The Security Swarm Podcast
Hornetsecurity
All episodes
Best episodes
Top 10 The Security Swarm Podcast Episodes
Goodpods has curated a list of the 10 best The Security Swarm Podcast episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to The Security Swarm Podcast for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite The Security Swarm Podcast episode by adding your comments to the episode page.
Monthly Threat Report - January 2024
The Security Swarm Podcast
01/17/24 • 52 min
We're kicking off 2024 with our Monthly Threat Report analysis. Every month, our Security Lab looks into M365 security trends and email-based threats and provides commentary on current events in the cybersecurity space.
In this episode, Andy and Eric Siron discuss the Monthly Threat Report for January 2024. Tune in to learn about the top-targeted industries, brand impersonations, the MOVEit supply chain attack, the active attack by the Iranian hacking group "Homeland Justice" on the Albanian government, and much more!
Episode Resources:
Full Monthly Threat Report for January 2024
Annual Cyber Security Report 2024
Passkeys: The Future of Authentication?
The Security Swarm Podcast
04/04/24 • 38 min
We're thrilled to have Jan Bakker, a seasoned Cloud Consultant with over 10 years of IT experience, joining us from the Netherlands. In this episode, Andy and Jan explore the revolutionary concept of passkeys, a technology that aims to replace traditional passwords and enhance security by providing phishing resistance. The conversation delves into the significance of passkeys and their value in improving user experience and security measures. The guys even discuss what is currently known publicly about passkeys in M365.
Key takeaways
- Passkeys offer a more secure and user-friendly alternative to traditional passwords by eliminating the need for storing secrets on the server side.
- Public key cryptography forms the foundation of passkeys, ensuring strong authentication without the risk of password breaches.
- Passkeys provide phishing resistance and streamline the authentication process for end users, reducing the reliance on complex passwords and additional MFA steps.
- While passkeys offer significant security benefits, they are not a standalone solution and should be complemented with other security measures such as phishing prevention and identity protection strategies.
Timestamps:
(00:13) - Unveiling the Power of Pass Keys in Cybersecurity with Jan Bucker
(03:47) - The Rise of MFA Bypass Kits and Adversary in the Middle Attacks
(14:55) - Unlocking the Future of Passwordless Authentication with Passkeys
(24:55) - Addressing Persistent Access in Malicious Apps and OAuth: A Call for Improved Security Practices
(29:59) - Unpacking the Importance of Phishing Resistance and Token Security in Cybersecurity
(33:01) - Enhancing Security with Passkeys and Onboarding Procedures in Public Services
Episode resources:
The Security Swarm Podcast - EP24: The Danger of Malicious OAuth Apps in M365
A Breakdown of CSRB's Findings on Microsoft Storm-0558 Breach (PART 2)
The Security Swarm Podcast
05/02/24 • 28 min
Today’s episode of the Security Swarm Podcast is a continuation from last week’s episode where Andy and Paul discussed the CSRB’s findings on Microsoft’s Storm-0558 Breach. In their discussion, they continue picking apart the findings and providing their insights.
Episode Resources:
EP02: How Tech Pros Handle Security News
The Security Swarm Podcast
04/26/23 • 29 min
Welcome back for another episode of the Security Swarm Podcast, the podcast that brings you the insights and expertise straight from the Security Lab here at Hornetsecurity. In this episode, we’ll be diving into recent security disclosures with Eric Siron, Microsoft MVP, and discussing how organizations should respond when vulnerabilities are discovered.
We’ll focus on two major incidents as examples throughout this episode; the Outlook Vulnerability CVE-2023-23397, and the re-emergence of Emotet.
In today’s digital landscape, threats are constantly evolving and becoming more sophisticated, making it critical to respond quickly and efficiently minimize the impact of such incidents. Whether you’re a SysAdmin working in a small organization or the CISO of a large business, you have to be more vigilant, and have a plan.
Tune in to learn valuable insights into how tech professionals should handle security news.
Timestamps:
3:16 – A baseline example of a busy security news-cycle
8:00 – Keeping an eye on the security news-cycle and has it always been this way?
