logo
episode-header-image
Jul 12
1h 10m

Cybersecurity Month in Review: Key Insig...

Jim Love
About this episode

In this episode of 'Cybersecurity: Today's Month in Review,' the panel of experts, including Laura Payne, David Shipley, and new guest Tammy Harper, delve into major cybersecurity stories from the past month. Discussions range from the recent arrest of a Montreal scam operator, Scattered Spider's targeted attacks on various sectors, and the impacts of AI on the cybersecurity landscape. The panel also highlights industry shifts, new threat tactics, and the importance of strategic communication during incidents. The episode concludes with reflections on AI's integration into enterprise systems, emphasizing preparation and ethical considerations.

00:00 Introduction to the Cybersecurity Month in Review
00:12 Meet the Panelists
00:26 Laura Payne's Introduction
01:04 David Shipley's Introduction
01:38 Tammy Harper's Introduction
04:09 First Story: Montreal Scam Arrest
10:52 David Shipley's Big Story: Scattered Spider
16:40 The Rise of Young Cybercriminals
32:36 Ingram Micro Ransomware Attack
33:27 Government Breaches and Fast Recovery
34:56 Ingram Micro Incident and Communication Failures
35:55 Importance of Communication in Incident Response
37:39 Ransomware Trends and Threat Actor Tactics
39:55 Shift from Encryption to Exfiltration
46:41 Government Actions and Market Impact
51:27 AI in Cybersecurity: Risks and Opportunities
58:53 Ethical AI and Future Considerations
01:08:12 Final Thoughts and Wrap-Up

Up next
Today
A Simple Phrase Defeats GPT5 Security
In this episode of Cybersecurity Today, host Jim Love discusses recent developments in cybersecurity, including a method to bypass GPT5 model safeguards, malware issues in the Google Play Store, NIST's new AI-specific security controls, and a cyber attack that led to a government ... Show More
11m 10s
Aug 25
From CVE To Cyber Attack In Minutes With AI: Cybersecurity Today
Host David Shipley explores the latest in cybersecurity, including the rapid development of AI-generated exploits for critical vulnerabilities, record-high searches of digital devices at US borders, and a fired developer jailed for sabotaging his former employer. Additionally, th ... Show More
8m 26s
Aug 23
The Evolving Landscape of Cybersecurity Training: Effective Strategies and Misleading Headlines
In this episode of Cybersecurity Today, host Jim Love explores the complex dynamics of cybersecurity training with guests Michael Joyce and David Shipley. They discuss the importance of continuous awareness and the temporal decay of training effects. The conversation highlights t ... Show More
1h 22m
Recommended Episodes
Nov 2024
Bridging AI and Cybersecurity Gaps with Mileva Security Labs’ Harriet Farlow
Join us in this episode of Threat Vector as guest host Michael Heller shares his conversation with Harriet Farlow, CEO of Mileva Security Labs and a pioneer in AI security research. With a background spanning AI and national cybersecurity, Harriet shares her journey into adversar ... Show More
27m 17s
Jul 2024
2975: AI in Cybersecurity: Balancing Innovation and Risk
Are you prepared for the ever-evolving cybersecurity threats that challenge today's businesses? In this episode of Tech Talks Daily, we sit down with Dave Merkel, CEO of Expel, to delve into the dynamic world of cybersecurity. With threats becoming more sophisticated and frequent ... Show More
24m 29s
Dec 2024
Decoding XDR: Allie Mellen on What’s Next [Threat Vector]
While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, Threat Vector by Palo Alto Networks. See you in 2025! Announcement: We are pleased to share an exciting announcement about Cortex XDR at the top of our show. You can learn more ... Show More
39m 59s
Aug 2024
Cybersecurity leaders gear up for the ultimate test.
Black Hat kicks off with reassurances from global cyber allies. Researchers highlight vulnerabilities in car head units, AWS and 5G basebands. Alleged dark web forum leaders are charged in federal court. Tens of thousands of ICS devices are vulnerable to weak automation protocols ... Show More
33m 2s
Jan 2025
National security in the digital age.
A draft cybersecurity executive order from the Biden administration seeks to bolster defenses. Researchers identify a “mass exploitation campaign” targeting Fortinet firewalls. A Chinese-language illicit online marketplace is growing at an alarming rate. CISA urges patching of a ... Show More
35m 20s
Nov 2024
Cyber Espionage and Financial Crime: North Korea’s Double Threat
In this episode of Threat Vector, host David Moulton speaks with Assaf Dehan, Director of Threat Research at Palo Alto Networks’ Cortex team, about the rising cyber threat from North Korea. Dehan, a cybersecurity expert with over 18 years of experience, discusses the nation's str ... Show More
33m 28s
Sep 2024
UK’s newest cybersecurity MVPs.
The UK designates data centers as Critical National Infrastructure. Cisco releases patches for multiple vulnerabilities in its IOS XR network operating system. BYOD is a growing security risk. A Pennsylvania healthcare network has agreed to a $65 million settlement stemming from ... Show More
34m 29s
Oct 2024
Cyber Trends for CISO’s
In this new episode of Life of a CISO, Dr. Eric Cole dives into one of the biggest challenges faced by Chief Information Security Officers (CISOs): staying up to date with the rapidly changing trends in cybersecurity. With new technologies, products, and vendors emerging from con ... Show More
30m 52s
Jul 1
Machine-Scale Defense and the Future of Cybersecurity
Jeetu Patel, President and Chief Product Officer at Cisco, joins Ann on this week's episode of Afternoon Cyber Tea to explore how artificial intelligence is reshaping the cybersecurity landscape. Jeetu shares insights on the urgent need for machine-scale defenses, the potential f ... Show More
29m 50s
Feb 2023
Vulnerabilities newly exploited in the wild. A new cyberespionage campaign. Trends in the C2C marketplace. Hacktivists, other auxiliaries, and the laws of armed conflict.
CISA adds three entries to its Known Exploited Vulnerabilities Catalog. "Hydrochasma" is a new cyberespionage threat actor. IBM claims the biggest effect of cyberattacks in 2022 was extortion. Social network hijacking in the C2C market. A credential theft campaign against data ce ... Show More
28m 45s