Symantec Cyber Security Brief Podcast

Symantec Cyber Security Brief Podcast

83 episodes

Our regular podcast series features threat research and security news, hosted by threat researchers from the Threat Hunter Team.

Podcasts

Raindrop: How the additional tool was discovered in Solarwinds investigation

Published: Jan. 28, 2021, 2 p.m.
Duration: 25 minutes 4 seconds

Listed in: Technology

The latest on the Solarwinds hack, a lot of ransomware activity, and healthcare hit hard by cyber attacks

Published: Jan. 14, 2021, 2 p.m.
Duration: 24 minutes 58 seconds

Listed in: Technology

Sunburst: Everything we know about the supply chain attack targeting SolarWinds users

Published: Dec. 17, 2020, 2 p.m.
Duration: 28 minutes 13 seconds

Listed in: Technology

Cyber predictions for 2021, botnets turn to ransomware, and the Gootkit infostealer reemerges

Published: Dec. 3, 2020, 2 p.m.
Duration: 24 minutes 9 seconds

Listed in: Technology

New research about attacks on Japan-linked companies, and APT groups target COVID-19 vaccine makers

Published: Nov. 19, 2020, 2 p.m.
Duration: 19 minutes 34 seconds

Listed in: Technology

Trickbot disruption, newly released Seedworm research, and some noteworthy indictments

Published: Oct. 22, 2020, 1 p.m.
Duration: 27 minutes 47 seconds

Listed in: Technology

Round up: Financial sector threats, North Korean actors, WastedLocker and more

Published: Oct. 8, 2020, 1 p.m.
Duration: 20 minutes 19 seconds

Listed in: Technology

Round-up: A whole host of vulnerabilities, and the hackers hacking other hackers

Published: March 12, 2020, 2 p.m.
Duration: 23 minutes 10 seconds

Listed in: Technology

Round-up: Ransomware criminals continue to innovate, and BEC scammers hit a high-profile victim

Published: March 5, 2020, 2 p.m.
Duration: 21 minutes 40 seconds

Listed in: Technology

Special Edition: The RSA Conference 2020

Published: Feb. 27, 2020, 2 p.m.
Duration: 26 minutes 19 seconds

Listed in: Technology

Focus On: Pegasus spyware

Published: Feb. 20, 2020, 2 p.m.
Duration: 13 minutes 19 seconds

Listed in: Technology

Spotlight On: The healthcare cyber threat landscape

Published: Feb. 13, 2020, 12:33 p.m.
Duration: 19 minutes 55 seconds

Listed in: Technology

Round-up: Traffic jams, increasing defenses, and shortening the Google Chrome ‘patch gap’

Published: Feb. 6, 2020, 2 p.m.
Duration: 20 minutes 47 seconds

Listed in: Technology

Round-up: Ransomware, vulnerabilities, and eavesdropping

Published: Jan. 30, 2020, 1:42 p.m.
Duration: 20 minutes 33 seconds

Listed in: Technology

Spotlight On: Software vulnerabilities and patch management

Published: Jan. 23, 2020, 1:55 p.m.
Duration: 20 minutes 7 seconds

Listed in: Technology

Spotlight On: Living off the land

Published: Jan. 16, 2020, 2 p.m.
Duration: 21 minutes 38 seconds

Listed in: Technology

Spotlight On: Iranian cyber espionage activity

Published: Jan. 9, 2020, 2 p.m.
Duration: 24 minutes 52 seconds

Listed in: Technology

Cyber Security Brief’s Review of the Year

Published: Dec. 19, 2019, 2 p.m.
Duration: 26 minutes 30 seconds

Listed in: Technology

Spotlight On: Targeted ransomware – a major trend in 2019

Published: Dec. 12, 2019, 2 p.m.
Duration: 22 minutes 55 seconds

Listed in: Technology

Attack Group of the Month: Shamoon – targeting the Middle East with disk-wiping malware

Published: Dec. 5, 2019, 2 p.m.
Duration: 26 minutes 12 seconds

Listed in: Technology

Spotlight On: BEC scams – an expensive threat

Published: Nov. 28, 2019, 2 p.m.
Duration: 20 minutes 25 seconds

Listed in: Technology

Holiday shopping special: Scams to watch out for this Black Friday and Cyber Monday

