1. EachPod
EachPod
ShadowTalk: Powered by ReliaQuest - Podcast

ShadowTalk: Powered by ReliaQuest

Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research.

Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledge and best practices to help businesses mitigate the most pertinent cyber threats. 

 

With over 1,000 customers worldwide and 1,200 teammates across six global operating centers, ReliaQuest delivers security outcomes for the most trusted enterprise brands in the world. Learn more at www.reliaquest.com.

News Tech News Business Technology Careers
Update frequency
every 7 days
Average duration
30 minutes
Episodes
441
Years Active
2018 - 2025
Share to:
Episode 41: Magecart Payment Card Thefts

Episode 41: Magecart Payment Card Thefts

In this week’s ShadowTalk, Richard Gold and Simon Hall join Michael Marriott to discuss the latest spate of attacks by the threat actor known as Magecart. We dig into the history of Magecart, differe…
00:17:47  |   Fri 14 Sep 2018
Episode 40: DoJ Complaint Charges North Korean Actor For Sony Attacks, WannaCry, and More

Episode 40: DoJ Complaint Charges North Korean Actor For Sony Attacks, WannaCry, and More

In this week’s ShadowTalk, Richard Gold and Rafael Amado join Michael Marriott to discuss the latest Department of Justice complaint against an individual working for Chosun Expo, an alleged front fo…
00:33:21  |   Fri 07 Sep 2018
Episode 39: Credential Hygiene

Episode 39: Credential Hygiene

Dr. Richard Gold and Simon Hall join Rafael Amado to discuss the age-old problem of credential hygiene. We’ve all heard of not reusing passwords, employing two factor authentication and using passwor…
00:28:09  |   Fri 31 Aug 2018
Episode 38: Midterm meddling and threat modeling

Episode 38: Midterm meddling and threat modeling

This week it was revealed that six new domains registered by APT28, spoofing nonprofit, Senate, and Microsoft domains, have been sinkholed. With November’s US midterm elections fast-approaching, we d…
00:25:15  |   Fri 24 Aug 2018
Episode 37: ATM Fraud and Cashout Operations

Episode 37: ATM Fraud and Cashout Operations

Digital Shadows’ Strategic Intelligence manager Rose Bernard joins Rafael Amado to discuss four separate ATM stories making headlines this week. In Part I, they’ll cover an alert on an impending "ATM…
00:17:43  |   Fri 17 Aug 2018
Episode 36: FIN7 Arrests and Phishing Threats

Episode 36: FIN7 Arrests and Phishing Threats

Digital Shadows’ Rose Bernard and Simon Hall join Rafael Amado to cover the arrest of three alleged members of the FIN7 organized criminal group. The team go over the United States Department of Just…
00:25:04  |   Fri 10 Aug 2018
Episode 35: Cyber threats to ERP Applications

Episode 35: Cyber threats to ERP Applications

In this week’s episode, JP Perez-Etchegoyen, CTO of Onapsis, joins Michael Marriott to talk about the exposure of SAP and Oracle applications, the increase in publicly-available exploits, and the thr…
00:25:16  |   Fri 03 Aug 2018
Episode 34: Satori Botnet, OilRig, PowerShell Security, and the Dragonfly Campaign

Episode 34: Satori Botnet, OilRig, PowerShell Security, and the Dragonfly Campaign

Richard Gold and Rose Bernard join Michael Marriott to talked about updates to the Satori botnet, which has expanded to incorporate new IoT devices using TCP port 5555. Amid news of a new wave of OIl…
00:18:42  |   Fri 27 Jul 2018
Episode 33: Digital Risk Protection

Episode 33: Digital Risk Protection

Rick Holland, CISO at Digital Shadows, discusses the latest 2018 Forrester New Wave for Digital Risk Protection. He discusses how security leaders must avoid blind spots with a more complete risk pic…
00:07:20  |   Mon 23 Jul 2018
Episode 32: MITRE ATT&CK™ Framework and the Mueller GRU Indictment

Episode 32: MITRE ATT&CK™ Framework and the Mueller GRU Indictment

In today’s ShadowTalk, we take on the Robert Mueller indictment against 12 Russian individuals for alleged US election interference. However, rather than dwell on issues of attribution and geopolitic…
00:27:22  |   Fri 20 Jul 2018
Episode 31: Carbanak Files and Source Code Leaked?

