DiscoverSecurity Unlocked
Security Unlocked

Security Unlocked

Author: Microsoft

Subscribed: 154Played: 2,872
Share

Description

Security Unlocked presents The BlueHat Podcast

 

From 2020 to 2022, Security Unlocked, hosted by Nic Fillingham and Natalia Godyla, explored the technology and people powering Microsoft's Security solutions.

 

Today, the Security Unlocked feed brings you new episodes from The BlueHat Podcast where hosts Nic Fillingham and Wendy Zenone speak with security researchers, responders, hackers and industry leaders, both inside and outside of Microsoft, working to secure the planet's technology and create a safer world for all.


Hosted on Acast. See acast.com/privacy for more information.

67 Episodes
Reverse
In this episode of The BlueHat Podcast, host Nic Fillingham is joined by George Hughey from Microsoft who returns to discuss his Blue Hat India talk on variant hunting, explaining how MSRC uses submission data from hacking competitions like Pwn2Own and Tianfu Cup to uncover additional security vulnerabilities in Windows. George shares how incentives in competitions differ from bug bounty programs, how tools like CodeQL assist variant hunting, and why collaborating with the security research community is key to improving Windows security.   In This Episode You Will Learn:   How hacking competitions help find real-world Windows vulnerabilities The role of MSRC in hunting variants beyond submitted vulnerabilities Why fuzzing is not always effective for modern edge cases  Some Questions We Ask:  How do you decide which cases to pursue for variant hunting? What advice do you have for researchers submitting variants? How does the CodeQL team collaborate with your team?      Resources:      View George Hughey on LinkedIn     View Wendy Zenone on LinkedIn   View Nic Fillingham on LinkedIn     Related Microsoft Podcasts:     Microsoft Threat Intelligence Podcast   Afternoon Cyber Tea with Ann Johnson   Uncovering Hidden Risks       Discover and follow other Microsoft podcasts at microsoft.com/podcasts    Hosted on Acast. See acast.com/privacy for more information.
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Mike Macelletti from Microsoft’s MSRC Vulnerabilities and Mitigations team to explore Redirection Guard, a powerful mitigation designed to tackle a long-standing class of file path redirection vulnerabilities in Windows. Mike shares how his interest in security began, the journey behind developing Redirection Guard, and how it's helping reduce a once-common bug class across Microsoft products. He also explains how the feature works, why it's impactful, and what developers can do to adopt it. Plus, a few fun detours into Solitaire hacking, skiing, and protein powder.   In This Episode You Will Learn:   What Redirection Guard is and how it helps prevent file system vulnerabilities How Microsoft identifies and addresses common bug classes across their ecosystem Why some vulnerabilities still slip past Redirection Guard and what’s out of scope  Some Questions We Ask:  What is a junction and how is it different from other redirects? How does Redirection Guard decide which shortcuts to block? Are there vulnerabilities Redirection Guard doesn’t cover?      Resources:      View Mike Macelletti on LinkedIn     View Wendy Zenone on LinkedIn   View Nic Fillingham on LinkedIn     Related Microsoft Podcasts:     Microsoft Threat Intelligence Podcast   Afternoon Cyber Tea with Ann Johnson   Uncovering Hidden Risks       Discover and follow other Microsoft podcasts at microsoft.com/podcasts    Hosted on Acast. See acast.com/privacy for more information.
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share Ram Shankar Siva Kumar’s dynamic keynote from BlueHat India 2025, where he explores the evolving threat landscape of AI through the lens of the Microsoft AI Red Team. From adversarial machine learning to psychosocial harms and persuasive AI, Ram highlights real-world case studies, including prompt injection, content safety violations, and memory poisoning in AI agents. Ram underscores the urgent need for robust red teaming practices to secure AI systems against traditional security flaws and emerging threats across images, text, audio, and autonomous agents.  