17:45 – What should organizations be doing to keep tabs on the security news-cycle?
23:21 – What can vendors be doing better to help SysAdmins handle security news?
Episode resources:
Hornetsecurity July 2022 Threat Review with Talk of Qakbot
White House to Shift Cybersecurity Burden
CrowdStrike Saga Continues, CUPS Vulnerability and More
The Security Swarm Podcast
10/09/24 • 49 min
In this episode of the Security Swarm Podcast, our host Andy Syrewicze and one of our regular guests, Eric Siron discuss the latest quarterly threat report from Hornetsecurity. They dive into data points such as the breakdown of email threats, most common malicious file types, targeted industry verticals, and brand impersonations.
The conversation also covers recent security news, including Microsoft's efforts to address the aftermath of the CrowdStrike incident and a high-severity vulnerability in the Linux CUPS system. The hosts provide valuable insights and analysis, highlighting trends in the threat landscape and the evolving tactics of cybercriminals.
Do you want to join the conversation? Join us in our Security Lab LinkedIn Group!
Key Takeaways:
- Quarterly threat report data shows an increase in email threats in Q3 compared to Q2, driven by the ending of the summer vacation months.
- PDF, archive, and HTML files remain the top malicious file types used by threat actors.
- Microsoft is exploring ways to reduce security vendors' kernel-mode access after the Crowdstrike incident.
- NIST has updated password guidelines, including recommendations to remove password composition rules and avoid forced password rotations.
- A high-severity vulnerability in the Linux CUPS system allows remote code execution, highlighting the need to secure critical services.
- The importance of securing the digital supply chain and the risks of supply chain attacks.
- The challenges of convincing users to adopt secure practices, such as using password managers.
Timestamps:
(03:33) Breakdown of email threats by category
(06:58) Most common malicious file types
(11:46) Targeted industry verticals
(19:52) Impersonated brands
(22:33) Discussion of Microsoft's efforts after the Crowdstrike incident
(37:19) NIST's updated password guidelines.
Episode Resources:
Hornetsecurity Monthly Threat Reports can be found here
--
Protect Your Business from Advanced Threats! Ensure your organization is safeguarded against sophisticated attacks by leveraging Hornetsecurity's Advanced Threat Protection (ATP). Stay secure and informed—discover more here!
Monthly Threat Report - November 2023
The Security Swarm Podcast
11/17/23 • 40 min
The Monthly Threat Report by Hornetsecurity brings you monthly insights into M365 security trends, email-based threats, and commentary on current events in the cybersecurity space. This edition of the Monthly Threat Report focuses on data from October.
During the episode, Andy and Eric Siron explore the rise of PDF-delivered malicious payloads, shifts in target industries, and escalating brand impersonation attempts in shipping and finance. They delve into Microsoft’s response to a recent cloud services attack and a significant vulnerability in Citrix NetScalers dubbed CitrixBleed, shedding light on the evolving threat landscape.
Join us for an insightful analysis of the latest cybersecurity developments, providing valuable insights for both professionals and enthusiasts alike.
Timestamps:
(3:07) – What is the general state of email threats during the last month?
(6:31) – What types of files are being used to deliver malicious files?
(9:38) – What industries are being targeted the most throughout the data period?
(14:40) – What are the most impersonated brands during the last month?
(18:52) – An update on the Microsoft Storm-0558 breach
(23:01) – The CitrixBleed Vulnerability Impacting Citrix NetScaler
(30:31) – Commentary on the SEC’s charges against SolarWinds and their CISO
Episode Resources:
Full Monthly Threat Report for November
Law Enforcement Shutdown of Qakbot
Paul and Andy Discuss Storm-0558
Security Awareness Service - Request Demo
CrowdStrike Chaos, VMware ESXi Vulnerability & More
The Security Swarm Podcast
08/14/24 • 46 min
In today’s episode of the Security Swarm Podcast, Andy and Eric Siron discuss the Monthly Threat Report of August 2024. They cover the aftermath of the CrowdStrike incident, Microsoft's proposed enhancements to improve the security of their ecosystem, as well as the discovery of a vulnerability in AMD processors that could allow persistent malware.
