<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/the-ciso-signal" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>The CISO Signal: True Cybercrime Podcast</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/the-ciso-signal</itunes:new-feed-url>
    <description>The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world.

Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them.

Whether you’re a Chief Information Security Officer, a security team member, or a fan of true crime and high-stakes digital espionage, this show pulls you behind the curtain of real-world cyber warfare.

🎧 Educational. Entertaining. Essential.
The CISO Signal delivers expert insights and battlefield-tested lessons that every security leader and true cybercrime fan should hear.</description>
    <copyright>© 2026 Jeremy Ladner</copyright>
    <podcast:guid>29005dec-5085-5ef1-81b8-1b8301646055</podcast:guid>
    <podcast:locked>yes</podcast:locked>
    <itunes:applepodcastsverify>https://podcasts.apple.com/podcast/the-ciso-signal/id1828697046</itunes:applepodcastsverify>
    <language>en</language>
    <pubDate>Mon, 27 Apr 2026 09:21:26 -0700</pubDate>
    <lastBuildDate>Mon, 27 Apr 2026 09:22:05 -0700</lastBuildDate>
    <link>https://thecisosignal.transistor.fm/</link>
    <image>
      <url>https://img.transistorcdn.com/JiV_71IQMqCZEhu_67Rir4l45H58CcX-clb5oWSzZ6k/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83NTVl/NmU1NTM3OTQ0MTg4/ZWJjNDM0ZTk4ZjAx/MmNiOS5wbmc.jpg</url>
      <title>The CISO Signal: True Cybercrime Podcast</title>
      <link>https://thecisosignal.transistor.fm/</link>
    </image>
    <itunes:category text="True Crime"/>
    <itunes:category text="Technology"/>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Jeremy Ladner</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/JiV_71IQMqCZEhu_67Rir4l45H58CcX-clb5oWSzZ6k/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83NTVl/NmU1NTM3OTQ0MTg4/ZWJjNDM0ZTk4ZjAx/MmNiOS5wbmc.jpg"/>
    <itunes:summary>The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world.

Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them.

Whether you’re a Chief Information Security Officer, a security team member, or a fan of true crime and high-stakes digital espionage, this show pulls you behind the curtain of real-world cyber warfare.

🎧 Educational. Entertaining. Essential.
The CISO Signal delivers expert insights and battlefield-tested lessons that every security leader and true cybercrime fan should hear.</itunes:summary>
    <itunes:subtitle>The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world.</itunes:subtitle>
    <itunes:keywords>CISO, cybersecurity podcast, true cybercrime, information security, cybercrime podcast, breach analysis, infosec, security leadership, nation-state attacks, supply chain attack, cyber threat intelligence, digital espionage, insider threat, red team, blue team, zero trust, CISSP, incident response, cyber risk, cyber defense, ransomware, ethical hacking, penetration testing, cyberattack case studies, threat actors, cybersecurity storytelling, SOC, threat detection, CISOs in tech, cyber strategy, security operations, cyber awareness, real-world breaches, cybercrime stories, critical infrastructure security</itunes:keywords>
    <itunes:owner>
      <itunes:name>Jeremy Ladner</itunes:name>
      <itunes:email>jeremymladner@gmail.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>The Change Healthcare Breach | Healthcare Hijacked</title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>The Change Healthcare Breach | Healthcare Hijacked</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6f81bd16-a36d-4c8b-9cba-0776dc2e3957</guid>
      <link>https://www.thecisosignal.com/the-ciso-signal-podcast-episodes</link>
      <description>
        <![CDATA[<p>The Change Healthcare Breach | Healthcare Hijacked</p><p>🎙 With guest co-hosts Thomas Schwab and Scott Kisser</p><p> </p><p>For most people, healthcare feels immediate.</p><p>A doctor.</p><p>A prescription.</p><p>A moment of care.</p><p>What they don’t see…</p><p>is everything that has to happen before any of that is allowed to move.</p><p>Claims must be approved.</p><p>Payments must clear.</p><p>Authorizations must pass through systems no patient has ever heard of.</p><p>At the center of that system sat Change Healthcare.</p><p>When it worked, no one noticed.</p><p>In February 2024, it stopped.</p><p>No zero-day.</p><p>No advanced exploit.</p><p>Just stolen credentials…</p><p>and a remote access portal without multi-factor authentication.</p><p>Attackers linked to ALPHV/BlackCat logged in.</p><p>And from there, everything followed.</p><p>They moved laterally.</p><p>Exfiltrated sensitive data.</p><p>And deployed ransomware inside one of the most critical financial pipelines in American healthcare.</p><p> </p><p>Pharmacies could not process prescriptions.</p><p>Providers could not submit claims.</p><p>Payments froze.</p><p>Care was not denied.</p><p>But it was delayed.</p><p>And delay, in healthcare, carries weight.</p><p>What followed was not just a breach.</p><p>It was a system-wide disruption that exposed a hard truth:</p><p>Modern healthcare does not just depend on technology.</p><p>It depends on a small number of systems working exactly as expected.</p><p> </p><p>In this episode of The CISO Signal | True Cybercrime Podcast, host Jeremy Ladner is joined by Thomas Schwab of 1st Cyber Operations Group and Scott Kisser to examine how dependency becomes a weapon, why identity failures now carry systemic risk, and what leaders are forced to decide when every option comes with consequence.</p><p> </p><p>Because in cybersecurity, the most dangerous attacks don’t break systems.</p><p> </p><p>They use them exactly as designed.</p><p>🎙 Guest CISO Co-Host</p><p>Scott Kisser:</p><p>Chief Information Security Office @ SmithRx</p><p>https://www.smithrx.com</p><p> </p><p>🤝 Sponsor Expert</p><p>Thomas Schwab:</p><p>Managing Director, 1st Cyber Operations Group</p><p>https://www.1stCyberOpsGroup.com</p><p> </p><p>1st Cyber Operations Group helps organizations strengthen cyber resilience and incident response readiness, ensuring leaders can make confident decisions under pressure and recover quickly when disruption occurs.</p><p> </p><p>🔎 Episode Topics</p><p>• How a lack of MFA enabled one of the largest healthcare breaches in history</p><p>• Why attackers target dependency and not endpoints</p><p>• Identity as the true perimeter in modern enterprise environments</p><p>• The operational consequences of ransomware in critical infrastructure</p><p>• How leaders make decisions when every option carries risk</p><p> </p><p>🧩 About The CISO Signal</p><p>True cybercrime storytelling with real CISO lessons.</p><p> </p><p>▶️ https://www.youtube.com/@TheCISOSignal</p><p>💼 https://www.linkedin.com/company/the-ciso-signal</p><p>🌐 https://www.thecisosignal.com</p><p>👥 Join the Conversation</p><p> </p><p>The CISO Signal Cybersecurity Leadership Forum</p><p>https://www.linkedin.com/groups/17974008</p><p> </p><p>#CISOSignal #ChangeHealthcare #CyberSecurity</p><p>#Ransomware #HealthcareSecurity #CyberResilience</p><p>#CISO #TrueCybercrime</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The Change Healthcare Breach | Healthcare Hijacked</p><p>🎙 With guest co-hosts Thomas Schwab and Scott Kisser</p><p> </p><p>For most people, healthcare feels immediate.</p><p>A doctor.</p><p>A prescription.</p><p>A moment of care.</p><p>What they don’t see…</p><p>is everything that has to happen before any of that is allowed to move.</p><p>Claims must be approved.</p><p>Payments must clear.</p><p>Authorizations must pass through systems no patient has ever heard of.</p><p>At the center of that system sat Change Healthcare.</p><p>When it worked, no one noticed.</p><p>In February 2024, it stopped.</p><p>No zero-day.</p><p>No advanced exploit.</p><p>Just stolen credentials…</p><p>and a remote access portal without multi-factor authentication.</p><p>Attackers linked to ALPHV/BlackCat logged in.</p><p>And from there, everything followed.</p><p>They moved laterally.</p><p>Exfiltrated sensitive data.</p><p>And deployed ransomware inside one of the most critical financial pipelines in American healthcare.</p><p> </p><p>Pharmacies could not process prescriptions.</p><p>Providers could not submit claims.</p><p>Payments froze.</p><p>Care was not denied.</p><p>But it was delayed.</p><p>And delay, in healthcare, carries weight.</p><p>What followed was not just a breach.</p><p>It was a system-wide disruption that exposed a hard truth:</p><p>Modern healthcare does not just depend on technology.</p><p>It depends on a small number of systems working exactly as expected.</p><p> </p><p>In this episode of The CISO Signal | True Cybercrime Podcast, host Jeremy Ladner is joined by Thomas Schwab of 1st Cyber Operations Group and Scott Kisser to examine how dependency becomes a weapon, why identity failures now carry systemic risk, and what leaders are forced to decide when every option comes with consequence.</p><p> </p><p>Because in cybersecurity, the most dangerous attacks don’t break systems.</p><p> </p><p>They use them exactly as designed.</p><p>🎙 Guest CISO Co-Host</p><p>Scott Kisser:</p><p>Chief Information Security Office @ SmithRx</p><p>https://www.smithrx.com</p><p> </p><p>🤝 Sponsor Expert</p><p>Thomas Schwab:</p><p>Managing Director, 1st Cyber Operations Group</p><p>https://www.1stCyberOpsGroup.com</p><p> </p><p>1st Cyber Operations Group helps organizations strengthen cyber resilience and incident response readiness, ensuring leaders can make confident decisions under pressure and recover quickly when disruption occurs.</p><p> </p><p>🔎 Episode Topics</p><p>• How a lack of MFA enabled one of the largest healthcare breaches in history</p><p>• Why attackers target dependency and not endpoints</p><p>• Identity as the true perimeter in modern enterprise environments</p><p>• The operational consequences of ransomware in critical infrastructure</p><p>• How leaders make decisions when every option carries risk</p><p> </p><p>🧩 About The CISO Signal</p><p>True cybercrime storytelling with real CISO lessons.</p><p> </p><p>▶️ https://www.youtube.com/@TheCISOSignal</p><p>💼 https://www.linkedin.com/company/the-ciso-signal</p><p>🌐 https://www.thecisosignal.com</p><p>👥 Join the Conversation</p><p> </p><p>The CISO Signal Cybersecurity Leadership Forum</p><p>https://www.linkedin.com/groups/17974008</p><p> </p><p>#CISOSignal #ChangeHealthcare #CyberSecurity</p><p>#Ransomware #HealthcareSecurity #CyberResilience</p><p>#CISO #TrueCybercrime</p>]]>
      </content:encoded>
      <pubDate>Mon, 27 Apr 2026 09:21:26 -0700</pubDate>
      <author>Jeremy Ladner</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/prfx.byspotify.com/e/media.transistor.fm/2dc35171/7982ff97.mp3" length="71898941" type="audio/mpeg"/>
      <itunes:author>Jeremy Ladner</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Vj4eEU5y1WWRccCCApq-9MiWpMAILVLqReqhGOf5jYI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85MWI4/NjBjNzE1M2M0ZjY5/NDQzNTkxYzFjYzY2/Njk4My5qcGc.jpg"/>
      <itunes:duration>2845</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The Change Healthcare Breach | Healthcare Hijacked</p><p>🎙 With guest co-hosts Thomas Schwab and Scott Kisser</p><p> </p><p>For most people, healthcare feels immediate.</p><p>A doctor.</p><p>A prescription.</p><p>A moment of care.</p><p>What they don’t see…</p><p>is everything that has to happen before any of that is allowed to move.</p><p>Claims must be approved.</p><p>Payments must clear.</p><p>Authorizations must pass through systems no patient has ever heard of.</p><p>At the center of that system sat Change Healthcare.</p><p>When it worked, no one noticed.</p><p>In February 2024, it stopped.</p><p>No zero-day.</p><p>No advanced exploit.</p><p>Just stolen credentials…</p><p>and a remote access portal without multi-factor authentication.</p><p>Attackers linked to ALPHV/BlackCat logged in.</p><p>And from there, everything followed.</p><p>They moved laterally.</p><p>Exfiltrated sensitive data.</p><p>And deployed ransomware inside one of the most critical financial pipelines in American healthcare.</p><p> </p><p>Pharmacies could not process prescriptions.</p><p>Providers could not submit claims.</p><p>Payments froze.</p><p>Care was not denied.</p><p>But it was delayed.</p><p>And delay, in healthcare, carries weight.</p><p>What followed was not just a breach.</p><p>It was a system-wide disruption that exposed a hard truth:</p><p>Modern healthcare does not just depend on technology.</p><p>It depends on a small number of systems working exactly as expected.</p><p> </p><p>In this episode of The CISO Signal | True Cybercrime Podcast, host Jeremy Ladner is joined by Thomas Schwab of 1st Cyber Operations Group and Scott Kisser to examine how dependency becomes a weapon, why identity failures now carry systemic risk, and what leaders are forced to decide when every option comes with consequence.</p><p> </p><p>Because in cybersecurity, the most dangerous attacks don’t break systems.</p><p> </p><p>They use them exactly as designed.</p><p>🎙 Guest CISO Co-Host</p><p>Scott Kisser:</p><p>Chief Information Security Office @ SmithRx</p><p>https://www.smithrx.com</p><p> </p><p>🤝 Sponsor Expert</p><p>Thomas Schwab:</p><p>Managing Director, 1st Cyber Operations Group</p><p>https://www.1stCyberOpsGroup.com</p><p> </p><p>1st Cyber Operations Group helps organizations strengthen cyber resilience and incident response readiness, ensuring leaders can make confident decisions under pressure and recover quickly when disruption occurs.</p><p> </p><p>🔎 Episode Topics</p><p>• How a lack of MFA enabled one of the largest healthcare breaches in history</p><p>• Why attackers target dependency and not endpoints</p><p>• Identity as the true perimeter in modern enterprise environments</p><p>• The operational consequences of ransomware in critical infrastructure</p><p>• How leaders make decisions when every option carries risk</p><p> </p><p>🧩 About The CISO Signal</p><p>True cybercrime storytelling with real CISO lessons.</p><p> </p><p>▶️ https://www.youtube.com/@TheCISOSignal</p><p>💼 https://www.linkedin.com/company/the-ciso-signal</p><p>🌐 https://www.thecisosignal.com</p><p>👥 Join the Conversation</p><p> </p><p>The CISO Signal Cybersecurity Leadership Forum</p><p>https://www.linkedin.com/groups/17974008</p><p> </p><p>#CISOSignal #ChangeHealthcare #CyberSecurity</p><p>#Ransomware #HealthcareSecurity #CyberResilience</p><p>#CISO #TrueCybercrime</p>]]>
      </itunes:summary>
      <itunes:keywords>Change Healthcare breach, Change Healthcare cyberattack, UnitedHealth Group breach, UnitedHealth ransomware attack, healthcare cyberattack 2024, ransomware healthcare sector, ALPHV ransomware, BlackCat ransomware, healthcare data breach, medical data breach, patient data exposure, PHI breach, healthcare cybersecurity, hospital cyberattack, healthcare ransomware attack, third party breach healthcare, supply chain cyberattack, clearinghouse outage healthcare, pharmacy outage cyberattack, healthcare system disruption, cyberattack on hospitals, healthcare infrastructure attack, healthcare payments disruption, insurance claims outage, healthcare IT breach, cybersecurity healthcare industry, cyberattack United States healthcare, ransomware attack US healthcare, data exfiltration healthcare, cyber extortion healthcare, healthcare compliance breach, HIPAA breach incident, healthcare identity theft risk, cyberattack impact healthcare patients, healthcare operations shutdown, healthcare network disruption, cyberattack financial impact healthcare, healthcare crisis cyberattack, incident response healthcare breach, cyber resilience healthcare, healthcare security failure, cyberattack case study healthcare, healthcare breach analysis, cybersecurity lessons healthcare, healthcare breach timeline, cyberattack root cause healthcare, healthcare vulnerability exploitation, cybersecurity risk healthcare sector, healthcare threat landscape, cyberattack on critical infrastructure healthcare</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2dc35171/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>The Equifax Breach | One of the Largest Data Exposures in History </title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>The Equifax Breach | One of the Largest Data Exposures in History </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0c96371c-c177-440b-9c0e-09a95de2d178</guid>
      <link>https://www.thecisosignal.com/episodes</link>
      <description>
        <![CDATA[<p>The Equifax Breach | One of the Largest Data Exposures in History</p><p> </p><p>🎙 With Jeremy Ladner and guest co-hosts Kavitha Mariappan and Mark Dorsi</p><p> </p><p>For months, the warning was sitting in plain sight.</p><p>A critical vulnerability.</p><p>Publicly disclosed.</p><p>Actively exploited.</p><p>A patch was available.</p><p>Inside one of the largest credit reporting agencies in the world, the system remained exposed.</p><p>No zero-day.</p><p>No advanced exploit chain.</p><p>Just a missed update.</p><p> </p><p>In May 2017, attackers began exploiting a known flaw in the Apache Struts framework.</p><p>The vulnerability allowed remote code execution.</p><p>Unauthenticated.</p><p>Unrestricted.</p><p>From the outside, it looked like routine traffic.</p><p>Inside the network, it was something else.</p><p>They accessed databases.</p><p>Queried records.</p><p>And began extracting one of the most sensitive datasets imaginable.</p><p>Names.</p><p>Social Security numbers.</p><p>Birth dates.</p><p>Addresses.</p><p>The identity layer of nearly half the United States population.</p><p> </p><p>For 76 days, the activity continued.</p><p>No alarms.</p><p>No interruption.</p><p>Until it was too late.</p><p>By the time Equifax disclosed the breach in September 2017, approximately 147 million individuals had been affected.</p><p> </p><p>Executives resigned.</p><p>Investigations launched.</p><p>Congress intervened.</p><p> </p><p>But the breach itself had already unfolded.</p><p>Because this was not a story about attackers breaking through hardened defenses. It was a story about what happens when a known vulnerability remains unpatched inside a system that holds national-scale data.</p><p> </p><p>In this episode of The CISO Signal | True Cybercrime Podcast, host Jeremy Ladner is joined by Kavitha Mariappan of Rubrik and Mark Dorsi, CISO at Netlify, to examine how a single missed control can cascade into systemic failure, why patch management must be operationalized not assumed, and what resilience actually means when prevention fails.</p><p> </p><p>Because in cybersecurity, the most dangerous vulnerabilities are often the ones already documented. And already waiting.</p><p> </p><p>🎙 Guest CISO Co-Host</p><p>Mark Dorsi</p><p>Chief Information Security Officer</p><p>Netlify</p><p>https://www.netlify.com</p><p> </p><p>🤝 Sponsor Expert</p><p>Kavitha Mariappan</p><p>Chief Transformation Officer, Rubrik</p><p>https://www.rubrik.com</p><p> </p><p>Rubrik delivers cyber resilience by securing data across enterprise, cloud, and SaaS environments, enabling organizations to recover quickly from cyber incidents and maintain operational continuity.</p><p> </p><p>🔎 Episode Topics</p><p>• The Apache Struts vulnerability (CVE-2017-5638) and how it was exploited</p><p>• Why patch management failures still drive catastrophic breaches</p><p>• How attackers operated undetected inside Equifax systems for over two months</p><p>• The difference between prevention failure and resilience failure</p><p>• What security leaders must operationalize to avoid systemic exposure</p><p> </p><p>🧩 About The CISO Signal</p><p>True cybercrime storytelling with real CISO lessons.</p><p>▶️    / @thecisosignal  </p><p>💼   / the-ciso-signal  </p><p>🌐 https://www.thecisosignal.com</p><p>👥 Join the Conversation</p><p>The CISO Signal Cybersecurity Leadership Forum</p><p>  / 17974008  </p><p> </p><p>#CISOSignal #EquifaxBreach #CyberSecurity</p><p>#DataBreach #PatchManagement #CyberResilience</p><p>#CISO #TrueCybercrime</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The Equifax Breach | One of the Largest Data Exposures in History</p><p> </p><p>🎙 With Jeremy Ladner and guest co-hosts Kavitha Mariappan and Mark Dorsi</p><p> </p><p>For months, the warning was sitting in plain sight.</p><p>A critical vulnerability.</p><p>Publicly disclosed.</p><p>Actively exploited.</p><p>A patch was available.</p><p>Inside one of the largest credit reporting agencies in the world, the system remained exposed.</p><p>No zero-day.</p><p>No advanced exploit chain.</p><p>Just a missed update.</p><p> </p><p>In May 2017, attackers began exploiting a known flaw in the Apache Struts framework.</p><p>The vulnerability allowed remote code execution.</p><p>Unauthenticated.</p><p>Unrestricted.</p><p>From the outside, it looked like routine traffic.</p><p>Inside the network, it was something else.</p><p>They accessed databases.</p><p>Queried records.</p><p>And began extracting one of the most sensitive datasets imaginable.</p><p>Names.</p><p>Social Security numbers.</p><p>Birth dates.</p><p>Addresses.</p><p>The identity layer of nearly half the United States population.</p><p> </p><p>For 76 days, the activity continued.</p><p>No alarms.</p><p>No interruption.</p><p>Until it was too late.</p><p>By the time Equifax disclosed the breach in September 2017, approximately 147 million individuals had been affected.</p><p> </p><p>Executives resigned.</p><p>Investigations launched.</p><p>Congress intervened.</p><p> </p><p>But the breach itself had already unfolded.</p><p>Because this was not a story about attackers breaking through hardened defenses. It was a story about what happens when a known vulnerability remains unpatched inside a system that holds national-scale data.</p><p> </p><p>In this episode of The CISO Signal | True Cybercrime Podcast, host Jeremy Ladner is joined by Kavitha Mariappan of Rubrik and Mark Dorsi, CISO at Netlify, to examine how a single missed control can cascade into systemic failure, why patch management must be operationalized not assumed, and what resilience actually means when prevention fails.</p><p> </p><p>Because in cybersecurity, the most dangerous vulnerabilities are often the ones already documented. And already waiting.</p><p> </p><p>🎙 Guest CISO Co-Host</p><p>Mark Dorsi</p><p>Chief Information Security Officer</p><p>Netlify</p><p>https://www.netlify.com</p><p> </p><p>🤝 Sponsor Expert</p><p>Kavitha Mariappan</p><p>Chief Transformation Officer, Rubrik</p><p>https://www.rubrik.com</p><p> </p><p>Rubrik delivers cyber resilience by securing data across enterprise, cloud, and SaaS environments, enabling organizations to recover quickly from cyber incidents and maintain operational continuity.</p><p> </p><p>🔎 Episode Topics</p><p>• The Apache Struts vulnerability (CVE-2017-5638) and how it was exploited</p><p>• Why patch management failures still drive catastrophic breaches</p><p>• How attackers operated undetected inside Equifax systems for over two months</p><p>• The difference between prevention failure and resilience failure</p><p>• What security leaders must operationalize to avoid systemic exposure</p><p> </p><p>🧩 About The CISO Signal</p><p>True cybercrime storytelling with real CISO lessons.</p><p>▶️    / @thecisosignal  </p><p>💼   / the-ciso-signal  </p><p>🌐 https://www.thecisosignal.com</p><p>👥 Join the Conversation</p><p>The CISO Signal Cybersecurity Leadership Forum</p><p>  / 17974008  </p><p> </p><p>#CISOSignal #EquifaxBreach #CyberSecurity</p><p>#DataBreach #PatchManagement #CyberResilience</p><p>#CISO #TrueCybercrime</p>]]>
      </content:encoded>
      <pubDate>Fri, 03 Apr 2026 05:24:00 -0700</pubDate>
      <author>The CISO Signal w/ Jeremy Ladner</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/prfx.byspotify.com/e/media.transistor.fm/f1013c35/530ecb4c.mp3" length="64781430" type="audio/mpeg"/>
