Cyber attack disrupting service by overloading the provider of the service
POPULARITY
Critical Microsoft Patch Tuesday release includes near-record number of zero-days with six already being exploited. Apple releases patches for Safari browser engine affecting all devices. Analysis of leaked Black Basta ransomware gang chat logs reveals valuable insights on attack strategies and evasion techniques. Recent DDoS attack against X (formerly Twitter) remains largely unattributed despite claims from hacker group DarkStorm and debunked assertions about Ukrainian IP addresses.Remember, Stay a Little Paranoid Subscribe: This Week Health Twitter: This Week Health LinkedIn: This Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer
The DDoS attack on X.com this week provided a certain amount of schadenfreude for people less than enamored by Elon Musk. It also rang alarm bells in the cybersecurity community as that style of attack seems to be making a comeback, and not for financial gain. All indications are corporations, and, in particular, government institutions are not ready to repel attacks motivated by political revenge. We talked with Inversion6 CISO Ian Thornton-Trump about how the attack was allowed to happen and what it may mean for the very near future.
Drex analyzes three significant cybersecurity developments: the widespread outage of a major social media platform (formerly Twitter) caused by a DDoS attack claimed by hacker group Dark Storm Team, NIST's recent addition of the "govern function" to their cybersecurity framework that emphasizes optimizing existing tools over acquiring new ones, and concerning reports that OpenAI's latest GPT-4.5 model hallucinates 37% of the time, raising important questions about AI reliability for everyday users.Remember, Stay a Little Paranoid Subscribe: This Week Health Twitter: This Week Health LinkedIn: This Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer
X suffers a major DDoS attack causing multiple outages, AI chatbots cannot be trusted to cite factual information, and Bluesky now allows 3-minute video uploads. MP3 Please SUBSCRIBE HERE for free or get DTNS Live ad-free. A special thanks to all our supporters–without you, none of this would be possible. If you enjoy what youContinue reading "X Suffers A Major DDoS Attack Causing Multiple Outages – DTH"
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
AI has brought about a DDoS attack on recruitment. What do we do about it? Martyn Redstone talks shifting power dynamics, assessing AI capability, and the cost of inaction.If your technical team faced a DDoS attack — an onslaught of overwhelming traffic designed to disrupt your systems — how would you expect them to respond? Would you expect them to freeze and do nothing? Or take proactive steps to address the vulnerability and reimagine their processes to not only prevent future risks, but to make their processes better?According to Martyn Redstone, founder of PPLBots and co-founder of genAssess, AI tools are doing to recruitment what a DDoS attack does to company websites — overloading them with applications and upending the balance of power between recruiters and candidates. With new AI tools enabling mass-personalised applications submitted at scale, recruitment have to do something differently if they stand any chance of managing candidate volumes while fairly assessing their true capability. And reclaiming control of the recruitment process. In this week's episode of the TA Disruptors podcast, Martyn joins Robert as they discuss:
The Internet Archive, its importance, and a recent DDoS attack on it start off a MacVoices Live! discussion with Chuck Joiner, David Ginsburg, Marty Jencius, Brian Flanigan-Arthurs, Web Bixby, Jim Rea, Jeff Gamet, and Eric Bolden. The panel also gets a chuckle over the UK adopting a USB-C charging standard, and cover some of the little-knowing LLMs that are more specialized than the ones you might be familiar with. This edition of MacVoices is brought to you by the MacVoices Dispatch, our weekly newsletter that keeps you up-to-date on any and all MacVoices-related information. Subscribe today and don't miss a thing. Show Notes: Chapters: 00:06 The Internet Archive's Vital Role 02:09 UK Adopts USB-C Charging Standard 07:56 Exploring Innovative AI Tools 09:19 Navigating Paywalls and Resources 15:33 Connecting with Our Hosts Links: The Internet Archive is even more essential than I realized https://www.fastcompany.com/91208935/internet-archive-outage-breach-wayback-machine UK Considers Adopting USB-C as Common Charging Standard https://www.macrumors.com/2024/10/16/uk-considers-usb-c-common-charging-standard/ Employees Describe an Environment of Paranoia and Fear Inside Automattic Over WordPress Chaos https://www.404media.co/automattic-buyout-offer-wordpress-matt-mullenweg/ Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
AI is spamming up job applications. 404 Media's Jason Koebler writes about how he used a free tool, AI Hawk, to apply for 17 jobs in an hour while working a restaurant shift — only stopping when he'd reached 2,843; The Internet Archive, the nonprofit organization that digitizes and archives materials like web pages, came under attack Wednesday; The startup, which already monitors the climate impact of digital advertising, is expanding to include artificial intelligence; Opera browser has a new AI-powered feature that lets you take action on tabs through natural language queries. Things you can do include grouping, pinning, bookmarking and closing tabs with these commands. Learn more about your ad choices. Visit podcastchoices.com/adchoices