In This Episode You Will Learn:   Why old-school security flaws still break modern AI systems Real-world AI red teaming in action, from scams to memory hacks How small input tweaks can fool AI across images, audio, and text  Some Questions We Ask:  Can attackers fool AI using just slight image changes? Are generative AI systems vulnerable to prompt manipulation? Do you need to be an expert to break an AI model?    Resources:      View Ram Shankar Siva Kumar on LinkedIn    View Wendy Zenone on LinkedIn   View Nic Fillingham on LinkedIn  Watch Ram’s BlueHat India 2025 Keynote: BlueHat India 2025 Day 2 Keynote - Ram Shankar Siva Kumar Listen to Ram’s Previous Appearance on The BlueHat Podcast: Not with a Bug but with a Sticker  Related Microsoft Podcasts:     Microsoft Threat Intelligence Podcast   Afternoon Cyber Tea with Ann Johnson   Uncovering Hidden Risks       Discover and follow other Microsoft podcasts at microsoft.com/podcasts    Hosted on Acast. See acast.com/privacy for more information.
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share David Weston’s keynote from BlueHat India 2025. David explores the growing role of on-device AI in Windows, the security risks it introduces, and how Microsoft is rethinking architecture to defend against new threats like model tampering, data exfiltration, and AI-powered malware. He also shares insights on innovations like Windows Recall, biometric protection, and the future of secure, agentic operating systems.  In This Episode You Will Learn:   How AI integration in Windows (like Windows Recall and MS Paint) is evolving Emerging threats from protocols like MCP and CUAs What a “confused deputy” attack is, and how Microsoft is protecting users  Some Questions We Ask:  What are the biggest security threats in on-device AI—data, model, or runtime? Can AI be used to accelerate post-compromise attacks? What will it take to bring Azure-level confidential computing to the consumer device?      Resources:      View David Weston on LinkedIn   View Wendy Zenone on LinkedIn   View Nic Fillingham on LinkedIn     Related Microsoft Podcasts:     Microsoft Threat Intelligence Podcast   Afternoon Cyber Tea with Ann Johnson   Uncovering Hidden Risks       Discover and follow other Microsoft podcasts at microsoft.com/podcasts    Hosted on Acast. See acast.com/privacy for more information.
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Felix Boulet fresh off his participation in Zero Day Quest. Felix talks about his unique journey from industrial maintenance to becoming a full-time vulnerability researcher, and how that background fuels his passion for hacking and bug bounty work. He explains his method for finding bugs in Microsoft products—particularly in identity systems—and why identity is such a valuable target for attackers. Felix also shares highlights from the Zero Day Quest event, where he focused on building connections, learning from Microsoft engineers, and experiencing the collaborative side of the security community.   In This Episode You Will Learn: Why identity-based bugs are especially valuable and dangerous in the security worldWhen breaking identity controls can be the key to pivoting through an entire systemHow SharePoint's concept of "virtual files" impacts vulnerability validation Some Questions We Ask: What was your first bug bounty experience?Can you explain what the flash challenges were and what your experience was like?Do you think sharing bug ideas could cost you a bounty?     Resources:View Felix Boulet on LinkedInView Wendy Zenone on LinkedIn   View Nic Fillingham on LinkedIn   Related Microsoft Podcasts:  Microsoft Threat Intelligence Podcast Afternoon Cyber Tea with Ann Johnson Uncovering Hidden Risks     Discover and follow other Microsoft podcasts at microsoft.com/podcasts Hosted on Acast. See acast.com/privacy for more information.
