Malicious Life Podcast: What Happened at Uber?
Cybereason Blog
by Malicious Life Podcast
1w ago
In 2016, Joe Sullivan, former CISO of Facebook, was at the peak of his career. As Uber's new CISO, he and his team had just successfully prevented data from a recent breach from leaking to the internet. But less than a year later, Sullivan was unexpectedly fired from Uber, and three years later, the US Department of Justice announced criminal charges against him. So, what happened at Uber ..read more
Visit website
THREAT ALERT: The XZ Backdoor - Supply Chaining Into Your SSH
Cybereason Blog
by Cybereason Security Services Team
3w ago
Cybereason issues Threat Alerts to inform customers of emerging impacting threats, including critical vulnerabilities. Cybereason Threat Alerts summarize these threats and provide practical recommendations for protecting against them ..read more
Visit website
Malicious Life Podcast: The Nigerian Prince
Cybereason Blog
by Malicious Life Podcast
3w ago
In this episode of ML, we're exploring the history of the well-known Nigerian Prince scam, also known as 419 or advanced fee scam, from its roots in a Parisian prison during the French Revolution, to the economic and social reason why this particular scam became so popular with African youth. Also, will AI make such scams more dangerous - or, counter intuitively, go against the interests of scammers ..read more
Visit website
Malicious Life Podcast: Unmasking Secrets: The Rise of Open-Source Intelligence
Cybereason Blog
by Malicious Life Podcast
1M ago
Dive into the world of open-source intelligence (OSINT) in this episode, where we uncover how ordinary citizens use publicly available data to unravel some of the most complex global mysteries. From tracking conflicts in real-time to exposing the truth behind high-profile incidents like the downing of Malaysia Airlines flight MH17, discover how OSINT is revolutionizing the field of investigative journalism and transforming how we perceive and verify information.  ..read more
Visit website
Behind Closed Doors: The Rise of Hidden Malicious Remote Access
Cybereason Blog
by Cybereason Security Services Team
1M ago
Cybereason Security Services issues Threat Analysis reports to inform on impacting threats. The Threat Analysis reports investigate these threats and provide practical recommendations for protecting against them.  ..read more
Visit website
Malicious Life Podcast: The Source Code of Malicious Life
Cybereason Blog
by Malicious Life Podcast
1M ago
A few weeks ago we had a listener’s meetup in New York, and as part of that meetup, I gave a talk in which I discussed how Malicious Life came to be - a story that goes back to my days as a ship's captain in the Israeli Navy - and then about how me and Nate craft the stories that you hear every other week. That last part, I hope, might also be beneficial to those of you, our listeners, who find themselves giving talks about technically complex ideas, cyber-related or not. The storytelling ideas and techniques I laid out in the talk a ..read more
Visit website
Malicious Life Podcast: The Y2K Bug Pt. 2
Cybereason Blog
by Malicious Life Podcast
2M ago
In the waning years of the 20th century, amid growing anxieties about the turn of the millennium, one man, Robert Bemer, observed the unfolding drama from his remote home on King Possum Lake. A revered figure in computing, Bemer had early on flagged a significant, looming issue known as the Y2K bug, which threatened to disrupt global systems as calendars rolled over to the year 2000. This episode delves into Bemer's life during this critical period, exploring his predictions, the ensuing global frenzy to avert disaster, and the disparate views on whether the billions spent in prevention were ..read more
Visit website
Threat Alert: The Anydesk Breach Aftermath
Cybereason Blog
by Cybereason Security Services Team
3M ago
Cybereason issues Threat Alerts to inform customers of emerging impacting threats, including critical vulnerabilities. Cybereason Threat Alerts summarize these threats and provide practical recommendations for protecting against them ..read more
Visit website
Cybereason’s evolution to disrupt beyond SIEM and XDR market
Cybereason Blog
by CK Chim
3M ago
Today enterprises are accelerating to invest into digitalization to stay ahead of competition. They are increasingly encountering an evolving threat landscape and complex security challenges - with more workloads in multi clouds, more workforces in hybrid environments, and more intelligent devices connected in mission critical operations. This transformation journey is exacerbated by exponential increase in compute resources, data volumes and security tooling, driving up the cost of storing, managing and analyzing the data for security purposes ..read more
Visit website
Malicious Life Podcast: Can You Bomb a Hacker?
Cybereason Blog
by Malicious Life Podcast
3M ago
The 2008 Russo-Georgian War marked a turning point: the first time cyberattacks were used alongside traditional warfare. But what happens when the attackers aren't soldiers, but ordinary citizens? This episode delves into the ethical and legal implications of civilian participation in cyberwarfare, examining real-world examples from Ukraine and beyond ..read more
Visit website

Follow Cybereason Blog on FeedSpot

Continue with Google
Continue with Apple
OR