<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/ransomware-battleground/" rel="self" type="application/rss+xml"/><title><![CDATA[Ransomware Battleground]]></title><podcast:guid>ecf9ee3c-7e8a-5453-b0a8-f5ed7f663c3f</podcast:guid><lastBuildDate>Sat, 02 Mar 2024 20:17:43 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[Copyright 2024 Syya Yasotornrat]]></copyright><managingEditor>Syya Yasotornrat</managingEditor><itunes:summary><![CDATA[Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! 

Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. 

If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and help bring to light the very real dangers of our increasingly digitally dependent society.

Zero Trust may be one of many important layers to keeping your data and money safe!]]></itunes:summary><image><url>https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg</url><title>Ransomware Battleground</title><link><![CDATA[https://ransomware-battleground.captivate.fm]]></link></image><itunes:image href="https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg"/><itunes:owner><itunes:name>Syya Yasotornrat</itunes:name></itunes:owner><itunes:author>Syya Yasotornrat</itunes:author><description>Ransomware, CyberSecurity &amp; Information Security Hackers, State Actors, OH MY! 

Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. 

If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we&apos;re here to put it into laymen&apos;s terms and help bring to light the very real dangers of our increasingly digitally dependent society.

Zero Trust may be one of many important layers to keeping your data and money safe!</description><link>https://ransomware-battleground.captivate.fm</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:subtitle><![CDATA[All About Ransomware and Security]]></itunes:subtitle><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="Technology"></itunes:category><itunes:category text="News"><itunes:category text="Tech News"/></itunes:category><itunes:category text="Business"></itunes:category><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>Ethical Hackers - Why Treat Them As Foes?</title><itunes:title>Ethical Hackers - Why Treat Them As Foes?</itunes:title><description><![CDATA[<p>No one likes to be told that their baby is ugly. Magnify that sentiment with a multi-billion dollar corporation with a reputation at stake. </p><p>THIS is the challenge that ethical hackers face when they are able to breach environments and report it to these businesses. Are they received well? Sometimes yes, and mostly, no. No one is taking anything or charging for the services. It's a hobby for most of these researchers and the thrill of finding vulnerabilities is often a reward in itself. </p><p>Case in point: We had an awesome opportunity to speak with Higinio "W0rmer" Ochoa and two of his collaborators, Robert "Rej_ex" Willis and "Wabafet," all members of the research collective, "Sakura Samurai." Sakura Samurai has gained a reputation for successfully breaching multiple high-profile government targets. Most recently, we discuss the story of their involvement with John Deere, as highlighted in the Forbes article by contributer Paul F. Roberts, <a href="https://www.forbes.com/sites/paulfroberts/2021/06/20/under-scrutiny-big-ag-scrambles-to-address-cyber-risk/?sh=7e34acf461e3" rel="noopener noreferrer" target="_blank">"Under Scrutiny, Big Ag Scrambles To Address Cyber Risk."</a> </p><p>Chat with W0rmer, Regex, Wabafet Below:</p><p>Twitter:</p><p>W0rmer: @0x686967</p><p>Regex: @rej_ex</p><p>Wabafet: @wabafet1</p>]]></description><content:encoded><![CDATA[<p>No one likes to be told that their baby is ugly. Magnify that sentiment with a multi-billion dollar corporation with a reputation at stake. </p><p>THIS is the challenge that ethical hackers face when they are able to breach environments and report it to these businesses. Are they received well? Sometimes yes, and mostly, no. No one is taking anything or charging for the services. It's a hobby for most of these researchers and the thrill of finding vulnerabilities is often a reward in itself. </p><p>Case in point: We had an awesome opportunity to speak with Higinio "W0rmer" Ochoa and two of his collaborators, Robert "Rej_ex" Willis and "Wabafet," all members of the research collective, "Sakura Samurai." Sakura Samurai has gained a reputation for successfully breaching multiple high-profile government targets. Most recently, we discuss the story of their involvement with John Deere, as highlighted in the Forbes article by contributer Paul F. Roberts, <a href="https://www.forbes.com/sites/paulfroberts/2021/06/20/under-scrutiny-big-ag-scrambles-to-address-cyber-risk/?sh=7e34acf461e3" rel="noopener noreferrer" target="_blank">"Under Scrutiny, Big Ag Scrambles To Address Cyber Risk."</a> </p><p>Chat with W0rmer, Regex, Wabafet Below:</p><p>Twitter:</p><p>W0rmer: @0x686967</p><p>Regex: @rej_ex</p><p>Wabafet: @wabafet1</p>]]></content:encoded><link><![CDATA[https://ransomware-battleground.captivate.fm/episode/ethical-hackers-why-treat-them-as-foes]]></link><guid isPermaLink="false">290f1fe7-b09b-4110-adb1-81234fcb8ab2</guid><itunes:image href="https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg"/><dc:creator><![CDATA[Syya Yasotornrat]]></dc:creator><pubDate>Tue, 31 Aug 2021 00:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/272355d5-822c-40d9-abda-0a4a88f92144/final-rb-ep-21-oh-dear-john-deere.mp3" length="32351501" type="audio/mpeg"/><itunes:duration>38:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>21</itunes:episode><podcast:episode>21</podcast:episode><itunes:author>Syya Yasotornrat</itunes:author></item><item><title>Protecting and Educating Family and Friends</title><itunes:title>Protecting and Educating Family and Friends</itunes:title><description><![CDATA[<p>We know Ransomware attacks have blown up in recent years and targets are as diverse as the type of attacks. We've discussed the challenges for businesses, small and enterprise, but what about for the public at large? Who is at risk? What percentage of the population is security savvy to know what to look for in attacks or attempts?</p><p>This week's Ransomware Battleground chat features special guest, Karen Rhodes, Chief Technologist at Hewlett Packard Enterprise to share her insights and guidance on educating family on friends on the very real threats affecting everyone.</p><p>Highlights:</p><ul><li>Stay up to date on updates and practice good discipline on scheduling and checking for updates</li><li>Password storage tools may be convenient, but understand the risk if those applications are compromised.</li><li>ASK FOR HELP</li></ul><br/>]]></description><content:encoded><![CDATA[<p>We know Ransomware attacks have blown up in recent years and targets are as diverse as the type of attacks. We've discussed the challenges for businesses, small and enterprise, but what about for the public at large? Who is at risk? What percentage of the population is security savvy to know what to look for in attacks or attempts?</p><p>This week's Ransomware Battleground chat features special guest, Karen Rhodes, Chief Technologist at Hewlett Packard Enterprise to share her insights and guidance on educating family on friends on the very real threats affecting everyone.</p><p>Highlights:</p><ul><li>Stay up to date on updates and practice good discipline on scheduling and checking for updates</li><li>Password storage tools may be convenient, but understand the risk if those applications are compromised.</li><li>ASK FOR HELP</li></ul><br/>]]></content:encoded><link><![CDATA[https://ransomware-battleground.captivate.fm/episode/protecting-and-educating-family-and-friends]]></link><guid isPermaLink="false">bd6fcde5-aa3c-4275-95a1-981c391b7105</guid><itunes:image href="https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg"/><dc:creator><![CDATA[Syya Yasotornrat]]></dc:creator><pubDate>Tue, 24 Aug 2021 00:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/da8b5897-9a95-48de-9dbf-4183fbbfc9c6/final-rb-family.mp3" length="27707607" type="audio/mpeg"/><itunes:duration>32:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>20</itunes:episode><podcast:episode>20</podcast:episode><itunes:author>Syya Yasotornrat</itunes:author></item><item><title>Ransomware is Mainstream!