Artwork

Content provided by Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Defensive Security Podcast Episode 295

1:15:57
 
Share
 

Manage episode 464620484 series 1344233
Content provided by Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including the alarming statistics surrounding ransomware attacks, the implications of paying ransoms, and the evolving nature of ransomware as a broader category of cyber threats. They also discuss the consolidation of security tools and the skepticism surrounding it, particularly in light of a recent report by Palo Alto and IBM. The conversation shifts to the risks associated with AI, highlighted by the DeepSeek incident, and concludes with a discussion on the importance of securing management interfaces and the ongoing challenges in the cybersecurity landscape.

Links:

  • https://www.infosecurity-magazine.com/news/ransomware-victims-shut-operations/
  • https://www.cybersecuritydive.com/news/consolidation-security-tools/738912/
  • https://9to5mac.com/2025/01/31/security-bite-top-macos-threat-found-riding-the-deepseek-wave/
  • https://www.securityweek.com/sonicwall-confirms-exploitation-of-new-sma-zero-day/
  • https://www.theregister.com/2025/01/30/deepseek_database_left_open/

Takeaways

  • 58% of ransomware victims had to shut down operations temporarily.
  • Only 13% of victims who paid ransom got all their data back.
  • The ransomware ecosystem relies on the belief that victims will recover their data.
  • Organizations average 83 different security tools, leading to inefficiencies.
  • Speed in deploying AI can compromise security practices.
  • DeepSeek incident highlights risks of using unverified AI models.
  • SonicWall’s zero-day vulnerability emphasizes the need for secure management practices.
  • Security tool consolidation may not always lead to better outcomes.
  • Phishing and RDP compromises are common entry points for ransomware.
  • The evolving nature of ransomware requires a broader understanding of cyber threats.
  continue reading

285 episodes

Artwork
iconShare
 
Manage episode 464620484 series 1344233
Content provided by Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including the alarming statistics surrounding ransomware attacks, the implications of paying ransoms, and the evolving nature of ransomware as a broader category of cyber threats. They also discuss the consolidation of security tools and the skepticism surrounding it, particularly in light of a recent report by Palo Alto and IBM. The conversation shifts to the risks associated with AI, highlighted by the DeepSeek incident, and concludes with a discussion on the importance of securing management interfaces and the ongoing challenges in the cybersecurity landscape.

Links:

  • https://www.infosecurity-magazine.com/news/ransomware-victims-shut-operations/
  • https://www.cybersecuritydive.com/news/consolidation-security-tools/738912/
  • https://9to5mac.com/2025/01/31/security-bite-top-macos-threat-found-riding-the-deepseek-wave/
  • https://www.securityweek.com/sonicwall-confirms-exploitation-of-new-sma-zero-day/
  • https://www.theregister.com/2025/01/30/deepseek_database_left_open/

Takeaways

  • 58% of ransomware victims had to shut down operations temporarily.
  • Only 13% of victims who paid ransom got all their data back.
  • The ransomware ecosystem relies on the belief that victims will recover their data.
  • Organizations average 83 different security tools, leading to inefficiencies.
  • Speed in deploying AI can compromise security practices.
  • DeepSeek incident highlights risks of using unverified AI models.
  • SonicWall’s zero-day vulnerability emphasizes the need for secure management practices.
  • Security tool consolidation may not always lead to better outcomes.
  • Phishing and RDP compromises are common entry points for ransomware.
  • The evolving nature of ransomware requires a broader understanding of cyber threats.
  continue reading

285 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Listen to this show while you explore
Play