The Cybersecurity Vault - episode 35, with guest Mikko Hypponen.
Some of the most aggressive cyber attacks originate out of Russia. The 2022 invasion of Ukraine was a pivotal moment for nation state attacks. Mikko is close to the front lines and on
The Cybersecurity Vault - episode 35, with guest Mikko Hypponen.
Some of the most aggressive cyber attacks originate out of Russia. The 2022 invasion of Ukraine was a pivotal moment for nation state attacks. Mikko is close to the front lines and on
Operation Endgame has taken down a major cyber criminal infrastructure. This is important, but likely not for the reasons you may think.
The multi-national law enforcement effort, led by EUROPOL, seized over 100 servers and 2 thousand domains that hos
When I heard of the MSI compromise, I had similar fears of an IT supply chain attack. However, after walking the logic and high-level details I felt that the current attack was unlikely a sophisticated play to compromise downstream consumers of MSI p
US Treasury sanctions a cryptocurrency mixing site for supporting North Korean hackers who have been stealing hundreds of millions of dollars. Blender.io is a virtual currency mixing site that obfuscates the origins of cryptocurrency coin transactio
Ransomware attacks and payments are increasing, with most revenue going to Russian attackers. It is time to revisit outlawing Ransomware payments.
Some stats to hammer the situation home:
Sophos ransomware report indicates:
- Ransom attacks are more fre
Thanks to DynamicCISO for a great discussion about the changing landscape of cybersecurity and how we must all adapt to drive trust into the global digital ecosystem. The key to our success is to think ahead and show leadership in managing innovation
2022 will be a very tumultuous year for cybersecurity professionals. The underlying fundamentals that drive major shifts of the cybersecurity industry — technologies, threats, and economic factors, will introduce new risks and combine to significantl
Ransomware is a growing scourge. Is it possible to eradicate this entire class of attacks? I think it is but in today’s Cybersecurity Insights interview I have a lively debate with Malcolm Harkins on criminalizing ransomware payments and different ap
A new tool is gaining popularity on the dark web which provides insights to users if their cryptocurrency activity might be flagged by authorities as potentially illicit. Such a tool can provide cybercriminals the intelligence necessary to stay under
There are 600 Million Differences Between Hackers and Cybercriminals…
An amazing story is emerging from a massive cryptocurrency exploitation that exemplifies the difference between a ‘hacker’ and a ‘cybercriminal’.
Interested in more cybersecurity i
There are only 3 fundamental ways to stop attacks from motivated and intelligent adversaries.
Let’s identify and explore those options, and discuss how they may be applied to undermine Ransomware.
This video is the latest installment of a multi-part
We are thrilled to invite you to the CISO Breakfast at BlackHat 2024.
CISOPlatform is a community partner for the event which is co-hosted by Silicon Valley Bank, Stage One, First Rays Venture Partners, Latham & Watkins.
Event Details: