ϳԹ

June 16, 2020

Episode 5: All the President's Data

This episode could be entitled: REvil III as they make a further unwelcome appearance on our show. Now they are demanding a huge ransom from no lesser figure than the President of the United States himself, does that make them terrorists? And Kev went digging around in the Anubis Android malware only to make a quite shocking discovery.

Resources

REvil and Trump:

Kev's Anubis research:

Hacked supercomputer:

About Cyber Humanity

The podcast taking cybersecurity personally
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg.

These weekly podcasts come in two main flavors. We’re either ranting about themes close to the heart of us security types, or we’re discussing threats and vulnerabilities that have hit headlines – or slipped under the radar – in recent weeks.

Join (tech advocate and keeper of the coloring pencils), (pro blue teamer, also known as 'Mr Nothing to CVE here...'), (former dark web detective and pretty cool guy), and (ex-gov. type and ϳԹ product guru) as they wend their way through the murky world of .

Trusted by top
companies worldwide

Customer
Insights

The speed at which Immersive produces technical content is hugely impressive, and this turnaround has helped get our teams ahead of the curve, giving them hands-on experience with serious vulnerabilities, in a secure environment, as soon as they emerge.
TJ Campana
Head of Global Cybersecurity
Operations, HSBC
Realistic simulation of current threats is the only way to test and improve response readiness, and to ensure that the impact of a real attack is minimized. Immersive’s innovative platform, combined with Kroll’s extensive experience, provides the closest thing to replication of a real incident — all within a safe virtual environment.
Paul Jackson
Regional Managing Director,
APAC Cyber Risk, Kroll

Ready to Get Started?
Get a Live Demo.

Simply complete the form to schedule time with an expert that works best for your calendar.