<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:cc="http://web.resource.org/cc/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" version="2.0">

  <channel>
    <atom:link href="https://rss.libsyn.com/shows/56676/destinations/212001.xml" rel="self" type="application/rss+xml"/>
    <title>The Threatpost Podcast</title>
    <pubDate>Mon, 15 Dec 2025 06:28:35 +0000</pubDate>
    <lastBuildDate>Mon, 15 Dec 2025 06:28:35 +0000</lastBuildDate>
    <generator>Libsyn RSSgen 1.0</generator>
    <link>http://threatpost.com</link>
    <language>en</language>
    <copyright>Copyright © 2016 Threatpost </copyright>
    <docs>http://threatpost.com</docs>
    <itunes:summary>Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.</itunes:summary>
    <image>
      <url>https://static.libsyn.com/p/assets/a/8/c/0/a8c0d322d84d482b/threatpost_podcast.png</url>
      <title>The Threatpost Podcast</title>
      <link><![CDATA[http://threatpost.com]]></link>
    </image>
    <itunes:author>Mike Mimoso, Chris Brook</itunes:author>
		

    <itunes:image href="https://kasperskycontenthub.com/threatpost/files/2016/09/tp_podcast_high.png"/>
    <itunes:explicit>no</itunes:explicit>
    
    <description>Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.</description>
    
    <itunes:type>episodic</itunes:type>
    

    <itunes:keywords>cybersecurity,malware,information,security,computer,security,security,threats,cryptography,network,security</itunes:keywords>

    

    
    <podcast:locked owner="lindsey.odonnell@threatpost.com">no</podcast:locked>
    
    
    
    
    
    <itunes:subtitle>The Information Security Podcast</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Tech News"/></itunes:category><itunes:owner><itunes:email>chris@threatpost.com</itunes:email><itunes:name>Mike Mimoso, Chris Brook</itunes:name></itunes:owner><item>
      <title>Inside the Hackers' Toolkit</title>
      <itunes:title>Inside the Hackers' Toolkit</itunes:title>
      <pubDate>Tue, 09 Aug 2022 14:46:57 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[b08af110-edce-4a8a-9022-93176fbcfc63]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/inside-the-hackers-toolkit]]></link>
      <description><![CDATA[<p>There is no question that companies are in the sights of would-be criminals looking to exploit them. While companies look at solutions and trainings to help keep the perimeter secure, the biggest fail point is often the employees, AKA the human element.</p> <p>In this Threatpost podcast, sponsored by Egress, we sit down with Jack Chapman to discuss the steps and tactics that companies can take to stay one step ahead of their adversaries.</p> <p>During our conversation, we discuss:</p> <ul> <li>Weaknesses that attackers look to exploit</li> <li>Evolution of toolkits</li> <li>Securing MFA and more</li> </ul>]]></description>
      
      <content:encoded><![CDATA[<p>There is no question that companies are in the sights of would-be criminals looking to exploit them. While companies look at solutions and trainings to help keep the perimeter secure, the biggest fail point is often the employees, AKA the human element.</p> <p>In this Threatpost podcast, sponsored by Egress, we sit down with Jack Chapman to discuss the steps and tactics that companies can take to stay one step ahead of their adversaries.</p> <p>During our conversation, we discuss:</p> <ul> <li>Weaknesses that attackers look to exploit</li> <li>Evolution of toolkits</li> <li>Securing MFA and more</li> </ul>]]></content:encoded>
      
      
      <enclosure length="30737870" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/threatpost_egress_v3.mp3?dest-id=212001"/>
      <itunes:duration>16:01</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>There is no question that companies are in the sights of would-be criminals looking to exploit them. While companies look at solutions and trainings to help keep the perimeter secure, the biggest fail point is often the employees, AKA the human element. In this Threatpost podcast, sponsored by Egress, we sit down with Jack Chapman to discuss the steps and tactics that companies can take to stay one step ahead of their adversaries. During our conversation, we discuss: Weaknesses that attackers look to exploit Evolution of toolkits Securing MFA and more</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>There is no question that companies are in the sights of would-be criminals looking to exploit them. While companies look at solutions and trainings to help keep the perimeter secure, the biggest fail point is often the employees, AKA the human element. In this Threatpost podcast, sponsored by Egress, we sit down with Jack Chapman to discuss the steps and tactics that companies can take to stay one step ahead of their adversaries. During our conversation, we discuss: Weaknesses that attackers look to exploit Evolution of toolkits Securing MFA and more</itunes:summary></item>
    
    <item>
      <title>Being prepared for adversarial attacks</title>
      <itunes:title>Being prepared for adversarial attacks</itunes:title>
      <pubDate>Thu, 02 Jun 2022 09:29:27 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[b0ddee31-14a5-4031-acae-3b81ee4329ca]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/being-prepared-for-adversarial-attacks]]></link>
      <description><![CDATA[<p>There is no question that the level of threats facing today's businesses continues to change on a daily basis. So what are the trends that CISOs need to be on the lookout for?</p> <p>For this episode of the Threatpost podcast, I am joined by Derek Manky, , Chief Security Strategist & VP Global Threat Intelligence, <a href="https://twitter.com/Fortinet">Fortinet's FortiGuard Labs</a> to discuss the threats facing CISOs along with more.</p> <p>During the course of our discussion, we dive into:</p> <ul> <li>What an attack on all fronts looks like</li> <li>The current state of the threat landscape</li> <li>New techniques being leveraged be adversaries</li> <li>The automation of threats</li> </ul> <p>We also lay out what CISOs need to consider when laying out and producing their threat action plan.</p>]]></description>
      
      <content:encoded><![CDATA[<p>There is no question that the level of threats facing today's businesses continues to change on a daily basis. So what are the trends that CISOs need to be on the lookout for?</p> <p>For this episode of the Threatpost podcast, I am joined by Derek Manky, , Chief Security Strategist & VP Global Threat Intelligence, <a href="https://twitter.com/Fortinet">Fortinet's FortiGuard Labs</a> to discuss the threats facing CISOs along with more.</p> <p>During the course of our discussion, we dive into:</p> <ul> <li>What an attack on all fronts looks like</li> <li>The current state of the threat landscape</li> <li>New techniques being leveraged be adversaries</li> <li>The automation of threats</li> </ul> <p>We also lay out what CISOs need to consider when laying out and producing their threat action plan.</p>]]></content:encoded>
      
      
      <enclosure length="42558090" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Threatpost_Fortinet.mp3?dest-id=212001"/>
      <itunes:duration>22:10</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/b/c/c/2/bcc2049fb0f51a29e5bbc093207a2619/Fortinet-Logo.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>There is no question that the level of threats facing today's businesses continues to change on a daily basis. So what are the trends that CISOs need to be on the lookout for? For this episode of the Threatpost podcast, I am joined by Derek Manky, , Chief Security Strategist &amp; VP Global Threat Intelligence, Fortinet's FortiGuard Labs to discuss the threats facing CISOs along with more. During the course of our discussion, we dive into: What an attack on all fronts looks like The current state of the threat landscape New techniques being leveraged be adversaries The automation of threats We also lay out what CISOs need to consider when laying out and producing their threat action plan.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>There is no question that the level of threats facing today's businesses continues to change on a daily basis. So what are the trends that CISOs need to be on the lookout for? For this episode of the Threatpost podcast, I am joined by Derek Manky, , Chief Security Strategist &amp; VP Global Threat Intelligence, Fortinet's FortiGuard Labs to discuss the threats facing CISOs along with more. During the course of our discussion, we dive into: What an attack on all fronts looks like The current state of the threat landscape New techniques being leveraged be adversaries The automation of threats We also lay out what CISOs need to consider when laying out and producing their threat action plan.</itunes:summary></item>
    
    <item>
      <title>The State of Secrets Sprawl</title>
      <itunes:title>The State of Secrets Sprawl</itunes:title>
      <pubDate>Fri, 06 May 2022 13:42:07 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[6fbf55eb-c2be-46e1-aead-a576ba5eb16f]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/the-state-of-the-secret-sprawl]]></link>
      <description><![CDATA[<p>Can I tell you a secret? Will you keep it between us?</p> <p>You've probably said this or heard this when it comes to friends and family. However, do you also know that secret keeping, or lack thereof is one of the biggest issues that businesses face?</p> <p>According to the recent <em>The State of the Secret Sprawl</em> from GitGuardian further defines the breadth of business secrets.</p> <p>"A secret can be any sensitive data that we want to keep private. When discussing secrets in the context of software development, secrets generally refer to digital authentication credentials that grant access to services, systems and data. These are most commonly API keys, usernames and passwords, or security certificates. Secrets are what tie together different building blocks of a single application by creating a secure connection between each component. Secrets grant access to the most sensitive systems."</p> <p>In this podcast with Mackenzie Jackson, developer advocate at GitGuardian, we dive into the report and also the issues that corporations face with public leaks from groups like Lapsus and more, along with as ways that developers can keep their code safe.</p> <p>For the full report, <a href= "https://res.cloudinary.com/da8kiytlc/image/upload/v1615208698/StateofSecretSprawlReport-2021.pdf"> click here</a>.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Can I tell you a secret? Will you keep it between us?</p> <p>You've probably said this or heard this when it comes to friends and family. However, do you also know that secret keeping, or lack thereof is one of the biggest issues that businesses face?</p> <p>According to the recent <em>The State of the Secret Sprawl</em> from GitGuardian further defines the breadth of business secrets.</p> <p>"A secret can be any sensitive data that we want to keep private. When discussing secrets in the context of software development, secrets generally refer to digital authentication credentials that grant access to services, systems and data. These are most commonly API keys, usernames and passwords, or security certificates. Secrets are what tie together different building blocks of a single application by creating a secure connection between each component. Secrets grant access to the most sensitive systems."</p> <p>In this podcast with Mackenzie Jackson, developer advocate at GitGuardian, we dive into the report and also the issues that corporations face with public leaks from groups like Lapsus and more, along with as ways that developers can keep their code safe.</p> <p>For the full report, <a href= "https://res.cloudinary.com/da8kiytlc/image/upload/v1615208698/StateofSecretSprawlReport-2021.pdf"> click here</a>.</p>]]></content:encoded>
      
      
      <enclosure length="32300576" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Podcast_Threatpost_sponsored.mp3?dest-id=212001"/>
      <itunes:duration>16:50</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/c/5/5/b/c55bf95729b2755fa04421dee9605cbd/gitguardian-logotype-vertical-white-background_1.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Can I tell you a secret? Will you keep it between us? You've probably said this or heard this when it comes to friends and family. However, do you also know that secret keeping, or lack thereof is one of the biggest issues that businesses face? According to the recent The State of the Secret Sprawl from GitGuardian further defines the breadth of business secrets. "A secret can be any sensitive data that we want to keep private. When discussing secrets in the context of software development, secrets generally refer to digital authentication credentials that grant access to services, systems and data. These are most commonly API keys, usernames and passwords, or security certificates. Secrets are what tie together different building blocks of a single application by creating a secure connection between each component. Secrets grant access to the most sensitive systems." In this podcast with Mackenzie Jackson, developer advocate at GitGuardian, we dive into the report and also the issues that corporations face with public leaks from groups like Lapsus and more, along with as ways that developers can keep their code safe. For the full report, click here.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Can I tell you a secret? Will you keep it between us? You've probably said this or heard this when it comes to friends and family. However, do you also know that secret keeping, or lack thereof is one of the biggest issues that businesses face? According to the recent The State of the Secret Sprawl from GitGuardian further defines the breadth of business secrets. "A secret can be any sensitive data that we want to keep private. When discussing secrets in the context of software development, secrets generally refer to digital authentication credentials that grant access to services, systems and data. These are most commonly API keys, usernames and passwords, or security certificates. Secrets are what tie together different building blocks of a single application by creating a secure connection between each component. Secrets grant access to the most sensitive systems." In this podcast with Mackenzie Jackson, developer advocate at GitGuardian, we dive into the report and also the issues that corporations face with public leaks from groups like Lapsus and more, along with as ways that developers can keep their code safe. For the full report, click here.</itunes:summary></item>
    
    <item>
      <title>The Truth Behind 'Mythical' MacOS Malware – Podcast</title>
      <itunes:title>The Truth Behind 'Mythical' MacOS Malware – Podcast</itunes:title>
      <pubDate>Thu, 31 Mar 2022 19:53:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[0c13a193-2b0c-4c3a-9307-9b003cf44ed6]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/the-truth-behind-mythical-macos-malware-podcast]]></link>
      <description></description>
      
      <content:encoded/>
      
      
      <enclosure length="27219699" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/033122_Huntress_Jamie_Levy_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>18:53</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/1/e/8/3/1e83b2e84be3349e27a2322813b393ee/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:author>Mike Mimoso, Chris Brook</itunes:author></item>
    
    <item>
      <title>A Blockchain Primer and a Bored Ape Headscratcher – Podcast</title>
      <itunes:title>A Blockchain Primer and a Bored Ape Headscratcher – Podcast</itunes:title>
      <pubDate>Thu, 31 Mar 2022 01:48:40 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[3c34c977-aadd-4dce-9f10-9aa6de78fad0]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/a-blockchain-primer-and-a-bored-ape-headscratcher-podcast]]></link>
      <description></description>
      
      <content:encoded/>
      
      
      <enclosure length="39701737" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/032522_KnowBe4_Lydia_mixdown_2.mp3?dest-id=212001"/>
      <itunes:duration>27:33</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/4/d/1/e/4d1e4f834c20ae84d959afa2a1bf1c87/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:author>Mike Mimoso, Chris Brook</itunes:author></item>
    
    <item>
      <title>Cyberattackers Put the Pedal to the Metal – Podcast</title>
      <itunes:title>Cyberattackers Put the Pedal to the Metal – Podcast</itunes:title>
      <pubDate>Mon, 28 Mar 2022 19:48:36 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[0b52cdcb-db68-4a89-8676-1ae73856b1ba]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/cyberattackers-put-the-pedal-to-the-metal-podcast]]></link>
      <description></description>
      
      <content:encoded/>
      
      
      <enclosure length="27599120" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/032822_Derek_Manky_Fortinet_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>18:51</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/e/c/f/c/ecfc4bc9d77d3fe0a04421dee9605cbd/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:author>Mike Mimoso, Chris Brook</itunes:author></item>
    
    <item>
      <title>Top 3 Attack Trends in API Security – Podcast</title>
      <itunes:title>Top 3 Attack Trends in API Security – Podcast</itunes:title>
      <pubDate>Wed, 23 Mar 2022 19:48:11 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[a60c240c-6de1-4543-ab23-e2f5a464ccf2]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/top-3-attack-trends-in-api-security-podcast]]></link>
      <description></description>
      
      <content:encoded/>
      
      
      <enclosure length="31223807" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/031722_Cequence_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>21:40</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/4/3/8/c/438c46584bc2a2b3bafc7308ab683e82/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:author>Mike Mimoso, Chris Brook</itunes:author></item>
    
    <item>
      <title>Reporting Mandates to Clear Up Feds' Hazy Look into Threat Landscape – Podcast</title>
      <itunes:title>Reporting Mandates to Clear Up Feds' Hazy Look into Threat Landscape – Podcast</itunes:title>
      <pubDate>Wed, 16 Mar 2022 21:08:50 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[a591948e-5c02-470e-b426-164a33ff4610]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/reporting-mandates-to-clear-up-feds-hazy-look-into-threat-landscape-podcast]]></link>
      <description><![CDATA[<p>It's about time, AttackIQ's Jonathan Reiber said about 24H/72H report deadlines mandated in the new spending bill: Visibility into adversary behavior has been muck.</p>]]></description>
      
      <content:encoded><![CDATA[<p>It's about time, AttackIQ's Jonathan Reiber said about 24H/72H report deadlines mandated in the new spending bill: Visibility into adversary behavior has been muck.</p>]]></content:encoded>
      
      
      <enclosure length="35071739" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/031522_Jonathan_Reiber_Attack_IQ_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>24:20</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/0/3/2/c/032c835726aadc5b27a2322813b393ee/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>It's about time, AttackIQ's Jonathan Reiber said about 24H/72H report deadlines mandated in the new spending bill: Visibility into adversary behavior has been muck.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>It's about time, AttackIQ's Jonathan Reiber said about 24H/72H report deadlines mandated in the new spending bill: Visibility into adversary behavior has been muck.</itunes:summary></item>
    
    <item>
      <title>Staff Think Conti Group Is a Legit Employer – Podcast</title>
      <itunes:title>Staff Think Conti Group Is a Legit Employer – Podcast</itunes:title>
      <pubDate>Mon, 14 Mar 2022 21:15:28 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[09667a49-a381-4e8c-8be9-a3b443c1ccbe]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/staff-think-conti-group-is-a-legit-employer-podcast]]></link>
      <description><![CDATA[<p><span style="font-weight: 400;">The ransomware group's benefits – monthly bonuses, fines, employee of the month, performance reviews and top-notch training materials – might be better than your own company's, says BreachQuest's Marco Figueroa. </span></p>]]></description>
      
      <content:encoded><![CDATA[<p>The ransomware group's benefits – monthly bonuses, fines, employee of the month, performance reviews and top-notch training materials – might be better than your own company's, says BreachQuest's Marco Figueroa. </p>]]></content:encoded>
      
      
      <enclosure length="57459098" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/031122_Marco_Figueroa_BreachQuest_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>39:53</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/4/f/e/f/4fef05e2113c6d76d959afa2a1bf1c87/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>The ransomware group's benefits – monthly bonuses, fines, employee of the month, performance reviews and top-notch training materials – might be better than your own company's, says BreachQuest's Marco Figueroa. </itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>The ransomware group's benefits – monthly bonuses, fines, employee of the month, performance reviews and top-notch training materials – might be better than your own company's, says BreachQuest's Marco Figueroa. </itunes:summary></item>
    
    <item>
      <title>Multi-Ransomwared Victims Have It Coming</title>
      <itunes:title>Multi-Ransomwared Victims Have It Coming</itunes:title>
      <pubDate>Tue, 08 Mar 2022 00:06:50 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[0cdc1010-03b7-44a8-9b5e-0b7a7f836367]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/multi-ransomwared-victims-have-it-coming]]></link>
      <description><![CDATA[<p>There's a yawning gap between IT decision makers' confidence about security vs. their concession that repeated incidents are their own fault, says ExtraHop's Jamie Moles.</p>]]></description>
      
      <content:encoded><![CDATA[<p>There's a yawning gap between IT decision makers' confidence about security vs. their concession that repeated incidents are their own fault, says ExtraHop's Jamie Moles.</p>]]></content:encoded>
      
      
      <enclosure length="41542127" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/030722_ExtraHop_Jamie_Moles_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>28:50</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/4/4/3/2/44322222f875e66c16c3140a3186d450/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>There's a yawning gap between IT decision makers' confidence about security vs. their concession that repeated incidents are their own fault, says ExtraHop's Jamie Moles.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>There's a yawning gap between IT decision makers' confidence about security vs. their concession that repeated incidents are their own fault, says ExtraHop's Jamie Moles.</itunes:summary></item>
    
    <item>
      <title>Russia Leaks Data From a Thousand Cuts–Podcast</title>
      <itunes:title>Russia Leaks Data From a Thousand Cuts–Podcast</itunes:title>
      <pubDate>Thu, 03 Mar 2022 16:11:33 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[fcdb28c4-f2e1-498c-897b-1926e683b93d]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/russia-leaks-data-from-a-thousand-cutspodcast]]></link>
      <description><![CDATA[<p><span style="font-weight: 400;">It's not just Ukraine: Threat intel experts are seeing a flood of data on Russian military, nukes and crooks, even with the Conti ransomware gang having shuttered its leaking Jabber chat server. </span></p>]]></description>
      
      <content:encoded><![CDATA[<p>It's not just Ukraine: Threat intel experts are seeing a flood of data on Russian military, nukes and crooks, even with the Conti ransomware gang having shuttered its leaking Jabber chat server. </p>]]></content:encoded>
      
      
      <enclosure length="25508715" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/030222_Vinny_Troia_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>17:42</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/4/7/f/a/47fa60dbc1feb4485f2e77a3093c12a1/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>It's not just Ukraine: Threat intel experts are seeing a flood of data on Russian military, nukes and crooks, even with the Conti ransomware gang having shuttered its leaking Jabber chat server. </itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>It's not just Ukraine: Threat intel experts are seeing a flood of data on Russian military, nukes and crooks, even with the Conti ransomware gang having shuttered its leaking Jabber chat server. </itunes:summary></item>
    
    <item>
      <title>Securing Data With a Frenzied Remote Workforce–Podcast</title>
      <itunes:title>Securing Data With a Frenzied Remote Workforce–Podcast</itunes:title>
      <pubDate>Sat, 26 Feb 2022 00:01:41 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[ed041be7-3a7a-45ce-8aaf-f745f8357dc6]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/securing-data-with-a-frenzied-remote-workforcepodcast]]></link>
      <description><![CDATA[<p><span style="font-weight: 400;">Stock your liquor cabinets and take a shot whenever you hear GitLab Staff Security Researcher Mark Loveless say "Zero Trust."</span></p>]]></description>
      
      <content:encoded><![CDATA[<p>Stock your liquor cabinets and take a shot whenever you hear GitLab Staff Security Researcher Mark Loveless say "Zero Trust."</p>]]></content:encoded>
      
      
      <enclosure length="39789802" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/022522_Mark_Loveless_GitLab_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>27:37</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/a/a/9/2/aa92f38fa44404475f2e77a3093c12a1/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Stock your liquor cabinets and take a shot whenever you hear GitLab Staff Security Researcher Mark Loveless say "Zero Trust."</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Stock your liquor cabinets and take a shot whenever you hear GitLab Staff Security Researcher Mark Loveless say "Zero Trust."</itunes:summary></item>
    
    <item>
      <title>The Art of Non-boring Cybersec Training–Podcast</title>
      <itunes:title>The Art of Non-boring Cybersec Training–Podcast</itunes:title>
      <pubDate>Thu, 24 Feb 2022 13:47:01 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[8379ceb6-c4a5-42bd-85a7-536e701030be]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/the-art-of-non-boring-cybersec-trainingpodcast]]></link>
      <description><![CDATA[<p><span style="font-weight: 400;">With human error being the common factor in most cyberattacks, employee training has got to get better. To that end, Trustwave cybersec training expert Darren Van Booven explains the importance of fish stress balls and management buy-in.</span></p>]]></description>
      
      <content:encoded><![CDATA[<p>With human error being the common factor in most cyberattacks, employee training has got to get better. To that end, Trustwave cybersec training expert Darren Van Booven explains the importance of fish stress balls and management buy-in.</p>]]></content:encoded>
      
      
      <enclosure length="28626955" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/022222_Trustwave_Darren_van_Boofen_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>19:52</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/4/1/f/e/41febfb8b093ca3216c3140a3186d450/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>With human error being the common factor in most cyberattacks, employee training has got to get better. To that end, Trustwave cybersec training expert Darren Van Booven explains the importance of fish stress balls and management buy-in.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>With human error being the common factor in most cyberattacks, employee training has got to get better. To that end, Trustwave cybersec training expert Darren Van Booven explains the importance of fish stress balls and management buy-in.</itunes:summary></item>
    
    <item>
      <title>Killing Cloud Risk by Bulletproofing App Security: Podcast</title>
      <itunes:title>Killing Cloud Risk by Bulletproofing App Security: Podcast</itunes:title>
      <pubDate>Wed, 16 Feb 2022 23:05:56 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[95c7e79c-2ce5-43cb-89c6-735ae321cbb3]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/killing-cloud-risk-by-bulletproofing-app-security-podcast]]></link>
      <description><![CDATA[<p><span style="font-weight: 400;">Applications are the most preferred vectors for cybercriminals. Yet no single team or process can assure the rollout of safe cloud applications. From code design to unit testing to deployment, teams and tools have to work together to detect risks early while keeping the pipeline of digital products moving.</span></p> <p> </p> <p><span style="font-weight: 400;">Alex Rice, CTO at HackerOne and Johnathan Hunt, VP of Security at GitLab, help development teams evolve their processes to build security directly into their workflows for smooth and safe cloud app rollouts. </span></p> <p><span style="font-weight: 400;">They dropped by the Threatpost podcast recently to share tips on</span> <a href= "https://threatpost.com/apps-built-better-devsecops-security-silver-bullet/167793/"> <span style="font-weight: 400;">DevSecOps</span></a><span style= "font-weight: 400;">, including:</span></p> <p> </p> <ul> <li style="font-weight: 400;" aria-level="1"><span style= "font-weight: 400;">How to build a continual testing, monitoring, and feedback processes to drive down application risk.</span></li> <li style="font-weight: 400;" aria-level="1"><span style= "font-weight: 400;">Developing a continuous approach to application security and DevOps security tools.</span></li> <li style="font-weight: 400;" aria-level="1"><span style= "font-weight: 400;">Why collaboration and continual feedback is essential across development, cloud and security teams.</span></li> </ul> <p> </p> <p><span style="font-weight: 400;">…as well as how to deal with the boatload of animosity between development and security teams. One tip: Assume positive intent!</span></p>]]></description>
      
      <content:encoded><![CDATA[<p>Applications are the most preferred vectors for cybercriminals. Yet no single team or process can assure the rollout of safe cloud applications. From code design to unit testing to deployment, teams and tools have to work together to detect risks early while keeping the pipeline of digital products moving.</p> <p> </p> <p>Alex Rice, CTO at HackerOne and Johnathan Hunt, VP of Security at GitLab, help development teams evolve their processes to build security directly into their workflows for smooth and safe cloud app rollouts. </p> <p>They dropped by the Threatpost podcast recently to share tips on <a href= "https://threatpost.com/apps-built-better-devsecops-security-silver-bullet/167793/"> DevSecOps</a>, including:</p> <p> </p> <ul> <li style="font-weight: 400;" aria-level="1">How to build a continual testing, monitoring, and feedback processes to drive down application risk.</li> <li style="font-weight: 400;" aria-level="1">Developing a continuous approach to application security and DevOps security tools.</li> <li style="font-weight: 400;" aria-level="1">Why collaboration and continual feedback is essential across development, cloud and security teams.</li> </ul> <p> </p> <p>…as well as how to deal with the boatload of animosity between development and security teams. One tip: Assume positive intent!</p>]]></content:encoded>
      