Published: Nov. 21, 2019, 2 p.m.
Duration: 22 minutes 36 seconds

Listed in: Technology

Privacy concerns, election campaign worries, and phish-y meeting invites

Published: Nov. 14, 2019, 2 p.m.
Duration: 23 minutes 1 second

Listed in: Technology

Lasers, Bluekeep, and BEC scammers continue to cash in

Published: Nov. 7, 2019, 2 p.m.
Duration: 23 minutes 8 seconds

Listed in: Technology

Fancy Bear attack campaign, ransomware hits Johannesburg again, and malware hijacks Discord client

Published: Oct. 31, 2019, 2 p.m.
Duration: 21 minutes 52 seconds

Listed in: Technology

An iTunes and iCloud zero-day, ATM malware, and the Sudo vulnerability

Published: Oct. 17, 2019, 1 p.m.
Duration: 26 minutes 40 seconds

Listed in: Technology

A controversial Apple app, a far-reaching ruling from the ECJ, and many, many data breaches

Published: Oct. 10, 2019, 1 p.m.
Duration: 22 minutes 53 seconds

Listed in: Technology

Deepfakes, disinformation, and the former NATO bunker housing a bulletproof hosting service

Published: Oct. 3, 2019, 1 p.m.
Duration: 23 minutes 19 seconds

Listed in: Technology

Tortoiseshell APT group, vBulletin zero-day, and Facebook suspends thousands of apps

Published: Sept. 26, 2019, 1 p.m.
Duration: 23 minutes 13 seconds

Listed in: Technology

Cloud security, telecoms companies compromised, and can someone else access your Nest camera?

Published: June 27, 2019, 9:50 a.m.
Duration: 18 minutes 51 seconds

Listed in: Technology

Waterbug, “smart” TVs, and BEC scam hits Canadian city

Published: June 20, 2019, 11:22 a.m.
Duration: 24 minutes 26 seconds

Listed in: Technology

Bug bounties, bad passwords, and Radiohead

Published: June 13, 2019, 10:52 a.m.
Duration: 21 minutes 39 seconds

Listed in: Technology

Twitterbots, ransomware retirements, and email mishaps

Published: June 6, 2019, 1:08 p.m.
Duration: 19 minutes 7 seconds

Listed in: Technology

BlueKeep bug, ransomware “recovery”, and the dismantling of the GozNym network

Published: May 23, 2019, 1 p.m.
Duration: 21 minutes 5 seconds

Listed in: Technology

GDPR Special: The Impact of the Regulation One Year On

Published: May 15, 2019, 11:22 a.m.
Duration: 25 minutes 27 seconds

Listed in: Technology

Buckeye’s use of Equation group tools pre Shadow Brokers leak, IoT security, and targeted ransomware

Published: May 9, 2019, 11:22 a.m.
Duration: 19 minutes 51 seconds

Listed in: Technology

Beapy cryptojacking worm, Emotet’s new hiding technique, and set-top box dangers

Published: May 2, 2019, 1:22 p.m.
Duration: 24 minutes 2 seconds

Listed in: Technology

Interview: Martijn Grooten, Editor, Virus Bulletin

Published: April 24, 2019, 2:13 p.m.
Duration: 19 minutes 26 seconds

Listed in: Technology

Hotel booking privacy, dark marketplace selling your digital fingerprint, and Mar-a-Lago intruder update

Published: April 11, 2019, 1 p.m.
Duration: 23 minutes 22 seconds

Listed in: Technology

Malware sneaked onto Trump property, Albany ransomware attack, and Tesla tricked

Published: April 4, 2019, 11:41 a.m.
Duration: 19 minutes 54 seconds

Listed in: Technology

Elfin research, ASUS software supply chain attack, insider threats, and mobile security

Published: March 28, 2019, 2 p.m.
Duration: 22 minutes 44 seconds

Listed in: Technology

Interview: Neil Jenkins, Chief Analytic Officer, Cyber Threat Alliance

Published: March 21, 2019, 12:59 p.m.
Duration: 24 minutes 16 seconds

Listed in: Technology

Highlights from RSA Conference 2019

Published: March 14, 2019, 2:58 p.m.
Duration: 31 minutes 58 seconds

Listed in: Technology

ISTR Special: Enterprise

Published: March 7, 2019, 2:43 p.m.
Duration: 28 minutes 19 seconds

Listed in: Technology

ISTR Special: Consumers

Published: Feb. 28, 2019, 1:45 p.m.
Duration: 33 minutes 38 seconds

Listed in: Technology

Google backtracks, Apple gets sued, and Australia a victim of state-sponsored cyber attack

