Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
Health & Fitness
Sports
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Podjoint Logo
US
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/4b/94/0d/4b940dde-5179-f8bf-be5b-7eeae6ebe972/mza_13248270043632466206.jpg/600x600bb.jpg
State of Cybercrime
Varonis, Matt Radolec, David Gibson
202 episodes
1 month ago
Join us for State of Cybercrime, where experts discuss the latest trends and developments in the world of cybercrime and provide insights into how organizations can protect themselves from potential threats. Sponsored by Varonis
Show more...
Technology
Business
RSS
All content for State of Cybercrime is the property of Varonis, Matt Radolec, David Gibson and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Join us for State of Cybercrime, where experts discuss the latest trends and developments in the world of cybercrime and provide insights into how organizations can protect themselves from potential threats. Sponsored by Varonis
Show more...
Technology
Business
Episodes (20/202)
State of Cybercrime
Supply Chain Attacks
This month marked the discovery of one of the largest NPM compromises in history. Though AI-assisted social engineering, a profilic developer dubbed Qix was phished. His account was then maliciously used to publish poisoned packages, many of which were used to manipulate crypto transactions. Thankfully, it was detected before too many users downloaded these packages, but it highlights how vulnerable we can be if these upstream components get compromised. In this special State of Cybercrime episode, Matt and David break down this NPM compromise, and cover everything else new in the world of cybercrime.
Show more...
1 month ago
24 minutes 16 seconds

State of Cybercrime
ShinyHunters' CRM Heist
One phone call was all it took for ShinyHunters to breach some of the world's biggest brands. By exploiting Salesforce to infiltrate Google, Cisco, and many others, this group has shown just how vulnerable organizations can be when well-known SaaS platforms become the attack vector. In this special State of Cybercrime episode, Matt and David break down how ShinyHunters pulled off one of the largest CRM–focused attacks of the year without exploiting a single software vulnerability.
Show more...
2 months ago
26 minutes 1 second

State of Cybercrime
Salt Typhoon Returns
After their hidden breach of the National Guard, the cybercrime group was discovered to have targeted a major telecommunications firm named Visat. After their hidden breach of the National Guard, the cybercrime group was found to have attacked a large telecommunications company called Visat. The interesting part—these attacks are not disruptive; Salt Typhoon merely gathers information, hoards credentials and finds vulnerabilities. Because of their stealthy nature, these attacks are only detected after the attackers have already left. To what aim remains to be seen. Matt and David dive into these attacks, and talk about what else is happening in the world of cybercrime.
Show more...
3 months ago
19 minutes 14 seconds

State of Cybercrime
Copilot's Zero-Click Vulnerability
In this episode, Matt and David explore a recently patched Copilot vulnerability that allowed attackers to craft emails that prompted Copilot to send sensitive information to an attacker's server. This prompt injection attack begs the question: What other vulnerabilities will AI bring to data? They also follow up with Scattered Spider & Dragonforce's continued assault on UK Retail and how their tactics are beginning to spread to insurance organizations.
Show more...
4 months ago
20 minutes 28 seconds

State of Cybercrime
UK Retail Under Siege
Several high-profile UK retailers have suffered serious cyberattacks that have disrupted operations for weeks and, in some cases, exposed sensitive customer data. The social engineering techniques used in the attack align with the notorious Scattered Spider group, but a new ransomware group named Dragonforce has claimed responsibility. Matt and David delve into the details of these attacks, what we know about these cybercriminal groups, and whether they are affiliated. They also cover the Coinbase breach — a calculated, high-stakes extortion scheme where hackers bribed overseas contractors to steal sensitive user data and demand a $20 million ransom. Watch now!
Show more...
5 months ago
22 minutes 28 seconds

State of Cybercrime
The Oracle Breach Debate
📌 We apologize for the technical issues experienced while filming this episode. Now onto the episode details: Oracle recently faced a major security scare after a hacker claimed to have stolen 6 million data records — a breach that has everyone talking. After initially denying the breach, Oracle is now saying their Oracle Cloud Infrastructure has not been compromised, but the exposed data came from old legacy servers. Join Matt and David, along with special guest Joseph Avanzato from Varonis Threat Labs, as they explore the hacker's claims, Oracle's response, and the broader lessons about cloud security and incident management.As always, our hosts will update you on the latest cybersecurity news and share tips on protecting your digital assets.
Show more...
6 months ago
24 minutes 21 seconds