      
      <enclosure length="36225342" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/021422_GitLab_HackerOne_Mixdown_1.mp3?dest-id=212001"/>
      <itunes:duration>25:08</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/2/6/a/2/26a2bb181affeb965f2e77a3093c12a1/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Applications are the most preferred vectors for cybercriminals. Yet no single team or process can assure the rollout of safe cloud applications. From code design to unit testing to deployment, teams and tools have to work together to detect risks early while keeping the pipeline of digital products moving.   Alex Rice, CTO at HackerOne and Johnathan Hunt, VP of Security at GitLab, help development teams evolve their processes to build security directly into their workflows for smooth and safe cloud app rollouts.  They dropped by the Threatpost podcast recently to share tips on DevSecOps, including:   How to build a continual testing, monitoring, and feedback processes to drive down application risk. Developing a continuous approach to application security and DevOps security tools. Why collaboration and continual feedback is essential across development, cloud and security teams.   …as well as how to deal with the boatload of animosity between development and security teams. One tip: Assume positive intent!</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Applications are the most preferred vectors for cybercriminals. Yet no single team or process can assure the rollout of safe cloud applications. From code design to unit testing to deployment, teams and tools have to work together to detect risks early while keeping the pipeline of digital products moving.   Alex Rice, CTO at HackerOne and Johnathan Hunt, VP of Security at GitLab, help development teams evolve their processes to build security directly into their workflows for smooth and safe cloud app rollouts.  They dropped by the Threatpost podcast recently to share tips on DevSecOps, including:   How to build a continual testing, monitoring, and feedback processes to drive down application risk. Developing a continuous approach to application security and DevOps security tools. Why collaboration and continual feedback is essential across development, cloud and security teams.   …as well as how to deal with the boatload of animosity between development and security teams. One tip: Assume positive intent!</itunes:summary></item>
    
    <item>
      <title>Former FBI Gumshoe Nabs Cybercrooks Using Proven Behavioral Clues</title>
      <itunes:title>Former FBI Gumshoe Nabs Cybercrooks Using Proven Behavioral Clues</itunes:title>
      <pubDate>Tue, 08 Feb 2022 23:24:50 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[249174bc-909e-4fc5-8adc-67403c393aa6]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/former-fbi-gumshoe-nabs-cybercrooks-using-proven-behavioral-clues]]></link>
      <description></description>
      
      <content:encoded/>
      
      
      <enclosure length="18049452" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/MULTITRACK_MIXDOWN_020822_Crane_Hassold_Abnormal_Security.mp3?dest-id=212001"/>
      <itunes:duration>22:33</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/d/1/b/6/d1b6bb367d3d64af88c4a68c3ddbc4f2/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:author>Mike Mimoso, Chris Brook</itunes:author></item>
    
    <item>
      <title>How to Buy Precious Patching Time as Log4j Exploits Fly</title>
      <itunes:title>How to Buy Precious Patching Time as Log4j Exploits Fly</itunes:title>
      <pubDate>Tue, 14 Dec 2021 17:11:46 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[95c76aea-77d7-4fd4-af1b-211b8e34e7a1]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/how-to-buy-precious-patching-time-as-log4j-exploits-fly]]></link>
      <description><![CDATA[<p>Threatpost podcast: <span style="font-weight: 400;">Cybereason CTO Yonatan Striem-Amit</span> shares details about the company's vaccine: a fast shot in the arm released within hours of the Apache Log4j zero-day horror show having been disclosed.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Threatpost podcast: Cybereason CTO Yonatan Striem-Amit shares details about the company's vaccine: a fast shot in the arm released within hours of the Apache Log4j zero-day horror show having been disclosed.</p>]]></content:encoded>
      
      
      <enclosure length="28723028" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/121321_Cybereason_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>19:56</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/b/d/3/f/bd3f6ff2f7e39c1b16c3140a3186d450/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Threatpost podcast: Cybereason CTO Yonatan Striem-Amit shares details about the company's vaccine: a fast shot in the arm released within hours of the Apache Log4j zero-day horror show having been disclosed.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Threatpost podcast: Cybereason CTO Yonatan Striem-Amit shares details about the company's vaccine: a fast shot in the arm released within hours of the Apache Log4j zero-day horror show having been disclosed.</itunes:summary></item>
    
    <item>
      <title>Attackers Will Flock to Crypto Wallets, Linux in 2022:  Podcast</title>
      <itunes:title>Threatpost Podcast: Attackers Will Flock to Crypto Wallets, Linux in 2022</itunes:title>
      <pubDate>Tue, 23 Nov 2021 17:22:15 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[35aaeb13-6b50-4cdf-b8aa-0f2c039d5203]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/attackers-will-flock-to-crypto-wallets-linux-in-2022-podcast]]></link>
      <description></description>
      
      <content:encoded/>
      
      
      <enclosure length="41720080" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/112321_Fortinet_2022_Threat_Trends_Derek_Manky_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>28:58</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/c/b/9/5/cb95e2993bf55b9b27a2322813b393ee/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:author>Mike Mimoso, Chris Brook</itunes:author></item>
    
    <item>
      <title>Podcast: Could the Zoho Flaw Trigger the Next SolarWinds?</title>
      <itunes:title>Podcast: Could the Zoho Flaw Trigger the Next SolarWinds?</itunes:title>
      <pubDate>Mon, 18 Oct 2021 20:29:12 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[f4dbbff2-c2a3-487d-b6cf-dd1bfa9dfc1b]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/podcast-could-the-zoho-flaw-trigger-the-next-solarwinds]]></link>
      <description></description>
      
      <content:encoded/>
      
      
      <enclosure length="15903177" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/101521_Kroll_George_Glass_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>11:02</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/7/c/8/b/7c8b338c84970b0d40be95ea3302a6a1/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:author>Mike Mimoso, Chris Brook</itunes:author></item>
    
    <item>
      <title>Podcast: 67% of Orgs Have Been Hit by Ransomware at Least Once</title>
      <itunes:title>Podcast: 67% of Orgs Have Been Hit by Ransomware at Least Once</itunes:title>
      <pubDate>Tue, 05 Oct 2021 19:55:59 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[da38ff2e-3c31-4025-bc33-966bba13c687]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/podcast-67-of-orgs-have-been-hit-by-ransomware-at-least-once]]></link>
      <description></description>
      
      <content:encoded/>
      
      
      <enclosure length="37480683" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/100521_Derek_Manky_Fortinet_Mixdown_1.mp3?dest-id=212001"/>
      <itunes:duration>26:01</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/4/9/5/2/4952efcf94c9537916c3140a3186d450/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:author>Mike Mimoso, Chris Brook</itunes:author></item>
    
    <item>
      <title>DDoS Attacks Are a Flourishing Business for Cybercrooks – Podcast</title>
      <itunes:title>DDoS Attacks Are a Flourishing Business for Cybercrooks – Podcast</itunes:title>
      <pubDate>Tue, 14 Sep 2021 21:28:06 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[62a9030d-6623-4c16-aebd-9451e72baaed]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/ddos-attacks-are-a-flourishing-business-for-cybercrooks-podcast]]></link>
      <description><![CDATA[<p>Imperva's Peter Klimek visited Threatpost podcast to discuss the evolution of DDoS attacks: They started out as inconveniences but evolved to the point where attackers can disrupt businesses for as little as the price of a cup of coffee,</p>]]></description>
      
      <content:encoded><![CDATA[<p>Imperva's Peter Klimek visited Threatpost podcast to discuss the evolution of DDoS attacks: They started out as inconveniences but evolved to the point where attackers can disrupt businesses for as little as the price of a cup of coffee,</p>]]></content:encoded>
      
      
      <enclosure length="34797707" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/091321_Imperva_sponsored_podcast_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>24:09</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/d/9/c/2/d9c2ed2aee38566740be95ea3302a6a1/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Imperva's Peter Klimek visited Threatpost podcast to discuss the evolution of DDoS attacks: They started out as inconveniences but evolved to the point where attackers can disrupt businesses for as little as the price of a cup of coffee,</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Imperva's Peter Klimek visited Threatpost podcast to discuss the evolution of DDoS attacks: They started out as inconveniences but evolved to the point where attackers can disrupt businesses for as little as the price of a cup of coffee,</itunes:summary></item>
    
    <item>
      <title>Databases Pockmarked With an Average of 26 Vulnerabilities Globally – Podcast</title>
      <itunes:title>Databases Pockmarked With an Average of 26 Vulnerabilities Globally – Podcast</itunes:title>
      <pubDate>Tue, 14 Sep 2021 13:17:03 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[ea10aa66-0e3e-4730-89d4-7002ceed6399]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/databases-pockmarked-with-an-average-of-26-vulnerabilities-globally-podcast]]></link>
      <description><![CDATA[<p>Imperva's Elad Erez discusses findings that 46% of on-prem databases are sitting ducks, unpatched and vulnerable to attack, each with an average of 26 flaws.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Imperva's Elad Erez discusses findings that 46% of on-prem databases are sitting ducks, unpatched and vulnerable to attack, each with an average of 26 flaws.</p>]]></content:encoded>
      
      
      <enclosure length="30784244" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/091321_Imperva_Elad_Erez_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>21:22</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/e/3/6/8/e368a6f5dd756615bafc7308ab683e82/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Imperva's Elad Erez discusses findings that 46% of on-prem databases are sitting ducks, unpatched and vulnerable to attack, each with an average of 26 flaws.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Imperva's Elad Erez discusses findings that 46% of on-prem databases are sitting ducks, unpatched and vulnerable to attack, each with an average of 26 flaws.</itunes:summary></item>
    
    <item>
      <title>What Ragnar Locker Got Wrong About Ransomware Negotiators – Podcast</title>
      <itunes:title>What Ragnar Locker Got Wrong About Ransomware Negotiators – Podcast</itunes:title>
      <pubDate>Wed, 08 Sep 2021 19:58:13 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[2815f59c-a6f1-43b3-8284-d4ac05535059]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/what-ragnar-locker-got-wrong-about-ransomware-negotiators-podcast]]></link>
      <description><![CDATA[<p><span style="font-weight: 400;">Bryce Webster-Jacobsen – director of intelligence operations at digital risk protection/ransomware negotiators GroupSense – dropped by the Threatpost podcast to tell us what percentage of Ragnar Locker's warning that victims shouldn't call the FBI/police/negotiators is a bluff and what, if anything, security teams should take seriously. </span></p>]]></description>
      
      <content:encoded><![CDATA[<p>Bryce Webster-Jacobsen – director of intelligence operations at digital risk protection/ransomware negotiators GroupSense – dropped by the Threatpost podcast to tell us what percentage of Ragnar Locker's warning that victims shouldn't call the FBI/police/negotiators is a bluff and what, if anything, security teams should take seriously. </p>]]></content:encoded>
      
      
      <enclosure length="18739678" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/090821_GroupSense_Bryce_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>13:00</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/e/b/b/4/ebb4f44b41bf1d61e55e3c100dce7605/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Bryce Webster-Jacobsen – director of intelligence operations at digital risk protection/ransomware negotiators GroupSense – dropped by the Threatpost podcast to tell us what percentage of Ragnar Locker's warning that victims shouldn't call the FBI/police/negotiators is a bluff and what, if anything, security teams should take seriously. </itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Bryce Webster-Jacobsen – director of intelligence operations at digital risk protection/ransomware negotiators GroupSense – dropped by the Threatpost podcast to tell us what percentage of Ragnar Locker's warning that victims shouldn't call the FBI/police/negotiators is a bluff and what, if anything, security teams should take seriously. </itunes:summary></item>
    
    <item>
      <title>Verizon DBIR Marries MITRE ATT&amp;CK – Podcast</title>
      <itunes:title>Verizon DBIR Marries MITRE ATT&amp;amp;CK – Podcast</itunes:title>
      <pubDate>Tue, 07 Sep 2021 12:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[62b3641e-3828-4bc6-99e4-d9abe801e15e]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/verizon-dbir-marries-mitre-attck-podcast]]></link>
      <description></description>
      
      <content:encoded/>
      
      
      <enclosure length="31930168" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Verizon_DBIR_take_2_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>22:10</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/2/a/2/f/2a2f24b9a0d55f3de55e3c100dce7605/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:author>Mike Mimoso, Chris Brook</itunes:author></item>
    
    <item>
      <title>'Pay Ransom' Screen=Too Late, Humpty Dumpty – Podcast</title>
      <itunes:title>'Pay Ransom' Screen=Too Late, Humpty Dumpty – Podcast</itunes:title>
      <pubDate>Thu, 26 Aug 2021 20:02:57 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[30ecb226-5367-4086-a713-a8bd36cd2359]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/pay-ransom-screentoo-late-humpty-dumpty-podcast]]></link>
      <description></description>
      
      <content:encoded/>
      
      
      <enclosure length="27254169" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/081921__Ryan_Kovar_Splunk_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>18:55</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/c/8/7/9/c879f89154bfb92116c3140a3186d450/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:author>Mike Mimoso, Chris Brook</itunes:author></item>
    
    <item>
      <title>Podcast: Ransomware Up x10; Telecoms Uber Walloped</title>
      <itunes:title>Podcast: Ransomware Up x10; Telecoms Uber Walloped</itunes:title>
      <pubDate>Wed, 25 Aug 2021 00:03:33 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[bcd5b1aa-1eb3-4488-b46d-18854c229c68]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/podcast-ransomware-up-x10-telecoms-uber-walloped]]></link>
      <description></description>
      
      <content:encoded/>
      
      
      <enclosure length="27880521" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/082421_Fortinet_Take_2_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>19:21</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/5/2/a/d/52ade8ae6f7cbc6a16c3140a3186d450/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:author>Mike Mimoso, Chris Brook</itunes:author></item>
    
    <item>
      <title>What's Next for T-Mobile and Its Customers? – Podcast</title>
      <itunes:title>What's Next for T-Mobile and Its Customers? – Podcast</itunes:title>
      <pubDate>Thu, 19 Aug 2021 21:52:47 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[7b4a9ab5-9d58-4d40-8b24-86f96a61f6b6]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/whats-next-for-t-mobile-and-its-customers-podcast]]></link>
      <description><![CDATA[<p>Interos CEO Jennifer <span style="font-weight: 400;">Bisceglie drops by the Threatpost podcast to talk about avoiding the mess a T-Mobile size breach can lead to, with the damage it can do to a business's brand, reputation, customer loyalty and revenue stream. </span></p>]]></description>
      
      <content:encoded><![CDATA[<p>Interos CEO Jennifer Bisceglie drops by the Threatpost podcast to talk about avoiding the mess a T-Mobile size breach can lead to, with the damage it can do to a business's brand, reputation, customer loyalty and revenue stream. </p>]]></content:encoded>
      
      
      <enclosure length="24127031" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/081921_Interos_Jennifer_Bisceglie_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>16:45</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/5/e/5/8/5e5864f5b4c1baded959afa2a1bf1c87/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Interos CEO Jennifer Bisceglie drops by the Threatpost podcast to talk about avoiding the mess a T-Mobile size breach can lead to, with the damage it can do to a business's brand, reputation, customer loyalty and revenue stream. </itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Interos CEO Jennifer Bisceglie drops by the Threatpost podcast to talk about avoiding the mess a T-Mobile size breach can lead to, with the damage it can do to a business's brand, reputation, customer loyalty and revenue stream. </itunes:summary></item>
    
    <item>
      <title>SolarWinds 2.0 Could Set Off the Next Financial Crisis – Podcast</title>
      <itunes:title>SolarWinds 2.0 Could Set Off the Next Financial Crisis – Podcast</itunes:title>
      <pubDate>Fri, 13 Aug 2021 19:56:46 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[01d747c7-2d0e-4df2-86b5-01feb6b422d6]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/solarwinds-20-could-set-off-the-next-financial-crisis-podcast]]></link>
      <description><![CDATA[<p>Trillions of dollars in notional value are controlled by hedge funds and private equity firms, many of which have no cybersecurity protection to speak of. The calamitous, widespread SolarWinds attacks was a wakeup call: Another attack of that ilk could lead to the next 2008-esque financial meltdown. Agio CEO Bart McDonough says AI-enabled service platform could maybe, just maybe, help avert it.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Trillions of dollars in notional value are controlled by hedge funds and private equity firms, many of which have no cybersecurity protection to speak of. The calamitous, widespread SolarWinds attacks was a wakeup call: Another attack of that ilk could lead to the next 2008-esque financial meltdown. Agio CEO Bart McDonough says AI-enabled service platform could maybe, just maybe, help avert it.</p>]]></content:encoded>
      
      
      <enclosure length="22162855" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/081021_Agio_Bart_McDonough_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>15:23</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/1/1/b/6/11b6b31332f4019740be95ea3302a6a1/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Trillions of dollars in notional value are controlled by hedge funds and private equity firms, many of which have no cybersecurity protection to speak of. The calamitous, widespread SolarWinds attacks was a wakeup call: Another attack of that ilk could lead to the next 2008-esque financial meltdown. Agio CEO Bart McDonough says AI-enabled service platform could maybe, just maybe, help avert it.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Trillions of dollars in notional value are controlled by hedge funds and private equity firms, many of which have no cybersecurity protection to speak of. The calamitous, widespread SolarWinds attacks was a wakeup call: Another attack of that ilk could lead to the next 2008-esque financial meltdown. Agio CEO Bart McDonough says AI-enabled service platform could maybe, just maybe, help avert it.</itunes:summary></item>
    
    <item>
      <title>Fuzz Off: How to Shake Up Code to Get It Right – Podcast</title>
      <itunes:title>Fuzz Off: How to Shake Up Code to Get It Right – Podcast</itunes:title>
      <pubDate>Tue, 10 Aug 2021 00:38:02 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[ee48b5dc-941d-4285-a9a1-704485c3f3ec]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/fuzz-off-how-to-shake-up-code-to-get-it-right-podcast]]></link>
      <description><![CDATA[<p>FuzzCon panelists Damilare D. Fagbemi of Resilience Software Security and Anmol Misra of Autodesk say join the party as they share fuzzing wins &amp; fuzzing fails when building a<span style="font-weight: 400;"> security testing program</span></p>]]></description>
      
      <content:encoded><![CDATA[<p>FuzzCon panelists Damilare D. Fagbemi of Resilience Software Security and Anmol Misra of Autodesk say join the party as they share fuzzing wins &amp; fuzzing fails when building a security testing program</p>]]></content:encoded>
      
      
      <enclosure length="22686633" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/080521_FuzzCon_panel_Fuzzing_Real_Talk_Mixdown_1.mp3?dest-id=212001"/>
      <itunes:duration>15:45</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/4/4/2/9/44291a31c38915e127a2322813b393ee/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>FuzzCon panelists Damilare D. Fagbemi of Resilience Software Security and Anmol Misra of Autodesk say join the party as they share fuzzing wins &amp;amp; fuzzing fails when building a security testing program</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>FuzzCon panelists Damilare D. Fagbemi of Resilience Software Security and Anmol Misra of Autodesk say join the party as they share fuzzing wins &amp;amp; fuzzing fails when building a security testing program</itunes:summary></item>
    
    <item>
      <title>We COVID-Clicked on Garbage, Report Finds: Podcast</title>
      <itunes:title>We COVID-Clicked on Garbage, Report Finds: Podcast</itunes:title>
      <pubDate>Wed, 04 Aug 2021 13:34:43 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[1081251e-8ac7-4d40-b832-99c622467293]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/we-covid-clicked-on-garbage-report-finds-podcast]]></link>
      <description><![CDATA[<div class="c-article__intro"> <p>n the company's annual Human Factor 2021 report assessing how the threat landscape morphed over the past year, Proofpoint researchers scratched their heads over the reasons for so many users succumbing to malicious email attachments.</p> <p>Could be that threat actors jumped on our Pavlovian work-from-home security conditioning, as suggested by Proofpoint vice president and general manager of email fraud defense Rob Holmes. Check out the Threatpost podcast for his take on how the pandemic influenced the threat landscape.</p> </div>]]></description>
      
      <content:encoded><![CDATA[<p>n the company's annual Human Factor 2021 report assessing how the threat landscape morphed over the past year, Proofpoint researchers scratched their heads over the reasons for so many users succumbing to malicious email attachments.</p> <p>Could be that threat actors jumped on our Pavlovian work-from-home security conditioning, as suggested by Proofpoint vice president and general manager of email fraud defense Rob Holmes. Check out the Threatpost podcast for his take on how the pandemic influenced the threat landscape.</p>]]></content:encoded>
      
      
      <enclosure length="23524688" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/080321_Proofpoint_Rob_Holmes_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>16:20</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/9/e/4/8/9e481d1e62eeecb6e5bbc093207a2619/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>n the company's annual Human Factor 2021 report assessing how the threat landscape morphed over the past year, Proofpoint researchers scratched their heads over the reasons for so many users succumbing to malicious email attachments. Could be that threat actors jumped on our Pavlovian work-from-home security conditioning, as suggested by Proofpoint vice president and general manager of email fraud defense Rob Holmes. Check out the Threatpost podcast for his take on how the pandemic influenced the threat landscape.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>n the company's annual Human Factor 2021 report assessing how the threat landscape morphed over the past year, Proofpoint researchers scratched their heads over the reasons for so many users succumbing to malicious email attachments. Could be that threat actors jumped on our Pavlovian work-from-home security conditioning, as suggested by Proofpoint vice president and general manager of email fraud defense Rob Holmes. Check out the Threatpost podcast for his take on how the pandemic influenced the threat landscape.</itunes:summary></item>
    
    <item>
      <title>'PwnedPiper': Devastating Bugs in &gt;80% of Hospital Pneumatics</title>
      <itunes:title>'PwnedPiper': Devastating Bugs in &amp;gt;80% of Hospital Pneumatics</itunes:title>
      <pubDate>Mon, 02 Aug 2021 22:38:05 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[bb7a0453-ee6b-4aa7-99bc-4b97300ba97e]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/pwnedpiper-devastating-bugs-in-80-of-hospital-pneumatics]]></link>
      <description></description>
      
      <content:encoded/>
      
      
      <enclosure length="17185346" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/080221_Armis_Sumit_Senghal_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>11:55</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/9/b/5/7/9b57712db78c5098e55e3c100dce7605/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:author>Mike Mimoso, Chris Brook</itunes:author></item>
    
    <item>
      <title>Podcast: Why Securing Microsoft Active Directory Is Such a Nightmare</title>
      <itunes:title>Podcast: Why Securing Microsoft Active Directory Is Such a Nightmare</itunes:title>
      <pubDate>Wed, 28 Jul 2021 01:02:04 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[3e146c4f-cf20-46ed-9465-b11e3c434f65]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/podcast-why-securing-microsoft-active-directory-is-such-a-nightmare]]></link>
      <description><![CDATA[<p>SpecterOps researchers Lee Christensen and Will Schroeder discuss their work, to be presented at Black Hat, on how AD "misconfiguration debt" lays out a dizzying array of attack paths such as the one in the PetitPotam exploit for which Microsoft  rushed out a fix.</p>]]></description>
      
      <content:encoded><![CDATA[<p>SpecterOps researchers Lee Christensen and Will Schroeder discuss their work, to be presented at Black Hat, on how AD "misconfiguration debt" lays out a dizzying array of attack paths such as the one in the PetitPotam exploit for which Microsoft rushed out a fix.</p>]]></content:encoded>
      
      
      <enclosure length="48468004" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/072621_redo_SpecterOps_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>33:20</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/f/8/d/c/f8dcaf50bc666f84e5bbc093207a2619/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>SpecterOps researchers Lee Christensen and Will Schroeder discuss their work, to be presented at Black Hat, on how AD "misconfiguration debt" lays out a dizzying array of attack paths such as the one in the PetitPotam exploit for which Microsoft  rushed out a fix.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>SpecterOps researchers Lee Christensen and Will Schroeder discuss their work, to be presented at Black Hat, on how AD "misconfiguration debt" lays out a dizzying array of attack paths such as the one in the PetitPotam exploit for which Microsoft  rushed out a fix.</itunes:summary></item>
    
    <item>
      <title>IoT Piranhas Are Swarming Industrial Controls</title>
      <itunes:title>IoT Piranhas Are Swarming Industrial Controls</itunes:title>
      <pubDate>Fri, 23 Jul 2021 14:48:21 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[b6f7a1d5-2aa7-4089-b5b3-308cc71ba43f]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/iot-piranhas-are-swarming-industrial-controls]]></link>
      <description><![CDATA[<p>Threat actors have been building enormous botnets using IoT devices to try to compromise the computing systems that control crucial infrastructure, such as pipelines (case in point: the DarkSide ransomware attack on Colonial Pipeline) and other utilities, preying on legacy systems that have decades-old vulnerabilities. In this Threatpost podcast, Armis CISO Curtis Simpson delves into how to fight back.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Threat actors have been building enormous botnets using IoT devices to try to compromise the computing systems that control crucial infrastructure, such as pipelines (case in point: the DarkSide ransomware attack on Colonial Pipeline) and other utilities, preying on legacy systems that have decades-old vulnerabilities. In this Threatpost podcast, Armis CISO Curtis Simpson delves into how to fight back.</p>]]></content:encoded>
      
      
      <enclosure length="33721094" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Rockwell_Mixdown_1.mp3?dest-id=212001"/>
      <itunes:duration>23:24</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/2/9/f/9/29f9a20d8aafd79abafc7308ab683e82/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Threat actors have been building enormous botnets using IoT devices to try to compromise the computing systems that control crucial infrastructure, such as pipelines (case in point: the DarkSide ransomware attack on Colonial Pipeline) and other utilities, preying on legacy systems that have decades-old vulnerabilities. In this Threatpost podcast, Armis CISO Curtis Simpson delves into how to fight back.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Threat actors have been building enormous botnets using IoT devices to try to compromise the computing systems that control crucial infrastructure, such as pipelines (case in point: the DarkSide ransomware attack on Colonial Pipeline) and other utilities, preying on legacy systems that have decades-old vulnerabilities. In this Threatpost podcast, Armis CISO Curtis Simpson delves into how to fight back.</itunes:summary></item>
    
    <item>
      <title>What's Next for REvil's Victims?</title>
      <itunes:title>What's Next for REvil's Victims?</itunes:title>
      <pubDate>Mon, 19 Jul 2021 22:37:50 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[762517ff-0534-44e7-97a4-6163794fc427]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/whats-next-for-revils-victims]]></link>
      <description></description>
      
      <content:encoded/>
      
      
      <enclosure length="31382565" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/071921_Kurtis_Minder_Mixdown_1.mp3?dest-id=212001"/>
      <itunes:duration>21:47</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/4/7/f/d/47fd22f8033ae23e88c4a68c3ddbc4f2/TP_small.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:author>Mike Mimoso, Chris Brook</itunes:author></item>
    