StoryPhones is an awesome idea, and so we'll have Petur Olafsson on the show to explain what they are. He's the Founder and CEO of ONANOFF, the folks behind StoryPhonesTo talk to us about a growing threat called DDoS attacks and share other cybersecurity tips -- to better protect your data and your wallet – we also have on the show Shawn Edwards, Chief Security Officer of ZayoTech expert and entrepreneur extraordinaire Amber Mac joins us to share some great tools and tips to help celebrate October, which is Small Business MonthThank you to Intel, Visa, and Western Digital
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
In this episode of Cybersecurity Today, host Jim Love delves into Elon Musk's claim that a DDoS attack delayed his live interview with Donald Trump, the revelation of a massive data breach compromising most U.S. social security numbers, and CrowdStrike's president accepting the 'Most Epic Fail' award at DEF CON. The episode covers the skepticism around Musk's DDoS claim, details on the National Public Data hack, and CrowdStrike's approach to owning up to its global IT outage. Tune in for the latest updates in cybersecurity! 00:00 Introduction and Headlines 00:21 Elon Musk's DDoS Claim and Technical Issues 02:06 Trump Campaign Hacked 03:00 National Public Data Breach 05:16 CrowdStrike's Epic Fail at DEF CON 06:34 Conclusion and Show Notes
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
Former President Donald Trump returned to X, the social media site formerly known as Twitter, for the first time in nearly a year today, sharing new campaign videos and making several posts. Tonight, despite a roughly 30-minute delay, the former president sat down for a live-streamed interview with the platform's CEO Elon Musk. Plus, John King's "All Over The Map" series continues, this time in the Philadelphia suburbs which could swing the election. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Elon Musk claims ‘massive DDOS attack' delayed his live stream with Donald Trump, Patreon will have to use Apple's in-app purchase system or it will be removed from the App Store, and the Indie Horror Showcase gaming event will return in October. It's Tuesday, August 13th and this is Engadget News. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Hey Strangers, #twitter #trump #elonmusk Elon Musk's “conversation” with former President Donald Trump got off to a rocky start. The interview, which was hosted on X Spaces and scheduled to begin at 8PM ET Monday night, crashed immediately and didn't begin until 42 minutes later. Those who did manage to get into the Space, including several Verge staffers, said it kicked off with lo-fi techno playing from Trump's account for roughly 30 minutes. 18 minutes after the conversation was supposed to begin, Musk claimed that X was the target of a “massive DDOS attack” that had made it impossible for the Space to proceed as planned. ======================================= My other podcast https://www.youtube.com/channel/UCKpvBEElSl1dD72Y5gtepkw ************************************************** Something Strange https://www.youtube.com/watch?v=GRjVc2TZqN4&t=4s ************************************************** article links: https://www.theverge.com/2024/8/12/24219121/donald-trump-elon-musk-interview-x-twitter-crashes https://apnews.com/article/trump-harris-vance-walz-election-692747ef0569c28fabc026cc98c4e34d https://www.computing.co.uk/feature/4121256/elon-musks-biggest-fails-twitter-takeover/page/11 ====================================== Today is for push-ups and Programming and I am all done doing push-ups Discord https://discord.gg/MYvNgYYFxq TikTok https://www.tiktok.com/@strangestcoder Youtube https://www.youtube.com/channel/UCe9xwdRW2D7RYwlp6pRGOvQ?sub_confirmation=1 Twitch https://www.twitch.tv/CodingWithStrangers Twitter https://twitter.com/strangestcoder merch Support CodingWithStrangers IRL by purchasing some merch. All merch purchases include an alert: https://streamlabs.com/codingwithstrangers/merch Github Follow my works of chaos https://github.com/codingwithstrangers Tips https://streamlabs.com/codingwithstrangers/tip Patreon https://www.patreon.com/TheStrangers Webull https://act.webull.com/vi/c8V9LvpDDs6J/uyq/inviteUs/ Join this channel https://www.youtube.com/channel/UCe9xwdRW2D7RYwlp6pRGOvQ/join Timeline 00:00 intro 00:24 What Talking We Talking About 02:48 Article 10:55 Twitter Failing 17:25 My Thoughts 20:25 outro anything else? Take Care --- Send in a voice message: https://podcasters.spotify.com/pod/show/coding-with-strangers/message
ABC Tech Reporter, Mike Dobuski explains what this is, that Elon Musk claims happened during hi interview with Trump. He also discusses Google's "Made by Google" event
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
ATTACK! This week, V tells Emily about the 2023 DDoS attacks against the OTW, particularly AO3, and how amazing the SysAdmin volunteers defended the servers and got the sites back online. Plus, how fandom reacted to A Very Bad 24 Hours In Fandom History -- because there was ANOTHER dumb/bad event happening over on Tumblr, too! -- and perhaps the greatest fanfiction of all time.
