meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

Espionage and counterespionage during the hybrid war. Assessing Russian cyberops. Conti's fate. Investigating cut Internet cables in France. Trends in “pig-butchering.”

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 22 July 2022

⏱️ 28 minutes

🧾️ Download transcript

Summary

Traditional espionage and counterespionage during the hybrid war. Assessing Russian cyberattacks. Conti's fate and effects. Investigating cut Internet cables in France. My conversation with AD Bryan Vorndran of the FBI Cyber Division on reverse webshell operation and Hafnium. Our guest is Tom Kellermann of VMware to discuss the findings of their Modern Bank Heists report. And, finally the dark online world of “pig-butchering.” For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/140 Selected reading. UK Spy Chief Sees Russia’s Military Running ‘Out of Steam’ Soon (Bloomberg) Exhausted Russian army gives Ukraine chance to strike back, says British spy chief (The Telegraph) 'Cut by half' Putin's masterplan backfires as 400 Russian spies thrown out of Europe (Express) Half of Russian spies in Europe expelled since Ukraine invasion, says MI6 chief (the Guardian) MI6 chief: Russia’s spies ‘not having a great war’ in Ukraine (The Record by Recorded Future) CIA chief says 15,000 Russians killed in war, dismisses Putin health rumors (Washington Post) CIA Chief Says Russia’s Iran Drone Deal Shows Military Weakness (Bloomberg) Ukraine confronts Kremlin infiltration threat at unreformed state bodies (Atlantic Council) US seeking to understand Russia’s failure to project cyber power in Ukraine (Defense News) Battling Moscow's hackers prior to invasion gave Kyiv 'full dress rehearsal' for today's cyber warfare (CyberScoop) How Conti ransomware hacked and encrypted the Costa Rican government (BleepingComputer) Anatomy of Attack: Truth Behind the Costa Rica Government Ransomware 5-Day Intrusion (AdvIntel) Conti Criminals Resurface as Splinter RaaS Groups (Security Boulevard) The Unsolved Mystery Attack on Internet Cables in Paris (Wired) Massive Losses Define Epidemic of ‘Pig Butchering’ (KrebsOnSecurity)

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the CyberWire Network, powered by N2K.

0:07.0

Today's episode is sponsored by SRM, your first call for cybersecurity and

0:18.1

investigations. Threats today are evolving faster than ever before and since 2005 SRM has pioneered

0:25.3

tailored security solutions for global corporations and their executives.

0:29.5

Whether it's defending against cyber attacks with their award-winning team of ethical hackers and incident response specialists,

0:36.4

or navigating the murky waters of compliance and ESG challenges,

0:40.9

SRMs, Insight and Straight straightforward advice will help you navigate complex risks

0:46.4

and emerge more resilient.

0:48.4

Their secret, a culture that nurtures the sharpest minds, giving them access to the newest technologies and the freedom

0:55.3

to solve problems in new ways, enabling them to craft simple effective solutions for your

1:01.4

unique cyber challenges.

1:03.7

Search your first call to discover how SRM can help your business. And now a word from our sponsor, Six Cents.

1:23.2

Six Cents provides award-winning cloud-based automated endpoint and vulnerability management solutions

1:29.5

to streamline IT and security operations. With its advanced platform, businesses gain complete visibility and control over their infrastructure, reducing IT and security risks, and optimizing operational efficiency.

1:43.0

With 6 cents, you'll get real-time alerts,

1:46.0

risk-based vulnerability prioritization and remediations,

1:49.0

and an intuitive automation and orchestration engine

1:52.0

so you can focus on your core business goals

1:55.0

confident in the knowledge that your enterprise is secure,

1:58.0

compliant and running smoothly.

2:00.0

Visit 6Cence.com

2:02.0

to learn why enterprises choose them. Traditional espionage and counter-espionage during the hybrid war, assessing Russian cyber attacks,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.