PI MediaTechnology
PI MediaTechnology
PI MediaTechnology
PI MediaTechnology

About

A podcast that follows CheckPoint's Threat Intelligence Group analysts and researchers as they scour the internet for new threats and vulnerabilities.

Produced by PI Media LTD
!#002#

  • Iran’s Most Advanced Cyber Attack Yet [CPRadio]
    For years now, Iran’s state-sponsored hackers have been some of the most prolific in the world. But prolific does not necessarily mean sophisticated -- its attacks haven’t quite impressed in the way that the U.S., Russia, and China’s do. But in a...
  • H1 2023 in Cybersecurity [CPRadio]
    Once a year, Check Point Research releases a “mid-year report”: a summary of the first half of the calendar year in cybersecurity, including all of the major changes, trends, and events that defined January through June. Obviously a lot happens in...
  • How Microsoft Changed Cyberspace With One Decision [CPRadio]
    Between corporations, governments, and the rest of us, billions are spent every year trying to secure cyberspace. Which makes it almost unbelievable to think that just one, simple policy change from one company -- with almost no cost to anybody, and...
  • FakeCalls: the Spam Calls that Really Work [CPRadio]
    For all the ridiculous spam calls in the world, but a small percentage of them are actually, legitimately, convincing. According to the Korean government, “voice phishing” compromises nearly 200 Korean citizens every day, with average financial losses...
  • Operation Silent Watch [CPRadio]
    In July 2021, several prominent human rights activists in Azerbaijan received the same phishing email that delivered them spyware, capable of causing significant harm to their personal and professional lives. But that was only the beginning of a story...
  • 2022 in Cybersecurity [CPRadio]
    In 2022, government APTs wiped out entire computer systems, hackers turned good software evil, and ransomware evolved into something entirely new. In this episode we'll review the biggest stories, most important trends, and cutting insights from the...
  • AI Can Write Malware Now. Are We Doomed? [CPRadio]
    Today's AI can beat humans at Jeopardy, chess, recognizing faces and diagnosing medical conditions. As of last Fall it can write malware, too. In fact, it can write an entire attack chain: phishing emails, macros, reverse shells, you name it. What do...
  • Magic: How Hackers Make NFTs Disappear [CPRadio]
    Earlier this Fall, some users of the OpenSea trading platform posted dire messages to Twitter: all of the NFTs in their wallets were gone. Thousands of dollars worth of investments had suddenly disappeared. Soon it became clear: they were never...
  • The New Face of Hacktivism [CPRadio]
    For decades, hacktivism has been associated with groups like Anonymous. Recently, though, something has changed. An entirely new kind of hacktivist has arisen: one with more resources, capabilities and power than anything we've seen before.
  • Blockchain Security 101 [CPRadio]
    Every year, ordinary people lose money in blockchain hacks. Could it be that this technology is simply insecure by nature? Or is there something we’re all missing -- something that can save this industry, and the millions of people who’ve invested...
  • Check Point’s 2022 Mid-Year Cyber Attack Trends report [CPRadio]
    How was the use of cyber manifested in the Russia-Ukraine war? Will Microsoft block VB macros? We'll discuss all this and more while reviewing the Mid-Year Cyber Attack Trends report of 2022.
  • Twisted Panda: China vs. Russia [CPRadio]
    On March 23rd, 2022, individuals working at the most important defense research institutes in Russia all received variations of the same email. The messages appeared to be quite official, regarding sanctions for Ukraine. In reality they were traps,...
  • Wannacry's 5th Anniversary Special [CPRadio]
    Five years ago today, the world witnessed the most destructive ransomware attack ever. Its name was Wannacry, and it changed everything. What happened, how has ransomware evolved since, and have we learned our lesson? Or could something just like it...
  • Inside Russia's Biggest Ransomware Operation [CPRadio]
    The Conti group tallied over 700 victims, including many multi-million-dollar corporate, government and healthcare organizations. Then, in their most publicized move yet, they put their full backing behind the Russian invasion of Ukraine. One...
  • Cyber Security Awareness Month [CPRadio]
    Did you know that in 2021 there has been a 40% increase in weekly average number of cyber attacks compared to 2020? That is just one of the fascinating findings in the report published by Check Point due to the Cybersecurity Awareness Month. In this...
  • Hacking a Kindle [CPRadio]
    You own some pretty "smart" computers. The laptop on your desk, the phone in your pocket, the system that runs your car. But you're also surrounded by "dumb" computers--simple machines, like your alarm clock, your computer mouse, your refrigerator. We...
  • Disruption [CPRadio]
    It seemed like a totally normal day--people went to work, to school, to get away for an early weekend. Then, across the country of Iran, trains began to freeze in place. The system for tracking them went down. And, on display screens in stations...
  • Cyber Academy – CVE database [CPRadio]
    In this episode of “Cyber Academy" we will talk about the CVE database. What's a CVE? What do the numbers attached to the CVE mean? Are they random or not? Why do we need to catalogue CVEs? What is the connection between CVEs and dictionaries,...
  • Atlassian’s Account Takeover in One Click [CPRadio]
    Check Point Research (CPR) finds security flaws in Atlassian, a platform used by 180,000 customers worldwide to engineer software and manage projects. With just one click, an attacker could have used the flaws get access to the Atlassian Jira bug...
  • Cyber Academy - What is the difference between Viruses, Worms and Trojans? [CPRadio]
    In this episode of "Cyber Academy" we will talk about viruses, worms and trojans. What is the difference between these three types of malware and what they have in common. We will talk about their evolvement since the early days of the internet till...