Joining the Dots provides real-world insights from those dedicated to justice, harm reduction, and global security. Hosted by Thomas Drohan, technologist and co-founder of Clue Software, each episode delves into the challenges and triumphs of those on the frontline tackling real issues like child abuse, human trafficking, corruption, organised crime, and fraud. Thomas leverages his experience working with diverse intelligence and investigations teams to explore candid conversations with vict ...
…
continue reading
Clue Software Podcasts
The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.
…
continue reading
At Executive Career Jump we are all about doing everything we can to assist leaders in making job moves. People going through redundancy or job change are six times more likely to suffer from mental health challenges. It can be a tough time. Our hope is that these podcast episodes go some way to helping listeners understand what they want from their career and how to go and get it! Each episode is hosted by one of the UK's leading Career Coaches, Andrew MacAskill and he interviews a range of ...
…
continue reading
In the wake of the disclosure of a serious intrusion at F5 that reportedly lasted about a year, we talk about the details of the disclosure, the potential link to Chinese state actors, the fallout from the attackers' access to source code and bug reports, and what this could mean in the long term.By Decipher
…
continue reading

1
AI Attack and Defense With Adam Meyers and Elia Zaitsev of CrowdStrike
57:26
57:26
Play later
Play later
Lists
Like
Liked
57:26Have you heard about this AI thing? It's wild. Turns out, attackers are using it for all kinds of things we'd rather not have them doing. Dennis Fisher is joined by two experts from CrowdStrike--Adam Meyers, head of counter adversary operations, and Elia Zaitsev, CTO--to talk about how both defenders and attackers are leveraging AI and where things…
…
continue reading

1
More Cl0p Clues and Huge Apple Bug Bounty Changes
14:17
14:17
Play later
Play later
Lists
Like
Liked
14:17This week brings some new insights into the origins and length of the Cl0p extortion attacks tied to the Oracle E-Business Suite vulnerability, big surges in scanning for Cisco ASA, Palo Alto, and Fortinet devices, and a huge upgrade to Apple bug bounty payouts. Plus: Does Dennis have a dog yet? https://security.apple.com/blog/apple-security-bounty…
…
continue reading
What you see on these screens up here is a fantasy; a computer-enhanced hallucination. WarGames may be 42 years old (!) but its prescience about our current technocracy and race to take humans out of the loop is as clear as ever. Dennis Fisher, Lindsey O-Donnell-Welch, Zoe Lindsey, and Pete Baker sit down in front of an IMSAI 8080 with some raw cor…
…
continue reading

1
The Cl0p-Oracle Extortion Emails, Red Hat Breach, and Sad Government News
35:27
35:27
Play later
Play later
Lists
Like
Liked
35:27Dennis and Lindsey dissect a busy week in security news, starting with the Cl0p group's extortion campaign against Oracle customers (3:24), then moving into the Crimson Collective's claimed breach of some of Red Hat GitLab's repos (12:41), and finally the consequences of the expiration of th CISA legislation and de-funding of the MS-ISAC (22:46). P…
…
continue reading
The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes, little bits of data. It's all just electrons. Daniel Cuthbert joins Dennis Fisher to dive into an all-tiime, undisputed hacker movie classic, the 1992 masterpiece, Sneakers. We dissect the movie's genesis, its technical accuracy and prescience, and disc…
…
continue reading

1
New Targeted Phishing Attack Trends With Adam Bateman of Push Security
31:33
31:33
Play later
Play later
Lists
Like
Liked
31:33Adam Bateman, co-founder and CEO of Push Security, joins Dennis Fisher to talk about a new, highly targeted phishing campaign the company uncovered that uses compromised LinkedIn accounts in order to harvest victims' Google or Microsoft credentials through a fake investment, then discuss trends in browser-based attacks and defensive challenges.…
…
continue reading

1
NPM Package Compromises, Sen. Wyden's Ransomware Letter, and Apple's Memory Safety Advance
30:51
30:51
Play later
Play later
Lists
Like
Liked
30:51Dennis and Lindsey discuss the targeted compromises of NPM packages (1:00) and the pointed letter that Sen. Ron Wyden sent to the FTC chairman asking for Microsoft to be held liable for the Ascension ransomware attack last year (11:45) before finally touching on Apple's new memory safety technology for new iPhones (20:43). NPM compromise: https://d…
…
continue reading

