norwegian aluminum and renewable-energy company Norsk Hydro ASA. The team also looks at threat group “APT-C-27” exploiting a flaw in WinRAR software, a fourth batch of breached data offered for sale on the dark web by “Gnosticplayers”, and a spam campaign exploiting the recent events surrounding the grounding of multiple Boeing 737 aircraft. Download the full intelligence summary here: https://resources.digitalshadows.com/weekly-int...]]></itunes:summary>
    <description><![CDATA[Harrison chats with Jamie and Alex this week on an attack on Norwegian aluminum and renewable-energy company Norsk Hydro ASA. The team also looks at threat group “APT-C-27” exploiting a flaw in WinRAR software, a fourth batch of breached data offered for sale on the dark web by “Gnosticplayers”, and a spam campaign exploiting the recent events surrounding the grounding of multiple Boeing 737 aircraft. Download the full intelligence summary here: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-14-mar-21-mar-2019]]></description>
    <content:encoded><![CDATA[Harrison chats with Jamie and Alex this week on an attack on Norwegian aluminum and renewable-energy company Norsk Hydro ASA. The team also looks at threat group “APT-C-27” exploiting a flaw in WinRAR software, a fourth batch of breached data offered for sale on the dark web by “Gnosticplayers”, and a spam campaign exploiting the recent events surrounding the grounding of multiple Boeing 737 aircraft. Download the full intelligence summary here: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-14-mar-21-mar-2019]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461294-weekly-intelligence-summary-ep-11.mp3" length="9743923" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8z0jwwdpsiei8r5kqf70laonp9iy?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/594271242</guid>
    <pubDate>Fri, 22 Mar 2019 16:14:38 -0400</pubDate>
    <itunes:duration>810</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly Intelligence Summary: Ep 10</itunes:title>
    <title>Weekly Intelligence Summary: Ep 10</title>
    <itunes:summary><![CDATA[Harrison sits down with Rose and Christian for a quick chat about APT40 targeting educational maritime research, as well as other highlights from this week. Rose also gives us the breakdown of an inspiring trip to NASA; also space vampires make a brief appearance. Download the entire intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-07-mar-14-mar-2019.]]></itunes:summary>
    <description><![CDATA[Harrison sits down with Rose and Christian for a quick chat about APT40 targeting educational maritime research, as well as other highlights from this week. Rose also gives us the breakdown of an inspiring trip to NASA; also space vampires make a brief appearance. Download the entire intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-07-mar-14-mar-2019.]]></description>
    <content:encoded><![CDATA[Harrison sits down with Rose and Christian for a quick chat about APT40 targeting educational maritime research, as well as other highlights from this week. Rose also gives us the breakdown of an inspiring trip to NASA; also space vampires make a brief appearance. Download the entire intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-07-mar-14-mar-2019.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461295-weekly-intelligence-summary-ep-10.mp3" length="14649092" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/dvdafr9y0zva2y7segmuqkpu9do1?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/590745930</guid>
    <pubDate>Fri, 15 Mar 2019 18:47:57 -0400</pubDate>
    <itunes:duration>1219</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 59: Practitioner’s Guide to Email Spoofing</itunes:title>
    <title>Episode 59: Practitioner’s Guide to Email Spoofing</title>
    <itunes:summary><![CDATA[Senior security engineer, Simon Hall joins Rafael Amado to explain how IT teams and defenders can combat email spoofing, one of the most popular techniques used by phishers. Simon discusses why spoofing is so prevalent and relatively simple for attackers to carry out, as well as how measures such as SPF, DMARC, and DKIM can be used to reduce spoofing risks. For more on this topic, read our Security Practitioner’s Guide to Email Spoofing and Risk Reduction, available at https://www.digitalshad...]]></itunes:summary>
    <description><![CDATA[Senior security engineer, Simon Hall joins Rafael Amado to explain how IT teams and defenders can combat email spoofing, one of the most popular techniques used by phishers. Simon discusses why spoofing is so prevalent and relatively simple for attackers to carry out, as well as how measures such as SPF, DMARC, and DKIM can be used to reduce spoofing risks. For more on this topic, read our Security Practitioner’s Guide to Email Spoofing and Risk Reduction, available at https://www.digitalshadows.com/blog-and-research/security-practitioners-guide-to-email-spoofing-and-risk-reduction/]]></description>
    <content:encoded><![CDATA[Senior security engineer, Simon Hall joins Rafael Amado to explain how IT teams and defenders can combat email spoofing, one of the most popular techniques used by phishers. Simon discusses why spoofing is so prevalent and relatively simple for attackers to carry out, as well as how measures such as SPF, DMARC, and DKIM can be used to reduce spoofing risks. For more on this topic, read our Security Practitioner’s Guide to Email Spoofing and Risk Reduction, available at https://www.digitalshadows.com/blog-and-research/security-practitioners-guide-to-email-spoofing-and-risk-reduction/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461296-episode-59-practitioner-s-guide-to-email-spoofing.mp3" length="20316651" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ho2m3yglcl2giki7f15mk5vliwfv?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/588414654</guid>
    <pubDate>Mon, 11 Mar 2019 13:04:12 -0400</pubDate>
    <itunes:duration>1691</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly Intelligence Summary: Ep 9</itunes:title>
    <title>Weekly Intelligence Summary: Ep 9</title>
    <itunes:summary><![CDATA[In this week’s episode, the team looks at Fin6, who has begun regularly targeting card-not-present data on e-commerce websites. Other highlights from this week include Topps disclosing a data breach incident linked to Magecart, the Farseer malware, and more. Read the full intelligence summary here: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-28-feb-07-mar-2019]]></itunes:summary>
    <description><![CDATA[In this week’s episode, the team looks at Fin6, who has begun regularly targeting card-not-present data on e-commerce websites. Other highlights from this week include Topps disclosing a data breach incident linked to Magecart, the Farseer malware, and more. Read the full intelligence summary here: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-28-feb-07-mar-2019]]></description>
    <content:encoded><![CDATA[In this week’s episode, the team looks at Fin6, who has begun regularly targeting card-not-present data on e-commerce websites. Other highlights from this week include Topps disclosing a data breach incident linked to Magecart, the Farseer malware, and more. Read the full intelligence summary here: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-28-feb-07-mar-2019]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461297-weekly-intelligence-summary-ep-9.mp3" length="10110994" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/4w32x4wobivmrrd8vn2wrx1w232c?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/587088177</guid>
    <pubDate>Fri, 08 Mar 2019 16:49:40 -0500</pubDate>
    <itunes:duration>840</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly Intelligence Summary: Ep 8</itunes:title>
    <title>Weekly Intelligence Summary: Ep 8</title>
    <itunes:summary><![CDATA[This week Rose and Phil join Harrison to discuss a three-stage cryptocurrency mining attack using Mimikatz and Radmin in tandem. The team also discusses the Cr1ptTor ransomware, an unknown North Korean threat actor targeting US universities, and MarioNet. Some of the team is heading to RSA Conference next week so make sure to stop by Booth 4421 in the North Hall to say hello. Get the Intellgence Summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-su...]]></itunes:summary>
    <description><![CDATA[This week Rose and Phil join Harrison to discuss a three-stage cryptocurrency mining attack using Mimikatz and Radmin in tandem. The team also discusses the Cr1ptTor ransomware, an unknown North Korean threat actor targeting US universities, and MarioNet. Some of the team is heading to RSA Conference next week so make sure to stop by Booth 4421 in the North Hall to say hello. Get the Intellgence Summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-22-feb-01-mar-2019.]]></description>
    <content:encoded><![CDATA[This week Rose and Phil join Harrison to discuss a three-stage cryptocurrency mining attack using Mimikatz and Radmin in tandem. The team also discusses the Cr1ptTor ransomware, an unknown North Korean threat actor targeting US universities, and MarioNet. Some of the team is heading to RSA Conference next week so make sure to stop by Booth 4421 in the North Hall to say hello. Get the Intellgence Summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-22-feb-01-mar-2019.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461298-weekly-intelligence-summary-ep-8.mp3" length="12414681" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ywqp41nxlbadnaqsmud7505ennmm?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/583462671</guid>
    <pubDate>Fri, 01 Mar 2019 14:02:58 -0500</pubDate>
    <itunes:duration>1032</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly Intelligence Summary: Ep 7</itunes:title>
    <title>Weekly Intelligence Summary: Ep 7</title>
    <itunes:summary><![CDATA[This week, Phil and Alex join Harrison to discuss a new malware delivery technique using the Outlook preview panel. Also, threat actor Gnosticplayers was offering large data sets for sale on Dream Market, the Blind Eagle APT group swooped into the news, and Gandcrab is back trying to pinch its victims in new ways. Finally, the guys try to find a new nickname for Alex. Full Intelligence Summary here: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-1...]]></itunes:summary>
    <description><![CDATA[This week, Phil and Alex join Harrison to discuss a new malware delivery technique using the Outlook preview panel. Also, threat actor Gnosticplayers was offering large data sets for sale on Dream Market, the Blind Eagle APT group swooped into the news, and Gandcrab is back trying to pinch its victims in new ways. Finally, the guys try to find a new nickname for Alex. Full Intelligence Summary here: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-14-feb-21-feb-2019]]></description>
    <content:encoded><![CDATA[This week, Phil and Alex join Harrison to discuss a new malware delivery technique using the Outlook preview panel. Also, threat actor Gnosticplayers was offering large data sets for sale on Dream Market, the Blind Eagle APT group swooped into the news, and Gandcrab is back trying to pinch its victims in new ways. Finally, the guys try to find a new nickname for Alex. Full Intelligence Summary here: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-14-feb-21-feb-2019]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461299-weekly-intelligence-summary-ep-7.mp3" length="10827899" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/7gczd58uzioxktjbw56xhkivf86e?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/579726567</guid>
    <pubDate>Fri, 22 Feb 2019 16:26:37 -0500</pubDate>
    <itunes:duration>900</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 58: A Tale of Epic Extortions</itunes:title>
    <title>Episode 58: A Tale of Epic Extortions</title>
    <itunes:summary><![CDATA[The Photon Research Team’s Rafael Amado, Richard Gold and Harrison Van Riper get together to discuss Digital Shadows’ latest research report, A Tale of Epic Extortions: How Cybercriminals Monetize Our Online Exposure. Whereas many of the cyber security issues covered by researchers may seem obscure and irrelevant to the majority of businesses and individuals out there, extortion is a topic with a real human impact, and one that can have physical, psychological and financial consequences. The ...]]></itunes:summary>
    <description><![CDATA[The Photon Research Team’s Rafael Amado, Richard Gold and Harrison Van Riper get together to discuss Digital Shadows’ latest research report, A Tale of Epic Extortions: How Cybercriminals Monetize Our Online Exposure. Whereas many of the cyber security issues covered by researchers may seem obscure and irrelevant to the majority of businesses and individuals out there, extortion is a topic with a real human impact, and one that can have physical, psychological and financial consequences. The team look at how extortionists are diversifying their methods, emboldened by the credentials, sensitive documents and technical vulnerabilities that we leave exposed online. Download the latest report at https://info.digitalshadows.com/ExtortionResearchReport-Podcast.html, and listen to the podcast to learn how to properly manage your online exposure and reduce extortion risks.]]></description>
    <content:encoded><![CDATA[The Photon Research Team’s Rafael Amado, Richard Gold and Harrison Van Riper get together to discuss Digital Shadows’ latest research report, A Tale of Epic Extortions: How Cybercriminals Monetize Our Online Exposure. Whereas many of the cyber security issues covered by researchers may seem obscure and irrelevant to the majority of businesses and individuals out there, extortion is a topic with a real human impact, and one that can have physical, psychological and financial consequences. The team look at how extortionists are diversifying their methods, emboldened by the credentials, sensitive documents and technical vulnerabilities that we leave exposed online. Download the latest report at https://info.digitalshadows.com/ExtortionResearchReport-Podcast.html, and listen to the podcast to learn how to properly manage your online exposure and reduce extortion risks.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461300-episode-58-a-tale-of-epic-extortions.mp3" length="25204867" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/c84o2jybscuvf1sy6yg17m9t5hnv?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/579114225</guid>
    <pubDate>Thu, 21 Feb 2019 14:31:41 -0500</pubDate>
    <itunes:duration>2098</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly Intelligence Summary: Ep 6</itunes:title>
    <title>Weekly Intelligence Summary: Ep 6</title>
    <itunes:summary><![CDATA[Alex and Jamie matched with Harrison in this Valentine’s week episode of ShadowTalk. We discuss why four different APT groups were observed using the same tooling, vulnerabilities in Apple’s iOS, and what everyone did for Valentine’s Day. Also, we have launched the Photon Research Team at Digital Shadows! Visit our announcement blog to learn more (https://www.digitalshadows.com/blog-and-research/photon-research-team-shines-light-on-digital-risks/) and follow the team on Twitter @photon_resear...]]></itunes:summary>
    <description><![CDATA[Alex and Jamie matched with Harrison in this Valentine’s week episode of ShadowTalk. We discuss why four different APT groups were observed using the same tooling, vulnerabilities in Apple’s iOS, and what everyone did for Valentine’s Day. Also, we have launched the Photon Research Team at Digital Shadows! Visit our announcement blog to learn more (https://www.digitalshadows.com/blog-and-research/photon-research-team-shines-light-on-digital-risks/) and follow the team on Twitter @photon_research!Full intelligence summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-07-feb-14-feb-2019]]></description>
    <content:encoded><![CDATA[Alex and Jamie matched with Harrison in this Valentine’s week episode of ShadowTalk. We discuss why four different APT groups were observed using the same tooling, vulnerabilities in Apple’s iOS, and what everyone did for Valentine’s Day. Also, we have launched the Photon Research Team at Digital Shadows! Visit our announcement blog to learn more (https://www.digitalshadows.com/blog-and-research/photon-research-team-shines-light-on-digital-risks/) and follow the team on Twitter @photon_research!Full intelligence summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-07-feb-14-feb-2019]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461301-weekly-intelligence-summary-ep-6.mp3" length="10637936" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/f1x7jafk83xb5tvdemw2b05lwz3n?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/576039216</guid>
    <pubDate>Fri, 15 Feb 2019 16:00:18 -0500</pubDate>
    <itunes:duration>884</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly Intelligence Summary: Ep 5</itunes:title>
    <title>Weekly Intelligence Summary: Ep 5</title>
    <itunes:summary><![CDATA[Alex and Jamie join Harrison to discuss how the United Arab Emirates (UAE) intelligence services compromised iPhones through the “Karma” malware. They also look at a spam campaign targeting American users, distributing the “Trickbot” banking trojan; Vietnamese threat group “OceanLotus” deploying a new custom downloader; and a distributed denial of service (DDoS) campaign displaying record-breaking power by combining techniques.Read the full intelligence summary here: https://resources.digital...]]></itunes:summary>
    <description><![CDATA[Alex and Jamie join Harrison to discuss how the United Arab Emirates (UAE) intelligence services compromised iPhones through the “Karma” malware. They also look at a spam campaign targeting American users, distributing the “Trickbot” banking trojan; Vietnamese threat group “OceanLotus” deploying a new custom downloader; and a distributed denial of service (DDoS) campaign displaying record-breaking power by combining techniques.Read the full intelligence summary here: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-31-jan-07-feb-2019]]></description>
