

- CABLE KREBS GROUP RANSOMWHERE SOFTWARE
- CABLE KREBS GROUP RANSOMWHERE CODE
- CABLE KREBS GROUP RANSOMWHERE FREE
in computer science from Stanford University, and does research in election security, computer security, and mis/disinformation. Kris Oosthoek is Cyber Threat Intelligence lead with the Dutch government. He is a part-time PhD candidate at Delft University of Technology. His research focuses on cyber-criminal use of Bitcoin. Kris has worked in various technical positions based from the US, UK and Afghanistan. He holds an MSc from Erasmus University and several commercial cyber security certifications such as CISSP, GICSP, GCTI, GXPN, GRID. Website: krisk.In this episode of Security Nation, Jen and Tod chat with Jack Cable, security architect at the Krebs Stamos Group, about Ransomwhere, a crowdsourced ransomware payment tracker. They chat about how Cable came up with the idea, the role of cryptocurrency in tracking these payments, and how better data sharing can help combat the surge in ransomware attacks.
CABLE KREBS GROUP RANSOMWHERE CODE
Stick around for our Rapid Rundown, where Tod and Jen talk about a remote code execution vulnerability that open-source forum provider Discourse experienced recently, which CISA released a notification about over the weekend. Tod highlights some of the many things Discourse is doing right with its security program.

Jack Cable is a security researcher and student at Stanford University, currently working as a security architect at Krebs Stamos Group.
CABLE KREBS GROUP RANSOMWHERE SOFTWARE
The REvil ransomware gang, also known as Sodinokibi, is publicly demanding 70 million to restore the data it's holding ransom after their data-scrambling software affected hundreds of small and medium businesses across a dozen countries including schools in New Zealand and supermarkets in Sweden. Jack formerly served as an Election Security Technical Advisor at CISA, where he led the development and deployment of Crossfeed, a pilot to scan election assets nationwide. But in a conversation with Jack Cable of. Jack is a top-ranked bug bounty hacker, having identified over 350 vulnerabilities in companies including Google, Facebook, Uber, Yahoo, and the US Department of Defense. After placing first in the Hack the Air Force challenge, Jack began working at the Pentagon's Defense Digital Service. Jack was named one of Time Magazine's 25 most influential teens for 2018. Listen to our previous episode with Jack on election security.Īt Stanford, Jack is a research assistant with the Stanford Internet Observatory and Stanford Empirical Security Research Group and launched Stanford's bug bounty program, one of the first in higher education.Read the CISA notification on the critical RCE vulnerability in Discourse.See Discourse's announcement of the vulnerability on GitHub.Peruse Discourse's technical blog post about it.Check out Discourse's security program and policies.
CABLE KREBS GROUP RANSOMWHERE FREE
Like the show? Want to keep Jen and Tod in the podcasting business? Feel free to rate and review with your favorite podcast purveyor, like Apple Podcasts.