1
The Salesloft Drift Fallout and SBOM Guidance From CISA and NSA
28:53
28:53
Play later
Play later
Lists
Like
Liked
28:53Dennis and Lindsey talk through the continuing fallout of the Salesloft Drift incident (2:05) in light of the disclosure of several new companies that are involved, including Cloudflare, which published an excellent post-mortem on the intrusion. Then they discuss the new Shared Vision of SBOM for Cybersecurity published by CISA, NSA, and many forei…
…
continue reading
We are so back! After a bit of a hiatus, we're very excited to be back with new Decipher content for you in all of the old familiar places. And also some new ones. Join Decipher editors Dennis Fisher and Lindsey O'Donnell-Welch as we start our new, independent phase, talk about what we've been up to, and discuss our plans for what fun stuff we have…
…
continue reading

1
Will Lyne & Matt Horne: Cybercrime, national security, and the fight for resilience
30:45
30:45
Play later
Play later
Lists
Like
Liked
30:45Thomas is joined by Will Lyne, former Deputy Director of the National Crime Agency’s Cyber Intelligence team, and Matt Horne, Director of Intelligence and Investigations at Clue and Chair of TechUK’s National Security Committee, for a fireside chat on today’s rapidly evolving threat landscape. They explore how cybercrime has transformed into a glob…
…
continue reading

1
Anna Rowe: How being catfished sparked an online safety movement
59:36
59:36
Play later
Play later
Lists
Like
Liked
59:36In this powerful episode, Thomas sits down with Anna Rowe – survivor, activist, and founder of Catch the Catfish – to uncover the disturbing reality of romance fraud. Anna shares her deeply personal journey, from being manipulated by a serial fraudster living a double life to becoming one of the UK’s leading voices on deception in online dating. To…
…
continue reading

1
Will Lyne – Operation Destabilise: Inside a global crypto-laundering network
42:48
42:48
Play later
Play later
Lists
Like
Liked
42:48Join Thomas for a remarkable conversation with Will Lyne, former Deputy Director and Head of Cyber Intelligence at the UK’s National Crime Agency, as they unpack Operation Destabilise – a landmark investigation into one of the world’s most prolific money laundering networks. What began with tracking ransomware payments on the blockchain led Will’s …
…
continue reading

1
Alex Rothwell – Fighting Fraud at the Heart of the NHS
48:02
48:02
Play later
Play later
Lists
Like
Liked
48:02Join Thomas for a compelling conversation with Alex Rothwell, CEO of the NHS Counter Fraud Authority, as they delve into one of the UK’s most complex and emotive crime landscapes: fraud in the National Health Service. From insider threats and procurement scams to multi-million-pound prescription fraud and criminal infiltration of NHS supply chains,…
…
continue reading

1
Professor Mark Button – Inside West Africa’s cybercrime ‘kingdoms’
55:36
55:36
Play later
Play later
Lists
Like
Liked
55:36Mark Button – Inside West Africa’s cybercrime ‘kingdoms’ Join Thomas for a revealing conversation with Professor Mark Button, Director of the Centre for Cybercrime and Economic Crime at the University of Portsmouth, as they delve into the hidden world of global fraud and the rise of sophisticated scam networks across West Africa. Drawing on years o…
…
continue reading

1
Laura Eshelby: The new age of fraud - and how to fight it
48:08
48:08
Play later
Play later
Lists
Like
Liked
48:08Join Thomas for a compelling conversation with Laura Eshelby, former Cabinet Office counter fraud leader, as she unpacks two decades on the front lines of the UK’s fight against fraud. Starting her career as a graduate trainee and auditor, Laura quickly rose through the ranks to lead complex financial investigations into high-value legal aid fraud.…
…
continue reading

1
Nick Sharp – Inside the UK’s war on economic crime
52:20
52:20
Play later
Play later
Lists
Like
Liked
52:20Join Thomas for a revealing conversation with Nick Sharp, Deputy Director of the National Economic Crime Centre (NECC), as they unravel the hidden web of fraud and financial crime that’s costing the UK billions every year. From romance scams and impersonation fraud to international laundering networks stretching from Southeast Asia to West Africa, …
…
continue reading

