State of Cybercrime podcast

The Double-Helix Heist

0:00
18:19
Spol 15 sekunder tilbage
Spol 15 sekunder frem

Few breaches have drawn as much social media fervor as the recent 23andMe incident, in which the genomics company was victim to a massive credential stuffing attack that leveraged leaked and reused passwords to target accounts without MFA.

What differentiates this attack from others is that 23andMe itself was not breached, but an entire wave of its users was targeted individually. There are claims that these profiles — including genetic and geographic ancestry data — are available on hacking forums, but the legitimacy of those claims is still being investigated.

Join the State of Cybercrime team, Matt, David, and Dvir, to learn about the numerous tools hackers use for cred stuffing, examples of when these tactics have been used in organizational attacks, and what you can do to protect yourself.

OUR FAN-FAVORITE PANEL WILL ALSO DISCUSS:

  • The record-breaking HTTP/2 Rapid Reset zero-day
  • The HelloKitty ransomware group source code leak
  • New attacks from ALPHV (BlackCat)
  • An update on the trends in cyber warfare

Flere episoder fra "State of Cybercrime"