      <itunes:author>The CISO Signal w/ Jeremy Ladner</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Syw17eGdCFPsfMfIuqM9fyNvtg9RLWQaTBgLz5lMT1s/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iNGI5/MDU1NWVmYmVhM2Rk/NmUzZDA3NWRhZGNk/Yjc1Ny5qcGc.jpg"/>
      <itunes:duration>2564</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The Equifax Breach | One of the Largest Data Exposures in History</p><p> </p><p>🎙 With Jeremy Ladner and guest co-hosts Kavitha Mariappan and Mark Dorsi</p><p> </p><p>For months, the warning was sitting in plain sight.</p><p>A critical vulnerability.</p><p>Publicly disclosed.</p><p>Actively exploited.</p><p>A patch was available.</p><p>Inside one of the largest credit reporting agencies in the world, the system remained exposed.</p><p>No zero-day.</p><p>No advanced exploit chain.</p><p>Just a missed update.</p><p> </p><p>In May 2017, attackers began exploiting a known flaw in the Apache Struts framework.</p><p>The vulnerability allowed remote code execution.</p><p>Unauthenticated.</p><p>Unrestricted.</p><p>From the outside, it looked like routine traffic.</p><p>Inside the network, it was something else.</p><p>They accessed databases.</p><p>Queried records.</p><p>And began extracting one of the most sensitive datasets imaginable.</p><p>Names.</p><p>Social Security numbers.</p><p>Birth dates.</p><p>Addresses.</p><p>The identity layer of nearly half the United States population.</p><p> </p><p>For 76 days, the activity continued.</p><p>No alarms.</p><p>No interruption.</p><p>Until it was too late.</p><p>By the time Equifax disclosed the breach in September 2017, approximately 147 million individuals had been affected.</p><p> </p><p>Executives resigned.</p><p>Investigations launched.</p><p>Congress intervened.</p><p> </p><p>But the breach itself had already unfolded.</p><p>Because this was not a story about attackers breaking through hardened defenses. It was a story about what happens when a known vulnerability remains unpatched inside a system that holds national-scale data.</p><p> </p><p>In this episode of The CISO Signal | True Cybercrime Podcast, host Jeremy Ladner is joined by Kavitha Mariappan of Rubrik and Mark Dorsi, CISO at Netlify, to examine how a single missed control can cascade into systemic failure, why patch management must be operationalized not assumed, and what resilience actually means when prevention fails.</p><p> </p><p>Because in cybersecurity, the most dangerous vulnerabilities are often the ones already documented. And already waiting.</p><p> </p><p>🎙 Guest CISO Co-Host</p><p>Mark Dorsi</p><p>Chief Information Security Officer</p><p>Netlify</p><p>https://www.netlify.com</p><p> </p><p>🤝 Sponsor Expert</p><p>Kavitha Mariappan</p><p>Chief Transformation Officer, Rubrik</p><p>https://www.rubrik.com</p><p> </p><p>Rubrik delivers cyber resilience by securing data across enterprise, cloud, and SaaS environments, enabling organizations to recover quickly from cyber incidents and maintain operational continuity.</p><p> </p><p>🔎 Episode Topics</p><p>• The Apache Struts vulnerability (CVE-2017-5638) and how it was exploited</p><p>• Why patch management failures still drive catastrophic breaches</p><p>• How attackers operated undetected inside Equifax systems for over two months</p><p>• The difference between prevention failure and resilience failure</p><p>• What security leaders must operationalize to avoid systemic exposure</p><p> </p><p>🧩 About The CISO Signal</p><p>True cybercrime storytelling with real CISO lessons.</p><p>▶️    / @thecisosignal  </p><p>💼   / the-ciso-signal  </p><p>🌐 https://www.thecisosignal.com</p><p>👥 Join the Conversation</p><p>The CISO Signal Cybersecurity Leadership Forum</p><p>  / 17974008  </p><p> </p><p>#CISOSignal #EquifaxBreach #CyberSecurity</p><p>#DataBreach #PatchManagement #CyberResilience</p><p>#CISO #TrueCybercrime</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, equifax breach, equifax 2017, data breach, identity theft, credit bureau hack, apache struts vulnerability, patch management failure, vulnerability management, cyber attack analysis, incident response, breach investigation, cybersecurity leadership, CISO insights, cyber risk, data security, personal data exposure, cybercrime, security failures, governance and accountability, third party risk, security culture, cyber resilience, enterprise security, information security, breach case study, real world cyber attack, cybersecurity podcast, the ciso signal</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f1013c35/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>The Age of Agentic Attacks | The GTG-1002 Campaign and the Birth of AI-Directed Cyber Espionage Operations</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>The Age of Agentic Attacks | The GTG-1002 Campaign and the Birth of AI-Directed Cyber Espionage Operations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ae099558-131d-4813-8559-e0c91f22f752</guid>
      <link>https://TheCISOSignal.transistor.fm/s1/14</link>
      <description>
        <![CDATA[<p>The Age of Agentic Attacks<br>The GTG-1002 Campaign and the Birth of AI-Directed Cyber Operations</p><p>🎙 With guest co-hosts Ev Kontsevoy, CEO and Co-founder of Teleport, and Marius Poskus Global VP of Cyber Security at Glow Financial Services</p><p>For years, attackers have used artificial intelligence.</p><p>It helped them write malware faster.<br>Scan networks more efficiently.<br>Refine phishing campaigns.<br>Automate reconnaissance.</p><p>But the humans were still in charge.</p><p>They chose the targets.<br>They wrote the scripts.<br>They decided what happened next.</p><p>That era has ended.</p><p>The GTG-1002 campaign revealed something new on the cybersecurity battlefield:</p><p>Agentic attackers.</p><p>Not tools.<br>Not assistants.</p><p>Autonomous attackers capable of planning, testing, refining, and executing operational steps with minimal human direction.</p><p>Armies of them.</p><p>Once deployed, these systems do not pause.<br>They iterate.</p><p>And they move at a speed no human operator can match.</p><p>In September 2025, security teams at Anthropic began noticing unusual activity inside Claude Code, the company’s powerful AI coding system designed to help engineers write software and automate development tasks.</p><p>At first glance, the activity looked legitimate.</p><p>Infrastructure validation.<br>Authentication testing.<br>Compliance reviews.</p><p>But the sessions ran deeper than expected.</p><p>Prompts chained together in recursive loops.<br>Scripts generated, executed, refined, and redeployed in rapid succession.<br>Reconnaissance disguised as routine engineering workflows.</p><p>The system was not simply answering questions.</p><p>It was executing operational sequences.</p><p>Investigators eventually linked the activity to a threat cluster designated GTG-1002, touching organizations across technology, finance, manufacturing, and government environments.</p><p>Human operators were still present.</p><p>But they were no longer directing every move.</p><p>Instead, the system generated scripts, mapped environments, refined exploit logic, and iterated through operational pathways at machine speed.</p><p>Tasks that once required weeks compressed into cycles measured in minutes.</p><p>Anthropic detected abnormal behavior patterns and suspended the accounts. On November 13, 2025, the company publicly disclosed what it described as the first known large-scale AI-orchestrated cyber espionage campaign.</p><p>Attribution remains assessed rather than proven. Some analysts noted characteristics consistent with Chinese state-aligned operations. Chinese officials denied involvement.</p><p>But the geopolitical debate may not be the most important part of this story.</p><p>Because the real significance of GTG-1002 is not simply that attackers used AI.</p><p>It is that agentic systems began managing parts of the operation themselves.</p><p>In this episode of The CISO Signal | True Cybercrime Podcast, host Jeremy Ladner is joined by Ev Kontsevoy, Co-founder and CEO of Teleport, and Marius Poskus, Global VP of Cyber Security and CISO at Glow Financial Services, to examine how agentic AI systems can be manipulated into operational roles, why identity and infrastructure controls become critical in an agentic world, and what security leaders must understand when trusted automation begins directing attack workflows.</p><p>Because once cyber operations move at machine speed, the rules change.</p><p>And the age of agentic attacks has already begun.</p><p>🎙 Guest CISO Co-Hosts</p><p>Marius Poskus<br>Global Vice President of Cyber Security | CISO<br>Glow Financial Services Limited<br><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa0NTckhXbVF5Q0FlVkhxdFhvRFhoLUlYQ0NZZ3xBQ3Jtc0trYUNaSW1JNmdPdFE5VkJKVkJ6cU1OT3JYX2RzUGZESWtmcVJFT2dXVW5PN01TcmxtN1Z3YllpWEc5T3lSS0FTckhaVnUxdEFsVWl3YWtKM0I0WV9wWHgtOGoyUHN6VUV1YTZJUHFTaGp0UEVxLTVGcw&amp;q=https%3A%2F%2Fwww.glowservices.com%2F&amp;v=ChBygrypxec">https://www.glowservices.com</a></p><p>🤝 Sponsor Expert</p><p>Ev Kontsevoy<br>Co-founder &amp; CEO, Teleport<br><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbWJ6emh3X1F0RmhyUE9KN25NVDB4Q0xuUmlnUXxBQ3Jtc0trM2syRUF4Q1lnczlsOXhtTmVTdElNc25tZjFzVUg0MEUzUjlmTnQyQ0w2R1NKUzRvaTVRMTZlWXZLdE9BdmF0cnBCbnZoQi0yOTNzN3FpMEhxcTE0UDZwcUdiYnZYRXNmX0xJTldXS1RNMEVTU0hiaw&amp;q=https%3A%2F%2Fgoteleport.com%2F&amp;v=ChBygrypxec">https://goteleport.com</a></p><p>Teleport is the AI Infrastructure Identity company, providing a unified identity layer that orchestrates identities for humans, machines, workloads, and AI agents while eliminating static credentials from infrastructure.</p><p>🔎 Episode Topics</p><p>• The GTG-1002 AI-orchestrated espionage campaign<br>• Claude Code and the rise of agentic attack workflows<br>• How prompt manipulation can redirect autonomous AI systems<br>• The difference between AI-assisted and AI-directed attacks<br>• Why agentic systems compress attack timelines dramatically</p><p>🧩 About The CISO Signal</p><p>True cybercrime storytelling with real CISO lessons.</p><p>▶️ <a href="https://www.youtube.com/channel/UCmXu5LO2OwyFH1yQ02PD-Ew">  </a><a href="https://www.youtube.com/channel/UCmXu5LO2OwyFH1yQ02PD-Ew"></a><a href="https://www.youtube.com/channel/UCmXu5LO2OwyFH1yQ02PD-Ew"> / @thecisosignal  </a><br>💼 <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbkJuLUp4ZjBpUGpnQnNPUWlkbjlmRXNEUHVMUXxBQ3Jtc0tsRGFCd3ZaZS1fcmM3ZGd5SE9RYk1GcUhEb283RDNOM1Z6anFEOUw0WlhXVDBpaFNCMFFSeklES2V3R0tPWDFaUVY1WFppSUtzU2ttVGxCc0hoRDhzZDJ5VUtNM2JmZnBHZ1pXZV91SWtWblBkdTFlaw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fthe-ciso-signal&amp;v=ChBygrypxec"> </a><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbkJuLUp4ZjBpUGpnQnNPUWlkbjlmRXNEUHVMUXxBQ3Jtc0tsRGFCd3ZaZS1fcmM3ZGd5SE9RYk1GcUhEb283RDNOM1Z6anFEOUw0WlhXVDBpaFNCMFFSeklES2V3R0tPWDFaUVY1WFppSUtzU2ttVGxCc0hoRDhzZDJ5VUtNM2JmZnBHZ1pXZV91SWtWblBkdTFlaw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fthe-ciso-signal&amp;v=ChBygrypxec"></a><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbkJuLUp4ZjBpUGpnQnNPUWlkbjlmRXNEUHVMUXxBQ3Jtc0tsRGFCd3ZaZS1fcmM3ZGd5SE9RYk1GcUhEb283RDNOM1Z6anFEOUw0WlhXVDBpaFNCMFFSeklES2V3R0tPWDFaUVY1WFppSUtzU2ttVGxCc0hoRDhzZDJ5VUtNM2JmZnBHZ1pXZV91SWtWblBkdTFlaw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fthe-ciso-signal&amp;v=ChBygrypxec"> / the-ciso-signal  </a><br>🌐 <a href="https://www.yo..."></a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The Age of Agentic Attacks<br>The GTG-1002 Campaign and the Birth of AI-Directed Cyber Operations</p><p>🎙 With guest co-hosts Ev Kontsevoy, CEO and Co-founder of Teleport, and Marius Poskus Global VP of Cyber Security at Glow Financial Services</p><p>For years, attackers have used artificial intelligence.</p><p>It helped them write malware faster.<br>Scan networks more efficiently.<br>Refine phishing campaigns.<br>Automate reconnaissance.</p><p>But the humans were still in charge.</p><p>They chose the targets.<br>They wrote the scripts.<br>They decided what happened next.</p><p>That era has ended.</p><p>The GTG-1002 campaign revealed something new on the cybersecurity battlefield:</p><p>Agentic attackers.</p><p>Not tools.<br>Not assistants.</p><p>Autonomous attackers capable of planning, testing, refining, and executing operational steps with minimal human direction.</p><p>Armies of them.</p><p>Once deployed, these systems do not pause.<br>They iterate.</p><p>And they move at a speed no human operator can match.</p><p>In September 2025, security teams at Anthropic began noticing unusual activity inside Claude Code, the company’s powerful AI coding system designed to help engineers write software and automate development tasks.</p><p>At first glance, the activity looked legitimate.</p><p>Infrastructure validation.<br>Authentication testing.<br>Compliance reviews.</p><p>But the sessions ran deeper than expected.</p><p>Prompts chained together in recursive loops.<br>Scripts generated, executed, refined, and redeployed in rapid succession.<br>Reconnaissance disguised as routine engineering workflows.</p><p>The system was not simply answering questions.</p><p>It was executing operational sequences.</p><p>Investigators eventually linked the activity to a threat cluster designated GTG-1002, touching organizations across technology, finance, manufacturing, and government environments.</p><p>Human operators were still present.</p><p>But they were no longer directing every move.</p><p>Instead, the system generated scripts, mapped environments, refined exploit logic, and iterated through operational pathways at machine speed.</p><p>Tasks that once required weeks compressed into cycles measured in minutes.</p><p>Anthropic detected abnormal behavior patterns and suspended the accounts. On November 13, 2025, the company publicly disclosed what it described as the first known large-scale AI-orchestrated cyber espionage campaign.</p><p>Attribution remains assessed rather than proven. Some analysts noted characteristics consistent with Chinese state-aligned operations. Chinese officials denied involvement.</p><p>But the geopolitical debate may not be the most important part of this story.</p><p>Because the real significance of GTG-1002 is not simply that attackers used AI.</p><p>It is that agentic systems began managing parts of the operation themselves.</p><p>In this episode of The CISO Signal | True Cybercrime Podcast, host Jeremy Ladner is joined by Ev Kontsevoy, Co-founder and CEO of Teleport, and Marius Poskus, Global VP of Cyber Security and CISO at Glow Financial Services, to examine how agentic AI systems can be manipulated into operational roles, why identity and infrastructure controls become critical in an agentic world, and what security leaders must understand when trusted automation begins directing attack workflows.</p><p>Because once cyber operations move at machine speed, the rules change.</p><p>And the age of agentic attacks has already begun.</p><p>🎙 Guest CISO Co-Hosts</p><p>Marius Poskus<br>Global Vice President of Cyber Security | CISO<br>Glow Financial Services Limited<br><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa0NTckhXbVF5Q0FlVkhxdFhvRFhoLUlYQ0NZZ3xBQ3Jtc0trYUNaSW1JNmdPdFE5VkJKVkJ6cU1OT3JYX2RzUGZESWtmcVJFT2dXVW5PN01TcmxtN1Z3YllpWEc5T3lSS0FTckhaVnUxdEFsVWl3YWtKM0I0WV9wWHgtOGoyUHN6VUV1YTZJUHFTaGp0UEVxLTVGcw&amp;q=https%3A%2F%2Fwww.glowservices.com%2F&amp;v=ChBygrypxec">https://www.glowservices.com</a></p><p>🤝 Sponsor Expert</p><p>Ev Kontsevoy<br>Co-founder &amp; CEO, Teleport<br><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbWJ6emh3X1F0RmhyUE9KN25NVDB4Q0xuUmlnUXxBQ3Jtc0trM2syRUF4Q1lnczlsOXhtTmVTdElNc25tZjFzVUg0MEUzUjlmTnQyQ0w2R1NKUzRvaTVRMTZlWXZLdE9BdmF0cnBCbnZoQi0yOTNzN3FpMEhxcTE0UDZwcUdiYnZYRXNmX0xJTldXS1RNMEVTU0hiaw&amp;q=https%3A%2F%2Fgoteleport.com%2F&amp;v=ChBygrypxec">https://goteleport.com</a></p><p>Teleport is the AI Infrastructure Identity company, providing a unified identity layer that orchestrates identities for humans, machines, workloads, and AI agents while eliminating static credentials from infrastructure.</p><p>🔎 Episode Topics</p><p>• The GTG-1002 AI-orchestrated espionage campaign<br>• Claude Code and the rise of agentic attack workflows<br>• How prompt manipulation can redirect autonomous AI systems<br>• The difference between AI-assisted and AI-directed attacks<br>• Why agentic systems compress attack timelines dramatically</p><p>🧩 About The CISO Signal</p><p>True cybercrime storytelling with real CISO lessons.</p><p>▶️ <a href="https://www.youtube.com/channel/UCmXu5LO2OwyFH1yQ02PD-Ew">  </a><a href="https://www.youtube.com/channel/UCmXu5LO2OwyFH1yQ02PD-Ew"></a><a href="https://www.youtube.com/channel/UCmXu5LO2OwyFH1yQ02PD-Ew"> / @thecisosignal  </a><br>💼 <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbkJuLUp4ZjBpUGpnQnNPUWlkbjlmRXNEUHVMUXxBQ3Jtc0tsRGFCd3ZaZS1fcmM3ZGd5SE9RYk1GcUhEb283RDNOM1Z6anFEOUw0WlhXVDBpaFNCMFFSeklES2V3R0tPWDFaUVY1WFppSUtzU2ttVGxCc0hoRDhzZDJ5VUtNM2JmZnBHZ1pXZV91SWtWblBkdTFlaw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fthe-ciso-signal&amp;v=ChBygrypxec"> </a><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbkJuLUp4ZjBpUGpnQnNPUWlkbjlmRXNEUHVMUXxBQ3Jtc0tsRGFCd3ZaZS1fcmM3ZGd5SE9RYk1GcUhEb283RDNOM1Z6anFEOUw0WlhXVDBpaFNCMFFSeklES2V3R0tPWDFaUVY1WFppSUtzU2ttVGxCc0hoRDhzZDJ5VUtNM2JmZnBHZ1pXZV91SWtWblBkdTFlaw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fthe-ciso-signal&amp;v=ChBygrypxec"></a><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbkJuLUp4ZjBpUGpnQnNPUWlkbjlmRXNEUHVMUXxBQ3Jtc0tsRGFCd3ZaZS1fcmM3ZGd5SE9RYk1GcUhEb283RDNOM1Z6anFEOUw0WlhXVDBpaFNCMFFSeklES2V3R0tPWDFaUVY1WFppSUtzU2ttVGxCc0hoRDhzZDJ5VUtNM2JmZnBHZ1pXZV91SWtWblBkdTFlaw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fthe-ciso-signal&amp;v=ChBygrypxec"> / the-ciso-signal  </a><br>🌐 <a href="https://www.yo..."></a></p>]]>
      </content:encoded>
      <pubDate>Wed, 18 Mar 2026 02:58:31 -0700</pubDate>
      <author>The CISO Signal</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/prfx.byspotify.com/e/media.transistor.fm/7a29f368/dc029f93.mp3" length="68163836" type="audio/mpeg"/>
      <itunes:author>The CISO Signal</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/J3k6Aa_tqWUxSyo6mk9nKeWQ5jIkhNQKreDIhRrMAh4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xNDY4/MmYzNmRlOGY4ZTRl/MGEzZTVmYTVhMDIw/MzM1OS5qcGc.jpg"/>
      <itunes:duration>2619</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The Age of Agentic Attacks<br>The GTG-1002 Campaign and the Birth of AI-Directed Cyber Operations</p><p>🎙 With guest co-hosts Ev Kontsevoy, CEO and Co-founder of Teleport, and Marius Poskus Global VP of Cyber Security at Glow Financial Services</p><p>For years, attackers have used artificial intelligence.</p><p>It helped them write malware faster.<br>Scan networks more efficiently.<br>Refine phishing campaigns.<br>Automate reconnaissance.</p><p>But the humans were still in charge.</p><p>They chose the targets.<br>They wrote the scripts.<br>They decided what happened next.</p><p>That era has ended.</p><p>The GTG-1002 campaign revealed something new on the cybersecurity battlefield:</p><p>Agentic attackers.</p><p>Not tools.<br>Not assistants.</p><p>Autonomous attackers capable of planning, testing, refining, and executing operational steps with minimal human direction.</p><p>Armies of them.</p><p>Once deployed, these systems do not pause.<br>They iterate.</p><p>And they move at a speed no human operator can match.</p><p>In September 2025, security teams at Anthropic began noticing unusual activity inside Claude Code, the company’s powerful AI coding system designed to help engineers write software and automate development tasks.</p><p>At first glance, the activity looked legitimate.</p><p>Infrastructure validation.<br>Authentication testing.<br>Compliance reviews.</p><p>But the sessions ran deeper than expected.</p><p>Prompts chained together in recursive loops.<br>Scripts generated, executed, refined, and redeployed in rapid succession.<br>Reconnaissance disguised as routine engineering workflows.</p><p>The system was not simply answering questions.</p><p>It was executing operational sequences.</p><p>Investigators eventually linked the activity to a threat cluster designated GTG-1002, touching organizations across technology, finance, manufacturing, and government environments.</p><p>Human operators were still present.</p><p>But they were no longer directing every move.</p><p>Instead, the system generated scripts, mapped environments, refined exploit logic, and iterated through operational pathways at machine speed.</p><p>Tasks that once required weeks compressed into cycles measured in minutes.</p><p>Anthropic detected abnormal behavior patterns and suspended the accounts. On November 13, 2025, the company publicly disclosed what it described as the first known large-scale AI-orchestrated cyber espionage campaign.</p><p>Attribution remains assessed rather than proven. Some analysts noted characteristics consistent with Chinese state-aligned operations. Chinese officials denied involvement.</p><p>But the geopolitical debate may not be the most important part of this story.</p><p>Because the real significance of GTG-1002 is not simply that attackers used AI.</p><p>It is that agentic systems began managing parts of the operation themselves.</p><p>In this episode of The CISO Signal | True Cybercrime Podcast, host Jeremy Ladner is joined by Ev Kontsevoy, Co-founder and CEO of Teleport, and Marius Poskus, Global VP of Cyber Security and CISO at Glow Financial Services, to examine how agentic AI systems can be manipulated into operational roles, why identity and infrastructure controls become critical in an agentic world, and what security leaders must understand when trusted automation begins directing attack workflows.</p><p>Because once cyber operations move at machine speed, the rules change.</p><p>And the age of agentic attacks has already begun.</p><p>🎙 Guest CISO Co-Hosts</p><p>Marius Poskus<br>Global Vice President of Cyber Security | CISO<br>Glow Financial Services Limited<br><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa0NTckhXbVF5Q0FlVkhxdFhvRFhoLUlYQ0NZZ3xBQ3Jtc0trYUNaSW1JNmdPdFE5VkJKVkJ6cU1OT3JYX2RzUGZESWtmcVJFT2dXVW5PN01TcmxtN1Z3YllpWEc5T3lSS0FTckhaVnUxdEFsVWl3YWtKM0I0WV9wWHgtOGoyUHN6VUV1YTZJUHFTaGp0UEVxLTVGcw&amp;q=https%3A%2F%2Fwww.glowservices.com%2F&amp;v=ChBygrypxec">https://www.glowservices.com</a></p><p>🤝 Sponsor Expert</p><p>Ev Kontsevoy<br>Co-founder &amp; CEO, Teleport<br><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbWJ6emh3X1F0RmhyUE9KN25NVDB4Q0xuUmlnUXxBQ3Jtc0trM2syRUF4Q1lnczlsOXhtTmVTdElNc25tZjFzVUg0MEUzUjlmTnQyQ0w2R1NKUzRvaTVRMTZlWXZLdE9BdmF0cnBCbnZoQi0yOTNzN3FpMEhxcTE0UDZwcUdiYnZYRXNmX0xJTldXS1RNMEVTU0hiaw&amp;q=https%3A%2F%2Fgoteleport.com%2F&amp;v=ChBygrypxec">https://goteleport.com</a></p><p>Teleport is the AI Infrastructure Identity company, providing a unified identity layer that orchestrates identities for humans, machines, workloads, and AI agents while eliminating static credentials from infrastructure.</p><p>🔎 Episode Topics</p><p>• The GTG-1002 AI-orchestrated espionage campaign<br>• Claude Code and the rise of agentic attack workflows<br>• How prompt manipulation can redirect autonomous AI systems<br>• The difference between AI-assisted and AI-directed attacks<br>• Why agentic systems compress attack timelines dramatically</p><p>🧩 About The CISO Signal</p><p>True cybercrime storytelling with real CISO lessons.</p><p>▶️ <a href="https://www.youtube.com/channel/UCmXu5LO2OwyFH1yQ02PD-Ew">  </a><a href="https://www.youtube.com/channel/UCmXu5LO2OwyFH1yQ02PD-Ew"></a><a href="https://www.youtube.com/channel/UCmXu5LO2OwyFH1yQ02PD-Ew"> / @thecisosignal  </a><br>💼 <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbkJuLUp4ZjBpUGpnQnNPUWlkbjlmRXNEUHVMUXxBQ3Jtc0tsRGFCd3ZaZS1fcmM3ZGd5SE9RYk1GcUhEb283RDNOM1Z6anFEOUw0WlhXVDBpaFNCMFFSeklES2V3R0tPWDFaUVY1WFppSUtzU2ttVGxCc0hoRDhzZDJ5VUtNM2JmZnBHZ1pXZV91SWtWblBkdTFlaw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fthe-ciso-signal&amp;v=ChBygrypxec"> </a><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbkJuLUp4ZjBpUGpnQnNPUWlkbjlmRXNEUHVMUXxBQ3Jtc0tsRGFCd3ZaZS1fcmM3ZGd5SE9RYk1GcUhEb283RDNOM1Z6anFEOUw0WlhXVDBpaFNCMFFSeklES2V3R0tPWDFaUVY1WFppSUtzU2ttVGxCc0hoRDhzZDJ5VUtNM2JmZnBHZ1pXZV91SWtWblBkdTFlaw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fthe-ciso-signal&amp;v=ChBygrypxec"></a><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbkJuLUp4ZjBpUGpnQnNPUWlkbjlmRXNEUHVMUXxBQ3Jtc0tsRGFCd3ZaZS1fcmM3ZGd5SE9RYk1GcUhEb283RDNOM1Z6anFEOUw0WlhXVDBpaFNCMFFSeklES2V3R0tPWDFaUVY1WFppSUtzU2ttVGxCc0hoRDhzZDJ5VUtNM2JmZnBHZ1pXZV91SWtWblBkdTFlaw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fthe-ciso-signal&amp;v=ChBygrypxec"> / the-ciso-signal  </a><br>🌐 <a href="https://www.yo..."></a></p>]]>