    <item>
      <title>Protecting Phones From Pegasus-Like Spyware Attacks</title>
      <itunes:title>Protecting Phones From Pegasus-Like Spyware Attacks</itunes:title>
      <pubDate>Mon, 19 Jul 2021 16:07:28 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[003811da-3866-4276-8c0c-1a82212a0685]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/protecting-phones-from-pegasus-like-spyware-attacks]]></link>
      <description><![CDATA[<p>Podcast: Is protecting your phone from spyware attacks a la NSO Group's Pegasus as simple as getting a new SIM card? Former spyware insider, current mobile white hat hacker Adam Weinberg on how to block three types of spyware attacks.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Podcast: Is protecting your phone from spyware attacks a la NSO Group's Pegasus as simple as getting a new SIM card? Former spyware insider, current mobile white hat hacker Adam Weinberg on how to block three types of spyware attacks.</p>]]></content:encoded>
      
      
      <enclosure length="31970084" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Adam_Weinberg_Mixdown_1.mp3?dest-id=212001"/>
      <itunes:duration>22:11</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/6/5/5/1/6551f2373e9e239c16c3140a3186d450/podcast_mic_logo.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Podcast: Is protecting your phone from spyware attacks a la NSO Group's Pegasus as simple as getting a new SIM card? Former spyware insider, current mobile white hat hacker Adam Weinberg on how to block three types of spyware attacks.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Podcast: Is protecting your phone from spyware attacks a la NSO Group's Pegasus as simple as getting a new SIM card? Former spyware insider, current mobile white hat hacker Adam Weinberg on how to block three types of spyware attacks.</itunes:summary></item>
    
    <item>
      <title>What's Making You a Ransomware Sitting Duck</title>
      <itunes:title>What's Making You a Ransomware Sitting Duck</itunes:title>
      <pubDate>Thu, 17 Jun 2021 21:13:45 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[4e797ec2-22e4-4494-8f66-434079cdf692]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/whats-making-you-a-ransomware-sitting-duck]]></link>
      <description><![CDATA[<p>SophosLabs Principal Researcher Andrew Brandt discusses what makes organizations prime targets for ransomware threat actors, what steps could help them to protect themselves, and what's stopping them from implementing those steps.</p>]]></description>
      
      <content:encoded><![CDATA[<p>SophosLabs Principal Researcher Andrew Brandt discusses what makes organizations prime targets for ransomware threat actors, what steps could help them to protect themselves, and what's stopping them from implementing those steps.</p>]]></content:encoded>
      
      
      <enclosure length="48320977" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Andrew_Brandt_Mixdown_1.mp3?dest-id=212001"/>
      <itunes:duration>33:33</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/f/f/0/1/ff011af6cde47d5940be95ea3302a6a1/podcast_mic_logo.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>SophosLabs Principal Researcher Andrew Brandt discusses what makes organizations prime targets for ransomware threat actors, what steps could help them to protect themselves, and what's stopping them from implementing those steps.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>SophosLabs Principal Researcher Andrew Brandt discusses what makes organizations prime targets for ransomware threat actors, what steps could help them to protect themselves, and what's stopping them from implementing those steps.</itunes:summary></item>
    
    <item>
      <title>SASE &amp; Zero Trust: The Dream Team</title>
      <itunes:title>SASE &amp;amp; Zero Trust: The Dream Team</itunes:title>
      <pubDate>Fri, 11 Jun 2021 20:47:54 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[97aa2772-b0ab-4e26-8c05-ef369e965360]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/sase-zero-trust-the-dream-team]]></link>
      <description><![CDATA[<p>"<span style="font-weight: 400;">Trust is a human emotion. Computers don't have emotions. They don't need that trust, inherently" – that's the heart of Zero Trust cybersecurity, and SASE is how to make it happen. </span></p> <p>Forcepoint's Nico Fischbach, global CTO and VPE of SASE, and Chase Cunningham, chief strategy officer at Ericom Software, on using SASE to make Zero Trust a reality.</p>]]></description>
      
      <content:encoded><![CDATA[<p>"Trust is a human emotion. Computers don't have emotions. They don't need that trust, inherently" – that's the heart of Zero Trust cybersecurity, and SASE is how to make it happen. </p> <p>Forcepoint's Nico Fischbach, global CTO and VPE of SASE, and Chase Cunningham, chief strategy officer at Ericom Software, on using SASE to make Zero Trust a reality.</p>]]></content:encoded>
      
      
      <enclosure length="28814762" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Nico_Chase_Redo_Mixdown_1.mp3?dest-id=212001"/>
      <itunes:duration>20:01</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/2/2/9/f/229fa0f203299faad959afa2a1bf1c87/podcast_mic_logo.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>"Trust is a human emotion. Computers don't have emotions. They don't need that trust, inherently" – that's the heart of Zero Trust cybersecurity, and SASE is how to make it happen.  Forcepoint's Nico Fischbach, global CTO and VPE of SASE, and Chase Cunningham, chief strategy officer at Ericom Software, on using SASE to make Zero Trust a reality.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>"Trust is a human emotion. Computers don't have emotions. They don't need that trust, inherently" – that's the heart of Zero Trust cybersecurity, and SASE is how to make it happen.  Forcepoint's Nico Fischbach, global CTO and VPE of SASE, and Chase Cunningham, chief strategy officer at Ericom Software, on using SASE to make Zero Trust a reality.</itunes:summary></item>
    
    <item>
      <title>Insider Risks In the Work-From-Home World</title>
      <itunes:title>Insider Risks In the Work-From-Home World</itunes:title>
      <pubDate>Fri, 11 Jun 2021 19:45:18 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[550e1212-1649-4ae4-b229-bb75d80ab9ff]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/insider-risks-in-the-work-from-home-world]]></link>
      <description><![CDATA[<p>Forcepoint's Michael Crouse talks about risk-adaptive data-protection approaches and how to develop a behavior-based approach to insider threats and risk: particularly important as security perimeters have expanded due to the pandemic.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Forcepoint's Michael Crouse talks about risk-adaptive data-protection approaches and how to develop a behavior-based approach to insider threats and risk: particularly important as security perimeters have expanded due to the pandemic.</p>]]></content:encoded>
      
      
      <enclosure length="36291262" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Michael_Crouse_Forecpoint_mixdown_4.mp3?dest-id=212001"/>
      <itunes:duration>25:12</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/e/b/9/9/eb99b96fa675dd7588c4a68c3ddbc4f2/podcast_mic_logo.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Forcepoint's Michael Crouse talks about risk-adaptive data-protection approaches and how to develop a behavior-based approach to insider threats and risk: particularly important as security perimeters have expanded due to the pandemic.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Forcepoint's Michael Crouse talks about risk-adaptive data-protection approaches and how to develop a behavior-based approach to insider threats and risk: particularly important as security perimeters have expanded due to the pandemic.</itunes:summary></item>
    
    <item>
      <title>The State of Ransomware with Fortiguard's Derek Manky</title>
      <itunes:title>The State of Ransomware with Fortiguard's Derek Manky</itunes:title>
      <pubDate>Wed, 02 Jun 2021 20:08:06 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[9ce87be9-2272-402b-b063-d32e764df295]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/the-state-of-ransomware-with-fortiguards-derek-manky]]></link>
      <description></description>
      
      <content:encoded/>
      
      
      <enclosure length="25692695" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Fortiguard_2_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>17:50</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/d/b/7/a/db7a3e534734be6ce55e3c100dce7605/podcast_mic_logo.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:author>Mike Mimoso, Chris Brook</itunes:author></item>
    
    <item>
      <title>Effective Adoption of SASE in 2021</title>
      <itunes:title>Effective Adoption of SASE in 2021</itunes:title>
      <pubDate>Wed, 02 Jun 2021 17:06:20 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[5b31993c-a858-41ae-bcca-229152742afb]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/-effective-adoption-of-sase-in-2021]]></link>
      <description></description>
      
      <content:encoded/>
      
      
      <enclosure length="30298554" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Jim_Fulton_Re-record_mixdown.mp3?dest-id=212001"/>
      <itunes:duration>21:03</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/e/8/5/6/e856deee952f308e16c3140a3186d450/podcast_mic_logo.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:author>Mike Mimoso, Chris Brook</itunes:author></item>
    
    <item>
      <title>Why and How Cybercrooks Milk Exploits in Underground Markets</title>
      <itunes:title>Why and How Cybercrooks Milk Exploits in Underground Markets</itunes:title>
      <pubDate>Tue, 01 Jun 2021 16:25:04 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[71a799eb-b276-478e-8d1c-78cc19a95391]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/tales-from-the-underground-with-trend-micro-senior-researcher-mayra-rosario-fuentes]]></link>
      <description></description>
      
      <content:encoded/>
      
      
      <enclosure length="27478026" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/0521_Mayra_Trend_Micro_Mixdown_1.mp3?dest-id=212001"/>
      <itunes:duration>19:05</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/e/7/d/8/e7d81c769803260ca04421dee9605cbd/podcast_mic_logo.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:author>Mike Mimoso, Chris Brook</itunes:author></item>
    
    <item>
      <title>What's Behind the Cybercriminal Supply Chain</title>
      <itunes:title>What's Behind the Cybercriminal Supply Chain</itunes:title>
      <pubDate>Wed, 21 Apr 2021 20:49:08 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[83c188d4-5c82-4889-b055-f162490a5aec]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/whats-behind-the-cybercriminal-supply-chain]]></link>
      <description><![CDATA[<p>Derek Manky Chief, Security Insights & Global Threat Alliances at Fortinet's FortiGuard Labs is joined by Threatpost podcast host Cody Hackett about the cybersecurity supply chain. What is it? How is it funded? And who are the victims and criminals within this multi-million dollar dark economy?  </p>]]></description>
      
      <content:encoded><![CDATA[<p>Derek Manky Chief, Security Insights & Global Threat Alliances at Fortinet's FortiGuard Labs is joined by Threatpost podcast host Cody Hackett about the cybersecurity supply chain. What is it? How is it funded? And who are the victims and criminals within this multi-million dollar dark economy? </p>]]></content:encoded>
      
      
      <enclosure length="19053830" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Fortinet_Podcast_4-13-2021.mp3?dest-id=212001"/>
      <itunes:duration>22:10</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/7/b/d/8/7bd8b368029994e9bafc7308ab683e82/podcast-threatpost.jpg"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Threatpost</itunes:author>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Derek Manky Chief, Security Insights &amp; Global Threat Alliances at Fortinet's FortiGuard Labs is joined by Threatpost podcast host Cody Hackett about the cybersecurity supply chain. What is it? How is it funded? And who are the victims and criminals within this multi-million dollar dark economy?  </itunes:subtitle><itunes:summary>Derek Manky Chief, Security Insights &amp; Global Threat Alliances at Fortinet's FortiGuard Labs is joined by Threatpost podcast host Cody Hackett about the cybersecurity supply chain. What is it? How is it funded? And who are the victims and criminals within this multi-million dollar dark economy?  </itunes:summary></item>
    
    <item>
      <title>Podcast: Microsoft Exchange Server Attack Onslaught Continues</title>
      <itunes:title>Podcast: Microsoft Exchange Server Attack Onslaught Continues</itunes:title>
      <pubDate>Tue, 23 Mar 2021 13:52:24 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[9c6bc9fe-27f2-4ef1-b5b6-a07a55544d85]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/podcast-microsoft-exchange-server-attack-onslaught-continues]]></link>
      <description><![CDATA[<p>Weeks after the disclosure around the <a href= "https://threatpost.com/microsoft-exchange-exploits-ransomware/164719/" target="_blank" rel="noopener">ProxyLogon group of security bugs</a>, exploitation attempts against unpatched Microsoft Exchange servers have skyrocketed.</p> <p>Derek Manky, Chief of Security Insights & Global Threat Alliances at <a href= "https://www.fortinet.com/fortiguard/threat-intelligence/threat-research" target="_blank" rel="noopener">Fortinet's FortiGuard Labs,</a> said that last week researchers with FortiGuard Labs saw activity double over two days for cybercriminals targeting the vulnerabilities. The attackers are using the flaws to deploy cryptominers, ransomware (such as the recently discovered DearCry ransomware) and other malicious campaigns, he said.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Weeks after the disclosure around the <a href= "https://threatpost.com/microsoft-exchange-exploits-ransomware/164719/" target="_blank" rel="noopener">ProxyLogon group of security bugs</a>, exploitation attempts against unpatched Microsoft Exchange servers have skyrocketed.</p> <p>Derek Manky, Chief of Security Insights & Global Threat Alliances at <a href= "https://www.fortinet.com/fortiguard/threat-intelligence/threat-research" target="_blank" rel="noopener">Fortinet's FortiGuard Labs,</a> said that last week researchers with FortiGuard Labs saw activity double over two days for cybercriminals targeting the vulnerabilities. The attackers are using the flaws to deploy cryptominers, ransomware (such as the recently discovered DearCry ransomware) and other malicious campaigns, he said.</p>]]></content:encoded>
      
      
      <enclosure length="27793888" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Fortinet_Sponsored_Podcast_March_23_Final.mp3?dest-id=212001"/>
      <itunes:duration>22:53</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/c/c/5/4/cc5462b25c0dbf39/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Weeks after the disclosure around the ProxyLogon group of security bugs, exploitation attempts against unpatched Microsoft Exchange servers have skyrocketed. Derek Manky, Chief of Security Insights &amp; Global Threat Alliances at Fortinet's FortiGuard Labs, said that last week researchers with FortiGuard Labs saw activity double over two days for cybercriminals targeting the vulnerabilities. The attackers are using the flaws to deploy cryptominers, ransomware (such as the recently discovered DearCry ransomware) and other malicious campaigns, he said.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Weeks after the disclosure around the ProxyLogon group of security bugs, exploitation attempts against unpatched Microsoft Exchange servers have skyrocketed. Derek Manky, Chief of Security Insights &amp; Global Threat Alliances at Fortinet's FortiGuard Labs, said that last week researchers with FortiGuard Labs saw activity double over two days for cybercriminals targeting the vulnerabilities. The attackers are using the flaws to deploy cryptominers, ransomware (such as the recently discovered DearCry ransomware) and other malicious campaigns, he said.</itunes:summary></item>
    
    <item>
      <title>Sponsored Podcast: Ransomware Attacks Exploded in Q4 2020</title>
      <itunes:title>Sponsored Podcast: Ransomware Attacks Exploded in Q4 2020</itunes:title>
      <pubDate>Fri, 26 Feb 2021 13:09:27 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[0c16a21d-5de9-4057-9b70-28cbbaf935ae]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/sponsored-podcast-ransomware-attacks-exploded-in-q4-2020]]></link>
      <description><![CDATA[<p>Ransomware attacks continue to be a top security issue plaguing companies, with <a href= "https://www.fortinet.com/blog/industry-trends/fortiguard-labs-global-threat-landscape-report-2021?utm_source=pr&utm_campaign=2021-q1-fortiguard-labs-global-threat-landscape-report-2021" target="_blank" rel="noopener">researchers from Fortinet's Fortiguard Labs</a> saying they saw an explosion in ransomware activity towards the end of the fourth quarter of 2020.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Ransomware attacks continue to be a top security issue plaguing companies, with <a href= "https://www.fortinet.com/blog/industry-trends/fortiguard-labs-global-threat-landscape-report-2021?utm_source=pr&utm_campaign=2021-q1-fortiguard-labs-global-threat-landscape-report-2021" target="_blank" rel="noopener">researchers from Fortinet's Fortiguard Labs</a> saying they saw an explosion in ransomware activity towards the end of the fourth quarter of 2020.</p>]]></content:encoded>
      
      
      <enclosure length="27994464" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Fortinet-Sponsored-Podcast-Final.mp3?dest-id=212001"/>
      <itunes:duration>23:03</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/6/3/e/4/63e42ba602229c8c/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Ransomware attacks continue to be a top security issue plaguing companies, with researchers from Fortinet's Fortiguard Labs saying they saw an explosion in ransomware activity towards the end of the fourth quarter of 2020.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Ransomware attacks continue to be a top security issue plaguing companies, with researchers from Fortinet's Fortiguard Labs saying they saw an explosion in ransomware activity towards the end of the fourth quarter of 2020.</itunes:summary></item>
    
    <item>
      <title>Chinese Hackers Stole NSA-Linked Hacking Tool: Report</title>
      <itunes:title>Chinese Hackers Stole NSA-Linked Hacking Tool: Report</itunes:title>
      <pubDate>Mon, 22 Feb 2021 19:27:57 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[3d6c267e-18b0-4f16-91dc-2e21baf11e26]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/chinese-hackers-stole-nsa-linked-hacking-tool-report]]></link>
      <description><![CDATA[<p>Yaniv Balmas, the head of cyber research with Check Point Software, and Oded Vanunu, the head of products vulnerability research with Check Point Software, talk on this week's Threatpost podcast about the new discoveries around the NSA-linked exploit tools, as well as the implications of the SolarWinds supply-chain hack.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Yaniv Balmas, the head of cyber research with Check Point Software, and Oded Vanunu, the head of products vulnerability research with Check Point Software, talk on this week's Threatpost podcast about the new discoveries around the NSA-linked exploit tools, as well as the implications of the SolarWinds supply-chain hack.</p>]]></content:encoded>
      
      
      <enclosure length="24271874" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/APT31_Equation_Group_Research.mp3?dest-id=212001"/>
      <itunes:duration>19:57</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/8/6/3/b/863bfc9b5241dd0d/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Yaniv Balmas, the head of cyber research with Check Point Software, and Oded Vanunu, the head of products vulnerability research with Check Point Software, talk on this week's Threatpost podcast about the new discoveries around the NSA-linked exploit tools, as well as the implications of the SolarWinds supply-chain hack.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Yaniv Balmas, the head of cyber research with Check Point Software, and Oded Vanunu, the head of products vulnerability research with Check Point Software, talk on this week's Threatpost podcast about the new discoveries around the NSA-linked exploit tools, as well as the implications of the SolarWinds supply-chain hack.</itunes:summary></item>
    
    <item>
      <title>Emotet's Takedown: Have We Seen the Last of the Malware?</title>
      <itunes:title>Emotet's Takedown: Have We Seen the Last of the Malware?</itunes:title>
      <pubDate>Wed, 03 Feb 2021 20:10:40 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[f71c27bb-1b4d-4f58-a2cb-ee912ea4d0bb]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/emotets-takedown-have-we-seen-the-last-of-the-malware]]></link>
      <description><![CDATA[<p>Law enforcement have been on a malware-takedown rampage: Last week, several agencies took down servers supporting the Emotet malware. Sherrod DiGrippo, senior director of threat research and detection with Proofpoint, said that no activity involving Emotet has been detected since the takedown effort occurred last week.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Law enforcement have been on a malware-takedown rampage: Last week, several agencies took down servers supporting the Emotet malware. Sherrod DiGrippo, senior director of threat research and detection with Proofpoint, said that no activity involving Emotet has been detected since the takedown effort occurred last week.</p>]]></content:encoded>
      
      
      <enclosure length="21134046" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Sherrod_DiGrippo.mp3?dest-id=212001"/>
      <itunes:duration>17:20</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/4/8/0/b/480b6c854e70514d/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Law enforcement have been on a malware-takedown rampage: Last week, several agencies took down servers supporting the Emotet malware. Sherrod DiGrippo, senior director of threat research and detection with Proofpoint, said that no activity involving Emotet has been detected since the takedown effort occurred last week.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Law enforcement have been on a malware-takedown rampage: Last week, several agencies took down servers supporting the Emotet malware. Sherrod DiGrippo, senior director of threat research and detection with Proofpoint, said that no activity involving Emotet has been detected since the takedown effort occurred last week.</itunes:summary></item>
    
    <item>
      <title>Breaking Down Joe Biden's $10B Cybersecurity 'Down Payment'</title>
      <itunes:title>Breaking Down Joe Biden's $10B Cybersecurity 'Down Payment'</itunes:title>
      <pubDate>Mon, 25 Jan 2021 19:54:14 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[9bf09d8e-9a44-4d45-ada5-25ce92ca6264]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/breaking-down-joe-bidens-10b-cybersecurity-down-payment]]></link>
      <description><![CDATA[<p>Joe Biden's inauguration ceremony last week marked a new strategy for the government's cybersecurity initiatives, with the US president's COVID-19 relief plan including $10 billion in funding for various cybersecurity defense initiatives - from hiring key security personnel to support for the Cybersecurity Infrastructure Security Agency (CISA).</p>]]></description>
      
      <content:encoded><![CDATA[<p>Joe Biden's inauguration ceremony last week marked a new strategy for the government's cybersecurity initiatives, with the US president's COVID-19 relief plan including $10 billion in funding for various cybersecurity defense initiatives - from hiring key security personnel to support for the Cybersecurity Infrastructure Security Agency (CISA).</p>]]></content:encoded>
      
      
      <enclosure length="23190927" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Tom_Kellermann.mp3?dest-id=212001"/>
      <itunes:duration>19:03</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/f/c/6/2/fc6230b8430ecfe6/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Joe Biden's inauguration ceremony last week marked a new strategy for the government's cybersecurity initiatives, with the US president's COVID-19 relief plan including $10 billion in funding for various cybersecurity defense initiatives - from hiring key security personnel to support for the Cybersecurity Infrastructure Security Agency (CISA).</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Joe Biden's inauguration ceremony last week marked a new strategy for the government's cybersecurity initiatives, with the US president's COVID-19 relief plan including $10 billion in funding for various cybersecurity defense initiatives - from hiring key security personnel to support for the Cybersecurity Infrastructure Security Agency (CISA).</itunes:summary></item>
    
    <item>
      <title>CISOs Prep For COVID-19 Exposure Notification in the Workplace</title>
      <itunes:title>CISOs Prep For COVID-19 Exposure Notification in the Workplace</itunes:title>
      <pubDate>Wed, 13 Jan 2021 14:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[a89273f8-b196-4a5b-9dbb-a5dbe5bd7790]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/cisos-prep-for-covid-19-exposure-notification-in-the-workplace]]></link>
      <description><![CDATA[<p>In this week's Threatpost podcast, senior editor Lindsey Welch talks with Steve Moore, chief security strategist with Exabeam, about the data privacy challenges posed by impending exposure notification implementations in the workplace.</p>]]></description>
      
      <content:encoded><![CDATA[<p>In this week's Threatpost podcast, senior editor Lindsey Welch talks with Steve Moore, chief security strategist with Exabeam, about the data privacy challenges posed by impending exposure notification implementations in the workplace.</p>]]></content:encoded>
      
      
      <enclosure length="28744038" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Steve_Moore_Podcast.mp3?dest-id=212001"/>
      <itunes:duration>23:41</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/b/e/a/b/beab6fe4fa5106c4/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>In this week's Threatpost podcast, senior editor Lindsey Welch talks with Steve Moore, chief security strategist with Exabeam, about the data privacy challenges posed by impending exposure notification implementations in the workplace.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>In this week's Threatpost podcast, senior editor Lindsey Welch talks with Steve Moore, chief security strategist with Exabeam, about the data privacy challenges posed by impending exposure notification implementations in the workplace.</itunes:summary></item>
    
    <item>
      <title>A Look Ahead at 2021: SolarWinds Fallout and Shifting CISO Budgets</title>
      <itunes:title>A Look Ahead at 2021: SolarWinds Fallout and Shifting CISO Budgets</itunes:title>
      <pubDate>Fri, 08 Jan 2021 18:56:35 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[da8127c8-813d-40f6-bc76-79d6e8913da3]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/a-look-ahead-at-2021-solarwinds-fallout-and-shifting-ciso-budgets]]></link>
      <description><![CDATA[<p>Threatpost editors Tom Spring, Tara Seals and Lindsey Welch break down the top security stories to look out for in this week's first podcast of 2021 - from the SolarWinds hack to surging ransomware hospital cyberattacks. </p>]]></description>
      
      <content:encoded><![CDATA[<p>Threatpost editors Tom Spring, Tara Seals and Lindsey Welch break down the top security stories to look out for in this week's first podcast of 2021 - from the SolarWinds hack to surging ransomware hospital cyberattacks. </p>]]></content:encoded>
      
      
      <enclosure length="26438470" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/New_Year_News_Wrap_Podcast.mp3?dest-id=212001"/>
      <itunes:duration>21:45</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/5/d/0/6/5d06e2851b99bd4d/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Threatpost editors Tom Spring, Tara Seals and Lindsey Welch break down the top security stories to look out for in this week's first podcast of 2021 - from the SolarWinds hack to surging ransomware hospital cyberattacks. </itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Threatpost editors Tom Spring, Tara Seals and Lindsey Welch break down the top security stories to look out for in this week's first podcast of 2021 - from the SolarWinds hack to surging ransomware hospital cyberattacks. </itunes:summary></item>
    
    <item>
      <title>Sponsored Podcast: Simplifying Proactive Defense With Threat Playbooks</title>
      <itunes:title>Sponsored Podcast: Simplifying Proactive Defense With Threat Playbooks</itunes:title>
      <pubDate>Mon, 21 Dec 2020 16:54:15 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[91257b0a-4370-4e76-8c32-6f2612b4f67d]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/sponsored-podcast-simplifying-proactive-defense-with-threat-playbooks]]></link>
      <description><![CDATA[<p>Security defense strategy can be very complex - with security teams not dealing with mere small bits of information, but instead dealing with tens of thousands of data points, from IoCs to TTPs, said Derek Manky, <a href= "https://www.fortinet.com/fortiguard/threat-intelligence/threat-research" target="_blank" rel="noopener noreferrer">Chief of Security Insights & Global Threat Alliances at Fortinet.</a></p>]]></description>
      
      <content:encoded><![CDATA[<p>Security defense strategy can be very complex - with security teams not dealing with mere small bits of information, but instead dealing with tens of thousands of data points, from IoCs to TTPs, said Derek Manky, <a href= "https://www.fortinet.com/fortiguard/threat-intelligence/threat-research" target="_blank" rel="noopener noreferrer">Chief of Security Insights & Global Threat Alliances at Fortinet.</a></p>]]></content:encoded>
      