Published: Feb. 21, 2019, 12:38 p.m.
Duration: 23 minutes 22 seconds

Listed in: Technology

Stolen data for sale, Mac malware, and container vulnerabilities

Published: Feb. 14, 2019, 11:27 a.m.
Duration: 21 minutes 38 seconds

Listed in: Technology

Insecure IoT devices, password breach checks, and misleading phone apps

Published: Feb. 7, 2019, 2 p.m.
Duration: 24 minutes 56 seconds

Listed in: Technology

Japan to hack civilians’ IoT devices, Apple Facetime bug, and an evolution in BEC scams

Published: Jan. 31, 2019, 1:59 p.m.
Duration: 25 minutes 17 seconds

Listed in: Technology

Ukrainians indicted, cash for Tesla hacks, and cryptocurrency exchanges breached

Published: Jan. 17, 2019, 2 p.m.
Duration: 24 minutes 5 seconds

Listed in: Technology

German data leak, untrustworthy IoT devices, and PewDiePie hackers go quiet

Published: Jan. 10, 2019, 2 p.m.
Duration: 22 minutes 29 seconds

Listed in: Technology

What Were the Top 5 Cyber Security Stories of 2018?

Published: Dec. 20, 2018, 2:58 p.m.
Duration: 30 minutes 34 seconds

Listed in: Technology

Money mule arrests, grandparent scams, and new research into the Seedworm group

Published: Dec. 13, 2018, 1:31 p.m.
Duration: 24 minutes 41 seconds

Listed in: Technology

SamSam developments, an AI gaffe, and some massive data breaches

Published: Dec. 6, 2018, 2 p.m.
Duration: 24 minutes 38 seconds

Listed in: Technology

Operation Eversion, Magecart, and the UK parliament takes on Facebook

Published: Nov. 29, 2018, 2 p.m.
Duration: 21 minutes 28 seconds

Listed in: Technology

Special Report: Conficker’s 10th anniversary

Published: Nov. 22, 2018, 2 p.m.
Duration: 35 minutes 31 seconds

Listed in: Technology

Formjacking, lots of vulnerabilities get patched, and a BEC scam costs a cinema company millions

Published: Nov. 15, 2018, 2 p.m.
Duration: 22 minutes 16 seconds

Listed in: Technology

Lazarus ATM attacks, Inception Framework uses new backdoor, and small businesses’ cyber risk

Published: Nov. 8, 2018, 2:14 p.m.
Duration: 22 minutes 52 seconds

Listed in: Technology

SamSam ransomware, Midterms 2018, new Emotet activity, and Docker APIs exploited for cryptojacking

Published: Nov. 1, 2018, 2 p.m.
Duration: 26 minutes 29 seconds

Listed in: Technology

Special Report: What is it Really Like to Work in Cyber Security?

Published: Oct. 18, 2018, 1 p.m.
Duration: 30 minutes 14 seconds

Listed in: Technology

Gallmaker research, Navionics breach, and Fitbit data used by cops in murder investigation

Published: Oct. 11, 2018, 1 p.m.
Duration: 22 minutes 50 seconds

Listed in: Technology

APT28 activity, cryptojacking research, and Face ID used to access criminal suspect’s phone

Published: Oct. 4, 2018, 2 p.m.
Duration: 29 minutes 7 seconds

Listed in: Technology

Deep Dive: Symantec Takes on Software Supply Chain Attacks

Published: Sept. 13, 2018, 1 p.m.
Duration: 25 minutes 12 seconds

Listed in: Technology

Andromeda botnet, DNC “hack”, a new Windows zero day, and dark web developments

Published: Aug. 30, 2018, 1 p.m.
Duration: 21 minutes 42 seconds

Listed in: Technology

Special Report: Financial Threats

Published: Aug. 16, 2018, 1 p.m.
Duration: 27 minutes 24 seconds

Listed in: Technology

Leafminer research, data breaches, credential stuffing, and IoT security fails

Published: July 26, 2018, 1 p.m.
Duration: 27 minutes 39 seconds

Listed in: Technology

Special Report: Software Update Supply Chain Attacks

Published: July 12, 2018, 1:30 p.m.
Duration: 28 minutes 58 seconds

Listed in: Technology

New Symantec research on the Thrip cyber espionage group, BEC scammers, and coinminers in court in Japan

Published: June 21, 2018, 3:29 p.m.
Duration: 27 minutes 57 seconds

Listed in: Technology