Security Breach

Auteur(s): Eric Sorensen
  • Résumé

  • A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.

    © 2025 Security Breach
    Voir plus Voir moins
Épisodes
  • The Legacy of AI in Cybersecurity
    Jan 30 2025

    While we’re still in the infancy of 2025, the New Year has proven to have no issues in welcoming in a number of pre-existing challenges – whether we’re talking about cybersecurity or … other social topics.

    So, in continuing this trend, we tapped into a unique collection of voices to discuss a topic that has, and will continue to be, vital to industrial cybersecurity efforts – Artificial Intelligence.

    First, we’ll hear from Mandiant’s Paul Shaver as he discusses the legacy dynamics of industrial cybersecurity, including ongoing obstacles associated with inventory, visibility and segmentation strategies – and the impact AI could have on all of them.

    Then we’ll transition to HackerOne’s Will Kapcio for his take on AI and the ongoing evolution of cybersecurity tools.

    We’ll wrap up with instructor and the author of the Hack is Back as he discusses what drove his desire to write the book, the impact AI is having on the next generation of cybersecurity specialists, and the evolving vulnerabilities they can expect to face.

    As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
    Click Here to Become a Sponsor.

    Everyday AI: Your daily guide to grown with Generative AI
    Can't keep up with AI? We've got you. Everyday AI helps you keep up and get ahead.

    Listen on: Apple Podcasts Spotify

    To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

    If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

    To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
    here.

    Voir plus Voir moins
    28 min
  • A Happy Ending to the Latest ICS Hack
    Jan 16 2025

    The continued evolution of the CyberAv3ngers hacking group and its IIoT-focused malware.

    We talk a lot about change on Security Breach. Some of it’s good and obviously some of it makes us want to tear our hair out. Well, this episode, surprisingly, should go easy on the scalp, even though it will focus on the IOCONTROL malware strand recently detected by Noam Moshe and Claroty’s Team82.

    The malware is described as a custom-built IoT/OT strand created by the Iran-based hacktivist group, the CyberAv3ngers. The malware targeted OT/IoT devices in Israel and the U.S. Moshe’s team detected the malware being used to attack IoT and SCADA/OT devices of various types including IP cameras, routers, PLCs, HMIs and firewalls.

    Typically, this is the part of the story that takes us down a dark and frustrating road, but as you’ll hear, that’s not necessarily the case this time.

    For more information on Team82’s findings on IOCONTROL, click here.

    Also, just a bit of housekeeping – we’re switching the frequency of Security Breach from weekly to bi-weekly. This change will allow me to spend more time on each episode, which will translate to greater depth and expanded coverage on all the pressing topics of industrial cybersecurity.

    And remember, this is your podcast – let me know your thoughts and feelings on the change and anything else you’d like to see on the show.

    As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
    Click Here to Become a Sponsor.

    Everyday AI: Your daily guide to grown with Generative AI
    Can't keep up with AI? We've got you. Everyday AI helps you keep up and get ahead.

    Listen on: Apple Podcasts Spotify

    To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

    If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

    To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
    here.

    Voir plus Voir moins
    30 min
  • The Biggest Hacks of 2024
    Dec 27 2024

    Winston Churchill famously stated that, “Those who fail to learn from history are doomed to repeat it.”

    His concerns about applying lessons learned to post WWII foreign policy initiatives rings just as true in the current cybersecurity climate. So, in an effort to ensure we repeat as few of 2024’s mistakes in 2025, we’re going to take a look at some of the industrial sector’s biggest exploits, and offer solutions and strategies in our ever-raging combat with the Black Hats. Watch/listen as we cover:

    • A unique supply chain hack that came up during our conversation with Theo Zafirakos, a Cyber Risk and Information Security Expert at Fortra.
    • The fall of 2024 brought security compromises to the front door of a number of prominent industrial enterprises, including Halliburton.
    • In early August millions were impacted when National Public Data, a major data broker that performs background checks, reported that 2.9 billion personal records from over a million individuals in the U.S., the U.K. and Canada were accessed.
    • Ford Motor Company was also a target, with a data breach that saw hacking groups steal 44,000 records containing personal and product information.
    • Anna Wells, executive editor of Manufacturing.net and Manufacturing Business Technology, brought us coverage of a hack that has crippled a global beverage maker.
    • We close out with a story from early this year describing how some of the basic tools found throughout a manufacturing plant can become

    As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
    Click Here to Become a Sponsor.

    Everyday AI: Your daily guide to grown with Generative AI
    Can't keep up with AI? We've got you. Everyday AI helps you keep up and get ahead.

    Listen on: Apple Podcasts Spotify

    To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

    If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

    To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
    here.

    Voir plus Voir moins
    41 min

Ce que les auditeurs disent de Security Breach

Moyenne des évaluations de clients

Évaluations – Cliquez sur les onglets pour changer la source des évaluations.