      
      <enclosure length="29327613" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Playbook_Sponsored_Podcast.mp3?dest-id=212001"/>
      <itunes:duration>24:10</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/9/e/f/0/9ef09595f6b66ba8/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Security defense strategy can be very complex - with security teams not dealing with mere small bits of information, but instead dealing with tens of thousands of data points, from IoCs to TTPs, said Derek Manky, Chief of Security Insights &amp; Global Threat Alliances at Fortinet.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Security defense strategy can be very complex - with security teams not dealing with mere small bits of information, but instead dealing with tens of thousands of data points, from IoCs to TTPs, said Derek Manky, Chief of Security Insights &amp; Global Threat Alliances at Fortinet.</itunes:summary></item>
    
    <item>
      <title>Sponsored Podcast: Cybersecurity in the 'New Normal'</title>
      <itunes:title>Sponsored Podcast: Cybersecurity in the 'New Normal'</itunes:title>
      <pubDate>Thu, 10 Dec 2020 14:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[c2352c67-226b-400a-a2ab-d10b2674312c]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/sponsored-podcast-consumer-grade-router-attacks-the-new-normal]]></link>
      <description><![CDATA[<p>From eCommerce threats, to security concerns in connected speakers, Fortinet researchers discuss the top evolving threats of 2020, heading into the new year.</p>]]></description>
      
      <content:encoded><![CDATA[<p>From eCommerce threats, to security concerns in connected speakers, Fortinet researchers discuss the top evolving threats of 2020, heading into the new year.</p>]]></content:encoded>
      
      
      <enclosure length="35544756" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Fortinet_Sponsored_Podcast_Dec_10.mp3?dest-id=212001"/>
      <itunes:duration>29:21</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/5/6/0/d/560d03f1f7c667f9/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>From eCommerce threats, to security concerns in connected speakers, Fortinet researchers discuss the top evolving threats of 2020, heading into the new year.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>From eCommerce threats, to security concerns in connected speakers, Fortinet researchers discuss the top evolving threats of 2020, heading into the new year.</itunes:summary></item>
    
    <item>
      <title>Amnesia:33 TCP/IP Flaws Plague Millions of IoT Devices</title>
      <itunes:title>Amnesia:33 TCP/IP Flaws Plague Millions of IoT Devices</itunes:title>
      <pubDate>Tue, 08 Dec 2020 11:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[19f5a115-89dc-44ed-9973-75748f98d724]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/amnesia33-tcpip-flaws-plague-millions-of-iot-devices]]></link>
      <description><![CDATA[<p>Researchers - as well as the U.S. Cybersecurity Infrastructure Security Agency (CISA) - are warning of a set of serious vulnerabilities affecting TCP/IP stacks. The flaws impact millions of Internet-of-Things (IoT) devices and embedded systems, including smart thermometers, smart plugs and printers, Forescout researcher Daniel dos Santos said during this week's Threatpost podcast.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Researchers - as well as the U.S. Cybersecurity Infrastructure Security Agency (CISA) - are warning of a set of serious vulnerabilities affecting TCP/IP stacks. The flaws impact millions of Internet-of-Things (IoT) devices and embedded systems, including smart thermometers, smart plugs and printers, Forescout researcher Daniel dos Santos said during this week's Threatpost podcast.</p>]]></content:encoded>
      
      
      <enclosure length="31932021" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Amnesia33_Podcast.mp3?dest-id=212001"/>
      <itunes:duration>26:20</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/3/3/0/b/330bbddc8fc21bd7/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Researchers - as well as the U.S. Cybersecurity Infrastructure Security Agency (CISA) - are warning of a set of serious vulnerabilities affecting TCP/IP stacks. The flaws impact millions of Internet-of-Things (IoT) devices and embedded systems, including smart thermometers, smart plugs and printers, Forescout researcher Daniel dos Santos said during this week's Threatpost podcast.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Researchers - as well as the U.S. Cybersecurity Infrastructure Security Agency (CISA) - are warning of a set of serious vulnerabilities affecting TCP/IP stacks. The flaws impact millions of Internet-of-Things (IoT) devices and embedded systems, including smart thermometers, smart plugs and printers, Forescout researcher Daniel dos Santos said during this week's Threatpost podcast.</itunes:summary></item>
    
    <item>
      <title>Sponsored Podcast: Why DNS Filtering is a Top Battle Front Against Malware, Phishing</title>
      <itunes:title>Sponsored Podcast: Why DNS Filtering is a Top Battle Front Against Malware, Phishing</itunes:title>
      <pubDate>Wed, 02 Dec 2020 14:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[c378f06c-af6a-4c4f-8c6e-9fe3a97aab5c]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/sponsored-podcast-why-dns-filtering-is-a-top-battle-front-against-malware-phishing]]></link>
      <description><![CDATA[<p>Peter Lowe, security researcher with <a href= "https://fltr.ai/2RWW" target="_blank" rel= "noopener noreferrer">DNSFilter</a>, talks to Cody Hackett on this week's Threatpost Podcast about how DNS filtering tactics are evolving to keep up with new cybercriminal tricks, as well as how companies can protect themselves.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Peter Lowe, security researcher with <a href= "https://fltr.ai/2RWW" target="_blank" rel= "noopener noreferrer">DNSFilter</a>, talks to Cody Hackett on this week's Threatpost Podcast about how DNS filtering tactics are evolving to keep up with new cybercriminal tricks, as well as how companies can protect themselves.</p>]]></content:encoded>
      
      
      <enclosure length="29236294" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/DNSFilter_Threatpost_Podcast.mp3?dest-id=212001"/>
      <itunes:duration>24:22</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/f/c/2/3/fc238d31a03d6753/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Peter Lowe, security researcher with DNSFilter, talks to Cody Hackett on this week's Threatpost Podcast about how DNS filtering tactics are evolving to keep up with new cybercriminal tricks, as well as how companies can protect themselves.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Peter Lowe, security researcher with DNSFilter, talks to Cody Hackett on this week's Threatpost Podcast about how DNS filtering tactics are evolving to keep up with new cybercriminal tricks, as well as how companies can protect themselves.</itunes:summary></item>
    
    <item>
      <title>Smart Doorbells on Amazon, eBay, Harbor Serious Security Issues</title>
      <itunes:title>Smart Doorbells on Amazon, eBay, Harbor Serious Security Issues</itunes:title>
      <pubDate>Tue, 24 Nov 2020 14:17:21 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[aaa48d49-9187-45e4-bccd-df7fdb835b67]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/smart-doorbells-on-amazon-ebay-harbor-serious-security-issues]]></link>
      <description><![CDATA[<p>Matt Lewis, research director at NCC Group discloses serious security and privacy in 11 different smart doorbells, which could be exploited by attackers to physically switch off the devices.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Matt Lewis, research director at NCC Group discloses serious security and privacy in 11 different smart doorbells, which could be exploited by attackers to physically switch off the devices.</p>]]></content:encoded>
      
      
      <enclosure length="27515238" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Smart_Doorbells_Podcast.mp3?dest-id=212001"/>
      <itunes:duration>22:39</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/5/6/8/9/5689c4c19667909a/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Matt Lewis, research director at NCC Group discloses serious security and privacy in 11 different smart doorbells, which could be exploited by attackers to physically switch off the devices.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Matt Lewis, research director at NCC Group discloses serious security and privacy in 11 different smart doorbells, which could be exploited by attackers to physically switch off the devices.</itunes:summary></item>
    
    <item>
      <title>Cybercriminals Batter Automakers With Ransomware, IP Theft Cyberattacks</title>
      <itunes:title>Cybercriminals Batter Automakers With Ransomware, IP Theft Cyberattacks</itunes:title>
      <pubDate>Thu, 19 Nov 2020 14:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[12d1c3ad-2182-4d99-bc7d-7abe2c7218fc]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/cybercriminals-batter-automakers-with-ransomware-ip-theft-cyberattacks]]></link>
      <description><![CDATA[<p>Cybercriminals are recognizing that the data that automotive companies have to offer - from customer and employee personal identifiable information (PII) to financial data - are invaluable. Paul Proudhomme, cyber threat intelligence analyst at IntSights, warns that this is translating into cyberattacks - whether it's aimed at Intellectual Property (IP) theft, or ransomware. And, with the ongoing pandemic shaking up both the sales and supply chain across the automotive industry, the risks of cyberthreats are only adding on to an existing pile of problems.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Cybercriminals are recognizing that the data that automotive companies have to offer - from customer and employee personal identifiable information (PII) to financial data - are invaluable. Paul Proudhomme, cyber threat intelligence analyst at IntSights, warns that this is translating into cyberattacks - whether it's aimed at Intellectual Property (IP) theft, or ransomware. And, with the ongoing pandemic shaking up both the sales and supply chain across the automotive industry, the risks of cyberthreats are only adding on to an existing pile of problems.</p>]]></content:encoded>
      
      
      <enclosure length="25774417" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Paul_Proudhomme.mp3?dest-id=212001"/>
      <itunes:duration>21:12</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/f/9/f/2/f9f280f10a3fdfc6/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Cybercriminals are recognizing that the data that automotive companies have to offer - from customer and employee personal identifiable information (PII) to financial data - are invaluable. Paul Proudhomme, cyber threat intelligence analyst at IntSights, warns that this is translating into cyberattacks - whether it's aimed at Intellectual Property (IP) theft, or ransomware. And, with the ongoing pandemic shaking up both the sales and supply chain across the automotive industry, the risks of cyberthreats are only adding on to an existing pile of problems.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Cybercriminals are recognizing that the data that automotive companies have to offer - from customer and employee personal identifiable information (PII) to financial data - are invaluable. Paul Proudhomme, cyber threat intelligence analyst at IntSights, warns that this is translating into cyberattacks - whether it's aimed at Intellectual Property (IP) theft, or ransomware. And, with the ongoing pandemic shaking up both the sales and supply chain across the automotive industry, the risks of cyberthreats are only adding on to an existing pile of problems.</itunes:summary></item>
    
    <item>
      <title>Botnet Attackers Turn to Vulnerable IoT Devices</title>
      <itunes:title>Botnet Attackers Turn to Vulnerable IoT Devices</itunes:title>
      <pubDate>Fri, 13 Nov 2020 18:01:26 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[f5249ec5-4ef5-4c7f-a8e1-01f8ae31fa10]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/botnet-attackers-turn-to-vulnerable-iot-devices]]></link>
      <description><![CDATA[<p>Cybercriminals behind botnets are increasingly shifting their infrastructure from the cloud to Internet of Things (IoT) devices, according to Derek Manky, Chief of Security Insights & Global Threat Alliances at <a href= "https://www.fortinet.com/fortiguard/threat-intelligence/threat-research" target="_blank" rel="noopener noreferrer">Fortinet's FortiGuard Labs.</a></p>]]></description>
      
      <content:encoded><![CDATA[<p>Cybercriminals behind botnets are increasingly shifting their infrastructure from the cloud to Internet of Things (IoT) devices, according to Derek Manky, Chief of Security Insights & Global Threat Alliances at <a href= "https://www.fortinet.com/fortiguard/threat-intelligence/threat-research" target="_blank" rel="noopener noreferrer">Fortinet's FortiGuard Labs.</a></p>]]></content:encoded>
      
      
      <enclosure length="32266224" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Botnet_Attackers_Turn_to_Vulnerable_IoT_Devices.mp3?dest-id=212001"/>
      <itunes:duration>26:37</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/b/8/6/c/b86c01a3560789cd/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Cybercriminals behind botnets are increasingly shifting their infrastructure from the cloud to Internet of Things (IoT) devices, according to Derek Manky, Chief of Security Insights &amp; Global Threat Alliances at Fortinet's FortiGuard Labs.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Cybercriminals behind botnets are increasingly shifting their infrastructure from the cloud to Internet of Things (IoT) devices, according to Derek Manky, Chief of Security Insights &amp; Global Threat Alliances at Fortinet's FortiGuard Labs.</itunes:summary></item>
    
    <item>
      <title>From Triton to Stuxnet: Preparing for OT Incident Response</title>
      <itunes:title>From Triton to Stuxnet: Preparing for OT Incident Response</itunes:title>
      <pubDate>Wed, 11 Nov 2020 21:57:27 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[9a20fc73-bab2-41ff-91e2-98afffde5e61]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/from-triton-to-stuxnet-preparing-for-ot-incident-response]]></link>
      <description><![CDATA[<p>Threatpost talks to Dragos' Lesley Carhart about the top cybersecurity challenges facing manufacturers during the pandemic.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Threatpost talks to Dragos' Lesley Carhart about the top cybersecurity challenges facing manufacturers during the pandemic.</p>]]></content:encoded>
      
      
      <enclosure length="29440984" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Leslie-Carhart.mp3?dest-id=212001"/>
      <itunes:duration>24:15</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/4/f/8/6/4f86391bd314803e/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Threatpost talks to Dragos' Lesley Carhart about the top cybersecurity challenges facing manufacturers during the pandemic.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Threatpost talks to Dragos' Lesley Carhart about the top cybersecurity challenges facing manufacturers during the pandemic.</itunes:summary></item>
    
    <item>
      <title>News Wrap Halloween Edition: Scary Election, Hospital Cyberattack Stories</title>
      <itunes:title>News Wrap Halloween Edition: Scary Election, Hospital Cyberattack Stories</itunes:title>
      <pubDate>Fri, 30 Oct 2020 18:01:48 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[7102e06c-5b09-4c6d-824a-fb9e987dbdae]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/news-wrap-halloween-edition-scary-election-hospital-cyberattack-stories]]></link>
      <description><![CDATA[<p>This Halloween week, Threatpost editors break down the scariest stories haunting the security space, including:</p> <ul> <li>A wave of ransomware attacks targeting a number of hospitals, sparking worries about healthcare security and the impact on patents during COVID-19</li> <li>"Zombie" vulnerabilities - including Zerologon and SMBGhost - that continued to haunt system admins this week</li> <li>Election security scares, from disinformation campaigns to cyberattacks hitting election infrastructure.</li> </ul>]]></description>
      
      <content:encoded><![CDATA[<p>This Halloween week, Threatpost editors break down the scariest stories haunting the security space, including:</p> <ul> <li>A wave of ransomware attacks targeting a number of hospitals, sparking worries about healthcare security and the impact on patents during COVID-19</li> <li>"Zombie" vulnerabilities - including Zerologon and SMBGhost - that continued to haunt system admins this week</li> <li>Election security scares, from disinformation campaigns to cyberattacks hitting election infrastructure.</li> </ul>]]></content:encoded>
      
      
      <enclosure length="37111058" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/news_wrap_halloween.mp3?dest-id=212001"/>
      <itunes:duration>30:39</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/2/f/2/4/2f24e86d2812de92/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>This Halloween week, Threatpost editors break down the scariest stories haunting the security space, including: A wave of ransomware attacks targeting a number of hospitals, sparking worries about healthcare security and the impact on patents during COVID-19 "Zombie" vulnerabilities - including Zerologon and SMBGhost - that continued to haunt system admins this week Election security scares, from disinformation campaigns to cyberattacks hitting election infrastructure.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>This Halloween week, Threatpost editors break down the scariest stories haunting the security space, including: A wave of ransomware attacks targeting a number of hospitals, sparking worries about healthcare security and the impact on patents during COVID-19 "Zombie" vulnerabilities - including Zerologon and SMBGhost - that continued to haunt system admins this week Election security scares, from disinformation campaigns to cyberattacks hitting election infrastructure.</itunes:summary></item>
    
    <item>
      <title>Holiday Shopping Craze, COVID-19 Spur Retail Software Security Storm</title>
      <itunes:title>Holiday Shopping Craze, COVID-19 Spur Retail Software Security Storm</itunes:title>
      <pubDate>Tue, 27 Oct 2020 13:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[569b78d6-27b2-4b79-867f-4cb142686be6]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/holiday-shopping-craze-covid-19-spur-retail-software-security-storm]]></link>
      <description><![CDATA[<p>Chris Eng, chief research officer with Veracode, warns that the deluge of in-person shoppers during the pandemic has pushed restaurants, boutique shops and other retailers to utilize new online software ecommerce platforms - but they aren't prepared for implementing the correct security measures for these platforms.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Chris Eng, chief research officer with Veracode, warns that the deluge of in-person shoppers during the pandemic has pushed restaurants, boutique shops and other retailers to utilize new online software ecommerce platforms - but they aren't prepared for implementing the correct security measures for these platforms.</p>]]></content:encoded>
      
      
      <enclosure length="30157881" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/chris_eng_final.mp3?dest-id=212001"/>
      <itunes:duration>25:08</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/d/7/1/6/d716867723c252ee/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Chris Eng, chief research officer with Veracode, warns that the deluge of in-person shoppers during the pandemic has pushed restaurants, boutique shops and other retailers to utilize new online software ecommerce platforms - but they aren't prepared for implementing the correct security measures for these platforms.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Chris Eng, chief research officer with Veracode, warns that the deluge of in-person shoppers during the pandemic has pushed restaurants, boutique shops and other retailers to utilize new online software ecommerce platforms - but they aren't prepared for implementing the correct security measures for these platforms.</itunes:summary></item>
    
    <item>
      <title>Sponsored Podcast: Phishing Lures Shift from COVID-19 to Job Opportunities</title>
      <itunes:title>Sponsored Podcast: Phishing Lures Shift from COVID-19 to Job Opportunities</itunes:title>
      <pubDate>Fri, 16 Oct 2020 18:21:55 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[2be8a51e-037d-4f6a-b280-112201b81a5a]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/sponsored-podcast-phishing-lures-shift-from-covid-19-to-job-opportunities]]></link>
      <description><![CDATA[<p>Derek Manky, Chief of Security Insights & Global Threat Alliances at <a href= "https://www.fortinet.com/fortiguard/threat-intelligence/threat-research" target="_blank" rel="noopener noreferrer">Fortinet's FortiGuard Labs,</a> said that cybercriminals cashed in on the surge of COVID-19  earlier this year with phishing emails purporting to be from healthcare professionals offering more resources and information about the pandemic.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Derek Manky, Chief of Security Insights & Global Threat Alliances at <a href= "https://www.fortinet.com/fortiguard/threat-intelligence/threat-research" target="_blank" rel="noopener noreferrer">Fortinet's FortiGuard Labs,</a> said that cybercriminals cashed in on the surge of COVID-19 earlier this year with phishing emails purporting to be from healthcare professionals offering more resources and information about the pandemic.</p>]]></content:encoded>
      
      
      <enclosure length="29729376" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/fortinet_sponsored_podcast.mp3?dest-id=212001"/>
      <itunes:duration>24:30</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/e/8/0/b/e80b50ca14ffee0a/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Derek Manky, Chief of Security Insights &amp; Global Threat Alliances at Fortinet's FortiGuard Labs, said that cybercriminals cashed in on the surge of COVID-19  earlier this year with phishing emails purporting to be from healthcare professionals offering more resources and information about the pandemic.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Derek Manky, Chief of Security Insights &amp; Global Threat Alliances at Fortinet's FortiGuard Labs, said that cybercriminals cashed in on the surge of COVID-19  earlier this year with phishing emails purporting to be from healthcare professionals offering more resources and information about the pandemic.</itunes:summary></item>
    
    <item>
      <title>News Wrap: Zoom's End-to-End Encryption Rollout and DDoS Extortion Threats</title>
      <itunes:title>News Wrap: Zoom's End-to-End Encryption Rollout and DDoS Extortion Threats</itunes:title>
      <pubDate>Thu, 15 Oct 2020 21:39:58 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[24392a98-046f-43b9-98d5-e2b111f89ead]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/news-wrap-zooms-end-to-end-encryption-rollout-and-ddos-extortion-threats]]></link>
      <description><![CDATA[<p>The Threatpost editors break down the top security stories of the week ended Oct. 16, including:</p> <ul> <li><a href= "https://threatpost.com/october-patch-tuesday-wormable-bug/160044/"> Patch Tuesday insanity</a>, with Microsoft <a href= "https://threatpost.com/flash-player-flaw-adobe-rce/160034/">and Adobe</a> releasing fixes for severe vulnerabilities - including a critical, potentially wormable remote code execution Microsoft vulnerability</li> <li><a href= "https://threatpost.com/barnes-noble-hack-phishers-crooks/160148/">Barnes and Noble being hacked</a> - and why some readers are unhappy with how the book purveyor announced the cyberattack</li> <li><a href= "https://threatpost.com/travelex-ddos-extortion-campaign/160110/">DDoS extortion email threats</a> hitting various companies across the globe - including Travelex</li> <li>Zoom finally <a href= "https://threatpost.com/zoom-end-to-end-encryption/160150/">rolling out end-to-end encryption</a> on the video conferencing platform - and why this is different than the video conferencing application's earlier "full encryption" claims</li> </ul> <p> </p>]]></description>
      
      <content:encoded><![CDATA[<p>The Threatpost editors break down the top security stories of the week ended Oct. 16, including:</p> <ul> <li><a href= "https://threatpost.com/october-patch-tuesday-wormable-bug/160044/"> Patch Tuesday insanity</a>, with Microsoft <a href= "https://threatpost.com/flash-player-flaw-adobe-rce/160034/">and Adobe</a> releasing fixes for severe vulnerabilities - including a critical, potentially wormable remote code execution Microsoft vulnerability</li> <li><a href= "https://threatpost.com/barnes-noble-hack-phishers-crooks/160148/">Barnes and Noble being hacked</a> - and why some readers are unhappy with how the book purveyor announced the cyberattack</li> <li><a href= "https://threatpost.com/travelex-ddos-extortion-campaign/160110/">DDoS extortion email threats</a> hitting various companies across the globe - including Travelex</li> <li>Zoom finally <a href= "https://threatpost.com/zoom-end-to-end-encryption/160150/">rolling out end-to-end encryption</a> on the video conferencing platform - and why this is different than the video conferencing application's earlier "full encryption" claims</li> </ul> <p> </p>]]></content:encoded>
      
      
      <enclosure length="25946825" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/News_Wrap_Oct_16_Final.mp3?dest-id=212001"/>
      <itunes:duration>21:21</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/7/d/4/f/7d4f45747ac87aa2/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>The Threatpost editors break down the top security stories of the week ended Oct. 16, including: Patch Tuesday insanity, with Microsoft and Adobe releasing fixes for severe vulnerabilities - including a critical, potentially wormable remote code execution Microsoft vulnerability Barnes and Noble being hacked - and why some readers are unhappy with how the book purveyor announced the cyberattack DDoS extortion email threats hitting various companies across the globe - including Travelex Zoom finally rolling out end-to-end encryption on the video conferencing platform - and why this is different than the video conferencing application's earlier "full encryption" claims  </itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>The Threatpost editors break down the top security stories of the week ended Oct. 16, including: Patch Tuesday insanity, with Microsoft and Adobe releasing fixes for severe vulnerabilities - including a critical, potentially wormable remote code execution Microsoft vulnerability Barnes and Noble being hacked - and why some readers are unhappy with how the book purveyor announced the cyberattack DDoS extortion email threats hitting various companies across the globe - including Travelex Zoom finally rolling out end-to-end encryption on the video conferencing platform - and why this is different than the video conferencing application's earlier "full encryption" claims  </itunes:summary></item>
    
    <item>
      <title>305 CVEs and Counting: Bug-Hunting Stories From a Security Engineer</title>
      <itunes:title>305 CVEs and Counting: Bug-Hunting Stories From a Security Engineer</itunes:title>
      <pubDate>Fri, 02 Oct 2020 13:34:50 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[815faaba-b157-4901-a1e2-0a68051f4525]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/305-cves-and-counting-bug-hunting-stories-from-a-security-engineer]]></link>
      <description><![CDATA[<p>Larry Cashdollar shares his craziest bug finding stories, including a flaw (CVE-1999-0765) found during his position as a UNIX Systems Administrator, which existed in the SGI IRIX midikeys program - and accidentally threw a wrench in a demo for a navy admiral on the Aegis destroyer class ship.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Larry Cashdollar shares his craziest bug finding stories, including a flaw (CVE-1999-0765) found during his position as a UNIX Systems Administrator, which existed in the SGI IRIX midikeys program - and accidentally threw a wrench in a demo for a navy admiral on the Aegis destroyer class ship.</p>]]></content:encoded>
      
      
      <enclosure length="40263515" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Larry_Cashdollar_Podcast.mp3?dest-id=212001"/>
      <itunes:duration>33:17</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/c/3/d/3/c3d376f5a0515bf2/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Larry Cashdollar shares his craziest bug finding stories, including a flaw (CVE-1999-0765) found during his position as a UNIX Systems Administrator, which existed in the SGI IRIX midikeys program - and accidentally threw a wrench in a demo for a navy admiral on the Aegis destroyer class ship.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Larry Cashdollar shares his craziest bug finding stories, including a flaw (CVE-1999-0765) found during his position as a UNIX Systems Administrator, which existed in the SGI IRIX midikeys program - and accidentally threw a wrench in a demo for a navy admiral on the Aegis destroyer class ship.</itunes:summary></item>
    
    <item>
      <title>Critical Industrial Flaws Pose a Patching Headache For Manufacturers</title>
      <itunes:title>Critical Industrial Flaws Pose a Patching Headache For Manufacturers</itunes:title>
      <pubDate>Wed, 23 Sep 2020 14:28:02 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[5abb53dd-4110-49eb-b0c8-6b1162bc434c]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/critical-industrial-flaws-pose-a-patching-headache-for-manufacturers]]></link>
      <description><![CDATA[<p>Sharon Brizinov, the principal vulnerability researcher with Claroty, who discovered vulnerabilities a software component used by various critical infrastructure systems, talks about why patching is a headache for manufacturers and other industrials firms.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Sharon Brizinov, the principal vulnerability researcher with Claroty, who discovered vulnerabilities a software component used by various critical infrastructure systems, talks about why patching is a headache for manufacturers and other industrials firms.</p>]]></content:encoded>
      
      
      <enclosure length="27289540" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Claroty_Podcast.mp3?dest-id=212001"/>
      <itunes:duration>22:28</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/6/5/2/c/652c7e0dbae94459/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Sharon Brizinov, the principal vulnerability researcher with Claroty, who discovered vulnerabilities a software component used by various critical infrastructure systems, talks about why patching is a headache for manufacturers and other industrials firms.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Sharon Brizinov, the principal vulnerability researcher with Claroty, who discovered vulnerabilities a software component used by various critical infrastructure systems, talks about why patching is a headache for manufacturers and other industrials firms.</itunes:summary></item>
    
