Episodios

  • React2Shell (CVE-2025-55182), 41% of Infostealer Victims Infected by Video Game Files
    Dec 11 2025

    On this episode of Leaky Weekly, host and security researcher Nick Ascoli discusses findings from Flare Research including:

    • React2Shell (CVE-2025-55182) vulnerability and threat actor chatter
    • Findings from analysis of 50,000 stealer log infections

    He also mentions instructions for a giveaway for CTF players who would like another shot at unlocking a shirt from a past challenge…

    Here are the resources on the stories:

    • React2Shell Detailed Report (Lachlan Davis) http://react2shell.com
    • React2Shell (CVE-2025-55182): A Critical RCE in React Server Components (Flare): https://flare.io/learn/resources/blog/react2shell-cve-2025-55182/?utm_source=Social&utm_medium=Flare+Podcast&utm_campaign=Leaky+Weekly&utm_content=E18
    • How Gamers Became Cybercrime’s Favorite Target: Analysis of 50,000 Infostealer Infections (Flare): https://flare.io/learn/resources/cybercrime-favorite-target-gamers/?utm_source=Social&utm_medium=Flare+Podcast&utm_campaign=Leaky+Weekly&utm_content=E18

    Brought to you by Flare, Threat Exposure Management solution and industry-leading dataset on cybercrime that integrates into your security program in 30 minutes. Check out what’s on the dark web (and more) about your organization: https://try.flare.io/free-trial/?utm_source=Social&utm_medium=Flare+Podcast&utm_campaign=Leaky+Weekly&utm_content=E18

    Check out Flare Academy: https://flare.io/flare-academy/?utm_source=Social&utm_medium=Flare+Podcast&utm_campaign=Leaky+Weekly&utm_content=E18

    • Our free training series led by experts on critical topics such as threat intelligence, operational security, and advanced investigation techniques (earn CPE credits towards cybersecurity certifications)
    • Our Discord community is a space to learn from and with cybersecurity professionals (including Nick!) and students, check out previous training resources, and keep up with upcoming training
    Más Menos
    9 m
  • Attack on Identity: Dissecting Microsoft’s 2025 Digital Defense Report
    Nov 6 2025

    On this episode of Leaky Weekly, host and security researcher Nick Ascoli and Flare’s Identity Security Expert Mike Iaconianni dig into their responses and questions to the Microsoft 2025 Digital Defense Report.

    Here are the resources on the stories:

    • Microsoft Digital Defense Report 2025 https://www.microsoft.com/en-us/corporate-responsibility/cybersecurity/microsoft-digital-defense-report-2025/
    • Screenshot.jpg (When They Got Hacked) by John Hammond https://www.youtube.com/watch?v=4h-bCHVFOs4

    Brought to you by Flare, Threat Exposure Management solution and industry-leading dataset on cybercrime that integrates into your security program in 30 minutes. Check out what’s on the dark web (and more) about your organization.

    Check out Flare Academy:

    • Our free training series led by experts on critical topics such as threat intelligence, operational security, and advanced investigation techniques (earn CPE credits towards cybersecurity certifications)
    • Our Discord community is a space to learn from and with cybersecurity professionals (including Nick!) and students, check out previous training resources, and keep up with upcoming training
    Más Menos
    25 m
  • NPM Supply Chain Attack, Fake Europol Bounty, and Operation Secure
    Oct 8 2025

    On this episode of Leaky Weekly, host and security researcher Nick Ascoli covers the NPM supply chain attack, fake Europol bounty, and Operation Secure.

    Here are the resources on the stories:

    • Largest NPM attack in crypto history stole less than $50: SEAL (Cointelgraph)
    • Breakdown: Widespread npm Supply Chain Attack Puts Billions of Weekly Downloads at Risk (Palo Alto Networks)
    • The largest supply-chain attack ever… (Fireship, The Code Report)
    • 2 Billion npm Downloads at Risk From Crypto Malware: A Wake-Up Call for Open-Source Supply Chain Security (OPSWAT)
    • Self-Replicating Worm Hits 180+ npm Packages to Steal Credentials in Latest Supply Chain Attack (The Hacker News)
    • Europol confirms $50,000 Qilin ransomware reward is fake (BleepingComputer)
    • 20,000 malicious IPs and domains taken down in INTERPOL infostealer crackdown (INTERPOL)
    • Operation Secure: Trend Micro's Threat Intelligence Fuels INTERPOL's Infostealer Infrastructure Takedown  (Trend Micro)

    Brought to you by Flare, Threat Exposure Management solution and industry-leading dataset on cybercrime that integrates into your security program in 30 minutes. Check out what’s on the dark web (and more) about your organization.