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Marco Ivaldi, co-founder and technical director of HN Security, a boutique company specializing in offensive security services, shares his journey from hacking as a teenager in the '80s to becoming a key figure in the security research community. With nearly three decades of experience in cybersecurity, Marco digs into the ongoing challenges, particularly in Active Directory and password security, highlighting vulnerabilities that continue to pose significant risks today. He recounts his unexpected path into bug bounty hunting, including his involvement in Microsoft's Zero Day Quest and his passion for auditing real-time operating systems like Azure RTOS.    In This Episode You Will Learn:   How Marco taught himself BASIC and assembly through cassette tapes and trips to local libraries Why mentorship and positive leadership can catapult your cybersecurity career When measuring network response times can unintentionally leak valuable info  Some Questions We Ask:  Do you remember the first time you made code do something unexpected? What was your experience like in the Zero Day Quest building for those three days? How are you thinking of approaching fuzzing after Zero Day Quest?      Resources:      View Marco Ivaldi on LinkedIn     View Wendy Zenone on LinkedIn   View Nic Fillingham on LinkedIn   HN SECURITY Learn More About Marco   Related Microsoft Podcasts:     Microsoft Threat Intelligence Podcast   Afternoon Cyber Tea with Ann Johnson   Uncovering Hidden Risks       Discover and follow other Microsoft podcasts at microsoft.com/podcasts    The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.   Hosted on Acast. See acast.com/privacy for more information.
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Dhiral Patel, Senior Security Engineer at ZoomInfo and one of MSRC’s Most Valuable Researchers (MVR). Dhiral shares how a hacked Facebook account sparked his passion for ethical hacking. From web development to penetration testing, Dhiral has become a top bug hunter, landing multiple spots on the MSRC leaderboards. Dhiral reflects on his early MSRC submissions and lessons learned. He also discusses the importance of mastering web security basics, practicing on platforms like TryHackMe and Hack the Box, and staying connected with the bug bounty community.    In This Episode You Will Learn:   The importance of mastering web security basics before diving into bug bounty hunting Why hands-on platforms like TryHackMe and Hack the Box are perfect for beginners Dhiral’s journey from blogging to freelancing and security research  Some Questions We Ask:  How do you balance competition and collaboration in the bug bounty community? Can you explain what clickjacking is and if it still works today? Why did you start with Power BI, and how did it lead to your journey in security?      Resources:      View Dhiral Patel on LinkedIn    View Wendy Zenone on LinkedIn   View Nic Fillingham on LinkedIn    Related Microsoft Podcasts:     Microsoft Threat Intelligence Podcast   Afternoon Cyber Tea with Ann Johnson   Uncovering Hidden Risks       Discover and follow other Microsoft podcasts at microsoft.com/podcasts    Hosted on Acast. See acast.com/privacy for more information.
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by security researcher Tobias Diehl, a top contributor to the Microsoft Security Research Center (MSRC) leaderboards and a Most Valuable Researcher. Tobias shares his journey from IT support to uncovering vulnerabilities in Microsoft products. He discusses his participation in the upcoming Zero Day Quest hacking challenge and breaks down a recent discovery involving Power Automate, where he identified a security flaw that could be exploited via malicious URLs. Tobias explains how developers can mitigate such risks and the importance of strong proof-of-concept submissions in security research. In This Episode You Will Learn: Researching vulnerabilities in Power Automate, Power Automate Desktop, and AzureThe importance of user prompts to prevent unintended application behaviorKey vulnerabilities Tobias looks for when researching Microsoft productsSome Questions We Ask:Have you submitted any AI-related findings to Microsoft or other bug bounty programs?How does the lack of visibility into AI models impact the research process?Has your approach to security research changed when working with AI versus traditional systems?  Resources:     View Tobias Diehl on LinkedIn   View Wendy Zenone on LinkedIn  View Nic Fillingham on LinkedIn Related Microsoft Podcasts:   Microsoft Threat Intelligence Podcast  Afternoon Cyber Tea with Ann Johnson  Uncovering Hidden Risks  Discover and follow other Microsoft podcasts at microsoft.com/podcasts   Hosted on Acast. See acast.com/privacy for more information.