Additionally, they discuss the emergence of new AI jailbreak attacks, which can bypass content restrictions and generate harmful outputs and a VMware ESXi vulnerability that could allow attackers to gain access to virtual machines.
Key Takeaways:
- The CrowdStrike incident highlights the need for rigorous software testing.
- Microsoft is moving forward with some changes and guidance on kernel access as a direct response to the CrowdStrike incident.
- Researchers have discovered a vulnerability in AMD processors that could allow threat actors to embed persistent malware, underscoring the ongoing battle against advanced threats.
- The Olympic Games have been the target of dozens of foiled cyberattacks, demonstrating the high-stakes nature of nation-state cyber conflicts.
- There is a new critical vulnerability in the VMware ESXi Hypervisor that allows authentication bypass. Broadcom has released a patch
Timestamps:
(01:00) CrowdStrike Incident and Lessons Learned
(04:14) Importance of Proper Software Testing and Development Processes
(7:21) Potential Consequences of Rushed Software Updates
(28:18) AI Jailbreak Attacks and Generative AI Risks
(33:43) VMware ESXi Vulnerability and Potential Ransomware Implications
(37:53) Bumblebee Loader and the Threat of Rapid Active Directory Compromise
(39:41) HealthEquity Data Breach and the Normalization of PII Breaches
(40:17) Anonymous Sudan and Their Disruptive DDOS Attacks
(41:54) Cyber Attacks on the Olympic Games and the Role of Nation-State Actors
Episode Resources:
Podcast episode on Anonymous Sudan
Webinar where Andy covers the ways threat actors use Generative AI
VMware ESXi Authentication Bypass Exploit
Security Swarm Podcast re: threat actor attacks on the Olympic Games
Data Broker Breaches - Insider Threats and More
The Security Swarm Podcast
09/19/24 • 40 min
In this episode of the Security Swarm Podcast, host Andy Syrewicze and guest Eric Siron provide a comprehensive monthly threat review. They cover several major cybersecurity incidents and trends from the past month, including:
- The massive data breach at data broker National Public Data exposed over 2.9 billion personal information records. They discuss the risks of this breach, such as increased targeted phishing and social engineering attacks.
- A joint government agency warning about the Ransom Hub ransomware has impacted over 200 victims since February 2022, including critical infrastructure and high-profile organizations.
- A case study of an IT administrator who held his employer's systems for ransom by deploying logic bombs, highlighting the risks of insider threats even within trusted IT teams.
They also touch on the topics of vendor risk management and the history of election tampering and provide recommendations for organizations to mitigate these threats. In conclusion, EP62 provides valuable insights into the ever-changing cybersecurity landscape and offers practical advice for security professionals.
Do you want to join the conversation? Join us in our Security Lab LinkedIn Group!
Key Takeaways:
- The National Public Data breach exposed a vast amount of personal information, including names, email addresses, phone numbers, Social Security numbers, and more. This creates risks of more targeted phishing and social engineering attacks.
- The continued use of easily abused identification methods like Social Security numbers underscores the urgent need to explore more secure alternatives, such as cryptographic key pairs. This is crucial in reducing the risks of identity theft.
- Insider threats from trusted IT staff members can pose a significant risk, as evidenced by the case of an IT admin holding their employer's systems for ransom. Implementing practices like just-in-time administration and least-privilege access is crucial to mitigate these potentially devastating threats.
- Overreliance on cloud-based services and a single vendor for critical business functions can lead to vendor risk and single points of failure.
- Election security remains a significant concern, with the threat of interference and disinformation campaigns continuing. Ensuring robust cybersecurity measures at the state and local levels is crucial for protecting the integrity of elections.
