Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
headphones
The Security Swarm Podcast

The Security Swarm Podcast

Hornetsecurity

Welcome to The Security Swarm Podcast – a weekly conversation of the most critical issues facing the world of cybersecurity today, hosted by Andy Syrewicze, Security Evangelist at Hornetsecurity. From the malicious use of AI tools to social engineering scams, each episode hones in on a pertinent topic dissected by an industry expert and backed up by real-world data direct from our Security Lab. The world of cybersecurity should not be taken on alone – it’s time to join the swarm.
bookmark
Share icon

All episodes

Best episodes

Top 10 The Security Swarm Podcast Episodes

Goodpods has curated a list of the 10 best The Security Swarm Podcast episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to The Security Swarm Podcast for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite The Security Swarm Podcast episode by adding your comments to the episode page.

The Security Swarm Podcast - Monthly Threat Report - January 2024

Monthly Threat Report - January 2024

The Security Swarm Podcast

play

01/17/24 • 52 min

We're kicking off 2024 with our Monthly Threat Report analysis. Every month, our Security Lab looks into M365 security trends and email-based threats and provides commentary on current events in the cybersecurity space.

In this episode, Andy and Eric Siron discuss the Monthly Threat Report for January 2024. Tune in to learn about the top-targeted industries, brand impersonations, the MOVEit supply chain attack, the active attack by the Iranian hacking group "Homeland Justice" on the Albanian government, and much more!

Episode Resources:

Full Monthly Threat Report for January 2024

Annual Cyber Security Report 2024

Andy on LinkedIn , Twitter , Mastodon

Eric on Twitter

bookmark
plus icon
share episode
The Security Swarm Podcast - Passkeys: The Future of Authentication?

Passkeys: The Future of Authentication?

The Security Swarm Podcast

play

04/04/24 • 38 min

We're thrilled to have Jan Bakker, a seasoned Cloud Consultant with over 10 years of IT experience, joining us from the Netherlands. In this episode, Andy and Jan explore the revolutionary concept of passkeys, a technology that aims to replace traditional passwords and enhance security by providing phishing resistance. The conversation delves into the significance of passkeys and their value in improving user experience and security measures. The guys even discuss what is currently known publicly about passkeys in M365.

Key takeaways

  • Passkeys offer a more secure and user-friendly alternative to traditional passwords by eliminating the need for storing secrets on the server side.
  • Public key cryptography forms the foundation of passkeys, ensuring strong authentication without the risk of password breaches.
  • Passkeys provide phishing resistance and streamline the authentication process for end users, reducing the reliance on complex passwords and additional MFA steps.
  • While passkeys offer significant security benefits, they are not a standalone solution and should be complemented with other security measures such as phishing prevention and identity protection strategies.

Timestamps:

(00:13) - Unveiling the Power of Pass Keys in Cybersecurity with Jan Bucker

(03:47) - The Rise of MFA Bypass Kits and Adversary in the Middle Attacks

(14:55) - Unlocking the Future of Passwordless Authentication with Passkeys

(24:55) - Addressing Persistent Access in Malicious Apps and OAuth: A Call for Improved Security Practices

(29:59) - Unpacking the Importance of Phishing Resistance and Token Security in Cybersecurity

(33:01) - Enhancing Security with Passkeys and Onboarding Procedures in Public Services

Episode resources:

Passkeys Directory

Jan Bakker’s website

The Security Swarm Podcast - EP24: The Danger of Malicious OAuth Apps in M365

Start your free trial of M365 Total Protection

bookmark
plus icon
share episode

Today’s episode of the Security Swarm Podcast is a continuation from last week’s episode where Andy and Paul discussed the CSRB’s findings on Microsoft’s Storm-0558 Breach. In their discussion, they continue picking apart the findings and providing their insights.

Episode Resources:

Cyber Safety Review Board Report

bookmark
plus icon
share episode
The Security Swarm Podcast - EP02: How Tech Pros Handle Security News
play

04/26/23 • 29 min

Welcome back for another episode of the Security Swarm Podcast, the podcast that brings you the insights and expertise straight from the Security Lab here at Hornetsecurity. In this episode, we’ll be diving into recent security disclosures with Eric Siron, Microsoft MVP, and discussing how organizations should respond when vulnerabilities are discovered.

We’ll focus on two major incidents as examples throughout this episode; the Outlook Vulnerability CVE-2023-23397, and the re-emergence of Emotet.

