E992: The Next Unicorns: Expanse CEO & Co-founder Tim Junio reduces exposure to online threats by providing “attack surface visibility”, shares insights into current threats from China & Russia, potential 2020 election tampering, reasons for cybersecurity optimism & more – E8 of 10-ep miniseries

E992: The Next Unicorns: Expanse CEO & Co-fou...

Up next

The Self-Driving Startup Nobody Saw Coming | E2289

This Week In Startups is made possible by:IM8 Health: IM8health.com/TWISTSquarespace: Squarespace.com/TWISTRender - Render.com/TWISTSelf-driving just stopped being a science problem and became an engineering challenge instead. That's the through-line of today’s double-header with ...  Show more

How Many Startups Will Survive OpenAI? | E2288

This Week In Startups is made possible by:Pilot -⁠ https://Pilot.com/TWIST⁠Grasshopper Bank -⁠ https://Grasshopper.bank/TWIST⁠Quo -⁠ https://Quo.com/TWiST⁠Plaud - ⁠ https://Plaud.ai/twist⁠Anthropic just declared every unauthorized secondary sale of its stock "void" — naming Hiive, ...  Show more

Recommended Episodes

Chinese threat actors reel in Barracuda appliances. Diicot: the gang formerly known as Mexals, with Romanian ties. Recent Russian cyberespionage against Ukraine and its sympathizers.
CyberWire Daily

A Chinese threat actor exploits a Barracuda vulnerability. The upgraded version of the Android GravityRAT can exfiltrate WhatsApp messages. Cybercriminals pose as security researchers to propagate malware. Updates on the Vidar threat operation. A new Romanian hacking group has em ...  Show more

Criminal-on-criminal action in the dark web. The cyber phases of the hybrid war heat up. ICS vulnerabilities. Codespaces and malware servers. Blank-image attacks. Social engineering.
CyberWire Daily

A hostile takeover of the Solaris contraband market. Ukraine warns that Russian cyberattacks continue. An overview of 2H 2022 ICS vulnerabilities. Codespaces accounts can act as malware servers. Blank-image attacks. Campaigns leveraging HR policy themes. Dinah Davis from Arctic W ...  Show more

Disentangling cybercrime from cyberespionage. A threat to the IoT supply chain. What do you do with the hacktivists when they stop being hacktivists? A retired FBI Special Agent is indicted.
CyberWire Daily

DragonSpark conducts "opportunistic" cyberattacks in East Asia. ProxyNotShell and OWASSRF exploit chains target Microsoft Exchange servers. The IoT supply chain is threatened by exploitation of Realtek Jungle SDK vulnerability. CISA adds an entry to its Known Exploited Vulnerabil ...  Show more

BellaCiao from Tehran; PingPull from Beijing: two cyberespionage tools. SLP exploitation. Ransomware as an international threat. The state of hacktivism. Digital evidence or war crimes.
CyberWire Daily

BellaCiao is malware from Iran's IRGC, while PingPull is malware used by the Chinese government affiliated Tarus Group. Ransomware continues to be a pervasive international threat. An overview of hacktivism. Our guest is CyberMindz founder Peter Coroneos, discussing the importanc ...  Show more