The success of crypto inspired dozens of other cryptocurrencies like Ethereum, Tether, and Dogecoin. Today, people worldwide use cryptocurrencies to buy things, sell things, and make investments. One thing is certain; digital currencies are here to stay, no matter how many times you have to explain what a bitcoin is. Unfortunately, it also created the world of cryptojacking, a form of cybercrime that remains completely hidden from the target and can infect millions of computers with cryptojacking malware. Which brings us to the fundamental question: What can organizations do to protect themselves?  In this episode of Security Unlocked, hosts Natalia Godyla and Nic Fillingham are joined by Microsoft senior software engineer Amitrajit Banerjee and senior staff architect at Intel Rahul Ghosh to discuss the history and prevalence of cryptojacking. The push behind a cryptojacking attack is almost always motivated by money. Mining cryptocurrencies can be very lucrative, but making a profit is challenging unless you cover high costs. They discuss the importance of understanding the actual concept of mining, how victims' CPU power and computing resources can be used, and why it isn't easy in general to detect crypto miners.   In This Episode You Will Learn:    How prevalent is cryptojacking and who should be worried When and how people are exposed to these new types of threats Why you should be familiar with cryptojacking  Some Questions We Ask:    How are victims' CPU power and computing resources used to mine cryptocurrencies? What created this environment where cryptojacking is possible? What are some general techniques when trying to identify cryptojacking?   Resources:   The increasing threat of cryptocurrency miners Defending against cryptojacking Guidance for preventing, detecting, and hunting for exploitation  View Amitrajit Banerjee on LinkedIn View Rahul Ghosh on LinkedIn View Nic on LinkedIn  View Natalia on LinkedIn    Related:   Listen to: Security Unlocked: CISO Series with Bret Arsenault     Listen to: Afternoon Cyber Tea with Ann Johnson    Discover and follow other Microsoft podcasts at microsoft.com/podcastsSecurity Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.      Hosted on Acast. See acast.com/privacy for more information.
Ransomware attacks have never been so successful. The returns from these attacks are soaring and only becoming easier to conduct. In chapter two of the Microsoft Digital Defense Report, the growing threat of cybercrime is covered in great detail. As we continue to go over the MDDR, it's more apparent than ever that the cybercrime economy and services it provides are stronger and more complex than ever. Cryptocurrency, malware, and adversarial machine learning are just a few of the topics we believe need to be covered in more detail.  In this episode of Security Unlocked, host’s Natalia Godyla and Nic Fillingham are joined by Jason Lyons, principal investigator in the digital crimes unit at Microsoft. Jason is an experienced investigator specializing in computer investigations. He is trained and experienced in hacker methodology/techniques, computer forensics, and incident response. Jason joined the show to discuss Chapter two of the Microsoft Digital Defense Report, which focuses on the state of cybercrime. He also speaks on how cryptocurrency has created new challenges in ransomware, why ransomware continues to grow, and recent trends we are currently seeing in malware.    In This Episode You Will Learn:     How to decide whether to pay the ransomware or not New ways for security teams to protect against malware Why we are seeing a rise in cybercrime due to cryptocurrency.   Some Questions We Ask:    What's new in the way the cybercrime economy operates?  Why is ransomware still such a big thing and maybe even getting bigger? What trends are we seeing with malware right now?   Resources:   Microsoft Digital Defense Report  View Jason Lyons on LinkedIn  View Nic on LinkedIn  View Natalia on LinkedIn    Related:   Listen to: Security Unlocked: CISO Series with Bret Arsenault     Listen to: Afternoon Cyber Tea with Ann Johnson    Discover and follow other Microsoft podcasts at microsoft.com/podcastsSecurity Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.      Hosted on Acast. See acast.com/privacy for more information.
What’s a BISO?