In today’s digital landscape, threats are constantly evolving and becoming more sophisticated, making it critical to respond quickly and efficiently minimize the impact of such incidents. Whether you’re a SysAdmin working in a small organization or the CISO of a large business, you have to be more vigilant, and have a plan.

Tune in to learn valuable insights into how tech professionals should handle security news.

Timestamps:

3:16 – A baseline example of a busy security news-cycle

8:00 – Keeping an eye on the security news-cycle and has it always been this way?

17:45 – What should organizations be doing to keep tabs on the security news-cycle?

23:21 – What can vendors be doing better to help SysAdmins handle security news?

Episode resources:

CVE-2023-23397

The Re-Emergence of Emotet

Hornetsecurity July 2022 Threat Review with Talk of Qakbot

White House to Shift Cybersecurity Burden

Andy on LinkedIn , Twitter , Mastodon

Eric on Twitter

bookmark
plus icon
share episode
The Security Swarm Podcast - CrowdStrike Saga Continues, CUPS Vulnerability and More
play

10/09/24 • 49 min

In this episode of the Security Swarm Podcast, our host Andy Syrewicze and one of our regular guests, Eric Siron discuss the latest quarterly threat report from Hornetsecurity. They dive into data points such as the breakdown of email threats, most common malicious file types, targeted industry verticals, and brand impersonations.

The conversation also covers recent security news, including Microsoft's efforts to address the aftermath of the CrowdStrike incident and a high-severity vulnerability in the Linux CUPS system. The hosts provide valuable insights and analysis, highlighting trends in the threat landscape and the evolving tactics of cybercriminals.

Do you want to join the conversation? Join us in our Security Lab LinkedIn Group!

Key Takeaways:

  • Quarterly threat report data shows an increase in email threats in Q3 compared to Q2, driven by the ending of the summer vacation months.
  • PDF, archive, and HTML files remain the top malicious file types used by threat actors.
  • Microsoft is exploring ways to reduce security vendors' kernel-mode access after the Crowdstrike incident.
  • NIST has updated password guidelines, including recommendations to remove password composition rules and avoid forced password rotations.
  • A high-severity vulnerability in the Linux CUPS system allows remote code execution, highlighting the need to secure critical services.
  • The importance of securing the digital supply chain and the risks of supply chain attacks.
  • The challenges of convincing users to adopt secure practices, such as using password managers.

Timestamps:

(03:33) Breakdown of email threats by category

(06:58) Most common malicious file types

(11:46) Targeted industry verticals

(19:52) Impersonated brands

(22:33) Discussion of Microsoft's efforts after the Crowdstrike incident

(37:19) NIST's updated password guidelines.

Episode Resources:

Hornetsecurity Monthly Threat Reports can be found here

--

Protect Your Business from Advanced Threats! Ensure your organization is safeguarded against sophisticated attacks by leveraging Hornetsecurity's Advanced Threat Protection (ATP). Stay secure and informed—discover more here!

bookmark
plus icon
share episode
The Security Swarm Podcast - Monthly Threat Report - November 2023

Monthly Threat Report - November 2023

The Security Swarm Podcast

play

11/17/23 • 40 min

The Monthly Threat Report by Hornetsecurity brings you monthly insights into M365 security trends, email-based threats, and commentary on current events in the cybersecurity space. This edition of the Monthly Threat Report focuses on data from October.

During the episode, Andy and Eric Siron explore the rise of PDF-delivered malicious payloads, shifts in target industries, and escalating brand impersonation attempts in shipping and finance. They delve into Microsoft’s response to a recent cloud services attack and a significant vulnerability in Citrix NetScalers dubbed CitrixBleed, shedding light on the evolving threat landscape.

Join us for an insightful analysis of the latest cybersecurity developments, providing valuable insights for both professionals and enthusiasts alike.

Timestamps:

(3:07) – What is the general state of email threats during the last month?

(6:31) – What types of files are being used to deliver malicious files?

(9:38) – What industries are being targeted the most throughout the data period?

(14:40) – What are the most impersonated brands during the last month?

