by The InfoSec Mission
The Hackle Box is a monthly cyber threat intel discussion where Oscar Minks and members of FRSecure's technical services team (Team Ambush) break down the latest trends in the information security industry involving hacking techniques, vulnerabilities, exploits, and more.
Language
🇺🇲
Publishing Since
9/13/2021
Email Addresses
1 available
Phone Numbers
0 available
April 14, 2025
In this month's edition of the Hackle Box, the guys are joined by Kevin Gunter, a penetration tester at FRSecure, to discuss "Xanthorox AI," a record-breaking $75M ransomware demand, a US Treasury breach going back to 2023, and Neptune RAT.<br /><br />Links:<br /><ul><li>"Autonomous, GenAI-Driven Attacker Platform Enters the Chat"<ul><li>https://www.darkreading.com/threat-intelligence/autonomous-genai-attacker-platform-chat </li></ul></li><li>"Fortune 50 Co. Pays Record-Breaking $75M Ransomware Demand"<ul><li>https://www.darkreading.com/threat-intelligence/fortune-50-company-pays-record-breaking-75m-ransomware-demand</li></ul></li><li>"Hackers lurked in Treasury OCC’s systems since June 2023 breach"<ul><li>https://www.bleepingcomputer.com/news/security/hackers-lurked-in-treasury-occs-systems-since-june-2023-breach/</li></ul></li><li>"NEPTUNE RAT : An advanced Windows RAT with System Destruction Capabilities and Password Exfiltration from 270+ Applications"<ul><li>https://www.cyfirma.com/research/neptune-rat-an-advanced-windows-rat-with-system-destruction-capabilities-and-password-exfiltration-from-270-applications/</li></ul></li></ul>To stay updated on all things The Hackle Box, sign up to receive our newsletters: https://frsecure.com/cyber-threat-intel-series/<br /><br />Please like, subscribe, and follow us on social!<br />LinkedIn: https://www.linkedin.com/company/frsecure/<br />Instagram: https://www.instagram.com/frsecureofficial/<br />Facebook: https://www.facebook.com/frsecure/<br />BlueSky: https://bsky.app/profile/frsecure.bsky.social<br /><br />About FRSecure:<br />https://frsecure.com/<br />FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can’t do it alone. Whether you’re wondering where to start, or looking for a team of experts to collaborate with you, we are ready to serve.<br />
March 18, 2025
Approaching the end of Q1, this special-edition episode answers questions from the audience including the U.S. Cyber Command's suspended operations against Russia and some essential beard maintenance. Security Analyst Tim Boyer sits in for Pinky to fill the blue team perspective. <br /><br />Now happening quarterly, listeners can ask all things security to our expert crew! The next Q & A Session will be held June 13th. Submit questions to our survey here: https://www.surveymonkey.com/r/thehacklebox <br /><br />To stay updated on all things The Hackle Box, sign up to receive our newsletters: <a href="https://frsecure.com/cyber-threat-intel-series/" target="_blank" rel="noreferrer noopener">https://frsecure.com/cyber-threat-intel-series/</a> <br /><br />Please like, subscribe, and follow us on social! <br /><br />LinkedIn: <a href="https://www.facebook.com/frsecure/" target="_blank" rel="noreferrer noopener">https://www.facebook.com/frsecure/</a> <br />Instagram:<a href="https://www.instagram.com/frsecureofficial/" target="_blank" rel="noreferrer noopener"> https://www.instagram.com/frsecureofficial/</a> <br />Facebook: <a href="https://www.facebook.com/frsecure/" target="_blank" rel="noreferrer noopener">https://www.facebook.com/frsecure/</a> <br />BlueSky: <a href="https://bsky.app/profile/frsecure.bsky.social" target="_blank" rel="noreferrer noopener">https://bsky.app/profile/frsecure.bsky.social</a> <br /><br /><b>About FRSecure: </b><br />https://frsecure.com/ <br /><br />FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can’t do it alone. Whether you’re wondering where to start, or looking for a team of experts to collaborate with you, we are ready to serve.