      </itunes:summary>
      <itunes:keywords>CISO, cybersecurity podcast, true cybercrime, information security, cybercrime podcast, breach analysis, infosec, security leadership, nation-state attacks, supply chain attack, cyber threat intelligence, digital espionage, insider threat, red team, blue team, zero trust, CISSP, incident response, cyber risk, cyber defense, ransomware, ethical hacking, penetration testing, cyberattack case studies, threat actors, cybersecurity storytelling, SOC, threat detection, CISOs in tech, cyber strategy, security operations, cyber awareness, real-world breaches, cybercrime stories, critical infrastructure security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7a29f368/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>The AT&amp;T Beijing Breach | Metadata Maps That Intelligence Services Want</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>The AT&amp;T Beijing Breach | Metadata Maps That Intelligence Services Want</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">64b4e432-46a4-4413-af8c-f6d76f7e23bc</guid>
      <link>https://TheCISOSignal.transistor.fm/s1/13</link>
      <description>
        <![CDATA[<p>The AT&amp;T Beijing Breach | Metadata Maps That Intelligence Services Want</p><p>With guest co-host John Carse, Field CISO at SquareX</p><p>In 2024, attackers did not steal call recordings.<br>They did not intercept encrypted text messages.<br>They went after something quieter.<br>Call detail records.<br>The outlines of conversations.<br>Phone numbers.<br>Timestamps.<br>Durations.<br>Cell tower connections.<br>Metadata that, on its own, seems technical. Harmless. Operational.<br>But at telecom scale, metadata becomes something else.<br>Between April and early June 2024, attackers accessed systems containing call and text metadata tied to approximately 86 million AT&amp;T customers. The intrusion was traced to a third-party cloud environment associated with AT&amp;T’s data operations. Investigators later pointed to compromised credentials discovered in a Snowflake environment after a phishing attack and infostealer infection inside a vendor ecosystem.<br>No ransomware encryption.<br>No service outage.<br>No dramatic system shutdown.<br>Instead, approximately $370,000 in cryptocurrency was reportedly paid in an effort to prevent public exposure of the dataset.<br>Some analysts linked the activity to a cluster labeled UNC5537. </p><p>Other reporting mentioned data brokerage ecosystems such as ShinyHunters. Researchers, including those at Mandiant, urged caution on attribution, noting behavior consistent with criminal monetization rather than confirmed state-sponsored espionage.</p><p>There is no public evidence that this dataset was used for intelligence operations.<br>There is also no way to prove that it was not.</p><p>Because telecom metadata does not just describe calls.<br>It describes relationships.<br>Who speaks to whom.<br>How often.<br>From where.<br>Which towers were touched along the way.</p><p>For criminals, that information enables SIM swapping, fraud, and targeted phishing.<br>For nation states, it can illuminate social graphs, travel patterns, and networks of influence.</p><p>In this episode of The CISO Signal | True Cybercrime Podcast, we examine how third-party access became the breach path, why metadata is often more strategically valuable than content, and what happens when operational data quietly becomes intelligence-grade material.<br>This is not a story about encryption failing.<br>It is a story about accumulation.</p><p>🎙 Guest Co-Host<br>John Carse<br>Field CISO, SquareX<br>Three-time CISO and host of Be Fearless: The CISO Perspective</p><p>🔍 Episode Topics<br>• What telecom metadata actually reveals beyond call content<br>• Why large telecom providers are high-value intelligence targets<br>• How third-party access and credential reuse created the breach path<br>• Snowflake, vendor risk, and the anatomy of cloud miscalculation<br>• The criminal data brokerage ecosystem and resale supply chains<br>• Why metadata can be more operationally useful than call recordings<br>• Inside the first 24 hours of executive response and board escalation<br>• How security debt surfaces after a third-party breach<br>• Why threat models must evolve when operational systems become intelligence repositories</p><p>🧊 The Aftershock<br>On July 12, 2024, AT&amp;T publicly acknowledged the breach, confirming that call and text content were not accessed.<br>But the exposure shifted the conversation.<br>Privacy experts noted that metadata can reveal business relationships, political activity, religious observance, romantic connections, and movement patterns, without ever recording a single word.<br>Later reporting connected the broader Snowflake-related campaign to individuals including John Erin Binns and Connor Moucka, though attribution questions remain complex and evolving.<br>What makes the AT&amp;T breach different is not technical spectacle.<br>It is the quiet reality that behavioral data, once accumulated at scale, becomes strategic.<br>Every organization that logs user behavior now holds a map.<br>And every map attracts attention.</p><p>🧩 About The CISO Signal<br>True cybercrime storytelling with real CISO lessons.<br>Subscribe so you never miss an investigation.<br>👉 @thecisosignal<br>👉 www.linkedin.com/company/the-ciso-signal<br>👉 www.theCISOsignal.com</p><p>#CISOSignal #ATTBreach #Metadata #Snowflake<br>#CyberEspionage #ThirdPartyRisk #TelecomSecurity #CISO #TrueCybercrime</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The AT&amp;T Beijing Breach | Metadata Maps That Intelligence Services Want</p><p>With guest co-host John Carse, Field CISO at SquareX</p><p>In 2024, attackers did not steal call recordings.<br>They did not intercept encrypted text messages.<br>They went after something quieter.<br>Call detail records.<br>The outlines of conversations.<br>Phone numbers.<br>Timestamps.<br>Durations.<br>Cell tower connections.<br>Metadata that, on its own, seems technical. Harmless. Operational.<br>But at telecom scale, metadata becomes something else.<br>Between April and early June 2024, attackers accessed systems containing call and text metadata tied to approximately 86 million AT&amp;T customers. The intrusion was traced to a third-party cloud environment associated with AT&amp;T’s data operations. Investigators later pointed to compromised credentials discovered in a Snowflake environment after a phishing attack and infostealer infection inside a vendor ecosystem.<br>No ransomware encryption.<br>No service outage.<br>No dramatic system shutdown.<br>Instead, approximately $370,000 in cryptocurrency was reportedly paid in an effort to prevent public exposure of the dataset.<br>Some analysts linked the activity to a cluster labeled UNC5537. </p><p>Other reporting mentioned data brokerage ecosystems such as ShinyHunters. Researchers, including those at Mandiant, urged caution on attribution, noting behavior consistent with criminal monetization rather than confirmed state-sponsored espionage.</p><p>There is no public evidence that this dataset was used for intelligence operations.<br>There is also no way to prove that it was not.</p><p>Because telecom metadata does not just describe calls.<br>It describes relationships.<br>Who speaks to whom.<br>How often.<br>From where.<br>Which towers were touched along the way.</p><p>For criminals, that information enables SIM swapping, fraud, and targeted phishing.<br>For nation states, it can illuminate social graphs, travel patterns, and networks of influence.</p><p>In this episode of The CISO Signal | True Cybercrime Podcast, we examine how third-party access became the breach path, why metadata is often more strategically valuable than content, and what happens when operational data quietly becomes intelligence-grade material.<br>This is not a story about encryption failing.<br>It is a story about accumulation.</p><p>🎙 Guest Co-Host<br>John Carse<br>Field CISO, SquareX<br>Three-time CISO and host of Be Fearless: The CISO Perspective</p><p>🔍 Episode Topics<br>• What telecom metadata actually reveals beyond call content<br>• Why large telecom providers are high-value intelligence targets<br>• How third-party access and credential reuse created the breach path<br>• Snowflake, vendor risk, and the anatomy of cloud miscalculation<br>• The criminal data brokerage ecosystem and resale supply chains<br>• Why metadata can be more operationally useful than call recordings<br>• Inside the first 24 hours of executive response and board escalation<br>• How security debt surfaces after a third-party breach<br>• Why threat models must evolve when operational systems become intelligence repositories</p><p>🧊 The Aftershock<br>On July 12, 2024, AT&amp;T publicly acknowledged the breach, confirming that call and text content were not accessed.<br>But the exposure shifted the conversation.<br>Privacy experts noted that metadata can reveal business relationships, political activity, religious observance, romantic connections, and movement patterns, without ever recording a single word.<br>Later reporting connected the broader Snowflake-related campaign to individuals including John Erin Binns and Connor Moucka, though attribution questions remain complex and evolving.<br>What makes the AT&amp;T breach different is not technical spectacle.<br>It is the quiet reality that behavioral data, once accumulated at scale, becomes strategic.<br>Every organization that logs user behavior now holds a map.<br>And every map attracts attention.</p><p>🧩 About The CISO Signal<br>True cybercrime storytelling with real CISO lessons.<br>Subscribe so you never miss an investigation.<br>👉 @thecisosignal<br>👉 www.linkedin.com/company/the-ciso-signal<br>👉 www.theCISOsignal.com</p><p>#CISOSignal #ATTBreach #Metadata #Snowflake<br>#CyberEspionage #ThirdPartyRisk #TelecomSecurity #CISO #TrueCybercrime</p>]]>
      </content:encoded>
      <pubDate>Tue, 03 Mar 2026 02:27:42 -0800</pubDate>
      <author>Jeremy Ladner</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/prfx.byspotify.com/e/media.transistor.fm/aa8e9748/ea71085a.mp3" length="54181716" type="audio/mpeg"/>
      <itunes:author>Jeremy Ladner</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ht8od5gt0Dw-PVaGoMht0bHU-6qR_tqT9EKDFvfWUbI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81Yjhi/MzFlZmNjMmE0Nzkx/YmMyMDk5YWNhNzBi/ZDAzYy5qcGc.jpg"/>
      <itunes:duration>2118</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The AT&amp;T Beijing Breach | Metadata Maps That Intelligence Services Want</p><p>With guest co-host John Carse, Field CISO at SquareX</p><p>In 2024, attackers did not steal call recordings.<br>They did not intercept encrypted text messages.<br>They went after something quieter.<br>Call detail records.<br>The outlines of conversations.<br>Phone numbers.<br>Timestamps.<br>Durations.<br>Cell tower connections.<br>Metadata that, on its own, seems technical. Harmless. Operational.<br>But at telecom scale, metadata becomes something else.<br>Between April and early June 2024, attackers accessed systems containing call and text metadata tied to approximately 86 million AT&amp;T customers. The intrusion was traced to a third-party cloud environment associated with AT&amp;T’s data operations. Investigators later pointed to compromised credentials discovered in a Snowflake environment after a phishing attack and infostealer infection inside a vendor ecosystem.<br>No ransomware encryption.<br>No service outage.<br>No dramatic system shutdown.<br>Instead, approximately $370,000 in cryptocurrency was reportedly paid in an effort to prevent public exposure of the dataset.<br>Some analysts linked the activity to a cluster labeled UNC5537. </p><p>Other reporting mentioned data brokerage ecosystems such as ShinyHunters. Researchers, including those at Mandiant, urged caution on attribution, noting behavior consistent with criminal monetization rather than confirmed state-sponsored espionage.</p><p>There is no public evidence that this dataset was used for intelligence operations.<br>There is also no way to prove that it was not.</p><p>Because telecom metadata does not just describe calls.<br>It describes relationships.<br>Who speaks to whom.<br>How often.<br>From where.<br>Which towers were touched along the way.</p><p>For criminals, that information enables SIM swapping, fraud, and targeted phishing.<br>For nation states, it can illuminate social graphs, travel patterns, and networks of influence.</p><p>In this episode of The CISO Signal | True Cybercrime Podcast, we examine how third-party access became the breach path, why metadata is often more strategically valuable than content, and what happens when operational data quietly becomes intelligence-grade material.<br>This is not a story about encryption failing.<br>It is a story about accumulation.</p><p>🎙 Guest Co-Host<br>John Carse<br>Field CISO, SquareX<br>Three-time CISO and host of Be Fearless: The CISO Perspective</p><p>🔍 Episode Topics<br>• What telecom metadata actually reveals beyond call content<br>• Why large telecom providers are high-value intelligence targets<br>• How third-party access and credential reuse created the breach path<br>• Snowflake, vendor risk, and the anatomy of cloud miscalculation<br>• The criminal data brokerage ecosystem and resale supply chains<br>• Why metadata can be more operationally useful than call recordings<br>• Inside the first 24 hours of executive response and board escalation<br>• How security debt surfaces after a third-party breach<br>• Why threat models must evolve when operational systems become intelligence repositories</p><p>🧊 The Aftershock<br>On July 12, 2024, AT&amp;T publicly acknowledged the breach, confirming that call and text content were not accessed.<br>But the exposure shifted the conversation.<br>Privacy experts noted that metadata can reveal business relationships, political activity, religious observance, romantic connections, and movement patterns, without ever recording a single word.<br>Later reporting connected the broader Snowflake-related campaign to individuals including John Erin Binns and Connor Moucka, though attribution questions remain complex and evolving.<br>What makes the AT&amp;T breach different is not technical spectacle.<br>It is the quiet reality that behavioral data, once accumulated at scale, becomes strategic.<br>Every organization that logs user behavior now holds a map.<br>And every map attracts attention.</p><p>🧩 About The CISO Signal<br>True cybercrime storytelling with real CISO lessons.<br>Subscribe so you never miss an investigation.<br>👉 @thecisosignal<br>👉 www.linkedin.com/company/the-ciso-signal<br>👉 www.theCISOsignal.com</p><p>#CISOSignal #ATTBreach #Metadata #Snowflake<br>#CyberEspionage #ThirdPartyRisk #TelecomSecurity #CISO #TrueCybercrime</p>]]>
      </itunes:summary>
      <itunes:keywords>#CISOSignal #ATTBreach #Metadata #Snowflake #CyberEspionage #ThirdPartyRisk #TelecomSecurity #CISO #TrueCybercrime</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/aa8e9748/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Accellion FTA | How a Legacy File Transfer Tool Fueled a Global Extortion Campaign</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Accellion FTA | How a Legacy File Transfer Tool Fueled a Global Extortion Campaign</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fb805923-bdbc-4c5f-a179-5a35f84ed465</guid>
      <link>https://TheCISOSignal.transistor.fm/s1/12</link>
      <description>
        <![CDATA[<p>Accellion FTA | How a Legacy File Transfer Tool Fueled a Global Extortion Campaign</p><p>With guest co-hosts Christopher Russell, CISO at tZERO Group<br>and Benjamin Lipczynski, Director of Cyber Security &amp; Regulatory Services at Origina</p><p>In late 2020, attackers did not target the cloud.<br>They did not exploit a modern SaaS platform.<br>They went after a quiet, aging file transfer appliance that had been sitting in enterprise environments for nearly two decades.<br>The Accellion File Transfer Appliance (FTA) was still moving contracts, legal documents, financial records, and sensitive data across governments, universities, and global enterprises. Long past its intended design horizon, it remained trusted. And largely unseen.<br>Then a cluster of zero-day vulnerabilities was exploited.<br>Attackers linked to FIN11 used the flaws for large-scale data exfiltration. The stolen data was then handed off to the Clop, which launched a public leak-site extortion campaign.<br>No ransomware encryption.<br>Just stolen files and pressure.<br>Victims included Shell, Kroger, the Reserve Bank of New Zealand, multiple universities, and public-sector agencies worldwide.</p><p>In this episode of The CISO Signal | True Cybercrime Podcast, we break down how legacy systems quietly become high-consequence risk, why patching alone could not fix the underlying problem, and what happens when attackers specialize across exploitation and extortion.</p><p>This is not a story about ignoring upgrades.<br>It is a story about systems that outlive their assumptions.</p><p>🎙 Guest Co-Hosts</p><p>Christopher Russell:<br>Chief Information Security Officer, tZERO Group<br>👉  www.tzero.com <br>👉  <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa0lJQ3hzVlpibERXLVlhbHM4bkg2U1BFdnVvQXxBQ3Jtc0trYUh0LU9jelE1MVBvcUZtc0RjZzl2WkE4SmN3cXcwS1JnLVdhUm91VzJJT09kWm1nWTYtVnNHcnQ3amVOZXNJWHhoUHVoVnlpdWoxZ3JRSm1nLU9vcEdWcUhtYUdoRHpVQXQxYUVuN3JtZE54b2Rndw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Ftzero&amp;v=LkeMtOMr1WU"> </a><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa0lJQ3hzVlpibERXLVlhbHM4bkg2U1BFdnVvQXxBQ3Jtc0trYUh0LU9jelE1MVBvcUZtc0RjZzl2WkE4SmN3cXcwS1JnLVdhUm91VzJJT09kWm1nWTYtVnNHcnQ3amVOZXNJWHhoUHVoVnlpdWoxZ3JRSm1nLU9vcEdWcUhtYUdoRHpVQXQxYUVuN3JtZE54b2Rndw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Ftzero&amp;v=LkeMtOMr1WU"></a><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa0lJQ3hzVlpibERXLVlhbHM4bkg2U1BFdnVvQXxBQ3Jtc0trYUh0LU9jelE1MVBvcUZtc0RjZzl2WkE4SmN3cXcwS1JnLVdhUm91VzJJT09kWm1nWTYtVnNHcnQ3amVOZXNJWHhoUHVoVnlpdWoxZ3JRSm1nLU9vcEdWcUhtYUdoRHpVQXQxYUVuN3JtZE54b2Rndw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Ftzero&amp;v=LkeMtOMr1WU"> / tzero  </a></p><p>Benjamin Lipczynski:<br>Director, Cyber Security &amp; Regulatory Services, <br>🤝 Episode Sponsor: Origina<br>👉  www.origina.com<br>👉  <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa3liMk5tQ3RhLTVmcnhJSkFSV3RhS0NhLUFvQXxBQ3Jtc0tuOW02STVRcG44TVA4WUlBVHljWUVzU0c1YmZOS2ZYei1GQVRMalJXM1RiX2dCUTg0Zm04T0FaZjliZHFkdHZCOThWRkhVNTRjNEM3Ui1TeXN1QXNtelVhd2ROM1h5UTlseHB5TTNuTlFnQTYweEVxZw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Forigina&amp;v=LkeMtOMr1WU"> </a><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa3liMk5tQ3RhLTVmcnhJSkFSV3RhS0NhLUFvQXxBQ3Jtc0tuOW02STVRcG44TVA4WUlBVHljWUVzU0c1YmZOS2ZYei1GQVRMalJXM1RiX2dCUTg0Zm04T0FaZjliZHFkdHZCOThWRkhVNTRjNEM3Ui1TeXN1QXNtelVhd2ROM1h5UTlseHB5TTNuTlFnQTYweEVxZw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Forigina&amp;v=LkeMtOMr1WU"></a><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa3liMk5tQ3RhLTVmcnhJSkFSV3RhS0NhLUFvQXxBQ3Jtc0tuOW02STVRcG44TVA4WUlBVHljWUVzU0c1YmZOS2ZYei1GQVRMalJXM1RiX2dCUTg0Zm04T0FaZjliZHFkdHZCOThWRkhVNTRjNEM3Ui1TeXN1QXNtelVhd2ROM1h5UTlseHB5TTNuTlFnQTYweEVxZw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Forigina&amp;v=LkeMtOMr1WU"> / origina  </a></p><p><br>This episode is sponsored by Origina, an independent provider of third-party software support and lifecycle governance for mission-critical enterprise systems.</p><p>Origina works with security, IT, and risk leaders to safely operate, harden, and govern systems that may be aging, end-of-life, or under vendor upgrade pressure, without forcing rushed or unnecessary migrations. Their approach focuses on control, stability, and evidence-based decision making, especially in environments where downtime or disruption is not an option.</p><p><br>🔍 Episode Topics</p><p>• Why legacy file transfer tools stayed in production for decades<br>• How multiple zero-days were exploited in rapid succession<br>• The handoff between initial access groups and extortion operators<br>• Why many victims learned of the breach through leak sites<br>• Patching vs architectural limits in aging systems<br>• How security leaders can manage legacy risk without panic-driven upgrades</p><p>🧊 The aftershock</p><p>By early 2021, global CERT teams urged organizations to migrate off Accellion FTA immediately, citing its end-of-life status and ongoing risk. Multiple lawsuits followed, along with increased regulatory scrutiny of legacy tools embedded in sensitive workflows.</p><p>The Accellion breach became a reference point for a broader industry reckoning around technical debt, governance, and the hidden risk of systems that are still working right up until the moment they fail.</p><p>🧩 About The CISO Signal</p><p>True cybercrime storytelling with real CISO lessons.<br>Subscribe so you never miss an investigation.<br>👉 @thecisosignal  <br>👉  www.linkedin.com/company/the-ciso-signal <br>👉  www.theCISOsignal.com  </p><p><br><a href="https://www.youtube.com/hashtag/cisosignal">#CISOSignal</a> <a href="https://www.youtube.com/hashtag/accellionbreach">#AccellionBreach</a> <a href="https://www.youtube.com/hashtag/clop">#Clop</a> <a href="https://www.youtube.com/hashtag/fin11">#FIN11</a><br><a href="https://www.youtube.com/hashtag/legacysystems">#LegacySystems</a> <a href="https://www.youtube.com/hashtag/dataextortion">#DataExtortion</a> <a href="https://www.youtube...."></a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Accellion FTA | How a Legacy File Transfer Tool Fueled a Global Extortion Campaign</p><p>With guest co-hosts Christopher Russell, CISO at tZERO Group<br>and Benjamin Lipczynski, Director of Cyber Security &amp; Regulatory Services at Origina</p><p>In late 2020, attackers did not target the cloud.<br>They did not exploit a modern SaaS platform.<br>They went after a quiet, aging file transfer appliance that had been sitting in enterprise environments for nearly two decades.<br>The Accellion File Transfer Appliance (FTA) was still moving contracts, legal documents, financial records, and sensitive data across governments, universities, and global enterprises. Long past its intended design horizon, it remained trusted. And largely unseen.<br>Then a cluster of zero-day vulnerabilities was exploited.<br>Attackers linked to FIN11 used the flaws for large-scale data exfiltration. The stolen data was then handed off to the Clop, which launched a public leak-site extortion campaign.<br>No ransomware encryption.<br>Just stolen files and pressure.<br>Victims included Shell, Kroger, the Reserve Bank of New Zealand, multiple universities, and public-sector agencies worldwide.</p><p>In this episode of The CISO Signal | True Cybercrime Podcast, we break down how legacy systems quietly become high-consequence risk, why patching alone could not fix the underlying problem, and what happens when attackers specialize across exploitation and extortion.</p><p>This is not a story about ignoring upgrades.<br>It is a story about systems that outlive their assumptions.