(18:52) – An update on the Microsoft Storm-0558 breach

(23:01) – The CitrixBleed Vulnerability Impacting Citrix NetScaler

(30:31) – Commentary on the SEC’s charges against SolarWinds and their CISO

Episode Resources:

Full Monthly Threat Report for November

Law Enforcement Shutdown of Qakbot

Paul and Andy Discuss Storm-0558

Security Awareness Service - Request Demo

Andy on LinkedIn , Twitter , Mastodon

Eric on Twitter

bookmark
plus icon
share episode
The Security Swarm Podcast - CrowdStrike Chaos, VMware ESXi Vulnerability & More
play

08/14/24 • 46 min

In today’s episode of the Security Swarm Podcast, Andy and Eric Siron discuss the Monthly Threat Report of August 2024. They cover the aftermath of the CrowdStrike incident, Microsoft's proposed enhancements to improve the security of their ecosystem, as well as the discovery of a vulnerability in AMD processors that could allow persistent malware.

Additionally, they discuss the emergence of new AI jailbreak attacks, which can bypass content restrictions and generate harmful outputs and a VMware ESXi vulnerability that could allow attackers to gain access to virtual machines.

Key Takeaways:

  • The CrowdStrike incident highlights the need for rigorous software testing.
  • Microsoft is moving forward with some changes and guidance on kernel access as a direct response to the CrowdStrike incident.
  • Researchers have discovered a vulnerability in AMD processors that could allow threat actors to embed persistent malware, underscoring the ongoing battle against advanced threats.
  • The Olympic Games have been the target of dozens of foiled cyberattacks, demonstrating the high-stakes nature of nation-state cyber conflicts.
  • There is a new critical vulnerability in the VMware ESXi Hypervisor that allows authentication bypass. Broadcom has released a patch

Timestamps:

(01:00) CrowdStrike Incident and Lessons Learned

(04:14) Importance of Proper Software Testing and Development Processes

(7:21) Potential Consequences of Rushed Software Updates

(28:18) AI Jailbreak Attacks and Generative AI Risks

(33:43) VMware ESXi Vulnerability and Potential Ransomware Implications

(37:53) Bumblebee Loader and the Threat of Rapid Active Directory Compromise

(39:41) HealthEquity Data Breach and the Normalization of PII Breaches

(40:17) Anonymous Sudan and Their Disruptive DDOS Attacks

(41:54) Cyber Attacks on the Olympic Games and the Role of Nation-State Actors

Episode Resources:

Full Monthly Threat Report

Podcast episode on Anonymous Sudan

AMD CPU Vulnerability Info

Webinar where Andy covers the ways threat actors use Generative AI

VMware ESXi Authentication Bypass Exploit

Security Swarm Podcast re: threat actor attacks on the Olympic Games

bookmark
plus icon
share episode
The Security Swarm Podcast - Data Broker Breaches - Insider Threats and More
play

09/19/24 • 40 min

In this episode of the Security Swarm Podcast, host Andy Syrewicze and guest Eric Siron provide a comprehensive monthly threat review. They cover several major cybersecurity incidents and trends from the past month, including:

  • The massive data breach at data broker National Public Data exposed over 2.9 billion personal information records. They discuss the risks of this breach, such as increased targeted phishing and social engineering attacks.
  • A joint government agency warning about the Ransom Hub ransomware has impacted over 200 victims since February 2022, including critical infrastructure and high-profile organizations.
  • A case study of an IT administrator who held his employer's systems for ransom by deploying logic bombs, highlighting the risks of insider threats even within trusted IT teams.

They also touch on the topics of vendor risk management and the history of election tampering and provide recommendations for organizations to mitigate these threats. In conclusion, EP62 provides valuable insights into the ever-changing cybersecurity landscape and offers practical advice for security professionals.

Do you want to join the conversation? Join us in our Security Lab LinkedIn Group!

Key Takeaways:

  • The National Public Data breach exposed a vast amount of personal information, including names, email addresses, phone numbers, Social Security numbers, and more. This creates risks of more targeted phishing and social engineering attacks.
  • The continued use of easily abused identification methods like Social Security numbers underscores the urgent need to explore more secure alternatives, such as cryptographic key pairs. This is crucial in reducing the risks of identity theft.
  • Insider threats from trusted IT staff members can pose a significant risk, as evidenced by the case of an IT admin holding their employer's systems for ransom. Implementing practices like just-in-time administration and least-privilege access is crucial to mitigate these potentially devastating threats.
  • Overreliance on cloud-based services and a single vendor for critical business functions can lead to vendor risk and single points of failure.
  • Election security remains a significant concern, with the threat of interference and disinformation campaigns continuing. Ensuring robust cybersecurity measures at the state and local levels is crucial for protecting the integrity of elections.

