E992: The Next Unicorns: Expanse CEO & Co-founder Tim Junio reduces exposure to online threats by providing “attack surface visibility”, shares insights into current threats from China & Russia, potential 2020 election tampering, reasons for cybersecurity optimism & more – E8 of 10-ep miniseries

E992: The Next Unicorns: Expanse CEO & Co-fou...

Up next

Avoiding buzzwords and marketing-speak (feat. Thomas McInerney) | E2236

This Week In Startups is made possible by:Lemon.io - https://lemon.io/twistDeel - http://deel.com/twistLinkedIn Jobs - http://linkedIn.com/twistToday’s show: Some pitches sound just like ads… and it’s a huge red flag for investors.On our latest edition of TWiST Tokyo, Jason welco ...  Show more

Japan’s Startup Revolution (feat. Kathy Matsui) | E2235

This Week In Startups is made possible by:Every.io - http://every.io/LinkedIn Jobs - https://www.linkedin.com/twistZite - http://zite.com/twistToday’s show: Why do 40% of Japanese students want to build a company rather than join the corporate workforce?On TWiST, Jason considers ...  Show more

Recommended Episodes

Chinese threat actors reel in Barracuda appliances. Diicot: the gang formerly known as Mexals, with Romanian ties. Recent Russian cyberespionage against Ukraine and its sympathizers.
CyberWire Daily

A Chinese threat actor exploits a Barracuda vulnerability. The upgraded version of the Android GravityRAT can exfiltrate WhatsApp messages. Cybercriminals pose as security researchers to propagate malware. Updates on the Vidar threat operation. A new Romanian hacking group has em ...  Show more

Criminal-on-criminal action in the dark web. The cyber phases of the hybrid war heat up. ICS vulnerabilities. Codespaces and malware servers. Blank-image attacks. Social engineering.
CyberWire Daily

A hostile takeover of the Solaris contraband market. Ukraine warns that Russian cyberattacks continue. An overview of 2H 2022 ICS vulnerabilities. Codespaces accounts can act as malware servers. Blank-image attacks. Campaigns leveraging HR policy themes. Dinah Davis from Arctic W ...  Show more

Disentangling cybercrime from cyberespionage. A threat to the IoT supply chain. What do you do with the hacktivists when they stop being hacktivists? A retired FBI Special Agent is indicted.
CyberWire Daily

DragonSpark conducts "opportunistic" cyberattacks in East Asia. ProxyNotShell and OWASSRF exploit chains target Microsoft Exchange servers. The IoT supply chain is threatened by exploitation of Realtek Jungle SDK vulnerability. CISA adds an entry to its Known Exploited Vulnerabil ...  Show more

BellaCiao from Tehran; PingPull from Beijing: two cyberespionage tools. SLP exploitation. Ransomware as an international threat. The state of hacktivism. Digital evidence or war crimes.
CyberWire Daily

BellaCiao is malware from Iran's IRGC, while PingPull is malware used by the Chinese government affiliated Tarus Group. Ransomware continues to be a pervasive international threat. An overview of hacktivism. Our guest is CyberMindz founder Peter Coroneos, discussing the importanc ...  Show more