</p><p>🎙 Guest Co-Hosts</p><p>Christopher Russell:<br>Chief Information Security Officer, tZERO Group<br>👉  www.tzero.com <br>👉  <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa0lJQ3hzVlpibERXLVlhbHM4bkg2U1BFdnVvQXxBQ3Jtc0trYUh0LU9jelE1MVBvcUZtc0RjZzl2WkE4SmN3cXcwS1JnLVdhUm91VzJJT09kWm1nWTYtVnNHcnQ3amVOZXNJWHhoUHVoVnlpdWoxZ3JRSm1nLU9vcEdWcUhtYUdoRHpVQXQxYUVuN3JtZE54b2Rndw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Ftzero&amp;v=LkeMtOMr1WU"> </a><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa0lJQ3hzVlpibERXLVlhbHM4bkg2U1BFdnVvQXxBQ3Jtc0trYUh0LU9jelE1MVBvcUZtc0RjZzl2WkE4SmN3cXcwS1JnLVdhUm91VzJJT09kWm1nWTYtVnNHcnQ3amVOZXNJWHhoUHVoVnlpdWoxZ3JRSm1nLU9vcEdWcUhtYUdoRHpVQXQxYUVuN3JtZE54b2Rndw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Ftzero&amp;v=LkeMtOMr1WU"></a><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa0lJQ3hzVlpibERXLVlhbHM4bkg2U1BFdnVvQXxBQ3Jtc0trYUh0LU9jelE1MVBvcUZtc0RjZzl2WkE4SmN3cXcwS1JnLVdhUm91VzJJT09kWm1nWTYtVnNHcnQ3amVOZXNJWHhoUHVoVnlpdWoxZ3JRSm1nLU9vcEdWcUhtYUdoRHpVQXQxYUVuN3JtZE54b2Rndw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Ftzero&amp;v=LkeMtOMr1WU"> / tzero  </a></p><p>Benjamin Lipczynski:<br>Director, Cyber Security &amp; Regulatory Services, <br>🤝 Episode Sponsor: Origina<br>👉  www.origina.com<br>👉  <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa3liMk5tQ3RhLTVmcnhJSkFSV3RhS0NhLUFvQXxBQ3Jtc0tuOW02STVRcG44TVA4WUlBVHljWUVzU0c1YmZOS2ZYei1GQVRMalJXM1RiX2dCUTg0Zm04T0FaZjliZHFkdHZCOThWRkhVNTRjNEM3Ui1TeXN1QXNtelVhd2ROM1h5UTlseHB5TTNuTlFnQTYweEVxZw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Forigina&amp;v=LkeMtOMr1WU"> </a><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa3liMk5tQ3RhLTVmcnhJSkFSV3RhS0NhLUFvQXxBQ3Jtc0tuOW02STVRcG44TVA4WUlBVHljWUVzU0c1YmZOS2ZYei1GQVRMalJXM1RiX2dCUTg0Zm04T0FaZjliZHFkdHZCOThWRkhVNTRjNEM3Ui1TeXN1QXNtelVhd2ROM1h5UTlseHB5TTNuTlFnQTYweEVxZw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Forigina&amp;v=LkeMtOMr1WU"></a><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa3liMk5tQ3RhLTVmcnhJSkFSV3RhS0NhLUFvQXxBQ3Jtc0tuOW02STVRcG44TVA4WUlBVHljWUVzU0c1YmZOS2ZYei1GQVRMalJXM1RiX2dCUTg0Zm04T0FaZjliZHFkdHZCOThWRkhVNTRjNEM3Ui1TeXN1QXNtelVhd2ROM1h5UTlseHB5TTNuTlFnQTYweEVxZw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Forigina&amp;v=LkeMtOMr1WU"> / origina  </a></p><p><br>This episode is sponsored by Origina, an independent provider of third-party software support and lifecycle governance for mission-critical enterprise systems.</p><p>Origina works with security, IT, and risk leaders to safely operate, harden, and govern systems that may be aging, end-of-life, or under vendor upgrade pressure, without forcing rushed or unnecessary migrations. Their approach focuses on control, stability, and evidence-based decision making, especially in environments where downtime or disruption is not an option.</p><p><br>🔍 Episode Topics</p><p>• Why legacy file transfer tools stayed in production for decades<br>• How multiple zero-days were exploited in rapid succession<br>• The handoff between initial access groups and extortion operators<br>• Why many victims learned of the breach through leak sites<br>• Patching vs architectural limits in aging systems<br>• How security leaders can manage legacy risk without panic-driven upgrades</p><p>🧊 The aftershock</p><p>By early 2021, global CERT teams urged organizations to migrate off Accellion FTA immediately, citing its end-of-life status and ongoing risk. Multiple lawsuits followed, along with increased regulatory scrutiny of legacy tools embedded in sensitive workflows.</p><p>The Accellion breach became a reference point for a broader industry reckoning around technical debt, governance, and the hidden risk of systems that are still working right up until the moment they fail.</p><p>🧩 About The CISO Signal</p><p>True cybercrime storytelling with real CISO lessons.<br>Subscribe so you never miss an investigation.<br>👉 @thecisosignal  <br>👉  www.linkedin.com/company/the-ciso-signal <br>👉  www.theCISOsignal.com  </p><p><br><a href="https://www.youtube.com/hashtag/cisosignal">#CISOSignal</a> <a href="https://www.youtube.com/hashtag/accellionbreach">#AccellionBreach</a> <a href="https://www.youtube.com/hashtag/clop">#Clop</a> <a href="https://www.youtube.com/hashtag/fin11">#FIN11</a><br><a href="https://www.youtube.com/hashtag/legacysystems">#LegacySystems</a> <a href="https://www.youtube.com/hashtag/dataextortion">#DataExtortion</a> <a href="https://www.youtube...."></a></p>]]>
      </content:encoded>
      <pubDate>Thu, 05 Feb 2026 10:41:29 -0800</pubDate>
      <author>Jeremy Ladner</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/prfx.byspotify.com/e/media.transistor.fm/db53a32d/731bf0d6.mp3" length="36850795" type="audio/mpeg"/>
      <itunes:author>Jeremy Ladner</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/12QH0t5nPK3n0zxgEvrj2BBya5KBZ_Y6YB9asgYoI5E/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hMWI0/YTVkYmZkYmMyZWE1/MTc0MTgxZGY0YWEx/MDM3Yi5qcGc.jpg"/>
      <itunes:duration>1498</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Accellion FTA | How a Legacy File Transfer Tool Fueled a Global Extortion Campaign</p><p>With guest co-hosts Christopher Russell, CISO at tZERO Group<br>and Benjamin Lipczynski, Director of Cyber Security &amp; Regulatory Services at Origina</p><p>In late 2020, attackers did not target the cloud.<br>They did not exploit a modern SaaS platform.<br>They went after a quiet, aging file transfer appliance that had been sitting in enterprise environments for nearly two decades.<br>The Accellion File Transfer Appliance (FTA) was still moving contracts, legal documents, financial records, and sensitive data across governments, universities, and global enterprises. Long past its intended design horizon, it remained trusted. And largely unseen.<br>Then a cluster of zero-day vulnerabilities was exploited.<br>Attackers linked to FIN11 used the flaws for large-scale data exfiltration. The stolen data was then handed off to the Clop, which launched a public leak-site extortion campaign.<br>No ransomware encryption.<br>Just stolen files and pressure.<br>Victims included Shell, Kroger, the Reserve Bank of New Zealand, multiple universities, and public-sector agencies worldwide.</p><p>In this episode of The CISO Signal | True Cybercrime Podcast, we break down how legacy systems quietly become high-consequence risk, why patching alone could not fix the underlying problem, and what happens when attackers specialize across exploitation and extortion.</p><p>This is not a story about ignoring upgrades.<br>It is a story about systems that outlive their assumptions.</p><p>🎙 Guest Co-Hosts</p><p>Christopher Russell:<br>Chief Information Security Officer, tZERO Group<br>👉  www.tzero.com <br>👉  <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa0lJQ3hzVlpibERXLVlhbHM4bkg2U1BFdnVvQXxBQ3Jtc0trYUh0LU9jelE1MVBvcUZtc0RjZzl2WkE4SmN3cXcwS1JnLVdhUm91VzJJT09kWm1nWTYtVnNHcnQ3amVOZXNJWHhoUHVoVnlpdWoxZ3JRSm1nLU9vcEdWcUhtYUdoRHpVQXQxYUVuN3JtZE54b2Rndw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Ftzero&amp;v=LkeMtOMr1WU"> </a><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa0lJQ3hzVlpibERXLVlhbHM4bkg2U1BFdnVvQXxBQ3Jtc0trYUh0LU9jelE1MVBvcUZtc0RjZzl2WkE4SmN3cXcwS1JnLVdhUm91VzJJT09kWm1nWTYtVnNHcnQ3amVOZXNJWHhoUHVoVnlpdWoxZ3JRSm1nLU9vcEdWcUhtYUdoRHpVQXQxYUVuN3JtZE54b2Rndw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Ftzero&amp;v=LkeMtOMr1WU"></a><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa0lJQ3hzVlpibERXLVlhbHM4bkg2U1BFdnVvQXxBQ3Jtc0trYUh0LU9jelE1MVBvcUZtc0RjZzl2WkE4SmN3cXcwS1JnLVdhUm91VzJJT09kWm1nWTYtVnNHcnQ3amVOZXNJWHhoUHVoVnlpdWoxZ3JRSm1nLU9vcEdWcUhtYUdoRHpVQXQxYUVuN3JtZE54b2Rndw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Ftzero&amp;v=LkeMtOMr1WU"> / tzero  </a></p><p>Benjamin Lipczynski:<br>Director, Cyber Security &amp; Regulatory Services, <br>🤝 Episode Sponsor: Origina<br>👉  www.origina.com<br>👉  <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa3liMk5tQ3RhLTVmcnhJSkFSV3RhS0NhLUFvQXxBQ3Jtc0tuOW02STVRcG44TVA4WUlBVHljWUVzU0c1YmZOS2ZYei1GQVRMalJXM1RiX2dCUTg0Zm04T0FaZjliZHFkdHZCOThWRkhVNTRjNEM3Ui1TeXN1QXNtelVhd2ROM1h5UTlseHB5TTNuTlFnQTYweEVxZw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Forigina&amp;v=LkeMtOMr1WU"> </a><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa3liMk5tQ3RhLTVmcnhJSkFSV3RhS0NhLUFvQXxBQ3Jtc0tuOW02STVRcG44TVA4WUlBVHljWUVzU0c1YmZOS2ZYei1GQVRMalJXM1RiX2dCUTg0Zm04T0FaZjliZHFkdHZCOThWRkhVNTRjNEM3Ui1TeXN1QXNtelVhd2ROM1h5UTlseHB5TTNuTlFnQTYweEVxZw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Forigina&amp;v=LkeMtOMr1WU"></a><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa3liMk5tQ3RhLTVmcnhJSkFSV3RhS0NhLUFvQXxBQ3Jtc0tuOW02STVRcG44TVA4WUlBVHljWUVzU0c1YmZOS2ZYei1GQVRMalJXM1RiX2dCUTg0Zm04T0FaZjliZHFkdHZCOThWRkhVNTRjNEM3Ui1TeXN1QXNtelVhd2ROM1h5UTlseHB5TTNuTlFnQTYweEVxZw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Forigina&amp;v=LkeMtOMr1WU"> / origina  </a></p><p><br>This episode is sponsored by Origina, an independent provider of third-party software support and lifecycle governance for mission-critical enterprise systems.</p><p>Origina works with security, IT, and risk leaders to safely operate, harden, and govern systems that may be aging, end-of-life, or under vendor upgrade pressure, without forcing rushed or unnecessary migrations. Their approach focuses on control, stability, and evidence-based decision making, especially in environments where downtime or disruption is not an option.</p><p><br>🔍 Episode Topics</p><p>• Why legacy file transfer tools stayed in production for decades<br>• How multiple zero-days were exploited in rapid succession<br>• The handoff between initial access groups and extortion operators<br>• Why many victims learned of the breach through leak sites<br>• Patching vs architectural limits in aging systems<br>• How security leaders can manage legacy risk without panic-driven upgrades</p><p>🧊 The aftershock</p><p>By early 2021, global CERT teams urged organizations to migrate off Accellion FTA immediately, citing its end-of-life status and ongoing risk. Multiple lawsuits followed, along with increased regulatory scrutiny of legacy tools embedded in sensitive workflows.</p><p>The Accellion breach became a reference point for a broader industry reckoning around technical debt, governance, and the hidden risk of systems that are still working right up until the moment they fail.</p><p>🧩 About The CISO Signal</p><p>True cybercrime storytelling with real CISO lessons.<br>Subscribe so you never miss an investigation.<br>👉 @thecisosignal  <br>👉  www.linkedin.com/company/the-ciso-signal <br>👉  www.theCISOsignal.com  </p><p><br><a href="https://www.youtube.com/hashtag/cisosignal">#CISOSignal</a> <a href="https://www.youtube.com/hashtag/accellionbreach">#AccellionBreach</a> <a href="https://www.youtube.com/hashtag/clop">#Clop</a> <a href="https://www.youtube.com/hashtag/fin11">#FIN11</a><br><a href="https://www.youtube.com/hashtag/legacysystems">#LegacySystems</a> <a href="https://www.youtube.com/hashtag/dataextortion">#DataExtortion</a> <a href="https://www.youtube...."></a></p>]]>
      </itunes:summary>
      <itunes:keywords>Accellion breach, Accellion FTA, file transfer appliance, legacy systems security, zero-day vulnerabilities, data exfiltration, ransomware extortion, Clop ransomware, FIN11, supply chain risk, third-party risk, legacy infrastructure, patch management failures, end-of-life software, enterprise breaches, cyber extortion, leak sites, regulatory pressure, breach disclosure, incident response leadership, CISO decision making, cybersecurity leadership, enterprise risk, data breaches, information security, critical infrastructure security, governance risk and compliance, breach response strategy, cybercrime investigation, true cybercrime, cybersecurity podcast, CISO podcast</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/db53a32d/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Midnight Blizzard | How Russian Intelligence Breached Microsoft - w/ Alyssa Robinson, CISO @ HubSpot</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Midnight Blizzard | How Russian Intelligence Breached Microsoft - w/ Alyssa Robinson, CISO @ HubSpot</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e52216c3-777c-47b8-be04-3f7e8cc0b8ba</guid>
      <link>https://TheCISOSignal.transistor.fm/s1/11</link>
      <description>
        <![CDATA[<p>Midnight Blizzard | How Russian Intelligence Breached Microsoft </p><p>With guest CISO Co-Host Alyssa Robinson, CISO at HubSpot</p><p>In late 2023, a Russian state-sponsored threat actor known as Midnight Blizzard (also called NOBELIUM and widely associated with APT29) began probing Microsoft the old-fashioned way: password spraying.</p><p>No zero-day. No smash-and-grab.</p><p>Just patience, repetition, and one legacy gap.</p><p>Microsoft says the actor compromised a legacy, non-production test tenant account and used that foothold to access a very small percentage of Microsoft corporate email accounts, including members of senior leadership and employees in cybersecurity and legal, then exfiltrated some emails and attached documents. Microsoft detected the attack on January 12, 2024, and disclosed it publicly on January 19, 2024. <br>Microsoft</p><p>This was espionage, not extortion: Microsoft assessed the actor was initially seeking information related to Midnight Blizzard itself, essentially trying to learn what Microsoft knew about their operations. <br>Microsoft<br>+1</p><p>In this episode of The CISO Signal | True Cybercrime Podcast, we break down how a nation-state operation targets the most valuable asset in modern security: identity. We explore why executive inboxes are intelligence gold, why slow intrusions are so hard to see in real time, and what incident response looks like when the adversary is collecting insight, not detonating ransomware.</p><p>🎙 Guest CISO Co-Host</p><p>Alyssa Robinson<br>Chief Information Security Officer, HubSpot</p><p>🔍 Episode Topics</p><p>• How password spraying still works at massive scale<br>• Why legacy test tenants and exceptions become the entry point<br>• Executive identity risk and the “convenience gap”<br>• What changes when the attacker is a nation state<br>• The trust question: what downstream organizations must assume</p><p>🧊 The aftershock</p><p>Microsoft later reported evidence that the actor was using exfiltrated information to pursue additional unauthorized access, including some source code repositories and internal systems, while stating it found no evidence that Microsoft-hosted customer-facing systems were compromised. <br>Microsoft</p><p>CISA also issued guidance on SVR / APT29 tradecraft for initial cloud access (AA24-057A) and an Emergency Directive tied to this compromise (ED 24-02). <br>CISA<br>+1</p><p>🧩 About The CISO Signal<br>True cybercrime storytelling with real CISO lessons. Subscribe so you never miss an investigation.<br>👉 / @thecisosignal<br>www.linkedin.com/company/the-ciso-signal</p><p><a href="https://www.youtube.com/hashtag/cisosignal">#CISOSignal</a> <a href="https://www.youtube.com/hashtag/microsoftbreach">#MicrosoftBreach</a> <a href="https://www.youtube.com/hashtag/midnightblizzard">#MidnightBlizzard</a> <a href="https://www.youtube.com/hashtag/apt29">#APT29</a> <a href="https://www.youtube.com/hashtag/nobelium">#NOBELIUM</a><br><a href="https://www.youtube.com/hashtag/cyberespionage">#CyberEspionage</a> <a href="https://www.youtube.com/hashtag/identitysecurity">#IdentitySecurity</a> <a href="https://www.youtube.com/hashtag/cloudsecurity">#CloudSecurity</a> <a href="https://www.youtube.com/hashtag/ciso">#CISO</a> <a href="https://www.youtube.com/hashtag/truecybercrime">#TrueCybercrime</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Midnight Blizzard | How Russian Intelligence Breached Microsoft </p><p>With guest CISO Co-Host Alyssa Robinson, CISO at HubSpot</p><p>In late 2023, a Russian state-sponsored threat actor known as Midnight Blizzard (also called NOBELIUM and widely associated with APT29) began probing Microsoft the old-fashioned way: password spraying.</p><p>No zero-day. No smash-and-grab.</p><p>Just patience, repetition, and one legacy gap.</p><p>Microsoft says the actor compromised a legacy, non-production test tenant account and used that foothold to access a very small percentage of Microsoft corporate email accounts, including members of senior leadership and employees in cybersecurity and legal, then exfiltrated some emails and attached documents. Microsoft detected the attack on January 12, 2024, and disclosed it publicly on January 19, 2024. <br>Microsoft</p><p>This was espionage, not extortion: Microsoft assessed the actor was initially seeking information related to Midnight Blizzard itself, essentially trying to learn what Microsoft knew about their operations. <br>Microsoft<br>+1</p><p>In this episode of The CISO Signal | True Cybercrime Podcast, we break down how a nation-state operation targets the most valuable asset in modern security: identity. We explore why executive inboxes are intelligence gold, why slow intrusions are so hard to see in real time, and what incident response looks like when the adversary is collecting insight, not detonating ransomware.</p><p>🎙 Guest CISO Co-Host</p><p>Alyssa Robinson<br>Chief Information Security Officer, HubSpot</p><p>🔍 Episode Topics</p><p>• How password spraying still works at massive scale<br>• Why legacy test tenants and exceptions become the entry point<br>• Executive identity risk and the “convenience gap”<br>• What changes when the attacker is a nation state<br>• The trust question: what downstream organizations must assume</p><p>🧊 The aftershock</p><p>Microsoft later reported evidence that the actor was using exfiltrated information to pursue additional unauthorized access, including some source code repositories and internal systems, while stating it found no evidence that Microsoft-hosted customer-facing systems were compromised. <br>Microsoft</p><p>CISA also issued guidance on SVR / APT29 tradecraft for initial cloud access (AA24-057A) and an Emergency Directive tied to this compromise (ED 24-02). <br>CISA<br>+1</p><p>🧩 About The CISO Signal<br>True cybercrime storytelling with real CISO lessons. Subscribe so you never miss an investigation.<br>👉 / @thecisosignal<br>www.linkedin.com/company/the-ciso-signal</p><p><a href="https://www.youtube.com/hashtag/cisosignal">#CISOSignal</a> <a href="https://www.youtube.com/hashtag/microsoftbreach">#MicrosoftBreach</a> <a href="https://www.youtube.com/hashtag/midnightblizzard">#MidnightBlizzard</a> <a href="https://www.youtube.com/hashtag/apt29">#APT29</a> <a href="https://www.youtube.com/hashtag/nobelium">#NOBELIUM</a><br><a href="https://www.youtube.com/hashtag/cyberespionage">#CyberEspionage</a> <a href="https://www.youtube.com/hashtag/identitysecurity">#IdentitySecurity</a> <a href="https://www.youtube.com/hashtag/cloudsecurity">#CloudSecurity</a> <a href="https://www.youtube.com/hashtag/ciso">#CISO</a> <a href="https://www.youtube.com/hashtag/truecybercrime">#TrueCybercrime</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 30 Dec 2025 02:13:14 -0800</pubDate>
      <author>Jeremy Ladner</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/prfx.byspotify.com/e/media.transistor.fm/eb4babd8/321bbfad.mp3" length="48761620" type="audio/mpeg"/>
      <itunes:author>Jeremy Ladner</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/RnqjhZkkMizspQhMYll-rs8k5t-kf1AfpDAp4QXzfG0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iNzMw/YjlmMjE0NDkxMWIx/NzRlMjIxYzNjZDgz/YjkyOS5qcGc.jpg"/>
      <itunes:duration>1958</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Midnight Blizzard | How Russian Intelligence Breached Microsoft </p><p>With guest CISO Co-Host Alyssa Robinson, CISO at HubSpot</p><p>In late 2023, a Russian state-sponsored threat actor known as Midnight Blizzard (also called NOBELIUM and widely associated with APT29) began probing Microsoft the old-fashioned way: password spraying.</p><p>No zero-day. No smash-and-grab.</p><p>Just patience, repetition, and one legacy gap.</p><p>Microsoft says the actor compromised a legacy, non-production test tenant account and used that foothold to access a very small percentage of Microsoft corporate email accounts, including members of senior leadership and employees in cybersecurity and legal, then exfiltrated some emails and attached documents. Microsoft detected the attack on January 12, 2024, and disclosed it publicly on January 19, 2024. <br>Microsoft</p><p>This was espionage, not extortion: Microsoft assessed the actor was initially seeking information related to Midnight Blizzard itself, essentially trying to learn what Microsoft knew about their operations. <br>Microsoft<br>+1</p><p>In this episode of The CISO Signal | True Cybercrime Podcast, we break down how a nation-state operation targets the most valuable asset in modern security: identity. We explore why executive inboxes are intelligence gold, why slow intrusions are so hard to see in real time, and what incident response looks like when the adversary is collecting insight, not detonating ransomware.</p><p>🎙 Guest CISO Co-Host</p><p>Alyssa Robinson<br>Chief Information Security Officer, HubSpot</p><p>🔍 Episode Topics</p><p>• How password spraying still works at massive scale<br>• Why legacy test tenants and exceptions become the entry point<br>• Executive identity risk and the “convenience gap”<br>• What changes when the attacker is a nation state<br>• The trust question: what downstream organizations must assume</p><p>🧊 The aftershock</p><p>Microsoft later reported evidence that the actor was using exfiltrated information to pursue additional unauthorized access, including some source code repositories and internal systems, while stating it found no evidence that Microsoft-hosted customer-facing systems were compromised. <br>Microsoft</p><p>CISA also issued guidance on SVR / APT29 tradecraft for initial cloud access (AA24-057A) and an Emergency Directive tied to this compromise (ED 24-02). <br>CISA<br>+1</p><p>🧩 About The CISO Signal<br>True cybercrime storytelling with real CISO lessons. Subscribe so you never miss an investigation.<br>👉 / @thecisosignal<br>www.linkedin.com/company/the-ciso-signal</p><p><a href="https://www.youtube.com/hashtag/cisosignal">#CISOSignal</a> <a href="https://www.youtube.com/hashtag/microsoftbreach">#MicrosoftBreach</a> <a href="https://www.youtube.com/hashtag/midnightblizzard">#MidnightBlizzard</a> <a href="https://www.youtube.com/hashtag/apt29">#APT29</a> <a href="https://www.youtube.com/hashtag/nobelium">#NOBELIUM</a><br><a href="https://www.youtube.com/hashtag/cyberespionage">#CyberEspionage</a> <a href="https://www.youtube.com/hashtag/identitysecurity">#IdentitySecurity</a> <a href="https://www.youtube.com/hashtag/cloudsecurity">#CloudSecurity</a> <a href="https://www.youtube.com/hashtag/ciso">#CISO</a> <a href="https://www.youtube.com/hashtag/truecybercrime">#TrueCybercrime</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Midnight Blizzard, MidnightBlizzard, Microsoft breach, Microsoft, APT29, APT-29, Cozy Bear, NOBELIUM, SVR, Russia cyber, cyber espionage, Russian espionage, nation state attack, password spraying, password spray, email breach, executive email, identity breach, cloud security, Azure AD, identity security, incident response, CISO podcast, cybersecurity podcast, true cybercrime</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/eb4babd8/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>The HubSpot Hack | The SaaS Backdoor to Bitcoin - ft. Scott Kisser (CISO, Swan Bitcoin)</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>The HubSpot Hack | The SaaS Backdoor to Bitcoin - ft. Scott Kisser (CISO, Swan Bitcoin)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">152c2792-ec7c-4ec4-86ca-6b35391d06ce</guid>
      <link>https://TheCISOSignal.transistor.fm/s1/10</link>
      <description>