    <content:encoded><![CDATA[Alex and Jamie join Harrison to discuss how the United Arab Emirates (UAE) intelligence services compromised iPhones through the “Karma” malware. They also look at a spam campaign targeting American users, distributing the “Trickbot” banking trojan; Vietnamese threat group “OceanLotus” deploying a new custom downloader; and a distributed denial of service (DDoS) campaign displaying record-breaking power by combining techniques.Read the full intelligence summary here: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-31-jan-07-feb-2019]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461302-weekly-intelligence-summary-ep-5.mp3" length="8519824" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5pof83ghjvl7v9kq3ij2w3i78yt3?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/572320509</guid>
    <pubDate>Fri, 08 Feb 2019 15:51:14 -0500</pubDate>
    <itunes:duration>708</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CISO Spotlight: Security Goals and Objectives for 2019</itunes:title>
    <title>CISO Spotlight: Security Goals and Objectives for 2019</title>
    <itunes:summary><![CDATA[In this episode of ShadowTalk: CISO Spotlight, Digital Shadows’ Chief Information Security Officer, Rick Holland, joins Rafael Amado to discuss his security goals and wish list for 2019. We cover: how CISO’s typically plan and spend their security budgets; why auditing and maximizing your existing capabilities is often better than splurging on new technology; and how to best invest and empower your most valuable resource, your workforce. Of course, with Rick on the podcast, there’s the custom...]]></itunes:summary>
    <description><![CDATA[In this episode of ShadowTalk: CISO Spotlight, Digital Shadows’ Chief Information Security Officer, Rick Holland, joins Rafael Amado to discuss his security goals and wish list for 2019. We cover: how CISO’s typically plan and spend their security budgets; why auditing and maximizing your existing capabilities is often better than splurging on new technology; and how to best invest and empower your most valuable resource, your workforce. Of course, with Rick on the podcast, there’s the customary smoked meat and barbeque discussion as well. Spoiler alert: Rick’s barbeque goal for 2019 is to cook more vegetables.]]></description>
    <content:encoded><![CDATA[In this episode of ShadowTalk: CISO Spotlight, Digital Shadows’ Chief Information Security Officer, Rick Holland, joins Rafael Amado to discuss his security goals and wish list for 2019. We cover: how CISO’s typically plan and spend their security budgets; why auditing and maximizing your existing capabilities is often better than splurging on new technology; and how to best invest and empower your most valuable resource, your workforce. Of course, with Rick on the podcast, there’s the customary smoked meat and barbeque discussion as well. Spoiler alert: Rick’s barbeque goal for 2019 is to cook more vegetables.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461303-ciso-spotlight-security-goals-and-objectives-for-2019.mp3" length="21668966" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/bq5suknpg3o4ms8mai3d0qnltwnx?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/571488966</guid>
    <pubDate>Thu, 07 Feb 2019 03:14:02 -0500</pubDate>
    <itunes:duration>1804</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly Intelligence Summary: Ep 4</itunes:title>
    <title>Weekly Intelligence Summary: Ep 4</title>
    <itunes:summary><![CDATA[This week, Alex Guirakhoo and Jamie Collier join Harrison to discuss APT39, a new Iran-linked espionage group, as well as other highlights from this week involving updated information about exploiting an authentication error at GoDaddy, malicious uses of the Google Cloud platform, and some excellent steganography being used to target Apple users. The guys also chat about their pups, and imagine a new battle royale game “BorkNite”.Full weekly intelligence summary: https://resources.digitalshad...]]></itunes:summary>
    <description><![CDATA[This week, Alex Guirakhoo and Jamie Collier join Harrison to discuss APT39, a new Iran-linked espionage group, as well as other highlights from this week involving updated information about exploiting an authentication error at GoDaddy, malicious uses of the Google Cloud platform, and some excellent steganography being used to target Apple users. The guys also chat about their pups, and imagine a new battle royale game “BorkNite”.Full weekly intelligence summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-24-jan-31-jan-2019‘An arm of the Chinese state’: What’s behind the Huawei indictments: https://www.nbcnews.com/tech/security/arm-chinese-state-what-s-behind-huawei-indictments-n963776]]></description>
    <content:encoded><![CDATA[This week, Alex Guirakhoo and Jamie Collier join Harrison to discuss APT39, a new Iran-linked espionage group, as well as other highlights from this week involving updated information about exploiting an authentication error at GoDaddy, malicious uses of the Google Cloud platform, and some excellent steganography being used to target Apple users. The guys also chat about their pups, and imagine a new battle royale game “BorkNite”.Full weekly intelligence summary: https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-24-jan-31-jan-2019‘An arm of the Chinese state’: What’s behind the Huawei indictments: https://www.nbcnews.com/tech/security/arm-chinese-state-what-s-behind-huawei-indictments-n963776]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461304-weekly-intelligence-summary-ep-4.mp3" length="8519824" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/fokkpsv0pch8xurecifel0ocp5is?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/568564188</guid>
    <pubDate>Fri, 01 Feb 2019 12:36:44 -0500</pubDate>
    <itunes:duration>708</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly Intelligence Summary: Ep 3</itunes:title>
    <title>Weekly Intelligence Summary: Ep 3</title>
    <itunes:summary><![CDATA[This week Rose, Jamie, and Alex talk with Harrison on a huge data dump called "Collection #1", containing over 770 million email addresses and passwords. The team also looks at other stories including DarkHydrus observed using a new method to communicate with command and control servers, technology and social networking companies continuing to remove accounts associated with influence campaigns, and threat actors observed uninstalling cloud protection services in order to distribute cryptocur...]]></itunes:summary>
    <description><![CDATA[This week Rose, Jamie, and Alex talk with Harrison on a huge data dump called &quot;Collection #1&quot;, containing over 770 million email addresses and passwords. The team also looks at other stories including DarkHydrus observed using a new method to communicate with command and control servers, technology and social networking companies continuing to remove accounts associated with influence campaigns, and threat actors observed uninstalling cloud protection services in order to distribute cryptocurrency mining malware. Read the full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-17-jan-24-jan-2019.]]></description>
    <content:encoded><![CDATA[This week Rose, Jamie, and Alex talk with Harrison on a huge data dump called &quot;Collection #1&quot;, containing over 770 million email addresses and passwords. The team also looks at other stories including DarkHydrus observed using a new method to communicate with command and control servers, technology and social networking companies continuing to remove accounts associated with influence campaigns, and threat actors observed uninstalling cloud protection services in order to distribute cryptocurrency mining malware. Read the full intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-17-jan-24-jan-2019.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461305-weekly-intelligence-summary-ep-3.mp3" length="12073939" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/emhfxs1upo991ga4uxdfby7vsdp5?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/564590973</guid>
    <pubDate>Fri, 25 Jan 2019 15:06:45 -0500</pubDate>
    <itunes:duration>1004</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly Intelligence Summary: Ep 2</itunes:title>
    <title>Weekly Intelligence Summary: Ep 2</title>
    <itunes:summary><![CDATA[This week Alex and Philip join Harrison to discuss two recent, unrelated, financially motivated cyber attack campaigns involving the use of culturally specific social engineering lures. The team also looks at three new phishing campaigns attributed to the threat group TA505 and decide(in a perfect world) which 1 cyber threat they would choose to rid forever.Download this week's Intelligence Summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary...]]></itunes:summary>
    <description><![CDATA[This week Alex and Philip join Harrison to discuss two recent, unrelated, financially motivated cyber attack campaigns involving the use of culturally specific social engineering lures. The team also looks at three new phishing campaigns attributed to the threat group TA505 and decide(in a perfect world) which 1 cyber threat they would choose to rid forever.Download this week&apos;s Intelligence Summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-10-jan-17-jan-2019.]]></description>
    <content:encoded><![CDATA[This week Alex and Philip join Harrison to discuss two recent, unrelated, financially motivated cyber attack campaigns involving the use of culturally specific social engineering lures. The team also looks at three new phishing campaigns attributed to the threat group TA505 and decide(in a perfect world) which 1 cyber threat they would choose to rid forever.Download this week&apos;s Intelligence Summary at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-10-jan-17-jan-2019.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461306-weekly-intelligence-summary-ep-2.mp3" length="13032529" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/dd3nr2b9gv7uqt9lau1a4zo7oudm?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/561147504</guid>
    <pubDate>Fri, 18 Jan 2019 17:04:47 -0500</pubDate>
    <itunes:duration>1084</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 57: Singapore Healthcare Breach</itunes:title>
    <title>Episode 57: Singapore Healthcare Breach</title>
    <itunes:summary><![CDATA[For this week’s ShadowTalk deep dive, we called in Doctor Richard Gold to discuss the major healthcare breach affecting SingHealth, Singapore’s largest group of healthcare organizations. Richard and Rafael Amado discuss how threat actors might use the 1.5million patient records that were stolen, how the attack occurred and where the incident response process failed. To view the report in full, visit: https://www.mci.gov.sg/coireport]]></itunes:summary>
    <description><![CDATA[For this week’s ShadowTalk deep dive, we called in Doctor Richard Gold to discuss the major healthcare breach affecting SingHealth, Singapore’s largest group of healthcare organizations. Richard and Rafael Amado discuss how threat actors might use the 1.5million patient records that were stolen, how the attack occurred and where the incident response process failed. To view the report in full, visit: https://www.mci.gov.sg/coireport]]></description>
    <content:encoded><![CDATA[For this week’s ShadowTalk deep dive, we called in Doctor Richard Gold to discuss the major healthcare breach affecting SingHealth, Singapore’s largest group of healthcare organizations. Richard and Rafael Amado discuss how threat actors might use the 1.5million patient records that were stolen, how the attack occurred and where the incident response process failed. To view the report in full, visit: https://www.mci.gov.sg/coireport]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461307-episode-57-singapore-healthcare-breach.mp3" length="17801351" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/gom4vr4pxgwbmll9t6cwr20y0c6j?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/559701336</guid>
    <pubDate>Tue, 15 Jan 2019 20:39:37 -0500</pubDate>
    <itunes:duration>1481</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly Intelligence Summary: Ep 1</itunes:title>
    <title>Weekly Intelligence Summary: Ep 1</title>
    <itunes:summary><![CDATA[Harrison Van Riper hosts this week’s Intelligence Summary with guests Rose Bernard (Strategic Intelligence Manager) and Alex Guirakhoo (Strategic Intelligence Analyst). Our main story involves the leak of personal information from several German political parties. We also discuss the other big threat intelligence stories from the week and find out what everyone would name their APT group. Subscribe to ShadowTalk on iTunes and follow us @digitalshadows, use #ShadowTalk to submit a question for...]]></itunes:summary>
    <description><![CDATA[Harrison Van Riper hosts this week’s Intelligence Summary with guests Rose Bernard (Strategic Intelligence Manager) and Alex Guirakhoo (Strategic Intelligence Analyst). Our main story involves the leak of personal information from several German political parties. We also discuss the other big threat intelligence stories from the week and find out what everyone would name their APT group. Subscribe to ShadowTalk on iTunes and follow us @digitalshadows, use #ShadowTalk to submit a question for next week!The full intelligence summary can be downloaded at https://resources.digitalshadows.com/weekly-intelligence-summary.]]></description>
    <content:encoded><![CDATA[Harrison Van Riper hosts this week’s Intelligence Summary with guests Rose Bernard (Strategic Intelligence Manager) and Alex Guirakhoo (Strategic Intelligence Analyst). Our main story involves the leak of personal information from several German political parties. We also discuss the other big threat intelligence stories from the week and find out what everyone would name their APT group. Subscribe to ShadowTalk on iTunes and follow us @digitalshadows, use #ShadowTalk to submit a question for next week!The full intelligence summary can be downloaded at https://resources.digitalshadows.com/weekly-intelligence-summary.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461308-weekly-intelligence-summary-ep-1.mp3" length="11418161" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/xqwloid1njn6afw4cpvsc1me7t72?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/557551821</guid>
    <pubDate>Fri, 11 Jan 2019 13:48:28 -0500</pubDate>
    <itunes:duration>949</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weekly Intelligence Summary: Ep 0</itunes:title>
    <title>Weekly Intelligence Summary: Ep 0</title>
    <itunes:summary><![CDATA[Welcome to ShadowTalk's new track on our Weekly Intelligence Summary. Host Harrison Van Riper invites Digital Shadows' analysts to discuss the week's top threat intelligence news. To download the full Weekly Intelligence Summary, visit https://resources.digitalshadows.com/weekly-intelligence-summary.]]></itunes:summary>
    <description><![CDATA[Welcome to ShadowTalk&apos;s new track on our Weekly Intelligence Summary. Host Harrison Van Riper invites Digital Shadows&apos; analysts to discuss the week&apos;s top threat intelligence news. To download the full Weekly Intelligence Summary, visit https://resources.digitalshadows.com/weekly-intelligence-summary.]]></description>
    <content:encoded><![CDATA[Welcome to ShadowTalk&apos;s new track on our Weekly Intelligence Summary. Host Harrison Van Riper invites Digital Shadows&apos; analysts to discuss the week&apos;s top threat intelligence news. To download the full Weekly Intelligence Summary, visit https://resources.digitalshadows.com/weekly-intelligence-summary.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461309-weekly-intelligence-summary-ep-0.mp3" length="1973329" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/zf288ixb38wd0su1xfpt4cved63l?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/557094264</guid>
    <pubDate>Thu, 10 Jan 2019 18:03:35 -0500</pubDate>
    <itunes:duration>162</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 56: Positive cyber security developments for 2019</itunes:title>
    <title>Episode 56: Positive cyber security developments for 2019</title>
    <itunes:summary><![CDATA[Rafael Amado and Richard Gold talk cybersecurity end of year predictions, but with a twist. Rather than focus on the threats and worrying trends on the horizon, the team instead concentrate on the positive developments that we can all look forward to in 2019. Richard and Rafael discuss open source tools that can help all of us become more secure, improvements to browser security, and long overdue changes in security awareness, education and diversity that should make 2019 an altogether better...]]></itunes:summary>
    <description><![CDATA[Rafael Amado and Richard Gold talk cybersecurity end of year predictions, but with a twist. Rather than focus on the threats and worrying trends on the horizon, the team instead concentrate on the positive developments that we can all look forward to in 2019. Richard and Rafael discuss open source tools that can help all of us become more secure, improvements to browser security, and long overdue changes in security awareness, education and diversity that should make 2019 an altogether better year for the information security community. You can see Richard’s full list of 10 predictions on https://twitter.com/drshellface/status/1072803919020154880?s=21]]></description>
    <content:encoded><![CDATA[Rafael Amado and Richard Gold talk cybersecurity end of year predictions, but with a twist. Rather than focus on the threats and worrying trends on the horizon, the team instead concentrate on the positive developments that we can all look forward to in 2019. Richard and Rafael discuss open source tools that can help all of us become more secure, improvements to browser security, and long overdue changes in security awareness, education and diversity that should make 2019 an altogether better year for the information security community. You can see Richard’s full list of 10 predictions on https://twitter.com/drshellface/status/1072803919020154880?s=21]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461310-episode-56-positive-cyber-security-developments-for-2019.mp3" length="10836410" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/6xwrq4k8nix13089yq0k0p91o92i?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/547912998</guid>
    <pubDate>Thu, 20 Dec 2018 15:49:31 -0500</pubDate>
    <itunes:duration>901</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 55: Tackling Phishing</itunes:title>
    <title>Episode 55: Tackling Phishing</title>