</title><itunes:title>Ransomware is Mainstream!</itunes:title><description><![CDATA[<p>What is it about mainstream entertainment that makes the general population suddenly pay attention? Ransomware has grown exponentially in the last year and though it feels like attacks are daily occurrences, the majority of folks haven't changed behaviors, enacted additional security measures or seem to notice the impact that the headline attacks are a fraction of the overall number of attacks. </p><p>This week, Syya and Paul briefly chat on a recent episode of Last Week Tonight where the host, John Oliver, lays out the very real threats that ransomware poses and the repercussions with Ransomware as a Service, Double Extortion and let's cringe together - toys.</p><p>Ransomware is Mainstream! But will anything change?</p>]]></description><content:encoded><![CDATA[<p>What is it about mainstream entertainment that makes the general population suddenly pay attention? Ransomware has grown exponentially in the last year and though it feels like attacks are daily occurrences, the majority of folks haven't changed behaviors, enacted additional security measures or seem to notice the impact that the headline attacks are a fraction of the overall number of attacks. </p><p>This week, Syya and Paul briefly chat on a recent episode of Last Week Tonight where the host, John Oliver, lays out the very real threats that ransomware poses and the repercussions with Ransomware as a Service, Double Extortion and let's cringe together - toys.</p><p>Ransomware is Mainstream! But will anything change?</p>]]></content:encoded><link><![CDATA[https://ransomware-battleground.captivate.fm/episode/ransomware-is-mainstream]]></link><guid isPermaLink="false">88e03f4d-dbd8-44d8-acf3-64ecf9151461</guid><itunes:image href="https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg"/><dc:creator><![CDATA[Syya Yasotornrat]]></dc:creator><pubDate>Tue, 17 Aug 2021 00:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/b6071bb0-cc58-482d-901f-6cece88ee417/final-rb-audio-ep-19-ransomware-is-mainstream-final.mp3" length="22938757" type="audio/mpeg"/><itunes:duration>27:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>19</itunes:episode><podcast:episode>19</podcast:episode><itunes:author>Syya Yasotornrat</itunes:author></item><item><title>Red Team vs. Blue Team: How does Incident Response work?</title><itunes:title>Red Team vs. Blue Team: How does Incident Response work?</itunes:title><description><![CDATA[<p>Red team and blue team play an important role in defending against advanced cyber attacks that threaten business communications. In this special episode of Ransomware Battleground, we talk through the flow in incident response per cyber kill chain.</p><p>Ransomware Kill Switch™ can be used by the incident response to control/contain the blast radius in real time using the preventive and proactive zero trust approach. However, when the detections failed on zero day exploits, how can you use Ransomware Kill Switch™ in the post exfiltration mitigation phase?</p><p>Airgap provides an agentless Anti-Ransomware platform to stop the spread of malware in the enterprise network. Our industry’s first Ransomware Kill Switch™ locks down your most critical network assets at the first indication of compromise with complete control and policy enforcement over the device-to-device and device-to-application communication.</p>]]></description><content:encoded><![CDATA[<p>Red team and blue team play an important role in defending against advanced cyber attacks that threaten business communications. In this special episode of Ransomware Battleground, we talk through the flow in incident response per cyber kill chain.</p><p>Ransomware Kill Switch™ can be used by the incident response to control/contain the blast radius in real time using the preventive and proactive zero trust approach. However, when the detections failed on zero day exploits, how can you use Ransomware Kill Switch™ in the post exfiltration mitigation phase?</p><p>Airgap provides an agentless Anti-Ransomware platform to stop the spread of malware in the enterprise network. Our industry’s first Ransomware Kill Switch™ locks down your most critical network assets at the first indication of compromise with complete control and policy enforcement over the device-to-device and device-to-application communication.</p>]]></content:encoded><link><![CDATA[https://ransomware-battleground.captivate.fm/episode/red-team-vs-blue-team-how-does-incident-response-work]]></link><guid isPermaLink="false">66bf2560-ce46-4277-958f-ef0b9c37b03a</guid><itunes:image href="https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg"/><dc:creator><![CDATA[Syya Yasotornrat]]></dc:creator><pubDate>Tue, 10 Aug 2021 00:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/81359282-db16-4418-8e0a-be237857335a/final-rb-ep-17-red-blue-team-ir.mp3" length="57258886" type="audio/mpeg"/><itunes:duration>29:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>18</itunes:episode><podcast:episode>18</podcast:episode><itunes:author>Syya Yasotornrat</itunes:author></item><item><title>Summer Catch Up &amp; Vent Session</title><itunes:title>Summer Catch Up &amp; Vent Session</itunes:title><description><![CDATA[<p>Where does time go when the heat of summer turns up and families can enjoy a little vacation time? </p><p>Well hopefully ransomware attacks aren't tied to soaring temperatures because it's looking like over 120% increase in attacks from 2020. No one is immune and it's up to educating the broader population to understand that ANYTHING can be suspect. Even if it's "just" a clickbait website.</p><p>Poul Frederiksen and Syya Yasotornrat catch up and let off a little steam on how much hackers really chaps Syya's hide.</p><p>It's no longer a question of what is ransomware. The question is now: How many people do you know that has been a victim of ransomware?</p>]]></description><content:encoded><![CDATA[<p>Where does time go when the heat of summer turns up and families can enjoy a little vacation time? </p><p>Well hopefully ransomware attacks aren't tied to soaring temperatures because it's looking like over 120% increase in attacks from 2020. No one is immune and it's up to educating the broader population to understand that ANYTHING can be suspect. Even if it's "just" a clickbait website.</p><p>Poul Frederiksen and Syya Yasotornrat catch up and let off a little steam on how much hackers really chaps Syya's hide.</p><p>It's no longer a question of what is ransomware. The question is now: How many people do you know that has been a victim of ransomware?</p>]]></content:encoded><link><![CDATA[https://ransomware-battleground.captivate.fm/episode/summer-catch-up-vent-session]]></link><guid isPermaLink="false">75b7e18c-1f3a-40e8-9b24-e9a5ea1d53ca</guid><itunes:image href="https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg"/><dc:creator><![CDATA[Syya Yasotornrat]]></dc:creator><pubDate>Tue, 03 Aug 2021 00:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/b9416df2-2bf2-4f1a-b232-a7876de823bc/final-rb-ep-18-catch-up-vent-no-video.mp3" length="27703282" type="audio/mpeg"/><itunes:duration>32:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>17</itunes:episode><podcast:episode>17</podcast:episode><itunes:author>Syya Yasotornrat</itunes:author></item><item><title>Kaseya Ransomware Attack &amp; Incident Response with Ransomware Kill Switch</title><itunes:title>Kaseya Ransomware Attack &amp; Incident Response with Ransomware Kill Switch</itunes:title><description><![CDATA[<p>Kaseya Ltd. is a Miami-based company that provides software to help other businesses manage their networks. The hackers targeted Kaseya’s virtual systems/server administrator (VSA), a type of software that large companies and technology-service providers use to manage and send out software updates to systems on computer networks. The hacks are caused by cybercriminals who acquired and used zero-day vulnerabilities. What do we know about REvil's behavior pattern in this incident? What can you do when your detection solution failed?</p><p>In this episode, we will demonstrate the post-ransomware incident use cases and how you can automate in-network detection and Ransomware incident response to isolate inside the enterprise network.</p><p>The integrated Zero Trust enterprise access solution provides organizations an advanced level of visibility and turns every connected endpoint into a Zero Trust endpoint to stop Ransomware lateral movement before they spread.</p><p>Hear how our joint solution can provide your organization:</p><p>* Advanced Ransomware detection and incident response with of Ransomware Kill Switch™</p><p>* Consolidated SOC threat intelligence and analytics</p><p>* End to end visibility and intelligence into malware behaviors</p><p>Thanks to sponsor Airgap Networks!</p><p>Airgap provides an agent-less Anti-Ransomware platform to stop the spread of malware in the enterprise network. Our industry’s first Ransomware Kill Switch™ locks down your most critical network assets at the first indication of compromise with complete control and policy enforcement over the device--device-application communication. Visit them at Black Hat 2021 USA in Vegas or Virtual. For expo passes, contact info@airgap.io.</p>]]></description><content:encoded><![CDATA[<p>Kaseya Ltd. is a Miami-based company that provides software to help other businesses manage their networks. The hackers targeted Kaseya’s virtual systems/server administrator (VSA), a type of software that large companies and technology-service providers use to manage and send out software updates to systems on computer networks. The hacks are caused by cybercriminals who acquired and used zero-day vulnerabilities. What do we know about REvil's behavior pattern in this incident? What can you do when your detection solution failed?</p><p>In this episode, we will demonstrate the post-ransomware incident use cases and how you can automate in-network detection and Ransomware incident response to isolate inside the enterprise network.</p><p>The integrated Zero Trust enterprise access solution provides organizations an advanced level of visibility and turns every connected endpoint into a Zero Trust endpoint to stop Ransomware lateral movement before they spread.</p><p>Hear how our joint solution can provide your organization:</p><p>* Advanced Ransomware detection and incident response with of Ransomware Kill Switch™</p><p>* Consolidated SOC threat intelligence and analytics</p><p>* End to end visibility and intelligence into malware behaviors</p><p>Thanks to sponsor Airgap Networks!</p><p>Airgap provides an agent-less Anti-Ransomware platform to stop the spread of malware in the enterprise network. Our industry’s first Ransomware Kill Switch™ locks down your most critical network assets at the first indication of compromise with complete control and policy enforcement over the device--device-application communication. Visit them at Black Hat 2021 USA in Vegas or Virtual. For expo passes, contact info@airgap.io.</p>]]></content:encoded><link><![CDATA[https://ransomware-battleground.captivate.fm/episode/kaseya-ransomware-attack-incident-response-with-ransomware-kill-switch]]></link><guid isPermaLink="false">dd143bde-16bc-4d6e-9815-685ca784ee57</guid><itunes:image href="https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg"/><dc:creator><![CDATA[Syya Yasotornrat]]></dc:creator><pubDate>Wed, 28 Jul 2021 00:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/b87188c2-e5b4-45da-b498-a733f9fb06bf/ransomware-battleground-audio-kaseya.mp3" length="73138081" type="audio/mpeg"/><itunes:duration>38:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>16</itunes:episode><podcast:episode>16</podcast:episode><itunes:author>Syya Yasotornrat</itunes:author></item><item><title>Shots Fired at Esports - Final Round</title><itunes:title>Shots Fired at Esports - Final Round</itunes:title><description><![CDATA[<p>In 2021, the global eSports market was valued at just over 1.08 billion U.S. dollars.(Source)</p><p>Online games and specifically the Massive Multiplayer (MMO) games, experience multiple attacks from hackers, platform competition that try to block players’ access to the gaming platforms, as well as cheating players that can attack other players slowing their connection, while gaining a competitive advantage. These attacks can take the entire game offline. Can you visualize losing $400,000 dollars per hour (Source).</p><p>In this series of Ransomware Battleground, we will try to:</p><p>- Know the eSports industry and the leading MMO game developers</p><p>- Understand where the “crown jewels” assets such as in-game currency, identity information, and gaming development resources…are hosted</p><p>- Who is Egregor Ransomware Crew? Is it as RaaS? And how do they hack into corporate networks and deploy the ransomware?</p><p>- What is their extortion behavior and ransom demand and Crypto tracing?</p><p>- Is it too far fetched to say Zero Trust is needed for eSports development?</p><p>- Got Ransomware Kill Switch for eSports?</p><p>Let's close the final round of this Battleground series with Syya and Nigel. Join us!</p>]]></description><content:encoded><![CDATA[<p>In 2021, the global eSports market was valued at just over 1.08 billion U.S. dollars.(Source)</p><p>Online games and specifically the Massive Multiplayer (MMO) games, experience multiple attacks from hackers, platform competition that try to block players’ access to the gaming platforms, as well as cheating players that can attack other players slowing their connection, while gaining a competitive advantage. These attacks can take the entire game offline. Can you visualize losing $400,000 dollars per hour (Source).</p><p>In this series of Ransomware Battleground, we will try to:</p><p>- Know the eSports industry and the leading MMO game developers</p><p>- Understand where the “crown jewels” assets such as in-game currency, identity information, and gaming development resources…are hosted</p><p>- Who is Egregor Ransomware Crew? Is it as RaaS? And how do they hack into corporate networks and deploy the ransomware?</p><p>- What is their extortion behavior and ransom demand and Crypto tracing?</p><p>- Is it too far fetched to say Zero Trust is needed for eSports development?</p><p>- Got Ransomware Kill Switch for eSports?</p><p>Let's close the final round of this Battleground series with Syya and Nigel. Join us!</p>]]></content:encoded><link><![CDATA[https://ransomware-battleground.captivate.fm/episode/shots-fired-at-esports-final-round]]></link><guid isPermaLink="false">c943df0e-ecfd-4572-b517-24b0e4ba1243</guid><itunes:image href="https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg"/><dc:creator><![CDATA[Syya Yasotornrat]]></dc:creator><pubDate>Wed, 21 Jul 2021 00:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/5c8b8914-b262-41aa-9f45-55dbedf62364/final-rb-audio-ep-14-esports-3.mp3" length="89527461" type="audio/mpeg"/><itunes:duration>46:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>15</itunes:episode><podcast:episode>15</podcast:episode><itunes:author>Syya Yasotornrat</itunes:author></item><item><title>Shots Fired at Esports Round 2</title><itunes:title>Shots Fired at Esports Round 2</itunes:title><description><![CDATA[<p>In 2021, the global eSports market was valued at just over 1.08 billion U.S. dollars.(Source)</p><p>Online games and specifically the Massive Multiplayer (MMO) games, experience multiple attacks from hackers, platform competition that try to block players’ access to the gaming platforms, as well as cheating players that can attack other players slowing their connection, while gaining a competitive advantage. These attacks can take the entire game offline. Can you visualize losing $400,000 dollars per hour (Source).</p><p>In this series of Ransomware Battleground, we will try to</p><p>Know the eSports industry and the leading MMO game developers</p><p>Understand where the “crown jewels” assets such as in-game currency, identity information, and gaming development resources…are hosted</p><p>Who is Egregor Ransomware Crew? Is it as RaaS? And how do they hack into corporate networks and deploy the ransomware?</p><p>What is their extortion behavior and ransom demand and Crypto tracing?</p><p>Is it too far-fetched to say Zero Trust is needed for eSports development?</p><p>Let’s open up a new conversation series with Syya, Poul, Nigel and Big-Time Higgs. Join us!</p>]]></description><content:encoded><![CDATA[<p>In 2021, the global eSports market was valued at just over 1.08 billion U.S. dollars.(Source)</p><p>Online games and specifically the Massive Multiplayer (MMO) games, experience multiple attacks from hackers, platform competition that try to block players’ access to the gaming platforms, as well as cheating players that can attack other players slowing their connection, while gaining a competitive advantage. These attacks can take the entire game offline. Can you visualize losing $400,000 dollars per hour (Source).</p><p>In this series of Ransomware Battleground, we will try to</p><p>Know the eSports industry and the leading MMO game developers</p><p>Understand where the “crown jewels” assets such as in-game currency, identity information, and gaming development resources…are hosted</p><p>Who is Egregor Ransomware Crew? Is it as RaaS? And how do they hack into corporate networks and deploy the ransomware?</p><p>What is their extortion behavior and ransom demand and Crypto tracing?</p><p>Is it too far-fetched to say Zero Trust is needed for eSports development?</p><p>Let’s open up a new conversation series with Syya, Poul, Nigel and Big-Time Higgs. Join us!</p>]]></content:encoded><link><![CDATA[https://ransomware-battleground.captivate.fm/episode/shots-fired-at-esports-round-2]]></link><guid isPermaLink="false">779b6d9b-6e4f-4e97-bc07-c52541aa902d</guid><itunes:image href="https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg"/><dc:creator><![CDATA[Syya Yasotornrat]]></dc:creator><pubDate>Tue, 13 Jul 2021 00:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/cbe5085e-a7df-4255-934e-021c90f33c9b/final-rb-audio-ep-13-esports-2.mp3" length="60602226" type="audio/mpeg"/><itunes:duration>31:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>14</itunes:episode><podcast:episode>14</podcast:episode><itunes:author>Syya Yasotornrat</itunes:author></item><item><title>Shots Fired at Esports Round 1</title><itunes:title>Shots Fired at Esports Round 1</itunes:title><description><![CDATA[<p>Online games and specifically the Massive Multiplayer (MMO) games, experience multiple attacks from hackers, platform competition that try to block players’ access to the gaming platforms, as well as cheating players that can attack other players slowing their connection, while gaining a competitive advantage. These attacks can take the entire game offline. Can you visualize losing $400,000 dollars per hour (Source).</p><p>In this series of Ransomware Battleground, we will try to</p><p>- Know the eSports industry and the leading MMO game developers</p><p>- Understand where the “crown jewels” assets such as in-game currency, identity information, and gaming development resources…are hosted</p><p>- Who is Egregor? Is it as RaaS? And how do they hack into corporate networks and deploy the ransomware?</p><p>- What is their extortion behavior and ransom demand and Crypto tracing?</p><p>- Is it too far-fetched to say Zero Trust is needed for eSports development?</p>]]></description><content:encoded><![CDATA[<p>Online games and specifically the Massive Multiplayer (MMO) games, experience multiple attacks from hackers, platform competition that try to block players’ access to the gaming platforms, as well as cheating players that can attack other players slowing their connection, while gaining a competitive advantage. These attacks can take the entire game offline. Can you visualize losing $400,000 dollars per hour (Source).</p><p>In this series of Ransomware Battleground, we will try to</p><p>- Know the eSports industry and the leading MMO game developers</p><p>- Understand where the “crown jewels” assets such as in-game currency, identity information, and gaming development resources…are hosted</p><p>- Who is Egregor? Is it as RaaS? And how do they hack into corporate networks and deploy the ransomware?</p><p>- What is their extortion behavior and ransom demand and Crypto tracing?</p><p>- Is it too far-fetched to say Zero Trust is needed for eSports development?</p>]]></content:encoded><link><![CDATA[https://ransomware-battleground.captivate.fm/episode/shots-fired-at-esports-round-1]]></link><guid isPermaLink="false">ef1df061-2939-43f8-8a48-ee9877582385</guid><itunes:image href="https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg"/><dc:creator><![CDATA[Syya Yasotornrat]]></dc:creator><pubDate>Tue, 06 Jul 2021 00:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/2487368f-3b9a-4ce9-8613-bc3e209b0ea6/ransomware-battleground-esports-1.mp3" length="50714156" type="audio/mpeg"/><itunes:duration>26:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>13</itunes:episode><podcast:episode>13</podcast:episode><itunes:author>Syya Yasotornrat</itunes:author></item><item><title>Ransomware From APT 69420 to Device Cybersecurity</title><itunes:title>Ransomware From APT 69420 to Device Cybersecurity</itunes:title><description><![CDATA[<p>Tesla, Cloudflare, Halifax Health, and Equinox are among the victims involved in a breach of more than 150,000 Verdaka's security cameras by a group of hackers known as Advanced Persistent Threat 69420 Arson Cats. The hackers used a "super admin account," which allowed them to peer into the cameras of all of Verdaka's customers. The group found the user name and password for the administrator account publicly exposed on the internet. (Source:https://www.foxbusiness.com/technology/hacker-group-breaches-security-cameras-at-tesla-equinox-cloudfare)</p><p>Are there reasons to believe that an incident involving office security cameras can impact your customers? How do you defend Device Cybersecurity?</p><p>In this Battleground, we will dig into the cybersecurity implication of unmanaged devices in organizations and how zero trust isolation policies can be put in practice to prevent lateral threats from propagating in the network.</p>]]></description><content:encoded><![CDATA[<p>Tesla, Cloudflare, Halifax Health, and Equinox are among the victims involved in a breach of more than 150,000 Verdaka's security cameras by a group of hackers known as Advanced Persistent Threat 69420 Arson Cats. The hackers used a "super admin account," which allowed them to peer into the cameras of all of Verdaka's customers. The group found the user name and password for the administrator account publicly exposed on the internet. (Source:https://www.foxbusiness.com/technology/hacker-group-breaches-security-cameras-at-tesla-equinox-cloudfare)</p><p>Are there reasons to believe that an incident involving office security cameras can impact your customers? How do you defend Device Cybersecurity?</p><p>In this Battleground, we will dig into the cybersecurity implication of unmanaged devices in organizations and how zero trust isolation policies can be put in practice to prevent lateral threats from propagating in the network.</p>]]></content:encoded><link><![CDATA[https://ransomware-battleground.captivate.fm/episode/ransomware-from-apt-69420-to-device-cybersecurity]]></link><guid isPermaLink="false">1fd0d4f6-c6a0-444b-9807-03aad7c437d3</guid><itunes:image href="https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg"/><dc:creator><![CDATA[Syya Yasotornrat]]></dc:creator><pubDate>Tue, 29 Jun 2021 00:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/34cbd368-872c-4dfe-a820-b663b0ef4b86/from-apt-69420-to-device-cybersecurity.mp3" length="55942926" type="audio/mpeg"/><itunes:duration>29:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>12</itunes:episode><podcast:episode>12</podcast:episode><itunes:author>Syya Yasotornrat</itunes:author></item><item><title>Ransom DDoS Attacks</title><itunes:title>Ransom DDoS Attacks</itunes:title><description><![CDATA[<p>In this episode of Ransomware Battleground, we will be talking about Ransom DDoS attacks. Unlike a ransomware attack, a DDoS Ransom attack does not encrypt a company's systems; it mainly aims to stress and halt them offline. It also does not require the attacker to gain access to a business's internal systems before it can be carried out.&nbsp;So, how would a zero trust isolation solution work to stop this type of attacks. We will discuss:</p><p>What is a ransom DDoS attack?</p><p>What is a DDoS attack?</p><p>How does a ransom DDoS attack work?</p><p>What is the difference between a ransom DDoS attack and ransomware?</p><p>How you can stop the attacks with identity-based segmentation and Zero Trust Isolation?</p>]]></description><content:encoded><![CDATA[<p>In this episode of Ransomware Battleground, we will be talking about Ransom DDoS attacks. Unlike a ransomware attack, a DDoS Ransom attack does not encrypt a company's systems; it mainly aims to stress and halt them offline. It also does not require the attacker to gain access to a business's internal systems before it can be carried out.&nbsp;So, how would a zero trust isolation solution work to stop this type of attacks. We will discuss:</p><p>What is a ransom DDoS attack?</p><p>What is a DDoS attack?</p><p>How does a ransom DDoS attack work?</p><p>What is the difference between a ransom DDoS attack and ransomware?</p><p>How you can stop the attacks with identity-based segmentation and Zero Trust Isolation?</p>]]></content:encoded><link><![CDATA[https://ransomware-battleground.captivate.fm/episode/ransom-ddos-attacks]]></link><guid isPermaLink="false">9721713e-3a5f-45b4-b50b-079491d38990</guid><itunes:image href="https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg"/><dc:creator><![CDATA[Syya Yasotornrat]]></dc:creator><pubDate>Tue, 22 Jun 2021 00:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/cc48b8c1-0dab-4224-8efb-492910a71a40/final-rb-audio-ep-11-ransom-ddos-attacks.mp3" length="27494174" type="audio/mpeg"/><itunes:duration>33:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>11</itunes:episode><podcast:episode>11</podcast:episode><itunes:author>Syya Yasotornrat</itunes:author></item><item><title>Big Game Hunting</title><itunes:title>Big Game Hunting</itunes:title><description><![CDATA[<p>Big Game Hunting, the targeted large-scale ransomware campaign, is now regarded as the primary cyber threat to organizations across all sectors including financial, healthcare, and government in 2021. Leaking stolen data in an effort to pressure victims into paying is part of a&nbsp;broader trend across the BGH ecosystem.&nbsp;In the recent headlines, the ransomware operators go beyond the traditional dominance of Windows operating systems and now target VMware ESXi hypervisor. In this Ransomware Battleground, let’s look at how SPRITE SPIDER(Defray777 Ransomware) and CARBON SPIDER (Parkside Ransomware) operate in volume tactics. How do Cybercrime actors now back to use Linux variants of&nbsp;ransomware&nbsp;configured specifically to affect ESXi hosts?</p><p>In this talk, we will cover:</p><p>- What are Big Game Hunting tactics? And what did ransomware operator behavior change during Covid-19? (from POS to ESXi)</p><p>- How do you defend encrypting virtual infrastructure in your corporate network? Credential harvesting and payload ingesting?</p><p>- Why is Agentless Zero Trust Isolation and Ransomware Kill Switch the answer to stop Hypervisor "Jackpotting"?</p><p>kbpUKfNovr9jO2GOdNrY</p>]]></description><content:encoded><![CDATA[<p>Big Game Hunting, the targeted large-scale ransomware campaign, is now regarded as the primary cyber threat to organizations across all sectors including financial, healthcare, and government in 2021. Leaking stolen data in an effort to pressure victims into paying is part of a&nbsp;broader trend across the BGH ecosystem.&nbsp;In the recent headlines, the ransomware operators go beyond the traditional dominance of Windows operating systems and now target VMware ESXi hypervisor. In this Ransomware Battleground, let’s look at how SPRITE SPIDER(Defray777 Ransomware) and CARBON SPIDER (Parkside Ransomware) operate in volume tactics. How do Cybercrime actors now back to use Linux variants of&nbsp;ransomware&nbsp;configured specifically to affect ESXi hosts?</p><p>In this talk, we will cover:</p><p>- What are Big Game Hunting tactics? And what did ransomware operator behavior change during Covid-19? (from POS to ESXi)</p><p>- How do you defend encrypting virtual infrastructure in your corporate network? Credential harvesting and payload ingesting?</p><p>- Why is Agentless Zero Trust Isolation and Ransomware Kill Switch the answer to stop Hypervisor "Jackpotting"?</p><p>kbpUKfNovr9jO2GOdNrY</p>]]></content:encoded><link><![CDATA[https://ransomware-battleground.captivate.fm/episode/big-game-hunting-]]></link><guid isPermaLink="false">7caa0488-2cde-45a0-9dd1-be04f90cc504</guid><itunes:image href="https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg"/><dc:creator><![CDATA[Syya Yasotornrat]]></dc:creator><pubDate>Mon, 14 Jun 2021 00:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/079299dc-b6c2-4825-a645-a4a1f89ff245/final-rb-audio-ep-10-big-game-hunting.mp3" length="69297916" type="audio/mpeg"/><itunes:duration>36:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>10</itunes:episode><podcast:episode>10</podcast:episode><itunes:summary>Big Game Hunting, the targeted large-scale ransomware campaign, is now regarded as the primary cyber threat to organizations across all sectors including financial, healthcare, and government in 2021.</itunes:summary><itunes:author>Syya Yasotornrat</itunes:author></item><item><title>Tactics &amp; Measures</title><itunes:title>Tactics &amp; Measures</itunes:title><description><![CDATA[<p>On Feb 9th. 2021 - the nightmare scenario that the security community has warned for years, one that could kill thousands by targeting the critical infrastructure that we all rely on. In this case, the hacker gained access to a computer at the Florida water facility used for running remote control software TeamViewer, according to Reuters, and jacked up the levels of sodium hydroxide, aka lye, which would have made the water highly toxic to drink.</p><p>What is really happening here? What tactics and measures should you consider in the ransomware battleground for attacks like this? It is an honor to welcome Information Security Evangelist, Mr. Jeff Man, to join us and discuss this very timely topic.</p><p>- From big game hunting to cyberwar, what are the evolving tactics of recent incidents and breaches?</p><p>- State of Zero Trust practices in the real world, particularly in the public sector?</p><p>- How do you detect and stop the propagation with Zero Trust Isolation? </p>]]></description><content:encoded><![CDATA[<p>On Feb 9th. 2021 - the nightmare scenario that the security community has warned for years, one that could kill thousands by targeting the critical infrastructure that we all rely on. In this case, the hacker gained access to a computer at the Florida water facility used for running remote control software TeamViewer, according to Reuters, and jacked up the levels of sodium hydroxide, aka lye, which would have made the water highly toxic to drink.</p><p>What is really happening here? What tactics and measures should you consider in the ransomware battleground for attacks like this? It is an honor to welcome Information Security Evangelist, Mr. Jeff Man, to join us and discuss this very timely topic.</p><p>- From big game hunting to cyberwar, what are the evolving tactics of recent incidents and breaches?</p><p>- State of Zero Trust practices in the real world, particularly in the public sector?