Artwork

Вміст надано Jared Rimer. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Jared Rimer або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.
Player FM - додаток Podcast
Переходьте в офлайн за допомогою програми Player FM !

The Security box, podcast 147: Unpacking the Structure of a Ransomware Group's Business Model

2:46:54
 
Поширити
 

Manage episode 365476028 series 2441665
Вміст надано Jared Rimer. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Jared Rimer або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.

Welcome to the security box, podcast 147. On this edition of the program, I believe I have a very interesting but true story that must be told with the names being changed to protect the innocent, or is it guilty? We've got a very interesting article talking about the structure of ransomware groups, and no, we're not talking about specific named groups, just something that probably wouldn't surprise someone who reads this type of news. We'll see what else the landscape has to offer with news, notes, questions and more.

A true story that might include a moron?

Someone recently got someone fired as part of a grudge where someone heard something they said and decided to look them up and email a copy of what they said to the employer. This is the first time we've seen this in the phone world and we hope it isn't going to happen again. Live version with names changed to protect the innocent, or are we protecting the guilty?

Topic: What's going on with Ransomware groups?

The following is a Trend Micro article which we found very valuable. Unpacking the Structure of Modern Cybercrime Organizations is the title of this article and well worth the read. Question for readers and listeners to the live or podcast edition listeners, are you surprised? Let's discuss this one.

Supporting the podcast

If you'd like to support our efforts on what this podcast is doing, you can feel free to donate to the network, subscribing to the security box discussion list or sending us a note through contact information throughout the podcast. You can also find contact details on our blog page found here. Thanks so much for listening, reading and learning! We can't do this alone.

  continue reading

301 епізодів

Artwork
iconПоширити
 
Manage episode 365476028 series 2441665
Вміст надано Jared Rimer. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Jared Rimer або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.

Welcome to the security box, podcast 147. On this edition of the program, I believe I have a very interesting but true story that must be told with the names being changed to protect the innocent, or is it guilty? We've got a very interesting article talking about the structure of ransomware groups, and no, we're not talking about specific named groups, just something that probably wouldn't surprise someone who reads this type of news. We'll see what else the landscape has to offer with news, notes, questions and more.

A true story that might include a moron?

Someone recently got someone fired as part of a grudge where someone heard something they said and decided to look them up and email a copy of what they said to the employer. This is the first time we've seen this in the phone world and we hope it isn't going to happen again. Live version with names changed to protect the innocent, or are we protecting the guilty?

Topic: What's going on with Ransomware groups?

The following is a Trend Micro article which we found very valuable. Unpacking the Structure of Modern Cybercrime Organizations is the title of this article and well worth the read. Question for readers and listeners to the live or podcast edition listeners, are you surprised? Let's discuss this one.

Supporting the podcast

If you'd like to support our efforts on what this podcast is doing, you can feel free to donate to the network, subscribing to the security box discussion list or sending us a note through contact information throughout the podcast. You can also find contact details on our blog page found here. Thanks so much for listening, reading and learning! We can't do this alone.

  continue reading

301 епізодів

كل الحلقات

×
 
Loading …

Ласкаво просимо до Player FM!

Player FM сканує Інтернет для отримання високоякісних подкастів, щоб ви могли насолоджуватися ними зараз. Це найкращий додаток для подкастів, який працює на Android, iPhone і веб-сторінці. Реєстрація для синхронізації підписок між пристроями.

 

Короткий довідник