show episodes
 
Focusing on the defence industry, trends in military technology and the procurement programmes that get the kit into the hands of the warfighter.As well as a weekly news round-up of current events, Shephard Media’s team of international journalists and analysts take deep dives into defence issues, focusing on niche sectors of the market and look at where the trends are heading.If you work in the defence sector, have an interest in the development of defence technologies, or even if you are a ...
 
The Defence Connect Podcast Network hosts a unique series of podcasts, featuring discussions with key enablers from across the Australian defence industry. The podcasts provide the perfect blend of business intelligence and insights from a range of guests, which include government officials, ADF personnel, industry stakeholders, and members of the academic community. By aligning ourselves with the ADF and the Commonwealth government, we are uniquely placed to deliver a dynamic 360° platform ...
 
Welcome to Shephard Studio’s special series on aerospace and defence innovation in the UK, sponsored by our partner Raytheon. Over the course of four episodes, the Defining the Future podcast will tell the story of how innovation fostered by industry is helping the UK step out of the shadow of Brexit and the COVID-19 pandemic. We will hear how emerging technologies are supporting the prosperity agenda developed by the Government to accelerate Britain’s growth in these uncertain times. In par ...
 
Loading …
show series
 
In this episode of the Defence Connect Podcast, Dr Charles Knight, lecturer in Terrorism, Asymmetric Conflict & Urban Operations at Charles Sturt University, joins editor of Defence Connect Liam Garman to discuss the power and influence of media and information warfare strategies in the contemporary battlespace. Dr Knight, a former member of the Br…
 
The Sinclair Broadcast Group discloses that it sustained a ransomware attack over the weekend. Twitter kicks out two North Korean catphish deployed in a cyberespionage campaign. REvil goes offline, again, perhaps this time for good. Hacking back, at least insofar as you let the hoods know you can see them. Rick Howard previews the newest season of …
 
In this episode of Cyber Security Uncut, Matthew Wilson, CEO of cyber technology firm Penten, joins hosts, Major General (Ret’d) Marcus Thompson and Phil Tarrant, director – defence and security at Momentum Media, to discuss the company’s growth strategy in the cyber security space. The trio begin by announcing the appointment of MAJGEN (Ret’d) Tho…
 
Linux and Security Advocate at Intezer Ell Marquez shares her journey from the family ranch to security. Needing a life change due to a bunch of circumstances that had occurred that left her almost homeless, Ell found out about a six week Linux boot camp that took her down the path toward technology. She fell in love security at at BSides Conferenc…
 
Guest Michael DeBolt, Chief Intelligence Officer from Intel471, joins Dave Bittner to discuss their work on "How Groove Gang is shaking up the Ransomware-as-a-Service market to empower affiliates." McAfee Enterprise ATR believes, with high confidence, that the Groove gang is associated with the Babuk gang, either as a former affiliate or subgroup. …
 
A CISA-issued Joint Advisory warns of threats and vulnerabilities at water and wastewater treatment facilities. CISA issues twenty-two other industrial control system advisories. Andrea Little Limbago from Interos on trends in the human element of security. Our guest is Gidi Cohen from Skybox with Vulnerability and Threat Trends. And the Governor o…
 
In this episode of The Weekly Defence Podcast we bring you highlights from the floor of AUSA 2021 in Washington DC. Newsround [02:20] The Shephard news team unpicks some of the stories from this week, including the impending Swedish procurement of the GlobalEye aircraft; a new milestone in Project Selborne for the UK Royal Navy; and the end of the …
 
Data breach extortion seems to be an emerging criminal trend. Notes on a darknet market’s retirement. Verizon advises Visible users to look to their credentials. Windows users’ attention is drawn to seven potentially serious vulnerabilities (all patchable). The Necro botnet is installing Monero cryptojackers. Organizing an international response to…
 
A Chinese-speaking APT is distributing the MysterySnail RAT in what appears to be a cyberespionage campaign. Some users still haven’t patched vulnerable SolarWinds instances. Notes on yesterday’s Patch Tuesday. The US-convened international ransomware conference kicked off today, and Russia wasn’t invited. Former users of a criminal booter service …
 
