logo
episode-header-image
Feb 2022
48m 35s

111: ZeuS

Jack Rhysider
About this episode
ZeuS is a banking trojan. Designed to steal money from online bank user’s accounts. This trojan became so big, that it resulted in one of the biggest FBI operations ever. Sponsors Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Managemen ... Show More
Up next
Jan 20
169: MoD
Legion of Doom, step aside. There’s a new elite hacker group in town, and they’re calling themselves Masters of Deception (MoD). With tactics that are grittier and more sophisticated than those of the LoD, MoD has targeted high-profile entities and left an indelible mark on the i ... Show More
1h 6m
Jan 6
168: LoD
The Legion of Doom (LoD) wasn’t just a “hacker group”, it captured the essence of underground hacking in the 80s/90s. BBSes, phreaking, rival crews, and the crackdowns that changed everything. From those humble beginnings came a legacy that still echoes through modern security cu ... Show More
1h 17m
Dec 23
167: Threatlocker
A manufacturer gets hit with ransomware. A hospital too. Learn how Threatlocker stops these types of attacks. This episode is brought to you by Threatlocker.SponsorsThis episode is sponsored by ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengt ... Show More
49m 17s
Recommended Episodes
Dec 2021
Keeping Security Simple with Johanna Baum, the CEO and Founder of S3 (Strategic Security Solutions)
<p>There is a lot of conversation among IT security leaders about engaging the workforce in order to mitigate threats. But how do security professionals actually win people over to their side? Many employees are willing to comply but what can be done to really get through to thos ... Show More
41 m
Sep 2022
Securing the Unstructured Castle: Protecting Your “Dark Data”
Every attorney knows to lock client secrets behind sophisticated cybersecurity. But as guest Rich Hale explains, the data that’s hiding in plain sight, “Dark Data,” is just as important to your client relationships and your reputation. After this important episode, you’ll want to ... Show More
42m 1s
Feb 2021
The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning
<p>The image of a hooded individual illuminated by the glare of a computer screen hacking into a company’s network is the classic picture of what a cyber attack looks like. The reality, though, is these attackers are almost never a one-man band, but rather a sophisticated team ar ... Show More
40m 57s
Jul 2021
Analyzing the Impact of A.I. and Technology on Society and Cybersecurity
<p>Technology is advancing at pace never seen before and the newest tech, applications and widgets are being widely adopted at an even quicker rate. </p><p>Just look at A.I. and machine learning tools,which are now used to identify things once thought unimaginable — whether it's ... Show More
49m 58s
May 2014
Cyber Security
Can you keep business safe from hackers? Many companies now feel besieged by constant attacks and few can claim not to have been targeted. In the first of a new series of the award-winning The Bottom Line Evan Davis and guests discuss the anatomy of a cyber attack - where the thr ... Show More
28m 7s
Jan 2021
Living on the Edge: How Netskope is Redefining Edge Security
<p>When Netskope CEO and founder <a href="https://www.linkedin.com/in/sanjayberi/">Sanjay Beri </a>left his role with well-known Juniper Networks, he knew the internet and the way that we protected ourselves virtually was changing. The issue is that while Sanjay knew companies ne ... Show More
45m 49s
Jul 2023
Charl van der Walt on Cyber Extortion
<p>What are the latest trends in the ransomware-as-a-service ecosystem? Since at least May 27, the CL0P ransomware gang has been exploiting a previously unknown vulnerability to exfiltrate data from financial services organizations, energy corporations, government agencies, and e ... Show More
53m 46s