State of Cybercrime
$1.5B ByBit Crypto Heist
The Bybit crypto exchange was hacked for a record-breaking $1.5 billion theft of Ether cryptocurrency – perhaps the largest scale theft of all time. The FBI has linked the attack to TraderTraitor, a sub-cluster of the Lazarus Group, who leveraged a compromised machine of Safe{Wallet} to execute a supply chain attack on the Bybit platform. Matt and David review how this attack unfolded, and share updates on DeepSeek AI and Salt Typhoon. Listen now!
Show more...
7 months ago
27 minutes 27 seconds

State of Cybercrime
DeepSeek Disruption
DeepSeek, the Chinese AI startup dominating news feeds, has experienced exponential growth while wiping almost $1 trillion off the U.S. stock market. However, the model's rise has now been overshadowed by a surge of malicious attacks. On this special episode of State of Cybercrime, Matt and David explore the rise of this innovative AI tool, the subsequent attacks, and the potential vulnerabilities of the AI model. DeepSeek won’t be the last shadow AI app you have to worry about. So what steps can you take to ensure you can discover and stop shadow AI apps from inhaling your corporate secrets? Read our latest blog for more insights and immediate actions you can take to protect your organization from shadow AI. 📌 DeepSeek Discovery: How to Find and Stop Shadow AI: https://www.varonis.com/blog/deepseek
Show more...
9 months ago
21 minutes 9 seconds

State of Cybercrime
U.S. Treasury Breach
On this episode of State of Cybercrime, Matt and David cover the most recent Chinese state-sponsored APT attack by Silk Typhoon on the U.S. Treasury Department. They discuss how the attackers used a remote support tool to enable unauthorized access to Treasury workstations and unclassified documents. They also dive into some of the most pressing cybersecurity news and recent breaches you should know about.
Show more...
9 months ago
26 minutes 12 seconds

State of Cybercrime
Salt Typhoon Telecom Attack
In this episode, Matt and David delve into the evolving story of Salt Typhoon, a Chinese state-sponsored group, and their use of the innovative 'GhostSpider' backdoor to infiltrate telecommunication service providers. This sophisticated and far-reaching cyberattack, which is much larger than previously understood, has compromised sensitive cellular logs and data from government entities, telecom providers, and millions of Americans. Don’t miss this opportunity to stay informed and keep your organization safe! More from Varonis ⬇️ Visit our website: https://www.varonis.com LinkedIn: https://www.linkedin.com/company/varonis X/Twitter: https://twitter.com/varonis Instagram: https://www.instagram.com/varonislife/ #Cybercrime #Podcast #Cybersecurity
Show more...
10 months ago
22 minutes 44 seconds

State of Cybercrime
Midnight Blizzard
Russia's APT29, a.k.a "Midnight Blizzard," is arguably one of the world's most notorious threat actors. You might recall their involvement in the 2019 SolarWinds attack where they operated under the alias "Cozy Bear." The group is back with more relentless attacks—breaching cloud credentials and targeting over 100 organizations worldwide. In this episode of State of Cybercrime, Matt and David dive into some of the hottest cybersecurity news and recent breaches, including Midnight Blizzard. Discover how these sophisticated attacks are happening and what you can do to stay a step ahead.
Show more...
11 months ago
25 minutes 50 seconds

State of Cybercrime
ChatGPT Memory Manipulation + Salt Typhoon
Hosts Matt Radolec and David Gibson explain how cybercriminals are manipulating AI models like ChatGPT to plant false memories and steal data, along with other cybercrime-related stories like Salt Typhoon. Salt Typhoon is a Chinese hacking group that has reportedly breached multiple key U.S. broadband providers, raising significant concerns about the security of sensitive communications data. The hackers may have had access to these networks for months, raising significant concerns about the security of sensitive communications data. More from Varonis ⬇️ Visit our website: https://www.varonis.com LinkedIn: https://www.linkedin.com/company/varonis X/Twitter: https://twitter.com/varonis Instagram: https://www.instagram.com/varonislife/ #Cybercrime #Podcast #DataSecurity
Show more...
1 year ago
28 minutes 28 seconds