What’s a BISO?

2022-01-1939:45

Everything is exciting and new when you're a kid, and curiosity inspires many of us to branch out and try new things. For some, that means drawing from our imagination or trying all kinds of sports. And for others it means spending days at the library, checking out books on modem communications, and eventually hacking into the local dial-up community service. That's just a random example, of course... Either way, curiosity can be a powerful tool, even at a young age. To the point that it may help kickstart a career, you didn't even know existed.  In this episode of Security Unlocked, host Natalia Godyla is joined by S&P Global Ratings BISO Alyssa Miller. Alyssa is a life-long hacker and highly experienced security executive. She runs the security strategy for S&P Global Ratings as the Business Information Security Officer (BISO), bringing together corporate security objectives and business objectives. Natalia and Alyssa discuss her journey in security from a young and curious hacker to a BISO of the largest credit-rating agency, and how she is shaping what the role of the BISO will be for future generations.    In This Episode You Will Learn:    What are the roles and responsibilities of a BISO  How a BISO should interact with the rest of the organization How to put yourself on track to become a BISO    Some Questions We Ask:    What are the gaps that the BISO function is trying to address? What other roles should exist in security, but don’t?  How will the BISO role evolve over time?   Resources:   View Alyssa Miller on LinkedIn View Nic on LinkedIn  View Natalia on LinkedIn    Related:   Listen to: Security Unlocked: CISO Series with Bret Arsenault     Listen to: Afternoon Cyber Tea with Ann Johnson    Discover and follow other Microsoft podcasts at microsoft.com/podcastsSecurity Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.    Hosted on Acast. See acast.com/privacy for more information.
Disinformation refers to the calculated use of false information to influence others and has been a steadily growing form of information warfare. Unfortunately, disinformation is everywhere these days, often hidden in plain sight. Criminals will also adapt and take advantage of technologies, such as AI and deepfakes, to increase the effectiveness of disinformation campaigns. Of course, there are ways to combat these types of attacks, and we cover recommendations for protecting the enterprise in the 2021 Microsoft Digital Defense Report (MDDR).  In this episode of Security Unlocked, hosts Natalia Godyla and Nic Fillingham are joined by the Director of Enterprise Continuity and Resilience at Microsoft, Irfan Mirza, who authored the chapter on disinformation in the enterprise in the 2021 MDDR. Irfan joins to discuss what disinformation is, why the use of disinformation is growing, how cognitive hacking occurs, and how cybersecurity can start thinking about adapting their strategies. In This Episode You Will Learn:    How to identify disinformation campaigns  How to train users and protect your organization from disinformation   Why we need AI to defend against disinformation  Some Questions We Ask:    What is the difference between misinformation and disinformation? How does disinformation impact cybersecurity? What new skills do cybersecurity professionals need to be able to protect the enterprise from this new threat?  Resources:   Microsoft Digital Defense Report 2021 View Irfan Mirza on LinkedIn  View Nic on LinkedIn  View Natalia on LinkedIn    Related:     Listen to: Security Unlocked: CISO Series with Bret Arsenault     Listen to: Afternoon Cyber Tea with Ann Johnson    Discover and follow other Microsoft podcasts at microsoft.com/podcastsSecurity Unlocked is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.
I am Shroot-less

I am Shroot-less

2021-12-2236:09

Microsoft works around the clock to protect their customers, no matter what product they’re using, Microsoft or otherwise. In some instances Microsoft teams up with other companies, creating an all-star cybersecurity team, to handle newly discovered vulnerabilities. It helps everyone stay more secure, and of course, that's the ultimate goal, right?   In this episode of Security Unlocked, hosts Natalia Godyla and Nic Fillingham are re-joined by Jonathan Bar Or, Principal Security Researcher at Microsoft. Jonathan discusses the recently discovered vulnerability that could let attackers bypass System Integrity Protection (SIP) in macOS, why he believes in investing in cross-platform protection, and the importance of collaboration between security researchers, software vendors, and the larger security community.   In This Episode You Will Learn: What is System Integrity Protection (SIP) How attackers can bypass SIP How attackers can use the Shrootless vulnerability  Some Questions We Ask: How did you find the Shrootless vulnerability? How do you decide what products to assess? How does the process of submitting a vulnerability to Apple work?   Resources:   Microsoft finds new macOS vulnerability - Shrootless View Jonathan Bar Or on LinkedIn View Nic on LinkedIn  View Natalia on LinkedIn   Related:   Listen to: Security Unlocked: CISO Series with Bret Arsenault     Listen to: Afternoon Cyber Tea with Ann Johnson    Discover and follow other Microsoft podcasts at microsoft.com/podcastsSecurity Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.      Hosted on Acast. See acast.com/privacy for more information.
Decoding NOBELIUM

