Digital Shadows Podcast - Shadow Talk

Our weekly podcast highlights key findings of primary-source research our Intelligence Team is conducting, along with the latest threat actors, campaigns, security events and industry news.

  • Episode 27: Attribution: The How, The What and The Why

    Episode 27: Attribution: The How, The What and The Why

    Simon Hall and Rich Gold join Michael Marriott to discuss the merits and perils of attribution, including the number of characteristics and variables required for a strong attribution, instances...

    Read Post
  • Subscribe to Shadow Talk Podcast on iTunes!

    Click Here
  • Episode 26: Mythbusting Vulnerabilities and Exploits

    Episode 26: Mythbusting Vulnerabilities and Exploits

    Simon Hall and Richard Gold join Rafael Amado to discuss misconceptions around vulnerabilities and exploits, other techniques for gaining code execution, and how organizations can prioritize the...

    Read Post
  • Episode 25: Combating Security Debt, Ticketfly Defacement And Data Breach

    Episode 25: Combating Security Debt, Ticketfly Defacement And Data Breach

    Richard Gold joins us to discuss the issue of security debt, a term used to refer to the accumulation of security risks over time, such as missed patches,...

    Read Post
  • ×

    Subscribe to get the latest news and threat intelligence in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Episode 24: Seize and Desist: Changes in the cybercriminal underground

    Episode 24: Seize and Desist: Changes in the cybercriminal underground

    Rafael Amado and Michael Marriott discuss how the criminal underground has evolved since the demise of AlphaBay and Hansa.

    Read Post
  • Episode 23: L0pht 20 years on and combating cyber threats with military-style tactics

    Episode 23: L0pht 20 years on and combating cyber threats with military-style tactics

    In this week's edition of ShadowTalk, Dr Richard Gold joins us to discuss the return of the L0pht hackers.

    Read Post
  • Episode 22: VPN Filter targeting Ukraine, TRITON malware, Roaming Mantis, VBScript & Spectre vulns

    Episode 22: VPN Filter targeting Ukraine, TRITON malware, Roaming Mantis, VBScript & Spectre vulns

    In this week’s Shadow Talk, the pod unpacks the reporting on VPN Filter, a malware affecting half a million network devices. Reports have suggested that the malware is being prepped to perform...

    Read Post
  • Episode 21: eFail vulns affecting Open PGP and S-MIME, and interbank payment systems risks

    Episode 21: eFail vulns affecting Open PGP and S-MIME, and interbank payment systems risks

    In this week’s episode of Shadow Talk, Digital Shadows’ Head of Security Engineering, Dr Richard Gold, joins the pod to explain the EFAIL vulnerability affecting Open PGP and S-MIME, as well as...

    Read Post
  • Learn More About Digital Shadows SearchLight™

    Learn More
  • Episode 20: Winnti Umbrella, DarkHotel, Office 365 Vulnerability, and Olympus Dark Web Marketplaces

    Episode 20: Winnti Umbrella, DarkHotel, Office 365 Vulnerability, and Olympus Dark Web Marketplaces

    In this week’s episode Shadow Talk we look at the Winnti Umbrella group, asking what this means for organizations. We discuss vulnerabilities in Microsoft Office (CVE-2018-8174) and basestriker....

    Read Post
  • Episode 19: Loki Bot, LoJack, GPON Vulnerabilities, and Blackrouter Ransomware

    Episode 19: Loki Bot, LoJack, GPON Vulnerabilities, and Blackrouter Ransomware

    In this week’s episode Shadow Talk, it’s a vulnerability extravaganza. We cover malicious use of legitimate software, as APT28 attributed to hijacking LoJack and Blackrouter delivered via AnyDesk...

    Read Post
  • Episode 18: Healthcare hacking, BGP hijacking, crypto jacking, and more

    Episode 18: Healthcare hacking, BGP hijacking, crypto jacking, and more

    In this week’s episode of Shadow Talk, we cover the targeting of healthcare organizations by Orangeworm, BGP hijacking, vulnerabilities in MikroTik routers, DDoS market shutdowns, and the...