In this episode, Ryan and Shannon discuss a recent article about a massive HTTP DDoS attack that reached a record high of 71 million requests per second. They highlight the increasing sophistication and frequency of DDoS attacks, as well as the potential life-threatening effects of such attacks in the future. They also discuss the role of IoT devices and the need for better education and patching to prevent them from being part of botnets. The conversation touches on the importance of robustness and elasticity in cloud-based solutions and the potential impact of quantum computing. Article: Massive HTTP DDoS Attack Hits Record High of 71 Million Requests/Second https://thehackernews.com/2023/02/massive-http-ddos-attack-hits-record.html Please LISTEN
Wikileaks's Julian Assange is a free man, deepfakes cause trouble in the playground, and we hear hot takes about ransomware and tales from inside a devastating denial-of-service attack.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Eleanor Dallaway.Warning: This podcast may contain nuts, adult themes, and rude language.Episode links:Julian Assange lands in Australia a free man - BBC News.Smashing Security episode 245: The Julian Assange assassination plot, and IoT toilets.Kidnapping, assassination and a London shoot-out: Inside the CIA's secret war plans against WikiLeaks - Yahoo News.Surprise! WikiLeaks won't just hand over details of zero-day vulnerabilities to tech firms - Graham Cluley.YouTube now lets you report AI deepfakes of yourself - MSN.Two private schools face police probe over claims pupils used AI to 'create deepfake porn images of up to a dozen girls' - Daily Mail. We're calling on the next government to protect women and girls from image-based abuse - Glamour Magazine. Deepfakes as a Security Issue: Why Gender Matters - WiisGlobal.AI poses disproportionate risks to women - Brookings.'Violating and dehumanising': How AI deepfakes are being used to target women - Euronews.Snapshot Paper - Deepfakes and Audiovisual Disinformation - GOV.UK.Government cracks down on ‘deepfakes' creation - GOV.UK.Je chie dans la seine.Paris Olympics Poop Protest Postponed After French Officials Refuse To Swim In Sewage Water - Brobible.
In Brick Talk's ninth episode, Braden Naquin and Melton Bell III discuss Internet Archive, Google's Umoja Cable, Magic Leap, Geek Squad, Starbucks, and more. 00:00 - Intro 01:34 - Run Clubs 03:28 - DDoS Attack on Internet Archive 11:21 - Google's Umoja Cable | Africa Connect 18:42 - Magic Leap 26:16 - Geek Squad Scammers | Best Buy 33:51 - Starbucks Mobile Rewards App UI/UX 40:43 - Chipotle's Serving Sizes 44:46 - Phones are Weapons 45:50 - Closing Remarks Brick By Brick brickbrick.us instagram.com/brickbrick.us Braden Naquin bradennaquin.com instagram.com/bradennaquin Melton Bell III meltonbell.com instagram.com/meltonbell3
The podcast episode discusses the sustained cyberattacks on the Internet Archive, a nonprofit organization facing targeted DDoS attacks. The conversation delves into the impact of these attacks, the significance of the Internet Archive, and the potential motives behind the cyberattacks. The hosts also highlight the importance of the Internet Archive for journalists and the broader community. Article: Internet Archive facing sustained cyber attacks — nonprofit struggles with 'impactful, targeted, adaptive' DDoS campaign https://www.tomshardware.com/tech-industry/internet-archive-facing-sustained-cyber-attacks-nonprofit-struggles-with-impactful-targeted-adaptive-ddos-campaign?fbclid=IwZXh0bgNhZW0CMTAAAR1UHfCd1ENucFeINLhM4iC6yD3lXze0roY_os0w-WH0ETNT-Uga-gYuBmY_aem_AdwSQYsHYE_F_hVLTJOe5KIxb749Fh9FDw0jo_pPwLLUuhCXNzoobMUm3OksHw7CD0ROdsaijX1pKGSGfKdjXmj4 Please LISTEN
