loader from loading.io

CST Replay: The Ransomware Ecosystem with Tammy Harper

Cybersecurity Today

Release Date: 09/20/2025

Extinction Level Cyber Vulnerability Now Fixed show art Extinction Level Cyber Vulnerability Now Fixed

Cybersecurity Today

Cybersecurity Today: Major Vulnerabilities and Attacks Uncovered Join host David Shipley for today's cybersecurity updates on the last day of summer 2025. In this episode, we delve deep into Microsoft's critical Entra ID vulnerability, a cyber attack crippling major European airports, the rise of SpamGPT targeting phishing operations, and the alarming zero-click flaw in OpenAI's deep research agent. Hear about Canadian Police's big win against the shadowy Trade Ogre crypto platform and their $40 million asset seizure. Buckle up for a reality check on the evolving cyber threats and their impact...

info_outline
CST Replay: The Ransomware Ecosystem with Tammy Harper show art CST Replay: The Ransomware Ecosystem with Tammy Harper

Cybersecurity Today

Unveiling the Ransomware Ecosystem with Tammy Harper In this compelling episode, Jim is joined by Tammy Harper from Flair.io to re-air one of their most popular and insightful episodes. Dive into the intricate world of ransomware as Tammy, a seasoned threat intelligence researcher, provides an in-depth introduction to the ransomware ecosystem. Explore the basics and nuances of ransomware, from its origins to its modern-day complexities. Tammy discusses not only the operational structures and notable ransomware groups like Conti, LockBit, and Scattered Spider, but also the impact and evolution...

info_outline
Cybersecurity Today - The Good News Edition show art Cybersecurity Today - The Good News Edition

Cybersecurity Today

Cybersecurity Today: The Good News Edition In this episode, host Jim Love addresses a previous mistake regarding the location of Yellowknife and announces a special 'good news' edition. Key stories include Microsoft's dismantling of a global phishing-as-a-service operation Raccoon 0365, the recovery of nearly $2 million lost to a business email compromise scam by a Texas county, and the Commonwealth Bank of Australia's significant reduction in scam losses through AI-powered defenses. The episode emphasizes lessons learned in cybersecurity and the positive outcomes from recent countermeasures....

info_outline
Shai-Hulud Worm - A Self Propagating Supply Chain Threat show art Shai-Hulud Worm - A Self Propagating Supply Chain Threat

Cybersecurity Today

Cybersecurity Worms, Steganography Attacks, Municipal Cyber Incidents and More... In this episode of Cybersecurity Today, host Jim Love delves into multiple cybersecurity threats affecting the tech landscape. He discusses the 'Shai Hulud' worm, which has infiltrated over 187 JavaScript libraries on NPM, exploiting developer tokens for spread, including those maintained by CrowdStrike. Love explains practical but challenging measures to mitigate such threats. He also explores steganography's role in hiding malicious scripts within seemingly benign image files, urging vigilance against embedding...

info_outline
NPM Attack Leave Hackers Empty Handed: Cybersecurity Today with David Shipley show art NPM Attack Leave Hackers Empty Handed: Cybersecurity Today with David Shipley

Cybersecurity Today

Cybersecurity Today: NPM Attack, Void Proxy Phishing, and Major Business Disruptions In this episode of Cybersecurity Today, host David Shipley discusses a recent massive NPM attack that, despite causing significant disruption, left hackers with minimal gains. We also cover a new, highly sophisticated phishing service called Void Proxy, which targets Microsoft and Google accounts. Additionally, we delve into the severe repercussions of cyber attacks on major companies like Jaguar Land Rover and Marks and Spencer, highlighting the wide-ranging impacts on supply chains and leadership. Join us...

info_outline
The Godfather of Zero Trust - A Discussion with John Kindervag show art The Godfather of Zero Trust - A Discussion with John Kindervag

Cybersecurity Today

Inside Zero Trust: John Kindervag and the Evolution of Cybersecurity In this episode of Cybersecurity Today: Weekend Edition, host Jim Love speaks with John Kindervag, the pioneer behind the Zero Trust model of cybersecurity. With over 25 years of industry experience, John delves into how the concept originated from his early work with firewalls, advocating for a system where no packet is trusted by default. He discusses the fundamental principles of Zero Trust, including defining protect surfaces, mapping transaction flows, and implementing microsegmentation. The conversation also touches on...

info_outline
Microsoft Patches Zero Day And More show art Microsoft Patches Zero Day And More

Cybersecurity Today

Cybersecurity Today: Microsoft Patches, Canadian Data Breach, NVIDIA's New Tool, and a Senator's Call for Investigation In this episode of Cybersecurity Today, host Jim Love discusses Microsoft's September patch update addressing 81 security flaws, including two zero-day vulnerabilities. Highlights include a data breach in Canada affecting email and phone numbers, NVIDIA's release of an open-source LLM vulnerability scanner, and US Senator Ron Wyden's call for the FTC to investigate Microsoft's security practices. The episode also clears up the mystery behind the bricked SSDs after a Windows...

info_outline
iCloud Calendar Invites Disguise New Phishing Campaigns show art iCloud Calendar Invites Disguise New Phishing Campaigns

Cybersecurity Today

Phishing Scams, Leaked Stream Keys, Zero-Day Android Vulnerabilities, and Bounties on Russian Hackers In this episode of Cybersecurity Today, host Jim Love discusses several critical cybersecurity issues. Attackers are using iCloud calendar invites for phishing scams, leveraging Apple's system to bypass security checks. The US Department of Defense has exposed livestream credentials, risking hijack and fake content insertion. Billions of Android phones are vulnerable due to unpatched critical zero days, and Google has only fixed issues for Pixel devices so far. Additionally, the US State...

info_outline
Hackers Say Thanks For Lousy Security In Large Fast Food Chain show art Hackers Say Thanks For Lousy Security In Large Fast Food Chain

Cybersecurity Today

Cybersecurity Today: Ghost Action Campaign, SalesLoft Breach, AI Vulnerabilities, and Restaurant Security Flaws Host David Shipley discusses the latest in cybersecurity, including the Ghost Action Campaign which compromised over 3000 secrets from GitHub repositories, the SalesLoft breach affecting major cybersecurity and SaaS firms, and new research showing how large language model chatbots like GPT-4 can be manipulated easily. Additionally, ethical hackers uncover significant vulnerabilities in the digital platforms of Restaurant Brands International. The episode emphasizes the importance of...

info_outline
From CVE To Cyber Attack In Minutes With AI: Cybersecurity Today show art From CVE To Cyber Attack In Minutes With AI: Cybersecurity Today

Cybersecurity Today

The Future of Cybersecurity: AI, Exploits, and the CVE Database In this special crossover episode of Cybersecurity Today and Hashtag Trending, the hosts explore the use of artificial intelligence (AI) in cybersecurity. The conversation begins with an overview of the ongoing 'arms race' to find and exploit software vulnerabilities, focusing on how AI can change the game. The episode delves into the Common Vulnerability and Exposures (CVE) Database, its importance, and its management by the Mitre Corporation. The discussion then spotlights groundbreaking research by Israeli researchers Effie...

info_outline
 
More Episodes

Unveiling the Ransomware Ecosystem with Tammy Harper

In this compelling episode, Jim is joined by Tammy Harper from Flair.io to re-air one of their most popular and insightful episodes. Dive into the intricate world of ransomware as Tammy, a seasoned threat intelligence researcher, provides an in-depth introduction to the ransomware ecosystem. Explore the basics and nuances of ransomware, from its origins to its modern-day complexities. Tammy discusses not only the operational structures and notable ransomware groups like Conti, LockBit, and Scattered Spider, but also the impact and evolution of ransomware as a service. She also elaborates on ransomware negotiation tactics and how initial access brokers operate. This episode is packed with invaluable information for anyone looking to understand the cybercrime underground economy. Don’t forget to leave your questions in the comments, and they might be addressed in future episodes!

00:00 Introduction and Episode Re-Run Announcement
00:29 Guest Introduction: Tammy Harper from Flair io
00:41 Exploring the Dark Web and Ransomware
02:21 Tammy Harper's Background and Expertise
03:40 Understanding the Ransomware Ecosystem
04:02 Ransomware Business Models and Initial Access Brokers
07:08 Double and Triple Extortion Tactics
11:23 History of Ransomware: From AIDS Trojan to WannaCry
13:02 The Rise of Ransomware as a Service (RaaS)
19:41 Conti: The Ransomware Giant
26:17 Conti's Tools of the Trade: EMOTET, ICEDID, and TrickBot
32:05 The Conti Leaks and Their Impact
34:04 LockBit and the Ransomware Cartel
37:07 National Hazard Agency: A Subgroup of LockBit
38:17 Release of Volume Two and Its Impact
39:08 Details of the Training Manual
40:52 Ransomware Negotiations
41:28 Ransom Chat Project
42:27 Conti vs. LockBit Negotiation Tactics
43:30 Professionalism in Ransomware Operations
47:07 Ransomware Chat Simulation
48:03 Ransom Look Project
49:11 Current Ransomware Landscape
50:32 Infiltration and Research Methods
51:47 Profiles of Emerging Ransomware Groups
01:05:21 Initial Access Market
01:10:26 Future of Ransomware and Law Enforcement Efforts
01:13:14 Conclusion and Final Thoughts