Timestamps:
(03:17) The National Public Data Breach
(12:21) The Issues with Social Security Numbers
(18:02) The Danger of Insider Threats
(27:10) The Risks of Vendor Dependence
(34:12) Recommendations for Protecting Against Threats
Episode Resources:
In-depth analyses from Hornetsecurity’s Security Lab
#StopRansomware: RansomHub Ransomware | CISA
Passkeys in Microsoft Entra: Benefits, Implementation Tips & More (hornetsecurity.com)
How Threat Actors Tamper with Elections (hornetsecurity.com)
--
Secure your organization against the evolving threat landscape! Discover how Hornetsecurity's Advanced Threat Protection, Security Awareness Service, and 365 Total Protect...
EP16: Backup’s Modern Role in Security
The Security Swarm Podcast
08/01/23 • 28 min
In today's episode, Andy has a special guest from our product development team at Hornetsecurity - Jean Paul (JP) Callus. The episode goes into an insightful discussion on how threats have morphed over the years. Andy and Jean Paul recount the days when backup primarily served as a safety net against accidental data loss and hardware failures. Fast forward to today, and backups have become a key weapon in the fight against ransomware and other sophisticated attacks.
Tune in to discover the power of modern backups in the ever-evolving world of cybersecurity and how organizations can establish seamless data protection measures, ensuring minimal data loss and downtime in the face of cyber threats.
Timestamps:
(2:16) – Ransomware continues to drive backup and recovery decisions.
(10:10) – How has the industry traditionally mitigated ransomware and how are things done now?
(14:13) – Revisiting the 3-2-1 backup strategy and adding an extra “1”
(16:10) – Cloud backups and WORM (Write Once Read Many) states.
(19:10) – What other backup technologies play a role in security?
(23:43) – Deduplication, Immutability, and Backup
Episode resources:
Podcast EP01: We Used ChatGPT to Create Ransomware
Podcast EP05: What is Immutability and Why Do Ransomware Gangs Hate it?
Hornetsecurity Ransomware Attack Survey
Find Andy on LinkedIn, Twitter or Mastadon
Find Jean Paul on LinkedIn
Co-Pilot and Misconfigured Permissions - A Looming Threat?
The Security Swarm Podcast
02/14/24 • 32 min
The use of Large Language Models (LLMs), like ChatGPT has skyrocketed, infiltrating multiple facets of modern life. In today's podcast episode, Andy and Paul Schnackenburg explore Microsoft 365 Co-Pilot and some surprising risks it can surface. Microsoft 365 Co-Pilot is more than just a virtual assistant: it's a powerhouse of productivity! It is a versatile generative AI tool that is embedded within various Microsoft 365 applications, and as such, it can execute various tasks across different software platforms in seconds.
Amidst discussions about Co-Pilot’s unique features and functionalities, many wonder: How does M365 Co-Pilot differ from other LLMs, and what implications does this hold for data security and privacy? Tune in to learn more!
Timestamps:
(4:16) – How is Co-Pilot different from other Large Language Models?
(11:40) – How are misconfigured permissions a special danger with Co-Pilot?
(16:53) – How do M365 tenant permission get so “misconfigured”?
(21:53) – How can your organization use Co-Pilot safely?
(26:11) – How can you easily right-size your M365 permissions before enabling Co-Pilot?
Episode Resources:
Paul’s article on preparing for Co-Pilot
Webinar with demo showcasing the theft of M365 credentials
Show more best episodes
Show more best episodes
FAQ
How many episodes does The Security Swarm Podcast have?
The Security Swarm Podcast currently has 78 episodes available.
What topics does The Security Swarm Podcast cover?
The podcast is about News, Tech News, Podcasts and Technology.
What is the most popular episode on The Security Swarm Podcast?
The episode title 'EP07: A Discussion and Analysis of Qakbot' is the most popular.
What is the average episode length on The Security Swarm Podcast?
The average episode length on The Security Swarm Podcast is 36 minutes.
How often are episodes of The Security Swarm Podcast released?
Episodes of The Security Swarm Podcast are typically released every 7 days, 1 hour.
When was the first episode of The Security Swarm Podcast?
The first episode of The Security Swarm Podcast was released on Apr 18, 2023.
Show more FAQ
Show more FAQ