Podcasts about equation group

  • 29PODCASTS
  • 50EPISODES
  • 41mAVG DURATION
  • ?INFREQUENT EPISODES
  • Mar 8, 2025LATEST
equation group

POPULARITY

20172018201920202021202220232024


Best podcasts about equation group

Latest podcast episodes about equation group

Inside Darknet
63; wie die NSA aus Sicht Chinas hackt

Inside Darknet

Play Episode Listen Later Mar 8, 2025 17:37


Das amerikanische Behörden auch offensive Hacking-Methoden verwenden geht oftmals unter. Alles voran ist hier natürlich die NSA mit ihrer Equation Group bzw. Tailored Access Operations (TAO).

Security Conversations
Costin Raiu: The GReAT exit interview

Security Conversations

Play Episode Listen Later Jan 15, 2024 92:13


Episode sponsors: Binarly, the supply chain security experts (https://binarly.io) FwHunt (https://fwhunt.run) Costin Raiu has spent a lifetime in anti-malware research, working on some of the biggest nation-state APT cases in history, including Stuxnet, Duqu, Equation Group, Red October, Turla and Lazarus. In this exit interview, Costin digs into why he left the GReAT team after 13 years at the helm, ethical questions on exposing certain APT operations, changes in the nation-state malware attribution game, technically impressive APT attacks, and the 'dark spots' where future-thinking APTs are living.

Intervenciones Gringas
**DESBLOQUEADO** Bonus - Equation Group

Intervenciones Gringas

Play Episode Listen Later Mar 14, 2023 93:23


Este es un capítulo bonus que estoy desbloqueando para tener más tiempo para trabajar en los próximos capítulos. ¡Disfruten! Este equipo élite de la NSA es realmente bueno fabricando herramientas de hacking. Pero no son tan buenos a la hora de controlar quién las utiliza. SLIDES: https://youtu.be/HKNCd-7q8jAPATREON: https://www.patreon.com/intervencionesgringaspodcast OTRAS REDES: https://beacons.ai/intervencionesgringaspodcast/ CORREO: intervencionesgringaspodcast@gmail.com

Security Serengeti
SS-NEWS-078: China Calls Out US Hacking, Uber Hacked

Security Serengeti

Play Episode Listen Later Sep 19, 2022 41:05


Today we discuss China calling out the US for hacking universities, the new Twitter lawsuit on behalf of stock owners, and Uber being hacked. Article 1 - Twitter, Inc. (Whistleblower) Article 2 - China Accuses the NSA of Hacking a Top University to Steal DataSupporting Articles:Northwestern Polytechnical UniversityChinese Experts Uncover Details of Equation Group's Bvp47 Covert Hacking ToolDOD Grows University Affiliated Research Center Partnerships With HBCUsFY23 Department of Defense AppropriationsDoD Basic Research Letter - Final Article 3 - Uber reels from 'security incident' in which cloud systems seemingly hijackedSupporting Articles:Bill Demirkapi Summary Thread on TwitterTeamPass If you found this interesting or useful, please follow us on Twitter @serengetisec and subscribe and review on your favorite podcast app!

Intervenciones Gringas
BONUS 09 Vista Previa - Equation Group

Intervenciones Gringas

Play Episode Listen Later Sep 13, 2022 10:35


Este equipo élite de la NSA es realmente bueno fabricando herramientas de hacking. Pero no son tan buenos a la hora de controlar quién las utiliza. Capitulo completo aqui: https://www.patreon.com/posts/bonus-09-group-70889489 SLIDES: https://youtu.be/9-x2NRmp6kkPATREON: https://www.patreon.com/intervencionesgringaspodcast OTRAS REDES: https://beacons.ai/intervencionesgringaspodcast/ CORREO: intervencionesgringaspodcast@gmail.com

TRENDIFIER with Julian Dorey
#99 - This Guy Met With Julian Assange & Edward Snowden | Andy Greenberg