Welcome to a new episode of Discover Daily, the AI-generated podcast curated by Perplexity to satisfy your curiosity about the latest in tech, science, and culture. I'm your host Alex, and in today's episode, we'll explore a range of fascinating topics.Elon Musk's AI company xAI has raised $6 billion in a Series B funding round, with participation from notable investors. This values the company at $18-24 billion and will support bringing initial products to market, building infrastructure, and accelerating R&D. xAI has already launched the Grok chatbot and plans to build a supercomputer to further develop its AI capabilities.The Internet Archive, a nonprofit digital library, was hit by a DDoS attack on May 27, 2024, temporarily disrupting access to its services. After about an hour, service was restored. The motives remain unclear, but the attack was criticized on social media.Recent studies have shown that crows can count using vocalizations, producing specific numbers of caws in response to numerical cues. Their counting abilities resemble those of human toddlers, challenging assumptions about animal cognition and numerical abilities.Finally, biologist John Tower has proposed the concept of "selectively advantageous instability" (SAI), arguing that some instability in biological components is essential for life. SAI allows for genetic diversity and adaptability but also contributes to aging. This new rule of biology could have broad implications for our understanding of life's processes.From Perplexity's Discover feed:Musk's xAI raised $6bhttps://www.perplexity.ai/page/Musks-xAI-Raised-bfhUcjhkSHidkYhMcARUbgDDoS attack on Internet Archivehttps://www.perplexity.ai/page/DDoS-Attack-on-feEOYl8wTlaT66qP1Y.QygGPT-4 beats analysts at earnings forecasthttps://www.perplexity.ai/page/GPT4-Beats-Analysts-nVgZu5u1SXi6bcE8pzbR.QCrows count using vocalizationshttps://www.perplexity.ai/page/Crows-Count-Using-fnNa2K5IQWyTO_AH8MXb.QNew rule of instability in biologyhttps://www.perplexity.ai/page/New-Rule-of-Px0zUyYXTNuCYnV6En03sgPerplexity is the fastest and most powerful way to search the web. Perplexity crawls the web and curates the most relevant and up-to-date sources (from academic papers to Reddit threads) to create the perfect response to any question or topic you're interested in. Take the world's knowledge with you anywhere. Available on iOS and Android Join our growing Discord community for the latest updates and exclusive content. Follow us on: Instagram Threads X (Twitter) YouTube Linkedin
It's been a difficult week of FFXIV as we find ourselves under a massive DDoS attack, rendering the game unplayable at times. We also discuss the upcoming Make It Rain Campaign, and the second part of the Moogle Treasure Trove event! Yoshi-P & Soken interview: https://www.youtube.com/watch?v=DyCKsd9Y5Mk MogMail: https://speakersxiv.com/mogmail/ ► Patreon: https://www.patreon.com/SpeakersXIV ► Become a Speakers YT Member: https://www.youtube.com/channel/UC2BQVHKP5x3Cs62MB0DF5EQ/join ► Merchandise: https://teespring.com/stores/speakersxiv ► Follow us on Twitter: https://twitter.com/SpeakersXIV ► Catch us LIVE on Twitch: http://www.twitch.tv/SpeakersXIV ► Speakers Discord: https://discord.gg/ATBUccS
In the days when Mirai emerged and took down DynDNS, along with what seemed like half the Internet, DDoS was as active a topic in the headlines as it was behind the scenes (check out Andy Greenberg's amazing story on Mirai on Wired). We don't hear about DDoS attacks as much anymore. What happened? Well, they didn't go away. DDoS attacks are a more common and varied tool of cybercriminals than ever. Today, Michael Smith is going to catch us up on the state of DDoS attacks in 2024, and we'll focus particularly on one cybercrime actor, KillNet. Segment Resources: Understanding DDoS Attacks: What is a DDoS Attack and How Does it Work? - I know the title makes this blog post sound rather basic, but it will get you up to speed on all the latest DDoS types, actors, and terminology pretty quickly! What is An Application-Layer DDoS Attack, and How Do I Defend Against Them? 2023 DDoS Statistics and Trends https://en.wikipedia.org/wiki/Killnet This week, Tyler and Adrian discuss Cyera's $300M Series C, which lands them a $1.4B valuation! But is that still a unicorn? Aileen Lee of Cowboy Ventures, who coined the term back in 2013, recently wrote a piece celebrating the 10th anniversary of