
Unmasked
Assura, Inc.
A bi-monthly show focusing on cybersecurity, hacker news with a lighter side. Unmasked is a look behind the cyber professionals and will spotlight teammates, community advocators and businesses to give insight to how cybersecurity affects everyone.
Brought to you by Assura. Where the superheroes of cybersecurity provide a clearer understanding of the threats we face in our digital world.
With Host:
Paul Blacker
Web:
https://www.assurainc.com/
All episodes
Best episodes
Seasons
Top 10 Unmasked Episodes
Goodpods has curated a list of the 10 best Unmasked episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Unmasked for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Unmasked episode by adding your comments to the episode page.

10/16/24 • 32 min
Unlock the secrets to navigating the ever-evolving world of cybersecurity and commercial insurance with expert insights from Alan Delahunty of McGriff Insurance. Discover how the complexity of cyber threats is reshaping insurance policies and learn why multi-factor authentication and other security measures are now industry standards. We promise you'll walk away with a deeper understanding of data breaches, identity theft, and the critical need for continuous risk assessment in today's digital landscape.
Peek behind the curtain of cyber insurance policies and uncover the customizable solutions tailored to your industry's specific vulnerabilities. Alan breaks down the nuanced differences between cyber insurance and more straightforward policies like workers' compensation, shedding light on the importance of proactive cyber hygiene and the storytelling required to secure favorable terms from insurance companies. Learn the initial steps businesses should take to ensure they are adequately covered, and why understanding your unique challenges and future outlooks is crucial.
Finally, explore the practical steps involved in implementing robust cybersecurity policies within your organization. From the evolution of multi-factor authentication to the financial considerations of proactive measures versus the staggering costs of ransomware attacks, we cover it all. Alan shares his expertise on balancing costs and security needs, emphasizing the necessity of ongoing education and vigilance against ever-changing cyber threats like QR code manipulation and sophisticated phishing scams. Don't miss this essential guide to staying ahead in the relentless battle against cybercrime.

06/10/24 • 23 min
Curious about how a 23-year Air Force veteran transitions into a leading role in network security? Join us as we chat with Dave Mizell, the Managing Director of Defensive Cybersecurity at Assura, Inc. Cybersecurity. Dave opens up about his initial experiences in a Security Operations Center (SOC) and the rapid learning curve he faced. You'll hear firsthand about the day-to-day operations and challenges his lean, yet highly effective team encounters while ensuring 24/7 security coverage. Plus, get the inside scoop on how advancements in Security Incident and Event Monitoring (SIEM) systems have transformed threat detection and analysis.
Ever wondered how sophisticated phishing attacks have become and the best strategies to combat them? Dave breaks it down, revealing how AI tools like ChatGPT are making fraudulent emails harder to spot and why multi-factor authentication is more crucial than ever. We also discuss the role of human awareness and training in cybersecurity, while acknowledging the limitations posed by human error. Dave offers practical advice on what to do if your organization gets hacked, stressing the importance of network segmentation, protecting critical assets both on-premises and in the cloud, and the immediate steps to take post-breach.
For those looking to enter the cybersecurity field or enhance their skills, this episode is packed with invaluable insights. Dave shares effective training models, emphasizing hands-on exercises like tabletop and disaster recovery training for real-world readiness. He also offers career advice, highlighting the significance of curiosity and investigative skills over mere experience. To wrap things up, we take a nostalgic trip back to the early days of computer gaming, discussing how those experiences can ignite a passion for technology and cybersecurity. Plus, we pay tribute to the amazing skill of Navy pilots and the challenges they face, rounding off with a heartfelt thank you to Dave for his incredible insights and time.