TRENDIFIER with Julian Dorey

Play Episode Listen Later May 12, 2022 179:10


(***TIMESTAMPS & Book Links in description below) ~ Andy Greenberg is an award-winning reporter, author, and hacking expert. Currently, Andy is a senior writer for WIRED, covering security, privacy, and information freedom. Throughout his career at Wired (and Forbes before that), Greenberg has been the go-to reporter on major international news stories including: Julian Assange & Wikileaks, Ross Ulbricht & Silk Road, Government-Sponsored hacking in Russia, China, & North Korea –– and the underworld of cryptocurrency. He's the author of “Sandworm” and “This Machine Kills Secrets” –– as well as the forthcoming book “Tracers in the Dark.” Furthermore, he was a main feature in the 2015 Documentary, “Deep Web,” about the downfall of Silk Road. “Sandworm” by Andy Greenberg: https://www.amazon.com/dp/B07GD4MFW2/ref=dp-kindle-redirect?_encoding=UTF8&btkr=1  “This Machine Kills Secrets” by Andy Greenberg: https://rb.gy/4k2suv  ***TIMESTAMPS*** 0:00 - Intro; Andy remembers his first book about Wikileaks; The 2010 Collateral Murder Wikileaks drop; The Cypherpunks 18:03 - Andy talks about when Wikileaks came on his radar; How Andy got into contact with Julian Assange and landed 2010 in person interview with him in London; Andy talks about his sitdown Assange and what he thinks of him; How Wikileaks operates 43:54 - US Bias in Wikileaks reporting?; Assange and his impact on the 2016 election with the DNC email hack; Did Assange know who the source of the hack was?; Guccifer and how the DNC hack went down; The “religious” nature of the hacking argument 1:02:03 - How Andy came to discover the Sandworm story and begin reporting on it; The Ukrainian Power Grid takedowns of 2015 and 2016 and how it went down; The three agencies in Russia and where Sandworm fits in 1:23:57 - Andy explains NotPetya and the Ransomware attacks that groups like Sandworm in Russia utilized to hack and create chaos; The Equation Group hackers at the NSA; Zero Day explained; The Shadow Brokers and Eternal Blue; How Sandworm got into Ukraine's power systems in 2015 1:37:48  - Andy tells the story of the 2017 Maersk global NotPetya attack; The downstream effects across many industries from the Maersk attack; The sobering reality of our modern day all-tech world; Andy explains what happened with the NSA's Stuxnet attack on Iranian Nuclear Centrifuges 2:03:30 - Debating the Mutually Assured Destruction argument with respect to the cyberwar; China's activity in international hacking; “If Russia is a hurricane, China is climate change”; North Korea's criminal hacking teams; The White House just put a bounty on Sandworm 2:22:38 - We need a Geneva Convention for Cyber Warfare and Cyber crimes; The Obama and Trump Whitehouse positions on Russian hacking; Andy's conversation about Sandworm with Obama's Cybersecurity Czar J. Michael Daniel 2:39:22 - Boots on the ground  vs cyber on the ground in Ukraine Russia War?; China's place in the Russia Ukraine Conflict; Andy talks about sitting with Edward Snowden in Russia for an interview ahead of his book, “Sandworm”; What's Snowden like? ~ YouTube EPISODES & CLIPS: https://www.youtube.com/channel/UC0A-v_DL-h76F75xik8h03Q ~ Get $150 Off The Eight Sleep Pod Pro Mattress / Mattress Cover (USING CODE: “TRENDIFIER”): https://eight-sleep.ioym.net/trendifier   PRIVADO VPN FOR $4.99/Month: https://privadovpn.com/trendifier/#a_aid=Julian Julian's Instagram: https://www.instagram.com/julianddorey ~ Beat provided by: https://freebeats.io Music Produced by White Hot

The CyberHub Podcast
Russia & Ukraine Escalate as War Looms, CISA warns & China Cyber