the term, and revisiting what it means. We HIGHLY recommend checking it out: https://www.cowboy.vc/news/welcome-back-to-the-unicorn-club-10-years-later They discuss a few other companies that have raised funding or just come out of stealth, including Scrut Automation, Allure Security, TrojAI, Knostic, Prompt Armor. They discuss Eclipsium's binary analysis tooling, and what the future of fully automated security analysis could look like. Wiz acquired Gem, and Veracode acquired Longbow. Adrian LOVES Longbow's website, BTW. They discuss a number of essays, some of which are a must read: Daniel Miessler's Efficient Security Principle Subsalt's series on data privacy challenges Lucky vs Repeatable, a must-read from Morgan Housel AI has Flown the Coop, the latest from our absent co-host, Katie Teitler-Santullo Customer love by Ross Haleliuk and Rami McCarthy We briefly cover some other fun - reverse typosquatting, AI models with built-in RCE, and Microsoft having YET ANOTHER breach. We wrap up discussing Air Canada's short-lived AI-powered support chatbot. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-357
In the days when Mirai emerged and took down DynDNS, along with what seemed like half the Internet, DDoS was as active a topic in the headlines as it was behind the scenes (check out Andy Greenberg's amazing story on Mirai on Wired). We don't hear about DDoS attacks as much anymore. What happened? Well, they didn't go away. DDoS attacks are a more common and varied tool of cybercriminals than ever. Today, Michael Smith is going to catch us up on the state of DDoS attacks in 2024, and we'll focus particularly on one cybercrime actor, KillNet. Segment Resources: Understanding DDoS Attacks: What is a DDoS Attack and How Does it Work? - I know the title makes this blog post sound rather basic, but it will get you up to speed on all the latest DDoS types, actors, and terminology pretty quickly! What is An Application-Layer DDoS Attack, and How Do I Defend Against Them? 2023 DDoS Statistics and Trends https://en.wikipedia.org/wiki/Killnet This week, Tyler and Adrian discuss Cyera's $300M Series C, which lands them a $1.4B valuation! But is that still a unicorn? Aileen Lee of Cowboy Ventures, who coined the term back in 2013, recently wrote a piece celebrating the 10th anniversary of the term, and revisiting what it means. We HIGHLY recommend checking it out: https://www.cowboy.vc/news/welcome-back-to-the-unicorn-club-10-years-later They discuss a few other companies that have raised funding or just come out of stealth, including Scrut Automation, Allure Security, TrojAI, Knostic, Prompt Armor. They discuss Eclipsium's binary analysis tooling, and what the future of fully automated security analysis could look like. Wiz acquired Gem, and Veracode acquired Longbow. Adrian LOVES Longbow's website, BTW. They discuss a number of essays, some of which are a must read: Daniel Miessler's Efficient Security Principle Subsalt's series on data privacy challenges Lucky vs Repeatable, a must-read from Morgan Housel AI has Flown the Coop, the latest from our absent co-host, Katie Teitler-Santullo Customer love by Ross Haleliuk and Rami McCarthy We briefly cover some other fun - reverse typosquatting, AI models with built-in RCE, and Microsoft having YET ANOTHER breach. We wrap up discussing Air Canada's short-lived AI-powered support chatbot. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-357
In the days when Mirai emerged and took down DynDNS, along with what seemed like half the Internet, DDoS was as active a topic in the headlines as it was behind the scenes (check out Andy Greenberg's amazing story on Mirai on Wired). We don't hear about DDoS attacks as much anymore. What happened? Well, they didn't go away. DDoS attacks are a more common and varied tool of cybercriminals than ever. Today, Michael Smith is going to catch us up on the state of DDoS attacks in 2024, and we'll focus particularly on one cybercrime actor, KillNet. Segment Resources: Understanding DDoS Attacks: What is a DDoS Attack and How Does it Work?