    Check out Flare Academy:

    • Our free training series led by experts on critical topics such as threat intelligence, operational security, and advanced investigation techniques (earn CPE credits towards cybersecurity certifications)
    • Our Discord community is a space to learn from and with cybersecurity professionals (including Nick!) and students, check out previous training resources, and keep up with upcoming training
    Más Menos
    8 m
  • Spilling the Tea on the Tea App and TeaOnHer, and Salesforce Tenant Breaches
    Sep 10 2025

    On this episode of Leaky Weekly, host and security researcher Nick Ascoli spills the tea on data leaks from Tea and TeaOnHer, as well as attacks on Salesforce tenants.

    Here are the resources on the stories:

    • The Cost of a Call: From Voice Phishing to Data Extortion (Google Threat Intelligence Group)
    • ShinyHunters behind Salesforce data theft attacks at Qantas, Allianz Life, and LVMH (BleepingComputer)
    • Hackers steal images from women's dating safety app that vets men (BBC)
    • Tea app leak worsens with second database exposing user chats (BleepingComputer)
    • TeaOnHer, a rival Tea app for men, is leaking users’ personal data and driver’s licenses (TechCrunch)

    Brought to you by Flare, Threat Exposure Management solution and industry-leading dataset on cybercrime that integrates into your security program in 30 minutes. Check out what’s on the dark web (and more) about your organization.

    Flare now offers Flare Academy training, which is our (free!) training series led by experts that cover critical topics such as threat intelligence, operational security, and advanced investigation techniques. You can also earn CPE credits toward your cybersecurity certifications. Sign up for your next training here. Join the Flare Academy Community Discord to keep up with upcoming training, check out previous training resources, chat with cybersecurity professionals (including Nick!), and more.

    Más Menos
    10 m
  • Use a Stealer Log, Go to Prison (Part 2): PowerSchool and Snowflake Tenant Breach Arrests
    Aug 27 2025

    On this episode of Leaky Weekly, host and security researcher Nick Ascoli gets into stealer logs and arrests in the last few weeks of the threat actors who targeted PowerSchool and Snowflake tenants. This is part 2 of a 2 part series, Use a Stealer Log, Go to Prison. Missed part 1? Check it out here on Apple Podcasts or Spotify.

    Here are the resources on the stories:

    • Cybersecurity Incident Notice (PowerSchool)
    • Matthew Lane Plea Deal (Thomson Reuters)
    • United States v. Matthew D. Lane (U.S. Department of Justice)
    • Update on New PowerSchool Data Breach and Ongoing Protection Measures (Union Intermediate School, Sampson County Schools)
    • A hacker's ransom: Inside the cyberattack that compromised NC student and teacher records (WRAL)
    • Leaky Weekly: PowerSchool Hack; Takedowns & Arrests & Leaks, Oh My!; and ITRC Breach Report (Flare)
    • Hacker in Snowflake Extortions May Be a U.S. Soldier (Krebs on Security)
    • United States v. Moucka (CourtListener)
    • Former U.S. Soldier Pleads Guilty to Hacking and Extortion Scheme Involving Telecommunications Companies (U.S. Department of Justice)
    • Leaky Weekly: Arrests, RedLine & META Infrastructure Takedown, and MOVEit Leaks (Flare)

    Brought to you by Flare, the world's easiest to use and most comprehensive cybercrime database that integrates into your security program in 30 minutes. Check out what’s on the dark web (and more) about your organization.

    Flare now offers Flare Academy training, which is our (free!) training series led by experts that cover critical cybersecurity topics. Check out Flare Academy to keep up with upcoming trainings, check out previous training resources, chat with cybersecurity professionals (including Nick!) in the Flare Academy Community Discord, and more.

    Más Menos
    11 m
  • Use a Stealer Log, Go to Prison (Part 1): IntelBroker and Scattered Spider(?) Arrests
    Aug 13 2025

    On this episode of Leaky Weekly, host and security researcher Nick Ascoli gets into stealer logs and arrests in the last few weeks of threat actor IntelBroker and threat actors who targeted retail companies in the U.K. using the DragonForce encryptor. This is part 1 of a 2 part series, Use a Stealer Log, Go to Prison. Here's part 2: on Apple Podcasts or Spotify.