    Read Post
  • Episode 17: Network Infrastructure Compromise, Magnitude EK Development, the Gold Galleon, & more

    Episode 17: Network Infrastructure Compromise, Magnitude EK Development, the Gold Galleon, & more

    In this week’s episode of Shadow Talk, we cover Russia’s attempts to ban the social messaging app, and also read between the lines of the joint US and UK advisory on network infrastructure...

    Read Post
  • Episode 16: Cisco Smart Install Client flaw, Microsoft Outlook vuln, OpIcarus, RSAC, and more

    Episode 16: Cisco Smart Install Client flaw, Microsoft Outlook vuln, OpIcarus, RSAC, and more

    This week’s Shadow Talk discusses a Cisco Smart Install Client flaw exploited in disruption attack, an information leak vulnerability discovered in Microsoft Outlook, details on OpIcarus and...

    Read Post
  • Episode 15: 1.5 Billion Files Exposed Through Misconfigured Services

    Episode 15: 1.5 Billion Files Exposed Through Misconfigured Services

    Rafael Amado and Michael Marriott join this week’s Shadow Talk, taking a deep dive into our recent report “Too Much Information”.

    Read Post
  • Episode 14: Panera Breach Lessons, WannaCry’s Re-emergence, Genesis Marketplace, and more

    Episode 14: Panera Breach Lessons, WannaCry’s Re-emergence, Genesis Marketplace, and more

    This week’s Shadow Talk discusses what the re-emergence of WannaCry, exposure of Aggregate IQ data, exposure of 1.5 billion files through misconfigured services, as well as lessons learned from...

    Read Post
  • Episode 13: Cambridge Analytica, Trickbot Updates, SamSam Surge Continues, And Dragonfly Attributed

    Episode 13: Cambridge Analytica, Trickbot Updates, SamSam Surge Continues, And Dragonfly Attributed

    This week’s Shadow Talk discusses what the Cambridge Analytica revelations mean for disinformation and personal privacy, updates to Trickbot, Zeus Panda and Remnit trojans, City of Atlanta suffers...

    Read Post
  • Episode 12: Tax Fraud, AMD Vulnerability, Slingshot Targets Mikrotik Routers, And Hermes Ransomware

    Episode 12: Tax Fraud, AMD Vulnerability, Slingshot Targets Mikrotik Routers, And Hermes Ransomware

    This week’s Shadow Talk outlines the latest techniques in tax return fraud, claimed vulnerabilities in AMD chips, Slingshot malware targeting Mikrotik routers, and Greenflash Sundown Exploit Kit...

    Read Post
  • Episode 11: Memcached attacks, disinformation in ME, Spectre exploit, German gov network intrusion

    Episode 11: Memcached attacks, disinformation in ME, Spectre exploit, German gov network intrusion

    Digital Shadows’ Research team discusses record DDoS attacks using Memcached servers, disinformation campaigns, a proof of concept exploit for the Spectre vulnerability, and new details of a...

    Read Post
  • Episode 10: Memecached Server DDoS, Flash Vuln in Spam Campaign, Trustico Cert Issues, & Ransomware

    Episode 10: Memecached Server DDoS, Flash Vuln in Spam Campaign, Trustico Cert Issues, & Ransomware

    The Digital Shadows research team provides an overview of the latest news this week, including CVE-2018-4878 that’s now being used in a spam campaign, and much more.

    Read Post
  • Episode 9: SWIFT Attacks, Business Email Compromise, Return Of Thedarkoverlord, And APT - 37

    Episode 9: SWIFT Attacks, Business Email Compromise, Return Of Thedarkoverlord, And APT - 37

    The Digital Shadows research team provides an overview of the latest news this week, including new SWIFT attacks, more Business Email Compromise activity, the return of extortionist...

    Read Post
  • Episode 8: Lazarus Group, Olympics opening ceremony, Bitgrail Theft, and Outlook vulnerabilities

    Episode 8: Lazarus Group, Olympics opening ceremony, Bitgrail Theft, and Outlook vulnerabilities

    The Digital Shadows Research team provides our analysis of the fascinating Lazarus Group, attacks on the Winter Olympics opening ceremony, the problems with attribution, the theft of $170 million...

    Read Post
  • loading
    Loading More...