</p><p>- How do you detect and stop the propagation with Zero Trust Isolation? </p>]]></content:encoded><link><![CDATA[https://ransomware-battleground.captivate.fm/episode/tactics-measures]]></link><guid isPermaLink="false">6c9c3be4-2e7d-4d1c-b31d-2951fed6b7ae</guid><itunes:image href="https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg"/><dc:creator><![CDATA[Syya Yasotornrat]]></dc:creator><pubDate>Mon, 07 Jun 2021 00:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/24fd65cd-b86f-4448-a36d-e4ecda31a631/final-rb-audio-ep-9-tactics.mp3" length="91165731" type="audio/mpeg"/><itunes:duration>47:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>9</itunes:episode><podcast:episode>9</podcast:episode><itunes:summary>In this case, the hacker gained access to a computer at the Florida water facility used for running remote control software TeamViewer. What is really happening here? What tactics and measures should you consider in the ransomware battleground for attacks like this? It is an honor to welcome Information Security Evangelist, Mr. Jeff Man, to join for a timely topic.</itunes:summary><itunes:author>Syya Yasotornrat</itunes:author></item><item><title>Ransomware Trend: Double-Extortion Attacks</title><itunes:title>Ransomware Trend: Double-Extortion Attacks</itunes:title><description><![CDATA[<p>In this ransomware battleground, we are looking into double-extortion attacks. What are they? And how do they get triggered? Hackers first extract large amounts of sensitive data prior to encrypting a victim’s databases. Then they threaten to publish the data unless the victim pays ransom demands. This puts extra pressure on organizations to pay up. With these bigger attacks coming in 2021, the adversary has targeted the organization or the government department. How do you defend against this type of attack? Join this podcast with Syya and our elite cybersecurity guest to spot the IOCs and know-how Zero Trust Isolation can help in your defense.</p>]]></description><content:encoded><![CDATA[<p>In this ransomware battleground, we are looking into double-extortion attacks. What are they? And how do they get triggered? Hackers first extract large amounts of sensitive data prior to encrypting a victim’s databases. Then they threaten to publish the data unless the victim pays ransom demands. This puts extra pressure on organizations to pay up. With these bigger attacks coming in 2021, the adversary has targeted the organization or the government department. How do you defend against this type of attack? Join this podcast with Syya and our elite cybersecurity guest to spot the IOCs and know-how Zero Trust Isolation can help in your defense.</p>]]></content:encoded><link><![CDATA[https://ransomware-battleground.captivate.fm/episode/ransomware-trend-double-extortion-attacks]]></link><guid isPermaLink="false">81515cc0-9226-48b2-9d60-69cef54aff54</guid><itunes:image href="https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg"/><dc:creator><![CDATA[Syya Yasotornrat]]></dc:creator><pubDate>Mon, 31 May 2021 00:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/2ccf5d43-c509-4edb-8ede-d926739cc39d/final-rb-audio-ep-8-double-extortion.mp3" length="50429421" type="audio/mpeg"/><itunes:duration>26:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>8</itunes:episode><podcast:episode>8</podcast:episode><itunes:summary>In this ransomware battleground, we are looking into double-extortion attacks. What are they? And how do they get triggered? How do you defend against this type of attack? Join this podcast with Syya and our elite cybersecurity guest to spot the IOCs and know-how Zero Trust Isolation can help in your defense.</itunes:summary><itunes:author>Syya Yasotornrat</itunes:author></item><item><title>Ransomware Intelligence Observations</title><itunes:title>Ransomware Intelligence Observations</itunes:title><description><![CDATA[<p>Ransomware Intelligence Observations and Behavior Prediction for 2021</p><p>The exponential growth of ransomware creates a constant threat to end-users and corporate ITs. Regardless of your business size, industry, or location, preventing ransomware is a critical task to your organization, both from a financial perspective and for your brand reputation.</p><p>This episode discusses recent intelligence about how threat actors deploy ransomware against various industry targets, as well as how the sophistication of ransomware is continuing to evolve.</p><p>- Top 5 ransomware cyber threat patterns and trends</p><p>- Adapting to new security mindset and network designs</p><p>- Using zero trust with auto-discovery, security operational visibility, and instant countermeasures to stop ransomware propagation on points of exposure</p>]]></description><content:encoded><![CDATA[<p>Ransomware Intelligence Observations and Behavior Prediction for 2021</p><p>The exponential growth of ransomware creates a constant threat to end-users and corporate ITs. Regardless of your business size, industry, or location, preventing ransomware is a critical task to your organization, both from a financial perspective and for your brand reputation.</p><p>This episode discusses recent intelligence about how threat actors deploy ransomware against various industry targets, as well as how the sophistication of ransomware is continuing to evolve.</p><p>- Top 5 ransomware cyber threat patterns and trends</p><p>- Adapting to new security mindset and network designs</p><p>- Using zero trust with auto-discovery, security operational visibility, and instant countermeasures to stop ransomware propagation on points of exposure</p>]]></content:encoded><link><![CDATA[https://ransomware-battleground.captivate.fm/episode/ransomware-intelligence-observations-]]></link><guid isPermaLink="false">b658b4b8-6f52-4878-aac0-b1a60a6216f8</guid><itunes:image href="https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg"/><dc:creator><![CDATA[Syya Yasotornrat]]></dc:creator><pubDate>Mon, 24 May 2021 00:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/7dd0a3f8-6200-45b5-ac89-a04f4669c983/final-rb-audio-ep-7-top-5-trends.mp3" length="23766716" type="audio/mpeg"/><itunes:duration>29:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>7</itunes:episode><podcast:episode>7</podcast:episode><itunes:summary>This episode discusses recent intelligence about how threat actors deploy ransomware against various industry targets, as well as how the sophistication of ransomware is continuing to evolve.</itunes:summary><itunes:author>Syya Yasotornrat</itunes:author></item><item><title>Ransomware Trend: Ransomware As A Service (RaaS) Economy</title><itunes:title>Ransomware Trend: Ransomware As A Service (RaaS) Economy</itunes:title><description><![CDATA[<p>Ransomware has evolved beyond the commodity, widespread attacks intended to infect a single endpoint to include more advanced techniques, such as fileless malware and data exfiltration. One of the biggest drivers behind ransomware’s continued success is the adoption of the Ransomware as a Service (RaaS) distribution model.</p><p>These new strains of ransomware make prevention and planning more important than ever to prevent ransomware attacks. Concurrently, ransomware authors are increasingly selling access to ransomware as service offerings that increase the number of attackers and the variants of malware.</p><p>In this chat, we will:</p><p>- Review examples and common denominators of known RaaS attack variants: Ryuk, Lockbit, REvil, Egregor...</p><p>- Go over how fast you can detect and neutralize the RaaS propagation</p><p>- Understand security data intelligence to configure adaptively for Zero Trust access</p><p>- Learn how Zero Trust Isolation to protect your organization against RaaS attacks</p>]]></description><content:encoded><![CDATA[<p>Ransomware has evolved beyond the commodity, widespread attacks intended to infect a single endpoint to include more advanced techniques, such as fileless malware and data exfiltration. One of the biggest drivers behind ransomware’s continued success is the adoption of the Ransomware as a Service (RaaS) distribution model.</p><p>These new strains of ransomware make prevention and planning more important than ever to prevent ransomware attacks. Concurrently, ransomware authors are increasingly selling access to ransomware as service offerings that increase the number of attackers and the variants of malware.</p><p>In this chat, we will:</p><p>- Review examples and common denominators of known RaaS attack variants: Ryuk, Lockbit, REvil, Egregor...