4.6 • 2.1K Ratings
🗓️ 27 December 2022
⏱️ 140 minutes
🧾️ Download transcript
Hosts: Steve Gibson and Leo Laporte
Download or subscribe to this show at https://twit.tv/shows/security-now.
Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit
You can submit a question to Security Now! at the GRC Feedback Page.
For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
Sponsors:
Click on a timestamp to play from that location
| 0:00.0 | Yep, it's that time once again. Hello everybody, Leo Laporte here with the best of 2022 security now |
| 0:09.6 | Podcasts you love from people you trust |
| 0:14.0 | This is twit |
| 0:19.8 | This is security now with Steve Gibson episode 903 for Tuesday, December 27th, 2022 |
| 0:26.7 | The years best |
| 0:30.4 | Security now is brought to you by Express VPN using the internet without Express VPN is like walking your dog in public without securing them on a leash |
| 0:40.3 | For three extra months free with a one-year package go to expressvpn.com slash security now and by |
| 0:48.1 | Coal line collide is an endpoint security solution that uses the most powerful |
| 0:53.2 | untapped resource in IT and users visit collide.com slash security now to learn more and activate a 14-day free trial today |
| 1:03.6 | no credit card required |
| 1:06.8 | We're going to let Steve take a week off a much needed week off and talk about some of the biggest stories of the year |
| 1:14.4 | From 2022 this actually is a good show to listen to or to give people who haven't heard security now to give them an idea of the breadth |
| 1:21.3 | Uh of content and the depth of content with everything Steve does starting with perhaps the worst exploit if you could pick one the worst exploit of 2022 log for J |
| 1:36.2 | Okay, so many security firms are tracking threat actors who immediately and predictably jumped aboard the log for J bandwagon |
| 1:46.5 | You know, it's been a it's been a feeding frenzy for the security firms |
| 1:50.1 | To help bring this home and make it a bit more real. I wanted to share a piece of checkpoint research is reverse engineering work |
| 2:00.9 | On a typical threat the internet is now facing |
| 2:04.9 | Um, I've got for anyone who wants more detail. I always a link in the show notes |
| 2:09.8 | Uh last week |
| 2:11.7 | Checkpoint documented the efforts of an of an Iranian government backed group known again |
| 2:19.1 | Not just Iranians Iranian government backed group known as apt 35 also known as charming kitten |
| 2:28.0 | TA 453 and phosphorus |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Leo Laporte, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Leo Laporte and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2026.