Loading...

Battling BazaCall BuzzKill

Battling BazaCall BuzzKill

Have you ever received a call from an unknown number just to be presented with a robo-voice asking for your sensitive data? With scammers getting more creative, it can be difficult to differentiate scams from genuine calls. This is where BazaCall comes in. Unlike other scams, BazaCall requires you to call them. In this episode of Security Unlocked, hosted by Natalia Godyla, Microsoft Threat Analysts Emily Hacker and Justin Carroll, provide insights into BazaCall campaigns - a relatively new delivery method for malware and ransomware.

The trio discusses the unique features of the BazaCall campaigns, the delivery system used by attackers to evade detection, and where the attack chain begins. As an IT professional, you can mitigate BazaCall attacks and minimize the risks of loss by staying alert and adopting mitigation strategies discussed in this episode.

So if you're interested in learning about the flow of the attack chain, new tactics used by the BazaCall centers, and how to safeguard organizations from attacks, tune in to this insightful episode of Security Unlocked.

This podcast is produced by Microsoft and distributed as part of The CyberWire Network. You can also access resources and connect with the speakers on LinkedIn through the links provided in the description.

The post Battling BazaCall BuzzKill originally appeared on Spotify.

Published on:

Learn more
Security Unlocked
Security Unlocked

Security Unlocked explores the technology and people powering Microsoft's Security solutions. In each episode, Microsoft Security evangelists Nic Fillingham and Natalia Godyla take a closer look at the latest innovations in threat intelligence, security research, and data science, with a special focus on demystifying artificial intelligence and machine learning. Be sure to listen in and follow us!

Share post:

Related posts

Microsoft AI Powering DARPA’s AI Cyber Challenge

The Defense Advanced Research Projects Agency (DARPA) has launched the AI Cyber Challenge (AIxCC), which utilizes advanced AI to combat the ri...

1 year ago

Insights from GitHub's Chief Security Officer

In this episode of Afternoon Cyber Tea, Ann Johnson sits down with Mike Hanley, the Chief Security Officer and Senior Vice President of Engine...

1 year ago

Navigating Current Cyber Challenges

If you're looking for insights on navigating the current challenges in the world of cybersecurity, then this episode of Afternoon Cyber Tea is...

2 years ago

Cyber Resilience in Healthcare

Join Ann Johnson on the Afternoon Cyber Tea podcast as she speaks with Jason Barnett, Chief Security Officer of HCA Healthcare, about Cyber Re...

2 years ago

Cyber Resiliency with Sounil Yu

In this episode of Afternoon Cyber Tea, Ann sits down with Sounil Yu, the Chief Information Security Officer and Head of Research at JupiterOn...

2 years ago

What’s Influencing Cyber Capital Investment

In this episode of Afternoon Cyber Tea, Dave DeWalt, Founder and Managing Director of NightDragon, and Jay Leek, Managing Director and Co-foun...

2 years ago

Defending Our Infrastructure

Cybersecurity strategist, CISO, and former industry analyst Wendy Nather joins Ann Johnson on Afternoon Cyber Tea to discuss strategies for de...

3 years ago

Building Customer Trust in the Face of Cyber Attacks

In this episode of Afternoon Cyber Tea with Ann Johnson, Wendy Thomas, President and CEO of SecureWorks, shares her insights on building custo...

3 years ago

The Criticality of Cyber Resilience

Join Ann on the latest episode of Afternoon Cyber Tea as she sits down with Tarun Sondhi, an expert in security architecture, infrastructure s...

3 years ago
Stay up to date with latest Microsoft Dynamics 365 and Power Platform news!
* Yes, I agree to the privacy policy