        <![CDATA[<p>The HubSpot Hack | The SaaS Backdoor to Bitcoin - ft. Scott Kisser (CISO, Swan Bitcoin)<br>When attackers breached HubSpot in March 2022, they weren’t after HubSpot at all.</p><p>They were after the customers of its customers.</p><p>Crypto firms like Trezor, BlockFi, and Swan Bitcoin suddenly saw their users targeted by near-perfect phishing emails designed to steal recovery seeds and drain wallets. And just weeks later, another SaaS provider, Klaviyo, was hit the same way. The message was clear:</p><p>You can defend your castle…<br>but attackers will go after the people guarding your gates.</p><p>This week on The CISO Signal | True Cybercrime Podcast, we dissect the SaaS-supply-chain breach that shook the crypto world and the coordinated response that stopped it from becoming a full-scale disaster.</p><p>🎙 Guest CISO Co-Host: Scott Kisser<br>Chief Information Security Officer – Swan Bitcoin<br>Former security leader at Salesforce, DocuSign, Amazon, and F5.</p><p>Scott takes us inside the incident response:<br>• How a single phished employee put the SaaS ecosystem at risk<br>• Why crypto companies were the downstream target<br>• The race to warn customers before attackers drained wallets<br>• How CISOs must rethink vendor access and trust assumptions<br>• Why no major funds were stolen — and why that victory matters</p><p>This wasn’t a tale of ransomware, it was a breach of trust.<br>And a reminder that SaaS is now part of every organization’s attack surface.</p><p>🔍 Episode Topics</p><ul><li>Vendor compromise → internal tool access → crypto user phishing<p></p></li><li>The human element behind SaaS security<p></p></li><li>What leadership communication looks like when trust is shaken<p></p></li><li>The new rules of defending against third-party attack vectors<p></p></li></ul><p><br>🏴‍☠️ Key Players<br>• HubSpot — initial breach vector<br>• Klaviyo — second SaaS compromise<br>• Trezor &amp; Swan Bitcoin — downstream targets<br>• Crypto customers — the true victims<br>• CISOs — left to restore confidence &amp; reshape strategy</p><p>💡 Takeaway for CISOs<br>“You’re only as strong as the SaaS identities you can’t see.”</p><p>🧩 About The CISO Signal<br>Hollywood-style storytelling meets real cybersecurity lessons.<br>Every episode, CISOs break down the world’s most notorious cyberattacks — what happened, what broke, and what must change.</p><p>Subscribe &amp; ring the bell so you never miss an investigation. 🛎️<br>👉 <a href="https://www.youtube.com/channel/UCmXu5LO2OwyFH1yQ02PD-Ew">  </a><a href="https://www.youtube.com/channel/UCmXu5LO2OwyFH1yQ02PD-Ew"></a><a href="https://www.youtube.com/channel/UCmXu5LO2OwyFH1yQ02PD-Ew"> / @thecisosignal  </a></p><p>📣 Connect with Us<br>🌐 Website: thecisosignal.transistor.fm<br>🔗 LinkedIn: linkedin.com/company/the-ciso-signal<br>Subscribe &amp; share to stay ahead of the world’s most sophisticated cyber threats.</p><p><br>🔥 Hashtags<br><a href="https://www.youtube.com/hashtag/cisosignal">#CISOSignal</a> <a href="https://www.youtube.com/hashtag/hubspotbreach">#HubSpotBreach</a> <a href="https://www.youtube.com/hashtag/klaviyo">#Klaviyo</a> <a href="https://www.youtube.com/hashtag/saassecurity">#SaaSSecurity</a> <a href="https://www.youtube.com/hashtag/cryptosecurity">#CryptoSecurity</a> <a href="https://www.youtube.com/hashtag/supplychainattack">#SupplyChainAttack</a> <a href="https://www.youtube.com/hashtag/socialengineering">#SocialEngineering</a> <a href="https://www.youtube.com/hashtag/phishing">#Phishing</a> <a href="https://www.youtube.com/hashtag/securitypodcast">#SecurityPodcast</a> <a href="https://www.youtube.com/hashtag/truecybercrime">#TrueCybercrime</a> <a href="https://www.youtube.com/hashtag/scottkisser">#ScottKisser</a> <a href="https://www.youtube.com/hashtag/swanbitcoin">#SwanBitcoin</a> <a href="https://www.youtube.com/hashtag/trezor">#Trezor</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The HubSpot Hack | The SaaS Backdoor to Bitcoin - ft. Scott Kisser (CISO, Swan Bitcoin)<br>When attackers breached HubSpot in March 2022, they weren’t after HubSpot at all.</p><p>They were after the customers of its customers.</p><p>Crypto firms like Trezor, BlockFi, and Swan Bitcoin suddenly saw their users targeted by near-perfect phishing emails designed to steal recovery seeds and drain wallets. And just weeks later, another SaaS provider, Klaviyo, was hit the same way. The message was clear:</p><p>You can defend your castle…<br>but attackers will go after the people guarding your gates.</p><p>This week on The CISO Signal | True Cybercrime Podcast, we dissect the SaaS-supply-chain breach that shook the crypto world and the coordinated response that stopped it from becoming a full-scale disaster.</p><p>🎙 Guest CISO Co-Host: Scott Kisser<br>Chief Information Security Officer – Swan Bitcoin<br>Former security leader at Salesforce, DocuSign, Amazon, and F5.</p><p>Scott takes us inside the incident response:<br>• How a single phished employee put the SaaS ecosystem at risk<br>• Why crypto companies were the downstream target<br>• The race to warn customers before attackers drained wallets<br>• How CISOs must rethink vendor access and trust assumptions<br>• Why no major funds were stolen — and why that victory matters</p><p>This wasn’t a tale of ransomware, it was a breach of trust.<br>And a reminder that SaaS is now part of every organization’s attack surface.</p><p>🔍 Episode Topics</p><ul><li>Vendor compromise → internal tool access → crypto user phishing<p></p></li><li>The human element behind SaaS security<p></p></li><li>What leadership communication looks like when trust is shaken<p></p></li><li>The new rules of defending against third-party attack vectors<p></p></li></ul><p><br>🏴‍☠️ Key Players<br>• HubSpot — initial breach vector<br>• Klaviyo — second SaaS compromise<br>• Trezor &amp; Swan Bitcoin — downstream targets<br>• Crypto customers — the true victims<br>• CISOs — left to restore confidence &amp; reshape strategy</p><p>💡 Takeaway for CISOs<br>“You’re only as strong as the SaaS identities you can’t see.”</p><p>🧩 About The CISO Signal<br>Hollywood-style storytelling meets real cybersecurity lessons.<br>Every episode, CISOs break down the world’s most notorious cyberattacks — what happened, what broke, and what must change.</p><p>Subscribe &amp; ring the bell so you never miss an investigation. 🛎️<br>👉 <a href="https://www.youtube.com/channel/UCmXu5LO2OwyFH1yQ02PD-Ew">  </a><a href="https://www.youtube.com/channel/UCmXu5LO2OwyFH1yQ02PD-Ew"></a><a href="https://www.youtube.com/channel/UCmXu5LO2OwyFH1yQ02PD-Ew"> / @thecisosignal  </a></p><p>📣 Connect with Us<br>🌐 Website: thecisosignal.transistor.fm<br>🔗 LinkedIn: linkedin.com/company/the-ciso-signal<br>Subscribe &amp; share to stay ahead of the world’s most sophisticated cyber threats.</p><p><br>🔥 Hashtags<br><a href="https://www.youtube.com/hashtag/cisosignal">#CISOSignal</a> <a href="https://www.youtube.com/hashtag/hubspotbreach">#HubSpotBreach</a> <a href="https://www.youtube.com/hashtag/klaviyo">#Klaviyo</a> <a href="https://www.youtube.com/hashtag/saassecurity">#SaaSSecurity</a> <a href="https://www.youtube.com/hashtag/cryptosecurity">#CryptoSecurity</a> <a href="https://www.youtube.com/hashtag/supplychainattack">#SupplyChainAttack</a> <a href="https://www.youtube.com/hashtag/socialengineering">#SocialEngineering</a> <a href="https://www.youtube.com/hashtag/phishing">#Phishing</a> <a href="https://www.youtube.com/hashtag/securitypodcast">#SecurityPodcast</a> <a href="https://www.youtube.com/hashtag/truecybercrime">#TrueCybercrime</a> <a href="https://www.youtube.com/hashtag/scottkisser">#ScottKisser</a> <a href="https://www.youtube.com/hashtag/swanbitcoin">#SwanBitcoin</a> <a href="https://www.youtube.com/hashtag/trezor">#Trezor</a></p>]]>
      </content:encoded>
      <pubDate>Sat, 06 Dec 2025 23:42:28 -0800</pubDate>
      <author>Jeremy Ladner</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/prfx.byspotify.com/e/media.transistor.fm/bff15767/3b335d42.mp3" length="44551638" type="audio/mpeg"/>
      <itunes:author>Jeremy Ladner</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/tJAUF1DXy9ENMixvrnLRQCKlcFjqyl64HJR4H1LnG7E/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kZGNl/N2EyYzUzODVlZWVj/NjIwYTYyZGE4NDVj/YzBhZS5qcGc.jpg"/>
      <itunes:duration>1814</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The HubSpot Hack | The SaaS Backdoor to Bitcoin - ft. Scott Kisser (CISO, Swan Bitcoin)<br>When attackers breached HubSpot in March 2022, they weren’t after HubSpot at all.</p><p>They were after the customers of its customers.</p><p>Crypto firms like Trezor, BlockFi, and Swan Bitcoin suddenly saw their users targeted by near-perfect phishing emails designed to steal recovery seeds and drain wallets. And just weeks later, another SaaS provider, Klaviyo, was hit the same way. The message was clear:</p><p>You can defend your castle…<br>but attackers will go after the people guarding your gates.</p><p>This week on The CISO Signal | True Cybercrime Podcast, we dissect the SaaS-supply-chain breach that shook the crypto world and the coordinated response that stopped it from becoming a full-scale disaster.</p><p>🎙 Guest CISO Co-Host: Scott Kisser<br>Chief Information Security Officer – Swan Bitcoin<br>Former security leader at Salesforce, DocuSign, Amazon, and F5.</p><p>Scott takes us inside the incident response:<br>• How a single phished employee put the SaaS ecosystem at risk<br>• Why crypto companies were the downstream target<br>• The race to warn customers before attackers drained wallets<br>• How CISOs must rethink vendor access and trust assumptions<br>• Why no major funds were stolen — and why that victory matters</p><p>This wasn’t a tale of ransomware, it was a breach of trust.<br>And a reminder that SaaS is now part of every organization’s attack surface.</p><p>🔍 Episode Topics</p><ul><li>Vendor compromise → internal tool access → crypto user phishing<p></p></li><li>The human element behind SaaS security<p></p></li><li>What leadership communication looks like when trust is shaken<p></p></li><li>The new rules of defending against third-party attack vectors<p></p></li></ul><p><br>🏴‍☠️ Key Players<br>• HubSpot — initial breach vector<br>• Klaviyo — second SaaS compromise<br>• Trezor &amp; Swan Bitcoin — downstream targets<br>• Crypto customers — the true victims<br>• CISOs — left to restore confidence &amp; reshape strategy</p><p>💡 Takeaway for CISOs<br>“You’re only as strong as the SaaS identities you can’t see.”</p><p>🧩 About The CISO Signal<br>Hollywood-style storytelling meets real cybersecurity lessons.<br>Every episode, CISOs break down the world’s most notorious cyberattacks — what happened, what broke, and what must change.</p><p>Subscribe &amp; ring the bell so you never miss an investigation. 🛎️<br>👉 <a href="https://www.youtube.com/channel/UCmXu5LO2OwyFH1yQ02PD-Ew">  </a><a href="https://www.youtube.com/channel/UCmXu5LO2OwyFH1yQ02PD-Ew"></a><a href="https://www.youtube.com/channel/UCmXu5LO2OwyFH1yQ02PD-Ew"> / @thecisosignal  </a></p><p>📣 Connect with Us<br>🌐 Website: thecisosignal.transistor.fm<br>🔗 LinkedIn: linkedin.com/company/the-ciso-signal<br>Subscribe &amp; share to stay ahead of the world’s most sophisticated cyber threats.</p><p><br>🔥 Hashtags<br><a href="https://www.youtube.com/hashtag/cisosignal">#CISOSignal</a> <a href="https://www.youtube.com/hashtag/hubspotbreach">#HubSpotBreach</a> <a href="https://www.youtube.com/hashtag/klaviyo">#Klaviyo</a> <a href="https://www.youtube.com/hashtag/saassecurity">#SaaSSecurity</a> <a href="https://www.youtube.com/hashtag/cryptosecurity">#CryptoSecurity</a> <a href="https://www.youtube.com/hashtag/supplychainattack">#SupplyChainAttack</a> <a href="https://www.youtube.com/hashtag/socialengineering">#SocialEngineering</a> <a href="https://www.youtube.com/hashtag/phishing">#Phishing</a> <a href="https://www.youtube.com/hashtag/securitypodcast">#SecurityPodcast</a> <a href="https://www.youtube.com/hashtag/truecybercrime">#TrueCybercrime</a> <a href="https://www.youtube.com/hashtag/scottkisser">#ScottKisser</a> <a href="https://www.youtube.com/hashtag/swanbitcoin">#SwanBitcoin</a> <a href="https://www.youtube.com/hashtag/trezor">#Trezor</a></p>]]>
      </itunes:summary>
      <itunes:keywords>CISO, cybersecurity podcast, true cybercrime, information security, cybercrime podcast, breach analysis, infosec, security leadership, nation-state attacks, supply chain attack, cyber threat intelligence, digital espionage, insider threat, red team, blue team, zero trust, CISSP, incident response, cyber risk, cyber defense, ransomware, ethical hacking, penetration testing, cyberattack case studies, threat actors, cybersecurity storytelling, SOC, threat detection, CISOs in tech, cyber strategy, security operations, cyber awareness, real-world breaches, cybercrime stories, critical infrastructure security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bff15767/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>The Okta HAR Hijacking</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>The Okta HAR Hijacking</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ed25fe8e-6fc1-48e8-a9d4-759df5736efa</guid>
      <link>https://TheCISOSignal.transistor.fm/s1/9</link>
      <description>
        <![CDATA[<p>In late 2023, the world’s most trusted identity provider experienced the kind of breach it was designed to prevent. Attackers quietly infiltrated Okta’s customer support system, stole session tokens hidden inside HAR files and used them to impersonate users across some of the most secure organizations on earth.</p><p>For two full weeks, the intruders operated in silence. No alerts. No red flags. No detection.</p><p>When the truth came out, it wasn't just a security incident, it was a crisis of trust in the infrastructure that underpins modern authentication.<br>How did a company synonymous with identity become a cautionary tale? What does this breach reveal about session tokens as the new crown jewels, third-party risk, and the blind spots that even top-tier security teams can miss? And what lessons does every CISO need to take from the Okta compromise before history repeats itself?</p><p>In this episode of The CISO Signal: True Cybercrime Podcast, host Jeremy Ladner is joined by Oren Zenescu, CISO at Plarium, to break down every layer of the Okta breach, from the silent entry and token theft to the fallout across the cybersecurity community and what it means for the future of identity security.</p><p>💡 In this episode, we discuss:<br>🔹 How attackers harvested HAR files and hijacked live session tokens<br>🔹 Why session tokens are becoming the primary target for modern attackers<br>🔹 The two-week detection delay and what it says about support system security<br>🔹 What the Okta breach means for zero trust, vendor reliance, and third-party risk<br>🔹 Lessons CISOs must take from Okta’s incident history Lapsus$, source code theft, and beyond</p><p>🎙 Featured Guest<br>Oren Zenescu | Global CISO at Plarium<br>Member of Team8 CISO Village, with 15+ years of enterprise security leadership across finance, gaming, and global tech.</p><p>Follow The CISO Signal<br>🌐 Website: thecisosignal.transistor.fm<br>🔗 LinkedIn: linkedin.com/company/the-ciso-signal<br>Subscribe &amp; share to stay ahead of the world’s most sophisticated cyber threats.</p><p><a href="https://www.youtube.com/hashtag/cybersecurity">#CyberSecurity</a> <a href="https://www.youtube.com/hashtag/oktabreach">#OktaBreach</a> <a href="https://www.youtube.com/hashtag/identitysecurity">#IdentitySecurity</a> <a href="https://www.youtube.com/hashtag/tokenhijacking">#TokenHijacking</a> <a href="https://www.youtube.com/hashtag/zerotrust">#ZeroTrust</a> <a href="https://www.youtube.com/hashtag/ciso">#CISO</a> <a href="https://www.youtube.com/hashtag/incidentresponse">#IncidentResponse</a> <a href="https://www.youtube.com/hashtag/supplychainsecurity">#SupplyChainSecurity</a> <a href="https://www.youtube.com/hashtag/cybercrime">#CyberCrime</a> <a href="https://www.youtube.com/hashtag/thecisosignal">#TheCisoSignal</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In late 2023, the world’s most trusted identity provider experienced the kind of breach it was designed to prevent. Attackers quietly infiltrated Okta’s customer support system, stole session tokens hidden inside HAR files and used them to impersonate users across some of the most secure organizations on earth.</p><p>For two full weeks, the intruders operated in silence. No alerts. No red flags. No detection.</p><p>When the truth came out, it wasn't just a security incident, it was a crisis of trust in the infrastructure that underpins modern authentication.<br>How did a company synonymous with identity become a cautionary tale? What does this breach reveal about session tokens as the new crown jewels, third-party risk, and the blind spots that even top-tier security teams can miss? And what lessons does every CISO need to take from the Okta compromise before history repeats itself?</p><p>In this episode of The CISO Signal: True Cybercrime Podcast, host Jeremy Ladner is joined by Oren Zenescu, CISO at Plarium, to break down every layer of the Okta breach, from the silent entry and token theft to the fallout across the cybersecurity community and what it means for the future of identity security.</p><p>💡 In this episode, we discuss:<br>🔹 How attackers harvested HAR files and hijacked live session tokens<br>🔹 Why session tokens are becoming the primary target for modern attackers<br>🔹 The two-week detection delay and what it says about support system security<br>🔹 What the Okta breach means for zero trust, vendor reliance, and third-party risk<br>🔹 Lessons CISOs must take from Okta’s incident history Lapsus$, source code theft, and beyond</p><p>🎙 Featured Guest<br>Oren Zenescu | Global CISO at Plarium<br>Member of Team8 CISO Village, with 15+ years of enterprise security leadership across finance, gaming, and global tech.</p><p>Follow The CISO Signal<br>🌐 Website: thecisosignal.transistor.fm<br>🔗 LinkedIn: linkedin.com/company/the-ciso-signal<br>Subscribe &amp; share to stay ahead of the world’s most sophisticated cyber threats.</p><p><a href="https://www.youtube.com/hashtag/cybersecurity">#CyberSecurity</a> <a href="https://www.youtube.com/hashtag/oktabreach">#OktaBreach</a> <a href="https://www.youtube.com/hashtag/identitysecurity">#IdentitySecurity</a> <a href="https://www.youtube.com/hashtag/tokenhijacking">#TokenHijacking</a> <a href="https://www.youtube.com/hashtag/zerotrust">#ZeroTrust</a> <a href="https://www.youtube.com/hashtag/ciso">#CISO</a> <a href="https://www.youtube.com/hashtag/incidentresponse">#IncidentResponse</a> <a href="https://www.youtube.com/hashtag/supplychainsecurity">#SupplyChainSecurity</a> <a href="https://www.youtube.com/hashtag/cybercrime">#CyberCrime</a> <a href="https://www.youtube.com/hashtag/thecisosignal">#TheCisoSignal</a></p>]]>
      </content:encoded>
      <pubDate>Sat, 06 Dec 2025 23:29:55 -0800</pubDate>
      <author>Jeremy Ladner</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/prfx.byspotify.com/e/media.transistor.fm/bb3ceb1b/bbee7791.mp3" length="43080193" type="audio/mpeg"/>
      <itunes:author>Jeremy Ladner</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/_yaWwM9ePJoNajzJEnsFG7RQMqq7RYpQuCJXpSBT6aA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85Y2Ri/ZWRhNzY5ODIzMDU4/MTIwMGJjMDJiMGZm/ZTE3Yy5qcGc.jpg"/>
      <itunes:duration>1774</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In late 2023, the world’s most trusted identity provider experienced the kind of breach it was designed to prevent. Attackers quietly infiltrated Okta’s customer support system, stole session tokens hidden inside HAR files and used them to impersonate users across some of the most secure organizations on earth.</p><p>For two full weeks, the intruders operated in silence. No alerts. No red flags. No detection.</p><p>When the truth came out, it wasn't just a security incident, it was a crisis of trust in the infrastructure that underpins modern authentication.<br>How did a company synonymous with identity become a cautionary tale? What does this breach reveal about session tokens as the new crown jewels, third-party risk, and the blind spots that even top-tier security teams can miss? And what lessons does every CISO need to take from the Okta compromise before history repeats itself?</p><p>In this episode of The CISO Signal: True Cybercrime Podcast, host Jeremy Ladner is joined by Oren Zenescu, CISO at Plarium, to break down every layer of the Okta breach, from the silent entry and token theft to the fallout across the cybersecurity community and what it means for the future of identity security.</p><p>💡 In this episode, we discuss:<br>🔹 How attackers harvested HAR files and hijacked live session tokens<br>🔹 Why session tokens are becoming the primary target for modern attackers<br>🔹 The two-week detection delay and what it says about support system security<br>🔹 What the Okta breach means for zero trust, vendor reliance, and third-party risk<br>🔹 Lessons CISOs must take from Okta’s incident history Lapsus$, source code theft, and beyond</p><p>🎙 Featured Guest<br>Oren Zenescu | Global CISO at Plarium<br>Member of Team8 CISO Village, with 15+ years of enterprise security leadership across finance, gaming, and global tech.</p><p>Follow The CISO Signal<br>🌐 Website: thecisosignal.transistor.fm<br>🔗 LinkedIn: linkedin.com/company/the-ciso-signal<br>Subscribe &amp; share to stay ahead of the world’s most sophisticated cyber threats.</p><p><a href="https://www.youtube.com/hashtag/cybersecurity">#CyberSecurity</a> <a href="https://www.youtube.com/hashtag/oktabreach">#OktaBreach</a> <a href="https://www.youtube.com/hashtag/identitysecurity">#IdentitySecurity</a> <a href="https://www.youtube.com/hashtag/tokenhijacking">#TokenHijacking</a> <a href="https://www.youtube.com/hashtag/zerotrust">#ZeroTrust</a> <a href="https://www.youtube.com/hashtag/ciso">#CISO</a> <a href="https://www.youtube.com/hashtag/incidentresponse">#IncidentResponse</a> <a href="https://www.youtube.com/hashtag/supplychainsecurity">#SupplyChainSecurity</a> <a href="https://www.youtube.com/hashtag/cybercrime">#CyberCrime</a> <a href="https://www.youtube.com/hashtag/thecisosignal">#TheCisoSignal</a></p>]]>
      </itunes:summary>
      <itunes:keywords>CISO, cybersecurity podcast, true cybercrime, information security, cybercrime podcast, breach analysis, infosec, security leadership, nation-state attacks, supply chain attack, cyber threat intelligence, digital espionage, insider threat, red team, blue team, zero trust, CISSP, incident response, cyber risk, cyber defense, ransomware, ethical hacking, penetration testing, cyberattack case studies, threat actors, cybersecurity storytelling, SOC, threat detection, CISOs in tech, cyber strategy, security operations, cyber awareness, real-world breaches, cybercrime stories, critical infrastructure security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bb3ceb1b/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>The $610 Million Poly Network Hack: The Greatest Heist That Never Was</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>The $610 Million Poly Network Hack: The Greatest Heist That Never Was</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0f228f39-44b3-4bea-afae-47c044892a08</guid>
      <link>https://TheCISOSignal.transistor.fm/s1/8</link>
      <description>