    <itunes:summary><![CDATA[Simon Hall and Richard Gold join Rafael Amado to wade in on the topic of phishing. By looking at details revealed in law enforcement indictments against nation state and organized criminal groups, as well as the tips and tools being shared by actors on cybercriminal forums and messaging applications, the team discuss how organizations can prioritize the right controls and training policies to best protect themselves in the coming year. For more on this topic, read our recent research blog, Ta...]]></itunes:summary>
    <description><![CDATA[Simon Hall and Richard Gold join Rafael Amado to wade in on the topic of phishing. By looking at details revealed in law enforcement indictments against nation state and organized criminal groups, as well as the tips and tools being shared by actors on cybercriminal forums and messaging applications, the team discuss how organizations can prioritize the right controls and training policies to best protect themselves in the coming year. For more on this topic, read our recent research blog, Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It, available on digitalshadows.com/blog-and-research/tackling-phishing-the-most-popular-phishing-techniques-and-what-you-can-do-about-it/]]></description>
    <content:encoded><![CDATA[Simon Hall and Richard Gold join Rafael Amado to wade in on the topic of phishing. By looking at details revealed in law enforcement indictments against nation state and organized criminal groups, as well as the tips and tools being shared by actors on cybercriminal forums and messaging applications, the team discuss how organizations can prioritize the right controls and training policies to best protect themselves in the coming year. For more on this topic, read our recent research blog, Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It, available on digitalshadows.com/blog-and-research/tackling-phishing-the-most-popular-phishing-techniques-and-what-you-can-do-about-it/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461311-episode-55-tackling-phishing.mp3" length="19895654" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/en4nuuunie2j9zmrbm9v7xnnqy1l?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/544994067</guid>
    <pubDate>Fri, 14 Dec 2018 13:51:24 -0500</pubDate>
    <itunes:duration>1656</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 54: Marriott Breach And 2019 Trends</itunes:title>
    <title>Episode 54: Marriott Breach And 2019 Trends</title>
    <itunes:summary><![CDATA[Rick Holland and Harrison Van Riper join Michael Marriott to discuss the implications of the Marriott data breach, as well as a look forward to trends we might see in 2019. Specifically, we dig into ransomware and discuss what you should be considering in 2019. To read more about these trends (and more) read Harrison’s blog (https://www.digitalshadows.com/blog-and-research/2019-cyber-security-forecasts-six-things-on-the-horizon/). To register for our upcoming webinar with the FBI, https://inf...]]></itunes:summary>
    <description><![CDATA[Rick Holland and Harrison Van Riper join Michael Marriott to discuss the implications of the Marriott data breach, as well as a look forward to trends we might see in 2019. Specifically, we dig into ransomware and discuss what you should be considering in 2019. To read more about these trends (and more) read Harrison’s blog (https://www.digitalshadows.com/blog-and-research/2019-cyber-security-forecasts-six-things-on-the-horizon/). To register for our upcoming webinar with the FBI, https://info.digitalshadows.com/LiveWebinar-CyberThreatstoWatchin2019-Registration.html?Source=podcast.]]></description>
    <content:encoded><![CDATA[Rick Holland and Harrison Van Riper join Michael Marriott to discuss the implications of the Marriott data breach, as well as a look forward to trends we might see in 2019. Specifically, we dig into ransomware and discuss what you should be considering in 2019. To read more about these trends (and more) read Harrison’s blog (https://www.digitalshadows.com/blog-and-research/2019-cyber-security-forecasts-six-things-on-the-horizon/). To register for our upcoming webinar with the FBI, https://info.digitalshadows.com/LiveWebinar-CyberThreatstoWatchin2019-Registration.html?Source=podcast.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461312-episode-54-marriott-breach-and-2019-trends.mp3" length="13821375" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/1sddlb70hok7rl0ccc5t50j7csfh?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/541302351</guid>
    <pubDate>Fri, 07 Dec 2018 14:53:07 -0500</pubDate>
    <itunes:duration>1147</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 53: Threat Actors Use of Cobalt Strike &amp; How Attacker Actions Can Inform Defenses</itunes:title>
    <title>Episode 53: Threat Actors Use of Cobalt Strike &amp; How Attacker Actions Can Inform Defenses</title>
    <itunes:summary><![CDATA[The dynamic duo of Dr Gold and Simon Hall join Michael Marriott to discuss our recent findings on threat actors using cracked versions of Cobalt Strike conduct attacks, and how defenders can use this to inform their defense. Read the blog to learn more: https://www.digitalshadows.com/blog-and-research/threat-actors-use-of-cobalt-strike-why-defense-is-offenses-child/. Building on this theme, in part two, Richard Gold outlines the benefits of mapping the Mitre ATT&amp;CK framework to the ASD Es...]]></itunes:summary>
    <description><![CDATA[The dynamic duo of Dr Gold and Simon Hall join Michael Marriott to discuss our recent findings on threat actors using cracked versions of Cobalt Strike conduct attacks, and how defenders can use this to inform their defense. Read the blog to learn more: https://www.digitalshadows.com/blog-and-research/threat-actors-use-of-cobalt-strike-why-defense-is-offenses-child/. Building on this theme, in part two, Richard Gold outlines the benefits of mapping the Mitre ATT&amp;CK framework to the ASD Essential 8. You can read Richard’s blog here: https://www.digitalshadows.com/blog-and-research/mapping-the-asd-essential-8-to-the-mitre-attck-framework/.]]></description>
    <content:encoded><![CDATA[The dynamic duo of Dr Gold and Simon Hall join Michael Marriott to discuss our recent findings on threat actors using cracked versions of Cobalt Strike conduct attacks, and how defenders can use this to inform their defense. Read the blog to learn more: https://www.digitalshadows.com/blog-and-research/threat-actors-use-of-cobalt-strike-why-defense-is-offenses-child/. Building on this theme, in part two, Richard Gold outlines the benefits of mapping the Mitre ATT&amp;CK framework to the ASD Essential 8. You can read Richard’s blog here: https://www.digitalshadows.com/blog-and-research/mapping-the-asd-essential-8-to-the-mitre-attck-framework/.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461313-episode-53-threat-actors-use-of-cobalt-strike-how-attacker-actions-can-inform-defenses.mp3" length="16404665" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/69tc642wiytqyr5bfs1io0v74fzg?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/537833856</guid>
    <pubDate>Fri, 30 Nov 2018 11:48:03 -0500</pubDate>
    <itunes:duration>1365</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 52: Black Friday and Cybercrime</itunes:title>
    <title>Episode 52: Black Friday and Cybercrime</title>
    <itunes:summary><![CDATA[For this special mid-week edition of ShadowTalk, Harrison Van Riper, Jamie Collier, and Rafael Amado focus on cyber security threats over the Black Friday weekend and holiday season. Despite increased sales for retailers and bargain opportunities for consumers, Black Friday has had the unintended consequence of emboldening and enabling profit-seeking cybercriminals. The team discuss continuing activity by the Magecart group, as well as the ways in which cybercriminals are gearing up for the h...]]></itunes:summary>
    <description><![CDATA[For this special mid-week edition of ShadowTalk, Harrison Van Riper, Jamie Collier, and Rafael Amado focus on cyber security threats over the Black Friday weekend and holiday season. Despite increased sales for retailers and bargain opportunities for consumers, Black Friday has had the unintended consequence of emboldening and enabling profit-seeking cybercriminals. The team discuss continuing activity by the Magecart group, as well as the ways in which cybercriminals are gearing up for the holidays from our investigations of online forums and messaging applications. For more, check out our Black Friday blog at: https://www.digitalshadows.com/blog-and-research/black-friday-and-cybercrime-retails-frankenstein-monster/]]></description>
    <content:encoded><![CDATA[For this special mid-week edition of ShadowTalk, Harrison Van Riper, Jamie Collier, and Rafael Amado focus on cyber security threats over the Black Friday weekend and holiday season. Despite increased sales for retailers and bargain opportunities for consumers, Black Friday has had the unintended consequence of emboldening and enabling profit-seeking cybercriminals. The team discuss continuing activity by the Magecart group, as well as the ways in which cybercriminals are gearing up for the holidays from our investigations of online forums and messaging applications. For more, check out our Black Friday blog at: https://www.digitalshadows.com/blog-and-research/black-friday-and-cybercrime-retails-frankenstein-monster/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461314-episode-52-black-friday-and-cybercrime.mp3" length="15310243" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/o9316d5k9xm8ccrcaakt8cawc9ex?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/533614743</guid>
    <pubDate>Wed, 21 Nov 2018 17:23:44 -0500</pubDate>
    <itunes:duration>1274</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 51: Phineas Fisher and the Hacking Team Investigation</itunes:title>
    <title>Episode 51: Phineas Fisher and the Hacking Team Investigation</title>
    <itunes:summary><![CDATA[Some called him a hero. Some called him the most dangerous man to the defense industry. In today’s ShadowTalk, Dr. Richard Gold and Harrison Van Riper join Rafael Amado to discuss the vigilante hacker known as Phineas Fisher. Leaked court documents surfaced this week, detailing how Italian authorities tried and ultimately failed to identify and convict Phineas Fisher for the infamous breach against the Italian surveillance and technology company, Hacking Team. The team dive into the history o...]]></itunes:summary>
    <description><![CDATA[Some called him a hero. Some called him the most dangerous man to the defense industry. In today’s ShadowTalk, Dr. Richard Gold and Harrison Van Riper join Rafael Amado to discuss the vigilante hacker known as Phineas Fisher. Leaked court documents surfaced this week, detailing how Italian authorities tried and ultimately failed to identify and convict Phineas Fisher for the infamous breach against the Italian surveillance and technology company, Hacking Team. The team dive into the history of Phineas Fisher, the techniques used to break into the Hacking Team network, and the OPSEC practices that allowed Phineas Fisher to remain at large.]]></description>
    <content:encoded><![CDATA[Some called him a hero. Some called him the most dangerous man to the defense industry. In today’s ShadowTalk, Dr. Richard Gold and Harrison Van Riper join Rafael Amado to discuss the vigilante hacker known as Phineas Fisher. Leaked court documents surfaced this week, detailing how Italian authorities tried and ultimately failed to identify and convict Phineas Fisher for the infamous breach against the Italian surveillance and technology company, Hacking Team. The team dive into the history of Phineas Fisher, the techniques used to break into the Hacking Team network, and the OPSEC practices that allowed Phineas Fisher to remain at large.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461315-episode-51-phineas-fisher-and-the-hacking-team-investigation.mp3" length="13361135" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/swer5awroiwtbkiqq9z2ybx3vnvw?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/530944107</guid>
    <pubDate>Fri, 16 Nov 2018 13:27:37 -0500</pubDate>
    <itunes:duration>1111</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 50: CISCO ASA 0-day and VirtualBox Vulnerability</itunes:title>
    <title>Episode 50: CISCO ASA 0-day and VirtualBox Vulnerability</title>
    <itunes:summary><![CDATA[Michael Marriott flies in from San Francisco to cover the big vulnerability and exploit stories of the week. The team discuss the Cisco denial- of-service vulnerability affecting its Adaptive Security Appliance (ASA), as well as a vulnerability in Oracle’s VirtualBox technology posted to GitHub. Dr. Richard Gold, Rafael Amado and Michael debate the benefits and drawbacks of bug bounty programs, how you should consider operational value when assessing vulnerabilities, and the U.S. Cyber Comman...]]></itunes:summary>
    <description><![CDATA[Michael Marriott flies in from San Francisco to cover the big vulnerability and exploit stories of the week. The team discuss the Cisco denial- of-service vulnerability affecting its Adaptive Security Appliance (ASA), as well as a vulnerability in Oracle’s VirtualBox technology posted to GitHub. Dr. Richard Gold, Rafael Amado and Michael debate the benefits and drawbacks of bug bounty programs, how you should consider operational value when assessing vulnerabilities, and the U.S. Cyber Command’s publication of malware samples to VirusTotal.]]></description>
    <content:encoded><![CDATA[Michael Marriott flies in from San Francisco to cover the big vulnerability and exploit stories of the week. The team discuss the Cisco denial- of-service vulnerability affecting its Adaptive Security Appliance (ASA), as well as a vulnerability in Oracle’s VirtualBox technology posted to GitHub. Dr. Richard Gold, Rafael Amado and Michael debate the benefits and drawbacks of bug bounty programs, how you should consider operational value when assessing vulnerabilities, and the U.S. Cyber Command’s publication of malware samples to VirusTotal.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461316-episode-50-cisco-asa-0-day-and-virtualbox-vulnerability.mp3" length="13950134" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/wu0fh6oavosl8i2j794hpoazu9eu?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/527271795</guid>
    <pubDate>Fri, 09 Nov 2018 13:22:09 -0500</pubDate>
    <itunes:duration>1160</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 49: 81,000 Hacked Facebook Accounts For Sale</itunes:title>
    <title>Episode 49: 81,000 Hacked Facebook Accounts For Sale</title>
    <itunes:summary><![CDATA[In this bonus edition of ShadowTalk, Dr Richard Gold and Rafael Amado discuss the recent BBC Russian Service investigation into Facebook accounts being sold online. As reported on Friday, at least 81,000 accounts with private messages were being advertised online. Digital Shadows assisted the BBC with its investigation. Richard and Rafael outline what we know so far, as well as answering some of the key questions raised by this story. For more, see our recent blog available at https://www.dig...]]></itunes:summary>
    <description><![CDATA[In this bonus edition of ShadowTalk, Dr Richard Gold and Rafael Amado discuss the recent BBC Russian Service investigation into Facebook accounts being sold online. As reported on Friday, at least 81,000 accounts with private messages were being advertised online. Digital Shadows assisted the BBC with its investigation. Richard and Rafael outline what we know so far, as well as answering some of the key questions raised by this story. For more, see our recent blog available at https://www.digitalshadows.com/blog-and-research/81000-hacked-facebook-accounts-for-sale-5-things-to-know/.]]></description>
    <content:encoded><![CDATA[In this bonus edition of ShadowTalk, Dr Richard Gold and Rafael Amado discuss the recent BBC Russian Service investigation into Facebook accounts being sold online. As reported on Friday, at least 81,000 accounts with private messages were being advertised online. Digital Shadows assisted the BBC with its investigation. Richard and Rafael outline what we know so far, as well as answering some of the key questions raised by this story. For more, see our recent blog available at https://www.digitalshadows.com/blog-and-research/81000-hacked-facebook-accounts-for-sale-5-things-to-know/.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461317-episode-49-81-000-hacked-facebook-accounts-for-sale.mp3" length="11198424" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/cs01fveqmschfctawdlzw2lky7lc?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/525161691</guid>
    <pubDate>Mon, 05 Nov 2018 11:09:02 -0500</pubDate>
    <itunes:duration>931</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 48: Tesco Bank Fraud And £16.4m FCA Fine</itunes:title>
    <title>Episode 48: Tesco Bank Fraud And £16.4m FCA Fine</title>
    <itunes:summary><![CDATA[Two years on from the Tesco Bank fraud attacks that allowed cybercriminals to check out with £2.26m (roughly $3m) in customer funds, Dr Richard Gold and Simon Hall join Rafael Amado to discuss the UK Financial Conduct Authority’s investigation report. This episode will be crucial listening for anyone involved in the financial services industry, as well as those eager to learn about incident response processes and how poor execution can have disastrous, and costly, consequences. The FCA final ...]]></itunes:summary>
    <description><![CDATA[Two years on from the Tesco Bank fraud attacks that allowed cybercriminals to check out with £2.26m (roughly $3m) in customer funds, Dr Richard Gold and Simon Hall join Rafael Amado to discuss the UK Financial Conduct Authority’s investigation report. This episode will be crucial listening for anyone involved in the financial services industry, as well as those eager to learn about incident response processes and how poor execution can have disastrous, and costly, consequences. The FCA final notice is available on: https://www.fca.org.uk/publication/final-notices/tesco-personal-finance-plc-2018.pdf]]></description>
