Episodes
Today's episode of the Defending The Edge Podcast with DefendEdge, Lyndon, Katey, and Andrea discuss topics such as the U.S. presidential election, touching on post-election cyberattacks and polling threats. Additionally, topics such as the Middle Eastern conflict and improvements regarding robots learning how to clean water basins are touched on. Join us today for the second episode on the new bi-weekly basis that is developed and leans into the world of all things cybersecurity.
Published 11/19/24
This month’s podcast we dive into some of the latest updates from the cybersecurity field. With expectations and sights set on developments from the ongoing Middle East conflict and potential implications to election day coming soon. The team discusses the long-term effects on the election cycle and potential risks like those released by the FBI and CISA carrying over into the new year. We are also happy to announce that the podcast will be moving from what was a monthly schedule to now bi-we...
Published 10/31/24
In this month's episode of the Defending the Edge Podcast with DefendEdge, join us as we discuss the cyber events of the past month, including a deep dive into recent Pegasus spyware sextortion scams that send unsuspected victims pictures of their houses as a fear tactic.
Published 10/01/24
In this month's episode of Defending the Edge Podcast with DefendEdge, join us as we discuss the cyber events of the past month, including cyber attacks against the U.S. election, and dive into the National Public Data Breach affecting almost 3 billion people.
Published 09/03/24
Red hat, blue hat, grey hat, black hat; follow along as we dive into the world of hackers on episode 21 of the Defending the Edge Podcast with DefendEdge set to be released on August 6th. Uncover the different veils that make up ethical hackers, state-sponsored hackers, and other hats they wear. Topics such as the recent AT&T data breach, CrowdStrike, and how Singapore is implementing a new rule in hopes of stopping future phishing attacks will also be mentioned in this new episode, as we...
Published 08/06/24
In this episode, we dive deep into the three pillars of cybersecurity: Patching, Passwords, and Phishing, exploring best practices, common pitfalls, and real-world examples to help fortify your defenses. Additionally, we'll bring you the latest updates in Artificial Intelligence, discussing advancements and their implications for cybersecurity, from AI-driven security solutions to emerging threats posed by AI technologies. To keep you informed, we'll also review the past month's most signific...
Published 07/02/24
In this episode, we sit down with DefendEdge's Security Operations Center (SOC) Director, Aaron Bozek, to explore the frontline defenses and best practices that keep organizations safe in the ever-evolving cybersecurity landscape. Our guest shares insights into the daily operations, challenges, and strategies SOC teams employ to detect and mitigate threats effectively. SOC Analyst Lyndon Bryant joins the team as a podcast host, and the conversation shifts to a deep dive into the intersection ...
Published 06/04/24
Welcome back to Defending the Edge, your monthly podcast destination! Our Cyber Threat Intelligence team is here to guide you through the latest happenings since our last episode in 2022. Let's dive into the world of cybersecurity and unpack the prominent ransomware threat actors that have been making waves in 2023 and 2024, along with key cyber attacks and persistent threats.
Published 05/01/24
Ransomware has become more advanced, we see troubling cyber threat trends in the wake of COVID-19, we discuss Black Basta with W/TH Secure, and we have a CEO and Director's round table discussion. Special guest "Not Billy Joel."
Published 09/29/22
No usual show this week. Instead, we have a big announcement about expanding Cyber Threat Intelligence capabilities at DefendEdge and changing up content on the podcast. Check out our newly launched Cyber Threat Intelligence page on our website.
Published 08/18/22
Maui ransomware details emerge, Greece spies on journalists, more deep-fake concerns come out, and threat actors are selling some interesting malicious services on the open web. We take a look at multiple events happening with Russia and Ukraine during our cyber threat intelligence spotlight.
Published 08/11/22
The U.S. Court PACER system was breached two years ago and we just found out, more software programs are being impersonated and laced with malware, Robotext scams are on the rise, and we take a deeper look at Pegasus and NSO Group. Is commercial spyware a real concern? The answer may surprise you.
Published 08/04/22
Economic frustrations may be increasing inside threat activity, Brute Ratel’s badgers have been co-opted by threat actors, Ducktail malware is designated as a full-fledged campaign, and we talk about the reality of risk reduction and mitigation. This week we take a look at Iran's shadow cyber war with Israel.
