{"id":19619,"date":"2022-05-06T11:55:45","date_gmt":"2022-05-06T07:55:45","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/transatlantic-cable-podcast-249\/19619\/"},"modified":"2022-05-06T11:55:45","modified_gmt":"2022-05-06T07:55:45","slug":"transatlantic-cable-podcast-249","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/transatlantic-cable-podcast-249\/19619\/","title":{"rendered":"Transatlantic Cable podcast, episode 249"},"content":{"rendered":"<p>Welcome to episode 249 of the Transatlantic Cable. This week, the team look at some of the more \u2018interesting\u2019 stories in the cybersecurity world.<\/p>\n<p>To start, Dave and Jeff look at a concerning story regarding REvil \u2013 the infamous ransomware gang that was, until recently, thought to be shut down. The story looks at signs that all might not be as it seems and rumblings that the gang may be about to make a return. From there, they discuss a story around a DeFi hack and how the platform, Fei Protocol, is offering a cool $10 million to return the stolen funds.<\/p>\n<p>From there, things get decidedly strange \u2013 the first story looks at stalking using Apple AirTags \u2013 something that\u2019s becoming increasingly common. The next story takes a look at recent news that Russia and America are training dolphins for underwater missions (there\u2019s a reference to Austin Powers here, I know it), and the final story looks at how hackers could potentially cause harm through the hacking of \u201clove\u201d robots.\u00a0 Yes, really.<\/p>\n<p>If you like what you heard, please do consider subscribing.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/revil-ransomware-returns-new-malware-sample-confirms-gang-is-back\/\" target=\"_blank\" rel=\"noopener nofollow\">REvil ransomware returns: New malware sample confirms gang is back<\/a><\/li>\n<li><a href=\"https:\/\/cointelegraph.com\/news\/rari-fuze-hacker-offered-10m-bounty-by-fei-protocol-to-return-80m-loot\" target=\"_blank\" rel=\"noopener nofollow\">Rari Fuze hacker offered $10M bounty by Fei Protocol to return $80M loot<\/a><\/li>\n<li><a href=\"https:\/\/nypost.com\/2022\/05\/01\/tennessee-family-visiting-disney-world-says-apple-airtag-was-tracking-them\/\" target=\"_blank\" rel=\"noopener nofollow\">Tennessee family visiting Disney World says Apple AirTag used to track them<\/a><\/li>\n<li><a href=\"https:\/\/www.theguardian.com\/world\/2022\/apr\/27\/russia-black-sea-military-dolphins-crimea\" target=\"_blank\" rel=\"noopener nofollow\">Russia deploys trained dolphins at Black Sea naval base<\/a><\/li>\n<li><a href=\"https:\/\/www.iflscience.com\/technology\/could-hackers-program-sex-robots-to-kill\/\" target=\"_blank\" rel=\"noopener nofollow\">Could Hackers Program Sex Robots To Kill?<\/a><\/li>\n<\/ul>\n<p><iframe loading=\"lazy\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/23015114\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/backward\/render-playlist\/no\/custom-color\/87A93A\/\" frameborder=\"0\" scrolling=\"no\" marginwidth=\"0\" marginheight=\"0\" width=\"100%\" height=\"90px\"><\/iframe><\/p>\n<div class=\"podcast-subscribe\"><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-itunes\" class=\"itunes\" href=\"https:\/\/itunes.apple.com\/us\/podcast\/talk-security\/id909407206\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-apple.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-spotify\" class=\"spotify\" href=\"https:\/\/open.spotify.com\/show\/1VGCKlOoQ9C24dJiCHGTK5\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-spotify.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-rss\" class=\"rss\" href=\"http:\/\/talksecurity.kaspersky-podcasts.libsynpro.com\/rss\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-rss.png\"><\/a><\/div>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>This week\u2019s episode includes REvil\u2019s return, more DeFi hacks, Apple AirTag abuse and much more<\/p>\n","protected":false},"author":437,"featured_media":19620,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[444],"class_list":{"0":"post-19619","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-podcast"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/transatlantic-cable-podcast-249\/19619\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/transatlantic-cable-podcast-249\/24136\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/transatlantic-cable-podcast-249\/26458\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/transatlantic-cable-podcast-249\/24404\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/transatlantic-cable-podcast-249\/44277\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/transatlantic-cable-podcast-249\/30497\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/transatlantic-cable-podcast-249\/30250\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/podcast\/","name":"podcast"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19619","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/437"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=19619"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19619\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/19620"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=19619"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=19619"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=19619"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}