    <content:encoded><![CDATA[Two years on from the Tesco Bank fraud attacks that allowed cybercriminals to check out with £2.26m (roughly $3m) in customer funds, Dr Richard Gold and Simon Hall join Rafael Amado to discuss the UK Financial Conduct Authority’s investigation report. This episode will be crucial listening for anyone involved in the financial services industry, as well as those eager to learn about incident response processes and how poor execution can have disastrous, and costly, consequences. The FCA final notice is available on: https://www.fca.org.uk/publication/final-notices/tesco-personal-finance-plc-2018.pdf]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461318-episode-48-tesco-bank-fraud-and-16-4m-fca-fine.mp3" length="19047490" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/cffa0s92x8v2c8763p5jhrskqxw6?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/523937985</guid>
    <pubDate>Fri, 02 Nov 2018 17:55:26 -0400</pubDate>
    <itunes:duration>1583</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 47: Ransomware Surges in October, Cathay Pacific Breach, and Triton Attributed</itunes:title>
    <title>Episode 47: Ransomware Surges in October, Cathay Pacific Breach, and Triton Attributed</title>
    <itunes:summary><![CDATA[Harrison Van Riper and Rafael Amado join Michael Marriott to discuss the latest stories from the week. This week’s podcast has a strong Guy Richie flavor, with a focus on lock, stock and ru smoking barrels. We begin by discussing October’s hot ransomware activity, including the most popular variants, common targets, and mitigation advice. Second, we discuss sliding stock value amid reports of data breaches: we dig into the Cathay Pacific and Facebook breaches. And, finally we discuss the rece...]]></itunes:summary>
    <description><![CDATA[Harrison Van Riper and Rafael Amado join Michael Marriott to discuss the latest stories from the week. This week’s podcast has a strong Guy Richie flavor, with a focus on lock, stock and ru smoking barrels. We begin by discussing October’s hot ransomware activity, including the most popular variants, common targets, and mitigation advice. Second, we discuss sliding stock value amid reports of data breaches: we dig into the Cathay Pacific and Facebook breaches. And, finally we discuss the recent attribution of Triton malware to a Russian entity and why it’s TTPs you should care about.]]></description>
    <content:encoded><![CDATA[Harrison Van Riper and Rafael Amado join Michael Marriott to discuss the latest stories from the week. This week’s podcast has a strong Guy Richie flavor, with a focus on lock, stock and ru smoking barrels. We begin by discussing October’s hot ransomware activity, including the most popular variants, common targets, and mitigation advice. Second, we discuss sliding stock value amid reports of data breaches: we dig into the Cathay Pacific and Facebook breaches. And, finally we discuss the recent attribution of Triton malware to a Russian entity and why it’s TTPs you should care about.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461319-episode-47-ransomware-surges-in-october-cathay-pacific-breach-and-triton-attributed.mp3" length="16549795" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/2hrs782zdy21pg250csfz7thlumy?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/520332090</guid>
    <pubDate>Fri, 26 Oct 2018 13:49:41 -0400</pubDate>
    <itunes:duration>1377</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 46: Supply Chain and Third-Party Risks</itunes:title>
    <title>Episode 46: Supply Chain and Third-Party Risks</title>
    <itunes:summary><![CDATA[Following on from last week’s conversation on how managed service providers can increase your attack surface, Simon Hall and Richard Gold join Rafael Amado to discuss supply chain risks. With so much to cover, the team break this topic down into hardware, software and third-party service risks, including examples such as the MeDoc-NotPetya campaign and the recent SuperMicro hardware allegations. As always, Richard and Simon cover some useful good practices for those looking to improve their r...]]></itunes:summary>
    <description><![CDATA[Following on from last week’s conversation on how managed service providers can increase your attack surface, Simon Hall and Richard Gold join Rafael Amado to discuss supply chain risks. With so much to cover, the team break this topic down into hardware, software and third-party service risks, including examples such as the MeDoc-NotPetya campaign and the recent SuperMicro hardware allegations. As always, Richard and Simon cover some useful good practices for those looking to improve their risk management processes.]]></description>
    <content:encoded><![CDATA[Following on from last week’s conversation on how managed service providers can increase your attack surface, Simon Hall and Richard Gold join Rafael Amado to discuss supply chain risks. With so much to cover, the team break this topic down into hardware, software and third-party service risks, including examples such as the MeDoc-NotPetya campaign and the recent SuperMicro hardware allegations. As always, Richard and Simon cover some useful good practices for those looking to improve their risk management processes.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461320-episode-46-supply-chain-and-third-party-risks.mp3" length="17209882" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/yxcuhc2lausz2yu9pf4gygo1r9gq?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/516772650</guid>
    <pubDate>Fri, 19 Oct 2018 12:48:25 -0400</pubDate>
    <itunes:duration>1432</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 45: FASTCash Hidden Cobra, MSP Risks, Five Eyes Tooling Report</itunes:title>
    <title>Episode 45: FASTCash Hidden Cobra, MSP Risks, Five Eyes Tooling Report</title>
    <itunes:summary><![CDATA[Digital Shadows CISO Rick Holland, Dr Richard Gold and Simon Hall join Rafael Amado to cover the Hidden Cobra FASTCash campaign alert issued by US authorities, detailing ATM cash out campaigns performed by North Korean actors. The team look over the Five Eyes joint report into publicly available hacking tools. And, finally, are companies who use MSPs at greater risk of attack? For more on the Powershell blog referenced by the Five Eyes report, visit: https://www.digitalshadows.com/blog-and-re...]]></itunes:summary>
    <description><![CDATA[Digital Shadows CISO Rick Holland, Dr Richard Gold and Simon Hall join Rafael Amado to cover the Hidden Cobra FASTCash campaign alert issued by US authorities, detailing ATM cash out campaigns performed by North Korean actors. The team look over the Five Eyes joint report into publicly available hacking tools. And, finally, are companies who use MSPs at greater risk of attack? For more on the Powershell blog referenced by the Five Eyes report, visit: https://www.digitalshadows.com/blog-and-research/powershell-security-best-practices/]]></description>
    <content:encoded><![CDATA[Digital Shadows CISO Rick Holland, Dr Richard Gold and Simon Hall join Rafael Amado to cover the Hidden Cobra FASTCash campaign alert issued by US authorities, detailing ATM cash out campaigns performed by North Korean actors. The team look over the Five Eyes joint report into publicly available hacking tools. And, finally, are companies who use MSPs at greater risk of attack? For more on the Powershell blog referenced by the Five Eyes report, visit: https://www.digitalshadows.com/blog-and-research/powershell-security-best-practices/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461321-episode-45-fastcash-hidden-cobra-msp-risks-five-eyes-tooling-report.mp3" length="16993515" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/32uifubyzlr5k7t30hh4bl50gppv?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/513564690</guid>
    <pubDate>Fri, 12 Oct 2018 21:06:47 -0400</pubDate>
    <itunes:duration>1414</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 44: Business Email Compromise</itunes:title>
    <title>Episode 44: Business Email Compromise</title>
    <itunes:summary><![CDATA[In this week’s Shadow Talk, Rafael Amado joins Michael Marriott to discuss Digital Shadows’ latest research on Business Email Compromise. We discuss how criminals are outsourcing this work, and how the exposure of 33,000 finance department credentials is increasing the ease for attackers. However, even without taking over accounts, criminals can get their hands on sensitive financial information. We dig into the 12.5 million exposed email archives that are available through misconfigured onli...]]></itunes:summary>
    <description><![CDATA[In this week’s Shadow Talk, Rafael Amado joins Michael Marriott to discuss Digital Shadows’ latest research on Business Email Compromise. We discuss how criminals are outsourcing this work, and how the exposure of 33,000 finance department credentials is increasing the ease for attackers. However, even without taking over accounts, criminals can get their hands on sensitive financial information. We dig into the 12.5 million exposed email archives that are available through misconfigured online file stores, including invoices, purchase orders, and payments. Finally, we provide advice for mitigating these risks.]]></description>
    <content:encoded><![CDATA[In this week’s Shadow Talk, Rafael Amado joins Michael Marriott to discuss Digital Shadows’ latest research on Business Email Compromise. We discuss how criminals are outsourcing this work, and how the exposure of 33,000 finance department credentials is increasing the ease for attackers. However, even without taking over accounts, criminals can get their hands on sensitive financial information. We dig into the 12.5 million exposed email archives that are available through misconfigured online file stores, including invoices, purchase orders, and payments. Finally, we provide advice for mitigating these risks.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461322-episode-44-business-email-compromise.mp3" length="18011092" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/a61tessjhmga4vjl8g0tjmr9i3gb?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/510024750</guid>
    <pubDate>Fri, 05 Oct 2018 13:04:46 -0400</pubDate>
    <itunes:duration>1499</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 43: Security Flaws Affect 50 Million Facebook Accounts and Equifax Fined £500,000</itunes:title>
    <title>Episode 43: Security Flaws Affect 50 Million Facebook Accounts and Equifax Fined £500,000</title>
    <itunes:summary><![CDATA[Rick Holland, CISO of Digital Shadows, joins Richard Gold and Michael Marriott to discuss the latest cybersecurity news. In part one, we discuss the possible implications of Facebook security flaws affecting 50 million accounts. In part two, one year after reports of the Equifax breach surface, the UK arm has been fined £500,000 by the ICO. We look at the lessons learned.]]></itunes:summary>
    <description><![CDATA[Rick Holland, CISO of Digital Shadows, joins Richard Gold and Michael Marriott to discuss the latest cybersecurity news. In part one, we discuss the possible implications of Facebook security flaws affecting 50 million accounts. In part two, one year after reports of the Equifax breach surface, the UK arm has been fined £500,000 by the ICO. We look at the lessons learned.]]></description>
    <content:encoded><![CDATA[Rick Holland, CISO of Digital Shadows, joins Richard Gold and Michael Marriott to discuss the latest cybersecurity news. In part one, we discuss the possible implications of Facebook security flaws affecting 50 million accounts. In part two, one year after reports of the Equifax breach surface, the UK arm has been fined £500,000 by the ICO. We look at the lessons learned.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461323-episode-43-security-flaws-affect-50-million-facebook-accounts-and-equifax-fined-500-000.mp3" length="15499559" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ocdjua6alvesrp4gvdce1ff092mn?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/506674941</guid>
    <pubDate>Fri, 28 Sep 2018 17:19:48 -0400</pubDate>
    <itunes:duration>1288</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 42: Security Layering and Usability Trade-offs</itunes:title>
    <title>Episode 42: Security Layering and Usability Trade-offs</title>
    <itunes:summary><![CDATA[Simon Hall and Richard Gold join Rafael Amado to focus on the trade-offs between security and usability, as well as the practice of security layering that can often make us more insecure. The team look over security measures such as regular complex password expiry policies that create headaches for organizations and end users, why it’s not easy to make security usable, whether certain security measures such as anti-virus software actually make us more insecure, and what alternative system def...]]></itunes:summary>
    <description><![CDATA[Simon Hall and Richard Gold join Rafael Amado to focus on the trade-offs between security and usability, as well as the practice of security layering that can often make us more insecure. The team look over security measures such as regular complex password expiry policies that create headaches for organizations and end users, why it’s not easy to make security usable, whether certain security measures such as anti-virus software actually make us more insecure, and what alternative system defences can bridge the gap between security and usability. For the NCSC blog on security and usability, visit: https://www.ncsc.gov.uk/blog-post/security-and-usability-you-can-have-it-all]]></description>
    <content:encoded><![CDATA[Simon Hall and Richard Gold join Rafael Amado to focus on the trade-offs between security and usability, as well as the practice of security layering that can often make us more insecure. The team look over security measures such as regular complex password expiry policies that create headaches for organizations and end users, why it’s not easy to make security usable, whether certain security measures such as anti-virus software actually make us more insecure, and what alternative system defences can bridge the gap between security and usability. For the NCSC blog on security and usability, visit: https://www.ncsc.gov.uk/blog-post/security-and-usability-you-can-have-it-all]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461324-episode-42-security-layering-and-usability-trade-offs.mp3" length="15434721" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5mjfhcnta462op2jvvklbiz3wyjs?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/503148597</guid>
    <pubDate>Fri, 21 Sep 2018 11:56:03 -0400</pubDate>
    <itunes:duration>1284</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 41: Magecart Payment Card Thefts</itunes:title>
    <title>Episode 41: Magecart Payment Card Thefts</title>
    <itunes:summary><![CDATA[In this week’s ShadowTalk, Richard Gold and Simon Hall join Michael Marriott to discuss the latest spate of attacks by the threat actor known as Magecart. We dig into the history of Magecart, different approaches to web skimming, and provide advice on how organizations can best protect against this threat.]]></itunes:summary>
    <description><![CDATA[In this week’s ShadowTalk, Richard Gold and Simon Hall join Michael Marriott to discuss the latest spate of attacks by the threat actor known as Magecart. We dig into the history of Magecart, different approaches to web skimming, and provide advice on how organizations can best protect against this threat.]]></description>
    <content:encoded><![CDATA[In this week’s ShadowTalk, Richard Gold and Simon Hall join Michael Marriott to discuss the latest spate of attacks by the threat actor known as Magecart. We dig into the history of Magecart, different approaches to web skimming, and provide advice on how organizations can best protect against this threat.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461325-episode-41-magecart-payment-card-thefts.mp3" length="12833490" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/zy2fget83onanl48ajpkrfn4oznx?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/499948683</guid>
    <pubDate>Fri, 14 Sep 2018 14:46:43 -0400</pubDate>
    <itunes:duration>1067</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 40: DoJ Complaint Charges North Korean Actor For Sony Attacks, WannaCry, and More</itunes:title>
    <title>Episode 40: DoJ Complaint Charges North Korean Actor For Sony Attacks, WannaCry, and More</title>
    <itunes:summary><![CDATA[In this week’s ShadowTalk, Richard Gold and Rafael Amado join Michael Marriott to discuss the latest Department of Justice complaint against an individual working for Chosun Expo, an alleged front for the North Korean state. The individual is accused of involvement in a host of campaigns, including attacks against Sony Pictures Entertainment, banks, defense contractors, and the many victims of the WannaCry ransomware variant. We discuss the most interesting revelations, outlining the differen...]]></itunes:summary>
    <description><![CDATA[In this week’s ShadowTalk, Richard Gold and Rafael Amado join Michael Marriott to discuss the latest Department of Justice complaint against an individual working for Chosun Expo, an alleged front for the North Korean state. The individual is accused of involvement in a host of campaigns, including attacks against Sony Pictures Entertainment, banks, defense contractors, and the many victims of the WannaCry ransomware variant. We discuss the most interesting revelations, outlining the different techniques used, and what this all means for organizations.]]></description>
    <content:encoded><![CDATA[In this week’s ShadowTalk, Richard Gold and Rafael Amado join Michael Marriott to discuss the latest Department of Justice complaint against an individual working for Chosun Expo, an alleged front for the North Korean state. The individual is accused of involvement in a host of campaigns, including attacks against Sony Pictures Entertainment, banks, defense contractors, and the many victims of the WannaCry ransomware variant. We discuss the most interesting revelations, outlining the different techniques used, and what this all means for organizations.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461326-episode-40-doj-complaint-charges-north-korean-actor-for-sony-attacks-wannacry-and-more.mp3" length="24041059" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/24utrpu8tflibnv1xakofetksdt6?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/496694268</guid>
    <pubDate>Fri, 07 Sep 2018 14:05:02 -0400</pubDate>
    <itunes:duration>2001</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 39: Credential Hygiene</itunes:title>
