1. EachPod
EachPod
StoneCast - Podcast

StoneCast

We will be doing podcasts about data storage, backup & disaster recovery, and cloud storage solutions

How To Education Technology
Update frequency
every day
Average duration
16 minutes
Episodes
74
Years Active
2025
Share to:
Inside the Qilin Ransomware Operation: How It Works & How to Stop It

Inside the Qilin Ransomware Operation: How It Works & How to Stop It

The Qilin ransomware gang, also known as Agenda, is making headlines as one of the most sophisticated Ransomware-as-a-Service (RaaS) operations in the cyber threat landscape. In this episode, we brea…

00:15:09  |   Wed 05 Mar 2025
Water Hole Attacks Deep Dive: How Hackers Target Your Business

Water Hole Attacks Deep Dive: How Hackers Target Your Business

Watering hole attacks are a sophisticated and stealthy form of cyberattack where hackers target specific organizations or groups by compromising websites they commonly visit. These attacks take advan…

00:22:46  |   Tue 04 Mar 2025
From Phishing to Exploits: How Ransomware Finds Its Way In

From Phishing to Exploits: How Ransomware Finds Its Way In

In this episode, we explore the complex and evolving tactics cybercriminals use to deliver ransomware into enterprise environments. From classic phishing emails to sophisticated drive-by downloads, w…

00:13:04  |   Tue 04 Mar 2025
Zero-Day Exploits: Cyber Threats You Can’t See Coming

Zero-Day Exploits: Cyber Threats You Can’t See Coming

In this episode, we explore one of the most elusive and dangerous cybersecurity threats: zero-day exploits. These vulnerabilities, unknown to software developers and security teams, give attackers a …

00:20:20  |   Tue 04 Mar 2025
Decrypting Cactus Ransomware: A Deep Dive into Its Attack Methods and Mitigation

Decrypting Cactus Ransomware: A Deep Dive into Its Attack Methods and Mitigation

Cactus ransomware has emerged as one of the most sophisticated cyber threats, using advanced encryption techniques and stealthy tactics to evade traditional security measures. In this episode, we tak…

00:15:52  |   Thu 27 Feb 2025
HIPAA Security Rule Updates 2024: Stonefly and Veeam Solutions

HIPAA Security Rule Updates 2024: Stonefly and Veeam Solutions

StoneFly provides data protection and resilience solutions for hybrid and multi-cloud environments, including data backup, recovery, security, and intelligence. They offer self-managed software, Veea…

00:10:55  |   Wed 26 Feb 2025
Malvertising Unveiled: Navigating the Hidden Dangers of Online Ads

Malvertising Unveiled: Navigating the Hidden Dangers of Online Ads

In this episode, we dive deep into the dark world of malvertising — a sophisticated cyber threat that hides within seemingly harmless online advertisements. Often overlooked, malvertising serves as a…

00:18:27  |   Wed 19 Feb 2025
Inside Trigona: Ransomware Tactics, Targets, and Countermeasures

Inside Trigona: Ransomware Tactics, Targets, and Countermeasures

In this episode, we take a deep dive into Trigona ransomware, an advanced and dangerous malware variant that targets organizations by encrypting their critical data and demanding hefty ransom payment…

00:21:24  |   Wed 19 Feb 2025
Zero Trust Architecture: A Blueprint for Enterprise Ransomware Protection

Zero Trust Architecture: A Blueprint for Enterprise Ransomware Protection

In this comprehensive episode, we explore the transformative power of Zero Trust Architecture (ZTA) in safeguarding enterprises against the escalating threat of ransomware attacks. Traditional securi…

00:16:14  |   Wed 19 Feb 2025
Ransomware-Proof NAS Backup Storage: StoneFly' Blueprint

Ransomware-Proof NAS Backup Storage: StoneFly' Blueprint

In this episode, we dive into the critical importance of robust NAS storage backup strategies amid escalating cyber threats, hardware failures, and human error. With ransomware attacks targeting NAS …

00:26:47  |   Tue 11 Feb 2025
Two-Hour Incident Response: The Key to Cybersecurity Readiness