11/28/23 • 35 min
Join us for another riveting episode of Unmasked to close out November. Get ready to dive into recent cybersecurity events and hot topics. We dissect AI's use across multiple industries, examining how it's trained for specific tasks and discussing its limitations. And for those of you who are looking to break into or progress in the cybersecurity job market, we share insights on the critical role of certifications. But remember, it's not just about having a certification, it's about gaining practical skills and hands-on experience. So listen in, sit back and let's navigate the complex world of cybersecurity together. You won't want to miss this!
SHOW NOTES:
Whitehouse AI :President Biden Issues Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence
- The Executive Order establishes new standards for AI safety and security, protects Americans’ privacy, advances equity and civil rights, stands up for consumers and workers, promotes innovation and competition, advances American leadership around the world, and more.
- It builds on previous actions the President has taken, including work that led to voluntary commitments from 15 leading companies to drive safe, secure, and trustworthy development of AI.
- New Standards for AI Safety and Security
- Require that developers of the most powerful AI systems share their safety test results and other critical information with the U.S. government.
- Develop standards, tools, and tests to help ensure that AI systems are safe, secure, and trustworthy
- Protect against the risks of using AI to engineer dangerous biological materials
- Protect Americans from AI-enabled fraud and deception by establishing standards and best practices for detecting AI-generated content and authenticating official content
- Establish an advanced cybersecurity program to develop AI tools to find and fix vulnerabilities in critical software
- Order the development of a National Security Memorandum that directs further actions on AI and security
- Protecting Americans’ Privacy
- Advancing Equity and Civil Rights
- Standing Up for Consumers, Patients, and Students
- Supporting Workers
- Advancing American Leadership Abroad
- Ensuring Responsible and Effective Government Use of AI
Cybersecurity Education
Empowering Educators to Teach Cyber | Cyber.org
A Workforce development Organization
Funding from CISA
(Cybersecurity and Infrastructure Security Agency)
Director Jen Easterly
- US Army Intel
With Partnership with National Cyber Scholarship Foundation.
Has a cyber range for K-12 students to learn and practice safely
Path way to the basic certs: A+, Net+ Sec+, etc
ISC^2
(International Information System Security Certification Consortium)
Offering the CC free for a limited time.
(Certified in Cyber)
A entry level certification, perfect start for a lot of people high-school and above.
Options for hands on learning
- SANS holiday hack
- Try hack me- holiday hack

08/21/23 • 40 min
In the latest Unmasked episode, we're taking a deep dive into August headlines, unpacking all the threats and vulnerabilities that lurk in our digital realm. We're covering some major ground, from the Burger King data breach to unsettling cyber attacks on hospital EMR systems.
Join us as we also get into the nitty-gritty of credential-stuffing attacks, exploring the quirky world of threat group naming, and delving into the intriguing realm of side channel attacks – it's like something out of a spy movie!
Cybersecurity is like a never-ending puzzle, always evolving. So, keep your eyes peeled, stay informed, and remember that things are rarely straightforward in the world of cybersecurity!
You can subscribe to Unmasked wherever you get your podcasts.
Show notes
Headlines for beginning of August
- Emergency Rooms in 5 states shut down due to cyber attack
- WhatA- cyberattack has disrupted hospital computer systems in several states, forcing some emergency rooms to close and ambulances to be diverted
- The “data security incident” began Thursday at facilities operated by Prospect Medical Holdings, which is based in California
- Then spread to Texas, Connecticut, Rhode Island and Pennsylvania.
- Ransomware Attack Disrupts Health Care in at Least Three States - The New York Times (nytimes.com)
- Burger King's Data Breach Exposes Sensitive Credentials
- Experienced a serious data breach that made private login information public
- Security Affairs was first to note the vulnerability
- Exposed credentials could be exploited be malicious actors to access additional systems, perpetrate identity theft or launch targeted attacks on induvial and organizations to the breached data
- Burger King has reportedly taken immediate steps to rectify the situation
Additional: Burger King Serves Up Sensitive Data, No Mayo (darkreading.com)
- Retail chain Hot Topic discloses wave of credential-stuffing attacks (bleepingcomputer.com)
- Sub topic: What is "Credential Stuffing"?
- Microsoft shifts to a new threat actor naming taxonomy | Microsoft Security Blog
- New naming conventions
- Weather related names (Blizzard, Sleet, Typhoon)
- Does this help or hurt?
- Need we ask, does this "water down the threats?" "Downpour of confusion?"
- Table with APT names: How Microsoft names threat actors | Microsoft Learn
- Acoustic attack
New 'Deep Learning Attack' Deciphers Laptop Keystrokes with 95% Accuracy (thehackernews.com)
- This is one of those things people love to make sound magic.
- Sensitive compartmented information facility - Wikipedia

