SEC vs. SolarWinds CISO, Classiscam Scam-as-a-Service

In this episode, we discuss the SEC’s charges against SolarWinds’ CISO for misleading investors about a major cyberattack. Plus don’t miss our discussion about the shady world of “Classiscam Scam-as-a-Service,” a very popular cyber criminal service that creates fake user accounts, posts fraudulent reviews, and boosts the reputation of dishonest sellers while defrauding e-commerce platforms.

** Links mentioned on the show *

Tom’s LinkedIn thread about “Quishing”

SEC charges SolarWinds CISO with fraud for misleading investors before major cyberattack

What is Classiscam Scam-as-a-Service?

** Watch this episode on YouTube **

** Become a Shared Security Supporter **

For only $5 per month get exclusive access to ad-free episodes, bonus episodes, listen to new episodes before they are released, get access to our private Discord server, receive a monthly shout-out on the show, and get a discount code for 15% off merch at the Shared Security store. Become a supporter today!

** Thank you to our sponsors! **


Visit to check out SLNT’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”.

Click Armor

To find out how “gamification” of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor’s gamified awareness training platform, visit:

** Subscribe and follow the podcast **

Join us on Reddit:

Subscribe on YouTube:

Watch and Subscribe on Odysee (YouTube alternative)

Follow us on Mastodon:

Follow us on X:

Visit our website:

Subscribe on your favorite podcast app:

Sign-up for our email newsletter to receive updates about the podcast, contest announcements, and special offers from our sponsors:

Leave us a rating and review:

Contact us:

The post SEC vs. SolarWinds CISO, Classiscam Scam-as-a-Service appeared first on Shared Security Podcast.

*** This is a Security Bloggers Network syndicated blog from Shared Security Podcast authored by Tom Eston. Read the original post at: