Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Security Weekly Productions. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Security Weekly Productions or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

What We’ve Learned from LockBit and Black Basta Leaks (and News) - Ian Gray - PSW #888

2:15:17
 
Share
 

Manage episode 501637678 series 70666
Content provided by Security Weekly Productions. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Security Weekly Productions or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

This segment is sponsored by Flashpoint. Visit https://securityweekly.com/flashpoint to learn more about them!

Recent leaks tied to LockBit and Black Basta have exposed the inner workings of two of the most notorious ransomware groups—revealing their tactics, negotiation strategies, and operational infrastructure. For defenders, this rare window into adversary behavior offers critical intelligence to strengthen incident response and prevention strategies. In this interview, we'll break down what these leaks reveal and how security teams can use this intelligence to proactively harden their defenses, including:

  • Key takeaways from the LockBit and Black Basta leaks—and what they confirm about ransomware operations
  • How leaked playbooks, chats, and toolkits can inform detection and response
  • Practical steps to defend against modern ransomware tactics in 2025

In the security news:

  • Practical exploit code
  • Old vulnerabilities, new attackers
  • AI and web scraping - the battle continues
  • 0-Days: You gotta prove it
  • WinRAR 0-Day
  • LLM patch diffing
  • $20 million bug bounty
  • Your APT is showing
  • Hacking from the routers
  • Its that easy eh?
  • NIST guidance on AI
  • Words have meaning
  • Developers knowingly push vulnerable code
  • My Hackberry PI post is live: https://eclypsium.com/blog/build-the-ultimate-cyberdeck-hackberry-pi/

Resources:

Visit https://www.securityweekly.com/psw for all the latest episodes!

Show Notes: https://securityweekly.com/psw-888

  continue reading

3189 episodes

Artwork
iconShare
 
Manage episode 501637678 series 70666
Content provided by Security Weekly Productions. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Security Weekly Productions or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

This segment is sponsored by Flashpoint. Visit https://securityweekly.com/flashpoint to learn more about them!

Recent leaks tied to LockBit and Black Basta have exposed the inner workings of two of the most notorious ransomware groups—revealing their tactics, negotiation strategies, and operational infrastructure. For defenders, this rare window into adversary behavior offers critical intelligence to strengthen incident response and prevention strategies. In this interview, we'll break down what these leaks reveal and how security teams can use this intelligence to proactively harden their defenses, including:

  • Key takeaways from the LockBit and Black Basta leaks—and what they confirm about ransomware operations
  • How leaked playbooks, chats, and toolkits can inform detection and response
  • Practical steps to defend against modern ransomware tactics in 2025

In the security news:

  • Practical exploit code
  • Old vulnerabilities, new attackers
  • AI and web scraping - the battle continues
  • 0-Days: You gotta prove it
  • WinRAR 0-Day
  • LLM patch diffing
  • $20 million bug bounty
  • Your APT is showing
  • Hacking from the routers
  • Its that easy eh?
  • NIST guidance on AI
  • Words have meaning
  • Developers knowingly push vulnerable code
  • My Hackberry PI post is live: https://eclypsium.com/blog/build-the-ultimate-cyberdeck-hackberry-pi/

Resources:

Visit https://www.securityweekly.com/psw for all the latest episodes!

Show Notes: https://securityweekly.com/psw-888

  continue reading

3189 episodes

Alle episoder

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play