    <title>Episode 39: Credential Hygiene</title>
    <itunes:summary><![CDATA[Dr. Richard Gold and Simon Hall join Rafael Amado to discuss the age-old problem of credential hygiene. We’ve all heard of not reusing passwords, employing two factor authentication and using password vaults, but why then do organizations still struggle with good credential hygiene? We’ll cover the ways in which attackers steal and take advantage of credentials, what most companies are getting wrong, and the steps you can take to improve your overall credential hygiene practices.]]></itunes:summary>
    <description><![CDATA[Dr. Richard Gold and Simon Hall join Rafael Amado to discuss the age-old problem of credential hygiene. We’ve all heard of not reusing passwords, employing two factor authentication and using password vaults, but why then do organizations still struggle with good credential hygiene? We’ll cover the ways in which attackers steal and take advantage of credentials, what most companies are getting wrong, and the steps you can take to improve your overall credential hygiene practices.]]></description>
    <content:encoded><![CDATA[Dr. Richard Gold and Simon Hall join Rafael Amado to discuss the age-old problem of credential hygiene. We’ve all heard of not reusing passwords, employing two factor authentication and using password vaults, but why then do organizations still struggle with good credential hygiene? We’ll cover the ways in which attackers steal and take advantage of credentials, what most companies are getting wrong, and the steps you can take to improve your overall credential hygiene practices.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461327-episode-39-credential-hygiene.mp3" length="20308479" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/chk5dekmabvu612baow1v1zxvefp?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/493400238</guid>
    <pubDate>Fri, 31 Aug 2018 14:17:08 -0400</pubDate>
    <itunes:duration>1689</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 38: Midterm meddling and threat modeling</itunes:title>
    <title>Episode 38: Midterm meddling and threat modeling</title>
    <itunes:summary><![CDATA[This week it was revealed that six new domains registered by APT28, spoofing nonprofit, Senate, and Microsoft domains, have been sinkholed. With November’s US midterm elections fast-approaching, we dive into the latest threats and discuss how organizations can understand the threat posed to them by such malicious actors. Dr Richard Gold, Head of Security Engineering at Digital Shadows, joins Mike Marriott to discuss threat modeling; outlining the steps organizations can take to define their c...]]></itunes:summary>
    <description><![CDATA[This week it was revealed that six new domains registered by APT28, spoofing nonprofit, Senate, and Microsoft domains, have been sinkholed. With November’s US midterm elections fast-approaching, we dive into the latest threats and discuss how organizations can understand the threat posed to them by such malicious actors. Dr Richard Gold, Head of Security Engineering at Digital Shadows, joins Mike Marriott to discuss threat modeling; outlining the steps organizations can take to define their critical assets, understand the threat landscape, and create scenarios based on these. This enables organizations to identify security controls that are in place to mitigate, prevent and detect a specific threat actor&apos;s tradecraft, as well as uncover gaps in controls and establish a remediation plan.]]></description>
    <content:encoded><![CDATA[This week it was revealed that six new domains registered by APT28, spoofing nonprofit, Senate, and Microsoft domains, have been sinkholed. With November’s US midterm elections fast-approaching, we dive into the latest threats and discuss how organizations can understand the threat posed to them by such malicious actors. Dr Richard Gold, Head of Security Engineering at Digital Shadows, joins Mike Marriott to discuss threat modeling; outlining the steps organizations can take to define their critical assets, understand the threat landscape, and create scenarios based on these. This enables organizations to identify security controls that are in place to mitigate, prevent and detect a specific threat actor&apos;s tradecraft, as well as uncover gaps in controls and establish a remediation plan.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461328-episode-38-midterm-meddling-and-threat-modeling.mp3" length="18228488" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/xosy983zpeollq7964zey026t8ag?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/490110354</guid>
    <pubDate>Fri, 24 Aug 2018 13:48:55 -0400</pubDate>
    <itunes:duration>1515</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 37: ATM Fraud and Cashout Operations</itunes:title>
    <title>Episode 37: ATM Fraud and Cashout Operations</title>
    <itunes:summary><![CDATA[Digital Shadows’ Strategic Intelligence manager Rose Bernard joins Rafael Amado to discuss four separate ATM stories making headlines this week. In Part I, they’ll cover an alert on an impending "ATM cash-out" campaign issued by the FBI, and how India's Cosmos Bank lost $13.5m in cyberattacks after actors bypassed the internal ATM switch system. In Part II, Rafael and Rose will look into flaws discovered in NCR ATM currency dispensers, and a new Bitcoin ATM malware advertised for sale on dark...]]></itunes:summary>
    <description><![CDATA[Digital Shadows’ Strategic Intelligence manager Rose Bernard joins Rafael Amado to discuss four separate ATM stories making headlines this week. In Part I, they’ll cover an alert on an impending &quot;ATM cash-out&quot; campaign issued by the FBI, and how India&apos;s Cosmos Bank lost $13.5m in cyberattacks after actors bypassed the internal ATM switch system. In Part II, Rafael and Rose will look into flaws discovered in NCR ATM currency dispensers, and a new Bitcoin ATM malware advertised for sale on dark web. For more on how actors acquire and then use stolen payment card information, check out Digital Shadows’ Five Threats to Financial Services blog series, available on https://www.digitalshadows.com/blog-and-research/five-threats-to-financial-services-part-four-payment-card-fraud/]]></description>
    <content:encoded><![CDATA[Digital Shadows’ Strategic Intelligence manager Rose Bernard joins Rafael Amado to discuss four separate ATM stories making headlines this week. In Part I, they’ll cover an alert on an impending &quot;ATM cash-out&quot; campaign issued by the FBI, and how India&apos;s Cosmos Bank lost $13.5m in cyberattacks after actors bypassed the internal ATM switch system. In Part II, Rafael and Rose will look into flaws discovered in NCR ATM currency dispensers, and a new Bitcoin ATM malware advertised for sale on dark web. For more on how actors acquire and then use stolen payment card information, check out Digital Shadows’ Five Threats to Financial Services blog series, available on https://www.digitalshadows.com/blog-and-research/five-threats-to-financial-services-part-four-payment-card-fraud/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461329-episode-37-atm-fraud-and-cashout-operations.mp3" length="12778641" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/cnavz7ff69cdr8q71h76gv395j6j?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/486878769</guid>
    <pubDate>Fri, 17 Aug 2018 12:33:39 -0400</pubDate>
    <itunes:duration>1063</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 36: FIN7 Arrests and Phishing Threats</itunes:title>
    <title>Episode 36: FIN7 Arrests and Phishing Threats</title>
    <itunes:summary><![CDATA[Digital Shadows’ Rose Bernard and Simon Hall join Rafael Amado to cover the arrest of three alleged members of the FIN7 organized criminal group. The team go over the United States Department of Justice’s indictment and provide some key observations on FIN7’s operations, including how sophisticated phishing and social engineering are the cornerstones of the group’s success. In Part II, the team look at phishing more generally, including the threats from business email compromise and malspam. ...]]></itunes:summary>
    <description><![CDATA[Digital Shadows’ Rose Bernard and Simon Hall join Rafael Amado to cover the arrest of three alleged members of the FIN7 organized criminal group. The team go over the United States Department of Justice’s indictment and provide some key observations on FIN7’s operations, including how sophisticated phishing and social engineering are the cornerstones of the group’s success. In Part II, the team look at phishing more generally, including the threats from business email compromise and malspam. For more analysis of the FIN7 arrests, visit https://www.digitalshadows.com/blog-and-research/fin7-arrests-and-developments/]]></description>
    <content:encoded><![CDATA[Digital Shadows’ Rose Bernard and Simon Hall join Rafael Amado to cover the arrest of three alleged members of the FIN7 organized criminal group. The team go over the United States Department of Justice’s indictment and provide some key observations on FIN7’s operations, including how sophisticated phishing and social engineering are the cornerstones of the group’s success. In Part II, the team look at phishing more generally, including the threats from business email compromise and malspam. For more analysis of the FIN7 arrests, visit https://www.digitalshadows.com/blog-and-research/fin7-arrests-and-developments/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461330-episode-36-fin7-arrests-and-phishing-threats.mp3" length="18068719" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/90jz0bd8ct6b8z3r2xlo0ixykut9?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/483755706</guid>
    <pubDate>Fri, 10 Aug 2018 11:47:38 -0400</pubDate>
    <itunes:duration>1504</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 35: Cyber threats to ERP Applications</itunes:title>
    <title>Episode 35: Cyber threats to ERP Applications</title>
    <itunes:summary><![CDATA[In this week’s episode, JP Perez-Etchegoyen, CTO of Onapsis, joins Michael Marriott to talk about the exposure of SAP and Oracle applications, the increase in publicly-available exploits, and the threat actors we have observed targeting the sensitive data held within these applications. Download the full report to learn more: https://info.digitalshadows.com/ERPApplicationsUnderFire-Podcast.html]]></itunes:summary>
    <description><![CDATA[In this week’s episode, JP Perez-Etchegoyen, CTO of Onapsis, joins Michael Marriott to talk about the exposure of SAP and Oracle applications, the increase in publicly-available exploits, and the threat actors we have observed targeting the sensitive data held within these applications. Download the full report to learn more: https://info.digitalshadows.com/ERPApplicationsUnderFire-Podcast.html]]></description>
    <content:encoded><![CDATA[In this week’s episode, JP Perez-Etchegoyen, CTO of Onapsis, joins Michael Marriott to talk about the exposure of SAP and Oracle applications, the increase in publicly-available exploits, and the threat actors we have observed targeting the sensitive data held within these applications. Download the full report to learn more: https://info.digitalshadows.com/ERPApplicationsUnderFire-Podcast.html]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461331-episode-35-cyber-threats-to-erp-applications.mp3" length="18212982" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/7pn8aaeltpgwtnyqzjrrsfluk2u7?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/480667143</guid>
    <pubDate>Fri, 03 Aug 2018 11:40:27 -0400</pubDate>
    <itunes:duration>1516</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 34: Satori Botnet, OilRig, PowerShell Security, and the Dragonfly Campaign</itunes:title>
    <title>Episode 34: Satori Botnet, OilRig, PowerShell Security, and the Dragonfly Campaign</title>
    <itunes:summary><![CDATA[Richard Gold and Rose Bernard join Michael Marriott to talked about updates to the Satori botnet, which has expanded to incorporate new IoT devices using TCP port 5555. Amid news of a new wave of OIlRig attacks, a Middle Eastern espionage campaign, we dive into PowerShell security risks and provide advice on best practices for those using PowerShell. For more information on PowerShell Security Best Practices, check out our blog https://www.digitalshadows.com/blog-and-research/powershell-secur...]]></itunes:summary>
    <description><![CDATA[Richard Gold and Rose Bernard join Michael Marriott to talked about updates to the Satori botnet, which has expanded to incorporate new IoT devices using TCP port 5555. Amid news of a new wave of OIlRig attacks, a Middle Eastern espionage campaign, we dive into PowerShell security risks and provide advice on best practices for those using PowerShell. For more information on PowerShell Security Best Practices, check out our blog https://www.digitalshadows.com/blog-and-research/powershell-security-best-practices/. Finally, we assess the Dragonfly campaign against US power grids, and understand what it all means.]]></description>
    <content:encoded><![CDATA[Richard Gold and Rose Bernard join Michael Marriott to talked about updates to the Satori botnet, which has expanded to incorporate new IoT devices using TCP port 5555. Amid news of a new wave of OIlRig attacks, a Middle Eastern espionage campaign, we dive into PowerShell security risks and provide advice on best practices for those using PowerShell. For more information on PowerShell Security Best Practices, check out our blog https://www.digitalshadows.com/blog-and-research/powershell-security-best-practices/. Finally, we assess the Dragonfly campaign against US power grids, and understand what it all means.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461332-episode-34-satori-botnet-oilrig-powershell-security-and-the-dragonfly-campaign.mp3" length="13513424" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/tas7ymxuuyyg09lqw7g91bzu168i?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/477618090</guid>
    <pubDate>Fri, 27 Jul 2018 16:23:46 -0400</pubDate>
    <itunes:duration>1122</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 33: Digital Risk Protection</itunes:title>
    <title>Episode 33: Digital Risk Protection</title>
    <itunes:summary><![CDATA[Rick Holland, CISO at Digital Shadows, discusses the latest 2018 Forrester New Wave for Digital Risk Protection. He discusses how security leaders must avoid blind spots with a more complete risk picture.]]></itunes:summary>
    <description><![CDATA[Rick Holland, CISO at Digital Shadows, discusses the latest 2018 Forrester New Wave for Digital Risk Protection. He discusses how security leaders must avoid blind spots with a more complete risk picture.]]></description>
    <content:encoded><![CDATA[Rick Holland, CISO at Digital Shadows, discusses the latest 2018 Forrester New Wave for Digital Risk Protection. He discusses how security leaders must avoid blind spots with a more complete risk picture.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461333-episode-33-digital-risk-protection.mp3" length="5308995" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/v5jes4dsfr9xpen7q2bfqr9kpbj1?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/475587111</guid>
    <pubDate>Mon, 23 Jul 2018 11:11:57 -0400</pubDate>
    <itunes:duration>440</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 32: MITRE ATT&amp;CK™ Framework and the Mueller GRU Indictment</itunes:title>
    <title>Episode 32: MITRE ATT&amp;CK™ Framework and the Mueller GRU Indictment</title>
    <itunes:summary><![CDATA[In today’s ShadowTalk, we take on the Robert Mueller indictment against 12 Russian individuals for alleged US election interference. However, rather than dwell on issues of attribution and geopolitics, we focus on the detailed tactics, techniques and procedures laid out in the indictment. Katie Nickels, a member of the MITRE team, joins Rafael Amado and Richard Gold us to discuss the ATT&amp;CK™ framework in greater detail, as well as the key lessons that organizations can takeaway. For Digit...]]></itunes:summary>
    <description><![CDATA[In today’s ShadowTalk, we take on the Robert Mueller indictment against 12 Russian individuals for alleged US election interference. However, rather than dwell on issues of attribution and geopolitics, we focus on the detailed tactics, techniques and procedures laid out in the indictment. Katie Nickels, a member of the MITRE team, joins Rafael Amado and Richard Gold us to discuss the ATT&amp;CK™ framework in greater detail, as well as the key lessons that organizations can takeaway. For Digital Shadows’ analysis of the indictment, visit https://www.digitalshadows.com/blog-and-research/mitre-attck-and-the-mueller-gru-indictment-lessons-for-organizations/]]></description>
    <content:encoded><![CDATA[In today’s ShadowTalk, we take on the Robert Mueller indictment against 12 Russian individuals for alleged US election interference. However, rather than dwell on issues of attribution and geopolitics, we focus on the detailed tactics, techniques and procedures laid out in the indictment. Katie Nickels, a member of the MITRE team, joins Rafael Amado and Richard Gold us to discuss the ATT&amp;CK™ framework in greater detail, as well as the key lessons that organizations can takeaway. For Digital Shadows’ analysis of the indictment, visit https://www.digitalshadows.com/blog-and-research/mitre-attck-and-the-mueller-gru-indictment-lessons-for-organizations/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461334-episode-32-mitre-att-ck-framework-and-the-mueller-gru-indictment.mp3" length="19727641" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/2m8blytrbbhf3tup6etgt8orfzst?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/474385647</guid>
    <pubDate>Fri, 20 Jul 2018 12:41:49 -0400</pubDate>
    <itunes:duration>1642</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 31: Carbanak Files and Source Code Leaked?</itunes:title>
    <title>Episode 31: Carbanak Files and Source Code Leaked?</title>
    <itunes:summary><![CDATA[In this week's ShadowTalk, Digital Shadows’ Russian-speaking security specialist discovered files and source code allegedly related to the Carbanak organized criminal group. The Carbanak malware is a backdoor used by the Anunak (Carbanak) Group to infiltrate financial institutions and steal funds. Richard Gold and Simon Hall join Rafael Amado to discuss the implications for financial services from these revelations. We ask whether this leak represents a threat to organizations, and how busine...]]></itunes:summary>