Decoding NOBELIUM

2021-12-0848:54

In December 2020, Microsoft began sharing information with the cybersecurity industry on a group of Russia-based hackers who gained access to multiple enterprises through vulnerable software code, stolen passwords, compromised on-premises servers, and minted SAML tokens. In this supply chain attack, hackers could access the SolarWinds code, slip malicious code into a piece of the software, and use the vendor’s legitimate software updates to spread malware to customer systems.   Security Unlocked is excited to share with you, Decoding NOBELIUM. The docuseries gives you an inside look into the NOBELIUM incident, now viewed as one of the most advanced nation-state and supply chain attacks in history, with stories from the frontline defenders who tracked and responded to the attackers. Resources: Decoding NOBELIUM: Video SeriesDefending Against Nation-State Attacks | Microsoft SecurityView Natalia on LinkedIn View Nic on LinkedIn Related:    Listen to: Security Unlocked: CISO Series with Bret Arsenault   Listen to: Afternoon Cyber Tea with Ann Johnson  Discover and follow other Microsoft podcasts at microsoft.com/podcastsSecurity Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.   Hosted on Acast. See acast.com/privacy for more information.
We are back, covering more of the 2021 Microsoft Digital Defense Report, and this time we’re taking a deep dive into chapter five on Hybrid Workforce Security and Zero Trust. Zero Trust means precisely what it sounds like, never assuming any device or identity is secure; it's like having major trust issues, but in a professional way. With most businesses moving to remote work because of the pandemic, cybercriminals, of course, found new ways to take advantage, especially since most people are now moving between business and personal activity online. For the first time, we’re going to cover a full 12-month recap of what securing the hybrid workforce has been like. In this episode of Security Unlocked, hosts Natalia Godyla and Nic Fillingham are joined by Carmichael Patton, Lead Architect for Microsoft's Internal Zero Trust Deployment. Carmichael joins the show to discuss security challenges and trends impacting the hybrid workforce, the three most significant insider risk vulnerabilities, and why some customers are still not using MFA. In This Episode You Will Learn:    Security challenges and trends impacting the hybrid workforce How Microsoft approached their Zero Trust journey  Prioritizing security initiatives during a time of massive change  Some Questions We Ask:    What were some of the major hybrid workforce attacks?  Why are some customers still not using MFA? When and how should you deal with insider risk? Resources:   Zero Trust Adoption Report The 2021 Microsoft Digital Defense Report  View Carmichael Patton on LinkedIn  View Nic on LinkedIn  View Natalia on LinkedIn  Related: Listen to: Security Unlocked: CISO Series with Bret Arsenault   Listen to: Afternoon Cyber Tea with Ann Johnson  Discover and follow other Microsoft podcasts at microsoft.com/podcastsSecurity Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.    Hosted on Acast. See acast.com/privacy for more information.
The way most people operate online these days, what would you even consider private anymore? We are so quick to share details about our job, home, friends, and family without even thinking about how much personal info we're giving away. Privacy and user agreements are a part of almost everyone's life at this point, and what do you know about them? For the most part, we often see a user agreement pop up, click agree and move on, but do you know what you just agreed to? Privacy choices have become routine, though they shouldn’t be. In this episode of Security Unlocked, hosts Natalia Godyla and Nic Fillingham are joined by Privacy Counsel and Data Protection Officer at Asana, Whitney Merrill. She is an accomplished attorney with 7+ years of privacy, data security, and data governance experience. Whitney discusses how to avoid common privacy mistakes, current privacy attack trends, and the importance of thinking like an attacker.   In This Episode You Will Learn:    The role of encryption in privacy  Privacy attack trends you should be paying attention to Why some organizations have different approaches to privacy   Some Questions We Ask:    How, and when, do privacy and security come together?  Why has a common framework been so difficult to establish?  Should regulators play a role in establishing a baseline of privacy awareness?   Resources:   View Whitney Merrill on LinkedIn View Nic on LinkedIn  View Natalia on LinkedIn   Related:     Listen to: Security Unlocked: CISO Series with Bret Arsenault   Listen to: Afternoon Cyber Tea with Ann Johnson  Discover and follow other Microsoft podcasts at microsoft.com/podcastsSecurity Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.   Hosted on Acast. See acast.com/privacy for more information.