Two-Hour Incident Response: The Key to Cybersecurity Readiness

Explore the world of advanced cybersecurity solutions with a focus on StoneFly's groundbreaking incident response and proactive defense services. In this episode, we take a comprehensive look at how …

00:12:10  |   Tue 11 Feb 2025
StoneFly DR365V: The Ultimate Backup and Disaster Recovery Solution with Air-Gapped Security

StoneFly DR365V: The Ultimate Backup and Disaster Recovery Solution with Air-Gapped Security

 In this deep dive, we explore the importance of backup storage in today’s cyber threat landscape. Discover how StoneFly’s DR365V, a Veeam-certified backup solution, provides enterprise-grade protect…

00:05:28  |   Mon 10 Feb 2025
Unlocking the Power of Local S3 Object Storage: Scalability, Security, and StoneFly Solutions

Unlocking the Power of Local S3 Object Storage: Scalability, Security, and StoneFly Solutions

 Discover how S3 object storage brings cloud-like scalability and performance to on-premises environments. In this deep dive, we explore what S3 object storage is, how it works, and why it’s essentia…

00:21:15  |   Mon 10 Feb 2025
Ransomware-Proof Unified SAN, NAS, and S3 Object Storage Platform: StoneFly USO

Ransomware-Proof Unified SAN, NAS, and S3 Object Storage Platform: StoneFly USO

In this episode, we dive into the advanced technology behind the StoneFly Unified Storage Appliance, a comprehensive solution that seamlessly integrates SAN, NAS, and S3 object storage into a single,…

00:28:57  |   Tue 04 Feb 2025
AI-Integrated Sandbox: Improving DevOps, Threat Analysis & Disaster Recovery

AI-Integrated Sandbox: Improving DevOps, Threat Analysis & Disaster Recovery

In this episode, we explore the cutting-edge capabilities of the StoneFly AI SandboxHub, a revolutionary appliance designed to merge AI-powered analytics with secure, isolated sandbox environments. T…

00:19:16  |   Mon 03 Feb 2025
Spear Phishing Survival Guide: Defend Your Enterprise Like a Pro

Spear Phishing Survival Guide: Defend Your Enterprise Like a Pro

In this episode of Deep Dive, we dissect one of the most dangerous and targeted cyber threats — spear phishing. Unlike generic phishing attempts, spear phishing involves meticulously crafted emails a…

00:12:21  |   Sun 02 Feb 2025
BlackCat (ALPHV) Uncovered: Tactics, Payloads & Defense Strategies

BlackCat (ALPHV) Uncovered: Tactics, Payloads & Defense Strategies

In this Deep Dive episode, we unravel the complexities of BlackCat (ALPHV) ransomware, a sophisticated and highly adaptable strain written in Rust—a programming language known for its speed and cross…

00:20:55  |   Sat 01 Feb 2025
From Factories to Firewalls: The Automotive Industry’s Ransomware Crisis

From Factories to Firewalls: The Automotive Industry’s Ransomware Crisis

In this episode, we explore the escalating threat of ransomware attacks on the automotive industry, a sector increasingly reliant on digital systems and interconnected technologies. Drawing from Ston…

00:23:16  |   Sat 01 Feb 2025
SaaS Downtime Exposed: How Single Points of Failure Cripple Industries

SaaS Downtime Exposed: How Single Points of Failure Cripple Industries

In this episode, we take a deep dive into the critical issue of SaaS downtime and how single points of failure can bring entire industries to a standstill. Drawing insights from StoneFly’s blog, we e…

00:14:24  |   Fri 31 Jan 2025
Black Basta Ransomware: Unmasking a Lethal Cyber Threat

Black Basta Ransomware: Unmasking a Lethal Cyber Threat

In this episode of the Deep Dive podcast, we uncover the inner workings of Black Basta, one of the most sophisticated ransomware families wreaking havoc on enterprises worldwide. Known for its double…

00:15:58  |   Thu 30 Jan 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Stonefly. This content is not affiliated with or endorsed by eachpod.com.