    <description><![CDATA[In this week&apos;s ShadowTalk, Digital Shadows’ Russian-speaking security specialist discovered files and source code allegedly related to the Carbanak organized criminal group. The Carbanak malware is a backdoor used by the Anunak (Carbanak) Group to infiltrate financial institutions and steal funds. Richard Gold and Simon Hall join Rafael Amado to discuss the implications for financial services from these revelations. We ask whether this leak represents a threat to organizations, and how businesses can best defend themselves from the techniques used by sophisticated financial criminal groups such as Carbanak. For more analysis from the Security Engineering Team, visit https://www.digitalshadows.com/blog-and-research/alleged-carbanak-files-and-source-code-leaked-digital-shadows-initial-findings/]]></description>
    <content:encoded><![CDATA[In this week&apos;s ShadowTalk, Digital Shadows’ Russian-speaking security specialist discovered files and source code allegedly related to the Carbanak organized criminal group. The Carbanak malware is a backdoor used by the Anunak (Carbanak) Group to infiltrate financial institutions and steal funds. Richard Gold and Simon Hall join Rafael Amado to discuss the implications for financial services from these revelations. We ask whether this leak represents a threat to organizations, and how businesses can best defend themselves from the techniques used by sophisticated financial criminal groups such as Carbanak. For more analysis from the Security Engineering Team, visit https://www.digitalshadows.com/blog-and-research/alleged-carbanak-files-and-source-code-leaked-digital-shadows-initial-findings/]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461335-episode-31-carbanak-files-and-source-code-leaked.mp3" length="17184793" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/u0wfnpfmqs5ozvqpxh9sukzorlkh?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/471271116</guid>
    <pubDate>Fri, 13 Jul 2018 13:43:23 -0400</pubDate>
    <itunes:duration>1428</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 30: SSL Inspection and Interception: Uses, Abuses and Trade-offs</itunes:title>
    <title>Episode 30: SSL Inspection and Interception: Uses, Abuses and Trade-offs</title>
    <itunes:summary><![CDATA[The Payment Card Industry recently passed a deadline requiring that all e-commerce sites and merchants cease supporting TLS 1.0. With this and older protocols such as SSL vulnerable to man-in-the-middle attacks, the fear is that attackers can intercept and tamper with data being sent across these channels. However, SSL interception is also performed by organizations for reasons that include blocking malware or improving data leakage prevention. Richard Gold and Simon Hall join Rafael Amado to...]]></itunes:summary>
    <description><![CDATA[The Payment Card Industry recently passed a deadline requiring that all e-commerce sites and merchants cease supporting TLS 1.0. With this and older protocols such as SSL vulnerable to man-in-the-middle attacks, the fear is that attackers can intercept and tamper with data being sent across these channels. However, SSL interception is also performed by organizations for reasons that include blocking malware or improving data leakage prevention. Richard Gold and Simon Hall join Rafael Amado to discuss how SSL interception works, the different reasons for deploying it, the risks and privacy ramifications of interception, and the overall trade-offs for organizations looking to implement these methods.]]></description>
    <content:encoded><![CDATA[The Payment Card Industry recently passed a deadline requiring that all e-commerce sites and merchants cease supporting TLS 1.0. With this and older protocols such as SSL vulnerable to man-in-the-middle attacks, the fear is that attackers can intercept and tamper with data being sent across these channels. However, SSL interception is also performed by organizations for reasons that include blocking malware or improving data leakage prevention. Richard Gold and Simon Hall join Rafael Amado to discuss how SSL interception works, the different reasons for deploying it, the risks and privacy ramifications of interception, and the overall trade-offs for organizations looking to implement these methods.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461336-episode-30-ssl-inspection-and-interception-uses-abuses-and-trade-offs.mp3" length="15191780" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/9c5hdx25x5dv79embfufrk7t3fac?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/468313035</guid>
    <pubDate>Fri, 06 Jul 2018 18:58:36 -0400</pubDate>
    <itunes:duration>1262</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 29: Reducing Your Attack Surface: From a Firehose to a Straw</itunes:title>
    <title>Episode 29: Reducing Your Attack Surface: From a Firehose to a Straw</title>
    <itunes:summary><![CDATA[Following news that a database containing 340 million records has been publicly exposed to the internet, Richard Gold and Simon Hall join Michael Marriott to discuss how (and why) you can reduce your attack surface. For more information on some of the tips provided in this pursuit, visit https://github.com/securitywithoutborders/hardentools.]]></itunes:summary>
    <description><![CDATA[Following news that a database containing 340 million records has been publicly exposed to the internet, Richard Gold and Simon Hall join Michael Marriott to discuss how (and why) you can reduce your attack surface. For more information on some of the tips provided in this pursuit, visit https://github.com/securitywithoutborders/hardentools.]]></description>
    <content:encoded><![CDATA[Following news that a database containing 340 million records has been publicly exposed to the internet, Richard Gold and Simon Hall join Michael Marriott to discuss how (and why) you can reduce your attack surface. For more information on some of the tips provided in this pursuit, visit https://github.com/securitywithoutborders/hardentools.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461337-episode-29-reducing-your-attack-surface-from-a-firehose-to-a-straw.mp3" length="14816587" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/0dqeio506efn4o5wdu8vtavr018k?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/465274953</guid>
    <pubDate>Fri, 29 Jun 2018 17:23:52 -0400</pubDate>
    <itunes:duration>1232</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 28: Diversity in Security and Women’s Network Launch</itunes:title>
    <title>Episode 28: Diversity in Security and Women’s Network Launch</title>
    <itunes:summary><![CDATA[Libby Fiumara is joined by Rose Bernard and Sophie Burke to discuss the launch of Digital Shadows’ Women’s Network, challenges facing women in security, and how companies can foster diversity in the workplace.]]></itunes:summary>
    <description><![CDATA[Libby Fiumara is joined by Rose Bernard and Sophie Burke to discuss the launch of Digital Shadows’ Women’s Network, challenges facing women in security, and how companies can foster diversity in the workplace.]]></description>
    <content:encoded><![CDATA[Libby Fiumara is joined by Rose Bernard and Sophie Burke to discuss the launch of Digital Shadows’ Women’s Network, challenges facing women in security, and how companies can foster diversity in the workplace.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461338-episode-28-diversity-in-security-and-women-s-network-launch.mp3" length="17979275" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/f3kps7b8tjxbwtvf0nt29rwz24mw?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/463712943</guid>
    <pubDate>Tue, 26 Jun 2018 11:03:38 -0400</pubDate>
    <itunes:duration>1495</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 27: Attribution: The How, The What and The Why</itunes:title>
    <title>Episode 27: Attribution: The How, The What and The Why</title>
    <itunes:summary><![CDATA[Simon Hall and Rich Gold join Michael Marriott to discuss the merits and perils of attribution, including the number of characteristics and variables required for a strong attribution, instances where attribution has succeeded, and whether organizations should care.]]></itunes:summary>
    <description><![CDATA[Simon Hall and Rich Gold join Michael Marriott to discuss the merits and perils of attribution, including the number of characteristics and variables required for a strong attribution, instances where attribution has succeeded, and whether organizations should care.]]></description>
    <content:encoded><![CDATA[Simon Hall and Rich Gold join Michael Marriott to discuss the merits and perils of attribution, including the number of characteristics and variables required for a strong attribution, instances where attribution has succeeded, and whether organizations should care.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461339-episode-27-attribution-the-how-the-what-and-the-why.mp3" length="16498676" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/znazvkrt97ox1olkr3ocpi79t0dq?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/461997645</guid>
    <pubDate>Fri, 22 Jun 2018 14:24:41 -0400</pubDate>
    <itunes:duration>1370</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 26: Mythbusting Vulnerabilities and Exploits</itunes:title>
    <title>Episode 26: Mythbusting Vulnerabilities and Exploits</title>
    <itunes:summary><![CDATA[Simon Hall and Richard Gold join Rafael Amado to discuss misconceptions around vulnerabilities and exploits, other techniques for gaining code execution, and how organizations can prioritize the patching of vulnerabilities.]]></itunes:summary>
    <description><![CDATA[Simon Hall and Richard Gold join Rafael Amado to discuss misconceptions around vulnerabilities and exploits, other techniques for gaining code execution, and how organizations can prioritize the patching of vulnerabilities.]]></description>
    <content:encoded><![CDATA[Simon Hall and Richard Gold join Rafael Amado to discuss misconceptions around vulnerabilities and exploits, other techniques for gaining code execution, and how organizations can prioritize the patching of vulnerabilities.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461340-episode-26-mythbusting-vulnerabilities-and-exploits.mp3" length="15475457" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/542a1lu68lkgmclt7igubosxc9jj?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/458844480</guid>
    <pubDate>Fri, 15 Jun 2018 12:45:03 -0400</pubDate>
    <itunes:duration>1286</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 25: Combating Security Debt, Ticketfly Defacement And Data Breach</itunes:title>
    <title>Episode 25: Combating Security Debt, Ticketfly Defacement And Data Breach</title>
    <itunes:summary><![CDATA[In this edition of Shadow Talk, Richard Gold joins us to discuss the issue of security debt, a term used to refer to the accumulation of security risks over time, such as missed patches, misapplied configurations, mismanaged user accounts. Richard looks into how many of the attacks we see on a regular basis are actually a result of security risks that build up over time, and how security debt is a ticking time bomb for most organizations. In Part II, Harrison Van Riper covers the recent websi...]]></itunes:summary>
    <description><![CDATA[In this edition of Shadow Talk, Richard Gold joins us to discuss the issue of security debt, a term used to refer to the accumulation of security risks over time, such as missed patches, misapplied configurations, mismanaged user accounts. Richard looks into how many of the attacks we see on a regular basis are actually a result of security risks that build up over time, and how security debt is a ticking time bomb for most organizations. In Part II, Harrison Van Riper covers the recent website defacement attack and data breach incident targeting the event ticketing company, Ticketfly. Security debt resources:https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/286667/FAQ2_-_Managing_Information_Risk_at_OFFICIAL_v2_-_March_2014.pdf]]></description>
    <content:encoded><![CDATA[In this edition of Shadow Talk, Richard Gold joins us to discuss the issue of security debt, a term used to refer to the accumulation of security risks over time, such as missed patches, misapplied configurations, mismanaged user accounts. Richard looks into how many of the attacks we see on a regular basis are actually a result of security risks that build up over time, and how security debt is a ticking time bomb for most organizations. In Part II, Harrison Van Riper covers the recent website defacement attack and data breach incident targeting the event ticketing company, Ticketfly. Security debt resources:https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/286667/FAQ2_-_Managing_Information_Risk_at_OFFICIAL_v2_-_March_2014.pdf]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461341-episode-25-combating-security-debt-ticketfly-defacement-and-data-breach.mp3" length="14038499" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8zlz26t5v1hskf8lzgke2yg76tva?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/455753043</guid>
    <pubDate>Sun, 10 Jun 2018 20:00:04 -0400</pubDate>
    <itunes:duration>1168</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 24: Seize and Desist: Changes in the cybercriminal underground</itunes:title>
    <title>Episode 24: Seize and Desist: Changes in the cybercriminal underground</title>
    <itunes:summary><![CDATA[Rafael Amado and Michael Marriott discuss how the criminal underground has evolved since the demise of AlphaBay and Hansa. No single marketplace has managed to fill the AlphaBay-shaped gap left behind, at least among the English-speaking community. Existing sites such as Dream and Trade Route have failed to consolidate this empty space, hampered by a combination of poor communication by administrators and suspicion that these sites could be police honeypots like Hansa had been. Grab a copy of...]]></itunes:summary>
    <description><![CDATA[Rafael Amado and Michael Marriott discuss how the criminal underground has evolved since the demise of AlphaBay and Hansa. No single marketplace has managed to fill the AlphaBay-shaped gap left behind, at least among the English-speaking community. Existing sites such as Dream and Trade Route have failed to consolidate this empty space, hampered by a combination of poor communication by administrators and suspicion that these sites could be police honeypots like Hansa had been. Grab a copy of our report to read more: https://info.digitalshadows.com/SeizeandDesistReport-Podcast.html]]></description>
    <content:encoded><![CDATA[Rafael Amado and Michael Marriott discuss how the criminal underground has evolved since the demise of AlphaBay and Hansa. No single marketplace has managed to fill the AlphaBay-shaped gap left behind, at least among the English-speaking community. Existing sites such as Dream and Trade Route have failed to consolidate this empty space, hampered by a combination of poor communication by administrators and suspicion that these sites could be police honeypots like Hansa had been. Grab a copy of our report to read more: https://info.digitalshadows.com/SeizeandDesistReport-Podcast.html]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461342-episode-24-seize-and-desist-changes-in-the-cybercriminal-underground.mp3" length="13614110" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/kltz0ta0ybk872bhn3d9yfvw4l6g?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/454307178</guid>
    <pubDate>Wed, 06 Jun 2018 08:00:22 -0400</pubDate>
    <itunes:duration>1131</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 23: L0pht 20 years on and combating cyber threats with military-style tactics</itunes:title>
    <title>Episode 23: L0pht 20 years on and combating cyber threats with military-style tactics</title>
    <itunes:summary><![CDATA[In today’s edition of Shadow talk, Dr Richard Gold joins us to discuss the return of the L0pht hackers. In 1998 the L0pht members delivered a cybersecurity hearing to the United States Senate, warning that any one person in their group could take down the Internet within 30 minutes. 20 years on, we look back on what has and hasn’t changed in the world of information security. In Part II, the team covers recent reporting on the use of military-style tactics such as war gaming and intelligence ...]]></itunes:summary>
    <description><![CDATA[In today’s edition of Shadow talk, Dr Richard Gold joins us to discuss the return of the L0pht hackers. In 1998 the L0pht members delivered a cybersecurity hearing to the United States Senate, warning that any one person in their group could take down the Internet within 30 minutes. 20 years on, we look back on what has and hasn’t changed in the world of information security. In Part II, the team covers recent reporting on the use of military-style tactics such as war gaming and intelligence fusion centres in the financial services industry. We ask whether such tactics are effective, and whether smaller organizations can also employ the techniques being used by some of the world’s largest enterprises.]]></description>
    <content:encoded><![CDATA[In today’s edition of Shadow talk, Dr Richard Gold joins us to discuss the return of the L0pht hackers. In 1998 the L0pht members delivered a cybersecurity hearing to the United States Senate, warning that any one person in their group could take down the Internet within 30 minutes. 20 years on, we look back on what has and hasn’t changed in the world of information security. In Part II, the team covers recent reporting on the use of military-style tactics such as war gaming and intelligence fusion centres in the financial services industry. We ask whether such tactics are effective, and whether smaller organizations can also employ the techniques being used by some of the world’s largest enterprises.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461343-episode-23-l0pht-20-years-on-and-combating-cyber-threats-with-military-style-tactics.mp3" length="15822504" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/6vsbxh3i35zbgsv5vxbc0qeo83yr?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/453530817</guid>
