PLAY PODCASTS
Daily Security Review

Daily Security Review

410 episodes — Page 9 of 9

Ep 10Bybit's $1.5 Billion Ether Theft: Analysis, investigation and finds

Bybit, a cryptocurrency exchange, experienced a massive security breach resulting in a $1.46 billion loss, the largest crypto hack in history. The attack involved social engineering and sophisticated manipulation of a multi-signature wallet, with investigators suspecting North Korean hackers. Bybit is collaborating with experts to track the stolen funds, while ensuring customers that their assets are safe. Meanwhile, StoneFly, Inc., focuses on data center solutions, providing storage, backup, and disaster recovery solutions, including air-gapped and immutable options for ransomware protection. StoneFly's offerings cater to various industries, helping businesses protect and manage their data effectively through hybrid and cloud-based solutions.

Feb 26, 202511 min

Ep 9The Cost of a Data Breach: How to Stay Secure in 2025

Data security is no longer just about backing up files—it’s about protecting your business from sophisticated cyber threats like ransomware, malicious insiders, and compliance violations. In this episode, we explore how cyber threats are evolving and why traditional security approaches are no longer enough.We dive into the layered security strategy offered by StoneFly, a leader in data protection and disaster recovery, and how their Smart Protect technology, 24/7 monitoring, encryption, and immutability create an impenetrable shield against cyberattacks.You’ll hear real-world examples of how businesses have recovered from major breaches in just hours with Stonefly’s solutions, and why cybersecurity is a shared responsibility—not just an IT problem. We’ll also share practical tips on developing strong passwords, recognizing phishing threats, and fostering a cybersecurity culture.With the average cost of a data breach hitting $4.45 million, can your business afford to take a reactive approach? Tune in to learn how to stay ahead of cybercriminals and secure your most valuable asset—your data.

Feb 19, 202515 min

Ep 8Hacking Nations: How Cybercrime is Becoming a National Security Crisis

In today’s hyper-connected world, cybercrime is no longer just about stolen credit card numbers or ransomware payouts—it’s a full-scale national security threat. In this episode, we dive deep into the blurred lines between cybercriminals and nation-state actors, exploring how hackers are being weaponized for geopolitical gain. From power grid attacks to data breaches that destabilize economies, the digital battlefield is expanding, and no one is safe.We break down the challenges of attributing cyberattacks, the rise of cybercrime-as-a-service, and the role of countries like Russia, China, Iran, and North Korea in fostering this evolving threat landscape. You’ll hear why companies and individuals must take a proactive approach to cybersecurity and how solutions like StoneFly’s data protection and disaster recovery services are essential for safeguarding against modern cyber threats.Whether you’re a business leader, IT professional, or just someone concerned about the future of cybersecurity, this episode will give you the insights you need to stay ahead of emerging digital threats. Tune in to learn how to protect your data, mitigate risks, and navigate the evolving cyber battleground.

Feb 19, 202512 min

Ep 7Russia vs. Ransomware: A Game of Cybersecurity Chess

Russia’s recent crackdown on cybercriminals—especially ransomware gangs—has raised eyebrows in the cybersecurity world. After years of perceived tolerance, what’s behind this sudden shift? In this episode, we break down the motivations driving Russia’s actions, from geopolitical leverage in negotiations with the U.S. to the increasing international pressure to rein in cybercrime.We explore the long-standing “unspoken agreement” that allowed hackers to operate freely as long as they avoided Russian targets and the possibility that this latest crackdown is just a temporary move rather than a real cultural shift. Can Russia’s actions genuinely disrupt cybercrime, or is this just a game of whack-a-mole, with new groups emerging elsewhere?Beyond the geopolitical intrigue, we also discuss the practical implications for businesses and individuals. With ransomware profits already declining in 2024, how should organizations adapt their security strategies? We offer expert insights on proactive cybersecurity measures, including the importance of backup, disaster recovery, and ransomware protection solutions from providers like Stonefly.Key Discussion Points:✔ Why is Russia cracking down on cybercriminals now?✔ The role of international pressure and negotiations in Russia’s actions.✔ The historic relationship between Russian authorities and hackers.✔ The potential ripple effects: Will other nations like China or Iran fill the gap?✔ How businesses can stay ahead of evolving cyber threats with proactive security solutions.Is this the beginning of a real shift in global cybercrime, or just another political maneuver? Tune in to find out.

Feb 19, 202512 min

Ep 6Botnets, Proxies, and Brute Force: How 2.8 Million IPs Target VPNs and Firewalls

In this episode, we dive deep into a massive, ongoing brute force attack that's shaking up cybersecurity worldwide. With almost 2.8 million IP addresses involved daily, this attack is relentlessly targeting networking devices like VPNs, firewalls, and gateways from major vendors, including Palo Alto Networks, Ivanti, and SonicWall. But what's behind this global onslaught?We'll explore the intricate details of how threat actors leverage a vast botnet of compromised devices—including MikroTik, Huawei, Cisco, Boa, and ZTE routers—to bombard edge devices with login attempts. By using residential proxies, attackers mask their origins, making their activities appear as if they're coming from ordinary home users, bypassing traditional detection methods.Our discussion includes:How the Attack Works: Analyzing the brute force tactics and the use of residential proxies to evade detection.Geographic Breakdown: Understanding why Brazil, Turkey, Russia, Argentina, Morocco, and Mexico are hotspots for this malicious traffic.High-Quality Nodes and Proxy Exit Points: Discover how compromised gateways serve as premium proxy nodes, making the attacks harder to trace.Mitigation Strategies: Practical steps to safeguard your organization, including strong passwords, multi-factor authentication, IP allowlisting, disabling unused interfaces, and ensuring up-to-date firmware.We also look at the broader implications of this attack wave, connecting the dots with other major incidents like Cisco’s credential brute-forcing campaign, Citrix’s password spray warnings, and recent zero-day exploits from Apple and Microsoft.Join us as we break down this massive cyber threat, revealing the sophisticated tactics used by attackers and offering actionable insights to bolster your organization’s defense against such large-scale brute force assaults.