Sherrod DeGrippo, director of threat intelligence strategy at Microsoft, is a top cybersecurity expert. In this episode, she joins host Steve Morgan to discuss the spread of misinformation in cybersecurity, highlighted in regard to the widely-covered, recent "toothbrush DDoS attack." • For more on cybersecurity, visit us at https://cybersecurityventures.com
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
NEWSa LinksCheck out Magic Mindhttps://www.magicmind.com/The World's First Fully-0ptimized Blend 0fAdaptogens, Nootropics, & Functional MushroomsCarefully crafted over 10+ years with the help of their scientific advisory board, Magic Mind is a potent elixir infused with 13 ingredients that work together to provide a holistic solution for optimized mental health.AND with my code: TALKTOME20Get an extra 20% offSupport the show
Amanda Silberling from TechCrunch joins us this week! Amanda talks about how Bluesky is now open for the public to register to this decentralized social network. Did three million smart toothbrushes get infected with malware? What is OnlyFake and these neural networks where you can acquire fake IDs? And how does one reviewer of the Apple Vision Pro feel about the device and its future after a week? Amanda talks about Bluesky and how it's now open for anyone to sign up. Mikah shares how three million smart toothbrushes were NOT used in DDoS attacks as initially reported by several news outlets. Joseph Cox of 404 Media joins the show to talk about a dark web service that is generating very sophisticated fake IDs. And finally, Brian X. Chen of The New York Times talks about his review of the Apple Vision Pro and how he's not as enthusiastic about this first-generation Apple device as other reviewers. Hosts: Mikah Sargent and Amanda Silberling Guests: Joseph Cox and Brian X. Chen Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit
Amanda Silberling from TechCrunch joins us this week! Amanda talks about how Bluesky is now open for the public to register to this decentralized social network. Did three million smart toothbrushes get infected with malware? What is OnlyFake and these neural networks where you can acquire fake IDs? And how does one reviewer of the Apple Vision Pro feel about the device and its future after a week? Amanda talks about Bluesky and how it's now open for anyone to sign up. Mikah shares how three million smart toothbrushes were NOT used in DDoS attacks as initially reported by several news outlets. Joseph Cox of 404 Media joins the show to talk about a dark web service that is generating very sophisticated fake IDs. And finally, Brian X. Chen of The New York Times talks about his review of the Apple Vision Pro and how he's not as enthusiastic about this first-generation Apple device as other reviewers. Hosts: Mikah Sargent and Amanda Silberling Guests: Joseph Cox and Brian X. Chen Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit
Amanda Silberling from TechCrunch joins us this week! Amanda talks about how Bluesky is now open for the public to register to this decentralized social network. Did three million smart toothbrushes get infected with malware? What is OnlyFake and these neural networks where you can acquire fake IDs? And how does one reviewer of the Apple Vision Pro feel about the device and its future after a week? Amanda talks about Bluesky and how it's now open for anyone to sign up. Mikah shares how three million smart toothbrushes were NOT used in DDoS attacks as initially reported by several news outlets. Joseph Cox of 404 Media joins the show to talk about a dark web service that is generating very sophisticated fake IDs. And finally, Brian X. Chen of The New York Times talks about his review of the Apple Vision Pro and how he's not as enthusiastic about this first-generation Apple device as other reviewers. Hosts: Mikah Sargent and Amanda Silberling Guests: Joseph Cox and Brian X. Chen Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit
Amanda Silberling from TechCrunch joins us this week! Amanda talks about how Bluesky is now open for the public to register to this decentralized social network. Did three million smart toothbrushes get infected with malware? What is OnlyFake and these neural networks where you can acquire fake IDs? And how does one reviewer of the Apple Vision Pro feel about the device and its future after a week? Amanda talks about Bluesky and how it's now open for anyone to sign up. Mikah shares how three million smart toothbrushes were NOT used in DDoS attacks as initially reported by several news outlets. Joseph Cox of 404 Media joins the show to talk about a dark web service that is generating very sophisticated fake IDs. And finally, Brian X. Chen of The New York Times talks about his review of the Apple Vision Pro and how he's not as enthusiastic about this first-generation Apple device as other reviewers. Hosts: Mikah Sargent and Amanda Silberling Guests: Joseph Cox and Brian X. Chen Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit
Amanda Silberling from TechCrunch joins us this week! Amanda talks about how Bluesky is now open for the public to register to this decentralized social network. Did three million smart toothbrushes get infected with malware? What is OnlyFake and these neural networks where you can acquire fake IDs? And how does one reviewer of the Apple Vision Pro feel about the device and its future after a week? Amanda talks about Bluesky and how it's now open for anyone to sign up. Mikah shares how three million smart toothbrushes were NOT used in DDoS attacks as initially reported by several news outlets. Joseph Cox of 404 Media joins the show to talk about a dark web service that is generating very sophisticated fake IDs. And finally, Brian X. Chen of The New York Times talks about his review of the Apple Vision Pro and how he's not as enthusiastic about this first-generation Apple device as other reviewers. Hosts: Mikah Sargent and Amanda Silberling Guests: Joseph Cox and Brian X. Chen Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit
Amanda Silberling from TechCrunch joins us this week as guest co-host! Amanda talks about how Bluesky is now open for the public to register to this decentralized social network. Did three million smart toothbrushes get infected with malware? What is OnlyFake and these neural networks where you can acquire fake IDs? And how does one reviewer of the Apple Vision Pro feel about the device and its future after a week? Amanda talks about Bluesky and how it's now open for anyone to sign up. Mikah shares how three million smart toothbrushes were NOT used in DDoS attacks as initially reported by several news outlets. Joseph Cox of 404 Media joins the show to talk about a dark web service that is generating very sophisticated fake IDs. And finally, Brian X. Chen of The New York Times talks about his review of the Apple Vision Pro and how he's not as enthusiastic about this first-generation Apple device as other reviewers. Hosts: Mikah Sargent and Amanda Silberling Guests: Joseph Cox and Brian X. Chen Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is sponsored by KnowBe4. To learn more about our sponsor, visit https://knowbe4.com • For more breaking news, visit https://cybercrimewire.com
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is sponsored by KnowBe4. To learn more about our sponsor, visit https://knowbe4.com • For more breaking news, visit https://cybercrimewire.com
SummaryIn this episode, Jack Clabby and Kayley Melton discuss the upcoming Sunshine Cyber Conference and their collaboration with Winn Schwartau. They also talk about the importance of diverse cybersecurity talent and their plans for a joint session at the conference. The hosts then interview Lisa Plaggemier, the executive director at the National Cybersecurity Alliance, who shares her career journey and the role of creativity and curiosity in cybersecurity. They also discuss the impact of COVID-19 on the cybersecurity industry and the importance of humor and satire in cybersecurity training. The episode concludes with a lifestyle polygraph segment. In this episode, the conversation covers various topics related to comedy, storytelling, and implementing change in organizations. The power of the internet is discussed, highlighting the potential consequences of online content. The guest shares her favorite comedy movies, emphasizing the comedic element in her expertise. The use of humor in training and awareness programs is explored, along with the challenges of implementing change in organizations. Dealing with roadblocks in security and the passion for security awareness are also discussed. The episode concludes with information on how to get in touch with the guest and a recap of what was learned. TakeawaysThe Sunshine Cyber Conference features keynote speakers from the No Password Required podcast, including Winn Schwartau.The hosts will be doing their first on-site remote recording at the Sunshine Cyber Conference, featuring keynote speaker Tamiko Fletcher.The National Cybersecurity Alliance focuses on training and awareness, using creativity and humor to engage and educate people.Comedy movies, such as Monty Python and the Holy Grail, can be a source of expertise and inspiration.Humor can be effectively used in training and awareness programs to engage and educate participants.Implementing change in organizations can be challenging, but finding allies and overcoming roadblocks is essential. Chapters00:00 Introduction01:28 Fishing for Potential, the RTFM Guide to Diverse Cybersecurity Talent02:25 Live On-Site Remote Recording and Keynote Speakers03:51 Sunshine Cyber Conference and Registration04:46 Interview with Lisa Plaggemier05:15 Background and Role at the National Cybersecurity Alliance05:53 Transition to Security and Marketing Collaboration06:22 Incident Response and Training and Awareness07:20 Leadership and Skills in Cybersecurity08:18 Kubikle Series and Creativity in Security09:17 Curiosity and Creativity in Cybersecurity10:48 Naming and Shaming in Pen Tests and Phishing Testing11:41 DDoS Attack and Incident