2 episodes taggedApproximate match across all podcasts
Home/Tags/WATCH THREATS

WATCH THREATS

All podcast episode summaries matching WATCH THREATS โ€” aggregated across every podcast we track.

2 episodes ยท Page 1/1

โ€œThey're using blockchain, which is an immutable record, which is accessible from all over the place because it's decentralized, in order to pass the command and control commands. The botnet is scanning the blockchain, looking for certain wallets activity. The wallets are basically the identifier or the key to say, hey, this is from me, the criminal, and this is the command. It's kind of brilliant because you can't take the blockchain down.โ€

โ€” Dr. Gerald Auger
Startups & Tech
APR 10, 2026Castle Island Ventures
  • โ€ข

    NYT Satoshi report on Adam Back is unconvincing

    โ€œI found the actual statistical analysis to be incredibly weak because the way you'd really do it is you'd have the corpus of all the Satoshi candidates and then all of Satoshi's work, and then you would just compare it systematically. You wouldn't say, well, let's assume it's this guy, and let's find the things that match.โ€

    โ€” Nic Carter
  • โ€ข

    Len Sassaman remains a top Satoshi candidate

    โ€œThe most compelling piece, I think, is that one of the citations in the white paper is this, paper that was it was the result of a conference that was held in Belgium or Luxembourg. And the conference proceedings, the written version was only made available in a couple universities in the region. And and, of course, Len, he studied in Belgium.โ€

    โ€” Nic Carter
  • โ€ข

    Satoshi might be a group of individuals

    โ€œI'm actually I'm warming up to that because I what I did this morning was I had Claude and chat review all the evidence again, and chat actually ran for two hours. I went through the evidence for the kind of, you know, 10 most commonly named candidates. It doesn't fit any of them, and I am actually starting to believe that for that reason, that it it might have been more than one person.โ€

    โ€” Nic Carter
  • โ€ข

    Quantum threats may force Satoshi to reappear

    โ€œAs this quantum thing gets closer, you're gonna wanna probably, you know, do something to preserve your coins so it don't get stolen by a quantum attacker. If you are alive, you definitely have an obligation and, this urgency to weigh in either recovery of coins or at a very minimum, just make your feelings known.โ€

    โ€” Nic Carter
  • โ€ข

    Upcoming documentary Finding Satoshi seeks the creator

    โ€œThere is, another investigation coming out soon that I've been made aware of. Finding Satoshi. Coinbase is involved. Jameson Lopf, I think, said it was actually a reasonable attempt, which in my book, Jameson is the barometer of whether a Satoshi discovery is legitimate or not.โ€

    โ€” Nic Carter
Startups & Tech
APR 6, 2026Matt McGarry and Ryan Carr
  • โ€ข

    Blockchain-based botnets are nearly impossible to disrupt

    โ€œThey're using blockchain, which is an immutable record, which is accessible from all over the place because it's decentralized, in order to pass the command and control commands. The botnet is scanning the blockchain, looking for certain wallets activity. The wallets are basically the identifier or the key to say, hey, this is from me, the criminal, and this is the command. It's kind of brilliant because you can't take the blockchain down.โ€

    โ€” Dr. Gerald Auger
  • โ€ข

    Ransomware groups are moving vulnerability research in-house

    โ€œTrend Micro published a report titled the near and far future of ransomware business models. It predicts that ransomware organizations will increasingly shift strategy to develop their own vulnerability research rather than using pen test teams or purchasing access credentials. Given that these skills are scarce, it believes some groups will offer researchers first to refuse agreements, paying them for a first look at new exploits.โ€

    โ€” Dr. Gerald Auger
  • โ€ข

    Cloud-specific ransomware is the next major threat

    โ€œThe report also believes that ransomware groups will better optimize operations to focus on targeting cloud infrastructure. This could include development of cloud specific ransomware families designed for unique cloud services. This might sound like news, but this is not news at all, okay? If you've read Nicole Pelaroth's This Is How They Tell Me The World Ends, excellent book, by the way.โ€

    โ€” Dr. Gerald Auger
  • โ€ข

    Cyber briefings qualify for professional certification credits

    โ€œIf you hold professional certifications that require CPEs, each episode of the Daily Cyber Threat Briefing, just like the one we're watching right now together, is worth half a CPE, so two and a half a week, 10 a month, they stack. Be sure to document by saying what's up in chat, by saying team live, team replay. Document literally the easiest and I would argue the most enjoyable to get CPEs.โ€

    โ€” Dr. Gerald Auger
  • โ€ข

    MDR services bridge the gap for mid-sized firms

    โ€œIf your organization is large enough to have cybersecurity concerns, but maybe not quite large enough to build a full-fledged security operations capability from the ground up, which many of us are, check out the managed detection and response offering from Recon InfoSec. Their offering includes the people, process and technology needed to deliver full-spectrum security operations to organizations of any size.โ€

    โ€” Dr. Gerald Auger

Stay in the Loop

Free summaries of top podcasts. More signal, less noise.