08/04/23 • 40 min
Welcome to the latest episode of Unmasked. In this episode, we dive into the end of July headlines, covering a class action lawsuit against John Hopkins following a major data breach, emphasizing the need for better data handling and security practices. We also explore the complexities of IoT device regulation, questioning the absence of tech giants like Apple and Microsoft in this area. The episode educates listeners on online scams and provides essential tips to avoid falling victim to phishing tactics. Additionally, it stresses the importance of timely software updates and informed decision-making to enhance cybersecurity in the digital realm. All this and the building anticipation of the upcoming DEFCON.
Episode 3 show notes:
Headlines for the end of July
- John Hopkins- Hit with Class Action Lawsuit connected to data breach
- Filed by the patient named Pamela Hunter, alleges that Hopkins "failed to properly secure and safeguard" patients' personal and medical information.
- If based on original MoveIT breach- not their fault/ hard to prove
- If plaintiff can prove negligence, then potential cancelation of cybersecurity insurance policy etc.
- Biden Administration is tackling smart devices with a new label
- US Cyber Trust Mark- would require smart products to meet certain thresholds, including ongoing software security support, to qualify for the program
- FCC says the mark will signify that the devices meet/ and maintain certain standards
- Main devices would be smart home appliances, TV's, climate controllers, but also list smart fitness tracker
- Mark would be a shield – indicating that that device is meeting the standards
- Participating manufactures and retailers are: Amazon, Google, Samsung, Logitech, Best Buy
- Back to School Scams- Amazon Releases Scam warning email to all customers
- Unexpected calls, texts, emails that refer to costly membership fees going up if you do not act now...
- Issues with your membership- asking for bank account/ payment info
- Amazon issues warnings:
- Trust Amazon –owned channels
- Beware of false urgency
- Never pay over the phone
- Verify links first
- Apple fixes new Zero Day threat
- Apple is aware of a report that this issue may have been actively exploited," the company said in an advisory describing a WebKit flaw tracked as CVE-2023-37450 that was addressed in a new round of Rapid Security Response (RSR) updates earlier this month.
- The other zero-day patched today is a new Kernel flaw tracked as CVE-2023-38606 that was exploited in attacks targeting devices running older iOS releases.
- exploited against versions of iOS released before iOS 15.7.1
- DEFCON – Mark to interview industry folks while out in Las Vegas this week

08/07/24 • 46 min
Ever wondered how a young entrepreneur juggles the fast-paced world of tech sales and the demands of higher education? Meet Will Melton, the dynamic CEO of Exponent 21, who shares his fascinating journey from childhood ventures to helming a thriving company by the age of 20. Will's knack for marketing and creativity shines through as he discusses his early business endeavors, the challenges he faced while living in Connecticut, and how he managed to keep his client relationships intact amid life's twists and turns. His story is one of resilience and continuous learning, providing a treasure trove of insights for aspiring entrepreneurs.
The digital marketing landscape has transformed dramatically from 2011 to 2024, and Will provides a detailed chronicle of this evolution. Remember the days when businesses could thrive effortlessly with Google Ads? That’s ancient history now. Will discusses how the field has grown fiercely competitive and heavily automated, with AI playing a crucial role. Yet, amidst this technological advancement, he emphasizes the enduring importance of a robust brand presence and human ingenuity in campaign management. This segment is a must-listen for anyone navigating the complexities of modern marketing.
Tackling sustainability head-on, we explore Will's ambitious project of creating a sustainable water brand in Richmond. From pioneering refillable aluminum bottles to installing interactive outdoor refill stations, this venture aims to redefine how we think about consumption and waste. Will also dives into the broader implications of AI in marketing strategies, the psychological aspects of user experience, and Exponent 21's future goals, including video production and franchising Richmond Water. This episode is packed with innovative ideas and practical solutions for those passionate about sustainability and cutting-edge marketing practices. Engage with us on LinkedIn for more insights!