    <item>
      <title>Vulnerability Disclosure: Ethical Hackers Seek Best Practices</title>
      <itunes:title>Vulnerability Disclosure: Ethical Hackers Seek Best Practices</itunes:title>
      <pubDate>Fri, 04 Sep 2020 13:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[4db8806b-d62c-4f48-a03f-c2084b8ac58f]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/vulnerability-disclosure-ethical-hackers-seek-best-practices]]></link>
      <description><![CDATA[<p>The Zero Day Initiative team talks about the biggest vulnerability disclosure challenges that ethical hackers are facing - particularly in markets like the industrial world and IoT.</p>]]></description>
      
      <content:encoded><![CDATA[<p>The Zero Day Initiative team talks about the biggest vulnerability disclosure challenges that ethical hackers are facing - particularly in markets like the industrial world and IoT.</p>]]></content:encoded>
      
      
      <enclosure length="28882487" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/podcast_final_1.mp3?dest-id=212001"/>
      <itunes:duration>23:48</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/d/2/d/4/d2d4f17f5ce6f91e/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>The Zero Day Initiative team talks about the biggest vulnerability disclosure challenges that ethical hackers are facing - particularly in markets like the industrial world and IoT.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>The Zero Day Initiative team talks about the biggest vulnerability disclosure challenges that ethical hackers are facing - particularly in markets like the industrial world and IoT.</itunes:summary></item>
    
    <item>
      <title>Disinformation A Booming Industry For Attackers As Elections Loom</title>
      <itunes:title>Disinformation A Booming Industry For Attackers As Elections Loom</itunes:title>
      <pubDate>Wed, 26 Aug 2020 13:40:04 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[1e4a289c-c8ce-47f6-a55e-91c54dfe3515]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/disinformation-a-booming-industry-for-attackers-as-elections-loom]]></link>
      <description><![CDATA[<p>With the <a href= "https://threatpost.com/2020-election-secure-vote-tallies-problem/158533/"> U.S. presidential elections looming</a>, disinformation is a top challenge. In the four years since the previous 2016 presidential election, threat actors have created an entire sophisticated and intricate industry around misinformation - raising the bar for social media companies to detect and protect against this threat, <a href= "https://talos-intelligence-site.s3.amazonaws.com/production/document_files/files/000/094/386/original/Talos_Disinformation_2020.pdf"> new Wednesday Cisco Talos research found.</a></p>]]></description>
      
      <content:encoded><![CDATA[<p>With the <a href= "https://threatpost.com/2020-election-secure-vote-tallies-problem/158533/"> U.S. presidential elections looming</a>, disinformation is a top challenge. In the four years since the previous 2016 presidential election, threat actors have created an entire sophisticated and intricate industry around misinformation - raising the bar for social media companies to detect and protect against this threat, <a href= "https://talos-intelligence-site.s3.amazonaws.com/production/document_files/files/000/094/386/original/Talos_Disinformation_2020.pdf"> new Wednesday Cisco Talos research found.</a></p>]]></content:encoded>
      
      
      <enclosure length="24365497" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Election_Security_Final.mp3?dest-id=212001"/>
      <itunes:duration>20:19</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/1/a/c/3/1ac3536f35537fb5/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>With the U.S. presidential elections looming, disinformation is a top challenge. In the four years since the previous 2016 presidential election, threat actors have created an entire sophisticated and intricate industry around misinformation - raising the bar for social media companies to detect and protect against this threat, new Wednesday Cisco Talos research found.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>With the U.S. presidential elections looming, disinformation is a top challenge. In the four years since the previous 2016 presidential election, threat actors have created an entire sophisticated and intricate industry around misinformation - raising the bar for social media companies to detect and protect against this threat, new Wednesday Cisco Talos research found.</itunes:summary></item>
    
    <item>
      <title>News Wrap: AWS Cryptojacking Worm, IBM Privacy Lawsuit and More</title>
      <itunes:title>News Wrap: AWS Cryptojacking Worm, IBM Privacy Lawsuit and More</itunes:title>
      <pubDate>Fri, 21 Aug 2020 13:21:21 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[d044e6d1-0ad9-43ab-b6cd-841dcac7085d]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/news-wrap-aws-cryptojacking-worm-ibm-privacy-lawsuit-and-more]]></link>
      <description><![CDATA[<p>Threatpost editors Lindsey O'Donnell-Welch and Tara Seals discuss the top security news stories of the week ended Aug. 21, including:</p> <ul> <li>IBM, the owner of the <a href= "https://threatpost.com/ibm-settles-lawsuit-over-weather-channel-app-data-privacy/158529/"> Weather Channel mobile app</a>, has reached a settlement with the Los Angeles city attorney's office after a <a href= "https://threatpost.com/lawsuit-weather-channel-location-data/140579/"> 2019 lawsuit alleged</a> that the app was deceiving its users in how it was using their geolocation data.</li> <li>A <a href= "https://threatpost.com/aws-cryptojacking-worm-cloud/158427/">cryptomining worm from the group</a> known as TeamTNT is spreading through the Amazon Web Services (AWS) cloud and collecting credentials.</li> <li>Researchers are urging connected-device manufacturers to ensure they have applied patches addressing a flaw in a module used by <a href= "https://threatpost.com/flaw-affecting-millions-iot-devices/158472/"> millions of Internet-of-Things (IoT)</a> devices.</li> </ul>]]></description>
      
      <content:encoded><![CDATA[<p>Threatpost editors Lindsey O'Donnell-Welch and Tara Seals discuss the top security news stories of the week ended Aug. 21, including:</p> <ul> <li>IBM, the owner of the <a href= "https://threatpost.com/ibm-settles-lawsuit-over-weather-channel-app-data-privacy/158529/"> Weather Channel mobile app</a>, has reached a settlement with the Los Angeles city attorney's office after a <a href= "https://threatpost.com/lawsuit-weather-channel-location-data/140579/"> 2019 lawsuit alleged</a> that the app was deceiving its users in how it was using their geolocation data.</li> <li>A <a href= "https://threatpost.com/aws-cryptojacking-worm-cloud/158427/">cryptomining worm from the group</a> known as TeamTNT is spreading through the Amazon Web Services (AWS) cloud and collecting credentials.</li> <li>Researchers are urging connected-device manufacturers to ensure they have applied patches addressing a flaw in a module used by <a href= "https://threatpost.com/flaw-affecting-millions-iot-devices/158472/"> millions of Internet-of-Things (IoT)</a> devices.</li> </ul>]]></content:encoded>
      
      
      <enclosure length="16911592" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/News_Wrap_Aug_21.mp3?dest-id=212001"/>
      <itunes:duration>13:49</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/4/3/c/0/43c0f03002f421c5/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Threatpost editors Lindsey O'Donnell-Welch and Tara Seals discuss the top security news stories of the week ended Aug. 21, including: IBM, the owner of the Weather Channel mobile app, has reached a settlement with the Los Angeles city attorney's office after a 2019 lawsuit alleged that the app was deceiving its users in how it was using their geolocation data. A cryptomining worm from the group known as TeamTNT is spreading through the Amazon Web Services (AWS) cloud and collecting credentials. Researchers are urging connected-device manufacturers to ensure they have applied patches addressing a flaw in a module used by millions of Internet-of-Things (IoT) devices.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Threatpost editors Lindsey O'Donnell-Welch and Tara Seals discuss the top security news stories of the week ended Aug. 21, including: IBM, the owner of the Weather Channel mobile app, has reached a settlement with the Los Angeles city attorney's office after a 2019 lawsuit alleged that the app was deceiving its users in how it was using their geolocation data. A cryptomining worm from the group known as TeamTNT is spreading through the Amazon Web Services (AWS) cloud and collecting credentials. Researchers are urging connected-device manufacturers to ensure they have applied patches addressing a flaw in a module used by millions of Internet-of-Things (IoT) devices.</itunes:summary></item>
    
    <item>
      <title>Active 'Duri' Campaign Utilizes HTML Smuggling to Cloak Malware</title>
      <itunes:title>Active 'Duri' Campaign Utilizes HTML Smuggling to Cloak Malware</itunes:title>
      <pubDate>Tue, 18 Aug 2020 18:34:36 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[12c5d98b-715c-4d6e-aeaa-9eb90542b343]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/active-duri-campaign-utilizes-html-smuggling-to-cloak-malware]]></link>
      <description><![CDATA[<p>Researchers are warning of an active campaign that utilized HTML smuggling to deliver malware, effectively bypassing various network security solutions, including sandboxes, legacy proxies and firewalls.</p> <p>Because HTML smuggling is not necessarily a novel technique - it's been used by attackers for awhile - this campaign shows that bad actors continue to rely on older attack methods that are working. Learn more about this latest attack and how attackers are raising the bar during this week's Threatpost podcast.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Researchers are warning of an active campaign that utilized HTML smuggling to deliver malware, effectively bypassing various network security solutions, including sandboxes, legacy proxies and firewalls.</p> <p>Because HTML smuggling is not necessarily a novel technique - it's been used by attackers for awhile - this campaign shows that bad actors continue to rely on older attack methods that are working. Learn more about this latest attack and how attackers are raising the bar during this week's Threatpost podcast.</p>]]></content:encoded>
      
      
      <enclosure length="22705551" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/html_spoofing_campaign.mp3?dest-id=212001"/>
      <itunes:duration>18:39</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/d/d/5/7/dd57f2c7e919fdfd/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Researchers are warning of an active campaign that utilized HTML smuggling to deliver malware, effectively bypassing various network security solutions, including sandboxes, legacy proxies and firewalls. Because HTML smuggling is not necessarily a novel technique - it's been used by attackers for awhile - this campaign shows that bad actors continue to rely on older attack methods that are working. Learn more about this latest attack and how attackers are raising the bar during this week's Threatpost podcast.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Researchers are warning of an active campaign that utilized HTML smuggling to deliver malware, effectively bypassing various network security solutions, including sandboxes, legacy proxies and firewalls. Because HTML smuggling is not necessarily a novel technique - it's been used by attackers for awhile - this campaign shows that bad actors continue to rely on older attack methods that are working. Learn more about this latest attack and how attackers are raising the bar during this week's Threatpost podcast.</itunes:summary></item>
    
    <item>
      <title>Sponsored Podcast: The Perimeter Gets More Personal in 1H 2020</title>
      <itunes:title>Sponsored Podcast: The Perimeter Gets More Personal in 1H 2020</itunes:title>
      <pubDate>Thu, 13 Aug 2020 14:14:41 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[6e873819-c42e-49e1-bf11-fa7985547ab2]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/sponsored-podcast-the-perimeter-gets-more-personal-in-1h-2020]]></link>
      <description><![CDATA[<p>Derek Manky, Chief, Security Insights & Global Threat Alliances at <a href= "https://www.fortinet.com/fortiguard/threat-intelligence/threat-research" target="_blank" rel="noopener noreferrer">Fortinet's FortiGuard Labs,</a> said that the semi-annual FortiGuard Labs <a href= "https://www.fortinet.com/content/dam/maindam/PUBLIC/02_MARKETING/08_Report/Threat-Report-H1-2020.pdf"> Global Threat Landscape Report</a> for the first half of 2020, released Wednesday, reveals an "unprecedented cyber threat landscape."</p>]]></description>
      
      <content:encoded><![CDATA[<p>Derek Manky, Chief, Security Insights & Global Threat Alliances at <a href= "https://www.fortinet.com/fortiguard/threat-intelligence/threat-research" target="_blank" rel="noopener noreferrer">Fortinet's FortiGuard Labs,</a> said that the semi-annual FortiGuard Labs <a href= "https://www.fortinet.com/content/dam/maindam/PUBLIC/02_MARKETING/08_Report/Threat-Report-H1-2020.pdf"> Global Threat Landscape Report</a> for the first half of 2020, released Wednesday, reveals an "unprecedented cyber threat landscape."</p>]]></content:encoded>
      
      
      <enclosure length="28322784" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Fortinet_Podcast_2.mp3?dest-id=212001"/>
      <itunes:duration>23:20</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/8/3/0/a/830ad4e57eeb2bc1/0.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Derek Manky, Chief, Security Insights &amp; Global Threat Alliances at Fortinet's FortiGuard Labs, said that the semi-annual FortiGuard Labs Global Threat Landscape Report for the first half of 2020, released Wednesday, reveals an "unprecedented cyber threat landscape."</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Derek Manky, Chief, Security Insights &amp; Global Threat Alliances at Fortinet's FortiGuard Labs, said that the semi-annual FortiGuard Labs Global Threat Landscape Report for the first half of 2020, released Wednesday, reveals an "unprecedented cyber threat landscape."</itunes:summary></item>
    
    <item>
      <title>Sponsored Podcast: Why IT and OT Security Priorities 'Don't Translate'</title>
      <itunes:title>Sponsored Podcast: Why IT and OT Security Priorities 'Don't Translate'</itunes:title>
      <pubDate>Tue, 04 Aug 2020 12:06:04 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[8cf5195f-328e-41b7-8e91-b79da3880377]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/sponsored-podcast-why-it-and-ot-security-priorities-dont-translate]]></link>
      <description><![CDATA[<p>Information technology (IT) and operational technology (OT) may have many of the same objectives - but too often they don't see eye-to-eye when it comes to priorities, said Andrew Ginter, VP Industrial Security at <a href= "https://waterfall-security.com/" target="_blank" rel= "noopener noreferrer">Waterfall Security Solutions</a> in this sponsored podcast.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Information technology (IT) and operational technology (OT) may have many of the same objectives - but too often they don't see eye-to-eye when it comes to priorities, said Andrew Ginter, VP Industrial Security at <a href= "https://waterfall-security.com/" target="_blank" rel= "noopener noreferrer">Waterfall Security Solutions</a> in this sponsored podcast.</p>]]></content:encoded>
      
      
      <enclosure length="32693120" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Waterfall_Security_Podcast_2.mp3?dest-id=212001"/>
      <itunes:duration>26:50</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/f/9/8/b/f98b97f9101a8e91/threatpost_podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Information technology (IT) and operational technology (OT) may have many of the same objectives - but too often they don't see eye-to-eye when it comes to priorities, said Andrew Ginter, VP Industrial Security at Waterfall Security Solutions in this sponsored podcast.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Information technology (IT) and operational technology (OT) may have many of the same objectives - but too often they don't see eye-to-eye when it comes to priorities, said Andrew Ginter, VP Industrial Security at Waterfall Security Solutions in this sponsored podcast.</itunes:summary></item>
    
    <item>
      <title>Black Hat 2020 Preview: Election Security, COVID Disinformation and More</title>
      <itunes:title>Black Hat 2020 Preview: Election Security, COVID Disinformation and More</itunes:title>
      <pubDate>Thu, 30 Jul 2020 18:29:34 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[73186ba5-4672-42e9-8a4d-46a506b63a8f]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/black-hat-2020-preview-election-security-covid-disinformation-and-more]]></link>
      <description><![CDATA[<p>Despite the coronavirus pandemic pushing <a href= "https://threatpost.com/category/bh/">the Black Hat USA 2020 conference</a> onto a <a href= "https://threatpost.com/black-hat-usa-def-con-28-go-virtual/155606/"> virtual platform for the first time ever</a>, you can expect the same hot security research and threat intel, high-profile speakers, and vulnerability research being disclosed.</p> <p>Threatpost editors Tom Spring, Tara Seals and Lindsey O'Donnell-Welch break down the top sessions, keynotes, speakers and themes to look out for in this week's podcast.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Despite the coronavirus pandemic pushing <a href= "https://threatpost.com/category/bh/">the Black Hat USA 2020 conference</a> onto a <a href= "https://threatpost.com/black-hat-usa-def-con-28-go-virtual/155606/"> virtual platform for the first time ever</a>, you can expect the same hot security research and threat intel, high-profile speakers, and vulnerability research being disclosed.</p> <p>Threatpost editors Tom Spring, Tara Seals and Lindsey O'Donnell-Welch break down the top sessions, keynotes, speakers and themes to look out for in this week's podcast.</p>]]></content:encoded>
      
      
      <enclosure length="20604826" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Black_Hat_2020_Preview_Podcast.mp3?dest-id=212001"/>
      <itunes:duration>16:46</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/9/6/0/e/960e458e3b15f44f/threatpost_podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Despite the coronavirus pandemic pushing the Black Hat USA 2020 conference onto a virtual platform for the first time ever, you can expect the same hot security research and threat intel, high-profile speakers, and vulnerability research being disclosed. Threatpost editors Tom Spring, Tara Seals and Lindsey O'Donnell-Welch break down the top sessions, keynotes, speakers and themes to look out for in this week's podcast.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Despite the coronavirus pandemic pushing the Black Hat USA 2020 conference onto a virtual platform for the first time ever, you can expect the same hot security research and threat intel, high-profile speakers, and vulnerability research being disclosed. Threatpost editors Tom Spring, Tara Seals and Lindsey O'Donnell-Welch break down the top sessions, keynotes, speakers and themes to look out for in this week's podcast.</itunes:summary></item>
    
    <item>
      <title>Sponsored Podcast: Security Lessons Learned In Times of Uncertainty</title>
      <itunes:title>Sponsored Podcast: Security Lessons Learned In Times of Uncertainty</itunes:title>
      <pubDate>Tue, 28 Jul 2020 13:16:57 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[3cf3e7f2-ccb2-4006-ae3f-1ce45e812b57]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/sponsored-podcast-security-lessons-learned-in-times-of-uncertainty]]></link>
      <description><![CDATA[<p>From the coronavirus pandemic breaking out, and corporate workforces going remote, "uncertainty is a key word" for 2020, Derek Manky, Chief, Security Insights & Global Threat Alliances at <a href= "https://www.fortinet.com/fortiguard/threat-intelligence/threat-research" target="_blank" rel="noopener noreferrer">Fortinet's FortiGuard Labs</a> said.</p> <p>Manky talks about the biggest lessons learned so far from 2020, including the most dire threats to date - from sophisticated social engineering lures, to Internet of Things (IoT) vulnerabilities to targeted ransomware attacks.</p>]]></description>
      
      <content:encoded><![CDATA[<p>From the coronavirus pandemic breaking out, and corporate workforces going remote, "uncertainty is a key word" for 2020, Derek Manky, Chief, Security Insights & Global Threat Alliances at <a href= "https://www.fortinet.com/fortiguard/threat-intelligence/threat-research" target="_blank" rel="noopener noreferrer">Fortinet's FortiGuard Labs</a> said.</p> <p>Manky talks about the biggest lessons learned so far from 2020, including the most dire threats to date - from sophisticated social engineering lures, to Internet of Things (IoT) vulnerabilities to targeted ransomware attacks.</p>]]></content:encoded>
      
      
      <enclosure length="30724640" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Threat_Post_Podcast_Fortninet_Derek_Manky_Final.mp3?dest-id=212001"/>
      <itunes:duration>25:12</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/f/7/a/8/f7a80d9ff0459fa4/threatpost_podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>From the coronavirus pandemic breaking out, and corporate workforces going remote, "uncertainty is a key word" for 2020, Derek Manky, Chief, Security Insights &amp; Global Threat Alliances at Fortinet's FortiGuard Labs said. Manky talks about the biggest lessons learned so far from 2020, including the most dire threats to date - from sophisticated social engineering lures, to Internet of Things (IoT) vulnerabilities to targeted ransomware attacks.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>From the coronavirus pandemic breaking out, and corporate workforces going remote, "uncertainty is a key word" for 2020, Derek Manky, Chief, Security Insights &amp; Global Threat Alliances at Fortinet's FortiGuard Labs said. Manky talks about the biggest lessons learned so far from 2020, including the most dire threats to date - from sophisticated social engineering lures, to Internet of Things (IoT) vulnerabilities to targeted ransomware attacks.</itunes:summary></item>
    
    <item>
      <title>News Wrap: Twitter Hack, Apple Vulnerability Disclosure Restrictions Under Fire</title>
      <itunes:title>News Wrap: Twitter Hack, Apple Vulnerability Disclosure Restrictions Under Fire</itunes:title>
      <pubDate>Fri, 24 Jul 2020 16:08:12 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[a25e2c07-f12a-4757-af05-5371db14f6ae]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/news-wrap-twitter-hack-apple-vulnerability-disclosure-restrictions-under-fire]]></link>
      <description><![CDATA[<p>In this week's Threatpost news wrap podcast, editors Tara Seals and Lindsey O'Donnell-Welch break down the top security news stories, including:</p> <ul> <li>Hackers accessed direct messages (DMs) for 36 of the 130 high-profile users whose accounts were hacked in an <a href= "https://threatpost.com/twitter-elite-accounts-are-hijacked-in-unprecedented-cryptocurrency-scam/157463/" target="_blank" rel="noopener noreferrer">unprecedented account breach</a> last week, <a href= "https://threatpost.com/twitter-hackers-private-messages-elite-accounts/157657/"> Twitter confirmed Wednesday.</a></li> <li>Privacy commissioners worldwide <a href= "https://threatpost.com/cisco-zoom-and-others-must-bolster-security-say-privacy-chiefs/157662/"> urged video conferencing systems</a> like Microsoft, Cisco and Zoom to adopt end-to-end encryption, two-factor authentication and other security measures.</li> <li>Apple's Security Research Device program <a href= "https://threatpost.com/apple-security-research-device-program-draws-mixed-reactions/157640/"> is now open to select researchers</a> – but some are irked by the program's vulnerability disclosure restrictions.</li> </ul>]]></description>
      
      <content:encoded><![CDATA[<p>In this week's Threatpost news wrap podcast, editors Tara Seals and Lindsey O'Donnell-Welch break down the top security news stories, including:</p> <ul> <li>Hackers accessed direct messages (DMs) for 36 of the 130 high-profile users whose accounts were hacked in an <a href= "https://threatpost.com/twitter-elite-accounts-are-hijacked-in-unprecedented-cryptocurrency-scam/157463/" target="_blank" rel="noopener noreferrer">unprecedented account breach</a> last week, <a href= "https://threatpost.com/twitter-hackers-private-messages-elite-accounts/157657/"> Twitter confirmed Wednesday.</a></li> <li>Privacy commissioners worldwide <a href= "https://threatpost.com/cisco-zoom-and-others-must-bolster-security-say-privacy-chiefs/157662/"> urged video conferencing systems</a> like Microsoft, Cisco and Zoom to adopt end-to-end encryption, two-factor authentication and other security measures.</li> <li>Apple's Security Research Device program <a href= "https://threatpost.com/apple-security-research-device-program-draws-mixed-reactions/157640/"> is now open to select researchers</a> – but some are irked by the program's vulnerability disclosure restrictions.</li> </ul>]]></content:encoded>
      
      
      <enclosure length="22010694" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Threatpost_News_Wrap_Final_724.mp3?dest-id=212001"/>
      <itunes:duration>17:56</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/c/c/5/9/cc59e53bb03e6ac0/threatpost_podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>In this week's Threatpost news wrap podcast, editors Tara Seals and Lindsey O'Donnell-Welch break down the top security news stories, including: Hackers accessed direct messages (DMs) for 36 of the 130 high-profile users whose accounts were hacked in an unprecedented account breach last week, Twitter confirmed Wednesday. Privacy commissioners worldwide urged video conferencing systems like Microsoft, Cisco and Zoom to adopt end-to-end encryption, two-factor authentication and other security measures. Apple's Security Research Device program is now open to select researchers – but some are irked by the program's vulnerability disclosure restrictions.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>In this week's Threatpost news wrap podcast, editors Tara Seals and Lindsey O'Donnell-Welch break down the top security news stories, including: Hackers accessed direct messages (DMs) for 36 of the 130 high-profile users whose accounts were hacked in an unprecedented account breach last week, Twitter confirmed Wednesday. Privacy commissioners worldwide urged video conferencing systems like Microsoft, Cisco and Zoom to adopt end-to-end encryption, two-factor authentication and other security measures. Apple's Security Research Device program is now open to select researchers – but some are irked by the program's vulnerability disclosure restrictions.</itunes:summary></item>
    
    <item>
      <title>Lookout: Behind the Scenes of a 7-Year Android Spyware Campaign</title>
      <itunes:title>Lookout: Behind the Scenes of a 7-Year Android Spyware Campaign</itunes:title>
      <pubDate>Wed, 22 Jul 2020 14:57:19 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[b8838631-c19b-4180-b886-e412e9c02056]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/lookout-behind-the-scenes-of-a-7-year-android-spyware-campaign]]></link>
      <description><![CDATA[<p>Christoph Hebeisen, with Lookout, reveals the behind-the-scenes threat intel efforts for discovering a 7-year-old surveillance campaign that was targeting the Uyghur ethnic minority group.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Christoph Hebeisen, with Lookout, reveals the behind-the-scenes threat intel efforts for discovering a 7-year-old surveillance campaign that was targeting the Uyghur ethnic minority group.</p>]]></content:encoded>
      
      
      <enclosure length="15189440" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Spyware_Campaign_Podcast.mp3?dest-id=212001"/>
      <itunes:duration>12:15</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/6/6/a/9/66a9e7674b4fc8cd/threatpost_podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Christoph Hebeisen, with Lookout, reveals the behind-the-scenes threat intel efforts for discovering a 7-year-old surveillance campaign that was targeting the Uyghur ethnic minority group.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Christoph Hebeisen, with Lookout, reveals the behind-the-scenes threat intel efforts for discovering a 7-year-old surveillance campaign that was targeting the Uyghur ethnic minority group.</itunes:summary></item>
    
    <item>
      <title>A 'New Age' of Sophisticated Business Email Compromise is Coming</title>
      <itunes:title>A 'New Age' of Sophisticated Business Email Compromise is Coming</itunes:title>
      <pubDate>Mon, 13 Jul 2020 13:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[4c236170-37f0-4d28-8725-018a65a461a8]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/a-new-age-of-sophisticated-business-email-compromise-is-coming]]></link>
      <description><![CDATA[<p>A newly discovered, sophisticated threat group that targets organizations without DMARC implemented and relies on business email compromise is heralding what researchers call "a new age" of business email compromise.</p> <p>The group, called Cosmic Lynx, is the first reported Russian BEC cybercriminal ring, and it's bringing the once run-of-the-mill email scam attack vector to the next level. The group has been associated with more than 200 BEC campaigns targeting senior-level executives in 46 countries since last July. It uses clear, articulate emails -- with vocabulary like "accretive" and "synergistic" -- that purport to be related to an a "merger and acquisition," keeping with a sensitive theme that targeted employees likely won't discuss.</p>]]></description>
      
