4.6 • 1K Ratings
🗓️ 3 August 2024
⏱️ 23 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the CyberWire Network, powered by N2K. |
0:07.0 | When it comes to ensuring your company has top-notch security practices, things can get complicated fast. |
0:21.0 | Vanta automates compliance for SOC2, ISO 2701, HIPAA and more, saving you time and money. |
0:29.7 | With Vanta you can streamline security reviews by automating questionnaires and |
0:34.2 | demonstrating your security posture with a customer-facing trust center. |
0:38.4 | Over 7,000 global companies like Atlassian, Flow Health, and Quora use Vanta to manage risk and prove security |
0:46.5 | in real time. |
0:48.4 | Our listeners can claim a special offer of $1,000 off Vanta at vanta.com slash cyber. |
0:55.8 | That's VANTA.com slash cyber for $1,000 off Banta. Hello, Hello everyone and welcome to the CyberWire's Research Saturday. |
1:17.0 | I'm Dave Bitner and this is our weekly conversation with researchers and analysts tracking down the threats and vulnerabilities, |
1:25.0 | solving some of the hard problems and protecting ourselves in a rapidly evolving cyberspace. |
1:31.0 | Thanks for joining us. So this came to the attention of a couple of our colleagues on our incident response |
1:42.2 | team and myself following an |
1:44.7 | I-R investigation that we were supporting. It was an attempted ransomware incident and in |
1:49.8 | the process there we uncovered a couple of artifacts that appeared to have been inadvertently left behind by the threat actor. |
1:56.7 | And from there we pivoted and we discovered some additional infrastructure that was |
2:00.4 | unrelated to that incident, but which we had really high confidence was a tribute. that was |
2:04.7 | attributed to the same actor. |
2:06.1 | That's Jason Baker, senior threat consultant at Guidepoint Security. |
2:11.0 | The research we're discussing today is titled Worldwide Web, an analysis of |
2:15.1 | tactics and techniques attributed to Scattered Spider. What we were able to do from there was sort of unpack a laundry list of |
2:30.3 | behavior and tools that the actor was using. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.