10/09/23 • 48 min
Ever wondered what it's like to infiltrate a ransomware gang? Well, you're about to find out. We're joined by Jon DiMaggio, Chief Security Strategist at Analyst1 and author of the Art of Cyberwarfare, who takes us on a thrilling journey into the perilous world of ransomware. This episode is a fusion of intriguing narratives from Jon's gripping investigative series, the Ransomware Diaries, and deep insights into the rising menace of ransomware attacks, brought to life by the recent MGM and Caesars attack.
Our conversation spirals into the darker corners of the cyber world, where young minds are being molded into cybercriminals. Jon walks us through the chilling reality of how online forums have become the breeding ground for these young cybercriminals, mentoring them into the world of ransomware. He shares firsthand accounts from his Ransom Mafia project, exposing the distinct playbooks of various ransomware groups, shedding light on their strategies, and offering a deep understanding of their operations.
As we dive deeper, we underline the importance of robust cybersecurity practices, from efficient password management to timely patching. We brainstorm on the critical role of artificial intelligence in enhancing security mechanisms and its potential contribution to fighting ransomware. As we wrap up this whirlwind tour of the cyber underworld, we touch upon tech support scams, the desperate need for better regulations, and how training and preparedness can help organizations armor up against potential threats.
This is an episode you don't want to miss!
More about our special guest:
Jon DiMaggio (https://www.linkedin.com/in/jondimaggio/)The Chief Security Strategist at Analyst1
The Author of The Art of Cyberwarfare, get it from No Starch Press (https://nostarch.com/art-cyberwarfare)
Ransomware Diaries -
https://analyst1.com/ransomware-diaries-volume-2/ https://analyst1.com/ransomware-diaries-volume-3-lockbits-secrets/
Jon has over 15 years of experience hunting, researching, and writing about advanced cyber threats.
As a specialist in enterprise ransomware attacks and nation-state intrusions, including the world’s first ransomware cartel and the infamous Black Vine cyberespionage group, he has exposed the criminal organizations behind major ransomware attacks, aided law enforcement agencies in federal indictments of nation-state attacks, and discussed his work with The New York Times, Bloomberg, Fox, CNN, Royters, and Wired.
ARTICLE LINKS:
MGM, Caesars File SEC Disclosures on Cybersecurity Incidents (darkreading.com)
MGM Hack
- Looks Like MGM Resorts Just Get Hacked (msn.com)
- MGM Resorts: Slot machines go down in cyber-attack on firm - BBC News
- MGM Resorts shuts down IT systems after cyberattack (bleepingcomputer.com)
- Casino hackers demanded ransoms from MGM and Caesar's (qz.com)
https://www.darkreading.com/application-security/okta-flaw-involved-mgm-resorts-breach-attackers-claim

09/18/23 • 49 min
Welcome back for episode six of Unmasked! This week, we take a deep dive into the headlines of September, providing you with valuable context and insights into the latest cybersecurity events. The reverberations of the MOVEit disaster are still keenly felt, and this time, they've led to a class-action lawsuit against Progress Software, with over 600 organizations seeking answers. The pivotal question we dissect is, who bears the ultimate responsibility when software vulnerabilities trigger catastrophic data breaches? This legal battle against Progress Software isn't merely another courtroom drama; it has the potential to reshape the entire landscape of software liability.
But that's not all! We swiftly shift gears to explore the world of secure practices for managing password changes and account requests. In a digital age where even well-intentioned service desk personnel can inadvertently pose security risks, we delve into a treasure trove of strategies organizations can adopt to fortify their defenses.
Our journey continues, though. We fearlessly navigate the uncharted waters of the digital realm, unveiling the myriad cyber threats that lurk in the internet's darkest corners. From exploiting software vulnerabilities to orchestrating extortion and romance scams, we shine a powerful spotlight on the cunning tactics employed by cybercriminals as they attempt to infiltrate personal data and seize valuable assets.
All this and more await for your cyber-listening pleasure!
You can subscribe to Unmasked on Spotify, Amazon, or wherever you get your podcasts.
Show notes
Headlines for early September
Software Makers May Face Greater Liability in Wake of MOVEit Lawsuit (darkreading.com)
- A nationwide class-action suit filed against Progress Software in the wake of the massive MOVEit breach could point to additional litigation against software companies whose vulnerable applications are exploited in large-scale supply chain attacks, a legal expert says.
- filed by consumer-rights law firm Hagens Berman
- compromised the sensitive personal information of more than 40 million people, and promises that more class actions are on the way as more of the 600 affected organizations come forward.
Okta: Hackers target IT help desks to gain Super Admin, disable MFA
- Okta released a warning about social engineering attacks targeting IT service desk agents at U.S.-based customers in an attempt to trick them into resetting multi-factor authentication (MFA) for high-privileged users.
- attackers' goal was to hijack highly-privileged Okta Super Administrator accounts
- The hackers used their admin access to elevate privileges for other accounts, reset enrolled authenticators, and they also removed the two-factor authentication (2FA) protection for some accounts.
Children's snack recalled after its website caught serving porn
- Supermarket chain Lidl has been recalling four types of PAW Patrol-themed snacks across the UK.
- Last month, Lidl stores across the UK started recalling four types of PAW Patrol snacks because of an issue with its packaging. According to the retailer, a URL printed on the snack's packaging was compromised and, to everyone's