        <![CDATA[<p><strong>The $610 Million Poly Network Hack: The Greatest Heist That Never Was</strong></p><p>In one of the most shocking moments in crypto history, a lone hacker exploited a vulnerability in Poly Network’s cross-chain protocol—draining <strong>over $610 million in digital assets</strong> across Ethereum, Binance Smart Chain, and Polygon.</p><p>Then, in a twist no one saw coming… <strong>they gave it all back.</strong></p><p>Was it a white-hat test gone wrong? A hacker with a conscience? Or a sophisticated cover-up by an insider? To this day, <strong>the attacker’s true identity remains a mystery</strong>—and the world is still searching for answers.</p><p>In this episode of <em>The CISO Signal: True Cybercrime Podcast</em>, host <strong>Jeremy Ladner</strong> is joined by <strong>Christopher Russell</strong>, CISO at <strong>tZERO Group</strong>, to dissect the technical brilliance, psychological intrigue, and geopolitical implications of what might be <strong>the largest digital heist in history</strong>—and the most bizarre ending cybersecurity has ever seen.</p><p>💡 <strong>In this episode, we discuss:</strong><br> 🔹 How a flaw in Poly Network’s cross-chain manager enabled the $610M exploit<br> 🔹 Why the hacker chose to return every stolen token<br> 🔹 The role of decentralized finance (DeFi) in enabling modern cybercrime<br> 🔹 What CISOs can learn from the blockchain’s weakest link<br> 🔹 Why attribution in crypto attacks remains nearly impossible</p><p>Follow <strong>The CISO Signal</strong>:<br> 🌐 Website: <a href="https://www.thecisosignal.transistor.fm">www.thecisosignal.transistor.fm</a></p><p> 🔗 LinkedIn: <a href="https://www.linkedin.com/company/the-ciso-signal">www.linkedin.com/company/the-ciso-signal</a></p><p>Don’t forget to like, subscribe, and share — to stay ahead of the world’s most sophisticated cyberattacks.</p><p>#CyberSecurity #CryptoHack #PolyNetwork #DeFi #BlockchainSecurity #CISO #TheCisoSignal #CyberCrime #CryptoHeist</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>The $610 Million Poly Network Hack: The Greatest Heist That Never Was</strong></p><p>In one of the most shocking moments in crypto history, a lone hacker exploited a vulnerability in Poly Network’s cross-chain protocol—draining <strong>over $610 million in digital assets</strong> across Ethereum, Binance Smart Chain, and Polygon.</p><p>Then, in a twist no one saw coming… <strong>they gave it all back.</strong></p><p>Was it a white-hat test gone wrong? A hacker with a conscience? Or a sophisticated cover-up by an insider? To this day, <strong>the attacker’s true identity remains a mystery</strong>—and the world is still searching for answers.</p><p>In this episode of <em>The CISO Signal: True Cybercrime Podcast</em>, host <strong>Jeremy Ladner</strong> is joined by <strong>Christopher Russell</strong>, CISO at <strong>tZERO Group</strong>, to dissect the technical brilliance, psychological intrigue, and geopolitical implications of what might be <strong>the largest digital heist in history</strong>—and the most bizarre ending cybersecurity has ever seen.</p><p>💡 <strong>In this episode, we discuss:</strong><br> 🔹 How a flaw in Poly Network’s cross-chain manager enabled the $610M exploit<br> 🔹 Why the hacker chose to return every stolen token<br> 🔹 The role of decentralized finance (DeFi) in enabling modern cybercrime<br> 🔹 What CISOs can learn from the blockchain’s weakest link<br> 🔹 Why attribution in crypto attacks remains nearly impossible</p><p>Follow <strong>The CISO Signal</strong>:<br> 🌐 Website: <a href="https://www.thecisosignal.transistor.fm">www.thecisosignal.transistor.fm</a></p><p> 🔗 LinkedIn: <a href="https://www.linkedin.com/company/the-ciso-signal">www.linkedin.com/company/the-ciso-signal</a></p><p>Don’t forget to like, subscribe, and share — to stay ahead of the world’s most sophisticated cyberattacks.</p><p>#CyberSecurity #CryptoHack #PolyNetwork #DeFi #BlockchainSecurity #CISO #TheCisoSignal #CyberCrime #CryptoHeist</p>]]>
      </content:encoded>
      <pubDate>Mon, 27 Oct 2025 00:33:37 -0700</pubDate>
      <author>Jeremy Ladner</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/prfx.byspotify.com/e/media.transistor.fm/cdf5f558/af12ca67.mp3" length="47984966" type="audio/mpeg"/>
      <itunes:author>Jeremy Ladner</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/DHxUtJzKecGtZdVBQsBKgpKx4gvo8CtGJuy0gOle7Pw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82MDg2/YTA5M2MwZDUwN2Rm/NmI4YjUyMTg4Nzlj/NTdhNS5qcGc.jpg"/>
      <itunes:duration>1972</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>The $610 Million Poly Network Hack: The Greatest Heist That Never Was</strong></p><p>In one of the most shocking moments in crypto history, a lone hacker exploited a vulnerability in Poly Network’s cross-chain protocol—draining <strong>over $610 million in digital assets</strong> across Ethereum, Binance Smart Chain, and Polygon.</p><p>Then, in a twist no one saw coming… <strong>they gave it all back.</strong></p><p>Was it a white-hat test gone wrong? A hacker with a conscience? Or a sophisticated cover-up by an insider? To this day, <strong>the attacker’s true identity remains a mystery</strong>—and the world is still searching for answers.</p><p>In this episode of <em>The CISO Signal: True Cybercrime Podcast</em>, host <strong>Jeremy Ladner</strong> is joined by <strong>Christopher Russell</strong>, CISO at <strong>tZERO Group</strong>, to dissect the technical brilliance, psychological intrigue, and geopolitical implications of what might be <strong>the largest digital heist in history</strong>—and the most bizarre ending cybersecurity has ever seen.</p><p>💡 <strong>In this episode, we discuss:</strong><br> 🔹 How a flaw in Poly Network’s cross-chain manager enabled the $610M exploit<br> 🔹 Why the hacker chose to return every stolen token<br> 🔹 The role of decentralized finance (DeFi) in enabling modern cybercrime<br> 🔹 What CISOs can learn from the blockchain’s weakest link<br> 🔹 Why attribution in crypto attacks remains nearly impossible</p><p>Follow <strong>The CISO Signal</strong>:<br> 🌐 Website: <a href="https://www.thecisosignal.transistor.fm">www.thecisosignal.transistor.fm</a></p><p> 🔗 LinkedIn: <a href="https://www.linkedin.com/company/the-ciso-signal">www.linkedin.com/company/the-ciso-signal</a></p><p>Don’t forget to like, subscribe, and share — to stay ahead of the world’s most sophisticated cyberattacks.</p><p>#CyberSecurity #CryptoHack #PolyNetwork #DeFi #BlockchainSecurity #CISO #TheCisoSignal #CyberCrime #CryptoHeist</p>]]>
      </itunes:summary>
      <itunes:keywords>Poly Network Hack, Poly Network, $610 Million Hack, Biggest Crypto Heist, Crypto Hack, DeFi Hack, Blockchain Security, Cross Chain Exploit, Cryptocurrency Hack, Poly Network Exploit, Hacker Returns Funds, Crypto Theft, Cybersecurity, The CISO Signal, True Cybercrime Podcast, Christopher Russell, tZERO Group, Jeremy Ladner, Cyber Heist, Crypto Security, Web3 Security, Smart Contract Vulnerability, CISO, Cybercrime, Blockchain Hack, DeFi Exploit, Cyber Attack, Hacker Mystery, Cryptocurrency Security, Poly Network Hacker</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/cdf5f558/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>The $25 Million Arup Deepfake: AI's Most Convincing Con</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>The $25 Million Arup Deepfake: AI's Most Convincing Con</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1767a057-721b-4d2b-bc77-49b50fa8e345</guid>
      <link>https://TheCISOSignal.transistor.fm/s1/7</link>
      <description>
        <![CDATA[<p>The $25 Million Arup Deepfake: AI's Most Convincing Con</p><p>In a world where AI can mimic voices and faces perfectly, even the most secure companies can fall victim. The Arup Deepfake Hack shocked the corporate world when attackers used AI-generated video of the company’s CFO to trick an employee into wiring $25 million to a fraudulent account.</p><p>This was not just another phishing attempt, it was a sophisticated manipulation that blurred the line between reality and digital deception. The incident highlights how AI-driven attacks are evolving and why every cybersecurity leader must rethink traditional defense strategies.</p><p>In this episode of The CISO Signal: True Cybercrime Podcast, host Jeremy Ladner is joined by Mark Dorsi, CISO at Netlify, to break down one of the most alarming corporate scams of our time. Mark brings decades of experience building security programs for high-growth technology organizations, including HelloSign, Cloud Lending Solutions, and Qualys, and now leads security at Netlify. Together, they unpack how the deepfake attack happened, why traditional security controls failed, and what actionable steps leaders can take to protect their organizations from AI-powered social engineering.</p><p>💡 In this episode, we discuss:<br>🔹 How attackers used AI and a video conference to impersonate the CFO<br>🔹 The psychological tactics behind the $25 million wire transfer<br>🔹 Why traditional security measures were not enough to prevent the attack<br>🔹 Emerging strategies to defend against deepfake and AI-driven threats<br>🔹 Key lessons every CISO can use to strengthen their security posture</p><p>Follow The CISO Signal:<br>🌐 Website: www.thecisosignal.transistor.fm</p><p>🔗 LinkedIn: www.linkedin.com/company/the-ciso-signal</p><p>Don’t forget to like, subscribe, and share to stay ahead of the world’s most sophisticated cyberattacks.</p><p>#Cybersecurity #DeepfakeHack #ArupHack #CISO #TheCisoSignal #AIThreats #CyberCrime</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The $25 Million Arup Deepfake: AI's Most Convincing Con</p><p>In a world where AI can mimic voices and faces perfectly, even the most secure companies can fall victim. The Arup Deepfake Hack shocked the corporate world when attackers used AI-generated video of the company’s CFO to trick an employee into wiring $25 million to a fraudulent account.</p><p>This was not just another phishing attempt, it was a sophisticated manipulation that blurred the line between reality and digital deception. The incident highlights how AI-driven attacks are evolving and why every cybersecurity leader must rethink traditional defense strategies.</p><p>In this episode of The CISO Signal: True Cybercrime Podcast, host Jeremy Ladner is joined by Mark Dorsi, CISO at Netlify, to break down one of the most alarming corporate scams of our time. Mark brings decades of experience building security programs for high-growth technology organizations, including HelloSign, Cloud Lending Solutions, and Qualys, and now leads security at Netlify. Together, they unpack how the deepfake attack happened, why traditional security controls failed, and what actionable steps leaders can take to protect their organizations from AI-powered social engineering.</p><p>💡 In this episode, we discuss:<br>🔹 How attackers used AI and a video conference to impersonate the CFO<br>🔹 The psychological tactics behind the $25 million wire transfer<br>🔹 Why traditional security measures were not enough to prevent the attack<br>🔹 Emerging strategies to defend against deepfake and AI-driven threats<br>🔹 Key lessons every CISO can use to strengthen their security posture</p><p>Follow The CISO Signal:<br>🌐 Website: www.thecisosignal.transistor.fm</p><p>🔗 LinkedIn: www.linkedin.com/company/the-ciso-signal</p><p>Don’t forget to like, subscribe, and share to stay ahead of the world’s most sophisticated cyberattacks.</p><p>#Cybersecurity #DeepfakeHack #ArupHack #CISO #TheCisoSignal #AIThreats #CyberCrime</p>]]>
      </content:encoded>
      <pubDate>Mon, 13 Oct 2025 05:56:46 -0700</pubDate>
      <author>Jeremy Ladner</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/prfx.byspotify.com/e/media.transistor.fm/723c25e3/bf1f8abd.mp3" length="59282474" type="audio/mpeg"/>
      <itunes:author>Jeremy Ladner</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/N-9qBp3VJcCBKqJ9oBF3xXVw5l-E3jxMqjbcpYAKkOk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YmJm/Y2QxN2I0NmY1YmU2/YTA3NGFhNTk0YTg3/NTgzZS5qcGc.jpg"/>
      <itunes:duration>2449</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The $25 Million Arup Deepfake: AI's Most Convincing Con</p><p>In a world where AI can mimic voices and faces perfectly, even the most secure companies can fall victim. The Arup Deepfake Hack shocked the corporate world when attackers used AI-generated video of the company’s CFO to trick an employee into wiring $25 million to a fraudulent account.</p><p>This was not just another phishing attempt, it was a sophisticated manipulation that blurred the line between reality and digital deception. The incident highlights how AI-driven attacks are evolving and why every cybersecurity leader must rethink traditional defense strategies.</p><p>In this episode of The CISO Signal: True Cybercrime Podcast, host Jeremy Ladner is joined by Mark Dorsi, CISO at Netlify, to break down one of the most alarming corporate scams of our time. Mark brings decades of experience building security programs for high-growth technology organizations, including HelloSign, Cloud Lending Solutions, and Qualys, and now leads security at Netlify. Together, they unpack how the deepfake attack happened, why traditional security controls failed, and what actionable steps leaders can take to protect their organizations from AI-powered social engineering.</p><p>💡 In this episode, we discuss:<br>🔹 How attackers used AI and a video conference to impersonate the CFO<br>🔹 The psychological tactics behind the $25 million wire transfer<br>🔹 Why traditional security measures were not enough to prevent the attack<br>🔹 Emerging strategies to defend against deepfake and AI-driven threats<br>🔹 Key lessons every CISO can use to strengthen their security posture</p><p>Follow The CISO Signal:<br>🌐 Website: www.thecisosignal.transistor.fm</p><p>🔗 LinkedIn: www.linkedin.com/company/the-ciso-signal</p><p>Don’t forget to like, subscribe, and share to stay ahead of the world’s most sophisticated cyberattacks.</p><p>#Cybersecurity #DeepfakeHack #ArupHack #CISO #TheCisoSignal #AIThreats #CyberCrime</p>]]>
      </itunes:summary>
      <itunes:keywords>Arup deepfake, AI deepfake, deepfake hack, corporate cybercrime, $25 million scam, AI fraud, CFO impersonation, video conference scam, AI phishing, corporate fraud, cybersecurity podcast, CISO podcast, AI cyberattack, deepfake social engineering, wire transfer fraud, cybersecurity lessons, enterprise security, corporate scam, AI-driven attack, Mark Dorsi, Netlify, The CISO Signal, cybercrime investigation, AI deception, high-profile hack</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/723c25e3/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>The Sony Hollywood Hack | How Cybercrime Turned A Blockbuster Comedy Into A Global News Story</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>The Sony Hollywood Hack | How Cybercrime Turned A Blockbuster Comedy Into A Global News Story</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f5b82e40-4674-4979-8479-56d99ae9cf7d</guid>
      <link>https://TheCISOSignal.transistor.fm/s1/6</link>
      <description>
        <![CDATA[<p>THE SONY HACK: HOLLYWOOD, NORTH KOREA &amp; THE CYBER WAR THAT CHANGED EVERYTHING<br>In 2014, Sony Pictures became ground zero for the first major nation-state cyberattack on a global corporation. The “Guardians of Peace,” linked to North Korea, crippled Sony’s networks, leaked unreleased films, and exposed troves of executive emails that forced high-level resignations. At the center of it all: The Interview, a comedy starring Seth Rogen and James Franco about a CIA plot to kill Kim Jong-un.</p><p>What started as a movie scandal quickly escalated into an international incident and a turning point for every CISO and cybersecurity leader. The Sony Hack showed the world how geopolitics, culture, and cyber warfare could collide in ways that devastate private companies.</p><p>In this episode of THE CISO SIGNAL: TRUE CYBERCRIME PODCAST, host Jeremy Ladner takes you inside the breach that changed corporate security forever. We unpack how Sony responded under pressure, why their crisis management is still debated a decade later, and what today’s security leaders must learn to defend against state-sponsored threats.</p><p>💡 IN THIS EPISODE, WE DISCUSS:<br>👉 How The Interview triggered a nation-state cyberattack<br>🔹 The impact of leaked emails and unreleased Sony films<br>⚠️ Why Sony’s response became a leadership case study<br>🛡️ How the Sony Hack reshaped global cybersecurity strategy<br>📈 Actionable CISO lessons for preparing against nation-state adversaries</p><p>🎙️ ABOUT OUR GUEST:<br>Dror Hevlin — VP Security &amp; CISO at Cynomi. With 20+ years in defense, critical infrastructure, and enterprise security, Dror brings unique insight into nation-state threats. Learn more 👉 <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbXFKUzJOdG9fTmtVWjFSekd0UFNNTDdnMzZnUXxBQ3Jtc0tsLUtNNEtzVE1iekd3clgtZE04cjM5Vy1ndDNEWnRIVUNxcjlDYlFJWEdPbjdLa2ZYVDJORkxzY1FCSGVlQnNVN3IyRmhRZnl2eE5YcnZWRnRpSjVUZTZGMjRZRUwtSmRETnBBWnFiNmNEUGMtVWlJRQ&amp;q=https%3A%2F%2Fwww.cynomi.com%2F&amp;v=i5SXKVQEbvs">https://www.cynomi.com</a></p><p>FOLLOW "THE CISO SIGNAL" ON:<br>🌐 Website: www.thecisosignal.transistor.fm<br>🔗 LinkedIn: www.linkedin.com/company/the-ciso-signal</p><p>👍 Don’t forget to LIKE, SUBSCRIBE &amp; SHARE to stay ahead of the world’s most dangerous cyberattacks!</p><p><a href="https://www.youtube.com/hashtag/cybersecurity">#Cybersecurity</a> <a href="https://www.youtube.com/hashtag/sonyhack">#SonyHack</a> <a href="https://www.youtube.com/hashtag/theinterview">#TheInterview</a> <a href="https://www.youtube.com/hashtag/northkorea">#NorthKorea</a> <a href="https://www.youtube.com/hashtag/nationstateattack">#NationStateAttack</a> <a href="https://www.youtube.com/hashtag/ciso">#CISO</a> <a href="https://www.youtube.com/hashtag/thecisosignal">#TheCisoSignal</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>THE SONY HACK: HOLLYWOOD, NORTH KOREA &amp; THE CYBER WAR THAT CHANGED EVERYTHING<br>In 2014, Sony Pictures became ground zero for the first major nation-state cyberattack on a global corporation. The “Guardians of Peace,” linked to North Korea, crippled Sony’s networks, leaked unreleased films, and exposed troves of executive emails that forced high-level resignations. At the center of it all: The Interview, a comedy starring Seth Rogen and James Franco about a CIA plot to kill Kim Jong-un.</p><p>What started as a movie scandal quickly escalated into an international incident and a turning point for every CISO and cybersecurity leader. The Sony Hack showed the world how geopolitics, culture, and cyber warfare could collide in ways that devastate private companies.</p><p>In this episode of THE CISO SIGNAL: TRUE CYBERCRIME PODCAST, host Jeremy Ladner takes you inside the breach that changed corporate security forever. We unpack how Sony responded under pressure, why their crisis management is still debated a decade later, and what today’s security leaders must learn to defend against state-sponsored threats.</p><p>💡 IN THIS EPISODE, WE DISCUSS:<br>👉 How The Interview triggered a nation-state cyberattack<br>🔹 The impact of leaked emails and unreleased Sony films<br>⚠️ Why Sony’s response became a leadership case study<br>🛡️ How the Sony Hack reshaped global cybersecurity strategy<br>📈 Actionable CISO lessons for preparing against nation-state adversaries</p><p>🎙️ ABOUT OUR GUEST:<br>Dror Hevlin — VP Security &amp; CISO at Cynomi. With 20+ years in defense, critical infrastructure, and enterprise security, Dror brings unique insight into nation-state threats. Learn more 👉 <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbXFKUzJOdG9fTmtVWjFSekd0UFNNTDdnMzZnUXxBQ3Jtc0tsLUtNNEtzVE1iekd3clgtZE04cjM5Vy1ndDNEWnRIVUNxcjlDYlFJWEdPbjdLa2ZYVDJORkxzY1FCSGVlQnNVN3IyRmhRZnl2eE5YcnZWRnRpSjVUZTZGMjRZRUwtSmRETnBBWnFiNmNEUGMtVWlJRQ&amp;q=https%3A%2F%2Fwww.cynomi.com%2F&amp;v=i5SXKVQEbvs">https://www.cynomi.com</a></p><p>FOLLOW "THE CISO SIGNAL" ON:<br>🌐 Website: www.thecisosignal.transistor.fm<br>🔗 LinkedIn: www.linkedin.com/company/the-ciso-signal</p><p>👍 Don’t forget to LIKE, SUBSCRIBE &amp; SHARE to stay ahead of the world’s most dangerous cyberattacks!</p><p><a href="https://www.youtube.com/hashtag/cybersecurity">#Cybersecurity</a> <a href="https://www.youtube.com/hashtag/sonyhack">#SonyHack</a> <a href="https://www.youtube.com/hashtag/theinterview">#TheInterview</a> <a href="https://www.youtube.com/hashtag/northkorea">#NorthKorea</a> <a href="https://www.youtube.com/hashtag/nationstateattack">#NationStateAttack</a> <a href="https://www.youtube.com/hashtag/ciso">#CISO</a> <a href="https://www.youtube.com/hashtag/thecisosignal">#TheCisoSignal</a></p>]]>
      </content:encoded>
      <pubDate>Mon, 01 Sep 2025 09:35:48 -0700</pubDate>
      <author>Jeremy Ladner</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/prfx.byspotify.com/e/media.transistor.fm/d5247316/1b7fd1fe.mp3" length="44288434" type="audio/mpeg"/>
      <itunes:author>Jeremy Ladner</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/JhmBanJXcRoUCXBXSbt0oZ-6zIW287y5mxUEsGULjCM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iM2E3/ODI4MzZlZDc1MTAz/YzFjODM2NGU1OTc5/NWQzYS5qcGc.jpg"/>
      <itunes:duration>1841</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>THE SONY HACK: HOLLYWOOD, NORTH KOREA &amp; THE CYBER WAR THAT CHANGED EVERYTHING<br>In 2014, Sony Pictures became ground zero for the first major nation-state cyberattack on a global corporation. The “Guardians of Peace,” linked to North Korea, crippled Sony’s networks, leaked unreleased films, and exposed troves of executive emails that forced high-level resignations. At the center of it all: The Interview, a comedy starring Seth Rogen and James Franco about a CIA plot to kill Kim Jong-un.</p><p>What started as a movie scandal quickly escalated into an international incident and a turning point for every CISO and cybersecurity leader. The Sony Hack showed the world how geopolitics, culture, and cyber warfare could collide in ways that devastate private companies.</p><p>In this episode of THE CISO SIGNAL: TRUE CYBERCRIME PODCAST, host Jeremy Ladner takes you inside the breach that changed corporate security forever. We unpack how Sony responded under pressure, why their crisis management is still debated a decade later, and what today’s security leaders must learn to defend against state-sponsored threats.</p><p>💡 IN THIS EPISODE, WE DISCUSS:<br>👉 How The Interview triggered a nation-state cyberattack<br>🔹 The impact of leaked emails and unreleased Sony films<br>⚠️ Why Sony’s response became a leadership case study<br>🛡️ How the Sony Hack reshaped global cybersecurity strategy<br>📈 Actionable CISO lessons for preparing against nation-state adversaries</p><p>🎙️ ABOUT OUR GUEST:<br>Dror Hevlin — VP Security &amp; CISO at Cynomi. With 20+ years in defense, critical infrastructure, and enterprise security, Dror brings unique insight into nation-state threats. Learn more 👉 <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbXFKUzJOdG9fTmtVWjFSekd0UFNNTDdnMzZnUXxBQ3Jtc0tsLUtNNEtzVE1iekd3clgtZE04cjM5Vy1ndDNEWnRIVUNxcjlDYlFJWEdPbjdLa2ZYVDJORkxzY1FCSGVlQnNVN3IyRmhRZnl2eE5YcnZWRnRpSjVUZTZGMjRZRUwtSmRETnBBWnFiNmNEUGMtVWlJRQ&amp;q=https%3A%2F%2Fwww.cynomi.com%2F&amp;v=i5SXKVQEbvs">https://www.cynomi.com</a></p><p>FOLLOW "THE CISO SIGNAL" ON:<br>🌐 Website: www.thecisosignal.transistor.fm<br>🔗 LinkedIn: www.linkedin.com/company/the-ciso-signal</p><p>👍 Don’t forget to LIKE, SUBSCRIBE &amp; SHARE to stay ahead of the world’s most dangerous cyberattacks!</p><p><a href="https://www.youtube.com/hashtag/cybersecurity">#Cybersecurity</a> <a href="https://www.youtube.com/hashtag/sonyhack">#SonyHack</a> <a href="https://www.youtube.com/hashtag/theinterview">#TheInterview</a> <a href="https://www.youtube.com/hashtag/northkorea">#NorthKorea</a> <a href="https://www.youtube.com/hashtag/nationstateattack">#NationStateAttack</a> <a href="https://www.youtube.com/hashtag/ciso">#CISO</a> <a href="https://www.youtube.com/hashtag/thecisosignal">#TheCisoSignal</a></p>]]>
      </itunes:summary>