State of Cybercrime
The Return of Lazarus
The North Korean Lazarus group is running multiple high-risk campaigns: one exploiting Windows and another installing malware through fraudulent blockchain job offers. State of Cybercrime hosts Matt Radolec and David Gibson discuss the various APT groups, including a prolific ransomware-as-a-service operation and a Chinese cyber espionage gang known as Volt Typhoon, and other vulnerable vulnerabilities in this episode, including: + Lazarus FudModule rootkit attacks and the concurrent Eager Crypto Beavers campaign + RansomHub attacks on Halliburton, Change Healthcare, and hundreds more + Large-scale extortion of AWS environments through exposed ENV files + Hundreds of exposed servers from Volt Typhoon’s ISP targeting + Payment gateway breach of over 1.7 million credit card owners
Show more...
1 year ago
31 minutes 3 seconds

State of Cybercrime
Proofpoint Spoofing
Matt Radolec and David Gibson discuss how an unknown attacker recently exploited a vulnerability in Proofpoint’s email routing system, allowing them to bypass security measures and send millions of spoofed emails on behalf of major companies. The co-hosts also cover: + The North Korean threat actor hired using AI + The biggest ransomware payment ever made + How X is training its Grok AI LLM with your posts + The EU’s groundbreaking AI act + How anyone can access deleted and private repositories on GitHub + Updates on AMD's silicon-level "SinkClose" processor flaw
Show more...
1 year ago
28 minutes 38 seconds

State of Cybercrime
The Lockbit Bluff
The LockBit ransomware group claimed to have attacked the U.S. Federal Reserve, stating they would leak 33 terabytes of its data. However, analysis revealed that the data released on their website actually came from a financial services company in Arkansas, not the Federal Reserve.
Show more...
1 year ago
22 minutes 45 seconds

State of Cybercrime
Snowflake Security Check
Snowflake, a cloud storage platform used by some of the largest companies in the world, is investigating a targeted attack on its users who lack multifactor authentication. Join Matt Radolec and David Gibson for an episode of State of Cybercrime in which we will discuss the increased attacks on Snowflake customers and share our five-point checklist for ensuring your cloud databases are properly configured and monitored.
Show more...
1 year ago
26 minutes 34 seconds

State of Cybercrime
Inside China's APT Network
A new data leak of more than 500 documents published to GitHub reveals the big business behind China’s state-sponsored hacking groups — from top-secret surveillance tools to details of offensive cyber ops carried out on behalf of the Chinese government.
Show more...
1 year ago
21 minutes 49 seconds

State of Cybercrime
Ivanti Zero-Days
CISA issued an emergency directive to mitigate Ivanti Connect Secure and Ivanti Policy Secure vulnerabilities after learning of malware targeting the software company, allowing unauthenticated threat actors to access Ivanti VPNs and steal sensitive data. Join Matt, David, and Dvir to learn more about the Ivanti vuln and other cyber threats.
Show more...
1 year ago
22 minutes 25 seconds

State of Cybercrime
Hackers Swatting Victims
As cyber threats evolve, so do the targets. From the shocking “swatting” incidents at Fred Hutchinson's Cancer Center to the alarming rise of fake hack-back offers after ransomware attacks, the landscape of cybercrime is constantly shifting.
Show more...
1 year ago
25 minutes 49 seconds

State of Cybercrime
AI Executive Order
Artificial intelligence could create “catastrophic risks” or be the answer to our technology prayers, world leaders say. The AI Executive Order issued Oct. 30 plans to establish new standards for AI safety and security, but others warn against rushing to regulate AI technology before it’s fully understood. Our State of Cybercrime team will break down the bipartisan legislation and answer all your AI questions about robots ruling the world.
Show more...
1 year ago
25 minutes 13 seconds

State of Cybercrime
Join us for State of Cybercrime, where experts discuss the latest trends and developments in the world of cybercrime and provide insights into how organizations can protect themselves from potential threats. Sponsored by Varonis