Teheran is running password spraying attacks (especially on Thursdays and Sundays). More on the renewed popularity of DDoS attacks. NCSC warns British businesses against ransomware. Two journalists win the Nobel Peace Prize. Joe Carrigan shares his thoughts on GriftHorse. Our guest is Bindu Sundaresan from AT&T Cybersecurity football season and cyb…
 
Our guest is author and journalist Steven Levy. He’s editor-at-large at Wired and his most recent book is "Facebook: The Inside Story. Steven offers his insights on Facebook’s internal research teams, Ben shares a newly-decided court case on whether Big Tech companies can be sued under the Anti-Terrorism statute, and Dave's got the story of some wa…
 
Lieutenant in the US Navy and Skillbridge Fellow at the CyberWire, Brandon Karpf, knew he wanted to join the military at a young age. He achieved that through the US Naval Academy where he was a member of the men's heavyweight rowing team. Commissioning into the cryptologic field as a naval cryptologic warfare officer, Brandon was sent to MIT for a…
 
Matt Stafford, Senior Threat Intelligence Researcher, from Prevailion joins Dave to talk about their work on "Diving Deep into UNC1151’s Infrastructure: Ghostwriter and beyond." Prevailion’s Adversarial Counterintelligence Team (PACT) used advanced infrastructure hunting techniques and Prevailion’s visibility into threat actor infrastructure creati…
 
Google warns fourteen-thousand Gmail users that Fancy Bear has probably been after their passwords. FIN12, a fast-running ransomware group, is after hospitals’ and healthcare providers’ money. BlackMatter remains active against the agriculture sector. REvil is back and talking on the RAMP forum, but so far it’s getting a chilly reception. Twitch tr…
 
This week on The Weekly Defence Podcast, we look at Germany’s plans for the P-8A Poseidon, report on the latest from the Asia Pacific region, dive into the synthetic VS live military training debate and talk sustainability with Bell. Newsround [00:00] Germany has sent two pilots to the IFTS fast-jet training course as part of an evaluation programm…
 
Cyberespionage seems undeterred by stern warnings. DDoS hits the Philippine Senate. The US Department of Homeland Security intends to issue cybersecurity regulations for passenger rail and airlines. The US Department of Justice intends to use the False Claims Act to bring civil actions against government contractors who fail to follow “recognized c…
 
In this episode of the Defence Connect Podcast, Commodore (Ret’d) Vince Di Pietro joins host Phil Tarrant to discuss Australia’s national resilience, examining key findings from the report, Australia – A complacent nation: Our reactions are too little, too late, too short-sighted, published by the Institute for Integrated Economic Resilience’s Nati…
 
Twitch is breached. A newly discovered Iranian threat group is described. A Chinese cyberespionage campaign in India proceeds by phishing. SafeMoon alt-coin is trendy phishbait in criminal circles. As the US prepares to convene an anti-ransomware conference, Russian gangs show no signs of slacking off. Betsy Carmelite from BAH on AI/ ML in cyber de…
 
Facebook restores service after dealing with an accidental BGP configuration issue. There’s now a data auction site for AvosLocker ransomware. Atom Silo ransomware is quiet, patient, and stealthy. The state of investigation into those two guys collared on a ransomware beef in Kyiv last week. Ben Yelin is skeptical of data privacy poll results. Our …
 
The Pandora Papers leak erstwhile private financial transactions by the rich and well-connected (and it’s 150 mainstream news organizations who cooperated in bringing them to light). Flubot is using itself to scare victims into installing Flubot. Coinbase thieves exploited account recovery systems to obtain 2FA credentials. The US plans to convene …
 
In this episode of Cyber Security Uncut, Aiden Tudehope, co-founder and managing director, government and hosting group at Macquarie Telecom Group, joins hosts Major General (Ret’d) Marcus Thompson and Phil Tarrant, director – defence and security at Momentum Media, to discuss the company’s recent expansion in the data security space. The trio begi…
 
Moving to the cloud creates a tremendous opportunity to get security right and reduce the risk of data breach. But most cloud security initiatives get underway after services are deployed in the cloud. It’s frustrating when major breaches resulting from basic mistakes, like S3 buckets left unsecured or secrets exposed. Continually checking for risk…
 