Response12:38 Neurodiversity and Cybersecurity13:21 Leading a Team During COVID-1914:21 Creating Engaging Training Content15:19 Global Data and Data Privacy Laws16:18 Humor and Satire in Cybersecurity Training18:47 Kubikle Series and Satire in Cybersecurity20:41 Creating Kubikle Series and Future Plans23:03Trust in Password Managers24:22 The Importance of Curiosity in Cybersecurity25:52 The Oh Behave Report and Behavioral Science26:50 Communicating Security Information Effectively28:44 Naming and Shaming in Phishing Testing29:39 Accepting Risk and Escalation Plans30:38 The Role of Security Teams and HR32:35 Building Trust in Password Managers33:32 Global Data and Cybersecurity Awareness36:51 The Importance of Curiosity in Cybersecurity Hiring40:03 The Underground Student-Led Newspaper41:12 The Significance of Curiosity and Creativity in Career50:44 The Power of the Internet51:14 Favorite Comedy Movies52:12 Using Humor in Training and Awareness53:38 Implementing Change in Organizations54:55 Dealing with Roadblocks in Security55:45 Passion for Security Awareness56:06 How to Get in Touch56:37 What Was Learned57:11 Closing Remarks
Proxy trojan targets macOS users for traffic redirection Indoor navigation has had a slow start Krasue RAT uses cross-kernel Linux rootkit to attack telecoms U.S. approves first gene-editing treatment, Casgevy, for sickle cell disease The DNS Deep-Drive continues with guests Josh Kuo, DNS expert, and Ross Gibson, Principal Solutions Architect of Infoblox, to talk about external authoritative DNS - whether enterprises should fully manage their own external DNS or use managed services, threats like domain hijacking, using load balancers, and more. Hosts: Curtis Franklin and Brian Chee Guests: Josh Kuo and Ross Gibson Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT lookout.com vanta.com/ENTERPRISE
Proxy trojan targets macOS users for traffic redirection Indoor navigation has had a slow start Krasue RAT uses cross-kernel Linux rootkit to attack telecoms U.S. approves first gene-editing treatment, Casgevy, for sickle cell disease The DNS Deep-Drive continues with guests Josh Kuo, DNS expert, and Ross Gibson, Principal Solutions Architect of Infoblox, to talk about external authoritative DNS - whether enterprises should fully manage their own external DNS or use managed services, threats like domain hijacking, using load balancers, and more. Hosts: Curtis Franklin and Brian Chee Guests: Josh Kuo and Ross Gibson Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT lookout.com vanta.com/ENTERPRISE
ChatGPT and its API suffer a DDoS attack, Google's SGE expands to 120 countries, And Sony's Playstation Division reports 2QFY2023 results… MP3 Please SUBSCRIBE HERE. You can get an ad-free feed of Daily Tech Headlines for $3 a month here. A special thanks to all our supporters–without you, none of this would be possible. BigContinue reading "ChatGPT Suffers A DDoS Attack – DTH"
The EU is warning Elon Musk over X content related to the Israel-Hamas war. The biggest DDoS attack of all time, by, like, 8x. New image models from Adobe. New PS5s from Sony. New rules from the FTC to help you avoid hidden fees. And checking in with the Sam Bankman Fried trial.Sponsors:Shopify.com/rideLinks:EU warns Elon Musk of ‘penalties' for disinformation circulating on X amid Israel-Hamas war (CNN)New technique leads to largest DDoS attacks ever, Google and Amazon say (The Record)Adobe Firefly can now generate more realistic images (TechCrunch)Sony's new PS5 with a removable disc drive launches in November (The Verge)The End of Junk Fees? FTC Proposes New Rule (The Hollywood Reporter)Caroline Ellison, Adviser to Sam Bankman-Fried, Says He ‘Directed' Her to Commit Crimes (NYTimes)See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
In this episode, host Bidemi Ologunde presented the story of an unprecedented cyber attack that struck at the heart of London, disrupting the city's lifeline - the Port of London Authority. The date was May 2022, a time when summer should have been the city's only concern. But instead, it found itself grappling with a sinister digital storm - a DDoS attack that took down the Authority's website, grinding operations to a sudden halt.Support the show
In this episode, host Bidemi Ologunde presented the story of five CTI analysts who investigated a DDoS attack on Finnish government institutions in April 2022. The incident led to the discovery of a potential link between that DDoS attack and an earlier announcement from the U.S. Department of Justice involving the dismantling of a dangerous Russian malware that is capable of creating and deploying a global botnet. The malware, suspected to be under the control of the Russian GRU, was proactively purged from global computer networks by a U.S. government agency.Support the show
Fanfiction has long been a very queer, very woman-dominated space. One of the biggest names in fanfic is AO3. We trace the history of this site, and ponder its future in this classic episode.See omnystudio.com/listener for privacy information.