Episode 31: Carbanak Files and Source Code Leaked?

In this week's ShadowTalk, Digital Shadows’ Russian-speaking security specialist discovered files and source code allegedly related to the Carbanak organized criminal group. The Carbanak malware is a…
00:23:48  |   Fri 13 Jul 2018
Episode 30: SSL Inspection and Interception: Uses, Abuses and Trade-offs

Episode 30: SSL Inspection and Interception: Uses, Abuses and Trade-offs

The Payment Card Industry recently passed a deadline requiring that all e-commerce sites and merchants cease supporting TLS 1.0. With this and older protocols such as SSL vulnerable to man-in-the-mid…
00:21:02  |   Fri 06 Jul 2018
Episode 29: Reducing Your Attack Surface: From a Firehose to a Straw

Episode 29: Reducing Your Attack Surface: From a Firehose to a Straw

Following news that a database containing 340 million records has been publicly exposed to the internet, Richard Gold and Simon Hall join Michael Marriott to discuss how (and why) you can reduce your…
00:20:32  |   Fri 29 Jun 2018
Episode 28: Diversity in Security and Women’s Network Launch

Episode 28: Diversity in Security and Women’s Network Launch

Libby Fiumara is joined by Rose Bernard and Sophie Burke to discuss the launch of Digital Shadows’ Women’s Network, challenges facing women in security, and how companies can foster diversity in the …
00:24:55  |   Tue 26 Jun 2018
Episode 27: Attribution: The How, The What and The Why

Episode 27: Attribution: The How, The What and The Why

Simon Hall and Rich Gold join Michael Marriott to discuss the merits and perils of attribution, including the number of characteristics and variables required for a strong attribution, instances wher…
00:22:50  |   Fri 22 Jun 2018
Episode 26: Mythbusting Vulnerabilities and Exploits

Episode 26: Mythbusting Vulnerabilities and Exploits

Simon Hall and Richard Gold join Rafael Amado to discuss misconceptions around vulnerabilities and exploits, other techniques for gaining code execution, and how organizations can prioritize the patc…
00:21:26  |   Fri 15 Jun 2018
Episode 25: Combating Security Debt, Ticketfly Defacement And Data Breach

Episode 25: Combating Security Debt, Ticketfly Defacement And Data Breach

In this edition of Shadow Talk, Richard Gold joins us to discuss the issue of security debt, a term used to refer to the accumulation of security risks over time, such as missed patches, misapplied c…
00:19:28  |   Mon 11 Jun 2018
Episode 24: Seize and Desist: Changes in the cybercriminal underground

Episode 24: Seize and Desist: Changes in the cybercriminal underground

Rafael Amado and Michael Marriott discuss how the criminal underground has evolved since the demise of AlphaBay and Hansa. No single marketplace has managed to fill the AlphaBay-shaped gap left behin…
00:18:51  |   Wed 06 Jun 2018
Episode 23: L0pht 20 years on and combating cyber threats with military-style tactics

Episode 23: L0pht 20 years on and combating cyber threats with military-style tactics

In today’s edition of Shadow talk, Dr Richard Gold joins us to discuss the return of the L0pht hackers. In 1998 the L0pht members delivered a cybersecurity hearing to the United States Senate, warnin…
00:21:56  |   Mon 04 Jun 2018
Episode 22: VPN Filter targeting Ukraine, TRITON malware, Roaming Mantis, VBScript & Spectre vulns

Episode 22: VPN Filter targeting Ukraine, TRITON malware, Roaming Mantis, VBScript & Spectre vulns

In this week’s Shadow Talk, the pod unpacks the reporting on VPN Filter, a malware affecting half a million network devices. Reports have suggested that the malware is being prepped to perform immine…
00:23:28  |   Tue 29 May 2018
Disclaimer: The podcast and artwork embedded on this page are the property of ReliaQuest. This content is not affiliated with or endorsed by eachpod.com.