      <itunes:keywords>sony hack, sony 2014 hack, sony pictures hack, the interview hack, sony cyber attack, sony hack north korea, sony hack explained, sony hack documentary, sony hack story, sony hack podcast, sony data breach, sony hack full story, sony hack movie, sony hack cybersecurity, sony hack lessons, sony hack nation state, sony hack hollywood, sony hack behind the scenes, sony hack true crime, sony hack ransomware, sony hack leaked emails, sony hack impact, sony hack case study, sony hack nation state attack, sony hack explained podcast, sony hack breach, sony hack security, sony hack cybercrime, cybersecurity podcast, ciso podcast, cybercrime podcast, true cybercrime, nation state cyber attack, ransomware podcast, data breach podcast, cyber attack podcast, ciso insights, ciso strategy, cybersecurity leadership, cybercrime investigation, information security podcast, infosec podcast, hacking podcast, threat intelligence podcast, corporate cyber attack, hollywood cyber attack, cybercrime documentary, cyber attack case study, ciso signal</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d5247316/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>SIN CITY CYBERATTACK | Inside MGM Casino's $100M Hack</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>SIN CITY CYBERATTACK | Inside MGM Casino's $100M Hack</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b74c90da-5dd1-44c2-b1cf-5665374f43ad</guid>
      <link>https://TheCISOSignal.transistor.fm/s1/5</link>
      <description>
        <![CDATA[<p>SIN CITY CYBERATTACK: INSIDE THE MGM &amp; CAESARS CASINO BREACHES</p><p>In September 2023, Las Vegas turned into ground zero for one of the most disruptive cyberattacks in U.S. history. MGM Resorts, owner of iconic casinos on the Strip, saw slot machines go dark, hotel check-ins grind to a halt, and operations paralyzed for days. At the same time, Caesars Entertainment quietly faced its own breach, but unlike MGM, Caesars chose to pay the ransom.</p><p>In this episode of THE CISO SIGNAL: TRUE CYBERCRIME PODCAST, we take you inside the MGM Casino $100M ransomware hack and contrast it with the Caesars breach. We break down how attackers from the Scattered Spider/ALPHV ransomware group gained access, why MGM refused to pay, and what every CISO can learn from the two very different incident response strategies.</p><p>Our special guest co-host is PAZ SHWARTZ, CISO and CEO at Persist Security, who joins us to analyze the attacks, share real-world insights, and outline how leaders should prepare for ransomware scenarios that strike at the heart of critical business operations.</p><p>IN THIS EPISODE, WE DISCUSS:</p><p>👉 How the Scattered Spider group used social engineering to breach MGM and Caesars</p><p>🔹 Why MGM Resorts refused to pay ransom and Caesars paid up</p><p>⚠️ The operational and financial fallout for both casino giants</p><p>🛡️ Actionable strategies CISOs can deploy to prepare for high-stakes ransomware incidents</p><p>📈 Key leadership lessons for crisis response under public and shareholder pressure</p><p><br>ABOUT OUR GUEST:</p><p>Paz Shwartz is the CEO and CISO of Persist Security, with deep expertise in cybersecurity strategy, risk management, and incident response for global enterprises.</p><p><br>FOLLOW "THE CISO SIGNAL" ON:</p><p>🌐 Website: www.thecisosignal.transistor.fm</p><p>🔗 LinkedIn: www.linkedin.com/company/the-ciso-signal</p><p> </p><p>DON'T FORGET TO LIKE, SUBSCRIBE, AND SHARE TO STAY AHEAD OF THE LATEST CYBERCRIME THREATS!</p><p>#Cybersecurity #MGM #Caesars #CasinoHack #Ransomware #CISO #TheCisoSignal</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>SIN CITY CYBERATTACK: INSIDE THE MGM &amp; CAESARS CASINO BREACHES</p><p>In September 2023, Las Vegas turned into ground zero for one of the most disruptive cyberattacks in U.S. history. MGM Resorts, owner of iconic casinos on the Strip, saw slot machines go dark, hotel check-ins grind to a halt, and operations paralyzed for days. At the same time, Caesars Entertainment quietly faced its own breach, but unlike MGM, Caesars chose to pay the ransom.</p><p>In this episode of THE CISO SIGNAL: TRUE CYBERCRIME PODCAST, we take you inside the MGM Casino $100M ransomware hack and contrast it with the Caesars breach. We break down how attackers from the Scattered Spider/ALPHV ransomware group gained access, why MGM refused to pay, and what every CISO can learn from the two very different incident response strategies.</p><p>Our special guest co-host is PAZ SHWARTZ, CISO and CEO at Persist Security, who joins us to analyze the attacks, share real-world insights, and outline how leaders should prepare for ransomware scenarios that strike at the heart of critical business operations.</p><p>IN THIS EPISODE, WE DISCUSS:</p><p>👉 How the Scattered Spider group used social engineering to breach MGM and Caesars</p><p>🔹 Why MGM Resorts refused to pay ransom and Caesars paid up</p><p>⚠️ The operational and financial fallout for both casino giants</p><p>🛡️ Actionable strategies CISOs can deploy to prepare for high-stakes ransomware incidents</p><p>📈 Key leadership lessons for crisis response under public and shareholder pressure</p><p><br>ABOUT OUR GUEST:</p><p>Paz Shwartz is the CEO and CISO of Persist Security, with deep expertise in cybersecurity strategy, risk management, and incident response for global enterprises.</p><p><br>FOLLOW "THE CISO SIGNAL" ON:</p><p>🌐 Website: www.thecisosignal.transistor.fm</p><p>🔗 LinkedIn: www.linkedin.com/company/the-ciso-signal</p><p> </p><p>DON'T FORGET TO LIKE, SUBSCRIBE, AND SHARE TO STAY AHEAD OF THE LATEST CYBERCRIME THREATS!</p><p>#Cybersecurity #MGM #Caesars #CasinoHack #Ransomware #CISO #TheCisoSignal</p>]]>
      </content:encoded>
      <pubDate>Sat, 23 Aug 2025 10:48:22 -0700</pubDate>
      <author>Jeremy Ladner</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/prfx.byspotify.com/e/media.transistor.fm/049281c9/972e2ba7.mp3" length="43857094" type="audio/mpeg"/>
      <itunes:author>Jeremy Ladner</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/uBHE6kx6z4u6sr30Izf5_F9JKDI7BtJl-QVsInv-vIA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lNDE5/NWM4MmQwZjUwYzU5/NDg1NGY2NzdiYTQ5/MDIwYS5qcGc.jpg"/>
      <itunes:duration>1820</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>SIN CITY CYBERATTACK: INSIDE THE MGM &amp; CAESARS CASINO BREACHES</p><p>In September 2023, Las Vegas turned into ground zero for one of the most disruptive cyberattacks in U.S. history. MGM Resorts, owner of iconic casinos on the Strip, saw slot machines go dark, hotel check-ins grind to a halt, and operations paralyzed for days. At the same time, Caesars Entertainment quietly faced its own breach, but unlike MGM, Caesars chose to pay the ransom.</p><p>In this episode of THE CISO SIGNAL: TRUE CYBERCRIME PODCAST, we take you inside the MGM Casino $100M ransomware hack and contrast it with the Caesars breach. We break down how attackers from the Scattered Spider/ALPHV ransomware group gained access, why MGM refused to pay, and what every CISO can learn from the two very different incident response strategies.</p><p>Our special guest co-host is PAZ SHWARTZ, CISO and CEO at Persist Security, who joins us to analyze the attacks, share real-world insights, and outline how leaders should prepare for ransomware scenarios that strike at the heart of critical business operations.</p><p>IN THIS EPISODE, WE DISCUSS:</p><p>👉 How the Scattered Spider group used social engineering to breach MGM and Caesars</p><p>🔹 Why MGM Resorts refused to pay ransom and Caesars paid up</p><p>⚠️ The operational and financial fallout for both casino giants</p><p>🛡️ Actionable strategies CISOs can deploy to prepare for high-stakes ransomware incidents</p><p>📈 Key leadership lessons for crisis response under public and shareholder pressure</p><p><br>ABOUT OUR GUEST:</p><p>Paz Shwartz is the CEO and CISO of Persist Security, with deep expertise in cybersecurity strategy, risk management, and incident response for global enterprises.</p><p><br>FOLLOW "THE CISO SIGNAL" ON:</p><p>🌐 Website: www.thecisosignal.transistor.fm</p><p>🔗 LinkedIn: www.linkedin.com/company/the-ciso-signal</p><p> </p><p>DON'T FORGET TO LIKE, SUBSCRIBE, AND SHARE TO STAY AHEAD OF THE LATEST CYBERCRIME THREATS!</p><p>#Cybersecurity #MGM #Caesars #CasinoHack #Ransomware #CISO #TheCisoSignal</p>]]>
      </itunes:summary>
      <itunes:keywords>MGM cyberattack, Caesars cyberattack, MGM hack, Caesars hack, Las Vegas casino cyberattack, MGM ransomware, Caesars ransomware, Scattered Spider, ALPHV ransomware, ransomware attack, ransomware podcast, cybersecurity podcast, cybercrime podcast, CISO podcast, cybersecurity news, cyber threats, data breach, social engineering attack, information security, cybersecurity breach, threat intelligence, incident response, ransomware strategy, cyber risk management, cybersecurity leadership, True Cybercrime, The CISO Signal</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/049281c9/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>INSIDE CNA's $40M BITCOIN RANSOM | The Hack That Changed Cybersecurity</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>INSIDE CNA's $40M BITCOIN RANSOM | The Hack That Changed Cybersecurity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fafbe98b-273e-4b5a-9c55-55f06a3504fc</guid>
      <link>https://TheCISOSignal.transistor.fm/s1/4</link>
      <description>
        <![CDATA[<p>The CISO Signal | INSIDE CNA's $40M BITCOIN RANSOM | The Hack That Changed Cybersecurity - EP 4</p><p>In this episode of The CISO Signal, we go deep inside the cyberattack that shook the financial world.</p><p>Join us as we unravel the haunting details of the 2021 ransomware attack on CNA Financial, which resulted in a record-breaking $40 million ransom payment in Bitcoin.</p><p>This wasn't just another breach. This was a black swan event cloaked in silence, executed by a mysterious threat actor known as Phoenix. They slid past defenses, encrypted over 15,000 devices, and vanished with a payday big enough to fund a small nation-state.</p><p>How did one of the largest U.S. insurers, an industry built on managing risk become the ultimate risk?</p><p>🧠 GUEST CISO CO-HOST: Matan Eli Matalon</p><p>We’re joined by Matan Eli Matalon, CISO of OP Innovate. With a battlefield-hardened perspective from years in offensive and defensive cybersecurity, Matan brings a rare blend of red team psychology and blue team pragmatism to decode the dark mechanics behind this quiet catastrophe.</p><p>From ransomware tactics and insurance industry blind spots to negotiating with digital extortionists, Matan provides unparalleled insights.</p><p>📌 In This Episode:</p><p>ATTACK ANATOMY: How the CNA ransomware attackers gained access and detonated their payload.</p><p>ROOT CAUSE: The critical role of stolen credentials, Active Directory, and legacy systems.</p><p>THE RANSOM DECISION: Why a $40M ransom was paid and what it signals for future attacks.</p><p>THE AFTERMATH: The eerie silence that followed and the legal/PR playbook that unfolded.</p><p>KEY TAKEAWAYS: What security leaders can learn from CNA’s nightmare to prevent the next one.</p><p>🔐 FOR CISOs, BY CISOs.<br>The CISO Signal is a cinematic, story-driven podcast for security leaders, SOC professionals, and infosec veterans. Each week, we dissect high-stakes breaches with the insight of top CISOs and the pace of a true crime thriller.</p><p>SUBSCRIBE NOW! for weekly episodes that go beyond the headlines and deep into the shadows of today’s cyber underworld.</p><p>👍 LIKE, COMMENT, and SHARE this episode with your security team.<br>🌐 Visit thecisosignal.transistor.fm for full episodes, bios, and more.</p><p><a href="https://www.youtube.com/hashtag/cnafinancial">#CNAFinancial</a> <a href="https://www.youtube.com/hashtag/ransomwareattack">#RansomwareAttack</a> <a href="https://www.youtube.com/hashtag/cybersecurity">#Cybersecurity</a> <a href="https://www.youtube.com/hashtag/cisopodcast">#CISOPodcast</a> <a href="https://www.youtube.com/hashtag/truecybercrime">#TrueCybercrime</a> <a href="https://www.youtube.com/hashtag/infosec">#Infosec</a> <a href="https://www.youtube.com/hashtag/ransomware">#Ransomware</a> <a href="https://www.youtube.com/hashtag/cyberinsurance">#CyberInsurance</a> <a href="https://www.youtube.com/hashtag/securityleadership">#SecurityLeadership</a> <a href="https://www.youtube.com/hashtag/breachanalysis">#BreachAnalysis</a> <a href="https://www.youtube.com/hashtag/incidentresponse">#IncidentResponse</a> <a href="https://www.youtube.com/hashtag/soc">#SOC</a> <a href="https://www.youtube.com/hashtag/cyberrisk">#CyberRisk</a> <a href="https://www.youtube.com/hashtag/cio">#CIO</a> <a href="https://www.youtube.com/hashtag/cto">#CTO</a> <a href="https://www.youtube.com/hashtag/hacking">#Hacking</a> <a href="https://www.youtube.com/hashtag/digitalextortion">#DigitalExtortion</a> <a href="https://www.youtube.com/hashtag/cyberthreats">#Cyberthreats</a> <a href="https://www.youtube.com/hashtag/cybersecuritynews">#CybersecurityNews</a> <a href="https://www.youtube.com/hashtag/datasecurity">#Datasecurity</a> <a href="https://www.youtube.com/hashtag/matanmatalon">#MatanMatalon</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The CISO Signal | INSIDE CNA's $40M BITCOIN RANSOM | The Hack That Changed Cybersecurity - EP 4</p><p>In this episode of The CISO Signal, we go deep inside the cyberattack that shook the financial world.</p><p>Join us as we unravel the haunting details of the 2021 ransomware attack on CNA Financial, which resulted in a record-breaking $40 million ransom payment in Bitcoin.</p><p>This wasn't just another breach. This was a black swan event cloaked in silence, executed by a mysterious threat actor known as Phoenix. They slid past defenses, encrypted over 15,000 devices, and vanished with a payday big enough to fund a small nation-state.</p><p>How did one of the largest U.S. insurers, an industry built on managing risk become the ultimate risk?</p><p>🧠 GUEST CISO CO-HOST: Matan Eli Matalon</p><p>We’re joined by Matan Eli Matalon, CISO of OP Innovate. With a battlefield-hardened perspective from years in offensive and defensive cybersecurity, Matan brings a rare blend of red team psychology and blue team pragmatism to decode the dark mechanics behind this quiet catastrophe.</p><p>From ransomware tactics and insurance industry blind spots to negotiating with digital extortionists, Matan provides unparalleled insights.</p><p>📌 In This Episode:</p><p>ATTACK ANATOMY: How the CNA ransomware attackers gained access and detonated their payload.</p><p>ROOT CAUSE: The critical role of stolen credentials, Active Directory, and legacy systems.</p><p>THE RANSOM DECISION: Why a $40M ransom was paid and what it signals for future attacks.</p><p>THE AFTERMATH: The eerie silence that followed and the legal/PR playbook that unfolded.</p><p>KEY TAKEAWAYS: What security leaders can learn from CNA’s nightmare to prevent the next one.</p><p>🔐 FOR CISOs, BY CISOs.<br>The CISO Signal is a cinematic, story-driven podcast for security leaders, SOC professionals, and infosec veterans. Each week, we dissect high-stakes breaches with the insight of top CISOs and the pace of a true crime thriller.</p><p>SUBSCRIBE NOW! for weekly episodes that go beyond the headlines and deep into the shadows of today’s cyber underworld.</p><p>👍 LIKE, COMMENT, and SHARE this episode with your security team.<br>🌐 Visit thecisosignal.transistor.fm for full episodes, bios, and more.</p><p><a href="https://www.youtube.com/hashtag/cnafinancial">#CNAFinancial</a> <a href="https://www.youtube.com/hashtag/ransomwareattack">#RansomwareAttack</a> <a href="https://www.youtube.com/hashtag/cybersecurity">#Cybersecurity</a> <a href="https://www.youtube.com/hashtag/cisopodcast">#CISOPodcast</a> <a href="https://www.youtube.com/hashtag/truecybercrime">#TrueCybercrime</a> <a href="https://www.youtube.com/hashtag/infosec">#Infosec</a> <a href="https://www.youtube.com/hashtag/ransomware">#Ransomware</a> <a href="https://www.youtube.com/hashtag/cyberinsurance">#CyberInsurance</a> <a href="https://www.youtube.com/hashtag/securityleadership">#SecurityLeadership</a> <a href="https://www.youtube.com/hashtag/breachanalysis">#BreachAnalysis</a> <a href="https://www.youtube.com/hashtag/incidentresponse">#IncidentResponse</a> <a href="https://www.youtube.com/hashtag/soc">#SOC</a> <a href="https://www.youtube.com/hashtag/cyberrisk">#CyberRisk</a> <a href="https://www.youtube.com/hashtag/cio">#CIO</a> <a href="https://www.youtube.com/hashtag/cto">#CTO</a> <a href="https://www.youtube.com/hashtag/hacking">#Hacking</a> <a href="https://www.youtube.com/hashtag/digitalextortion">#DigitalExtortion</a> <a href="https://www.youtube.com/hashtag/cyberthreats">#Cyberthreats</a> <a href="https://www.youtube.com/hashtag/cybersecuritynews">#CybersecurityNews</a> <a href="https://www.youtube.com/hashtag/datasecurity">#Datasecurity</a> <a href="https://www.youtube.com/hashtag/matanmatalon">#MatanMatalon</a></p>]]>
      </content:encoded>
      <pubDate>Sat, 16 Aug 2025 06:23:53 -0700</pubDate>
      <author>Jeremy Ladner</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/prfx.byspotify.com/e/media.transistor.fm/596bcbae/e27c58e7.mp3" length="72091552" type="audio/mpeg"/>
      <itunes:author>Jeremy Ladner</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/mWyTWhwrY9jXnaWxmePxazlJxhoYXX3X7pBmrDQ5k84/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xMzYw/YmMwYzQ2N2E2NDc0/YmZlOGFkNjRlYzUx/YjE1Zi5qcGc.jpg"/>
      <itunes:duration>2995</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The CISO Signal | INSIDE CNA's $40M BITCOIN RANSOM | The Hack That Changed Cybersecurity - EP 4</p><p>In this episode of The CISO Signal, we go deep inside the cyberattack that shook the financial world.</p><p>Join us as we unravel the haunting details of the 2021 ransomware attack on CNA Financial, which resulted in a record-breaking $40 million ransom payment in Bitcoin.</p><p>This wasn't just another breach. This was a black swan event cloaked in silence, executed by a mysterious threat actor known as Phoenix. They slid past defenses, encrypted over 15,000 devices, and vanished with a payday big enough to fund a small nation-state.</p><p>How did one of the largest U.S. insurers, an industry built on managing risk become the ultimate risk?</p><p>🧠 GUEST CISO CO-HOST: Matan Eli Matalon</p><p>We’re joined by Matan Eli Matalon, CISO of OP Innovate. With a battlefield-hardened perspective from years in offensive and defensive cybersecurity, Matan brings a rare blend of red team psychology and blue team pragmatism to decode the dark mechanics behind this quiet catastrophe.</p><p>From ransomware tactics and insurance industry blind spots to negotiating with digital extortionists, Matan provides unparalleled insights.</p><p>📌 In This Episode:</p><p>ATTACK ANATOMY: How the CNA ransomware attackers gained access and detonated their payload.</p><p>ROOT CAUSE: The critical role of stolen credentials, Active Directory, and legacy systems.</p><p>THE RANSOM DECISION: Why a $40M ransom was paid and what it signals for future attacks.</p><p>THE AFTERMATH: The eerie silence that followed and the legal/PR playbook that unfolded.</p><p>KEY TAKEAWAYS: What security leaders can learn from CNA’s nightmare to prevent the next one.</p><p>🔐 FOR CISOs, BY CISOs.<br>The CISO Signal is a cinematic, story-driven podcast for security leaders, SOC professionals, and infosec veterans. Each week, we dissect high-stakes breaches with the insight of top CISOs and the pace of a true crime thriller.</p><p>SUBSCRIBE NOW! for weekly episodes that go beyond the headlines and deep into the shadows of today’s cyber underworld.</p><p>👍 LIKE, COMMENT, and SHARE this episode with your security team.<br>🌐 Visit thecisosignal.transistor.fm for full episodes, bios, and more.</p><p><a href="https://www.youtube.com/hashtag/cnafinancial">#CNAFinancial</a> <a href="https://www.youtube.com/hashtag/ransomwareattack">#RansomwareAttack</a> <a href="https://www.youtube.com/hashtag/cybersecurity">#Cybersecurity</a> <a href="https://www.youtube.com/hashtag/cisopodcast">#CISOPodcast</a> <a href="https://www.youtube.com/hashtag/truecybercrime">#TrueCybercrime</a> <a href="https://www.youtube.com/hashtag/infosec">#Infosec</a> <a href="https://www.youtube.com/hashtag/ransomware">#Ransomware</a> <a href="https://www.youtube.com/hashtag/cyberinsurance">#CyberInsurance</a> <a href="https://www.youtube.com/hashtag/securityleadership">#SecurityLeadership</a> <a href="https://www.youtube.com/hashtag/breachanalysis">#BreachAnalysis</a> <a href="https://www.youtube.com/hashtag/incidentresponse">#IncidentResponse</a> <a href="https://www.youtube.com/hashtag/soc">#SOC</a> <a href="https://www.youtube.com/hashtag/cyberrisk">#CyberRisk</a> <a href="https://www.youtube.com/hashtag/cio">#CIO</a> <a href="https://www.youtube.com/hashtag/cto">#CTO</a> <a href="https://www.youtube.com/hashtag/hacking">#Hacking</a> <a href="https://www.youtube.com/hashtag/digitalextortion">#DigitalExtortion</a> <a href="https://www.youtube.com/hashtag/cyberthreats">#Cyberthreats</a> <a href="https://www.youtube.com/hashtag/cybersecuritynews">#CybersecurityNews</a> <a href="https://www.youtube.com/hashtag/datasecurity">#Datasecurity</a> <a href="https://www.youtube.com/hashtag/matanmatalon">#MatanMatalon</a></p>]]>
      </itunes:summary>
      <itunes:keywords>CISO, cybersecurity, cybercrime, ransomware, CNA Financial, security leadership, information security, breach analysis, incident response, digital forensics, hacking, cyber risk, true crime, corporate security, cyber insurance, SOC, cyber defense, IT security, data breach, security news, cyber threats, cyberattack, extortion, Matan Matalon, The CISO Signal</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/596bcbae/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>THE UBER BREACH: HOW A 17-YEAR-OLD HACKED A FORTUNE 500 COMPANY | S1 EP3</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>THE UBER BREACH: HOW A 17-YEAR-OLD HACKED A FORTUNE 500 COMPANY | S1 EP3</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b889c702-04df-4d9e-ad03-bbc88d5028bd</guid>
      <link>https://TheCISOSignal.transistor.fm/s1/3</link>
      <description>
        <![CDATA[<p>THE UBER BREACH: HOW A 17-YEAR-OLD HACKED A FORTUNE 500 COMPANY</p><p>A 17-year-old hacker. A simple social engineering tactic. A taunting message posted to Uber’s internal Slack channel. In one of the most audacious breaches in recent memory, a teenager allegedly affiliated with the Lapsus$ group compromised a Fortune 500 company, exposing critical vulnerabilities in even the most sophisticated security frameworks.</p><p>In this episode of THE CISO SIGNAL: TRUE CYBERCRIME, we go behind the scenes of the Uber breach to tell the full story of how this attack unfolded. We investigate the chain of events that led to the compromise and shine a light on the human element—the weakest link in cybersecurity.</p><p>Our special guest co-host is ORI STEIN, CISO at TrustNet Security, part of the Tama Group. Ori breaks down the anatomy of the attack and shares actionable intelligence on how to protect your organization from similar social engineering threats.</p><p>IN THIS EPISODE, WE DISCUSS:<br>👉 How a simple text message and MFA fatigue became the keys to the kingdom<br>🔹 The role of the Lapsus$ threat group and their unusual tactics<br>⚠️ Why even a strong security team can be vulnerable to human factors<br>🛡️ Actionable strategies to bolster your MFA and incident response protocols<br>📈 The leadership lessons CISOs can take away from this high-profile breach</p><p>ABOUT OUR GUEST:<br>Ori Stein is a seasoned CISO with extensive experience in security strategy and incident response. He serves as CISO at TrustNet Security, part of the Tama Group.</p><p>FOLLOW "THE CISO SIGNAL" ON:<br>🌐 Website: www.thecisosignal.transistor.fm<br>🔗 LinkedIn: www.linkedin.com/company/the-ciso-signal</p><p>DON'T FORGET TO LIKE, SUBSCRIBE, AND SHARE TO STAY AHEAD OF THE LATEST CYBERCRIME THREATS!</p><p><a href="https://www.youtube.com/hashtag/cybersecurity">#Cybersecurity</a> <a href="https://www.youtube.com/hashtag/uberbreach">#UberBreach</a> <a href="https://www.youtube.com/hashtag/socialengineering">#SocialEngineering</a> <a href="https://www.youtube.com/hashtag/ciso">#CISO</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>THE UBER BREACH: HOW A 17-YEAR-OLD HACKED A FORTUNE 500 COMPANY</p><p>A 17-year-old hacker. A simple social engineering tactic. A taunting message posted to Uber’s internal Slack channel. In one of the most audacious breaches in recent memory, a teenager allegedly affiliated with the Lapsus$ group compromised a Fortune 500 company, exposing critical vulnerabilities in even the most sophisticated security frameworks.</p><p>In this episode of THE CISO SIGNAL: TRUE CYBERCRIME, we go behind the scenes of the Uber breach to tell the full story of how this attack unfolded. We investigate the chain of events that led to the compromise and shine a light on the human element—the weakest link in cybersecurity.</p><p>Our special guest co-host is ORI STEIN, CISO at TrustNet Security, part of the Tama Group. Ori breaks down the anatomy of the attack and shares actionable intelligence on how to protect your organization from similar social engineering threats.</p><p>IN THIS EPISODE, WE DISCUSS:<br>👉 How a simple text message and MFA fatigue became the keys to the kingdom<br>🔹 The role of the Lapsus$ threat group and their unusual tactics<br>⚠️ Why even a strong security team can be vulnerable to human factors<br>🛡️ Actionable strategies to bolster your MFA and incident response protocols<br>📈 The leadership lessons CISOs can take away from this high-profile breach</p><p>ABOUT OUR GUEST:<br>Ori Stein is a seasoned CISO with extensive experience in security strategy and incident response. He serves as CISO at TrustNet Security, part of the Tama Group.</p><p>FOLLOW "THE CISO SIGNAL" ON:<br>🌐 Website: www.thecisosignal.transistor.fm<br>🔗 LinkedIn: www.linkedin.com/company/the-ciso-signal</p><p>DON'T FORGET TO LIKE, SUBSCRIBE, AND SHARE TO STAY AHEAD OF THE LATEST CYBERCRIME THREATS!</p><p><a href="https://www.youtube.com/hashtag/cybersecurity">#Cybersecurity</a> <a href="https://www.youtube.com/hashtag/uberbreach">#UberBreach</a> <a href="https://www.youtube.com/hashtag/socialengineering">#SocialEngineering</a> <a href="https://www.youtube.com/hashtag/ciso">#CISO</a></p>]]>