1
Martin Dubbey – From drug busts to the Sochi doping scandal
50:59
50:59
Play later
Play later
Lists
Like
Liked
50:59Join Thomas as he speaks with Martin Dubbey, a former UK drug liaison officer turned international investigator, whose career spans from narcotics investigations in Customs and Excise to exposing one of the most audacious doping scandals in modern sport. Martin shares how his transition into private investigation led him to work alongside whistlebl…
…
continue reading

1
Sarah Lewis OBE OLY – From Olympic slopes to anti-doping pioneer
44:46
44:46
Play later
Play later
Lists
Like
Liked
44:46Join Thomas as he dives into a fascinating conversation with Sarah Lewis OBE OLY, Olympic ski racer turned Secretary General of the International Skiing Federation (FIS), where she spent over two decades leading one of sport’s most crucial but complex battles - anti-doping. From the explosive Lahti scandal in 2001 to the shocking revelations at the…
…
continue reading

1
Ian Smith: Esports – a game-changer for sports integrity?
1:04:25
1:04:25
Play later
Play later
Lists
Like
Liked
1:04:25In this episode, Ian Smith, Commissioner of the Esports Integrity Commission (ESIC), explores the fast-growing world of esports and its integrity challenges. Drawing from his experience tackling match-fixing in cricket, Ian explains his move into esports, where competitive gaming has surged in popularity, with players earning significant incomes an…
…
continue reading

1
Neville Blackwood – On the frontlines of global law enforcement
58:48
58:48
Play later
Play later
Lists
Like
Liked
58:48In this episode, Thomas sits down with Neville Blackwood, a seasoned international law enforcement consultant and former senior police officer, to delve into the complexities of global policing. Neville recounts his journey from joining Thames Valley Police in 1982 to leading undercover operations against organised crime in Europe, which fueled his…
…
continue reading

1
The Sony Hack Ten Years Later With Brian Raftery
45:17
45:17
Play later
Play later
Lists
Like
Liked
45:17The Sony Pictures hack in 2014 by the North Korean Lazarus Group was a seminal event both in Hollywood and in the security community, bringing to light the capabilities and ambitions of North Korean attackers and showing the damage a leak of sensitive data can be. Brian Raftery joins Dennis Fisher to discuss his new Ringer podcast, The Hollywood Ha…
…
continue reading

1
Zero Day Reuse and A Busy Week for Iranian APTs
18:32
18:32
Play later
Play later
Lists
Like
Liked
18:32The focus was on Iranian APTs this week, both from private threat intelligence teams and CISA, exposing new operations from UNC757 and other groups targeting government, higher education, and private industry. We also check in on a new report from Google's Threat Analysis Group on APTs using the same exploits for zero days that were developed by pr…
…
continue reading

1
Reddit's Matt Johansen on Identity Attacks, Enterprise Security, and Burnout
31:42
31:42
Play later
Play later
Lists
Like
Liked
31:42Reddit's head of software security Matt Johansen joins Dennis Fisher to talk about the highlights of Black Hat USA, the challenges of sorting security priorities in a large enterprise, and how he's learned to take care of his mental health after many years in the security industry.By Decipher
…
continue reading

1
Phil Suddick – From covert law enforcement to sports integrity
1:08:15
1:08:15
Play later
Play later
Lists
Like
Liked
1:08:15Join Thomas as he delves into an enthralling conversation with Phil Suddick, the Head of Sport and Safeguarding at Clue Software, unravelling his remarkable career journey from law enforcement to becoming a torchbearer for sports integrity. Drawing from his specialised background in covert operations, Phil unveils how his prowess in undercover inte…
…
continue reading

1
Rebekah Brown and John Scott-Railton on COLDRIVER and Russian Cyberespionage
23:12
23:12
Play later
Play later
Lists
Like
Liked
23:12Rebekah Brown and John Scott-Railton of the Citizen Lab join Dennis Fisher to dive into their group's new report on highly targeted spear phishing campaigns by the Russian threat actor COLDRIVER and then discuss the emergence of a new, possibly related group called COLDWASTREL.By Decipher
…
continue reading
Dennis Fisher and Lindsey O'Donnell-Welch reflect on their week in Las Vegas at Black Hat and discuss the talks they liked, including Moxie Marlinspike's keynote and the Google Project Zero retrospective, and the other topics they found interesting, including vulnerability exploitation versus social engineering and the AI ecosystem.…
…
continue reading