</p><p>- Go over how fast you can detect and neutralize the RaaS propagation</p><p>- Understand security data intelligence to configure adaptively for Zero Trust access</p><p>- Learn how Zero Trust Isolation to protect your organization against RaaS attacks</p>]]></content:encoded><link><![CDATA[https://ransomware-battleground.captivate.fm/episode/ransomware-trend-ransomware-as-a-service-raas-economy]]></link><guid isPermaLink="false">abab838f-8d10-42e7-989b-273728b7a857</guid><itunes:image href="https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg"/><dc:creator><![CDATA[Syya Yasotornrat]]></dc:creator><pubDate>Mon, 17 May 2021 00:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/dca549dc-0d9d-4774-926b-02c878a060d7/final-rb-audio-ep-6-raas.mp3" length="63298441" type="audio/mpeg"/><itunes:duration>32:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>6</itunes:episode><podcast:episode>6</podcast:episode><itunes:summary>Ransomware has evolved beyond the commodity, widespread attacks intended to infect a single endpoint to include more advanced techniques, such as fileless malware and data exfiltration. One of the biggest drivers behind ransomware’s continued success is the adoption of the Ransomware as a Service (RaaS) distribution model.</itunes:summary><itunes:author>Syya Yasotornrat</itunes:author></item><item><title>MITRE ATT&amp;CK Technique Deep Dive</title><itunes:title>MITRE ATT&amp;CK Technique Deep Dive</itunes:title><description><![CDATA[<p>Sensational SolarWinds breach brought our attention to supply chain management and network management service (nms). Now, in 2021, what do we know now that we did not? In this episode, Adam Pennington, Principal Cybersecurity Engineer at MITRE, will give us the technical contexts on why Zero Trust Security is the critical piece in the puzzle and reviews how MITRE ATT&amp;CK Framework can be applied in Solarwinds Supply Chain software breach.</p>]]></description><content:encoded><![CDATA[<p>Sensational SolarWinds breach brought our attention to supply chain management and network management service (nms). Now, in 2021, what do we know now that we did not? In this episode, Adam Pennington, Principal Cybersecurity Engineer at MITRE, will give us the technical contexts on why Zero Trust Security is the critical piece in the puzzle and reviews how MITRE ATT&amp;CK Framework can be applied in Solarwinds Supply Chain software breach.</p>]]></content:encoded><link><![CDATA[https://ransomware-battleground.captivate.fm/episode/mitre-attck-technique-deep-dive]]></link><guid isPermaLink="false">895f7a6a-d293-4e2d-8c68-2b44ee935063</guid><itunes:image href="https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg"/><dc:creator><![CDATA[Syya Yasotornrat]]></dc:creator><pubDate>Tue, 11 May 2021 08:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/f372284e-581e-4e32-b096-e992bffd1366/final-rb-audio-ep-5-mitre-attacks.mp3" length="69599351" type="audio/mpeg"/><itunes:duration>36:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>5</itunes:episode><podcast:episode>5</podcast:episode><itunes:summary>Sensational SolarWinds breach brought our attention to supply chain management and network management service (nms). Now, in 2021, what do we know now that we did not? In this episode, Adam Pennington, Principal Cybersecurity Engineer at MITRE, will give us the technical contexts on why Zero Trust Security is the critical piece in the puzzle and reviews how MITRE ATT&amp;CK Framework can be applied in Solarwinds Supply Chain software breach.</itunes:summary><itunes:author>Syya Yasotornrat</itunes:author></item><item><title>Digging Deeper into the SolarWinds Supply Chain Attack</title><itunes:title>Digging Deeper into the SolarWinds Supply Chain Attack</itunes:title><description><![CDATA[<p>While the SolarWinds supply chain attack remains largely unknown, gathering the resources you need to understand, react, and respond is critical. For your team to remain secure and confident through the ongoing SolarWinds network performance and diagnostics, we are hosting a podcast discussion with Cybersecurity expert Dr. Chase Cunningham to discuss its impact and mitigation approaches as we take the attacker's mindset.</p>]]></description><content:encoded><![CDATA[<p>While the SolarWinds supply chain attack remains largely unknown, gathering the resources you need to understand, react, and respond is critical. For your team to remain secure and confident through the ongoing SolarWinds network performance and diagnostics, we are hosting a podcast discussion with Cybersecurity expert Dr. Chase Cunningham to discuss its impact and mitigation approaches as we take the attacker's mindset.</p>]]></content:encoded><link><![CDATA[https://ransomware-battleground.captivate.fm/episode/digging-deeper-into-the-solarwinds-supply-chain-attack]]></link><guid isPermaLink="false">5c0fce53-adb4-4327-9423-6b460ec1eb74</guid><itunes:image href="https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg"/><dc:creator><![CDATA[Syya Yasotornrat]]></dc:creator><pubDate>Mon, 03 May 2021 00:15:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/fcdbc357-0305-4c86-a398-e6bd76071d51/final-rb-audio-ep-4-what-happened-supply-chain.mp3" length="57337376" type="audio/mpeg"/><itunes:duration>29:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>4</itunes:episode><podcast:episode>4</podcast:episode><itunes:summary>Cybersecurity expert Dr. Chase Cunningham joins Syya Yasotornrat to discuss its impact and mitigation approaches as we take the attacker&apos;s mindset.</itunes:summary><itunes:author>Syya Yasotornrat</itunes:author></item><item><title>Supply Chain Cyberattack</title><itunes:title>Supply Chain Cyberattack</itunes:title><description><![CDATA[<p>The Solarwinds Supply Chain Cyberattacks have huge implications on the level of sophistication, coordination and source of funding. </p><p>In this episode of Ransomware Battleground, we will go over the root causes why Infecting the legitimate software updates of a widely used vendor can be an effective way to covertly inject malware into a large number of organizations. According to Dark Reading, over 18,000 organizations possibly compromised in massive supply-chain cyberattack, nation-state attackers used poisoned SolarWinds network management software updates to distribute malware; US government orders federal civilian agencies to immediately power down the technology. Let's break it down with the CISO experts in public sector - Mike Davis and Simon Mijolovic. Ritesh Agrawal, CEO of Airgap Networks, will brainstorm the Zero Trust Security guidelines among all devices and applications. </p>]]></description><content:encoded><![CDATA[<p>The Solarwinds Supply Chain Cyberattacks have huge implications on the level of sophistication, coordination and source of funding. </p><p>In this episode of Ransomware Battleground, we will go over the root causes why Infecting the legitimate software updates of a widely used vendor can be an effective way to covertly inject malware into a large number of organizations. According to Dark Reading, over 18,000 organizations possibly compromised in massive supply-chain cyberattack, nation-state attackers used poisoned SolarWinds network management software updates to distribute malware; US government orders federal civilian agencies to immediately power down the technology. Let's break it down with the CISO experts in public sector - Mike Davis and Simon Mijolovic. Ritesh Agrawal, CEO of Airgap Networks, will brainstorm the Zero Trust Security guidelines among all devices and applications. </p>]]></content:encoded><link><![CDATA[https://ransomware-battleground.captivate.fm/episode/supply-chain-cyberattack]]></link><guid isPermaLink="false">86835a68-dde8-4b94-8b73-9a693ded480c</guid><itunes:image href="https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg"/><dc:creator><![CDATA[Syya Yasotornrat]]></dc:creator><pubDate>Mon, 03 May 2021 00:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/4fc38696-ea71-4bf2-9cad-539f0e895257/final-rb-audio-ep-3-supply-chain-cyberattack.mp3" length="48153211" type="audio/mpeg"/><itunes:duration>25:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>3</itunes:episode><podcast:episode>3</podcast:episode><itunes:summary>CISO experts in public sector - Mike Davis and Simon Mijolovic. Ritesh Agrawal, CEO of Airgap Networks, join Syya Yasotornrat on the intial thoughts on the SolarWinds Supply Chain Attack.