Skip to content

Defensive Security Podcast

Information Security Podcast

  • About
  • Podcast Episodes
  • iTunes
  • Stitcher
  • Donate!
  • Store

Defensive Security Podcast Episode 96

December 8, 2014Podcast, Securitybreach, malware, Sonyjb
https://media.blubrry.com/1463551/content.blubrry.com/1463551/defensive-security-podcast-episode-96.mp3

Podcast: Play in new window | Download | Embed

Subscribe: RSS

http://www.cio.com/article/2439324/risk-management/your-guide-to-good-enough-compliance.html

https://www.riskbasedsecurity.com/2014/12/a-breakdown-and-analysis-of-the-december-2014-sony-hack/
http://recode.net/2014/12/07/sony-describes-hack-attack-as-unprecedented/
http://www.theregister.co.uk/2014/12/08/kaspersky_deets_on_sony_malware/

http://securelist.com/blog/research/67985/destover/
https://www.bluecoat.com/security-blog/2014-12-04/custom-sony-malware-indicates-previous-knowledge

Share this:

  • Click to share on X (Opens in new window) X
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn

Related

Post navigation

← Defensive Security Podcast Episode 95 Defensive Security Podcast Episode 97 →

Leave a Reply Cancel reply

You must be logged in to post a comment.

Defensive Security is a cyber security podcast covering breaches and strategies for defense.
Support The Podcast

Defensive Security Store

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Tags

  • adobe
  • Anthem
  • APT
  • breach
  • cyber insurance
  • data breach
  • DBIR
  • DDOS
  • dns
  • Equifax
  • exploit
  • FTC
  • GDPR
  • hacking
  • Hacking Team
  • heartbleed
  • HIPAA
  • Home Depot
  • incident response
  • information security
  • infosec
  • insider threat
  • Java
  • JP Morgan
  • malware
  • microsoft
  • Morgan Stanley
  • NSA
  • OPM
  • passwords
  • phishing
  • Plane Hacking
  • ransomeware
  • Ransomware
  • security
  • Security awareness training
  • ShellShock
  • Sony
  • SWIFT
  • Syrian Electronic Army
  • Target
  • threat intelligence
  • vulnerabilities
  • wannacry
  • Yahoo
Proudly powered by WordPress