      <content:encoded><![CDATA[<p>A newly discovered, sophisticated threat group that targets organizations without DMARC implemented and relies on business email compromise is heralding what researchers call "a new age" of business email compromise.</p> <p>The group, called Cosmic Lynx, is the first reported Russian BEC cybercriminal ring, and it's bringing the once run-of-the-mill email scam attack vector to the next level. The group has been associated with more than 200 BEC campaigns targeting senior-level executives in 46 countries since last July. It uses clear, articulate emails -- with vocabulary like "accretive" and "synergistic" -- that purport to be related to an a "merger and acquisition," keeping with a sensitive theme that targeted employees likely won't discuss.</p>]]></content:encoded>
      
      
      <enclosure length="30478046" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/BEC_research.mp3?dest-id=212001"/>
      <itunes:duration>25:00</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/1/e/8/5/1e85fbc8563c888b/threatpost_podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>A newly discovered, sophisticated threat group that targets organizations without DMARC implemented and relies on business email compromise is heralding what researchers call "a new age" of business email compromise. The group, called Cosmic Lynx, is the first reported Russian BEC cybercriminal ring, and it's bringing the once run-of-the-mill email scam attack vector to the next level. The group has been associated with more than 200 BEC campaigns targeting senior-level executives in 46 countries since last July. It uses clear, articulate emails -- with vocabulary like "accretive" and "synergistic" -- that purport to be related to an a "merger and acquisition," keeping with a sensitive theme that targeted employees likely won't discuss.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>A newly discovered, sophisticated threat group that targets organizations without DMARC implemented and relies on business email compromise is heralding what researchers call "a new age" of business email compromise. The group, called Cosmic Lynx, is the first reported Russian BEC cybercriminal ring, and it's bringing the once run-of-the-mill email scam attack vector to the next level. The group has been associated with more than 200 BEC campaigns targeting senior-level executives in 46 countries since last July. It uses clear, articulate emails -- with vocabulary like "accretive" and "synergistic" -- that purport to be related to an a "merger and acquisition," keeping with a sensitive theme that targeted employees likely won't discuss.</itunes:summary></item>
    
    <item>
      <title>Sponsored Podcast: Security Dangers in Rail Systems</title>
      <itunes:title>Sponsored Podcast: Security Dangers in Rail Systems</itunes:title>
      <pubDate>Tue, 07 Jul 2020 13:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[0493f290-89f0-4774-9bd3-c5fea7c23ca5]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/sponsored-podcast-security-dangers-in-rail-systems]]></link>
      <description><![CDATA[<p>Jesus Molina, with <a href= "https://waterfall-security.com/">Waterfall Security</a>, talks to Threatpost host Cody Hackett about the risks that rail operators are facing - from the security issues in railways to the trains themselves - and how railways can stay up-to-date on the best cybersecurity measures by adopting unidirectional gateways and separating enterprise and operational networks.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Jesus Molina, with <a href= "https://waterfall-security.com/">Waterfall Security</a>, talks to Threatpost host Cody Hackett about the risks that rail operators are facing - from the security issues in railways to the trains themselves - and how railways can stay up-to-date on the best cybersecurity measures by adopting unidirectional gateways and separating enterprise and operational networks.</p>]]></content:encoded>
      
      
      <enclosure length="28830263" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Waterfall_Security.mp3?dest-id=212001"/>
      <itunes:duration>23:37</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/c/9/b/8/c9b8d806b462058a/threatpost_podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Jesus Molina, with Waterfall Security, talks to Threatpost host Cody Hackett about the risks that rail operators are facing - from the security issues in railways to the trains themselves - and how railways can stay up-to-date on the best cybersecurity measures by adopting unidirectional gateways and separating enterprise and operational networks.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Jesus Molina, with Waterfall Security, talks to Threatpost host Cody Hackett about the risks that rail operators are facing - from the security issues in railways to the trains themselves - and how railways can stay up-to-date on the best cybersecurity measures by adopting unidirectional gateways and separating enterprise and operational networks.</itunes:summary></item>
    
    <item>
      <title>EvilQuest: Inside The 'New Class' of Mac Malware</title>
      <itunes:title>EvilQuest: Inside The 'New Class' of Mac Malware</itunes:title>
      <pubDate>Wed, 01 Jul 2020 18:45:26 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[24c73299-44cb-490f-bc68-0934362eea75]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/evilquest-inside-the-new-class-of-mac-malware]]></link>
      <description><![CDATA[<div class="c-article__intro"> <p>Mac expert Thomas Reed talks about how the newly discovered EvilQuest ransomware is ushering in a new class of Mac malware.</p> </div>]]></description>
      
      <content:encoded><![CDATA[<p>Mac expert Thomas Reed talks about how the newly discovered EvilQuest ransomware is ushering in a new class of Mac malware.</p>]]></content:encoded>
      
      
      <enclosure length="27403977" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Thomas_Reed_-_Mac_Malware_Threats.mp3?dest-id=212001"/>
      <itunes:duration>22:26</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/f/a/2/3/fa233e73e62ecb2b/threatpost_podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Mac expert Thomas Reed talks about how the newly discovered EvilQuest ransomware is ushering in a new class of Mac malware.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Mac expert Thomas Reed talks about how the newly discovered EvilQuest ransomware is ushering in a new class of Mac malware.</itunes:summary></item>
    
    <item>
      <title>AWS Facial Recognition Platform Misidentified Over 100 Politicians As Criminals</title>
      <itunes:title>AWS Facial Recognition Platform Misidentified Over 100 Politicians As Criminals</itunes:title>
      <pubDate>Mon, 29 Jun 2020 15:49:49 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[9157509e-3790-4d23-b876-9ad4e1219cef]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/facial-recognition-ban-shows-surveillance-bias-concerns]]></link>
      <description><![CDATA[<p>After <a href= "https://threatpost.com/facial-recognition-are-we-ready/144066/" target="_blank" rel="noopener noreferrer">months of public concerns</a> surrounding facial recognition's implications for data privacy, surveillance and racial bias, tech companies and governments alike are putting stoppers down on the technology until adequate regulation is proposed.</p> <p>Threatpost talks to Paul Bischoff, consumer privacy expert with Comparitech, about recent research showcasing flaws in the accuracy of Amazon's facial recognition platform - and why concerns around racial bias and data privacy aren't going away anytime soon.</p> <p> </p>]]></description>
      
      <content:encoded><![CDATA[<p>After <a href= "https://threatpost.com/facial-recognition-are-we-ready/144066/" target="_blank" rel="noopener noreferrer">months of public concerns</a> surrounding facial recognition's implications for data privacy, surveillance and racial bias, tech companies and governments alike are putting stoppers down on the technology until adequate regulation is proposed.</p> <p>Threatpost talks to Paul Bischoff, consumer privacy expert with Comparitech, about recent research showcasing flaws in the accuracy of Amazon's facial recognition platform - and why concerns around racial bias and data privacy aren't going away anytime soon.</p> <p> </p>]]></content:encoded>
      
      
      <enclosure length="22189492" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/threatpost_podcast.mp3?dest-id=212001"/>
      <itunes:duration>18:30</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/6/f/f/b/6ffbd85dbe02912f/threatpost_podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>After months of public concerns surrounding facial recognition's implications for data privacy, surveillance and racial bias, tech companies and governments alike are putting stoppers down on the technology until adequate regulation is proposed. Threatpost talks to Paul Bischoff, consumer privacy expert with Comparitech, about recent research showcasing flaws in the accuracy of Amazon's facial recognition platform - and why concerns around racial bias and data privacy aren't going away anytime soon.  </itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>After months of public concerns surrounding facial recognition's implications for data privacy, surveillance and racial bias, tech companies and governments alike are putting stoppers down on the technology until adequate regulation is proposed. Threatpost talks to Paul Bischoff, consumer privacy expert with Comparitech, about recent research showcasing flaws in the accuracy of Amazon's facial recognition platform - and why concerns around racial bias and data privacy aren't going away anytime soon.  </itunes:summary></item>
    
    <item>
      <title>News Wrap: Malicious Chrome Extensions Removed, CIA 'Woefully Lax' Security Policies Bashed</title>
      <itunes:title>News Wrap: Malicious Chrome Extensions Removed, CIA 'Woefully Lax' Security Policies Bashed</itunes:title>
      <pubDate>Fri, 19 Jun 2020 16:26:04 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[6be4253e-a589-4904-bc73-9c39fe0b00ea]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/news-wrap-malicious-chrome-extensions-removed-cia-woefully-lax-security-policies-bashed]]></link>
      <description><![CDATA[<p>For the week ended June 19, Threatpost editors Lindsey O'Donnell Welch, Tom Spring and Tara Seals break down the top cybersecurity stories. This week's top news stories include:</p> <ul> <li>Google removing <a href= "https://threatpost.com/google-yanks-106-malicious-chrome-extensions/156731/"> 106 Chrome browser extensions</a> from its Chrome Web Store in response to a report that they were being used to siphon sensitive user data.</li> <li>An internal investigation into the <a href= "https://threatpost.com/theft-of-cias-vault-7-secrets-tied-to-woefully-lax-security/156591/"> 2016 CIA breach</a> condemning the agency's security measures, saying it "focused more on building up cyber tools than keeping them secure."</li> <li>How the insider threat landscape is changing due to work from home - a topic that Threatpost will continue to discuss in its webinar coming up next week (<a href= "https://register.gotowebinar.com/register/3265005683762389007?source=ART">register here)</a>.</li> </ul> <p> </p>]]></description>
      
      <content:encoded><![CDATA[<p>For the week ended June 19, Threatpost editors Lindsey O'Donnell Welch, Tom Spring and Tara Seals break down the top cybersecurity stories. This week's top news stories include:</p> <ul> <li>Google removing <a href= "https://threatpost.com/google-yanks-106-malicious-chrome-extensions/156731/"> 106 Chrome browser extensions</a> from its Chrome Web Store in response to a report that they were being used to siphon sensitive user data.</li> <li>An internal investigation into the <a href= "https://threatpost.com/theft-of-cias-vault-7-secrets-tied-to-woefully-lax-security/156591/"> 2016 CIA breach</a> condemning the agency's security measures, saying it "focused more on building up cyber tools than keeping them secure."</li> <li>How the insider threat landscape is changing due to work from home - a topic that Threatpost will continue to discuss in its webinar coming up next week (<a href= "https://register.gotowebinar.com/register/3265005683762389007?source=ART">register here)</a>.</li> </ul> <p> </p>]]></content:encoded>
      
      
      <enclosure length="24022242" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/News_Wrap_June_19.mp3?dest-id=212001"/>
      <itunes:duration>20:02</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/3/1/3/1/31317dcd65432495/threatpost_podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>For the week ended June 19, Threatpost editors Lindsey O'Donnell Welch, Tom Spring and Tara Seals break down the top cybersecurity stories. This week's top news stories include: Google removing 106 Chrome browser extensions from its Chrome Web Store in response to a report that they were being used to siphon sensitive user data. An internal investigation into the 2016 CIA breach condemning the agency's security measures, saying it "focused more on building up cyber tools than keeping them secure." How the insider threat landscape is changing due to work from home - a topic that Threatpost will continue to discuss in its webinar coming up next week (register here).  </itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>For the week ended June 19, Threatpost editors Lindsey O'Donnell Welch, Tom Spring and Tara Seals break down the top cybersecurity stories. This week's top news stories include: Google removing 106 Chrome browser extensions from its Chrome Web Store in response to a report that they were being used to siphon sensitive user data. An internal investigation into the 2016 CIA breach condemning the agency's security measures, saying it "focused more on building up cyber tools than keeping them secure." How the insider threat landscape is changing due to work from home - a topic that Threatpost will continue to discuss in its webinar coming up next week (register here).  </itunes:summary></item>
    
    <item>
      <title>Would You Use A Contact-Tracing Coronavirus App?</title>
      <itunes:title>Would You Use A Contact-Tracing Coronavirus App?</itunes:title>
      <pubDate>Thu, 11 Jun 2020 14:32:31 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[14310262-392d-475e-bae5-86df0ab78ab4]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/would-you-use-a-contact-tracing-coronavirus-app]]></link>
      <description><![CDATA[<p>As a world afflicted by the coronavirus pandemic begins to re-open restaurants, retail stores and more, public health officials remain concerned about the spread of the virus. Technology for contact-tracing apps, intended to help citizens track whether they were exposed to someone who has tested positive for the virus, have been created by countries, U.S. states (<a href="https://threatpost.com/utah-apple-google-covid-19-tracing-startup-app/155742/">like Utah</a>) and by tech giants like <a href= "https://threatpost.com/apple-google-coronavirus-tracking-privacy-fears/154689/"> Apple and Google</a>.</p> <p>But behind the public health benefits of contact tracing are <a href= "https://threatpost.com/singapore-contact-tracing-wearable-privacy/156397/"> privacy worries</a>, <a href= "https://threatpost.com/google-apple-contact-tracing-system-cyberattacks/155287/"> technology issues</a> like interoperability, and other challenges.  Threatpost discusses the benefits - and the challenges - of contact tracing apps with Steve Moore, chief security strategist at Exabeam.</p>]]></description>
      
      <content:encoded><![CDATA[<p>As a world afflicted by the coronavirus pandemic begins to re-open restaurants, retail stores and more, public health officials remain concerned about the spread of the virus. Technology for contact-tracing apps, intended to help citizens track whether they were exposed to someone who has tested positive for the virus, have been created by countries, U.S. states (<a href="https://threatpost.com/utah-apple-google-covid-19-tracing-startup-app/155742/">like Utah</a>) and by tech giants like <a href= "https://threatpost.com/apple-google-coronavirus-tracking-privacy-fears/154689/"> Apple and Google</a>.</p> <p>But behind the public health benefits of contact tracing are <a href= "https://threatpost.com/singapore-contact-tracing-wearable-privacy/156397/"> privacy worries</a>, <a href= "https://threatpost.com/google-apple-contact-tracing-system-cyberattacks/155287/"> technology issues</a> like interoperability, and other challenges. Threatpost discusses the benefits - and the challenges - of contact tracing apps with Steve Moore, chief security strategist at Exabeam.</p>]]></content:encoded>
      
      
      <enclosure length="24538952" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Contact_Tracing_Podcast_1.mp3?dest-id=212001"/>
      <itunes:duration>20:27</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/2/0/9/c/209c6718ce874e14/threatpost_podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>As a world afflicted by the coronavirus pandemic begins to re-open restaurants, retail stores and more, public health officials remain concerned about the spread of the virus. Technology for contact-tracing apps, intended to help citizens track whether they were exposed to someone who has tested positive for the virus, have been created by countries, U.S. states (like Utah) and by tech giants like Apple and Google. But behind the public health benefits of contact tracing are privacy worries, technology issues like interoperability, and other challenges.  Threatpost discusses the benefits - and the challenges - of contact tracing apps with Steve Moore, chief security strategist at Exabeam.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>As a world afflicted by the coronavirus pandemic begins to re-open restaurants, retail stores and more, public health officials remain concerned about the spread of the virus. Technology for contact-tracing apps, intended to help citizens track whether they were exposed to someone who has tested positive for the virus, have been created by countries, U.S. states (like Utah) and by tech giants like Apple and Google. But behind the public health benefits of contact tracing are privacy worries, technology issues like interoperability, and other challenges.  Threatpost discusses the benefits - and the challenges - of contact tracing apps with Steve Moore, chief security strategist at Exabeam.</itunes:summary></item>
    
    <item>
      <title>News Wrap: Fake Minneapolis Police Breach, Zoom End-To-End Encryption Debate</title>
      <itunes:title>News Wrap: Fake Minneapolis Police Breach, Zoom End-To-End Encryption Debate</itunes:title>
      <pubDate>Fri, 05 Jun 2020 17:26:54 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[591ebc09-c801-4089-8475-18a89b06644c]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/news-wrap-fake-minneapolis-police-breach-zoom-end-to-end-encryption-debate]]></link>
      <description><![CDATA[<p>Threatpost editors Lindsey O'Donnell-Welch and Tara Seals discuss the top security news stories of the week, including:</p> <ul> <li>Reports emerged earlier this week that the Minneapolis police department had been breached by hacktivist group Anonymous. Security expert Troy Hunt debunked the reports, however.</li> <li>Zoom sparked debate after announcing that it would offer end-to-end encryption to paying users only - explaining that it couldn't offer it to everyone as it needs to work with law enforcement to crack down on platform abuse.</li> </ul> <p> </p>]]></description>
      
      <content:encoded><![CDATA[<p>Threatpost editors Lindsey O'Donnell-Welch and Tara Seals discuss the top security news stories of the week, including:</p> <ul> <li>Reports emerged earlier this week that the Minneapolis police department had been breached by hacktivist group Anonymous. Security expert Troy Hunt debunked the reports, however.</li> <li>Zoom sparked debate after announcing that it would offer end-to-end encryption to paying users only - explaining that it couldn't offer it to everyone as it needs to work with law enforcement to crack down on platform abuse.</li> </ul> <p> </p>]]></content:encoded>
      
      
      <enclosure length="19219368" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/news_wrap_june_5.mp3?dest-id=212001"/>
      <itunes:duration>16:01</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/0/e/5/0/0e509d432ce86dcd/threatpost_podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Threatpost editors Lindsey O'Donnell-Welch and Tara Seals discuss the top security news stories of the week, including: Reports emerged earlier this week that the Minneapolis police department had been breached by hacktivist group Anonymous. Security expert Troy Hunt debunked the reports, however. Zoom sparked debate after announcing that it would offer end-to-end encryption to paying users only - explaining that it couldn't offer it to everyone as it needs to work with law enforcement to crack down on platform abuse.  </itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Threatpost editors Lindsey O'Donnell-Welch and Tara Seals discuss the top security news stories of the week, including: Reports emerged earlier this week that the Minneapolis police department had been breached by hacktivist group Anonymous. Security expert Troy Hunt debunked the reports, however. Zoom sparked debate after announcing that it would offer end-to-end encryption to paying users only - explaining that it couldn't offer it to everyone as it needs to work with law enforcement to crack down on platform abuse.  </itunes:summary></item>
    
    <item>
      <title>Sponsored Podcast: Why Identity Access Management is the New Perimeter</title>
      <itunes:title>Sponsored Podcast: Why Identity Access Management is the New Perimeter</itunes:title>
      <pubDate>Tue, 02 Jun 2020 13:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[16fc3579-69b1-43b0-89de-1b4f35c38d5d]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/sponsored-podcast-why-identity-access-management-is-the-new-perimeter]]></link>
      <description><![CDATA[<p>With the proliferation of cloud in enterprise environments, identity today is very different than how it used to be. Threatpost host Cody Hackett talks to Brian Johnson, CEO and co-founder of DivvyCloud, about how identity access management (IAM) is rapidly changing - and how businesses can keep up.</p>]]></description>
      
      <content:encoded><![CDATA[<p>With the proliferation of cloud in enterprise environments, identity today is very different than how it used to be. Threatpost host Cody Hackett talks to Brian Johnson, CEO and co-founder of DivvyCloud, about how identity access management (IAM) is rapidly changing - and how businesses can keep up.</p>]]></content:encoded>
      
      
      <enclosure length="22171202" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/divvycloud_IAM.mp3?dest-id=212001"/>
      <itunes:duration>18:29</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/9/b/a/8/9ba8f0fd84d16627/threatpost_podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>With the proliferation of cloud in enterprise environments, identity today is very different than how it used to be. Threatpost host Cody Hackett talks to Brian Johnson, CEO and co-founder of DivvyCloud, about how identity access management (IAM) is rapidly changing - and how businesses can keep up.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>With the proliferation of cloud in enterprise environments, identity today is very different than how it used to be. Threatpost host Cody Hackett talks to Brian Johnson, CEO and co-founder of DivvyCloud, about how identity access management (IAM) is rapidly changing - and how businesses can keep up.</itunes:summary></item>
    
    <item>
      <title>Verizon Data Breach Report: Web Application Attacks Skyrocket, Espionage Dips</title>
      <itunes:title>Verizon Data Breach Report: Web Application Attacks Skyrocket, Espionage Dips</itunes:title>
      <pubDate>Wed, 20 May 2020 12:55:28 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[201885cf-612b-4bb0-ba91-bc4543eb1fe8]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/verizon-data-breach-report-web-application-attacks-skyrocket-espionage-dips]]></link>
      <description><![CDATA[<p>Verizon's 2020 <a href= "https://threatpost.com/verizon-data-breach-report-dos-skyrockets-espionage-dips/155843/"> Data Breach Investigations Report</a> (DBIR), released Tuesday, analyzed 32,002 security incidents and 3,950 data breaches across 16 industry verticals. While cyber-espionage attacks and malware decreased, other trends, such as security "errors" (like misconfigurations, etc.), denial of service (DoS) attack and web application attacks saw startling growth.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Verizon's 2020 <a href= "https://threatpost.com/verizon-data-breach-report-dos-skyrockets-espionage-dips/155843/"> Data Breach Investigations Report</a> (DBIR), released Tuesday, analyzed 32,002 security incidents and 3,950 data breaches across 16 industry verticals. While cyber-espionage attacks and malware decreased, other trends, such as security "errors" (like misconfigurations, etc.), denial of service (DoS) attack and web application attacks saw startling growth.</p>]]></content:encoded>
      
      
      <enclosure length="30212735" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/verizon_DBIR.mp3?dest-id=212001"/>
      <itunes:duration>25:11</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/1/9/8/b/198b93f901e9e472/threatpost_podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Verizon's 2020 Data Breach Investigations Report (DBIR), released Tuesday, analyzed 32,002 security incidents and 3,950 data breaches across 16 industry verticals. While cyber-espionage attacks and malware decreased, other trends, such as security "errors" (like misconfigurations, etc.), denial of service (DoS) attack and web application attacks saw startling growth.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Verizon's 2020 Data Breach Investigations Report (DBIR), released Tuesday, analyzed 32,002 security incidents and 3,950 data breaches across 16 industry verticals. While cyber-espionage attacks and malware decreased, other trends, such as security "errors" (like misconfigurations, etc.), denial of service (DoS) attack and web application attacks saw startling growth.</itunes:summary></item>
    
    <item>
      <title>News Wrap: New Ransomware Extortion Tactics, Contact-Tracing App Security Worries</title>
      <itunes:title>News Wrap: New Ransomware Extortion Tactics, Contact-Tracing App Security Worries</itunes:title>
      <pubDate>Fri, 15 May 2020 18:01:38 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[3e2ee7c6-cfdd-40f6-9dc3-9a05810a5cd7]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/news-wrap-new-ransomware-extortion-tactics-contact-tracing-app-security-worries]]></link>
      <description><![CDATA[<p>Threatpost editors discuss the top news stories of the week ended May 15, including:</p> <ul> <li>Recent ransomware attacks, including ones targeting <a href= "https://threatpost.com/healthcare-giant-magellan-ransomware-data-breach/155699/"> healthcare giant Magellan</a>, the <a href= "https://threatpost.com/texas-courts-ransomware-attack/155711/" target="_blank" rel="noopener noreferrer">IT office that supports</a> Texas appellate courts and judicial agencies, and <a href= "https://threatpost.com/revil-ransomware-attack-celeb-law-firm/155676/"> a popular law firm</a> that works with several A-list celebrities, including Lady Gaga, Drake and Madonna.</li> <li><a href= "https://threatpost.com/double-extortion-ransomware-attacks-spike/154818/"> "Double extortion" methods</a> being increasingly used by ransomware actors - and <a href= "https://threatpost.com/paying-ransomware-crooks-doubles-clean-up-costs-report/155767/"> new research</a> that found paying a ransom to unlock systems can actually cost companies more financially than recovering data themselves in the long run.</li> <li>The <a href= "https://threatpost.com/utah-apple-google-covid-19-tracing-startup-app/155742/"> state of Utah announcing</a> it has settled on a contact-tracing mobile app that collects detailed user location information to track the spread of COVID-19 among citizens – eschewing the API model <a href= "https://threatpost.com/apple-google-coronavirus-tracking-privacy-fears/154689/"> proposed by Apple and Google</a> in April.</li> <li>The <a href= "https://threatpost.com/apple-google-coronavirus-tracking-privacy-fears/154689/"> roadmap for a COVID-19 contact-tracing app</a>, to be rolled out by the UK's National Health Service (NHS), thrust into the spotlight thanks to sensitive documents being leaked via a public Google Drive link.</li> </ul> <p> </p>]]></description>
      
      <content:encoded><![CDATA[<p>Threatpost editors discuss the top news stories of the week ended May 15, including:</p> <ul> <li>Recent ransomware attacks, including ones targeting <a href= "https://threatpost.com/healthcare-giant-magellan-ransomware-data-breach/155699/"> healthcare giant Magellan</a>, the <a href= "https://threatpost.com/texas-courts-ransomware-attack/155711/" target="_blank" rel="noopener noreferrer">IT office that supports</a> Texas appellate courts and judicial agencies, and <a href= "https://threatpost.com/revil-ransomware-attack-celeb-law-firm/155676/"> a popular law firm</a> that works with several A-list celebrities, including Lady Gaga, Drake and Madonna.</li> <li><a href= "https://threatpost.com/double-extortion-ransomware-attacks-spike/154818/"> "Double extortion" methods</a> being increasingly used by ransomware actors - and <a href= "https://threatpost.com/paying-ransomware-crooks-doubles-clean-up-costs-report/155767/"> new research</a> that found paying a ransom to unlock systems can actually cost companies more financially than recovering data themselves in the long run.</li> <li>The <a href= "https://threatpost.com/utah-apple-google-covid-19-tracing-startup-app/155742/"> state of Utah announcing</a> it has settled on a contact-tracing mobile app that collects detailed user location information to track the spread of COVID-19 among citizens – eschewing the API model <a href= "https://threatpost.com/apple-google-coronavirus-tracking-privacy-fears/154689/"> proposed by Apple and Google</a> in April.</li> <li>The <a href= "https://threatpost.com/apple-google-coronavirus-tracking-privacy-fears/154689/"> roadmap for a COVID-19 contact-tracing app</a>, to be rolled out by the UK's National Health Service (NHS), thrust into the spotlight thanks to sensitive documents being leaked via a public Google Drive link.</li> </ul> <p> </p>]]></content:encoded>
      