Timestamps:

(03:17) The National Public Data Breach

(12:21) The Issues with Social Security Numbers

(18:02) The Danger of Insider Threats

(27:10) The Risks of Vendor Dependence

(34:12) Recommendations for Protecting Against Threats

Episode Resources:

Security Lab LinkedIn Group

In-depth analyses from Hornetsecurity’s Security Lab

#StopRansomware: RansomHub Ransomware | CISA

Passkeys in Microsoft Entra: Benefits, Implementation Tips & More (hornetsecurity.com)

How Threat Actors Tamper with Elections (hornetsecurity.com)

--

Secure your organization against the evolving threat landscape! Discover how Hornetsecurity's Advanced Threat Protection, Security Awareness Service, and 365 Total Protect...

bookmark
plus icon
share episode
The Security Swarm Podcast - EP16: Backup’s Modern Role in Security
play

08/01/23 • 28 min

In today's episode, Andy has a special guest from our product development team at Hornetsecurity - Jean Paul (JP) Callus. The episode goes into an insightful discussion on how threats have morphed over the years. Andy and Jean Paul recount the days when backup primarily served as a safety net against accidental data loss and hardware failures. Fast forward to today, and backups have become a key weapon in the fight against ransomware and other sophisticated attacks.

Tune in to discover the power of modern backups in the ever-evolving world of cybersecurity and how organizations can establish seamless data protection measures, ensuring minimal data loss and downtime in the face of cyber threats.

Timestamps:

(2:16) – Ransomware continues to drive backup and recovery decisions.

(10:10) – How has the industry traditionally mitigated ransomware and how are things done now?

(14:13) – Revisiting the 3-2-1 backup strategy and adding an extra “1”

(16:10) – Cloud backups and WORM (Write Once Read Many) states.

(19:10) – What other backup technologies play a role in security?

(23:43) – Deduplication, Immutability, and Backup

Episode resources:

Podcast EP01: We Used ChatGPT to Create Ransomware

Podcast EP05: What is Immutability and Why Do Ransomware Gangs Hate it?

Hornetsecurity Ransomware Attack Survey

VM Backup V9

The Backup Bible

Find Andy on LinkedIn, Twitter or Mastadon

Find Jean Paul on LinkedIn

bookmark
plus icon
share episode
The Security Swarm Podcast - Co-Pilot and Misconfigured Permissions - A Looming Threat?
play

02/14/24 • 32 min

The use of Large Language Models (LLMs), like ChatGPT has skyrocketed, infiltrating multiple facets of modern life. In today's podcast episode, Andy and Paul Schnackenburg explore Microsoft 365 Co-Pilot and some surprising risks it can surface. Microsoft 365 Co-Pilot is more than just a virtual assistant: it's a powerhouse of productivity! It is a versatile generative AI tool that is embedded within various Microsoft 365 applications, and as such, it can execute various tasks across different software platforms in seconds.

Amidst discussions about Co-Pilot’s unique features and functionalities, many wonder: How does M365 Co-Pilot differ from other LLMs, and what implications does this hold for data security and privacy? Tune in to learn more!

Timestamps:

(4:16) – How is Co-Pilot different from other Large Language Models?

(11:40) – How are misconfigured permissions a special danger with Co-Pilot?

(16:53) – How do M365 tenant permission get so “misconfigured”?

(21:53) – How can your organization use Co-Pilot safely?

(26:11) – How can you easily right-size your M365 permissions before enabling Co-Pilot?

Episode Resources:

Paul’s article on preparing for Co-Pilot

Webinar with demo showcasing the theft of M365 credentials

Start your free trial of M365 Total Protection

Effortlessly manage your Microsoft 365 permissions

bookmark
plus icon
share episode

Show more best episodes

Toggle view more icon

FAQ

How many episodes does The Security Swarm Podcast have?

The Security Swarm Podcast currently has 78 episodes available.

What topics does The Security Swarm Podcast cover?

The podcast is about News, Tech News, Podcasts and Technology.

What is the most popular episode on The Security Swarm Podcast?

The episode title 'EP07: A Discussion and Analysis of Qakbot' is the most popular.

What is the average episode length on The Security Swarm Podcast?

The average episode length on The Security Swarm Podcast is 36 minutes.

How often are episodes of The Security Swarm Podcast released?

Episodes of The Security Swarm Podcast are typically released every 7 days, 1 hour.

When was the first episode of The Security Swarm Podcast?

The first episode of The Security Swarm Podcast was released on Apr 18, 2023.

Show more FAQ

Toggle view more icon

Comments