Page de couverture de Data Security Decoded

Data Security Decoded

Data Security Decoded

Auteur(s): Rubrik
Écouter gratuitement

À propos de cet audio

Data Security Decoded provides actionable, vendor-agnostic insights to reduce data security risk and improve resilience outcomes. Designed for cybersecurity and IT professionals who want practical insights on preparing for attacks before they happen, so they can respond effectively when they inevitably do. Episodes feature insights from researchers, crafters of public policy, and senior cybersecurity leaders, to help organizations reduce risk and improve resilience. Data Security Decoded provides practical advice, proven strategies, and in-depth discussions on the latest trends and challenges in data security, helping listeners strengthen their organizations' defenses and recovery plans.Copyrights © 2024 All Rights Reserved by Rubrik Politique Économie
Épisodes
  • When Hacktivists Target Water Utilities: Inside a Russian-Aligned OT Attack
    Feb 3 2026
    Russian-aligned hacktivist groups are increasingly targeting industrial control systems and OT environments—and sometimes it’s shockingly easy. In this episode, Daniel dos Santos, VP of Research at Forescout, walks through how his team used a honeypot to observe an attack against a simulated water treatment facility. We explore attacker motivations, common entry points, and what defenders must prioritize now. What You’ll Learn How honeypots can uncover real-world hacktivist tactics and behaviors Why exposed HMIs remain one of the weakest entry points in OT environments How Telegram has become a primary platform for hacktivist attack claims The evolving motivations behind Russian-aligned hacktivist groups Why visibility across all networked devices is critical to defense How opportunistic attacks differ from targeted nation-state operations Practical steps to avoid becoming “easy prey” for attackers Episode Highlights 00:02:30 – How the Attack Was Discovered Spotting the honeypot activity through Telegram claims00:04:00 – The Entry Point Explained Default credentials and exposed HMIs00:06:45 – Hacktivist Motivation Shift From activism to geopolitics and profit00:10:50 – Why OT Attacks Are Hard to Eradicate Hidden devices and lateral movement 00:14:20 – The Core Defensive Takeaway Don’t ignore opportunistic threats Episode Resources Forescout Research ReportsTelegram (hacktivist communications platform)Canadian Government OT Security Alert Shodan (internet-exposed asset scanning tool)
    Voir plus Voir moins
    20 min
  • How Rubrik Zero Labs Uses LLMs to Analyze Malware at Machine Speed
    Jan 20 2026
    AI is changing how malware is built—and how it’s caught. In this episode, Caleb Tolin is joined by Amit Malik, Staff Security Researcher at Rubrik Zero Labs, to unpack how large language models are transforming malware analysis, enabling defenders to sift through thousands of samples and surface truly novel threats. From Chameleon malware abusing WSL to AI-generated attack code, this conversation explores what real data resilience looks like in an AI-driven threat landscape. What You’ll Learn How LLMs help analysts move from syntax-level review to intent-based malware analysis Why processing thousands of samples daily requires AI-assisted triage and clustering How attackers are abusing WSL and cloud-native environments to evade detection What AI-generated, dynamically delivered malware code means for traditional defenses Where LLMs excel—and where human validation remains essential Why resilience matters more than speed in AI-driven security operations Episode Highlights [00:00] AI-generated malware and shrinking attacker footprints [03:30] Why Rubrik Zero Labs built an LLM-driven malware analysis system [05:45] Scaling from 6,000 samples to 20 worth investigating[07:40] Extracting malware “business logic” before sending code to LLMs [10:05] Chameleon malware abusing Windows Subsystem for Linux [13:00] APT-linked Linux RATs and what sophistication signals intent [15:00] LLM hallucinations and the need for human verification Episode Resources Rubrik Zero Labs Research Reports
    Voir plus Voir moins
    24 min
  • Ransomware, Remote Access, and the OT Reality Check
    Jan 6 2026
    In this episode of Data Security Decoded, Cybersecurity veteran Dawn Cappelli joins host Caleb Tolin to unpack the rapidly evolving threat landscape facing operational technology environments. With decades of experience spanning CERT, Rockwell Automation, and now Dragos, Dawn breaks down how geopolitical conflicts, empowered hacktivists, and ransomware are reshaping OT risk. She shares the five critical ICS controls every organization should prioritize and discusses why community-driven defense models are now essential for resilience. A must-listen for leaders responsible for critical infrastructure, manufacturing, and industrial cybersecurity. What you'll learn: How global conflicts have dissolved previous norms that protected critical infrastructure from cyber retaliation. Why hacktivist groups are becoming more dangerous — and how state actors quietly support them. The five highest-impact ICS security controls and where most organizations fail. Why OT environments remain decades behind IT security — and what leaders must immediately address. How ransomware operators target manufacturing and critical infrastructure for maximum leverage. The risks of insecure remote access and unmanaged third-party connections. How OT-CERT and community defense can uplift organizations with limited resources. Episode Highlights: 00:00 – Opening + Guest Introduction Caleb introduces Dawn and frames her decades of OT and insider threat leadership. 02:00 – Dawn’s Early Journey into OT and Security How nuclear engineering, the CDC bioterrorism portal, and 9/11 sparked her cybersecurity mission. 05:00 – Founding the CERT Insider Threat Center Inside the origin story and its impact on insider risk theory. 07:00 – Moving to Rockwell: The Hidden OT Backdoor Risk Why insider sabotage in OT environments was a turning point in her career. 08:00 – The Geopolitical Shift in OT Threats How Russia–Ukraine changed everything about attacking critical infrastructure. 10:00 – The Rise of State-Aligned Hacktivists Why groups like Cyber Avengers now have real disruption capability. 13:00 – The SANS Five ICS Controls Dawn breaks down the controls that prevent and detect most attacks. 17:00 – Ransomware Trends in OT Why manufacturing is a prime target and how attacks are evolving. 19:00 – The Promise and Peril of Agentic AI in OT Why autonomous agents could cause catastrophic outcomes. 21:00 – OT-CERT: Free Global Resources How Dragos is empowering organizations worldwide with practical support. Episode Resources: Information on OT-CERT: OT-CERT Register for OT-CERT: Register for Dragos OT-CERT | Dragos Information on Community Defense Program: Community Defense Program | Dragos Register for Community Defense Program: Register for Dragos Community Defense Program | Dragos SANS Five ICS Cybersecurity Critical Controls: The Five ICS Cybersecurity Critical Controls
    Voir plus Voir moins
    28 min
Pas encore de commentaire