1
Adam Pacifico – Developing a mindset for investigative leadership
1:10:27
1:10:27
Play later
Play later
Lists
Like
Liked
1:10:27Thomas joins Adam Pacifico, as the lawyer and leadership podcaster shares his unconventional career trajectory from barrister to police officer and back. This episode explores how technology shaped Adam’s work in law over the years and underscores the importance of meticulous detail and rationale in investigations. Discover how the passage of time …
…
continue reading

1
Black Hat Podcast: Josh Harguess and Chris Ward
26:52
26:52
Play later
Play later
Lists
Like
Liked
26:52At Black Hat USA this year, Josh Harguess and Chris Ward, with Cranium AI, talk about the security challenges that organizations are experiencing while implementing AI in their environments, what AI red teaming consists of and the backstory of how MITRE Labs’ AI Red Team came to be.By Decipher
…
continue reading
AI and machine learning security expert Gary McGraw joins Dennis Fisher to discuss the concept of data feudalism in LLM foundation models, what the security implications of it are, and whether narrowly focused models may help address these issues.By Decipher
…
continue reading

1
Black Hat USA 2024 Preview: AI, AI, and More AI
46:46
46:46
Play later
Play later
Lists
Like
Liked
46:46Decipher editors Dennis Fisher and Lindsey O"Donnell-Welch are joined by Brian Donohue to dissect the Black Hat talks they're looking forward to, including sessions with H D Moore, Sherrod DeGrippo, and Moxie Marlinspike, and some talks they can't quite figure out from the titles.By Decipher
…
continue reading
The fallout from the CrowdStrike outage continues more than a week after the faulty update, so Huntress security researcher John Hammond joins Dennis Fisher to talk about the lessons learned from the incident, our fragile software ecosystem, and what cybersecurity practitioners can do differently next time.…
…
continue reading
Tyler Healy, CISO of Digital Ocean, joins Dennis Fisher to discuss the unique challenges of defending a huge platform, how AI is changing things for defenders, and what new challenges AI might bring in the near future.By Decipher
…
continue reading

1
Matt Horne - The evolution of UK organised crime
59:27
59:27
Play later
Play later
Lists
Like
Liked
59:27Join Thomas as he delves into the intricate world of organised crime and technology with Matt Horne, a former detective with a distinguished 30-year career in law enforcement. As the former Deputy Director of Investigations at the National Crime Agency, Matt led Operation Venetic, a groundbreaking UK operation that dismantled an encrypted communica…
…
continue reading

1
What Happened With the CrowdStrike Update and Azure Outage
11:47
11:47
Play later
Play later
Lists
Like
Liked
11:47CrowdStrike said a problem with an update the company pushed to Falcon sensors on Windows hosts on July 18 caused a blue screen of death, an issue that coincided with a Microsoft Azure outage and widespread outages across airlines, banks, hospitals, and other services. Our story on this incident: https://duo.com/decipher/crowdstrike-windows-update-…
…
continue reading
FIN7 is a highly active and capable cybercrime group also known as Carbanak that has been evolving and using its own tools such as AVNeutralizer for many years. SentinelOne researchers Antonio Cocomazzi helps us dig into the group's tactics and tools. Read Antonio's new research here: https://www.sentinelone.com/labs/fin7-reboot-cybercrime-gang-enh…
…
continue reading
Former NSA Deputy Director George Barnes joins Dennis Fisher to talk about his 35-year career at the agency, how he came to be intrigued by the cybersecurity world, the emergence of Cyber Command as a force inside the government, and what he sees as the priorities for defenders now.By Decipher
…
continue reading

