The Ring of Defense

1) Impacket - All your Bases
The Impacket tool was used by APTs to target the US Defense Industrial Base sector. The initial vector was unknown, but how do you identify reconnaissance and exfiltration in your organization?

2) PLCs - Patching is Logical
A critical vulnerability with a 9.3 CVSS score was found in the Siemens SIMATIC programmable logic controllers (PLCs) and the controlling portal, allowing the theft of cryptographic keys. What are you doing to prevent your IoT from being hacked?

3) Alchemist - Turning Vulnerabilities into Gold
A previously undocumented C2 framework is being used to target Windows, macOS, and Linux machines; with the Alchemist toolset granting anybody that can point/click the ability to create a botnet. Are you vulnerable?

4) Mirai - Another Word
In episode 001, we shared that we saw Mirai as a top-10 intercept at Cato Networks in the wild. Since then, Mirai has been used to orchestrate a 2.5Tbps DDoS attack on the Wynncraft Minecraft server. How could this have been prevented?

What is The Ring of Defense?

Join Robin Johns, and Bill Carter as we delve into the intricate world of cybersecurity, exploring the critical issues, fundamental concepts, and the latest security incidents that shape our digital landscape.

In each episode, Robin and Bill bring their wealth of knowledge and experience to the forefront, unraveling complex cybersecurity topics and making them accessible to all listeners. Whether you're a seasoned professional, an aspiring cybersecurity enthusiast, or simply someone interested in safeguarding your digital presence, this podcast offers valuable insights and practical advice.