    <pubDate>Mon, 04 Jun 2018 07:18:02 -0400</pubDate>
    <itunes:duration>1316</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 22: VPN Filter targeting Ukraine, TRITON malware, Roaming Mantis, VBScript &amp; Spectre vulns</itunes:title>
    <title>Episode 22: VPN Filter targeting Ukraine, TRITON malware, Roaming Mantis, VBScript &amp; Spectre vulns</title>
    <itunes:summary><![CDATA[In this week’s Shadow Talk, the pod unpacks the reporting on VPN Filter, a malware affecting half a million network devices. Reports have suggested that the malware is being prepped to perform imminent large scale disruptive attacks against Ukrainian infrastructure. We also cover new research on the TRITON malware targeting industrial control and SCADA systems, as well as new techniques for the Roaming Mantis malware family. Finally, we bring you updates on vulnerabilities related to VBScript...]]></itunes:summary>
    <description><![CDATA[In this week’s Shadow Talk, the pod unpacks the reporting on VPN Filter, a malware affecting half a million network devices. Reports have suggested that the malware is being prepped to perform imminent large scale disruptive attacks against Ukrainian infrastructure. We also cover new research on the TRITON malware targeting industrial control and SCADA systems, as well as new techniques for the Roaming Mantis malware family. Finally, we bring you updates on vulnerabilities related to VBScript and the Spectre/Meltdown attacks.]]></description>
    <content:encoded><![CDATA[In this week’s Shadow Talk, the pod unpacks the reporting on VPN Filter, a malware affecting half a million network devices. Reports have suggested that the malware is being prepped to perform imminent large scale disruptive attacks against Ukrainian infrastructure. We also cover new research on the TRITON malware targeting industrial control and SCADA systems, as well as new techniques for the Roaming Mantis malware family. Finally, we bring you updates on vulnerabilities related to VBScript and the Spectre/Meltdown attacks.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461344-episode-22-vpn-filter-targeting-ukraine-triton-malware-roaming-mantis-vbscript-spectre-vulns.mp3" length="16927483" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/1md7wfi6jusywya894vntcakks2d?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/449244456</guid>
    <pubDate>Mon, 28 May 2018 20:00:02 -0400</pubDate>
    <itunes:duration>1408</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 21: eFail vulns affecting Open PGP and S-MIME, and interbank payment systems risks</itunes:title>
    <title>Episode 21: eFail vulns affecting Open PGP and S-MIME, and interbank payment systems risks</title>
    <itunes:summary><![CDATA[In this week’s episode of Shadow Talk, Digital Shadows’ Head of Security Engineering, Dr Richard Gold, joins the pod to explain the EFAIL vulnerability affecting Open PGP and S-MIME, as well as other flaws identified in encrypted messaging platforms. Dr Gold also outlines the the factors you should be considering to prioritize your patching.  In part two, we look at the $15 million theft in Mexico and outline the risks facing interbank payment systems.]]></itunes:summary>
    <description><![CDATA[In this week’s episode of Shadow Talk, Digital Shadows’ Head of Security Engineering, Dr Richard Gold, joins the pod to explain the EFAIL vulnerability affecting Open PGP and S-MIME, as well as other flaws identified in encrypted messaging platforms. Dr Gold also outlines the the factors you should be considering to prioritize your patching.  In part two, we look at the $15 million theft in Mexico and outline the risks facing interbank payment systems.]]></description>
    <content:encoded><![CDATA[In this week’s episode of Shadow Talk, Digital Shadows’ Head of Security Engineering, Dr Richard Gold, joins the pod to explain the EFAIL vulnerability affecting Open PGP and S-MIME, as well as other flaws identified in encrypted messaging platforms. Dr Gold also outlines the the factors you should be considering to prioritize your patching.  In part two, we look at the $15 million theft in Mexico and outline the risks facing interbank payment systems.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461345-episode-21-efail-vulns-affecting-open-pgp-and-s-mime-and-interbank-payment-systems-risks.mp3" length="16890274" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/0oa4mvcrzejv3wb0tfgr060t8ocg?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/445990029</guid>
    <pubDate>Sun, 20 May 2018 20:00:02 -0400</pubDate>
    <itunes:duration>1402</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 20: Winnti Umbrella, DarkHotel, Office 365 Vulnerability, and Olympus Dark Web Marketplaces</itunes:title>
    <title>Episode 20: Winnti Umbrella, DarkHotel, Office 365 Vulnerability, and Olympus Dark Web Marketplaces</title>
    <itunes:summary><![CDATA[In this week’s episode Shadow Talk we look at the Winnti Umbrella group, asking what this means for organizations. We discuss vulnerabilities in Microsoft Office (CVE-2018-8174) and basestriker. And, finally, we outline the fall out surrounding the Olympus dark web marketplace.]]></itunes:summary>
    <description><![CDATA[In this week’s episode Shadow Talk we look at the Winnti Umbrella group, asking what this means for organizations. We discuss vulnerabilities in Microsoft Office (CVE-2018-8174) and basestriker. And, finally, we outline the fall out surrounding the Olympus dark web marketplace.]]></description>
    <content:encoded><![CDATA[In this week’s episode Shadow Talk we look at the Winnti Umbrella group, asking what this means for organizations. We discuss vulnerabilities in Microsoft Office (CVE-2018-8174) and basestriker. And, finally, we outline the fall out surrounding the Olympus dark web marketplace.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461346-episode-20-winnti-umbrella-darkhotel-office-365-vulnerability-and-olympus-dark-web-marketplaces.mp3" length="14251196" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/u4xlkiue2pkjfovlbgbgl5ws91t7?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/442726923</guid>
    <pubDate>Sun, 13 May 2018 20:00:02 -0400</pubDate>
    <itunes:duration>1183</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 19: Loki Bot, LoJack, GPON Vulnerabilities, and Blackrouter Ransomware</itunes:title>
    <title>Episode 19: Loki Bot, LoJack, GPON Vulnerabilities, and Blackrouter Ransomware</title>
    <itunes:summary><![CDATA[In this week’s episode Shadow Talk, it’s a vulnerability extravaganza. We cover malicious use of legitimate software, as APT28 attributed to hijacking LoJack and Blackrouter delivered via AnyDesk software. Vulnerabilities found (and exploited) in GPON home routers, and Loki Bot exploits two remote code execution vulnerabilities in Microsoft Office (CVE-2017-8570 and CVE-2018-0802).]]></itunes:summary>
    <description><![CDATA[In this week’s episode Shadow Talk, it’s a vulnerability extravaganza. We cover malicious use of legitimate software, as APT28 attributed to hijacking LoJack and Blackrouter delivered via AnyDesk software. Vulnerabilities found (and exploited) in GPON home routers, and Loki Bot exploits two remote code execution vulnerabilities in Microsoft Office (CVE-2017-8570 and CVE-2018-0802).]]></description>
    <content:encoded><![CDATA[In this week’s episode Shadow Talk, it’s a vulnerability extravaganza. We cover malicious use of legitimate software, as APT28 attributed to hijacking LoJack and Blackrouter delivered via AnyDesk software. Vulnerabilities found (and exploited) in GPON home routers, and Loki Bot exploits two remote code execution vulnerabilities in Microsoft Office (CVE-2017-8570 and CVE-2018-0802).]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461347-episode-19-loki-bot-lojack-gpon-vulnerabilities-and-blackrouter-ransomware.mp3" length="12978183" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/qm3wtvvpt6pjw50z7vpetn8rdk6d?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/439384536</guid>
    <pubDate>Sun, 06 May 2018 19:00:06 -0400</pubDate>
    <itunes:duration>1077</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 18: Healthcare hacking, BGP hijacking, crypto jacking, and more</itunes:title>
    <title>Episode 18: Healthcare hacking, BGP hijacking, crypto jacking, and more</title>
    <itunes:summary><![CDATA[In this week’s episode of Shadow Talk, we cover the targeting of healthcare organizations by Orangeworm, BGP hijacking, vulnerabilities in MikroTik routers, DDoS market shutdowns, and the profitability of cryptocurrency mining.]]></itunes:summary>
    <description><![CDATA[In this week’s episode of Shadow Talk, we cover the targeting of healthcare organizations by Orangeworm, BGP hijacking, vulnerabilities in MikroTik routers, DDoS market shutdowns, and the profitability of cryptocurrency mining.]]></description>
    <content:encoded><![CDATA[In this week’s episode of Shadow Talk, we cover the targeting of healthcare organizations by Orangeworm, BGP hijacking, vulnerabilities in MikroTik routers, DDoS market shutdowns, and the profitability of cryptocurrency mining.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461348-episode-18-healthcare-hacking-bgp-hijacking-crypto-jacking-and-more.mp3" length="14016832" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/jyfkiylw96ni5o9rzngoet39cnk8?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/436072086</guid>
    <pubDate>Sun, 29 Apr 2018 19:00:53 -0400</pubDate>
    <itunes:duration>1164</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 17: Network Infrastructure Compromise, Magnitude EK Development, the Gold Galleon, &amp; more</itunes:title>
    <title>Episode 17: Network Infrastructure Compromise, Magnitude EK Development, the Gold Galleon, &amp; more</title>
    <itunes:summary><![CDATA[In this week’s episode of Shadow Talk, we cover Russia’s attempts to ban the social messaging app, and also read between the lines of the joint US and UK advisory on network infrastructure compromises by Kremlin-backed actors. We also outline new ransomware payloads incorporated into the Magnitude exploit kit and we bring you the latest news on vulnerabilities in the Drupal Platform and Cisco’s Webex software.]]></itunes:summary>
    <description><![CDATA[In this week’s episode of Shadow Talk, we cover Russia’s attempts to ban the social messaging app, and also read between the lines of the joint US and UK advisory on network infrastructure compromises by Kremlin-backed actors. We also outline new ransomware payloads incorporated into the Magnitude exploit kit and we bring you the latest news on vulnerabilities in the Drupal Platform and Cisco’s Webex software.]]></description>
    <content:encoded><![CDATA[In this week’s episode of Shadow Talk, we cover Russia’s attempts to ban the social messaging app, and also read between the lines of the joint US and UK advisory on network infrastructure compromises by Kremlin-backed actors. We also outline new ransomware payloads incorporated into the Magnitude exploit kit and we bring you the latest news on vulnerabilities in the Drupal Platform and Cisco’s Webex software.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461349-episode-17-network-infrastructure-compromise-magnitude-ek-development-the-gold-galleon-more.mp3" length="16782475" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/60xm2dp369wkiux7bkeqjgf3e0s5?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/432773721</guid>
    <pubDate>Sun, 22 Apr 2018 20:00:03 -0400</pubDate>
    <itunes:duration>1395</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 16: Cisco Smart Install Client flaw, Microsoft Outlook vuln, OpIcarus, RSAC, and more</itunes:title>
    <title>Episode 16: Cisco Smart Install Client flaw, Microsoft Outlook vuln, OpIcarus, RSAC, and more</title>
    <itunes:summary><![CDATA[This week’s Shadow Talk discusses a Cisco Smart Install Client flaw exploited in disruption attack, an information leak vulnerability discovered in Microsoft Outlook, details on OpIcarus and OpIsrael, Verizon DBIR, and why you still should be excited about the RSA Conference.]]></itunes:summary>
    <description><![CDATA[This week’s Shadow Talk discusses a Cisco Smart Install Client flaw exploited in disruption attack, an information leak vulnerability discovered in Microsoft Outlook, details on OpIcarus and OpIsrael, Verizon DBIR, and why you still should be excited about the RSA Conference.]]></description>
    <content:encoded><![CDATA[This week’s Shadow Talk discusses a Cisco Smart Install Client flaw exploited in disruption attack, an information leak vulnerability discovered in Microsoft Outlook, details on OpIcarus and OpIsrael, Verizon DBIR, and why you still should be excited about the RSA Conference.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461350-episode-16-cisco-smart-install-client-flaw-microsoft-outlook-vuln-opicarus-rsac-and-more.mp3" length="16011113" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/hlgjg1v3cam4zzqtkfia7lzeb4px?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/429331935</guid>
    <pubDate>Sun, 15 Apr 2018 18:00:04 -0400</pubDate>
    <itunes:duration>1330</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 15: 1.5 Billion Files Exposed Through Misconfigured Services</itunes:title>
    <title>Episode 15: 1.5 Billion Files Exposed Through Misconfigured Services</title>
    <itunes:summary><![CDATA[Rafael Amado and Michael Marriott join this week’s Shadow Talk, taking a deep dive into our recent report “Too Much Information”. The research discovered over 1.5 billion files from a host of services, including Amazon S3 buckets, rsync, SMB, FTP, NAS drives, and misconfigured websites. To learn more, download the full report at https://info.digitalshadows.com/FileSharingDataExposureResearch-Podcast.html.]]></itunes:summary>
    <description><![CDATA[Rafael Amado and Michael Marriott join this week’s Shadow Talk, taking a deep dive into our recent report “Too Much Information”. The research discovered over 1.5 billion files from a host of services, including Amazon S3 buckets, rsync, SMB, FTP, NAS drives, and misconfigured websites. To learn more, download the full report at https://info.digitalshadows.com/FileSharingDataExposureResearch-Podcast.html.]]></description>
    <content:encoded><![CDATA[Rafael Amado and Michael Marriott join this week’s Shadow Talk, taking a deep dive into our recent report “Too Much Information”. The research discovered over 1.5 billion files from a host of services, including Amazon S3 buckets, rsync, SMB, FTP, NAS drives, and misconfigured websites. To learn more, download the full report at https://info.digitalshadows.com/FileSharingDataExposureResearch-Podcast.html.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461351-episode-15-1-5-billion-files-exposed-through-misconfigured-services.mp3" length="13331913" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/h4mg84ybvxqcqbtmh62y8vwatwph?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/428358786</guid>
    <pubDate>Wed, 11 Apr 2018 17:47:27 -0400</pubDate>
    <itunes:duration>1106</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 14: Panera Breach Lessons, WannaCry’s Re-emergence, Genesis Marketplace, and more</itunes:title>
    <title>Episode 14: Panera Breach Lessons, WannaCry’s Re-emergence, Genesis Marketplace, and more</title>
    <itunes:summary><![CDATA[This week’s Shadow Talk discusses what the re-emergence of WannaCry, exposure of Aggregate IQ data, exposure of 1.5 billion files through misconfigured services, as well as lessons learned from the Panera breach, an emerging new criminal market, and much more.]]></itunes:summary>
    <description><![CDATA[This week’s Shadow Talk discusses what the re-emergence of WannaCry, exposure of Aggregate IQ data, exposure of 1.5 billion files through misconfigured services, as well as lessons learned from the Panera breach, an emerging new criminal market, and much more.]]></description>
    <content:encoded><![CDATA[This week’s Shadow Talk discusses what the re-emergence of WannaCry, exposure of Aggregate IQ data, exposure of 1.5 billion files through misconfigured services, as well as lessons learned from the Panera breach, an emerging new criminal market, and much more.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461352-episode-14-panera-breach-lessons-wannacry-s-re-emergence-genesis-marketplace-and-more.mp3" length="15660665" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/1n4nddvl7cdutq8ke0qfznmp4bfq?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/425799996</guid>
    <pubDate>Sun, 08 Apr 2018 22:00:00 -0400</pubDate>
    <itunes:duration>1301</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 13: Cambridge Analytica, Trickbot Updates, SamSam Surge Continues, And Dragonfly Attributed</itunes:title>
    <title>Episode 13: Cambridge Analytica, Trickbot Updates, SamSam Surge Continues, And Dragonfly Attributed</title>
    <itunes:summary><![CDATA[This week’s Shadow Talk discusses what the Cambridge Analytica revelations mean for disinformation and personal privacy, updates to Trickbot, Zeus Panda and Remnit trojans, City of Atlanta suffers from ransomware attack, and Dragonfly campaign attribution to Russian Government.]]></itunes:summary>
    <description><![CDATA[This week’s Shadow Talk discusses what the Cambridge Analytica revelations mean for disinformation and personal privacy, updates to Trickbot, Zeus Panda and Remnit trojans, City of Atlanta suffers from ransomware attack, and Dragonfly campaign attribution to Russian Government.]]></description>
    <content:encoded><![CDATA[This week’s Shadow Talk discusses what the Cambridge Analytica revelations mean for disinformation and personal privacy, updates to Trickbot, Zeus Panda and Remnit trojans, City of Atlanta suffers from ransomware attack, and Dragonfly campaign attribution to Russian Government.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461353-episode-13-cambridge-analytica-trickbot-updates-samsam-surge-continues-and-dragonfly-attributed.mp3" length="16486782" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/c8pvidyhzfvveufkb1rtcv82hpx0?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/418481408</guid>
    <pubDate>Fri, 23 Mar 2018 15:33:35 -0400</pubDate>
    <itunes:duration>1369</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 12: Tax Fraud, AMD Vulnerability, Slingshot Targets Mikrotik Routers, And Hermes Ransomware</itunes:title>