The CyberHub Podcast

Play Episode Listen Later Feb 23, 2022 15:46 Transcription Available


Russia & Ukraine Escalate as War Looms, CISA warns & China Cyber   Cybersecurity News CyberHub Podcast February 23rd , 2022   Today's Headlines and the latest #cybernews from the desk of the #CISO: CISA Warns of Attacks Exploiting Recent Vulnerabilities in Zabbix Monitoring Tool Increasing Number of Threat Groups Targeting OT Systems in North America Dridex Malware Deploying Entropy Ransomware on Hacked Computers Chinese Experts Uncover Details of Equation Group's Bvp47 Covert Hacking Tool Cybercriminals Seek to Profit From Russia-Ukraine Conflict Russian Cyber Activity and How to defend your business   Story Links: https://www.securityweek.com/cisa-warns-attacks-exploiting-recent-vulnerabilities-zabbix-monitoring-tool https://www.securityweek.com/increasing-number-threat-groups-targeting-ot-systems-north-america https://thehackernews.com/2022/02/dridex-malware-deploying-entropy.html https://thehackernews.com/2022/02/chinese-experts-uncover-details-of.html https://www.securityweek.com/cybercriminals-seek-profit-russia-ukraine-conflict https://www.wsj.com/articles/companies-must-prepare-for-more-russian-cyber-activity-experts-warn-11645574438?mod=tech_lead_pos12   “The Microsoft Doctrine” by James Azar now on Substack https://jamesazar.substack.com/p/the-microsoft-doctrine   The Practitioner Brief is sponsored by: KnowBe4: https://info.knowbe4.com/phishing-security-test-cyberhub  ****** Find James Azar Host of CyberHub Podcast, CISO Talk, Goodbye Privacy, Digital Debate, and Other Side of Cyber James on Linkedin: https://www.linkedin.com/in/james-azar-a1655316/ Telegram: CyberHub Podcast ****** Sign up for our newsletter with the best of CyberHub Podcast delivered to your inbox once a month: http://bit.ly/cyberhubengage-newsletter ****** Website: https://www.cyberhubpodcast.com Youtube: https://www.youtube.com/c/TheCyberHubPodcast Rumble:  https://rumble.com/c/c-1353861 Facebook: https://www.facebook.com/CyberHubpodcast/ Linkedin: https://www.linkedin.com/company/cyberhubpodcast/ Twitter: https://twitter.com/cyberhubpodcast Instagram: https://www.instagram.com/cyberhubpodcast Listen here: https://linktr.ee/cyberhubpodcast   The Hub of the Infosec Community. Our mission is to provide substantive and quality content that's more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.   #cybernews #infosec #cybersecurity #cyberhubpodcast #practitionerbrief #cisotalk #ciso #infosecnews #infosec #infosecurity #cybersecuritytips #podcast #technews #tinkertribe #givingback #securitytribe #securitygang #informationsecurity

Nerds Amalgamated
Apple Protects Children, Australian Government Helping The Australian Games Industry & Jason Mamoa On Superhero Movies

