Épisodes

  • Salt Typhoon Telecom Attack
    Dec 14 2024

    In this episode, Matt and David delve into the evolving story of Salt Typhoon, a Chinese state-sponsored group, and their use of the innovative 'GhostSpider' backdoor to infiltrate telecommunication service providers. This sophisticated and far-reaching cyberattack, which is much larger than previously understood, has compromised sensitive cellular logs and data from government entities, telecom providers, and millions of Americans. Don’t miss this opportunity to stay informed and keep your organization safe!

    Afficher plus Afficher moins
    23 min
  • Midnight Blizzard
    Nov 25 2024

    Russia's APT29, a.k.a "Midnight Blizzard," is arguably one of the world's most notorious threat actors. You might recall their involvement in the 2019 SolarWinds attack where they operated under the alias "Cozy Bear."

    The group is back with more relentless attacks—breaching cloud credentials and targeting over 100 organizations worldwide.

    In this episode of State of Cybercrime, Matt and David dive into some of the hottest cybersecurity news and recent breaches, including Midnight Blizzard. Discover how these sophisticated attacks are happening and what you can do to stay a step ahead.

    Afficher plus Afficher moins
    26 min
  • ChatGPT Memory Manipulation + Salt Typhoon
    Oct 16 2024

    Hosts Matt Radolec and David Gibson explain how cybercriminals are manipulating AI models like ChatGPT to plant false memories and steal data, along with other cybercrime-related stories like Salt Typhoon.

    Salt Typhoon is a Chinese hacking group that has reportedly breached multiple key U.S. broadband providers, raising significant concerns about the security of sensitive communications data.

    The hackers may have had access to these networks for months, raising significant concerns about the security of sensitive communications data.

    More from Varonis ⬇️

    Visit our website: https://www.varonis.com

    LinkedIn: https://www.linkedin.com/company/varonis

    X/Twitter: https://twitter.com/varonis

    Instagram: https://www.instagram.com/varonislife/

    #Cybercrime #DataSecurity

    Afficher plus Afficher moins
    28 min
  • The Return of Lazarus
    Sep 17 2024

    The North Korean Lazarus group is running multiple high-risk campaigns: one exploiting Windows and another installing malware through fraudulent blockchain job offers.

    State of Cybercrime hosts Matt Radolec and David Gibson discuss the various APT groups, including a prolific ransomware-as-a-service operation and a Chinese cyber espionage gang known as Volt Typhoon, and other vulnerable vulnerabilities in this episode, including:

    + Lazarus FudModule rootkit attacks and the concurrent Eager Crypto Beavers campaign

    + RansomHub attacks on Halliburton, Change Healthcare, and hundreds more

    + Large-scale extortion of AWS environments through exposed ENV files

    + Hundreds of exposed servers from Volt Typhoon’s ISP targeting

    + Payment gateway breach of over 1.7 million credit card owners

    Afficher plus Afficher moins
    31 min
  • Proofpoint Spoofing
    Aug 16 2024

    Matt Radolec and David Gibson discuss how an unknown attacker recently exploited a vulnerability in Proofpoint’s email routing system, allowing them to bypass security measures and send millions of spoofed emails on behalf of major companies.

    The co-hosts also cover:

    + The North Korean threat actor hired using AI

    + The biggest ransomware payment ever made

    + How X is training its Grok AI LLM with your posts

    + The EU’s groundbreaking AI act

    + How anyone can access deleted and private repositories on GitHub

    + Updates on AMD's silicon-level "SinkClose" processor flaw

    Afficher plus Afficher moins
    29 min
  • The Lockbit Bluff
    Jul 19 2024

    In this episode of State of Cybercrime, co-hosts Matthew Radolec and David Gibson dive into the details around LockBit, and cover other news including:

    + The MOVEit authentication bypass flaw

    + Developments in the Polyfill supply chain attack affecting millions of websites

    + Updates on the targeted campaign against Snowflake

    +A massive insider breach of a Pennsylvania healthcare system

    + Two new attack methods threat actors are adopting

    + The new OpenSSH unauthenticated RCE vuln that gives root privileges to + Linux systems

    Afficher plus Afficher moins
    23 min
  • Snowflake Security Check
    Jun 14 2024

    Snowflake, a cloud storage platform used by some of the largest companies in the world, is investigating a targeted attack on its users who lack multifactor authentication.

    Join Matt Radolec and David Gibson for an episode of State of Cybercrime in which we discuss the increased attacks on Snowflake customers and share our five-point checklist for ensuring your cloud databases are properly configured and monitored.

    WE’LL ALSO COVER:

    • The world’s largest botnet ever discovered
    • Google’s algorithm leak
    • The Black Basta ransomware-as-a-service (RaaS) operation
    • The cyberattack that destroyed over 600K U.S. routers
    • Sneaky new tactics used by emerging threat actors

    ...and more! More from Varonis

    ⬇️ Visit our website: https://www.varonis.com

    LinkedIn: / varonis

    X/Twitter: / varonis

    Instagram: / varonislife

    Afficher plus Afficher moins
    27 min
  • Inside China's APT Network
    Mar 1 2024

    A new data leak of more than 500 documents published to GitHub reveals the big business behind China’s state-sponsored hacking groups — from top-secret surveillance tools to details of offensive cyber ops carried out on behalf of the Chinese government.

    Join Matt and David for a special State of Cybercrime, which dives into China's espionage campaigns and complex network of resources.

    We’ll also discuss:

    - The massive cyberattack on Change Healthcare

    - Zyndicate’s successful hack of the Danish government

    - Apple Vision Pro’s launch day woes

    - Multiple developments in AI risk/regulation

    - How LockBit remains active after their servers and domains were seized

    - And more!

    Afficher plus Afficher moins
    22 min