meta_pixel
Tapesearch Logo
Log in
Malicious Life

Special: The Solarwinds Hack

Malicious Life

Malicious Life

Technology

4.81K Ratings

🗓️ 28 December 2020

⏱️ 35 minutes

🧾️ Download transcript

Summary

Special: The Solarwinds Hack



Advertising Inquiries: https://redcircle.com/brands

Transcript

Click on a timestamp to play from that location

0:00.0

Hi and welcome to malicious life in collaboration with cyberism. I'm Ran Leffin.

0:18.4

Just a few days ago news broke of one of the biggest and most significant cyber security incidents in recent history. A breach into several federal organizations networks, at least one security

0:26.4

firm, Fire Eye, and potentially up to 18,000 businesses in the U.S, including many Fortune 500 companies.

0:35.8

The attack is currently informally attributed to APT 29, aka Cozy Bear, a Russian state-sponsored hacking team.

0:44.4

This is obviously big news and so we decided to invite Israel Barak, Cyberizans,

0:50.1

CISO, to discuss this incident in detail. Some of you might remember Israel from previous

0:56.0

episodes of malicious life including our last live event from a few months ago.

1:01.1

For those who don't let me introduce you properly.

1:05.2

Israel Barak, Cyber reasons Cisso, is a cyber defense and warfare expert

1:10.7

with extensive background working for the government where he established

1:14.7

and operated various cyber warfare teams. Israel spent years training, guiding and

1:20.6

professionally mentoring new personnel, providing in-depth cyber expertise as it relates to

1:27.0

cyber warfare, cyber security, and threat actors, tactics and procedures. Israel is also a regular speaker at leading cybersecurity industry conferences and events.

1:38.8

Israel, thank you very much for

1:45.0

start to join us in such a short notice.

1:46.0

Thank you, Ron.

1:48.0

So for starters, take us through the events chronologically

1:52.0

as they unfolded. It started with fire rye, right?

1:57.0

It did, but actually you know the timeline actually started even before then.

2:01.0

I think when you look at the events chronologically as they

2:04.6

unfolded today we know that the operational preparation on the attacker's

2:10.0

side and specifically setting up some of the command and control infrastructure began as at least as early as August 6, 2019,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.