Digital Shadows Podcast - ShadowTalk

Our weekly podcast highlights key findings of primary-source research our Intelligence Team is conducting, along with the latest threat actors, campaigns, security events and industry news.

  • Episode 36: FIN7 Arrests and Phishing Threats

    Episode 36: FIN7 Arrests and Phishing Threats

    Digital Shadows’ Rose Bernard and Simon Hall join Rafael Amado to cover the arrest of three alleged members of the FIN7 organized criminal group. The team go over the United States Department of...

    Read Post
  • Subscribe to ShadowTalk Podcast on iTunes!

    Click Here
  • Episode 35: Cyber threats to ERP Applications

    Episode 35: Cyber threats to ERP Applications

    In this week’s episode, JP Perez-Etchegoyen, CTO of Onapsis, joins Michael Marriott to talk about the exposure of SAP and Oracle applications, the increase in publicly-available exploits, and the...

    Read Post
  • Episode 34: Satori Botnet, OilRig, PowerShell Security, and the Dragonfly Campaign

    Episode 34: Satori Botnet, OilRig, PowerShell Security, and the Dragonfly Campaign

    Richard Gold and Rose Bernard join Michael Marriott to talked about updates to the Satori botnet, which has expanded to incorporate new IoT devices using TCP port 5555. Amid news of a new wave of...

    Read Post
  • ×

    Subscribe to get the latest news and threat intelligence in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Episode 33: Digital Risk Protection

    Episode 33: Digital Risk Protection

    Rick Holland, CISO at Digital Shadows, discusses the latest 2018 Forrester New Wave for Digital Risk Protection. He discusses how security leaders must avoid blind spots with a more complete risk...

    Read Post
  • Episode 32: MITRE ATT&CK™ Framework and the Mueller GRU Indictment

    Episode 32: MITRE ATT&CK™ Framework and the Mueller GRU Indictment

    In today’s ShadowTalk, we take on the Robert Mueller indictment against 12 Russian individuals for alleged US election interference. However, rather than dwell on issues of attribution and...

    Read Post
  • Episode 31: Carbanak Files and Source Code Leaked?

    Episode 31: Carbanak Files and Source Code Leaked?

    In this week's ShadowTalk, Digital Shadows’ Russian-speaking security specialist discovered files and source code allegedly related to the Carbanak organized criminal group. The Carbanak malware...

    Read Post
  • Episode 30: SSL Inspection and Interception: Uses, Abuses and Trade-offs

    Episode 30: SSL Inspection and Interception: Uses, Abuses and Trade-offs

    The Payment Card Industry recently passed a deadline requiring that all e-commerce sites and merchants cease supporting TLS 1.0. With this and older protocols such as SSL vulnerable to...

    Read Post
  • Learn More About Digital Shadows SearchLight™

    Learn More
  • Episode 29: Reducing Your Attack Surface: From a Firehose to a Straw

    Episode 29: Reducing Your Attack Surface: From a Firehose to a Straw

    Following news that a database containing 340 million records has been publicly exposed to the internet, Richard Gold and Simon Hall join Michael Marriott to discuss how (and why) you can reduce...

    Read Post
  • Episode 28: Diversity in Security and Women’s Network Launch

    Episode 28: Diversity in Security and Women’s Network Launch

    Libby Fiumara is joined by Rose Bernard and Sophie Burke to discuss the launch of Digital Shadows’ Women’s Network, challenges facing women in security, and how companies can foster diversity in...

    Read Post
  • Episode 27: Attribution: The How, The What and The Why

    Episode 27: Attribution: The How, The What and The Why

    Simon Hall and Rich Gold join Michael Marriott to discuss the merits and perils of attribution, including the number of characteristics and variables required for a strong attribution, instances...

    Read Post
  • Episode 26: Mythbusting Vulnerabilities and Exploits

    Episode 26: Mythbusting Vulnerabilities and Exploits

    Simon Hall and Richard Gold join Rafael Amado to discuss misconceptions around vulnerabilities and exploits, other techniques for gaining code execution, and how organizations can prioritize the...

    Read Post
  • Episode 25: Combating Security Debt, Ticketfly Defacement And Data Breach

    Episode 25: Combating Security Debt, Ticketfly Defacement And Data Breach

    Richard Gold joins us to discuss the issue of security debt, a term used to refer to the accumulation of security risks over time, such as missed patches,...

    Read Post
  • Episode 24: Seize and Desist: Changes in the cybercriminal underground

    Episode 24: Seize and Desist: Changes in the cybercriminal underground

    Rafael Amado and Michael Marriott discuss how the criminal underground has evolved since the demise of AlphaBay and Hansa.

    Read Post
  • Episode 23: L0pht 20 years on and combating cyber threats with military-style tactics

    Episode 23: L0pht 20 years on and combating cyber threats with military-style tactics

    In this week's edition of ShadowTalk, Dr Richard Gold joins us to discuss the return of the L0pht hackers.

    Read Post
  • Episode 22: VPN Filter targeting Ukraine, TRITON malware, Roaming Mantis, VBScript & Spectre vulns

    Episode 22: VPN Filter targeting Ukraine, TRITON malware, Roaming Mantis, VBScript & Spectre vulns

    In this week’s Shadow Talk, the pod unpacks the reporting on VPN Filter, a malware affecting half a million network devices. Reports have suggested that the malware is being prepped to perform...

    Read Post
  • Episode 21: eFail vulns affecting Open PGP and S-MIME, and interbank payment systems risks

    Episode 21: eFail vulns affecting Open PGP and S-MIME, and interbank payment systems risks

    In this week’s episode of Shadow Talk, Digital Shadows’ Head of Security Engineering, Dr Richard Gold, joins the pod to explain the EFAIL vulnerability affecting Open PGP and S-MIME, as well as...

    Read Post
  • Episode 20: Winnti Umbrella, DarkHotel, Office 365 Vulnerability, and Olympus Dark Web Marketplaces

    Episode 20: Winnti Umbrella, DarkHotel, Office 365 Vulnerability, and Olympus Dark Web Marketplaces

    In this week’s episode Shadow Talk we look at the Winnti Umbrella group, asking what this means for organizations. We discuss vulnerabilities in Microsoft Office (CVE-2018-8174) and basestriker....

    Read Post
  • Episode 19: Loki Bot, LoJack, GPON Vulnerabilities, and Blackrouter Ransomware

    Episode 19: Loki Bot, LoJack, GPON Vulnerabilities, and Blackrouter Ransomware

    In this week’s episode Shadow Talk, it’s a vulnerability extravaganza. We cover malicious use of legitimate software, as APT28 attributed to hijacking LoJack and Blackrouter delivered via AnyDesk...

    Read Post
  • Episode 18: Healthcare hacking, BGP hijacking, crypto jacking, and more

    Episode 18: Healthcare hacking, BGP hijacking, crypto jacking, and more

    In this week’s episode of Shadow Talk, we cover the targeting of healthcare organizations by Orangeworm, BGP hijacking, vulnerabilities in MikroTik routers, DDoS market shutdowns, and the...

    Read Post
  • Episode 17: Network Infrastructure Compromise, Magnitude EK Development, the Gold Galleon, & more

    Episode 17: Network Infrastructure Compromise, Magnitude EK Development, the Gold Galleon, & more

    In this week’s episode of Shadow Talk, we cover Russia’s attempts to ban the social messaging app, and also read between the lines of the joint US and UK advisory on network infrastructure...

    Read Post
  • loading
    Loading More...