Just in time for spooky season, this episode takes you into the darkest corners of the cyber underworld, where the real monsters aren’t ghosts or goblins, but ransomware gangs lurking in the shadows.
We sat down with Matthew Maynard (3.42), a cybersecurity pro by day and a real-life cyber ghostbuster by night, who doesn’t just hunt vulnerabilities, but haunts the hackers themselves.
While most bug bounty programs reward researchers for finding flaws, Matthew’s work is far more chilling (and thrilling). As part of threat intelligence programs like Halcyon’s Threat Research Intelligence Program (TRIP), he infiltrates ransomware gangs, extracts their secrets and helps shut down their operations before they strike.
For CISOs and executives, Matthew’s experience offers a rare and critical perspective on how to shift from reactive fire-drills to proactive threat hunting. By leveraging dark web intelligence, undercover engagements, and threat actor profiling, security leaders can anticipate attacks, disrupt criminal operations, and even recover stolen data before it’s too late.
All content for Infosecurity Magazine Podcast is the property of Infosecurity Magazine and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Just in time for spooky season, this episode takes you into the darkest corners of the cyber underworld, where the real monsters aren’t ghosts or goblins, but ransomware gangs lurking in the shadows.
We sat down with Matthew Maynard (3.42), a cybersecurity pro by day and a real-life cyber ghostbuster by night, who doesn’t just hunt vulnerabilities, but haunts the hackers themselves.
While most bug bounty programs reward researchers for finding flaws, Matthew’s work is far more chilling (and thrilling). As part of threat intelligence programs like Halcyon’s Threat Research Intelligence Program (TRIP), he infiltrates ransomware gangs, extracts their secrets and helps shut down their operations before they strike.
For CISOs and executives, Matthew’s experience offers a rare and critical perspective on how to shift from reactive fire-drills to proactive threat hunting. By leveraging dark web intelligence, undercover engagements, and threat actor profiling, security leaders can anticipate attacks, disrupt criminal operations, and even recover stolen data before it’s too late.
Inside the MOVEit Attack: Decrypting Clop's TTPs and Empowering Cybersecurity Practitioners
Infosecurity Magazine Podcast
45 minutes 13 seconds
2 years ago
Inside the MOVEit Attack: Decrypting Clop's TTPs and Empowering Cybersecurity Practitioners
Join the Infosecurity Magazine team and guests as they plunge into the heart of a devastating cyber-attack that has impacted the likes of BBC, PwC, and Schneider Electric. In this episode, we delve deep into the world of supply chain attacks, and where the notorious Clop ransomware group capitalizes on a hidden weakness in MOVEit Transfer—a trusted file transfer solution used by thousands of companies.
In an interview with Secureworks, one of the first cybersecurity firms to sound the alarm, we examine the cloak-and-dagger tactics, techniques, and procedures (TTPs) employed by the audacious Clop. Our expert guests unravel the secrets behind the far-reaching impact of this hack, while offering invaluable insights into the crucial steps cybersecurity practitioners must take in the face of such a high-stakes incident.
Tune in now to stay one step ahead in the battle against the relentless forces of cybercrime.
Guests include:
• Rafe Pilling, Director of Threat Research at Secureworks Counter Threat Unit
• William Thomas, CTI Researcher at Equinix Threat Analysis Center (ETAC) & co-founder of Curated Intelligence
• Paul Watts, Distinguished Analyst at the Information Security Forum
This Podcast is sponsored by Mandiant’s mWISE Conference, click here to register.
Infosecurity Magazine Podcast
Just in time for spooky season, this episode takes you into the darkest corners of the cyber underworld, where the real monsters aren’t ghosts or goblins, but ransomware gangs lurking in the shadows.
We sat down with Matthew Maynard (3.42), a cybersecurity pro by day and a real-life cyber ghostbuster by night, who doesn’t just hunt vulnerabilities, but haunts the hackers themselves.
While most bug bounty programs reward researchers for finding flaws, Matthew’s work is far more chilling (and thrilling). As part of threat intelligence programs like Halcyon’s Threat Research Intelligence Program (TRIP), he infiltrates ransomware gangs, extracts their secrets and helps shut down their operations before they strike.
For CISOs and executives, Matthew’s experience offers a rare and critical perspective on how to shift from reactive fire-drills to proactive threat hunting. By leveraging dark web intelligence, undercover engagements, and threat actor profiling, security leaders can anticipate attacks, disrupt criminal operations, and even recover stolen data before it’s too late.