Cyber Threats Against the SuperBowl

“We saw a lot more cyber activity, collectively, the group I should say, the week leading up to the Superbowl than the actual day of…Leading up to that we did see some concerted attacks…Interestingly enough we saw them in the local government realm and also the NFL getting hit with the same attempted attacks so we have a high degree of confidence that it was the same threat actor or group.”
-Lester Godsey, Chief Information Security Officer, Maricopa County

One of Biggest Bitcoin Holders

“A lot of people don’t realize that actually one the greatest holders of Bitcoin today, in 2023, is in fact the U.S Government.”
-Sam Lyman, Director of Public Policy Riot Platforms, Forbes Contributor

Threat Actors Penetrating Mobile Networks

“Whenever you connect foreign (mobile) networks together in a private or pseudo private (“highly vulnerable”) network backbone all kinds of bad things happen…Hundreds of actors have been able to penetrate these (mobile) networks and exploit those vulnerabilities…Written in to the mobile standards are a number of different protocol parameters…There are addresses that are leased openly…If they get access, they (threat actors) can freely conduct location surveillance, intercept text messages and phone calls.”
-Gary Miller, Mobile Security Researcher, Citizen Lab

Class Action Data Breach Lawsuits

“When it comes to litigation and class actions lawsuits from a data breaches, the only folks who really generally benefit are the class action attorneys…Not to say they shouldn’t; they are doing the work…More importantly it serves as a deterrent for organizations to make sure that their security and privacy practices are in place.”
-Ryan Johnson, Data Privacy Attorney & Chief Privacy Officer at Savas

Inherent Vulnerability of Mobile Networks

“I have your phone number but what I really want to understand is approximately where you are... Is your phone number live? Is your phone turned on? If so, are you in the U.S or roaming in another network? This HLR query is used primarily in traditional SMS transactions…This is just a normal part of SMS flow…Well threat actors use that as well.”
-Gary Miller, Mobile Security Researcher, Citizen Lab

Electronic Warfare in Space

"There are definitely examples of sensor degradation, and frequency degradation, interference, that other countries are testing, trying, doing, in space; and all of our systems are just susceptible in space as they would be terrestrially. You might even say more so because it takes so long for us to make big changes in space and then actually have those be proliferated in our constellations."
-Mark Reed, Chief Operating Officer, Katalyst Space Technologies

Where Can You Find RealTime Cyber's Podcast?

The RealTime Cyber Podcast can be found on Youtube, Apple Podcasts, Google Podcasts, or any of the major podcast platforms. If you like our podcast leave us a review, lets get it to #1 cybersecurity podcast!

Blog Author Image
Tom Kelly