State of Cybercrime podcast

The Double-Helix Heist

0:00
18:19
Spola tillbaka 15 sekunder
Spola framåt 15 sekunder

Few breaches have drawn as much social media fervor as the recent 23andMe incident, in which the genomics company was victim to a massive credential stuffing attack that leveraged leaked and reused passwords to target accounts without MFA.

What differentiates this attack from others is that 23andMe itself was not breached, but an entire wave of its users was targeted individually. There are claims that these profiles — including genetic and geographic ancestry data — are available on hacking forums, but the legitimacy of those claims is still being investigated.

Join the State of Cybercrime team, Matt, David, and Dvir, to learn about the numerous tools hackers use for cred stuffing, examples of when these tactics have been used in organizational attacks, and what you can do to protect yourself.

OUR FAN-FAVORITE PANEL WILL ALSO DISCUSS:

  • The record-breaking HTTP/2 Rapid Reset zero-day
  • The HelloKitty ransomware group source code leak
  • New attacks from ALPHV (BlackCat)
  • An update on the trends in cyber warfare

Fler avsnitt från "State of Cybercrime"