Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
Sports
History
News
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/fc/be/c1/fcbec10e-4fb1-db92-db0d-58c5c94d3009/mza_13266207384991302425.png/600x600bb.jpg
The Cyber Resilience Brief: A SafeBreach Podcast
SafeBreach
37 episodes
1 week ago
Show more...
Technology
News,
Tech News
RSS
All content for The Cyber Resilience Brief: A SafeBreach Podcast is the property of SafeBreach and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Show more...
Technology
News,
Tech News
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/fc/be/c1/fcbec10e-4fb1-db92-db0d-58c5c94d3009/mza_13266207384991302425.png/600x600bb.jpg
Ep. 32 - Inside “The Com”: The Social-Engineering Supergroup Behind Global Ransomware Attacks
The Cyber Resilience Brief: A SafeBreach Podcast
17 minutes
1 month ago
Ep. 32 - Inside “The Com”: The Social-Engineering Supergroup Behind Global Ransomware Attacks
In this episode of The Cyber Resilience Brief, host Tova Dvorin and offensive security expert Adrian Culley expose The Com—the decentralized cybercrime collective behind threat groups like Lapsus$, Scattered Spider (UNC 3944 / Octo Tempest), and ShinyHunters. Together, they break down how this teenage-to-young-adult adversary ecosystem has weaponized vishing, MFA fatigue, SIM-swapping, and cloud exfiltration to breach giants including Microsoft, Okta, Nvidia, MGM Resorts, and more. You’ll learn: How The Com evolved from Lapsus$ chaos into a professionalized extortion machine Why help desks—not firewalls—are their favorite initial access vector Their signature TTPs: vishing, MFA bypass, living-off-the-land, cloud data theft, and ephemeral IOCs How adversarial exposure validation (AEV), BAS, CART, and phishing-resistant MFA (FIDO2/WebAuthn) shut them down Practical resilience steps you can implement today A must-listen for CISOs, security leaders, and anyone tracking modern identity-based cyber threats. Stay safe. Stay safe with SafeBreach.
The Cyber Resilience Brief: A SafeBreach Podcast