logo
episode-header-image
Nov 2024
35m 51s

What Can Organizations Learn from "Grim ...

Malicious Life
About this episode

On 17 and 18 of September 2024, thousands of pagers and hand held radio devices used by Hezbollah, exploded simultaneously across Lebanon and Syria, killing at least 42 terrorists and wounding more than 3,000. 

Devon Ackerman, Cybereason’s Global Head of Digital Forensic and Incident response and a former Special Agent at the FBI's Operational Technology Division, discusses the lessons organizations can learn from this ultra-sophisticated supply chain attack. How such traumatic events impact the mindset of hacked organizations, what kind of threat actors are capable of pulling off long-term attacks like these, and the three most important steps organizations can take to minimize the chance of a supply chain attack.



Advertising Inquiries: https://redcircle.com/brands
Up next
Dec 2024
Weev, Part 2
The Electronic Frontier Foundation, long time critics of the Computer Fraud and Abuse Act, followed Weev's trial - but did not get involved. For the appeal, however, the organization decided to step it. But althought the EFF had some strong points against the CFAA - the justi ... Show More
28m 49s
Nov 2024
Weev, Part 1
Much like Aaron Swartz did, Andrew "weev" Auernheimer fought against the Computer Fraud and Abuse Act, a law both men belived to be dangerous and unjust. But unlike Swartz, the internet's own boy, weev is an unapologetic troll who spread bile and chaos wherever he goes, a man who ... Show More
29m 56s
Nov 2024
Cuckoo Spear [B-Side]
APT-10 is a Chinese nation-state threat actor that in recent years has been targeting Japanese IT & Instrastructure organizations using a sophisticated backdoor malware known as LODEINFO. Recently, Jin Ito & Loic Castel, researchers from Cybereason's IR Team, uncovered a new tool ... Show More
30m 43s
Recommended Episodes
Aug 25
From CVE To Cyber Attack In Minutes With AI: Cybersecurity Today
Host David Shipley explores the latest in cybersecurity, including the rapid development of AI-generated exploits for critical vulnerabilities, record-high searches of digital devices at US borders, and a fired developer jailed for sabotaging his former employer. Additionally, th ... Show More
8m 26s
Dec 2024
How Cybercriminals Leverage Disruption for Maximum Impact [Encore]
In this episode of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, sits down with Wendi Whitmore, Senior Vice President of Unit 42, to discuss the increasing speed and sophistication of cyber attacks. Wendi shares her extensive expertise, highlighting the ... Show More
25 m
Sep 6
From CVE To Cyber Attack In Minutes With AI: Cybersecurity Today
The Future of Cybersecurity: AI, Exploits, and the CVE Database In this special crossover episode of Cybersecurity Today and Hashtag Trending, the hosts explore the use of artificial intelligence (AI) in cybersecurity. The conversation begins with an overview of the ongoing 'arms ... Show More
31m 51s
Jul 2024
2975: AI in Cybersecurity: Balancing Innovation and Risk
Are you prepared for the ever-evolving cybersecurity threats that challenge today's businesses? In this episode of Tech Talks Daily, we sit down with Dave Merkel, CEO of Expel, to delve into the dynamic world of cybersecurity. With threats becoming more sophisticated and frequent ... Show More
24m 29s
Sep 2024
La sidérante opération du Mossad contre le Hezbollah
Des centaines de bipeurs et de talkies-walkies utilisés par l’organisation islamique libanaise, ont explosés mardi et mercredi. Tous les regards se tournent vers Israël, dont le service de renseignements le Mossad est soupçonné d’avoir mené l’opération. Une action coup de poing, ... Show More
2m 59s
Oct 2024
Navigating NIST CSF 2.0: Guide to Frameworks and Governance
In this episode, we sat down with Lukasz Gogolkiewicz, an Australia-based Cybersecurity Leader and former pentester, to explore his journey from offensive security into cybersecurity leadership. Lukasz, also a speaker coach at BlackHat USA, brings valuable insights into what it t ... Show More
36m 29s
Sep 2024
Evening Edition: Hezbollah Left Reeling After Mysterious Exploding Pagers Attack
In Lebanon, the Iran-backed terror group Hezbollah has suffered an attack targeting their fighters, medics, and associates. The method of attack: the explosion of Hezbollah members’ own encrypted pagers. Early on Tuesday, the pagers Hezbollah fighters carry to communicate were de ... Show More
16m 4s
Nov 2024
War Room Best Practices
In this episode of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, is joined by cybersecurity experts Kyle Wilhoit, Director of Threat Research, and Michal Goldstein, Director of Security Architecture and Research at Palo Alto Networks. Together, they exp ... Show More
35m 17s