      
      <enclosure length="23475759" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/News_Wrap_May_15.mp3?dest-id=212001"/>
      <itunes:duration>19:34</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/4/5/9/5/459543b67fbf7b11/threatpost_podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Threatpost editors discuss the top news stories of the week ended May 15, including: Recent ransomware attacks, including ones targeting healthcare giant Magellan, the IT office that supports Texas appellate courts and judicial agencies, and a popular law firm that works with several A-list celebrities, including Lady Gaga, Drake and Madonna. "Double extortion" methods being increasingly used by ransomware actors - and new research that found paying a ransom to unlock systems can actually cost companies more financially than recovering data themselves in the long run. The state of Utah announcing it has settled on a contact-tracing mobile app that collects detailed user location information to track the spread of COVID-19 among citizens – eschewing the API model proposed by Apple and Google in April. The roadmap for a COVID-19 contact-tracing app, to be rolled out by the UK's National Health Service (NHS), thrust into the spotlight thanks to sensitive documents being leaked via a public Google Drive link.  </itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Threatpost editors discuss the top news stories of the week ended May 15, including: Recent ransomware attacks, including ones targeting healthcare giant Magellan, the IT office that supports Texas appellate courts and judicial agencies, and a popular law firm that works with several A-list celebrities, including Lady Gaga, Drake and Madonna. "Double extortion" methods being increasingly used by ransomware actors - and new research that found paying a ransom to unlock systems can actually cost companies more financially than recovering data themselves in the long run. The state of Utah announcing it has settled on a contact-tracing mobile app that collects detailed user location information to track the spread of COVID-19 among citizens – eschewing the API model proposed by Apple and Google in April. The roadmap for a COVID-19 contact-tracing app, to be rolled out by the UK's National Health Service (NHS), thrust into the spotlight thanks to sensitive documents being leaked via a public Google Drive link.  </itunes:summary></item>
    
    <item>
      <title>Sponsored Podcast: Shifting Left With Infrastructure-as-Code</title>
      <itunes:title>Sponsored Podcast: Shifting Left With Infrastructure-as-Code</itunes:title>
      <pubDate>Fri, 08 May 2020 13:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[4e108374-30bb-471e-8d63-940a4f084591]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/sponsored-podcast-shifting-left-with-infrastructure-as-code]]></link>
      <description><![CDATA[<p>Companies are increasingly dealing with a slew of security and compliance issues across cloud services and containers – from AWS to Azure to GCP. Infrastructure as Code (IaC) security capabilities can help companies "shift left" to improve developer productivity, avoid misconfigurations and prevent policy violations.</p> <p>Threatpost host Cody Hackett talks to Chris Hertz, vice president of cloud security sales at DivvyCloud by Rapid7, about the top trends he's seeing around cloud security and how IaC is helping companies handle security and compliancy.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Companies are increasingly dealing with a slew of security and compliance issues across cloud services and containers – from AWS to Azure to GCP. Infrastructure as Code (IaC) security capabilities can help companies "shift left" to improve developer productivity, avoid misconfigurations and prevent policy violations.</p> <p>Threatpost host Cody Hackett talks to Chris Hertz, vice president of cloud security sales at DivvyCloud by Rapid7, about the top trends he's seeing around cloud security and how IaC is helping companies handle security and compliancy.</p>]]></content:encoded>
      
      
      <enclosure length="22915190" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/DivvyCloud_Sponsored_Podcast_Final.mp3?dest-id=212001"/>
      <itunes:duration>19:06</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/8/b/1/2/8b1235df44012776/threatpost_podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Companies are increasingly dealing with a slew of security and compliance issues across cloud services and containers – from AWS to Azure to GCP. Infrastructure as Code (IaC) security capabilities can help companies "shift left" to improve developer productivity, avoid misconfigurations and prevent policy violations. Threatpost host Cody Hackett talks to Chris Hertz, vice president of cloud security sales at DivvyCloud by Rapid7, about the top trends he's seeing around cloud security and how IaC is helping companies handle security and compliancy.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Companies are increasingly dealing with a slew of security and compliance issues across cloud services and containers – from AWS to Azure to GCP. Infrastructure as Code (IaC) security capabilities can help companies "shift left" to improve developer productivity, avoid misconfigurations and prevent policy violations. Threatpost host Cody Hackett talks to Chris Hertz, vice president of cloud security sales at DivvyCloud by Rapid7, about the top trends he's seeing around cloud security and how IaC is helping companies handle security and compliancy.</itunes:summary></item>
    
    <item>
      <title>News Wrap: Microsoft Sway Phish, Malicious GIF and Spyware Attacks</title>
      <itunes:title>News Wrap: Microsoft Sway Phish, Malicious GIF and Spyware Attacks</itunes:title>
      <pubDate>Fri, 01 May 2020 16:09:26 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[45359c6c-ae3a-4759-ab2a-f6c2a52a895f]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/news-wrap-microsoft-sway-phish-one-click-gif-and-spyware-attacks]]></link>
      <description><![CDATA[<p>Threatpost editors Tom Spring, Tara Seals and Lindsey O'Donnell-Welch talk about the biggest news stories of the week ended May 1, including:</p> <ul> <li>A "PhantomLance" <a href= "https://threatpost.com/sophisticated-android-spyware-google-play/155202/"> espionage campaign</a> discovered targeting specific Android victims, mainly in Southeast Asia — which could be the work of the OceanLotus APT.</li> <li>A highly targeted <a href= "https://threatpost.com/microsoft-sway-abused-office-365-phishing-attack/155366/"> phishing campaign</a>, uncovered this week, with a Microsoft file platform twist, that successfully siphoned the Office 365 credentials of more than 150 executives since mid-2019.</li> <li>A Microsoft vulnerability <a href= "https://threatpost.com/single-malicious-gif-opened-microsoft-teams-to-nasty-attack/155155/"> found in Microsoft Teams</a> that could have allowed an inside attacker to weaponize a single GIF image and use it to pilfer data from targeted systems and take over all of an organization's Teams accounts.</li> </ul>]]></description>
      
      <content:encoded><![CDATA[<p>Threatpost editors Tom Spring, Tara Seals and Lindsey O'Donnell-Welch talk about the biggest news stories of the week ended May 1, including:</p> <ul> <li>A "PhantomLance" <a href= "https://threatpost.com/sophisticated-android-spyware-google-play/155202/"> espionage campaign</a> discovered targeting specific Android victims, mainly in Southeast Asia — which could be the work of the OceanLotus APT.</li> <li>A highly targeted <a href= "https://threatpost.com/microsoft-sway-abused-office-365-phishing-attack/155366/"> phishing campaign</a>, uncovered this week, with a Microsoft file platform twist, that successfully siphoned the Office 365 credentials of more than 150 executives since mid-2019.</li> <li>A Microsoft vulnerability <a href= "https://threatpost.com/single-malicious-gif-opened-microsoft-teams-to-nasty-attack/155155/"> found in Microsoft Teams</a> that could have allowed an inside attacker to weaponize a single GIF image and use it to pilfer data from targeted systems and take over all of an organization's Teams accounts.</li> </ul>]]></content:encoded>
      
      
      <enclosure length="24934436" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/News_Wrap_May_1.mp3?dest-id=212001"/>
      <itunes:duration>20:47</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/5/4/6/1/54616d55b666e1d2/threatpost_podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Threatpost editors Tom Spring, Tara Seals and Lindsey O'Donnell-Welch talk about the biggest news stories of the week ended May 1, including: A "PhantomLance" espionage campaign discovered targeting specific Android victims, mainly in Southeast Asia — which could be the work of the OceanLotus APT. A highly targeted phishing campaign, uncovered this week, with a Microsoft file platform twist, that successfully siphoned the Office 365 credentials of more than 150 executives since mid-2019. A Microsoft vulnerability found in Microsoft Teams that could have allowed an inside attacker to weaponize a single GIF image and use it to pilfer data from targeted systems and take over all of an organization's Teams accounts.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Threatpost editors Tom Spring, Tara Seals and Lindsey O'Donnell-Welch talk about the biggest news stories of the week ended May 1, including: A "PhantomLance" espionage campaign discovered targeting specific Android victims, mainly in Southeast Asia — which could be the work of the OceanLotus APT. A highly targeted phishing campaign, uncovered this week, with a Microsoft file platform twist, that successfully siphoned the Office 365 credentials of more than 150 executives since mid-2019. A Microsoft vulnerability found in Microsoft Teams that could have allowed an inside attacker to weaponize a single GIF image and use it to pilfer data from targeted systems and take over all of an organization's Teams accounts.</itunes:summary></item>
    
    <item>
      <title>Troves of Zoom Credentials Shared on Hacker Forums</title>
      <itunes:title>Troves of Zoom Credentials Shared on Hacker Forums</itunes:title>
      <pubDate>Tue, 28 Apr 2020 10:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[67bdb13d-6ce6-47ea-8e7a-3a9a5386b4ae]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/troves-of-zoom-credentials-shared-on-hacker-forums]]></link>
      <description><![CDATA[<p>Thousands of recycled Zoom credentials have been unearthed on underground forums as cybercriminals tap into remote workers. In this week's podcast, Threatpost does a deep dive into how these credentials are being collected, shared and used. </p>]]></description>
      
      <content:encoded><![CDATA[<p>Thousands of recycled Zoom credentials have been unearthed on underground forums as cybercriminals tap into remote workers. In this week's podcast, Threatpost does a deep dive into how these credentials are being collected, shared and used. </p>]]></content:encoded>
      
      
      <enclosure length="23009733" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Etay_Maor_Zoom.mp3?dest-id=212001"/>
      <itunes:duration>19:11</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/3/3/f/f/33ff49fb6d1aabff/threatpost_podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Thousands of recycled Zoom credentials have been unearthed on underground forums as cybercriminals tap into remote workers. In this week's podcast, Threatpost does a deep dive into how these credentials are being collected, shared and used. </itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Thousands of recycled Zoom credentials have been unearthed on underground forums as cybercriminals tap into remote workers. In this week's podcast, Threatpost does a deep dive into how these credentials are being collected, shared and used. </itunes:summary></item>
    
    <item>
      <title>News Wrap: Nintendo Account Hacks, Apple Zero Days, NFL Security</title>
      <itunes:title>News Wrap: Nintendo Account Hacks, Apple Zero Days, NFL Security</itunes:title>
      <pubDate>Fri, 24 Apr 2020 16:11:18 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[0e6b0b3c-6e52-4295-9b65-fb2040245446]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/news-wrap-nintendo-account-hacks-apple-zero-days-nfl-security]]></link>
      <description><![CDATA[<p>For the week ended April 24, Threatpost editors discuss a bevy of recent cybersecurity news stories, including:</p> <ul> <li>Apple <a href= "https://threatpost.com/apple-patches-two-ios-zero-days-abused-for-years/155042/"> zero days were disclosed</a> in the iPhone iOS; researchers say they have been exploited for years, but <a href= "https://threatpost.com/apple-pushes-back-against-zero-day-exploit-claims/155108/"> Apple has pushed back</a> and said there's no evidence to support such activity</li> <li>Nintendo <a href= "https://threatpost.com/nintendo-confirms-breach-of-160000-accounts/155110/"> confirming that</a> over 160,000 accounts have been hacked, due to attackers abusing a legacy login system</li> <li>With the <a href= "https://threatpost.com/nfl-tackles-cybersecurity-2020-draft-day/155004/"> NFL's virtual draft</a> kicking off this week, security researchers and teams have been sounding off on security issues leading to data theft or denial of service attacks</li> </ul>]]></description>
      
      <content:encoded><![CDATA[<p>For the week ended April 24, Threatpost editors discuss a bevy of recent cybersecurity news stories, including:</p> <ul> <li>Apple <a href= "https://threatpost.com/apple-patches-two-ios-zero-days-abused-for-years/155042/"> zero days were disclosed</a> in the iPhone iOS; researchers say they have been exploited for years, but <a href= "https://threatpost.com/apple-pushes-back-against-zero-day-exploit-claims/155108/"> Apple has pushed back</a> and said there's no evidence to support such activity</li> <li>Nintendo <a href= "https://threatpost.com/nintendo-confirms-breach-of-160000-accounts/155110/"> confirming that</a> over 160,000 accounts have been hacked, due to attackers abusing a legacy login system</li> <li>With the <a href= "https://threatpost.com/nfl-tackles-cybersecurity-2020-draft-day/155004/"> NFL's virtual draft</a> kicking off this week, security researchers and teams have been sounding off on security issues leading to data theft or denial of service attacks</li> </ul>]]></content:encoded>
      
      
      <enclosure length="26893647" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/news_wrap_apr_24_3.mp3?dest-id=212001"/>
      <itunes:duration>22:25</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/3/3/a/0/33a0220cc2c07227/threatpost_podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>For the week ended April 24, Threatpost editors discuss a bevy of recent cybersecurity news stories, including: Apple zero days were disclosed in the iPhone iOS; researchers say they have been exploited for years, but Apple has pushed back and said there's no evidence to support such activity Nintendo confirming that over 160,000 accounts have been hacked, due to attackers abusing a legacy login system With the NFL's virtual draft kicking off this week, security researchers and teams have been sounding off on security issues leading to data theft or denial of service attacks</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>For the week ended April 24, Threatpost editors discuss a bevy of recent cybersecurity news stories, including: Apple zero days were disclosed in the iPhone iOS; researchers say they have been exploited for years, but Apple has pushed back and said there's no evidence to support such activity Nintendo confirming that over 160,000 accounts have been hacked, due to attackers abusing a legacy login system With the NFL's virtual draft kicking off this week, security researchers and teams have been sounding off on security issues leading to data theft or denial of service attacks</itunes:summary></item>
    
    <item>
      <title>Work From Home Networks Plagued By Malware, Exposed Services</title>
      <itunes:title>Work From Home Networks Plagued By Malware, Exposed Services</itunes:title>
      <pubDate>Tue, 14 Apr 2020 11:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[c567c80a-b612-4ace-b7cd-18646d7c87da]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/work-from-home-networks-plagued-by-malware-exposed-services]]></link>
      <description><![CDATA[<p>In this week's Threatpost Podcast, Threatpost talks to Dan Dahlberg, director of security research at BitSight, about new research that found that work from home remote office networks are 3.5 times<span lang="EN" xml:lang="EN"> more likely than corporate networks to have a malware infection present.</span></p>]]></description>
      
      <content:encoded><![CDATA[<p>In this week's Threatpost Podcast, Threatpost talks to Dan Dahlberg, director of security research at BitSight, about new research that found that work from home remote office networks are 3.5 times more likely than corporate networks to have a malware infection present.</p>]]></content:encoded>
      
      
      <enclosure length="32784156" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Remote_Work_Risks.mp3?dest-id=212001"/>
      <itunes:duration>27:17</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/5/f/5/c/5f5c581e3c8cd6eb/podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>In this week's Threatpost Podcast, Threatpost talks to Dan Dahlberg, director of security research at BitSight, about new research that found that work from home remote office networks are 3.5 times more likely than corporate networks to have a malware infection present.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>In this week's Threatpost Podcast, Threatpost talks to Dan Dahlberg, director of security research at BitSight, about new research that found that work from home remote office networks are 3.5 times more likely than corporate networks to have a malware infection present.</itunes:summary></item>
    
    <item>
      <title>Bypassing Fingerprint Scanners With 3D Printing</title>
      <itunes:title>Bypassing Fingerprint Scanners With 3D Printing</itunes:title>
      <pubDate>Wed, 08 Apr 2020 13:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[5421062f-73e9-4659-a709-662d411f3024]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/bypassing-fingerprint-scanners-with-3d-printing]]></link>
      <description><![CDATA[<p>Researchers with Cisco Talos created threat models outlining how fingerprint scanners could be bypassed utilizing 3D printing technology, and tested them on various mobile devices (including the iPhone 8 and Samsung S10), laptops (including the Samsung Note 9, Lenovo Yoga and HP Pavilion X360) and smart devices (a smart padlock and two USB encrypted pen drives).  Craig Williams, director of Cisco Talos Outreach, walks through the results on the Threatpost podcast.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Researchers with Cisco Talos created threat models outlining how fingerprint scanners could be bypassed utilizing 3D printing technology, and tested them on various mobile devices (including the iPhone 8 and Samsung S10), laptops (including the Samsung Note 9, Lenovo Yoga and HP Pavilion X360) and smart devices (a smart padlock and two USB encrypted pen drives). Craig Williams, director of Cisco Talos Outreach, walks through the results on the Threatpost podcast.</p>]]></content:encoded>
      
      
      <enclosure length="10489856" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Cisco_Talos_Research_Podcast.mp3?dest-id=212001"/>
      <itunes:duration>08:45</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/0/5/0/7/0507c001fe4ddaeb/podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Researchers with Cisco Talos created threat models outlining how fingerprint scanners could be bypassed utilizing 3D printing technology, and tested them on various mobile devices (including the iPhone 8 and Samsung S10), laptops (including the Samsung Note 9, Lenovo Yoga and HP Pavilion X360) and smart devices (a smart padlock and two USB encrypted pen drives).  Craig Williams, director of Cisco Talos Outreach, walks through the results on the Threatpost podcast.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Researchers with Cisco Talos created threat models outlining how fingerprint scanners could be bypassed utilizing 3D printing technology, and tested them on various mobile devices (including the iPhone 8 and Samsung S10), laptops (including the Samsung Note 9, Lenovo Yoga and HP Pavilion X360) and smart devices (a smart padlock and two USB encrypted pen drives).  Craig Williams, director of Cisco Talos Outreach, walks through the results on the Threatpost podcast.</itunes:summary></item>
    
    <item>
      <title>News Wrap: Coronavirus Scams, Work From Home Security Woes, Pwn2Own</title>
      <itunes:title>News Wrap: Coronavirus Scams, Work From Home Security Woes, Pwn2Own</itunes:title>
      <pubDate>Fri, 20 Mar 2020 16:48:35 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[503bd937-df9a-412d-b5de-95f4995f094c]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/news-wrap-coronavirus-scams-work-from-home-security-woes-pwn2own]]></link>
      <description><![CDATA[<p>For the week ended March 20, Threatpost editors break down the top security stories, including:</p> <ul> <li>The various cybercriminal activity - from malware, phishing and other scams - tapping into the coronavirus pandemic</li> <li>The security risks of businesses working from home due to the virus' spread</li> <li>Privacy concerns as more governments use facial recognition and mobile apps for tracking the virus  </li> <li>The results of Pwn2Own, which took place this week</li> </ul> <p> </p>]]></description>
      
      <content:encoded><![CDATA[<p>For the week ended March 20, Threatpost editors break down the top security stories, including:</p> <ul> <li>The various cybercriminal activity - from malware, phishing and other scams - tapping into the coronavirus pandemic</li> <li>The security risks of businesses working from home due to the virus' spread</li> <li>Privacy concerns as more governments use facial recognition and mobile apps for tracking the virus </li> <li>The results of Pwn2Own, which took place this week</li> </ul> <p> </p>]]></content:encoded>
      
      
      <enclosure length="14684160" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/news_wrap_march.mp3?dest-id=212001"/>
      <itunes:duration>12:15</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/8/2/8/6/82865f5bda10b4e7/news_wrap.jpeg"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>For the week ended March 20, Threatpost editors break down the top security stories, including: The various cybercriminal activity - from malware, phishing and other scams - tapping into the coronavirus pandemic The security risks of businesses working from home due to the virus' spread Privacy concerns as more governments use facial recognition and mobile apps for tracking the virus   The results of Pwn2Own, which took place this week  </itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>For the week ended March 20, Threatpost editors break down the top security stories, including: The various cybercriminal activity - from malware, phishing and other scams - tapping into the coronavirus pandemic The security risks of businesses working from home due to the virus' spread Privacy concerns as more governments use facial recognition and mobile apps for tracking the virus   The results of Pwn2Own, which took place this week  </itunes:summary></item>
    
    <item>
      <title>IoT Device Security: The Good, The Bad and The Ugly</title>
      <itunes:title>IoT Device Security: The Good, The Bad and The Ugly</itunes:title>
      <pubDate>Wed, 11 Mar 2020 12:37:33 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[76f4a10c-9922-4b89-9783-0eb6fe77b9b7]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/iot-devices-security-the-good-the-bad-and-the-ugly]]></link>
      <description><![CDATA[<p>A recent 2020 IoT report found that more than half of IoT devices are vulnerable to medium- or high-severity attacks, making IoT the low-hanging fruit for attackers.</p> <p>Threatpost talks to Ryan Olson, vice president of Threat Intelligence for Unit 42 at Palo Alto Networks, and May Wang, senior distinguished engineer at Palo Alto Networks and former Zingbox CTO, about the top IoT threats.</p> <p> </p>]]></description>
      
      <content:encoded><![CDATA[<p>A recent 2020 IoT report found that more than half of IoT devices are vulnerable to medium- or high-severity attacks, making IoT the low-hanging fruit for attackers.</p> <p>Threatpost talks to Ryan Olson, vice president of Threat Intelligence for Unit 42 at Palo Alto Networks, and May Wang, senior distinguished engineer at Palo Alto Networks and former Zingbox CTO, about the top IoT threats.</p> <p> </p>]]></content:encoded>
      
      
      <enclosure length="30244084" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/unit_42_update.mp3?dest-id=212001"/>
      <itunes:duration>25:13</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/5/8/c/a/58ca3d646fdb9821/AdobeStock_142238999.jpeg"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>A recent 2020 IoT report found that more than half of IoT devices are vulnerable to medium- or high-severity attacks, making IoT the low-hanging fruit for attackers. Threatpost talks to Ryan Olson, vice president of Threat Intelligence for Unit 42 at Palo Alto Networks, and May Wang, senior distinguished engineer at Palo Alto Networks and former Zingbox CTO, about the top IoT threats.  </itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>A recent 2020 IoT report found that more than half of IoT devices are vulnerable to medium- or high-severity attacks, making IoT the low-hanging fruit for attackers. Threatpost talks to Ryan Olson, vice president of Threat Intelligence for Unit 42 at Palo Alto Networks, and May Wang, senior distinguished engineer at Palo Alto Networks and former Zingbox CTO, about the top IoT threats.  </itunes:summary></item>
    
    <item>
      <title>RSA Conference 2020 Preview</title>
      <itunes:title>RSA Conference 2020 Preview</itunes:title>
      <pubDate>Fri, 21 Feb 2020 16:48:52 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[e2649cd1-4217-43a4-93ac-8ea60930709a]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/rsa-conference-2020-preview]]></link>
      <description><![CDATA[<p>The RSA 2020 conference kicks off next week in San Francisco, this year with a theme looking at the "human element" of cybersecurity. As they prepare to cover the show, Threatpost editors Lindsey O'Donnell-Welch, Tom Spring and Tara Seals break down the biggest news, stories and trends  that they expect to hear about at RSA 2020 this year - from trends in the industrial cybersecurity landscape, to connected medical device security issues that will be flagged.</p>]]></description>
      
      <content:encoded><![CDATA[<p>The RSA 2020 conference kicks off next week in San Francisco, this year with a theme looking at the "human element" of cybersecurity. As they prepare to cover the show, Threatpost editors Lindsey O'Donnell-Welch, Tom Spring and Tara Seals break down the biggest news, stories and trends that they expect to hear about at RSA 2020 this year - from trends in the industrial cybersecurity landscape, to connected medical device security issues that will be flagged.</p>]]></content:encoded>
      
      
      <enclosure length="23072768" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/RSA_PREVIEW_PODCAST_FINAL_2.mp3?dest-id=212001"/>
      <itunes:duration>19:14</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/d/8/e/b/d8ebb7c6cd8d4204/podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>The RSA 2020 conference kicks off next week in San Francisco, this year with a theme looking at the "human element" of cybersecurity. As they prepare to cover the show, Threatpost editors Lindsey O'Donnell-Welch, Tom Spring and Tara Seals break down the biggest news, stories and trends  that they expect to hear about at RSA 2020 this year - from trends in the industrial cybersecurity landscape, to connected medical device security issues that will be flagged.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>The RSA 2020 conference kicks off next week in San Francisco, this year with a theme looking at the "human element" of cybersecurity. As they prepare to cover the show, Threatpost editors Lindsey O'Donnell-Welch, Tom Spring and Tara Seals break down the biggest news, stories and trends  that they expect to hear about at RSA 2020 this year - from trends in the industrial cybersecurity landscape, to connected medical device security issues that will be flagged.</itunes:summary></item>
    
    <item>
      <title>News Wrap: Valentine's Day Scams and Emotet's Wi-Fi Hack</title>
      <itunes:title>News Wrap: Valentine's Day Scams and Emotet's Wi-Fi Hack</itunes:title>
      <pubDate>Fri, 14 Feb 2020 16:50:55 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[1354b50a-9294-4940-a07b-f11a7c5031f4]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/news-wrap-valentines-day-scams-and-emotets-wi-fi-hack]]></link>
      <description><![CDATA[<p>Threatpost editors Tara Seals and Lindsey O'Donnell-Welch break down the top stories for this week, ended Feb. 14, including:</p> <ul> <li>Recent phishing scams - including ones with a romance hook - continue to trick victims, showing that phishing tactics still work in stealing millions from individuals, corporations, and even government agencies.</li> <li>Emotet has a newly discovered feature that hacks nearby Wi-Fi networks, allowing the prolific malware to spread rapidly, like a worm.</li> <li>The operators behind the Robbinhood ransomware are using a new tactic called "bring your own bug," which researchers think will continue in future campaigns.</li> <li>Patch Tuesday craziness this week included 99 patches from Microsoft, as well as vulnerability fixes from Adobe, Intel and Mozilla Firefox.</li> </ul>]]></description>
      
      <content:encoded><![CDATA[<p>Threatpost editors Tara Seals and Lindsey O'Donnell-Welch break down the top stories for this week, ended Feb. 14, including:</p> <ul> <li>Recent phishing scams - including ones with a romance hook - continue to trick victims, showing that phishing tactics still work in stealing millions from individuals, corporations, and even government agencies.</li> <li>Emotet has a newly discovered feature that hacks nearby Wi-Fi networks, allowing the prolific malware to spread rapidly, like a worm.</li> <li>The operators behind the Robbinhood ransomware are using a new tactic called "bring your own bug," which researchers think will continue in future campaigns.</li> <li>Patch Tuesday craziness this week included 99 patches from Microsoft, as well as vulnerability fixes from Adobe, Intel and Mozilla Firefox.</li> </ul>]]></content:encoded>
      