The newfound popularity of the internet in the nineties spurned an obsession with hacking. Unfortunately, most movies believed that it wasn't possible to show real hacking and still be entertaining; hence all the awkward video game graphics and characters living in sketchy basements regularly yelling out, "We're in!" while pounding on their keyboards. I'd also like to address their outfit choices but now is not the appropriate time. The point is, hackers have been portrayed as the same character repeatedly when in reality, there are many possibilities to turn these skills into a legitimate career.    In this episode of Security Unlocked, hosts Natalia Godyla and Nic Fillingham are joined by Co-Founder and Chief Technology Officer at Veracode Chris Wysopal. In the ’90s, Chris was one of the first vulnerability researchers at The L0pht, a hacker think tank, where he publicized his findings on the dangers of insecure software. Chris shares guidance for anyone getting started with modern secure software development, the best tools to monitor for vulnerabilities in open-source code, and shares what he believes is one of the greatest threats to software development.   In This Episode You Will Learn:    How to use open-source code safely Best tools for monitoring vulnerabilities How to detect and respond to threats to insecure software  Some Questions We Ask:    What is modern secure software development?  What are the biggest threats to software today?  How should companies allocate ownership of secure code across the software development lifecycle?  Resources:   View Chris Wysopal on LinkedIn View Nic on LinkedIn  View Natalia on LinkedIn  Related:    Listen to: Afternoon Cyber Tea with Ann Johnson  Listen to: Security Unlocked: CISO Series with Bret Arsenault  Discover and follow other Microsoft podcasts at microsoft.com/podcastsSecurity Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.  Hosted on Acast. See acast.com/privacy for more information.
Okay, look, we know you plan on reading the entire 2021 MDDR at some point. But you're busy. Life gets in the way. We get it. Who has the time! Well, we've got the time, but that's beside the point, and honestly... fortunate for you. We've read the report front to back and have decided to cover some of it today on the podcast, but you'll still need to read all 134 pages yourself if you truly want to grasp the entire piece. Unless you want to be that person who listens to a single podcast and pretends they read the whole thing... then go ahead; we won't tell. In this episode of Security Unlocked, hosts Natalia Godyla and Nic Fillingham are joined by Sian John, Microsoft's director of strategic growth. Sian is currently working with the business development team, exploring growth opportunities for Microsoft to strengthen security, compliance, and identity offerings that address unfulfilled needs in the market. As a security professional with over 25 years of experience, Sian accompanies us as we discuss the 2021 Microsoft Digital Defense Report, which she personally contributed to.     In This Episode You Will Learn:    The history and analysis of the 2021 Microsoft Digital Defense Report The evolution of cybercrime services that are for sale What's providing new attackers with access to deeper data  Some Questions We Ask:    How did Microsoft settle on the topics and themes of the 2021 MDDR?   What are some takeaways from the newly added disinformation chapter? Why isn't Zero Trust being implemented, considering the conversations we've had that it's more critical than ever?    Resources:    2021 Microsoft Digital Defense Report View Sian John on LinkedIn View Natalia on LinkedIn View Nic on LinkedIn  Related:    Listen to: Security Unlocked: CISO Series with Bret Arsenault  Listen to: Afternoon Cyber Tea with Ann Johnson Discover and follow other Microsoft podcasts at microsoft.com/podcastsSecurity Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.   Hosted on Acast. See acast.com/privacy for more information.
Mobile 4N6 101