Product Manager in Anti-Fraud Solutions at SpyCloud, Pattie Dillon shares her journey from raising her family to specializing in the anti-fraud space. Upon reentering the workforce, Pattie worked on identity verification and developed a system with privacy concerns in mind. She moved to work in gift cards and was exposed to money laundering. Travel…
 
Dan Petro, Lead Researcher, and Allan Cecil, Security Consultant, from Bishop Fox join Dave to share their research "You're Doing IoT RNG," that they presented at DefCon 29. There’s a crack in the foundation of Internet of Things (IoT) security, one that affects 35 billion devices worldwide. Basically, every IoT device with a hardware random number…
 
A malware campaign offers bogus protection against Pegasus surveillance. A new APT, ChamelGang, is found active against targets in at least ten countries. A ransomware gang can’t get its decryptor right. A proof-of-concept shows that charges can be made from a non-contact Visa card in an iPhone wallet. David Dufour from Webroot warns of potential p…
 
In this episode of The Weekly Defence Podcast we speak to the Global Special Operation Forces Foundation (GSOF) to look at the aftermath of the Western involvement in Afghanistan, and we hear from Raytheon Missiles and Defence about the future of air dominance. Newsround [00:00] The UK has finally released its National Space Strategy on 27 Septembe…
 
GriftHorse will subscribe afflicted Android users to premium services they never knew they’d signed up for (and wouldn’t want if they did). Facebook releases a static analysis tool it uses internally to check apps for security issues. Speculation about what put Group-IB’s CEO in hot water with the Kremlin. A look from NSA about where the major nati…
 
In this episode of the Defence Connect Podcast, Emeritus Professor of Complex Systems Science at the Australian National University Roger Bradbury joins host Liam Garman, editor defence and security at Momentum Media, to discuss how technological innovation could make submarines obsolete. In the podcast, Professor Bradbury analyses the changing tec…
 
Distributed denial-of-service attacks have been making a comeback, and many of them represent criminal extortion attempts. A major British payroll provider is recovering from a cyberattack, but it’s not providing much information on the nature of that attack. Russian authorities arrest the founder of Group-IB on treason charges. Johannes Ullrich fr…
 
The triumphant homecoming of Huawei’s CFO. Microsoft describes the FoggyWeb backdoor, a significant cyberespionage tool. Kaspersky looks at the BloodyStealer Trojan and finds it especially risky to gamers. A novel approach to distributed denial-of-service. Apple looks into those iPhone zero-days. Joe Carrigan looks at the latest offerings in passwo…
 
The EU publicly blames Russia for GhostWriter, and counsels Moscow to amend its ways. Finland’s security services warn of foreign cyberespionage and influence threats. Zoombombing at the highest levels in Cambodia. A ransomware operation, “Colossus,” is described. Conti is back, as predicted, and has hit a major European call center. Dinah Davis fr…
 
Host of the CyberWire Podcast, Dave Bittner, wanted to work with the Muppets, so naturally he landed in cybersecurity. Dave and his Cookie Monster puppet spent much of his childhood putting on shows for his parents friends. During one of those performances, he was discovered and got his start at the local PBS station. A radio, television and film m…
 
The commonly held, idealized picture of technology is that tech makes our lives easier, safer, and better in just about every respect. But an unintended consequence of that picture is an unjustified assumption that companies will sell more products if they serve the public interest, and that may not be so. On the consumer side, personal technology …
 
Guest Ariel Zelivansky, Senior Manager of Security Research at Palo Alto Networks, joins Dave to discuss Unit 42's work on the first cross-account container takeover in the public cloud. The Unit 42 Threat Intelligence team has identified the first known vulnerability that could enable one user of a public cloud service to break out of their enviro…
 
Someone is phishing for Russian rocketeers. The Port of Houston discloses a cyberattack, which the Port says it deflected before it had operational consequences. Ransomware gangs are up and active, and the US is considering mandatory reporting by victims as a defensive policy. Pegasus spyware is said to have been found in the phones of five French …
 
AUKUS fallout, US eyes Wedgetail and 8x8 armoured platforms In this episode of The Weekly Defence Podcast, the team looks at the AUKUS fallout, the latest USAF interest in procuring the E-7A Wedgetail, new Czech investment in artillery systems and the worldwide market for armoured vehicles. Newsround [2:34] Thales and Schiebel have joined forces to…
 