1
Peter Spindler - The enduring legacy of Operation Yewtree
1:12:47
1:12:47
Play later
Play later
Lists
Like
Liked
1:12:47In this compelling episode, Thomas sits down with Peter Spindler to delve into his distinguished career in law enforcement, spotlighting his pivotal role in Operation Yewtree. Spindler shares his journey from joining the police to spearheading one of the most significant investigations in UK history - the probe into sexual abuse allegations against…
…
continue reading
Chris Hughes, co-founder of Aquia and a Cyber Innovation Fellow at the Cybersecurity and Infrastructure Security Agency, joins Dennis Fisher to talk about the challenges of supply chain security, working with the government to address systemic issues, and the importance of collaboration.By Decipher
…
continue reading

1
The TeamViewer Breach and a Busy Week for APT29
10:07
10:07
Play later
Play later
Lists
Like
Liked
10:07Dennis Fisher and Lindsey O'Donnell-Welch dig into the news of the TeamViewer corporate breach, attributed to APT29/Midnight Blizzard, and news of more victims from the Microsoft intrusion by the same group earlier this year.By Decipher
…
continue reading

1
Alex Wood - Inside financial crime with a reformed fraudster
59:44
59:44
Play later
Play later
Lists
Like
Liked
59:44Join Thomas as he enters the complex world of financial crime with reformed fraudster Alex Wood, and Clue Software’s Director of Intelligence and Investigations, Matt Horne, a seasoned former law enforcement leader and economic crime expert. With raw honesty, Alex recounts his past transgressions, unveiling how he exploited vulnerabilities to orche…
…
continue reading

1
Cisco Talos: How Threat Actors Target MFA
15:42
15:42
Play later
Play later
Lists
Like
Liked
15:42Multi-factor authentication (MFA) is a critical form of defense for organizations, and threat actors are recognizing that: According to the latest Cisco Talos Incident Response Quarterly Trends report, instances related to MFA were involved in some capacity in half of all security incidents that the Talos team responded to in the first quarter of 2…
…
continue reading
Metin Kortak, CISO with Rhymetec, talks about how organizations are approaching data privacy and security compliance, and thinking about risk management policies, when it comes to generative AI in the workplace.By Decipher
…
continue reading
Michael Mann's 1995 thriller Heat is considered by many people to be the best crime movie ever made. And hidden inside the intricate plot is a story of a lone hacker with a background at DARPA who uses his skills to set up scores for the crews in LA's underworld. Meg Gardiner, the co-author of Heat 2, and Casey Ellis, cofounder of Bugcrowd, join De…
…
continue reading

1
Introducing Joining the Dots with Thomas Drohan
0:51
0:51
Play later
Play later
Lists
Like
Liked
0:51Joining the Dots provides real-world insights from those dedicated to justice, harm reduction, and global security. Hosted by Thomas Drohan, technologist and co-founder of Clue Software, each episode delves into the challenges and triumphs of those on the frontline tackling real issues like child abuse, human trafficking, corruption, organised crim…
…
continue reading
Amy Bogac, a longtime security executive with a deep background in systems administration and networking, joins Dennis Fisher to talk about how she came to security, how her background in communications informed her career choices, and the difficult conversations that need to occur before someone has to push the button during an incident.…
…
continue reading
A few days after Microsoft announced the new AI-enabled Recall feature--generating tremendous concerns and pushback from the security and privacy communities--the company had decided to disable it by default, but many concerns still remain. A month after the company's CEO proclaimed that it would be "prioritizing security above all else", how did t…
…
continue reading

1
The Challenges of Reporting on Complex Intrusions With Ryan Naraine
26:13
26:13
Play later
Play later
Lists
Like
Liked
26:13Veteran security journalist and podcaster Ryan Naraine joins the Decipher podcast to discuss the challenges of separating fact from fiction when reporting on complex incidents such as the Snowflake breach.By Decipher
…
continue reading
Garrett Yamada, associate director of identity security at Texas A&M University, talks about his experiences navigating identity challenges, building an identity-centric strategy and moving away from “home-grown, home-managed systems” that were historically used for authentication.By Decipher
…
continue reading
Sarah Powazek, the Program Director of Public Interest Cybersecurity at the UC Berkeley Center for Long-Term Cybersecurity, joins Dennis Fisher to talk about her work in setting up Cybersecurity Clinics at high education institutions around the country to help bring knowledge and skills to underserved organizations.…
…
continue reading