Mobile 4N6 101

2021-10-1334:58

What would you say is the most personal possession that you own? Most would say their cell phone... unless you still have a few journals from high school. And if you do, this is your reminder that it might be time to let those go. It's become increasingly apparent lately how much info our phones collect from us, from the first app you check in the morning after waking up, recent calendar entries, and your actual heart rate by 9 am. The crazy part is most people don't give it a second thought. It doesn't interest us... until something or someone goes missing, then it becomes a road map to whatever it is you did. In this episode of Security Unlocked, host's Natalia Godyla and Nic Fillingham are joined by Senior Digital Forensics Researcher at Cellebrite, SANS Author and Senior Instructor Sarah Edwards. Sarah walks us through the world of mobile digital forensics while also crushing our dreams on how not so relatable it is to our favorite CSI television shows. She explains what makes mobile forensics unique while incredibly intimate and how a mobile device can be used as part of an attack chain.  In This Episode You Will Learn: The specific tools used during a digital forensics investigation What the typical threat landscape looks like for mobile devices Big trends and changes happening in the past few years  Some Questions We Ask: How is mobile forensics particularly unique? ​​What is typically looked for during an investigation?  How is a mobile device used as part of an attack chain? Resources: mac4n6.com View Sarah Edwards on LinkedIn View Nic on LinkedIn View Natalia on LinkedIn View Microsoft Security Blog Related:   Listen to: Afternoon Cyber Tea with Ann Johnson Listen to: Security Unlocked: CISO Series with Bret Arsenault Discover and follow other Microsoft podcasts at microsoft.com/podcastsSecurity Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.  Hosted on Acast. See acast.com/privacy for more information.
Untangling Botnets

Untangling Botnets

2021-10-0637:03

You're back home celebrating the holidays with friends and family, sharing stories, catching up, and discussing your plans for the year ahead. Next thing you know, that cousin who wouldn't stop sending you emails about the "future of bitcoin" and coin mining kicks the door open, and he's ready to spread some holiday knowledge. Oh yeah, he's also going to cut you in on a sweet deal he has going on with his buddy Carl, who he met at dollar wing night. Unfortunately, Carl is one of the bad guys. He is secretly infecting multiple devices with botnets, collecting crypto-cash at the expense of the naive device owners who don't know that their machines are being used.   In this episode of Security Unlocked, hosts Natalia Godyla and Nic Fillingham are re-joined by Microsoft Defender 365 threat intelligence team member Elif Kaya, whose current primary focus is with botnets, commodity threats, and phishing delivered malware. Elif explains some of the new techniques from botnets, how they're being used for financial theft via cryptocurrency mining, and the impact on the defender's view of these actions.  In This Episode You Will Learn:  An overview and detailed description of what botnets are The fundamentals of cryptocurrency mining & botnets on a machineBest practices when trying to identify new botnetsSome Questions We Ask:    How can Microsoft contribute to helping take down these botnets?  What direction are the new botnets moving towards? How common is competition-killing activity within new botnets and crypto mining? Resources: Phorpiex morphs: How a longstanding botnet persists and thrives in the current threat environment When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure When coin miners evolve, Part 2: Hunting down LemonDuck and LemonCat attacks View Elif Kaya on LinkedInView Natalia on LinkedIn View Nic on LinkedIn  Related:   Listen to: Security Unlocked: CISO Series with Bret Arsenault Listen to: Afternoon Cyber Tea with Ann JohnsonDiscover and follow other Microsoft podcasts at microsoft.com/podcastsSecurity Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.  Hosted on Acast. See acast.com/privacy for more information.
loading
Comments (3)

Red Arrow

It's indeed impossible to develop and expand a business or a company without using new technologies and various business tools, especially when it comes to e-commerce, and I can tell you it's not that hard to find software to solve your problems. I use Shopify and was able to achieve the most convenient management and integration of applications that diversified the experience. For instance, it didn't take me long to find https://www.alphaservesp.com/products/shopify/ , and I'm sure if you decide to check it out, you won't be disappointed.

Jul 13th
Reply

Red Arrow

wiki wiki [url=https://www.wikipedia.org/]wiki[/url]

Jun 27th
Reply

Jeremy Soul

I didn't even know it was that complicated. Now I get it why it's so hard to find decent software on the internet for e-commerce.

Jun 27th
Reply
loading