logo
episode-header-image
Oct 2022
38m 53s

The Zombies Are Attacking

iHeartPodcasts
About this episode

What is a zombie computer? What is a botnet? And what the heck is a DDoS attack? We look at a common tactic used by hackers to silence or inconvenience a target, how it works, and the measures companies like Cloudflare take to mitigate them.

See omnystudio.com/listener for privacy information.

Up next
Today
Shell Game: Minimum Viable Company
<p>This is the first episode of the second season of Shell Game. Journalist Evan Ratliff tells a story of entrepreneurship in the AI age; or, how he tried to build a real company, run by fake people.</p> <p>Meet Kyle Law and Megan Flores, Evan&rsquo;s AI agent cofounders, as he p ... Show More
33m 56s
Nov 26
The Story: What Does the Future of War Look Like?
<p>This week, what does defense technology look like in 2025? Oz talks to Pulitzer Prize-winning journalist Dexter Filkins about his recent piece in&nbsp;<em>The New Yorker</em> titled &ldquo;Is the US ready for the next war?&rdquo; They discuss how the Ukraine and Israel are rei ... Show More
32m 34s
Nov 21
Week in Tech: Could a Dead Cat Sink Waymo?
<p>Would you buy a boat or a midcentury sideboard from your high school pals? Because Oz&rsquo;s alma mater has opened an <em>exclusive</em> online marketplace for just this purpose! This week, Oz spins a yarn about Kitkat, the San Francisco cat killed by a Waymo. Locals are furi ... Show More
32m 47s
Recommended Episodes
May 2016
Daily: Ransomware & DDoS combining. Malicious USB chargers. Cyber ops aren't 'bombs?
In today's podcast, we hear about the current state of ransomware, why criminals like it, and what can be done about it. Keyloggers are being distributed by malicious USB charging devices. Blue Coat may be headed for an IPO. US cyber operations have been called "cyber bombs," but ... Show More
12m 45s
Feb 2021
The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning
<p>The image of a hooded individual illuminated by the glare of a computer screen hacking into a company’s network is the classic picture of what a cyber attack looks like. The reality, though, is these attackers are almost never a one-man band, but rather a sophisticated team ar ... Show More
40m 57s
Jun 2023
CISA's new Binding Operational Directive. “CosmicEnergy” tool doesn’t pose a cosmic threat. Hackers’ homage to fromage in attacks against the Swiss government. Industry advice for the White House.
CISA issues a new Binding Operational Directive. An update on CosmicEnergy. Hackers’ homage to fromage in attacks against the Swiss government. Ukraine's Cyber Police shut down a pro-Russian bot farm. Clothing and footwear retailers see impersonation and online fraud. A 2021 rans ... Show More
29m 31s
Jan 2023
TA444 and crypto theft on behalf of the Dear Successor. CryptoAPI spoofing vulnerability described. New Python-based malware campaign. User headspace. Tanks vs. hacktivists.
How do the North Koreans get away with it? They do run their cyber ops like a creepy start-up business. A spoofing vulnerability is discovered in Windows CryptoAPI. Python-based malware is distributed via phishing. MacOS may have a reputation for threat-resistance, but users shou ... Show More
29m 40s
Jun 2023
A new botnet takes a frosty bite out of the gaming industry. [Research Saturday]
Our guest, Allen West from Akamai's SIRT team, joins Dave to discuss their research on "The Dark Frost Enigma: An Unexpectedly Prevalent Botnet Author Profile." Akamai found this new botnet was targeting the gaming industry, modeled after Qbot, Mirai, and other malware strains. T ... Show More
19m 28s
Jun 2020
Cyberespionage and counterespionage. The DDoS that never was. A very strange case of cyberstalking. And leaky niche dating sites.
What does Beijing want to know about US Presidential campaigns? Position papers, mostly. A redacted version of the CIA’s inquiry into the WikiLeaks Vault 7 material is out. That DDoS attack you read about on Twitter? Never happened. Former eBay employees face Federal charges of c ... Show More
22m 3s
Jan 2023
The power of web data in cybersecurity. [CyberWire-X]
The public web data domain is a fancy way to say that there is a lot of information sitting on websites around the world that is freely available to anybody who has the initiative to collect it and use it for some purpose. When you do that collection, intelligence groups typicall ... Show More
27m 57s
Apr 2020
Cybersecurity notes during the pandemic emergency. Twitter bots. Ransomware attack on a biotech firm. WHO updates. And how are the cyber gangs doing these days?
Geolocation in support of social distancing. Fixing vulnerabilities in a popular teleconferencing service. Twitter bots running an influence campaign against the Turkish government are taken down. A biotech firm reports a ransomware attack. More on attempts to compromise the Worl ... Show More
26m 21s
Sep 2023
Malicious ads in a chatbot. A vulnerability gets some clarification. Cl0p switches from Tor to torrents. Influence operations as an adjunct to WMD. And NSA’s new AI Security Center.
Malicious ads in a chatbot. Google provides clarification on a recent vulnerability. Cl0p switches from Tor to torrents. Influence operations as an adjunct to weapons of mass destruction. Our guest Jeffrey Wells, former Maryland cyber czar and partner at Sigma7 shares his thought ... Show More
26m 46s
Jun 2023
Reddit sees bad luck as a BlackCat attack crosses their path. The C2C market is more mystical nowadays. Hacktivist auxiliaries and false flags in the hybrid war.
The BlackCat gang crosses Reddit’s path, threatening to leak stolen data. Mystic Stealer malware evades and creates a feedback loop in the C2C market. RDStealer is a new cyberespionage tool, seen in the wild. The United States offers a reward for information on the Cl0p ransomwar ... Show More
28m 57s