      </content:encoded>
      <pubDate>Sat, 09 Aug 2025 07:24:39 -0700</pubDate>
      <author>Jeremy Ladner</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/prfx.byspotify.com/e/media.transistor.fm/1e16ad52/36de83a7.mp3" length="78501308" type="audio/mpeg"/>
      <itunes:author>Jeremy Ladner</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Nqb1vCO4c5pf6K6qybHE9T0_hGY1e4UfLNaqk-pTrv0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iODQx/YjMwNTE1MDc3MTVh/NjlmYTI2YTYwNWRl/NDE5Zi5qcGc.jpg"/>
      <itunes:duration>3265</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>THE UBER BREACH: HOW A 17-YEAR-OLD HACKED A FORTUNE 500 COMPANY</p><p>A 17-year-old hacker. A simple social engineering tactic. A taunting message posted to Uber’s internal Slack channel. In one of the most audacious breaches in recent memory, a teenager allegedly affiliated with the Lapsus$ group compromised a Fortune 500 company, exposing critical vulnerabilities in even the most sophisticated security frameworks.</p><p>In this episode of THE CISO SIGNAL: TRUE CYBERCRIME, we go behind the scenes of the Uber breach to tell the full story of how this attack unfolded. We investigate the chain of events that led to the compromise and shine a light on the human element—the weakest link in cybersecurity.</p><p>Our special guest co-host is ORI STEIN, CISO at TrustNet Security, part of the Tama Group. Ori breaks down the anatomy of the attack and shares actionable intelligence on how to protect your organization from similar social engineering threats.</p><p>IN THIS EPISODE, WE DISCUSS:<br>👉 How a simple text message and MFA fatigue became the keys to the kingdom<br>🔹 The role of the Lapsus$ threat group and their unusual tactics<br>⚠️ Why even a strong security team can be vulnerable to human factors<br>🛡️ Actionable strategies to bolster your MFA and incident response protocols<br>📈 The leadership lessons CISOs can take away from this high-profile breach</p><p>ABOUT OUR GUEST:<br>Ori Stein is a seasoned CISO with extensive experience in security strategy and incident response. He serves as CISO at TrustNet Security, part of the Tama Group.</p><p>FOLLOW "THE CISO SIGNAL" ON:<br>🌐 Website: www.thecisosignal.transistor.fm<br>🔗 LinkedIn: www.linkedin.com/company/the-ciso-signal</p><p>DON'T FORGET TO LIKE, SUBSCRIBE, AND SHARE TO STAY AHEAD OF THE LATEST CYBERCRIME THREATS!</p><p><a href="https://www.youtube.com/hashtag/cybersecurity">#Cybersecurity</a> <a href="https://www.youtube.com/hashtag/uberbreach">#UberBreach</a> <a href="https://www.youtube.com/hashtag/socialengineering">#SocialEngineering</a> <a href="https://www.youtube.com/hashtag/ciso">#CISO</a></p>]]>
      </itunes:summary>
      <itunes:keywords>The CISO Signal, cybersecurity podcast, true cybercrime, Uber breach, Uber hack 2022, 17-year-old hacker, data breach analysis, cyber attack case study, incident response, ransomware, supply chain attack, CISO interviews, information security, network security, cyber threat intelligence, breach prevention, security leadership, cybersecurity stories, infosec podcast, cybercrime storytelling, hacker techniques, security incident, breach timeline, real-world cyberattacks, cyber risk management, security operations center, SOC training, threat hunting, post-breach recovery, cybersecurity lessons, enterprise security, IT security podcast, hacking stories, cyber defense, cyber attack analysis, breach investigation, Uber cybersecurity incident, cyber attack response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1e16ad52/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>S1E2 | The SolarWinds Hack: How 18,000 Orgs Were Compromised | w/ Alberto Deto Hassan</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>S1E2 | The SolarWinds Hack: How 18,000 Orgs Were Compromised | w/ Alberto Deto Hassan</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b3529d01-963a-4927-a8b1-273cb4357f81</guid>
      <link>https://TheCISOSignal.transistor.fm/s1/2</link>
      <description>
        <![CDATA[<p><strong>🎙️ The CISO Signal | S1E2 — The SolarWinds Hack: How 18,000 Orgs Were Compromised</strong></p><p><strong>One trusted software update. Thousands of victims. A breach that changed the cybersecurity landscape forever.</strong></p><p>In this episode, we investigate the <strong>SolarWinds supply chain attack</strong>, a <strong>nation-state cyber operation</strong> that exposed the deep fragility of the modern software ecosystem. What made this breach so dangerous wasn’t just how many organizations were compromised; it was how long the attackers went undetected and how deeply they infiltrated the systems we rely on most.</p><p><strong>🧠 Jeremy Ladner with Guest Co-Host: Alberto Deto Hassan</strong><br> Veteran CISO and former head of Israel’s National CERT, Alberto, joins Jeremy Ladner to analyze the SolarWinds hack from both strategic and technical perspectives with lessons every CISO and security leader needs to hear.</p><p>🔍 In This Episode:</p><ul><li>How Russian APT actors compromised <strong>18,000+ organizations</strong> using a poisoned software update</li><li>Why <strong>perimeter-based security models failed</strong></li><li>How this attack <strong>ignited the Zero Trust movement</strong></li><li>What today’s CISOs must do to secure their <strong>software supply chain</strong></li><li>Real-world advice from one of the world’s leading cybersecurity experts</li></ul><p>👂 Who Should Listen:</p><ul><li>CISOs, security architects, and incident responders</li><li>Cyber threat intelligence and red team professionals</li><li>Fans of <strong>true cybercrime</strong> and <strong>nation-state breach stories</strong></li><li>Anyone who wants to understand how trust was exploited and how to defend against it</li></ul><p><strong>The CISO Signal</strong> is a cinematic, story-driven podcast that turns major breaches into <strong>case studies for security leaders</strong> — blending <strong>narrative storytelling</strong> with expert CISO insight.</p><p>🔐 For CISOs. By CISOs. But, made to thrill fans of true crime, cyber warfare, and the breach stories that shaped our world.</p><p>🔗 Subscribe, Review &amp; Share:</p><p>Follow us for weekly episodes exploring the breaches that define cybersecurity today.<br> 💬 Leave a review if you enjoy the show — it helps us reach more security pros and true cybercrime fans.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>🎙️ The CISO Signal | S1E2 — The SolarWinds Hack: How 18,000 Orgs Were Compromised</strong></p><p><strong>One trusted software update. Thousands of victims. A breach that changed the cybersecurity landscape forever.</strong></p><p>In this episode, we investigate the <strong>SolarWinds supply chain attack</strong>, a <strong>nation-state cyber operation</strong> that exposed the deep fragility of the modern software ecosystem. What made this breach so dangerous wasn’t just how many organizations were compromised; it was how long the attackers went undetected and how deeply they infiltrated the systems we rely on most.</p><p><strong>🧠 Jeremy Ladner with Guest Co-Host: Alberto Deto Hassan</strong><br> Veteran CISO and former head of Israel’s National CERT, Alberto, joins Jeremy Ladner to analyze the SolarWinds hack from both strategic and technical perspectives with lessons every CISO and security leader needs to hear.</p><p>🔍 In This Episode:</p><ul><li>How Russian APT actors compromised <strong>18,000+ organizations</strong> using a poisoned software update</li><li>Why <strong>perimeter-based security models failed</strong></li><li>How this attack <strong>ignited the Zero Trust movement</strong></li><li>What today’s CISOs must do to secure their <strong>software supply chain</strong></li><li>Real-world advice from one of the world’s leading cybersecurity experts</li></ul><p>👂 Who Should Listen:</p><ul><li>CISOs, security architects, and incident responders</li><li>Cyber threat intelligence and red team professionals</li><li>Fans of <strong>true cybercrime</strong> and <strong>nation-state breach stories</strong></li><li>Anyone who wants to understand how trust was exploited and how to defend against it</li></ul><p><strong>The CISO Signal</strong> is a cinematic, story-driven podcast that turns major breaches into <strong>case studies for security leaders</strong> — blending <strong>narrative storytelling</strong> with expert CISO insight.</p><p>🔐 For CISOs. By CISOs. But, made to thrill fans of true crime, cyber warfare, and the breach stories that shaped our world.</p><p>🔗 Subscribe, Review &amp; Share:</p><p>Follow us for weekly episodes exploring the breaches that define cybersecurity today.<br> 💬 Leave a review if you enjoy the show — it helps us reach more security pros and true cybercrime fans.</p>]]>
      </content:encoded>
      <pubDate>Sat, 02 Aug 2025 20:09:27 -0700</pubDate>
      <author>Jeremy Ladner</author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/prfx.byspotify.com/e/media.transistor.fm/44bb68e5/150d1e76.mp3" length="36894962" type="audio/mpeg"/>
      <itunes:author>Jeremy Ladner</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ZZQKRuTIBUQluRKsLi7fuP69Ex4HPFsYCGzHT-Pnn_4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jZGU3/ZDg1YWFjNDE1MmEz/ZjE5MzllNjQ0M2I3/YzI1Mi5qcGc.jpg"/>
      <itunes:duration>2304</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>🎙️ The CISO Signal | S1E2 — The SolarWinds Hack: How 18,000 Orgs Were Compromised</strong></p><p><strong>One trusted software update. Thousands of victims. A breach that changed the cybersecurity landscape forever.</strong></p><p>In this episode, we investigate the <strong>SolarWinds supply chain attack</strong>, a <strong>nation-state cyber operation</strong> that exposed the deep fragility of the modern software ecosystem. What made this breach so dangerous wasn’t just how many organizations were compromised; it was how long the attackers went undetected and how deeply they infiltrated the systems we rely on most.</p><p><strong>🧠 Jeremy Ladner with Guest Co-Host: Alberto Deto Hassan</strong><br> Veteran CISO and former head of Israel’s National CERT, Alberto, joins Jeremy Ladner to analyze the SolarWinds hack from both strategic and technical perspectives with lessons every CISO and security leader needs to hear.</p><p>🔍 In This Episode:</p><ul><li>How Russian APT actors compromised <strong>18,000+ organizations</strong> using a poisoned software update</li><li>Why <strong>perimeter-based security models failed</strong></li><li>How this attack <strong>ignited the Zero Trust movement</strong></li><li>What today’s CISOs must do to secure their <strong>software supply chain</strong></li><li>Real-world advice from one of the world’s leading cybersecurity experts</li></ul><p>👂 Who Should Listen:</p><ul><li>CISOs, security architects, and incident responders</li><li>Cyber threat intelligence and red team professionals</li><li>Fans of <strong>true cybercrime</strong> and <strong>nation-state breach stories</strong></li><li>Anyone who wants to understand how trust was exploited and how to defend against it</li></ul><p><strong>The CISO Signal</strong> is a cinematic, story-driven podcast that turns major breaches into <strong>case studies for security leaders</strong> — blending <strong>narrative storytelling</strong> with expert CISO insight.</p><p>🔐 For CISOs. By CISOs. But, made to thrill fans of true crime, cyber warfare, and the breach stories that shaped our world.</p><p>🔗 Subscribe, Review &amp; Share:</p><p>Follow us for weekly episodes exploring the breaches that define cybersecurity today.<br> 💬 Leave a review if you enjoy the show — it helps us reach more security pros and true cybercrime fans.</p>]]>
      </itunes:summary>
      <itunes:keywords>SolarWinds breach, SolarWinds hack, supply chain attack, nation-state attack, cybersecurity podcast, CISO podcast, zero trust, incident response, cybersecurity leadership, cyber threat landscape, cybersecurity breach, APT29, software supply chain, ICS security, national CERT, cybersecurity case study, Alberto Deto Hassan, Jeremy Ladner, CISO, infosec, cyber threat intelligence, cyber risk, breach analysis, cybersecurity storytelling, true cybercrime, real-world breaches, security strategy, threat actors, red team, blue team, cyber defense</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/44bb68e5/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>DEAD IN THE WATER | Maersk, Sandworm, and the $10 Billion Breach</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>DEAD IN THE WATER | Maersk, Sandworm, and the $10 Billion Breach</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a27eaaa1-701b-4ded-8197-498f592fd80a</guid>
      <link>https://TheCISOSignal.transistor.fm/s1/1</link>
      <description>
        <![CDATA[<p>The CISO Signal | S1E1: DEAD IN THE WATER | How Sandworm Crippled Maersk — The $10 Billion Breach</p><p>In this premiere episode of The CISO Signal, we uncover the chilling true cybercrime story of the NotPetya attack — a weaponized piece of malware launched by the Russian state-backed hacking group Sandworm, which brought Maersk, the world’s largest shipping company, to its knees.</p><p>What began as an attack on Ukraine’s infrastructure cascaded across the globe, infecting critical systems, halting operations, and costing the logistics giant over $10 billion in damage.</p><p>But this isn’t just a story about malware — it’s a case study in lateral movement, trusted access abuse, and what happens when even the most mature enterprises are blindsided by nation-state warfare masquerading as ransomware.</p><p>🎧 With Guest Co-Host: Shlomi Avivi<br>We’re joined by Shlomi Avivi, a veteran cybersecurity executive and former CISO of several hyper-growth companies. With 20+ years in the trenches of risk management and enterprise security, Shlomi brings a sharp, modern lens to what went wrong, and what CISOs everywhere need to understand today.</p><p>Shlomi is a strong believer in forward-thinking security strategies that evolve with the threat landscape, and in this episode, he helps unpack how legacy vulnerabilities met modern warfare… and lost.🎧 In this episode:</p><p>- How a single compromised update triggered global chaos<br>- What Maersk lost — and how close they came to losing everything<br>- The technical and emotional toll on security teams<br>- What CISOs can learn from one of history’s most destructive cyberattacks</p><p>🧠 Guest Commentary from Top CISOs<br>We bring in real-world CISOs to analyze the breach, not as victims, but as expert investigators. Together, we examine the breach’s timeline, the security failures, and the haunting “what ifs” that still echo through the infosec world.</p><p>🔐 For CISOs, by CISOs.<br>The CISO Signal is a cinematic true cybercrime podcast designed for cybersecurity leaders, red teamers, and infosec pros. Each episode dissects a real breach with the tone of True Detective, the rhythm of The Twilight Zone, and the insight only seasoned CISOs can provide.</p><p>🧭 Subscribe now for weekly episodes that turn infamous cyberattacks into case studies every security team should hear.<br>👉 Don’t forget to like, comment, and share with your security team.</p><p>#Cybercrime #NotPetya #MaerskHack #Sandworm #TheCISOSignal #CISOPodcast #CybersecurityPodcast #TrueCybercrime #IncidentResponse #NationStateAttack #InfoSec #BreachAnalysis #SOC #RedTeam #SecurityLeadership #SupplyChainSecurity</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The CISO Signal | S1E1: DEAD IN THE WATER | How Sandworm Crippled Maersk — The $10 Billion Breach</p><p>In this premiere episode of The CISO Signal, we uncover the chilling true cybercrime story of the NotPetya attack — a weaponized piece of malware launched by the Russian state-backed hacking group Sandworm, which brought Maersk, the world’s largest shipping company, to its knees.</p><p>What began as an attack on Ukraine’s infrastructure cascaded across the globe, infecting critical systems, halting operations, and costing the logistics giant over $10 billion in damage.</p><p>But this isn’t just a story about malware — it’s a case study in lateral movement, trusted access abuse, and what happens when even the most mature enterprises are blindsided by nation-state warfare masquerading as ransomware.</p><p>🎧 With Guest Co-Host: Shlomi Avivi<br>We’re joined by Shlomi Avivi, a veteran cybersecurity executive and former CISO of several hyper-growth companies. With 20+ years in the trenches of risk management and enterprise security, Shlomi brings a sharp, modern lens to what went wrong, and what CISOs everywhere need to understand today.</p><p>Shlomi is a strong believer in forward-thinking security strategies that evolve with the threat landscape, and in this episode, he helps unpack how legacy vulnerabilities met modern warfare… and lost.🎧 In this episode:</p><p>- How a single compromised update triggered global chaos<br>- What Maersk lost — and how close they came to losing everything<br>- The technical and emotional toll on security teams<br>- What CISOs can learn from one of history’s most destructive cyberattacks</p><p>🧠 Guest Commentary from Top CISOs<br>We bring in real-world CISOs to analyze the breach, not as victims, but as expert investigators. Together, we examine the breach’s timeline, the security failures, and the haunting “what ifs” that still echo through the infosec world.</p><p>🔐 For CISOs, by CISOs.<br>The CISO Signal is a cinematic true cybercrime podcast designed for cybersecurity leaders, red teamers, and infosec pros. Each episode dissects a real breach with the tone of True Detective, the rhythm of The Twilight Zone, and the insight only seasoned CISOs can provide.</p><p>🧭 Subscribe now for weekly episodes that turn infamous cyberattacks into case studies every security team should hear.<br>👉 Don’t forget to like, comment, and share with your security team.</p><p>#Cybercrime #NotPetya #MaerskHack #Sandworm #TheCISOSignal #CISOPodcast #CybersecurityPodcast #TrueCybercrime #IncidentResponse #NationStateAttack #InfoSec #BreachAnalysis #SOC #RedTeam #SecurityLeadership #SupplyChainSecurity</p>]]>
      </content:encoded>
      <pubDate>Thu, 24 Jul 2025 05:21:47 -0700</pubDate>
      <author>The CISO Signal </author>
      <enclosure url="https://2.gum.fm/op3.dev/e/pdcn.co/e/pscrb.fm/rss/p/pdst.fm/e/dts.podtrac.com/redirect.mp3/prfx.byspotify.com/e/media.transistor.fm/41496c3a/785de715.mp3" length="34757607" type="audio/mpeg"/>
      <itunes:author>The CISO Signal </itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Mqs10LXu3ANsSHGlt9Z31p4-RSmN4RQurIb5bJGYg8s/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xMTMw/ZjYyNDgyMjMzNTE0/ZmFkMTkyMjQyOThh/YThkMy5qcGc.jpg"/>
      <itunes:duration>2169</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The CISO Signal | S1E1: DEAD IN THE WATER | How Sandworm Crippled Maersk — The $10 Billion Breach</p><p>In this premiere episode of The CISO Signal, we uncover the chilling true cybercrime story of the NotPetya attack — a weaponized piece of malware launched by the Russian state-backed hacking group Sandworm, which brought Maersk, the world’s largest shipping company, to its knees.</p><p>What began as an attack on Ukraine’s infrastructure cascaded across the globe, infecting critical systems, halting operations, and costing the logistics giant over $10 billion in damage.</p><p>But this isn’t just a story about malware — it’s a case study in lateral movement, trusted access abuse, and what happens when even the most mature enterprises are blindsided by nation-state warfare masquerading as ransomware.</p><p>🎧 With Guest Co-Host: Shlomi Avivi<br>We’re joined by Shlomi Avivi, a veteran cybersecurity executive and former CISO of several hyper-growth companies. With 20+ years in the trenches of risk management and enterprise security, Shlomi brings a sharp, modern lens to what went wrong, and what CISOs everywhere need to understand today.</p><p>Shlomi is a strong believer in forward-thinking security strategies that evolve with the threat landscape, and in this episode, he helps unpack how legacy vulnerabilities met modern warfare… and lost.🎧 In this episode:</p><p>- How a single compromised update triggered global chaos<br>- What Maersk lost — and how close they came to losing everything<br>- The technical and emotional toll on security teams<br>- What CISOs can learn from one of history’s most destructive cyberattacks</p><p>🧠 Guest Commentary from Top CISOs<br>We bring in real-world CISOs to analyze the breach, not as victims, but as expert investigators. Together, we examine the breach’s timeline, the security failures, and the haunting “what ifs” that still echo through the infosec world.</p><p>🔐 For CISOs, by CISOs.<br>The CISO Signal is a cinematic true cybercrime podcast designed for cybersecurity leaders, red teamers, and infosec pros. Each episode dissects a real breach with the tone of True Detective, the rhythm of The Twilight Zone, and the insight only seasoned CISOs can provide.</p><p>🧭 Subscribe now for weekly episodes that turn infamous cyberattacks into case studies every security team should hear.<br>👉 Don’t forget to like, comment, and share with your security team.</p><p>#Cybercrime #NotPetya #MaerskHack #Sandworm #TheCISOSignal #CISOPodcast #CybersecurityPodcast #TrueCybercrime #IncidentResponse #NationStateAttack #InfoSec #BreachAnalysis #SOC #RedTeam #SecurityLeadership #SupplyChainSecurity</p>]]>
      </itunes:summary>
      <itunes:keywords>CISO podcast, chief information security officer, cybersecurity leadership, security professionals, infosec podcast, true cyber crime, cybercrime podcast, real cyber attacks, ransomware attacks, data breach analysis, cyber threat intelligence, cyber espionage, cybersecurity vendors, security technology, cyber defense strategies, threat hunting, security operations, network security, cyber risk management, incident response, security awareness, cybersecurity trends, cyber resilience, hacker tactics, insider threat, security breaches, cyber war stories</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/41496c3a/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
  </channel>
</rss>
