Our regular podcast series features threat research and security news, hosted by threat researchers from the Threat Hunter Team.
Title
|
Date published
|
|
|
Formjacking, lots of vulnerabilities get patched, and a BEC scam costs a cinema company millions
|
2018-11-15
|
|
|
Lazarus ATM attacks, Inception Framework uses new backdoor, and small businesses’ cyber risk
|
2018-11-08
|
|
|
SamSam ransomware, Midterms 2018, new Emotet activity, and Docker APIs exploited for cryptojacking
|
2018-11-01
|
|
|
Super Micro spy chip story contradictions, Russian woman indicted in U.S. for conspiring to interfere in U.S. elections, and Twitter tackles disinformation campaigns
|
2018-10-25
|
|
|
Special Report: What is it Really Like to Work in Cyber Security?
|
2018-10-18
|
|
|
Gallmaker research, Navionics breach, and Fitbit data used by cops in murder investigation
|
2018-10-11
|
|
|
APT28 activity, cryptojacking research, and Face ID used to access criminal suspect’s phone
|
2018-10-04
|
|
|
Formjacking research, WordPress plugins cause problems, the dangers of plaintext password storage, and the Mojave zero day
|
2018-09-27
|
|
|
Xbash threat, TripAdvisor fake review clampdown, blockchain casinos targeted, and who is behind DDoS attacks on UK unis?
|
2018-09-20
|
|
|
Deep Dive: Symantec Takes on Software Supply Chain Attacks
|
2018-09-13
|
|
|
One billion dollars in Bitcoin on the move, data breaches, Mastercard and Google’s info-sharing deal, and MikroTik developments
|
2018-09-06
|
|
|
Andromeda botnet, DNC “hack”, a new Windows zero day, and dark web developments
|
2018-08-30
|
|
|
How much do your mobile apps really know about you? Is your charging cable safe? And is end-to-end encryption under threat?
|
2018-08-23
|
|
|
Special Report: Financial Threats
|
2018-08-16
|
|
|
“Security through obscurity”, Snapchat's source code leak, MikroTik coin mining campaign, and Symantec talks machine learning at Black Hat
|
2018-08-09
|
|
|
Coin mining in games, SIM hijacking, connected car vulnerabilities, and attacks on the software supply chain within the supply chain
|
2018-08-02
|
|
|
Leafminer research, data breaches, credential stuffing, and IoT security fails
|
2018-07-26
|
|
|
Powershell risks, extortion scams that threaten embarrassment, Twitter clamps down on dodgy accounts, and the financial impact of data breaches
|
2018-07-19
|
|
|
Special Report: Software Update Supply Chain Attacks
|
2018-07-12
|
|
|
Mid-year review: Some of the biggest stories of 2018 so far, including VPNFilter, Orangeworm, and Meltdown and Spectre
|
2018-07-05
|
|
|