Ransomware hits a second US Midwestern farm co-op. The US House hears from the FBI that Russia seems not to have modified its toleration of privateering gangs (at least yet). A new APT, “FamousSparrow,” is described. REvil seems to have been--surprise!--cheating its criminal affiliates. Josh Ray from Accenture with an update on the Hades Threat Gro…
 
In this episode of the Defence Connect Podcast, editor of Defence Connect Liam Garman and news editor Charbel Kadib join host Phil Tarrant to discuss the Commonwealth government’s decision to overhaul the Future Submarines program. The trio begin by unpacking the new trilateral security partnership between Australia, the United Kingdom, and the Uni…
 
BlackMatter continues to make a nuisance of itself on a large scale. The US is woofing about taking action against ransomware, and Treasury has sanctioned a rogue cryptocurrency exchange, but some advocate stronger measures. Where did all those Ukrainian cybercriminal chat platforms go? A warning of the “censor mode” in some Chinese manufactured sm…
 
Ransomware hits an Iowa agricultural cooperative, which doesn’t meet, the criminals say, the standard for “critical infrastructure.” US Treasury Department announces steps against ransomware’s economic support system. Did Kaseya get its REvil decryptor from the FBI? Ben Yelin describes a major federal court victory for security researchers. Our gue…
 
Cyber electioneering, in Hungary and Russia, the latter with some international implications. The Mirai botnet is exploiting the OMIGOD vulnerability. A shipping company deals with data extortion. Government websites have been serving up some oddly adult-themed ads. Malek Ben Salem from Accenture has thoughts on quantum security in the automotive i…
 
Cyber Security Uncut is back with the second episode of the podcast, hosted by Major General (Ret'd) Marcus Thompson, inaugural head of the Department of Defence’s Information Warfare Division and Phil Tarrant, director – defence and security at Momentum Media. The podcast begins by analysing the impact that organisational budget cuts within the cy…
 
Executive Security Advisor at IBM Security Limor Kessem says she started her cybersecurity career by pure chance. Limor made a change from her childhood dream of being a doctor and came into cybersecurity with her passion, investment, discipline, and perseverance. Limor talks about how we must tighten our core security and at the same time we allow…
 
Guest Jake Valletta, Director of Professional Services at Mandiant, joins Dave to talk about the critical vulnerability Mandiant disclosed that affects millions of IoT devices. Mandiant disclosed a critical risk vulnerability in coordination with the Cybersecurity and Infrastructure Security Agency (“CISA”) that affects millions of IoT devices that…
 
Patch your Zoho software now--vulnerable instances are being actively exploited. Maximum engagement isn’t necessarily good engagement: the hidden hand of the trolls replaces the invisible hand of the marketplace of ideas. Politics ain’t beanbag, Russian edition. An indictment emerges from the US investigation into possible misconduct during the 201…
 
This week, we bring you The Weekly Defence Podcast from the floor of DSEI 2021 in London, to delve into topics such as the future of the UK exports market and combat engineering vehicles. Newsround [00:00] The Shephard news team unpicks some of the major stories from this week from across the air, land and sea domains. Show highlights include CAE e…
 
Denial-of-service at a German election agency, as Federal prosecutors investigate GhostWriter. More nation-states get into election meddling. South Africa works to recover from a ransomware attack against government networks. A cryptojacking botnet moves from Linux to Windows. A ransomware gang threatens to burn your data if you bring in third-part…
 
In this episode of the Defence Connect Podcast, host Phil Tarrant is joined by shadow minister for defence industry Matt Keogh, who outlines his vision for the future of Australia’s defence industry. The pair begin the podcast by discussing the Commonwealth’s new Sovereign Industrial Capability Priorities, and the importance of translating the prio…
 
That Russian crackdown on ransomware gangs people thought they were seeing? Hasn’t happened, at least according to the FBI. The Cyber Partisans take a virtual whack at President Lukashenka’s government in Belarus. Operation Harvest is complicated and long-running. Phishing with a promise of infrastructure funding. The criminal market for bogus vacc…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login