    <title>Episode 12: Tax Fraud, AMD Vulnerability, Slingshot Targets Mikrotik Routers, And Hermes Ransomware</title>
    <itunes:summary><![CDATA[This week’s Shadow Talk outlines the latest techniques in tax return fraud, claimed vulnerabilities in AMD chips, Slingshot malware targeting Mikrotik routers, and Greenflash Sundown Exploit Kit delivering Hermes ransomware. Watch our webinar with the FBI on the latest ransomware threats here: https://info.digitalshadows.com/FBIRansomwareThreats-WebinarOnDemand-ShadowTalk.html]]></itunes:summary>
    <description><![CDATA[This week’s Shadow Talk outlines the latest techniques in tax return fraud, claimed vulnerabilities in AMD chips, Slingshot malware targeting Mikrotik routers, and Greenflash Sundown Exploit Kit delivering Hermes ransomware. Watch our webinar with the FBI on the latest ransomware threats here: https://info.digitalshadows.com/FBIRansomwareThreats-WebinarOnDemand-ShadowTalk.html]]></description>
    <content:encoded><![CDATA[This week’s Shadow Talk outlines the latest techniques in tax return fraud, claimed vulnerabilities in AMD chips, Slingshot malware targeting Mikrotik routers, and Greenflash Sundown Exploit Kit delivering Hermes ransomware. Watch our webinar with the FBI on the latest ransomware threats here: https://info.digitalshadows.com/FBIRansomwareThreats-WebinarOnDemand-ShadowTalk.html]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461354-episode-12-tax-fraud-amd-vulnerability-slingshot-targets-mikrotik-routers-and-hermes-ransomware.mp3" length="16324805" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ongk9z3fjnnjhasaj2ugwix7cct4?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/414727092</guid>
    <pubDate>Fri, 16 Mar 2018 14:47:06 -0400</pubDate>
    <itunes:duration>1355</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 11: Memcached attacks, disinformation in ME, Spectre exploit, German gov network intrusion</itunes:title>
    <title>Episode 11: Memcached attacks, disinformation in ME, Spectre exploit, German gov network intrusion</title>
    <itunes:summary><![CDATA[Digital Shadows’ Research team discusses record DDoS attacks using Memcached servers, disinformation campaigns, a proof of concept exploit for the Spectre vulnerability, and new details of a historical network intrusion affecting the German government.]]></itunes:summary>
    <description><![CDATA[Digital Shadows’ Research team discusses record DDoS attacks using Memcached servers, disinformation campaigns, a proof of concept exploit for the Spectre vulnerability, and new details of a historical network intrusion affecting the German government.]]></description>
    <content:encoded><![CDATA[Digital Shadows’ Research team discusses record DDoS attacks using Memcached servers, disinformation campaigns, a proof of concept exploit for the Spectre vulnerability, and new details of a historical network intrusion affecting the German government.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461355-episode-11-memcached-attacks-disinformation-in-me-spectre-exploit-german-gov-network-intrusion.mp3" length="14288071" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/h5m7sv9iigqzbjbttxs9tvo5cr7r?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/411225216</guid>
    <pubDate>Fri, 09 Mar 2018 14:09:16 -0500</pubDate>
    <itunes:duration>1188</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 10: Memecached Server DDoS, Flash Vuln in Spam Campaign, Trustico Cert Issues, &amp; Ransomware</itunes:title>
    <title>Episode 10: Memecached Server DDoS, Flash Vuln in Spam Campaign, Trustico Cert Issues, &amp; Ransomware</title>
    <itunes:summary><![CDATA[The Digital Shadows research team provides an overview of the latest news this week, including CVE-2018-4878 that’s now being used in a spam campaign, 23,000 website certificates set to be revoked, Memecached Server Used for DDoS Reflection, and updates on SamSam and DataKeeper ransomware variants.]]></itunes:summary>
    <description><![CDATA[The Digital Shadows research team provides an overview of the latest news this week, including CVE-2018-4878 that’s now being used in a spam campaign, 23,000 website certificates set to be revoked, Memecached Server Used for DDoS Reflection, and updates on SamSam and DataKeeper ransomware variants.]]></description>
    <content:encoded><![CDATA[The Digital Shadows research team provides an overview of the latest news this week, including CVE-2018-4878 that’s now being used in a spam campaign, 23,000 website certificates set to be revoked, Memecached Server Used for DDoS Reflection, and updates on SamSam and DataKeeper ransomware variants.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461356-episode-10-memecached-server-ddos-flash-vuln-in-spam-campaign-trustico-cert-issues-ransomware.mp3" length="15994858" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/to67lz4x8di4b6cyz903aki8l5jp?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/407748060</guid>
    <pubDate>Fri, 02 Mar 2018 15:32:41 -0500</pubDate>
    <itunes:duration>1328</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 9: SWIFT Attacks, Business Email Compromise, Return Of Thedarkoverlord, And APT - 37</itunes:title>
    <title>Episode 9: SWIFT Attacks, Business Email Compromise, Return Of Thedarkoverlord, And APT - 37</title>
    <itunes:summary><![CDATA[The Digital Shadows research team provides an overview of the latest news this week, including new SWIFT attacks, more Business Email Compromise activity, the return of extortionist “thedarkoverlord”, Sam Sam and Saturn ransomware variants, and new reporting on APT-37.]]></itunes:summary>
    <description><![CDATA[The Digital Shadows research team provides an overview of the latest news this week, including new SWIFT attacks, more Business Email Compromise activity, the return of extortionist “thedarkoverlord”, Sam Sam and Saturn ransomware variants, and new reporting on APT-37.]]></description>
    <content:encoded><![CDATA[The Digital Shadows research team provides an overview of the latest news this week, including new SWIFT attacks, more Business Email Compromise activity, the return of extortionist “thedarkoverlord”, Sam Sam and Saturn ransomware variants, and new reporting on APT-37.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461357-episode-9-swift-attacks-business-email-compromise-return-of-thedarkoverlord-and-apt-37.mp3" length="14409260" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/j7utlru90702nuv3m4qub1ppmb6z?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/404134197</guid>
    <pubDate>Fri, 23 Feb 2018 13:17:08 -0500</pubDate>
    <itunes:duration>1195</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 8: Lazarus Group, Olympics opening ceremony, Bitgrail Theft, and Outlook vulnerabilities</itunes:title>
    <title>Episode 8: Lazarus Group, Olympics opening ceremony, Bitgrail Theft, and Outlook vulnerabilities</title>
    <itunes:summary><![CDATA[The Digital Shadows Research team provides our analysis of the fascinating Lazarus Group, attacks on the Winter Olympics opening ceremony, the problems with attribution, the theft of $170 million from the Bitgrail exchange, and two newly discovered Outlook vulnerabilities.]]></itunes:summary>
    <description><![CDATA[The Digital Shadows Research team provides our analysis of the fascinating Lazarus Group, attacks on the Winter Olympics opening ceremony, the problems with attribution, the theft of $170 million from the Bitgrail exchange, and two newly discovered Outlook vulnerabilities.]]></description>
    <content:encoded><![CDATA[The Digital Shadows Research team provides our analysis of the fascinating Lazarus Group, attacks on the Winter Olympics opening ceremony, the problems with attribution, the theft of $170 million from the Bitgrail exchange, and two newly discovered Outlook vulnerabilities.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461358-episode-8-lazarus-group-olympics-opening-ceremony-bitgrail-theft-and-outlook-vulnerabilities.mp3" length="16392339" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/wo9plvj6ia3regep8nxqiuykd7x4?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/400677996</guid>
    <pubDate>Fri, 16 Feb 2018 14:33:07 -0500</pubDate>
    <itunes:duration>1364</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 7: Operation Pzchao, Threats To The Winter Olympics, Infraud Forum Arrests, And More</itunes:title>
    <title>Episode 7: Operation Pzchao, Threats To The Winter Olympics, Infraud Forum Arrests, And More</title>
    <itunes:summary><![CDATA[The Digital Shadows Research team provides our analysis of the espionage-driven campaign Operation Pzchao, an Adobe zero-day vulnerability, malware in Winter Olympics spearphishing campaign, a WordPress denial of service vulnerability, and the takedown of the notorious “Infraud Forum”.]]></itunes:summary>
    <description><![CDATA[The Digital Shadows Research team provides our analysis of the espionage-driven campaign Operation Pzchao, an Adobe zero-day vulnerability, malware in Winter Olympics spearphishing campaign, a WordPress denial of service vulnerability, and the takedown of the notorious “Infraud Forum”.]]></description>
    <content:encoded><![CDATA[The Digital Shadows Research team provides our analysis of the espionage-driven campaign Operation Pzchao, an Adobe zero-day vulnerability, malware in Winter Olympics spearphishing campaign, a WordPress denial of service vulnerability, and the takedown of the notorious “Infraud Forum”.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461359-episode-7-operation-pzchao-threats-to-the-winter-olympics-infraud-forum-arrests-and-more.mp3" length="16357847" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/xze77436k5ol4rem78nur80iv04d?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/397001070</guid>
    <pubDate>Fri, 09 Feb 2018 13:59:33 -0500</pubDate>
    <itunes:duration>1358</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 6: Cryptocurrency Fraud In-Depth</itunes:title>
    <title>Episode 6: Cryptocurrency Fraud In-Depth</title>
    <itunes:summary><![CDATA[The Digital Shadows Research team discuss how criminal actors have capitalized on the increased interest in cryptocurrencies. The podcast looks at different approaches to mining fraud, account takeover and Initial Coin Offering fraud. Download a copy of the research here: https://info.digitalshadows.com/TheNewGoldRushCryptocurrency-Podcast.html]]></itunes:summary>
    <description><![CDATA[The Digital Shadows Research team discuss how criminal actors have capitalized on the increased interest in cryptocurrencies. The podcast looks at different approaches to mining fraud, account takeover and Initial Coin Offering fraud. Download a copy of the research here: https://info.digitalshadows.com/TheNewGoldRushCryptocurrency-Podcast.html]]></description>
    <content:encoded><![CDATA[The Digital Shadows Research team discuss how criminal actors have capitalized on the increased interest in cryptocurrencies. The podcast looks at different approaches to mining fraud, account takeover and Initial Coin Offering fraud. Download a copy of the research here: https://info.digitalshadows.com/TheNewGoldRushCryptocurrency-Podcast.html]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461360-episode-6-cryptocurrency-fraud-in-depth.mp3" length="15348381" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5tdxxopa1f4x725b89b9319pifnn?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/395533503</guid>
    <pubDate>Tue, 06 Feb 2018 16:54:00 -0500</pubDate>
    <itunes:duration>1273</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 5: $530 Million Cyber Heist, DDoS Against Dutch Banks, And The Future Of Anonymous</itunes:title>
    <title>Episode 5: $530 Million Cyber Heist, DDoS Against Dutch Banks, And The Future Of Anonymous</title>
    <itunes:summary><![CDATA[The Digital Shadows Research team provides our analysis of the $530 million Coincheck cryptocurrency heist, recent DDoS attacks against Dutch financial services organizations, renewed OpCatalunya activity, updates on the Spectre and Meltdown flaws, and a potentially serious vulnerability affecting Cisco VPNs.]]></itunes:summary>
    <description><![CDATA[The Digital Shadows Research team provides our analysis of the $530 million Coincheck cryptocurrency heist, recent DDoS attacks against Dutch financial services organizations, renewed OpCatalunya activity, updates on the Spectre and Meltdown flaws, and a potentially serious vulnerability affecting Cisco VPNs.]]></description>
    <content:encoded><![CDATA[The Digital Shadows Research team provides our analysis of the $530 million Coincheck cryptocurrency heist, recent DDoS attacks against Dutch financial services organizations, renewed OpCatalunya activity, updates on the Spectre and Meltdown flaws, and a potentially serious vulnerability affecting Cisco VPNs.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461361-episode-5-530-million-cyber-heist-ddos-against-dutch-banks-and-the-future-of-anonymous.mp3" length="14341610" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/hykrlrgyx4grwqhvg2zhy51armf8?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/393594957</guid>
    <pubDate>Fri, 02 Feb 2018 15:54:16 -0500</pubDate>
    <itunes:duration>1193</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 4: Dridex, Dark Caracal, Turla, Cozy Bear, And More</itunes:title>
    <title>Episode 4: Dridex, Dark Caracal, Turla, Cozy Bear, And More</title>
    <itunes:summary><![CDATA[The Digital Shadows Research Team provides an update on Dridex malware, Dark Caracal, Turla, and Cozy Bear.]]></itunes:summary>
    <description><![CDATA[The Digital Shadows Research Team provides an update on Dridex malware, Dark Caracal, Turla, and Cozy Bear.]]></description>
    <content:encoded><![CDATA[The Digital Shadows Research Team provides an update on Dridex malware, Dark Caracal, Turla, and Cozy Bear.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461362-episode-4-dridex-dark-caracal-turla-cozy-bear-and-more.mp3" length="14305000" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/dgopqa1chh2xravjjwj9l3ikeno7?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/389606649</guid>
    <pubDate>Fri, 26 Jan 2018 16:16:41 -0500</pubDate>
    <itunes:duration>1187</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 3: CVE-2018 -0802, Mirai Okiru, Bancomext Targeted, and Triton Malware</itunes:title>
    <title>Episode 3: CVE-2018 -0802, Mirai Okiru, Bancomext Targeted, and Triton Malware</title>
    <itunes:summary><![CDATA[The Digital Shadows Research team provides an analysis of the last seven days, including an update on Spectre and Meltdown, a new MS Office vulnerability, Mirai Okiru, the targeting of Bancomext, and Triton malware targeting industrial control systems.]]></itunes:summary>
    <description><![CDATA[The Digital Shadows Research team provides an analysis of the last seven days, including an update on Spectre and Meltdown, a new MS Office vulnerability, Mirai Okiru, the targeting of Bancomext, and Triton malware targeting industrial control systems.]]></description>
    <content:encoded><![CDATA[The Digital Shadows Research team provides an analysis of the last seven days, including an update on Spectre and Meltdown, a new MS Office vulnerability, Mirai Okiru, the targeting of Bancomext, and Triton malware targeting industrial control systems.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461363-episode-3-cve-2018-0802-mirai-okiru-bancomext-targeted-and-triton-malware.mp3" length="16911442" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/n4zzwnn5dfs1q0l0k5q1rr8o4tfk?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/386103791</guid>
    <pubDate>Fri, 19 Jan 2018 14:14:30 -0500</pubDate>
    <itunes:duration>1404</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 2: CoffeeMiner, Turla, and Cyber Threats to the Winter Olympics</itunes:title>
    <title>Episode 2: CoffeeMiner, Turla, and Cyber Threats to the Winter Olympics</title>
    <itunes:summary><![CDATA[The Digital Shadows team discusses the highlights of the past seven days, including the crypto currency mining “CoffeeMiner”, new Turla activity, and cyber threats to the Winter Olympics.]]></itunes:summary>
    <description><![CDATA[The Digital Shadows team discusses the highlights of the past seven days, including the crypto currency mining “CoffeeMiner”, new Turla activity, and cyber threats to the Winter Olympics.]]></description>
    <content:encoded><![CDATA[The Digital Shadows team discusses the highlights of the past seven days, including the crypto currency mining “CoffeeMiner”, new Turla activity, and cyber threats to the Winter Olympics.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461364-episode-2-coffeeminer-turla-and-cyber-threats-to-the-winter-olympics.mp3" length="12254439" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/jdzl7ddrs1p9ixdgp644atovulx4?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/382727531</guid>
    <pubDate>Fri, 12 Jan 2018 16:52:52 -0500</pubDate>
    <itunes:duration>1017</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 1: Spectre, Meltdown, Satori, and OpNetNeutrality</itunes:title>
    <title>Episode 1: Spectre, Meltdown, Satori, and OpNetNeutrality</title>
    <itunes:summary><![CDATA[The Digital Shadows team discusses the highlights of the past seven days, including Meltdown and Spectre, the release of Satori code, OpNetNeutrality, OpIcarus and Monero mining malware.]]></itunes:summary>
    <description><![CDATA[The Digital Shadows team discusses the highlights of the past seven days, including Meltdown and Spectre, the release of Satori code, OpNetNeutrality, OpIcarus and Monero mining malware.]]></description>
    <content:encoded><![CDATA[The Digital Shadows team discusses the highlights of the past seven days, including Meltdown and Spectre, the release of Satori code, OpNetNeutrality, OpIcarus and Monero mining malware.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2154459/episodes/12461365-episode-1-spectre-meltdown-satori-and-opnetneutrality.mp3" length="14136986" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/gzj02vnez8a6ujwok45guzncrgdi?.jpg" />
    <itunes:author>Digital Shadows</itunes:author>
    <guid isPermaLink="false">tag:soundcloud,2010:tracks/379251737</guid>
    <pubDate>Fri, 05 Jan 2018 13:23:08 -0500</pubDate>
    <itunes:duration>1173</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