    Here are the resources on the stories:

    • 2025 Data Breach Investigations Report (DBIR) (Verizon)
    • The Rising Role of Stolen Credentials in Cybercrime: 3 Insights from the 2025 Verizon DBIR (Flare)
    • IntelBroker Threat Actor (TheSecMaster)
    • Following the Bitcoin Trail: The IntelBroker Takedown (Chainalysis)
    • United States of America v. Kai West (“IntelBroker,” “Kyle Northern”) Complaint (U.S. Department of Justice)
    • Four arrested in connection with M&S and Co-op cyber-attacks (BBC)
    • Retail cyber attacks: NCA arrest four for attacks on M&S, Co-op and Harrods (National Crime Agency)
    • UK police arrest four over cyberattacks on M&S, Co-op and Harrods (Reuters)
    • Inside DragonForce, the Group Tied to M&S, Co-op and Harrods Hacks (Infosecurity Magazine)
    • Inside the Dragon: DragonForce Ransomware Group (Group-IB)

    Brought to you by Flare, the world's easiest to use and most comprehensive cybercrime database that integrates into your security program in 30 minutes. Check out what’s on the dark web (and more) about your organization.

    Flare now offers Flare Academy training, which is our (free!) training series led by experts that cover critical cybersecurity topics. Check out Flare Academy to keep up with upcoming trainings, check out previous training resources, chat with cybersecurity professionals (including Nick!) in the Flare Academy Community Discord, and more.

    Más Menos
    15 m
  • LockBit's Fall and the Rise of Ransomware Chaos 2025 with Tammy Harper
    Jul 2 2025

    On this episode of Leaky Weekly, Tammy Harper, Senior Threat Intelligence Researcher at Flare joins host and security researcher Nick Ascoli.

    Tammy explains:

    • LockBit’s fall, the affiliate exodus, and rise of RansomHub
    • “Ransomware without the ware” – cross-posting as the norm now
    • Noise in the ransomware underground

    More episodes from Tammy and Nick’s conversation on ransomware will be coming in the following weeks.

    Brought to you by Flare, the world's easiest to use and most comprehensive cybercrime database that integrates into your security program in 30 minutes. Check out what’s on the dark web (and more) about your organization.

    Flare now offers Flare Academy training, which is our (free!) training series led by experts that cover critical topics such as threat intelligence, operational security, and advanced investigation techniques. You can also earn CPE credits toward your cybersecurity certifications. Sign up for Senior Threat Intelligence Researcher Tammy Harper’s Academy training, CRYPTOS: Hunting Adversaries in the Crypto Underground on Tuesday July 15, 2025 at 11:00-1:00 PM ET. Join the Flare Academy Community Discord to keep up with upcoming training, check out previous training resources, chat with cybersecurity professionals (including Nick and Tammy!), and more.

    Más Menos
    16 m
  • To Extort or Not to Extort: Ransomware Group Tactics in 2025 with Tammy Harper
    Jun 18 2025

    On this episode of Leaky Weekly, Tammy Harper, Senior Threat Intelligence Researcher at Flare joins host and security researcher Nick Ascoli. They talk about shifts in the ransomware ecosystem in 2025.

    Tammy explains:

    • Ransomware group adaptations based on 2024 events
    • Why data-only extortion isn’t catching on
    • How access to leaked data is shaping both victim decision-making and long-term exposure

    More episodes from Tammy and Nick’s conversation on ransomware will be coming in the following weeks.

    Brought to you by Flare, the world's easiest to use and most comprehensive cybercrime database that integrates into your security program in 30 minutes. Check out what’s on the dark web (and more) about your organization.

    Flare now offers Flare Academy training, which is our (free!) training series led by experts that cover critical topics such as threat intelligence, operational security, and advanced investigation techniques. You can also earn CPE credits toward your cybersecurity certifications. Sign up for Senior Threat Intelligence Researcher Tammy Harper’s Academy training, CRYPTOS: Hunting Adversaries in the Crypto Underground on Tuesday July 15, 2025 at 11:00-1:00 PM ET. Join the Flare Academy Community Discord to keep up with upcoming training, check out previous training resources, chat with cybersecurity professionals (including Nick and Tammy!), and more.

    Más Menos
    22 m