Battling BazaCall BuzzKill
Have you ever received a call from an unknown number just to be presented with a robo-voice asking for your sensitive data? With scammers getting more creative, it can be difficult to differentiate scams from genuine calls. This is where BazaCall comes in. Unlike other scams, BazaCall requires you to call them. In this episode of Security Unlocked, hosted by Natalia Godyla, Microsoft Threat Analysts Emily Hacker and Justin Carroll, provide insights into BazaCall campaigns - a relatively new delivery method for malware and ransomware.
The trio discusses the unique features of the BazaCall campaigns, the delivery system used by attackers to evade detection, and where the attack chain begins. As an IT professional, you can mitigate BazaCall attacks and minimize the risks of loss by staying alert and adopting mitigation strategies discussed in this episode.
So if you're interested in learning about the flow of the attack chain, new tactics used by the BazaCall centers, and how to safeguard organizations from attacks, tune in to this insightful episode of Security Unlocked.
This podcast is produced by Microsoft and distributed as part of The CyberWire Network. You can also access resources and connect with the speakers on LinkedIn through the links provided in the description.
The post Battling BazaCall BuzzKill originally appeared on Spotify.
Published on:
Learn moreSecurity Unlocked explores the technology and people powering Microsoft's Security solutions. In each episode, Microsoft Security evangelists Nic Fillingham and Natalia Godyla take a closer look at the latest innovations in threat intelligence, security research, and data science, with a special focus on demystifying artificial intelligence and machine learning. Be sure to listen in and follow us!
Related posts
Microsoft AI Powering DARPA’s AI Cyber Challenge
The Defense Advanced Research Projects Agency (DARPA) has launched the AI Cyber Challenge (AIxCC), which utilizes advanced AI to combat the ri...
Insights from GitHub's Chief Security Officer
In this episode of Afternoon Cyber Tea, Ann Johnson sits down with Mike Hanley, the Chief Security Officer and Senior Vice President of Engine...
Navigating Current Cyber Challenges
If you're looking for insights on navigating the current challenges in the world of cybersecurity, then this episode of Afternoon Cyber Tea is...
Cyber Resilience in Healthcare
Join Ann Johnson on the Afternoon Cyber Tea podcast as she speaks with Jason Barnett, Chief Security Officer of HCA Healthcare, about Cyber Re...
Cyber Resiliency with Sounil Yu
In this episode of Afternoon Cyber Tea, Ann sits down with Sounil Yu, the Chief Information Security Officer and Head of Research at JupiterOn...
What’s Influencing Cyber Capital Investment
In this episode of Afternoon Cyber Tea, Dave DeWalt, Founder and Managing Director of NightDragon, and Jay Leek, Managing Director and Co-foun...
Defending Our Infrastructure
Cybersecurity strategist, CISO, and former industry analyst Wendy Nather joins Ann Johnson on Afternoon Cyber Tea to discuss strategies for de...
Building Customer Trust in the Face of Cyber Attacks
In this episode of Afternoon Cyber Tea with Ann Johnson, Wendy Thomas, President and CEO of SecureWorks, shares her insights on building custo...
The Criticality of Cyber Resilience
Join Ann on the latest episode of Afternoon Cyber Tea as she sits down with Tarun Sondhi, an expert in security architecture, infrastructure s...