Powered by RND
PodcastsTechnologieESET Research podcast
Luister naar ESET Research podcast in de app
Luister naar ESET Research podcast in de app
(2.067)(250 021)
Favorieten opslaan
Wekker
Slaaptimer

ESET Research podcast

Podcast ESET Research podcast
ESET Research
Security research straight from ESET researchers, hosted by Aryeh Goretsky

Beschikbare afleveringen

5 van 21
  • Threat Report H2 2024: Infostealers, novel vector for mobile, Nomani
    In H2 2024, the infostealer scene went through a shakeup leading to a reshaped top 10 with Formbook dethroning Agent Tesla, Lumma Stealer jumping the ranks by using a new tactic for its distribution, and both Redline Stealer and Meta Stealer losing ground after takedown. There’s also a novel attack vector that works for both Android and iOS devices, misusing technologies allowing mobile users to install apps directly from websites from mobile browsers. And let’s not forget the booming numbers of investment scams on social media, detected as HTML/Nomani. Of course, this podcast episode can only cover so much of the latest ESET Threat Report H2 2024. Visit WeLiveSecurity to read about other topics it covers. Host: Aryeh Goretsky, ESET Distinguished Researcher Guest: Ondrej Kubovič, Security Awareness Specialist Read more @WeLiveSecurity.com and @ESETresearch on Twitter ESET Threat Report H2 2024
    --------  
    38:26
  • Telekopye, again
    Neanderthals hunting Mammoths are back. Of course, we’re not talking about some Jurassic-Park-like technology that resurrected them in a remote region. No, this episode of ESET Research Podcast returns to the malicious operation of dozens of cybercriminal groups (Neanderthals) targeting inexperienced users (Mammoths) on online marketplaces, using a malicious Telegram bot known as Telekopye. Discussing the topic, ESET Research Podcast host Aryeh Goretsky, and ESET malware researchers, Radek Jizba and Jakub Soucek, revisit and update the information ESET has gathered about the cybercriminal ecosystem, explain the most frequent scenarios used by the attackers and map out their expanded hunting grounds. For full info, read more in ESET’s recently published white paper on WeLiveSecurity.com. Host Aryeh Goretsky, ESET Distinguished Researcher Guests: Jakub Souček, ESET Senior Malware Researcher Radek Jizba, ESET Senior Malware Researcher Materials: Blogpost Telekopye transitions to targeting tourists via hotel booking scam Whitepaper Marketplace scams: Neanderthals hunting Mammoths with Telekopye
    --------  
    30:24
  • Gamaredon
    When describing state-backed threat actors, one would probably expect a super sophisticated, stealthy, group that can avoid all alarms and defenses with surgical precision. With Gamaredon, most of that goes out the window as this is one noisy, extremely active Russia-aligned group that does not care if defenders uncover its activities. However, it is also an actor that develops and improves its cyberespionage tools and techniques literally every day. If you want to know more about Gamaredon’s modus operandi, victimology, tooling, or estimated geolocation, then listen to the debate of ESET Researchers Robert Lipovský and Zoltán Rusnák. For full details, read more in ESET’s recently published white paper on WeLiveSecurity.com. Host Aryeh Goretsky, ESET Distinguished Researcher Guests: Robert Lipovský, ESET Principal Malware Researcher Zoltán Rusnák, ESET Senior Malware Researcher Materials: ESET blogpost on Gamaredon activity in 2022 and 2023 ESET white paper on Gamaredon activity in 2022 and 2023 SSU report on activities of Gamaredon
    --------  
    23:24
  • CosmicBeetle
    Some cybercriminals are sophisticated, cooperate with other attackers, and do everything to stay under the radar. Then there are threat actors like CosmicBeetle that lack the necessary skills set, yet still manage to compromise systems and even achieve “stealth” by using odd, impractical and overcomplicated techniques. If you want to know more about this crude and clumsy actor, listen to ESET senior malware researcher Jakub Souček talk about his research findings with our host Distinguished Researcher Aryeh Goretsky. For a detailed report on CosmicBeetle visit WeLiveSecurity.com. Host Aryeh Goretsky, ESET Distinguished Researcher Guest: Jakub Souček, ESET senior Malware Researcher Materials: CosmicBeetle steps up: Probation period at RansomHub
    --------  
    23:45
  • EvilVideo
    Telegram, with nearly a billion monthly users, is a juicy target for cybercriminals, especially if they can exploit a zero-day vulnerability. ESET malware researcher Lukáš Štefanko ran into such an exploit – which ESET named EvilVideo – being sold online. In the discussion with our podcast host ESET Distinguished Researcher Aryeh Goretsky, Štefanko describes the findings of his analysis, including which platforms were affected, what malware can be bundled with EvilVideo, and how Telegram developers reacted when ESET reached out to report the vulnerability. If you want to read more about EvilVideo or our other research findings, head to WeLiveSecurity.com. Host Aryeh Goretsky, ESET Distinguished Researcher Guest: Lukáš Štefanko, ESET Malware Researcher Materials: Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android PS: For those of our listeners who are attending the 2024 ESET Technology Conference and playing along with our game of capture the flag, the flag for the CTF challenge named “Radio Broadcast” is: podcasts_are_new_books.
    --------  
    16:13

Meer Technologie podcasts

Over ESET Research podcast

Security research straight from ESET researchers, hosted by Aryeh Goretsky
Podcast website

Luister naar ESET Research podcast, Acquired en vele andere podcasts van over de hele wereld met de radio.net-app

Ontvang de gratis radio.net app

  • Zenders en podcasts om te bookmarken
  • Streamen via Wi-Fi of Bluetooth
  • Ondersteunt Carplay & Android Auto
  • Veel andere app-functies
Social
v7.10.0 | © 2007-2025 radio.de GmbH
Generated: 3/12/2025 - 8:05:10 PM