DiscoverDefending The Edge
Defending The Edge
Claim Ownership

Defending The Edge

Author: DefendEdge

Subscribed: 1Played: 13
Share

Description

Defending the Edge is a weekly cyber security podcast bringing you the updates that matter most to you in the cybers security domain. Join host Calvin Bryant and the DefendEdge team as they keep you informed on current cyber threats, hostile actors, solutions, interview experts in the field, and take deep-dives into historical cyber security topics and learn how they impact us today. From threat analysis to best practices and solutions, we are here to help you defend the edge of your cyber domain.

DefendEdge Website

For podcast information, please contact: podcast@defendedge.com

19 Episodes
Reverse
Ransomware has become more advanced, we see troubling cyber threat trends in the wake of COVID-19, we discuss Black Basta with W/TH Secure, and we have a CEO and Director's round table discussion.  Special guest "Not Billy Joel."
No usual show this week.  Instead, we have a big announcement about expanding Cyber Threat Intelligence capabilities at DefendEdge and changing up content on the podcast.  Check out our newly launched Cyber Threat Intelligence page on our website.
Maui ransomware details emerge, Greece spies on journalists, more deep-fake concerns come out, and threat actors are selling some interesting malicious services on the open web.  We take a look at multiple events happening with Russia and Ukraine during our cyber threat intelligence spotlight.
The U.S. Court PACER system was breached two years ago and we just found out, more software programs are being impersonated and laced with malware, Robotext scams are on the rise, and we take a deeper look at Pegasus and NSO Group.  Is commercial spyware a real concern?  The answer may surprise you.
Economic frustrations may be increasing inside threat activity, Brute Ratel’s badgers have been co-opted by threat actors, Ducktail malware is designated as a full-fledged campaign, and we talk about the reality of risk reduction and mitigation.  This week we take a look at Iran's shadow cyber war with Israel.
Exploitation expands on the Internet of Things, Quantum Computing gets closer and might just destroy our current understanding of security encryption, and I walk you through China’s cyber-psyop with TikTok.
Killnet continues its pro-Russia hacktivism DDoS campaign, Microsoft announced a massive adversary in the middle campaign in progress, threat actors attempt to impersonate Crowdstrike, and we go vacationing in Maui with North Korea and Dear Leader.  This week we break down the kill-chain for social engineering and recap North Korea's use of skilled IT workers and their success in exfiltrating data and funds back to Pyongyang.
Raspberry Robin infects an untold number of computers but is it a threat? Maybe. Probably? RedAlert ransomware targets VMware, the cyber-proxy war in the Russia-Ukraine conflict ramps up, and we take a look at police spyware.  This week I sat down with Justin Mohr, USAF (Ret) to discuss cyber operations in the DoD and life as a Security Operations Center Team Lead.
The FBI warns of deepfake tech workers, another crypto heist makes headlines, a study shows which type of phishing scams employees are likely to fall victim to, and we take a look at a cyber threat group taking up domestic terrorism under the guise of hacktivism.  This week I sat down with Dipesh Shah, CIO at Cresa, to discuss corporate concerns in cyber security and what processes he uses to effectively mitigate cyber security risks.
RSOCKS botnet goes down, Flagstar Bank suffers a massive breach, Internet Explorer finally, finally, retires but is it still a security concern?  The answer won’t surprise you. Those headlines and more.  This week we sit down with Col James Regenor USAF (Ret), CEO of VeriTX, to discuss blockchain security applications in digital logistics.
Portland Oregon is exploited for $1.4 million, cyber hacks can open physical security doors, more information breaks on Chinese-backed threat groups, and ransomware exploitation gets even craftier.  We talk about indicators of compromise and this week's cyber threat intelligence spotlight features multiple snippets of various Chinese-backed threat actors including long-term campaigns affecting telecommunications industries.
Elasticsearch gets hit by ransomware, Apple confirms large-scale app-store fraud, and China’s cyber-espionage continues to expand but do we have our own heroes, a cyber double-O, on her Majesty’s Cyber Security Service?  We’ll find out today when we are joined by special guest, "not James Bond."  This week I sat down with Eric Berndtson to discuss vulnerability management and vulnerability assessments.  Special credit to Eleven Music on YouTube for their 007 James Bond theme music.
Nigerian Princes go 2.0, ransomware is faster than ever, malware hides its command and control servers, and is there such a thing as charitable ransomware?  We take a look.  This week we sat down with Ryan Phelan, an intellectual property attorney, to talk about artificial intelligence and machine learning.
Account pre-hijacking is your newest concern, Interpol warns that nation-state malware will be available for use on the dark web, China threatens Starlink, and we say goodbye to Conti.  In our weekly interview, we sit down for a long discussion with BGen Blaine Holt, U.S. Air Force (Ret), to talk major threat actors, the Russia-Ukraine cyber war, and the asymmetry of cyber warfare.
Pyongyang plants skilled IT workers into companies, thus making an extremely strong case for zero-trust architecture, Five Eyes and CISA sounds the alarm on MSP exploitation, and penetration testers show us how the good guys can stay ahead of threat actors.   We sit down with Matt Lindenbaum, Federal Lead for NewRocket and Co-founder of Converging Concepts to hear his insights.
A severe vulnerability rocks F5 Inc., SilentBreak threat group launches new malware attacks, vanity URLs are exploited by social engineers, and China takes advantage of the Russia-Ukraine war.  We sit down for an in-depth interview with Aaron Bozek and Wesles Lubin, two of the SOC leads for DefendEdge.  Aaron is a Security Engineer and SOC Lead for US Threat Intelligence and Wes is the SOC Lead for US Operations Business and Services.
002. Phishing the DoD

002. Phishing the DoD

2022-05-0540:56

Phishing hits DoD contractors for tens of millions of dollars, Bumblebee loader is much worse than it sounds, Moshen Dragon rears its head, and North Korea circumvents sanctions via hacking for cash and crypto.  We also sit down talk with DefendEdge's very own Director of Cyber Security Engineering, Eric Berndston to talk about Cyber Threat Intelligence and trends he has seen in threat analysis and response.
DefendEdge launches a podcast, prompt bombing circumvents multi-factor authentication, Lenovo forums stores unencrypted passwords, and NATO begins Operation Locked Shields amidst rising cyber warfare in Ukraine. Next, we talk about Russian-backed hackers and their cyberattacks in Ukraine and the United States.  And finally, we sat down with DefendEdge CEO and Founder Taso Triantafillos in our first guest interview.
Defending the Edge is a weekly cybersecurity news podcast that brings you the information that matters most.  What are the emerging threats?  What are the solutions?  We break down the issues each week along with the experiences and insights of experts in the field.  Join us every Thursday as we help you defend the edge of your cyber domain!
Comments 
loading
Download from Google Play
Download from App Store