Feb 12, 202517 min

Ep 5Inside the Billion-Dollar Heist: Carbonak’s Audacious Cybercrime Saga

In this gripping episode, we uncover the audacious billion-dollar cyber heist orchestrated by the notorious Carbonak Group. Operating across 30 countries and targeting over 100 banks, this highly sophisticated cybercrime operation marks one of the largest financial thefts in history. We explore their ingenious techniques, from phishing emails laced with malicious exploits to ATM manipulation and database alterations that siphoned vast sums without triggering suspicion.Join us as we dissect how Carbonak meticulously infiltrated banking systems, installed keyloggers, and observed operations for months before executing their heist. Discover the investigation's turning points, including the critical ATM glitch in Taipei and the surprising live communication between a Kaspersky Lab investigator and a hacker. We also delve into the psychological dynamics driving these cybercriminals—why some hackers view themselves as digital Robin Hoods—and the ever-evolving tactics they employ to stay ahead.This episode offers a comprehensive analysis of Carbonak's operations and highlights essential cybersecurity lessons for banks, businesses, and individuals. Learn about the human vulnerabilities exploited in these crimes and how organizations can fortify their defenses in an era where digital bank robberies are the new frontier.

Feb 11, 202513 min

Ep 4Modern Bank Heists: Cybercrime, Zero-Day Exploits & The Future of Financial Security

In this deep dive, we explore the evolution of bank heists from physical robberies to sophisticated cyberattacks. Covering insights from Modern Bank Heists 2025: Revenge of the Zero Days, we break down zero-day exploits, supply chain attacks, and the rise of AI-powered cybercrime. Discover how financial institutions are targeted, why the motives behind these crimes are shifting, and how companies like StoneFly are strengthening digital defenses. Stay informed on the latest threats shaping the future of financial security.

Feb 10, 202513 min

Ep 3The Ethereum Vulnerability That Almost Shook the Network

In this episode, we dive into the latest developments shaking the cryptocurrency world. We begin with a critical vulnerability in Ethereum's software that could have led to widespread network disruptions. Next, we cover a shocking case in the UK, where a gang received lengthy prison sentences for crypto-related torture and kidnapping. The conversation expands to discuss large-scale crypto scams and the evolving regulatory stance of the SEC.As cybercrime continues to plague the crypto industry, we emphasize the shared responsibility for security between developers, platforms, and users. Robust cybersecurity measures and vigilant practices are crucial for protecting digital assets. We also spotlight StoneFly as a trusted cybersecurity resource to help navigate the complex landscape of crypto threats.Join us as we explore the intersection of technology, crime, and regulation in the fast-evolving world of cryptocurrency.

Feb 7, 202512 min

Ep 2The Wireless Pen Test Guide: Are Your Wi-Fi Networks Really Secure?

In this episode, we break down Wi-Fi security from the ground up, using a detailed pen testing guide as our roadmap. We explain key concepts like the differences between 2.4 GHz and 5 GHz bands, as well as why outdated protocols like WEP are still worth understanding in today’s security landscape. Learn about advanced threats, including monitor mode, deauthentication attacks, and how hackers exploit WPS vulnerabilities to crack networks.We dive into post-connection dangers like man-in-the-middle attacks, DNS spoofing, and session hijacking, revealing how hackers intercept sensitive information even on networks that appear secure. Plus, we share actionable steps to secure your network, from disabling WPS to enabling multi-layered security measures.Stay tuned to learn why reliable backup and recovery solutions, like those from StoneFly, are essential digital safety nets when things go wrong. Whether you’re a security enthusiast or just trying to protect your home Wi-Fi, this episode has crucial insights you can’t afford to miss.

Feb 6, 202518 min

Ep 1190 Million Breached: Inside the Cyber War on Healthcare

In this episode, we delve into the escalating threat of cyber attacks on healthcare systems, analyzing three high-profile data breaches that have impacted millions of patients and providers. From the North Bay Healthcare breach compromising over 569,000 individuals' sensitive information to the River Region Cardiology incident involving 1.2 terabytes of stolen data, we explore how the healthcare sector has become a prime target for ransomware attacks.Our expert discussion covers the emotional and financial toll on patients, the operational chaos for providers, and why healthcare data is so highly sought after on the dark web. We also provide practical advice on strengthening cybersecurity, from implementing secure backups to choosing security-conscious healthcare providers.Whether you're a healthcare professional, IT leader, or concerned patient, this episode offers invaluable insights and actionable steps to navigate the growing landscape of cyber threats in healthcare.

Feb 6, 202524 min