09/04/23 • 38 min
In this thrilling episode of Unmasked, our cybersecurity superheroes plunge headfirst into the late August headlines to uncover the most cutting-edge and formidable cyberattacks. Fasten your seatbelts and ensure your hands remain securely inside the vehicle as we embark on an exhilarating journey through the world of cybersecurity.
Along our path, we'll make intriguing stops, including a detour through the realm of deceptive Amazon ads on Google, an exploration of Tesla's security breach stemming from an insider threat, and a stealthy incursion targeting the renowned international snack-maker, Mondelez, by way of a third-party partner. You might recognize Mondelez from their household snack brands like Ritz and Honey Maid. All this and much more await you in this week's gripping episode.
You can subscribe to Unmasked on Spotify, Amazon, or wherever you get your podcasts.
Show notes:
August Headlines
Sneaky Amazon Google ad leads to Microsoft support scam (bleepingcomputer.com)
- Classic Tech Support scam
- But done in clever way
- Data leaked to German media
- Former employees behind the breach
- Employees misappropriated the information
Hackers ask $120,000 for access to multi-billion auction house (bleepingcomputer.com)
- IABs
- initial access through VPN or RDP
- privileges associated with the access accounts ranged from cloud administrator (14 cases) to local admin (5 cases) and domain user (2 cases)
- positive side effects, such as uncovering areas that need stronger security or identifying devices, services, and accounts that could pose a risk.
Mondelez says crooks stole staff data in security breach • The Register
- Mondelez International – Parent company for Oreo and Ritz Crackers and many others
- 51,000 of its past and present employees that their personal information has been stolen from a law firm hired by the Oreo and Ritz cracker
- Mondelez was among the global companies hit in the NotPetya outbreak — and it recently settled its lawsuit against Zurich American Insurance Company, which it brought because the insurer refused to cover Mondelez's $100-million-plus cleanup bill
- data may have been compromised for 24 months.

10/31/23 • 33 min
Join us for this very special episode as we sit down with the IT and Security experts from the University of Richmond. John Craft (Director of Information Security), Keith McIntosh (Chief Information Officer), and Svetla Walsh (Information Security Analyst) discuss their upcoming Capture the Flag (CTF) event. Get to know them beyond their professional titles as we break the ice with fun tidbits on their favorite cybersecurity-themed books and TV shows.
We're not just about the banter, though. We also venture into the exhilarating world of CTF, an event that's not just about winning but also sharpening technical abilities and soft skills. Discover strategies to earn flags and points and how to work together in a team to maximize strengths. We wrap up by contemplating the future of CTFs in higher education, including the promising idea of inter-university collaborations. So, whether you're a cybersecurity veteran or a curious newbie, tune in for an informative and entertaining episode.
Show more best episodes

Show more best episodes
FAQ
How many episodes does Unmasked have?
Unmasked currently has 21 episodes available.
What topics does Unmasked cover?
The podcast is about Podcasts, Technology, Cyber, Business, Hacker and Cybersecurity.
What is the most popular episode on Unmasked?
The episode title 'Special Guest: Bryan Carnahan, Director of Governance, Risk and Compliance' is the most popular.
What is the average episode length on Unmasked?
The average episode length on Unmasked is 37 minutes.
How often are episodes of Unmasked released?
Episodes of Unmasked are typically released every 18 days, 7 hours.
When was the first episode of Unmasked?
The first episode of Unmasked was released on Jul 12, 2023.
Show more FAQ

Show more FAQ