Published 07/28/22
Exploitation expands on the Internet of Things, Quantum Computing gets closer and might just destroy our current understanding of security encryption, and I walk you through China’s cyber-psyop with TikTok.
Published 07/21/22
Killnet continues its pro-Russia hacktivism DDoS campaign, Microsoft announced a massive adversary in the middle campaign in progress, threat actors attempt to impersonate Crowdstrike, and we go vacationing in Maui with North Korea and Dear Leader. This week we break down the kill-chain for social engineering and recap North Korea's use of skilled IT workers and their success in exfiltrating data and funds back to Pyongyang.
Published 07/14/22
Raspberry Robin infects an untold number of computers but is it a threat? Maybe. Probably? RedAlert ransomware targets VMware, the cyber-proxy war in the Russia-Ukraine conflict ramps up, and we take a look at police spyware. This week I sat down with Justin Mohr, USAF (Ret) to discuss cyber operations in the DoD and life as a Security Operations Center Team Lead.
Published 07/07/22
The FBI warns of deepfake tech workers, another crypto heist makes headlines, a study shows which type of phishing scams employees are likely to fall victim to, and we take a look at a cyber threat group taking up domestic terrorism under the guise of hacktivism. This week I sat down with Dipesh Shah, CIO at Cresa, to discuss corporate concerns in cyber security and what processes he uses to effectively mitigate cyber security risks.
Published 06/30/22
RSOCKS botnet goes down, Flagstar Bank suffers a massive breach, Internet Explorer finally, finally, retires but is it still a security concern? The answer won’t surprise you. Those headlines and more. This week we sit down with Col James Regenor USAF (Ret), CEO of VeriTX, to discuss blockchain security applications in digital logistics.
Published 06/23/22
Portland Oregon is exploited for $1.4 million, cyber hacks can open physical security doors, more information breaks on Chinese-backed threat groups, and ransomware exploitation gets even craftier. We talk about indicators of compromise and this week's cyber threat intelligence spotlight features multiple snippets of various Chinese-backed threat actors including long-term campaigns affecting telecommunications industries.
Published 06/16/22
Elasticsearch gets hit by ransomware, Apple confirms large-scale app-store fraud, and China’s cyber-espionage continues to expand but do we have our own heroes, a cyber double-O, on her Majesty’s Cyber Security Service? We’ll find out today when we are joined by special guest, "not James Bond." This week I sat down with Eric Berndtson to discuss vulnerability management and vulnerability assessments. Special credit to Eleven Music on YouTube for their 007 James Bond theme music.
Published 06/09/22
Nigerian Princes go 2.0, ransomware is faster than ever, malware hides its command and control servers, and is there such a thing as charitable ransomware? We take a look. This week we sat down with Ryan Phelan, an intellectual property attorney, to talk about artificial intelligence and machine learning.
Published 06/02/22
Account pre-hijacking is your newest concern, Interpol warns that nation-state malware will be available for use on the dark web, China threatens Starlink, and we say goodbye to Conti. In our weekly interview, we sit down for a long discussion with BGen Blaine Holt, U.S. Air Force (Ret), to talk major threat actors, the Russia-Ukraine cyber war, and the asymmetry of cyber warfare.
Published 05/26/22
Pyongyang plants skilled IT workers into companies, thus making an extremely strong case for zero-trust architecture, Five Eyes and CISA sounds the alarm on MSP exploitation, and penetration testers show us how the good guys can stay ahead of threat actors. We sit down with Matt Lindenbaum, Federal Lead for NewRocket and Co-founder of Converging Concepts to hear his insights.
Published 05/19/22
A severe vulnerability rocks F5 Inc., SilentBreak threat group launches new malware attacks, vanity URLs are exploited by social engineers, and China takes advantage of the Russia-Ukraine war. We sit down for an in-depth interview with Aaron Bozek and Wesles Lubin, two of the SOC leads for DefendEdge. Aaron is a Security Engineer and SOC Lead for US Threat Intelligence and Wes is the SOC Lead for US Operations Business and Services.
Published 05/12/22