      
      <enclosure length="32127521" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/News_Wrap_VDay.mp3?dest-id=212001"/>
      <itunes:duration>22:19</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/d/a/9/6/da961471c758305e/news_wrap.jpeg"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Threatpost editors Tara Seals and Lindsey O'Donnell-Welch break down the top stories for this week, ended Feb. 14, including: Recent phishing scams - including ones with a romance hook - continue to trick victims, showing that phishing tactics still work in stealing millions from individuals, corporations, and even government agencies. Emotet has a newly discovered feature that hacks nearby Wi-Fi networks, allowing the prolific malware to spread rapidly, like a worm. The operators behind the Robbinhood ransomware are using a new tactic called "bring your own bug," which researchers think will continue in future campaigns. Patch Tuesday craziness this week included 99 patches from Microsoft, as well as vulnerability fixes from Adobe, Intel and Mozilla Firefox.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Threatpost editors Tara Seals and Lindsey O'Donnell-Welch break down the top stories for this week, ended Feb. 14, including: Recent phishing scams - including ones with a romance hook - continue to trick victims, showing that phishing tactics still work in stealing millions from individuals, corporations, and even government agencies. Emotet has a newly discovered feature that hacks nearby Wi-Fi networks, allowing the prolific malware to spread rapidly, like a worm. The operators behind the Robbinhood ransomware are using a new tactic called "bring your own bug," which researchers think will continue in future campaigns. Patch Tuesday craziness this week included 99 patches from Microsoft, as well as vulnerability fixes from Adobe, Intel and Mozilla Firefox.</itunes:summary></item>
    
    <item>
      <title>Katie Moussouris: The Bug Bounty Conflict of Interest</title>
      <itunes:title>Katie Moussouris: The Bug Bounty Conflict of Interest</itunes:title>
      <pubDate>Wed, 12 Feb 2020 14:07:56 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[333a665a-bfb6-4cc2-b379-1e975a62e8da]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/katie-moussouris-the-bug-bounty-conflict-of-interest]]></link>
      <description><![CDATA[<p>Bug bounty programs continue to increase in popularity – but that popularity has its downsides. Since the launch of the Hack the Pentagon program in 2016, bug bounty programs have quickly grown in popularity.</p> <p>However, as more programs are created, some companies are forgetting the real reason behind bug bounties. That is, instead of making their systems more secure, companies want to merely hunt bugs. Threatpost talked to Katie Moussouris, founder and CEO of Luta Security, to hear more about her thoughts about the challenges in developing – and launching – bug bounty programs.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Bug bounty programs continue to increase in popularity – but that popularity has its downsides. Since the launch of the Hack the Pentagon program in 2016, bug bounty programs have quickly grown in popularity.</p> <p>However, as more programs are created, some companies are forgetting the real reason behind bug bounties. That is, instead of making their systems more secure, companies want to merely hunt bugs. Threatpost talked to Katie Moussouris, founder and CEO of Luta Security, to hear more about her thoughts about the challenges in developing – and launching – bug bounty programs.</p>]]></content:encoded>
      
      
      <enclosure length="36616403" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/KATIE_M_FINAL.mp3?dest-id=212001"/>
      <itunes:duration>25:26</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/3/e/e/3/3ee34de09571b866/podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Bug bounty programs continue to increase in popularity – but that popularity has its downsides. Since the launch of the Hack the Pentagon program in 2016, bug bounty programs have quickly grown in popularity. However, as more programs are created, some companies are forgetting the real reason behind bug bounties. That is, instead of making their systems more secure, companies want to merely hunt bugs. Threatpost talked to Katie Moussouris, founder and CEO of Luta Security, to hear more about her thoughts about the challenges in developing – and launching – bug bounty programs.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Bug bounty programs continue to increase in popularity – but that popularity has its downsides. Since the launch of the Hack the Pentagon program in 2016, bug bounty programs have quickly grown in popularity. However, as more programs are created, some companies are forgetting the real reason behind bug bounties. That is, instead of making their systems more secure, companies want to merely hunt bugs. Threatpost talked to Katie Moussouris, founder and CEO of Luta Security, to hear more about her thoughts about the challenges in developing – and launching – bug bounty programs.</itunes:summary></item>
    
    <item>
      <title>Critical Cisco 'CDPwn' Flaws Break Network Segmentation</title>
      <itunes:title>Critical Cisco 'CDPwn' Flaws Break Network Segmentation</itunes:title>
      <pubDate>Wed, 05 Feb 2020 16:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[7fc1b2fc-4b70-40a9-8019-de8a7fe55402]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/critical-cisco-cdpwn-flaws-break-network-segmentation]]></link>
      <description><![CDATA[<p>Researchers on Wednesday disclosed five critical vulnerabilities in Cisco Discovery Protocol (CDP), the Cisco Proprietary Layer 2 network protocol that is used to discover information about locally attached Cisco equipment. Threatpost talked to Ben Seri, VP of Research at Armis, who discovered the flaws, about the CDPwn flaws, their impact, and why Layer 2 protocols are an under-researched area.</p> <p>Researchers say that the vulnerabilities, which they collectively dub CDPwn, can allow attackers to remotely take over millions of devices. The flaws specifically exist in the parsing of CDP packets, in the protocol implementation for various Cisco products, from its software to IP cameras. Cisco issued patches on Wednesday addressing the five flaws, and is urging users to update as soon as possible.</p> <p> </p>]]></description>
      
      <content:encoded><![CDATA[<p>Researchers on Wednesday disclosed five critical vulnerabilities in Cisco Discovery Protocol (CDP), the Cisco Proprietary Layer 2 network protocol that is used to discover information about locally attached Cisco equipment. Threatpost talked to Ben Seri, VP of Research at Armis, who discovered the flaws, about the CDPwn flaws, their impact, and why Layer 2 protocols are an under-researched area.</p> <p>Researchers say that the vulnerabilities, which they collectively dub CDPwn, can allow attackers to remotely take over millions of devices. The flaws specifically exist in the parsing of CDP packets, in the protocol implementation for various Cisco products, from its software to IP cameras. Cisco issued patches on Wednesday addressing the five flaws, and is urging users to update as soon as possible.</p> <p> </p>]]></content:encoded>
      
      
      <enclosure length="34565059" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/cisco_flaw_podcast.mp3?dest-id=212001"/>
      <itunes:duration>24:01</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/4/d/b/e/4dbe0598d3797b68/podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Researchers on Wednesday disclosed five critical vulnerabilities in Cisco Discovery Protocol (CDP), the Cisco Proprietary Layer 2 network protocol that is used to discover information about locally attached Cisco equipment. Threatpost talked to Ben Seri, VP of Research at Armis, who discovered the flaws, about the CDPwn flaws, their impact, and why Layer 2 protocols are an under-researched area. Researchers say that the vulnerabilities, which they collectively dub CDPwn, can allow attackers to remotely take over millions of devices. The flaws specifically exist in the parsing of CDP packets, in the protocol implementation for various Cisco products, from its software to IP cameras. Cisco issued patches on Wednesday addressing the five flaws, and is urging users to update as soon as possible.  </itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Researchers on Wednesday disclosed five critical vulnerabilities in Cisco Discovery Protocol (CDP), the Cisco Proprietary Layer 2 network protocol that is used to discover information about locally attached Cisco equipment. Threatpost talked to Ben Seri, VP of Research at Armis, who discovered the flaws, about the CDPwn flaws, their impact, and why Layer 2 protocols are an under-researched area. Researchers say that the vulnerabilities, which they collectively dub CDPwn, can allow attackers to remotely take over millions of devices. The flaws specifically exist in the parsing of CDP packets, in the protocol implementation for various Cisco products, from its software to IP cameras. Cisco issued patches on Wednesday addressing the five flaws, and is urging users to update as soon as possible.  </itunes:summary></item>
    
    <item>
      <title>WhatsApp Hacks Point to Sophisticated Mobile Cyberattacks</title>
      <itunes:title>WhatsApp Hacks Point to Sophisticated Mobile Cyberattacks</itunes:title>
      <pubDate>Thu, 30 Jan 2020 17:22:39 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[58dbc65e-bb9a-452a-b849-66b928436dab]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/whatsapp-hacks-point-to-sophisticated-mobile-cyberattacks]]></link>
      <description><![CDATA[<p> Oded Vanunu, head of products vulnerability research at Check Point research, has seen his share of WhatsApp vulnerabilities – <a href= "https://threatpost.com/whatsapp-flaws-message-manipulation/147088/"> the researcher at Black Hat 2019</a> demoed several flaws in the messaging platform could be used to manipulate chats, for instance.</p> <p>However, Vanunu told Threatpost at CPX 360, Check Point's annual security conference that takes place this week, WhatsApp is a prime example of how mobile devices are increasingly becoming targeted by nation state actors, in stark contrast to previous, less serious threats mobile devices have faced like adware.</p>]]></description>
      
      <content:encoded><![CDATA[<p> Oded Vanunu, head of products vulnerability research at Check Point research, has seen his share of WhatsApp vulnerabilities – <a href= "https://threatpost.com/whatsapp-flaws-message-manipulation/147088/"> the researcher at Black Hat 2019</a> demoed several flaws in the messaging platform could be used to manipulate chats, for instance.</p> <p>However, Vanunu told Threatpost at CPX 360, Check Point's annual security conference that takes place this week, WhatsApp is a prime example of how mobile devices are increasingly becoming targeted by nation state actors, in stark contrast to previous, less serious threats mobile devices have faced like adware.</p>]]></content:encoded>
      
      
      <enclosure length="19275276" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/check_point_final_podcas.mp3?dest-id=212001"/>
      <itunes:duration>13:24</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/c/4/7/0/c470b0f8cb8b13ce/podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle> Oded Vanunu, head of products vulnerability research at Check Point research, has seen his share of WhatsApp vulnerabilities – the researcher at Black Hat 2019 demoed several flaws in the messaging platform could be used to manipulate chats, for instance. However, Vanunu told Threatpost at CPX 360, Check Point's annual security conference that takes place this week, WhatsApp is a prime example of how mobile devices are increasingly becoming targeted by nation state actors, in stark contrast to previous, less serious threats mobile devices have faced like adware.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary> Oded Vanunu, head of products vulnerability research at Check Point research, has seen his share of WhatsApp vulnerabilities – the researcher at Black Hat 2019 demoed several flaws in the messaging platform could be used to manipulate chats, for instance. However, Vanunu told Threatpost at CPX 360, Check Point's annual security conference that takes place this week, WhatsApp is a prime example of how mobile devices are increasingly becoming targeted by nation state actors, in stark contrast to previous, less serious threats mobile devices have faced like adware.</itunes:summary></item>
    
    <item>
      <title>Vivin Nets Thousands of Dollars Using Cryptomining Malware</title>
      <itunes:title>Vivin Nets Thousands of Dollars Using Cryptomining Malware</itunes:title>
      <pubDate>Wed, 22 Jan 2020 21:53:57 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[3ea105a6-e2a4-4c74-b495-46e9b963cf1a]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/vivin-nets-thousands-of-dollars-using-cryptomining-malware]]></link>
      <description><![CDATA[<p>Threatpost talks to Nick Biasini, a threat researcher at Cisco Talos, about a recently-uncovered threat actor, dubbed Vivin, has made thousands of U.S. dollars through a large-scale cryptomining campaign.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Threatpost talks to Nick Biasini, a threat researcher at Cisco Talos, about a recently-uncovered threat actor, dubbed Vivin, has made thousands of U.S. dollars through a large-scale cryptomining campaign.</p>]]></content:encoded>
      
      
      <enclosure length="14473338" type="video/mp4" url="https://traffic.libsyn.com/clean/secure/digitalunderground/talos_mp3.m4v?dest-id=212001"/>
      <itunes:duration>14:52</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/b/8/e/9/b8e913757ed0b6c9/podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>Threatpost talks to Nick Biasini, a threat researcher at Cisco Talos, about a recently-uncovered threat actor, dubbed Vivin, has made thousands of U.S. dollars through a large-scale cryptomining campaign.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>Threatpost talks to Nick Biasini, a threat researcher at Cisco Talos, about a recently-uncovered threat actor, dubbed Vivin, has made thousands of U.S. dollars through a large-scale cryptomining campaign.</itunes:summary></item>
    
    <item>
      <title>News Wrap: PoC Exploit Controversy, Cable Haunt &amp; Joker Malware</title>
      <itunes:title>News Wrap: PoC Exploit Controversy, Cable Haunt &amp; Joker Malware</itunes:title>
      <pubDate>Fri, 17 Jan 2020 17:52:11 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[960876ba-0fd1-4c4e-8a77-b9809fb0549a]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/news-wrap-poc-exploit-controversy-cable-haunt-joker-malware]]></link>
      <description><![CDATA[<p>This week's news wrap podcast breaks down the biggest Threatpost security stories of the week, including:</p> <ul> <li>Various <a href= "https://threatpost.com/poc-exploits-published-for-microsoft-crypto-bug/151931/"> proof-of-concept exploits</a> being released for serious vulnerabilities this week - including for the recently-patched <a href= "https://threatpost.com/microsoft-patches-crypto-bug/151842/" target="_blank" rel="noopener noreferrer">crypto-spoofing vulnerability</a> found by the <a href= "https://threatpost.com/podcast-nsa-reports-major-crypto-spoofing-bug-to-microsoft/151900/" target="_blank" rel="noopener noreferrer">National Security Agency</a> and <a href= "https://threatpost.com/microsoft-patches-crypto-bug/151842/">reported to Microsoft</a>.</li> <li>Multiple cable modems used by ISPs to provide broadband into homes have a critical vulnerability in their underlying reference architecture, <a href= "https://threatpost.com/cable-haunt-remote-code-execution/151756/">dubbed "Cable Haunt,"</a> that would allow an attacker full remote control of the device.</li> <li>Google's continual battle against attackers who are infiltrating Google Play with Android apps (more than 17,000 apps to date) distributing <a href= "https://threatpost.com/joker-androids-malware-ramps-volume/151785/">the Joker malware</a>.</li> <li>Google setting an <a href= "https://threatpost.com/google-to-nix-third-party-cookies/151830/">aggressive two-year deadline</a> for dropping support for third-party tracking cookies in its Chrome web browser.</li> </ul>]]></description>
      
      <content:encoded><![CDATA[<p>This week's news wrap podcast breaks down the biggest Threatpost security stories of the week, including:</p> <ul> <li>Various <a href= "https://threatpost.com/poc-exploits-published-for-microsoft-crypto-bug/151931/"> proof-of-concept exploits</a> being released for serious vulnerabilities this week - including for the recently-patched <a href= "https://threatpost.com/microsoft-patches-crypto-bug/151842/" target="_blank" rel="noopener noreferrer">crypto-spoofing vulnerability</a> found by the <a href= "https://threatpost.com/podcast-nsa-reports-major-crypto-spoofing-bug-to-microsoft/151900/" target="_blank" rel="noopener noreferrer">National Security Agency</a> and <a href= "https://threatpost.com/microsoft-patches-crypto-bug/151842/">reported to Microsoft</a>.</li> <li>Multiple cable modems used by ISPs to provide broadband into homes have a critical vulnerability in their underlying reference architecture, <a href= "https://threatpost.com/cable-haunt-remote-code-execution/151756/">dubbed "Cable Haunt,"</a> that would allow an attacker full remote control of the device.</li> <li>Google's continual battle against attackers who are infiltrating Google Play with Android apps (more than 17,000 apps to date) distributing <a href= "https://threatpost.com/joker-androids-malware-ramps-volume/151785/">the Joker malware</a>.</li> <li>Google setting an <a href= "https://threatpost.com/google-to-nix-third-party-cookies/151830/">aggressive two-year deadline</a> for dropping support for third-party tracking cookies in its Chrome web browser.</li> </ul>]]></content:encoded>
      
      
      <enclosure length="36486000" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/news_wrap_podcast_jan_17.mp3?dest-id=212001"/>
      <itunes:duration>25:21</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/6/7/b/8/67b86173ab047fbc/news_wrap.jpeg"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>This week's news wrap podcast breaks down the biggest Threatpost security stories of the week, including: Various proof-of-concept exploits being released for serious vulnerabilities this week - including for the recently-patched crypto-spoofing vulnerability found by the National Security Agency and reported to Microsoft. Multiple cable modems used by ISPs to provide broadband into homes have a critical vulnerability in their underlying reference architecture, dubbed "Cable Haunt," that would allow an attacker full remote control of the device. Google's continual battle against attackers who are infiltrating Google Play with Android apps (more than 17,000 apps to date) distributing the Joker malware. Google setting an aggressive two-year deadline for dropping support for third-party tracking cookies in its Chrome web browser.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>This week's news wrap podcast breaks down the biggest Threatpost security stories of the week, including: Various proof-of-concept exploits being released for serious vulnerabilities this week - including for the recently-patched crypto-spoofing vulnerability found by the National Security Agency and reported to Microsoft. Multiple cable modems used by ISPs to provide broadband into homes have a critical vulnerability in their underlying reference architecture, dubbed "Cable Haunt," that would allow an attacker full remote control of the device. Google's continual battle against attackers who are infiltrating Google Play with Android apps (more than 17,000 apps to date) distributing the Joker malware. Google setting an aggressive two-year deadline for dropping support for third-party tracking cookies in its Chrome web browser.</itunes:summary></item>
    
    <item>
      <title>NSA Detects Major Microsoft Windows Flaw: What It Means</title>
      <itunes:title>NSA Detects Major Microsoft Windows Flaw: What It Means</itunes:title>
      <pubDate>Wed, 15 Jan 2020 20:33:35 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[007ae88d-1218-4acc-a0c2-2110a73e0eb9]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/nsa-detects-major-microsoft-windows-flaw-what-it-means]]></link>
      <description><![CDATA[<p>A major Microsoft crypto-spoofing bug impacting Windows 10 <a href= "https://threatpost.com/microsoft-patches-crypto-bug/151842/">made waves this Patch Tuesday</a>, particularly as the flaw was found and reported by the U.S. National Security Agency (NSA).</p> <p>Microsoft's January Patch Tuesday security bulletin disclosed the "important"-severity vulnerability, which could allow an attacker to spoof a code-signing certificate, vital to validating executable programs in Windows, and make it appear as if an application was from a trusted source.</p> <p>Threatpost talked to Pratik Savla, senior security engineer at Venafi, about the vulnerability, whether the hype around the flaw was warranted, and what the disclosure means for the NSA.</p>]]></description>
      
      <content:encoded><![CDATA[<p>A major Microsoft crypto-spoofing bug impacting Windows 10 <a href= "https://threatpost.com/microsoft-patches-crypto-bug/151842/">made waves this Patch Tuesday</a>, particularly as the flaw was found and reported by the U.S. National Security Agency (NSA).</p> <p>Microsoft's January Patch Tuesday security bulletin disclosed the "important"-severity vulnerability, which could allow an attacker to spoof a code-signing certificate, vital to validating executable programs in Windows, and make it appear as if an application was from a trusted source.</p> <p>Threatpost talked to Pratik Savla, senior security engineer at Venafi, about the vulnerability, whether the hype around the flaw was warranted, and what the disclosure means for the NSA.</p>]]></content:encoded>
      
      
      <enclosure length="22223769" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Patch_Tuesday.mp3?dest-id=212001"/>
      <itunes:duration>15:26</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/c/8/0/e/c80edf40c035132c/TP_podcast.jpg"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>A major Microsoft crypto-spoofing bug impacting Windows 10 made waves this Patch Tuesday, particularly as the flaw was found and reported by the U.S. National Security Agency (NSA). Microsoft's January Patch Tuesday security bulletin disclosed the "important"-severity vulnerability, which could allow an attacker to spoof a code-signing certificate, vital to validating executable programs in Windows, and make it appear as if an application was from a trusted source. Threatpost talked to Pratik Savla, senior security engineer at Venafi, about the vulnerability, whether the hype around the flaw was warranted, and what the disclosure means for the NSA.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>A major Microsoft crypto-spoofing bug impacting Windows 10 made waves this Patch Tuesday, particularly as the flaw was found and reported by the U.S. National Security Agency (NSA). Microsoft's January Patch Tuesday security bulletin disclosed the "important"-severity vulnerability, which could allow an attacker to spoof a code-signing certificate, vital to validating executable programs in Windows, and make it appear as if an application was from a trusted source. Threatpost talked to Pratik Savla, senior security engineer at Venafi, about the vulnerability, whether the hype around the flaw was warranted, and what the disclosure means for the NSA.</itunes:summary></item>
    
    <item>
      <title>CCPA's Biggest Challenge: Where's The Data?</title>
      <itunes:title>CCPA's Biggest Challenge: Where's The Data?</itunes:title>
      <pubDate>Thu, 09 Jan 2020 15:21:51 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[3a16550f-e968-473b-ae57-02bb7295db80]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/ccpas-biggest-challenge-wheres-the-data]]></link>
      <description><![CDATA[<p>The California Consumer Privacy Act is being touted as one of the strongest privacy regulations in the U.S. enacted so far. However, though the CCPA was adopted on January 1, 2020, the act still has several loose ends and privacy loopholes that need to be fleshed out.</p> <p>At a high level ,the CCPA mandates strict requirements for companies to notify users about how their user data will be used and monetized along with giving them straightforward tools for opting out.  However, one of the bigger challenges with the CCPA is the question of tracking the location of that user data, Terry Ray, SVP and fellow with Imperva, tells Threatpost.</p>]]></description>
      
      <content:encoded><![CDATA[<p>The California Consumer Privacy Act is being touted as one of the strongest privacy regulations in the U.S. enacted so far. However, though the CCPA was adopted on January 1, 2020, the act still has several loose ends and privacy loopholes that need to be fleshed out.</p> <p>At a high level ,the CCPA mandates strict requirements for companies to notify users about how their user data will be used and monetized along with giving them straightforward tools for opting out. However, one of the bigger challenges with the CCPA is the question of tracking the location of that user data, Terry Ray, SVP and fellow with Imperva, tells Threatpost.</p>]]></content:encoded>
      
      
      <enclosure length="28580302" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/Podcast_CCPA_Final.mp3?dest-id=212001"/>
      <itunes:duration>19:51</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/8/c/1/c/8c1cb8881c76797f/podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>The California Consumer Privacy Act is being touted as one of the strongest privacy regulations in the U.S. enacted so far. However, though the CCPA was adopted on January 1, 2020, the act still has several loose ends and privacy loopholes that need to be fleshed out. At a high level ,the CCPA mandates strict requirements for companies to notify users about how their user data will be used and monetized along with giving them straightforward tools for opting out.  However, one of the bigger challenges with the CCPA is the question of tracking the location of that user data, Terry Ray, SVP and fellow with Imperva, tells Threatpost.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>The California Consumer Privacy Act is being touted as one of the strongest privacy regulations in the U.S. enacted so far. However, though the CCPA was adopted on January 1, 2020, the act still has several loose ends and privacy loopholes that need to be fleshed out. At a high level ,the CCPA mandates strict requirements for companies to notify users about how their user data will be used and monetized along with giving them straightforward tools for opting out.  However, one of the bigger challenges with the CCPA is the question of tracking the location of that user data, Terry Ray, SVP and fellow with Imperva, tells Threatpost.</itunes:summary></item>
    
    <item>
      <title>The Roadblocks and Opportunities For Women in Cybersecurity</title>
      <itunes:title>The Roadblocks and Opportunities For Women in Cybersecurity</itunes:title>
      <pubDate>Fri, 27 Dec 2019 14:00:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[cf41f6e8-fc6b-4cd0-8544-8f14ffc4ad36]]></guid>
      <link><![CDATA[https://digitalunderground.libsyn.com/the-roadblocks-and-opportunities-for-women-in-cybersecurity]]></link>
      <description><![CDATA[<p>In 2019, diversity in the cybersecurity was thrust to the forefront with recognition from both vendors and experts. The tech industry is facing challenges around <a href= "https://threatpost.com/program-looks-to-tap-military-vets-for-cyber-jobs/138879/" target="_blank" rel="noopener noreferrer">diversity in general</a>, but women are particularly underrepresented. And with an estimated 3.5 million jobs are expected to <a href= "https://cybersecurityventures.com/jobs/" target="_blank" rel= "noopener noreferrer">remain unfilled</a>by 2021, infosec is certainly a lucrative space for women.</p> <p>Threatpost sat down with Jessica LaBouve, a pen tester with A-LIGN, to discuss the personal challenges she's faced in the cybersecurity industry and the opportunities in the space that she sees for improvement.</p>]]></description>
      
      <content:encoded><![CDATA[<p>In 2019, diversity in the cybersecurity was thrust to the forefront with recognition from both vendors and experts. The tech industry is facing challenges around <a href= "https://threatpost.com/program-looks-to-tap-military-vets-for-cyber-jobs/138879/" target="_blank" rel="noopener noreferrer">diversity in general</a>, but women are particularly underrepresented. And with an estimated 3.5 million jobs are expected to <a href= "https://cybersecurityventures.com/jobs/" target="_blank" rel= "noopener noreferrer">remain unfilled</a>by 2021, infosec is certainly a lucrative space for women.</p> <p>Threatpost sat down with Jessica LaBouve, a pen tester with A-LIGN, to discuss the personal challenges she's faced in the cybersecurity industry and the opportunities in the space that she sees for improvement.</p>]]></content:encoded>
      
      
      <enclosure length="18610721" type="audio/mpeg" url="https://traffic.libsyn.com/clean/secure/digitalunderground/JESS_PODCAST_FINAL.mp3?dest-id=212001"/>
      <itunes:duration>12:56</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/e/7/a/b/e7aba4f20ceaf08c/podcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>chris@threatpost.com (Mike Mimoso, Chris Brook)</author><itunes:subtitle>In 2019, diversity in the cybersecurity was thrust to the forefront with recognition from both vendors and experts. The tech industry is facing challenges around diversity in general, but women are particularly underrepresented. And with an estimated 3.5 million jobs are expected to remain unfilledby 2021, infosec is certainly a lucrative space for women. Threatpost sat down with Jessica LaBouve, a pen tester with A-LIGN, to discuss the personal challenges she's faced in the cybersecurity industry and the opportunities in the space that she sees for improvement.</itunes:subtitle><itunes:author>Mike Mimoso, Chris Brook</itunes:author><itunes:summary>In 2019, diversity in the cybersecurity was thrust to the forefront with recognition from both vendors and experts. The tech industry is facing challenges around diversity in general, but women are particularly underrepresented. And with an estimated 3.5 million jobs are expected to remain unfilledby 2021, infosec is certainly a lucrative space for women. Threatpost sat down with Jessica LaBouve, a pen tester with A-LIGN, to discuss the personal challenges she's faced in the cybersecurity industry and the opportunities in the space that she sees for improvement.</itunes:summary></item>
    
  </channel>
</rss>