February 18, 2025
Oscar, Pinky, and Eric dive into DeepSeek, the downward trend of Ransomware extortions, and new, actively exploited vulnerabilities.<br /><br />Links:<br />"DeepSeek App Transmits Sensitive User and Device Data Without Encryption" <a href="https://thehackernews.com/2025/02/deepseek-app-transmits-sensitive-user.html" target="_blank" rel="noreferrer noopener">https://thehackernews.com/2025/02/deepseek-app-transmits-sensitive-user.html </a><br /><br />"DeepSeek AI Database Exposed: Over 1 Million Log Lines, Secret Keys Leaked" <a href="https://thehackernews.com/2025/01/deepseek-ai-database-exposed-over-1.html" target="_blank" rel="noreferrer noopener">https://thehackernews.com/2025/01/deepseek-ai-database-exposed-over-1.html </a><br /><br />"Ransomware Extortion Drops to $813.5M in 2024, Down from $1.25B in 2023" <a href="https://thehackernews.com/2025/02/ransomware-extortion-drops-to-8135m-in.html" target="_blank" rel="noreferrer noopener">https://thehackernews.com/2025/02/ransomware-extortion-drops-to-8135m-in.html </a><br /><br />"CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25" <a href="https://thehackernews.com/2025/02/cisa-adds-four-actively-exploited.html" target="_blank" rel="noreferrer noopener">https://thehackernews.com/2025/02/cisa-adds-four-actively-exploited.html </a><br /><br />"Palo Alto Networks Patches Authentication Bypass Exploit in PAN-OS Software" <a href="https://thehackernews.com/2025/02/palo-alto-networks-patches.html" target="_blank" rel="noreferrer noopener">https://thehackernews.com/2025/02/palo-alto-networks-patches.html </a><br /><br />Please like, subscribe, and follow us on social! <br /><ul><li>Facebook: <a href="https://www.facebook.com/frsecure/" target="_blank" rel="noreferrer noopener">https://www.facebook.com/frsecure/ </a></li><li>Twitter: <a href="https://twitter.com/frsecure/" target="_blank" rel="noreferrer noopener">https://twitter.com/frsecure/ </a></li><li>Instagram: <a href="https://www.instagram.com/frsecureofficial/" target="_blank" rel="noreferrer noopener">https://www.instagram.com/frsecureofficial/ </a></li><li>LinkedIn: <a href="https://www.linkedin.com/company/frsecure/" target="_blank" rel="noreferrer noopener">https://www.linkedin.com/company/frsecure/ </a></li></ul><br /><br /><b>About FRSecure: </b><br />https://frsecure.com/ <br /><br />FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can’t do it alone. Whether you’re wondering where to start, or looking for a team of experts to collaborate with you, we are ready to serve.
Black Hills Information Security
N2K Networks
CISO Series
Jim Love
Graham Cluley & Carole Theriault
Anton Chuvakin
Unknown author
Microsoft
Pod Engine is not affiliated with, endorsed by, or officially connected with any of the podcasts displayed on this platform. We operate independently as a podcast discovery and analytics service.
All podcast artwork, thumbnails, and content displayed on this page are the property of their respective owners and are protected by applicable copyright laws. This includes, but is not limited to, podcast cover art, episode artwork, show descriptions, episode titles, transcripts, audio snippets, and any other content originating from the podcast creators or their licensors.
We display this content under fair use principles and/or implied license for the purpose of podcast discovery, information, and commentary. We make no claim of ownership over any podcast content, artwork, or related materials shown on this platform. All trademarks, service marks, and trade names are the property of their respective owners.
While we strive to ensure all content usage is properly authorized, if you are a rights holder and believe your content is being used inappropriately or without proper authorization, please contact us immediately at [email protected] for prompt review and appropriate action, which may include content removal or proper attribution.
By accessing and using this platform, you acknowledge and agree to respect all applicable copyright laws and intellectual property rights of content owners. Any unauthorized reproduction, distribution, or commercial use of the content displayed on this platform is strictly prohibited.