</itunes:summary><itunes:author>Syya Yasotornrat</itunes:author></item><item><title>Ransomware In The News</title><itunes:title>Ransomware In The News</itunes:title><description><![CDATA[<p>Ransomware cyberattacks are a big business, so big in fact, some research anticipates a business is attacked by a cybercriminal every 11 seconds and damage costs from these attacks will hit around $20 billion by 2021. With so many ransomware attack incidents happening, let's hear Syya and Ritesh Agrawal, CEO of Airgap, chat on this very timely topic.</p>]]></description><content:encoded><![CDATA[<p>Ransomware cyberattacks are a big business, so big in fact, some research anticipates a business is attacked by a cybercriminal every 11 seconds and damage costs from these attacks will hit around $20 billion by 2021. With so many ransomware attack incidents happening, let's hear Syya and Ritesh Agrawal, CEO of Airgap, chat on this very timely topic.</p>]]></content:encoded><link><![CDATA[https://ransomware-battleground.captivate.fm/episode/ransomware-in-the-news]]></link><guid isPermaLink="false">9d29380a-0bab-49f7-9bf8-39c834d72987</guid><itunes:image href="https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg"/><dc:creator><![CDATA[Syya Yasotornrat]]></dc:creator><pubDate>Mon, 26 Apr 2021 12:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/9771259d-aa55-4c9c-be39-7902766278fc/final-rb-audio-ep-2-news.mp3" length="16265956" type="audio/mpeg"/><itunes:duration>19:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>2</itunes:episode><podcast:episode>2</podcast:episode><itunes:summary>Ransomware cyberattacks are a big business. With so many ransomware attack incidents happening, let&apos;s hear Syya and Ritesh Agrawal, CEO of Airgap, chat on this very timely topic.</itunes:summary><itunes:author>Syya Yasotornrat</itunes:author></item><item><title>Ryuk Ransomware - &quot;The Demon of Death&quot;</title><itunes:title>Ryuk Ransomware - &quot;The Demon of Death&quot;</itunes:title><description><![CDATA[<p>Ryuk, aka. "Demon of Death" is wreaking havoc and ushering operators to go "big game hunting" and have previously targeted large organizations, including shipping giant Pitney Bowes and the U.S. Coast Guard. UHS has 400 hospitals and healthcare facilities in the U.S. and the U.K., and serves millions of patients each year. In this session, you will get to know how Ryuk ransomware behave in your organization and how you can use Zero Trust Isolation to prevent the attack proactively.</p><p>Vinay Adavi, Product Manager, Airgap helps put Ryuk into perspective and advises on best practices to protect from these increasingly sophisticated attacks.</p>]]></description><content:encoded><![CDATA[<p>Ryuk, aka. "Demon of Death" is wreaking havoc and ushering operators to go "big game hunting" and have previously targeted large organizations, including shipping giant Pitney Bowes and the U.S. Coast Guard. UHS has 400 hospitals and healthcare facilities in the U.S. and the U.K., and serves millions of patients each year. In this session, you will get to know how Ryuk ransomware behave in your organization and how you can use Zero Trust Isolation to prevent the attack proactively.</p><p>Vinay Adavi, Product Manager, Airgap helps put Ryuk into perspective and advises on best practices to protect from these increasingly sophisticated attacks.</p>]]></content:encoded><link><![CDATA[https://ransomware-battleground.captivate.fm/episode/ryuk-ransomware-the-demon-of-death]]></link><guid isPermaLink="false">7b570422-ba64-480e-a97b-8cc5aad895da</guid><itunes:image href="https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg"/><dc:creator><![CDATA[Syya Yasotornrat]]></dc:creator><pubDate>Mon, 26 Apr 2021 12:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/e571a4cb-c206-44ee-a6ef-447fec71e90f/final-rb-audio-ep-1-ryuk.mp3" length="41051317" type="audio/mpeg"/><itunes:duration>32:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>1</itunes:episode><podcast:episode>1</podcast:episode><itunes:summary>Ryuk, aka. &quot;Demon of Death&quot; is wreaking havoc and ushering operators to go &quot;big game hunting.&quot; Syya Yasotornrat and Vinay Adavi it means &amp; the implications to avoid being a target of these increasingly sophisticated attacks.</itunes:summary><itunes:author>Syya Yasotornrat</itunes:author></item><item><title>Introducing the Battlefield</title><itunes:title>Introducing the Battlefield</itunes:title><description><![CDATA[<p>Welcome to the Ransomware Battleground!</p><p>It's not a surprise that as we have become increasingly dependent on the convenience of technology, the potential of getting hacked increases exponentially.</p><p>We like our conveniences and we want gratification immediately. But what are the implications of opening our personal and professional lives? What do bad actors want with the our data? How are they creating havoc and how much money and time are we losing to these characters? Do we even own our data anymore? Most importantly, where do we go from here?</p><p>Syya Yasotornrat and Poul Frederiksen chat about their background, how they met and what we can expect from Ransomware Battleground. </p><p>For more information on sponsor, Airgap Networks, check them out on their KILL SWITCH Here: <a href="https://f.hubspotusercontent10.net/hubfs/6848218/Solution%20Brief%20-%20Airgap%20Ransomware%20Kill%20Switch.pdf" rel="noopener noreferrer" target="_blank">https://f.hubspotusercontent10.net/hubfs/6848218/Solution%20Brief%20-%20Airgap%20Ransomware%20Kill%20Switch.pdf</a></p>]]></description><content:encoded><![CDATA[<p>Welcome to the Ransomware Battleground!</p><p>It's not a surprise that as we have become increasingly dependent on the convenience of technology, the potential of getting hacked increases exponentially.</p><p>We like our conveniences and we want gratification immediately. But what are the implications of opening our personal and professional lives? What do bad actors want with the our data? How are they creating havoc and how much money and time are we losing to these characters? Do we even own our data anymore? Most importantly, where do we go from here?</p><p>Syya Yasotornrat and Poul Frederiksen chat about their background, how they met and what we can expect from Ransomware Battleground. </p><p>For more information on sponsor, Airgap Networks, check them out on their KILL SWITCH Here: <a href="https://f.hubspotusercontent10.net/hubfs/6848218/Solution%20Brief%20-%20Airgap%20Ransomware%20Kill%20Switch.pdf" rel="noopener noreferrer" target="_blank">https://f.hubspotusercontent10.net/hubfs/6848218/Solution%20Brief%20-%20Airgap%20Ransomware%20Kill%20Switch.pdf</a></p>]]></content:encoded><link><![CDATA[https://ransomware-battleground.captivate.fm/episode/introducing-the-battlefield]]></link><guid isPermaLink="false">aa301fae-e3b5-4f8d-a6a8-b356a849c5d9</guid><itunes:image href="https://artwork.captivate.fm/976c343a-a4d6-404f-b7f9-8b2669dc0b74/B2s2olvxxM-kT7g1p144ue-z.jpg"/><dc:creator><![CDATA[Syya Yasotornrat]]></dc:creator><pubDate>Mon, 26 Apr 2021 12:00:00 -0600</pubDate><enclosure url="https://podcasts.captivate.fm/media/22a18350-9357-48e3-bd89-1253678af99c/rb-intro-ep-audio-only.mp3" length="17604825" type="audio/mpeg"/><itunes:duration>14:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Ransomware attacks are just the tip of the iceberg in the threat actors toolbelts. The fight in information security, or cybersecurity is an endless game of cat and mouse. 

Join Syya Yasotornrat and Poul Frederiksen as they explore various ransomware attacks and the implications to business and personal lives.</itunes:summary><itunes:author>Syya Yasotornrat</itunes:author></item></channel></rss>