Nerds Amalgamated

Play Episode Listen Later Aug 18, 2021 69:51


We've got a very important issue to talk about this week. Apple wants to look at your private pictures. They've made such a big deal about privacy for years, so what's changed and why can't we trust them anymore? What have you done Tim Apple?The Australian government really hasn't liked supporting the games industry, despite years of lobbying and studies into how great the industry is for the economy. Someone's finally got through to them and we'll be getting changes to tax and visas to help encourage AAA development.Jason Mamoa thinks superheroes are like Greek mythology. Turns out the only reason he's joining the Scorsese comic genre battle is to remind everyone he wants to talk about climate change in his movies. Anyway, we all know his best role will be Duncan Idaho in Dune. It better not get delayed againApple's controversial new child protection features- https://www.theverge.com/2021/8/10/22613225/apple-csam-scanning-messages-child-safety-features-privacy-controversy-explained- https://www.ask-solutions.org/blog/2021/08-11-01?fbclid=IwAR1M731S3OrleR84O6134H-ZWXb5EtBoTY9tyXlIs0TiUXBVFwgHpP8Qmvc- https://www.reuters.com/technology/exclusive-apples-child-protection-features-spark-concern-within-its-own-ranks-2021-08-12/Australian Games Industry gets a Government Injection- https://www.gamesindustry.biz/articles/2021-08-10-how-australia-is-creating-a-sustainable-video-game-development-ecosystem?Jason Mamoa's take on superhero movies- https://boundingintocomics.com/2021/08/09/aquaman-star-jason-momoa-defends-superhero-movies-as-an-art-form-in-response-martin-scorseses-genre-criticisms/Other topics discussedWorst Cooks in America (an American reality television series that premiered on January 3, 2010, on Food Network. The show takes 12 to 16 contestants (referred to as "recruits") with very poor cooking skills through a culinary boot camp, to earn a cash prize of $25,000 and a Food Network cooking set.)- https://en.wikipedia.org/wiki/Worst_Cooks_in_AmericaFBI–Apple encryption dispute (The FBI–Apple encryption dispute concerns whether and to what extent courts in the United States can compel manufacturers to assist in unlocking cell phones whose data are cryptographically protected. There is much debate over public access to strong encryption. The Federal Bureau of Investigation (FBI) wanted Apple to create and electronically sign new software that would enable the FBI to unlock a work-issued iPhone 5C it recovered from one of the shooters who, in a December 2015 terrorist attack in San Bernardino, California, killed 14 people and injured 22.)- https://en.wikipedia.org/wiki/FBI%E2%80%93Apple_encryption_disputeHow Does the YouTube Algorithm Work in 2021? The Complete Guide- https://blog.hootsuite.com/how-the-youtube-algorithm-works/Perceptual hashing (the use of an algorithm that produces a snippet or fingerprint of various forms of multimedia. A perceptual hash is a type of locality-sensitive hash, which is analogous if features of the multimedia are similar.)- https://en.wikipedia.org/wiki/Perceptual_hashingreCAPTCHA (a CAPTCHA system that enables web hosts to distinguish between human and automated access to websites. The original version asked users to decipher hard to read text or match images. Version 2 also asked users to decipher text or match images if the analysis of cookies and canvas rendering suggested the page was being downloaded automatically. reCAPTCHA is owned by Google.)- https://en.wikipedia.org/wiki/ReCAPTCHAThe Shadow Brokers (a hacker group who first appeared in the summer of 2016. They published several leaks containing hacking tools, including several zero-day exploits, from the "Equation Group" who are widely suspected to be a branch of the National Security Agency (NSA) of the United States.)- https://en.wikipedia.org/wiki/The_Shadow_BrokersElectronic Frontier Foundation (The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet civil liberties.)- https://en.wikipedia.org/wiki/Electronic_Frontier_Foundation- https://www.eff.org/WarGames (a 1983 American Cold War science fiction techno-thriller film written by Lawrence Lasker and Walter F. Parkes and directed by John Badham. The film, which stars Matthew Broderick, Dabney Coleman, John Wood, and Ally Sheedy, follows David Lightman (Broderick), a young hacker who unwittingly accesses a United States military supercomputer programmed to predict and execute nuclear war against the Soviet Union.)- https://en.wikipedia.org/wiki/WarGamesHackers (a 1995 American crime film directed by Iain Softley and starring Jonny Lee Miller, Angelina Jolie, Jesse Bradford, Matthew Lillard, Laurence Mason, Renoly Santiago, Lorraine Bracco, and Fisher Stevens. The film follows a group of high school hackers and their involvement in a corporate extortion conspiracy.)- https://en.wikipedia.org/wiki/Hackers_(film)Shodan (Shodan is the world's first search engine for Internet-connected devices. Discover how Internet intelligence can help you make better decisions.)- https://www.shodan.io/PhotoDNA (PhotoDNA creates a unique digital signature (known as a “hash”) of an image which is then compared against signatures (hashes) of other photos to find copies of the same image. When matched with a database containing hashes of previously identified illegal images, PhotoDNA is an incredible tool to help detect, disrupt and report the distribution of child exploitation material. PhotoDNA is not facial recognition software and cannot be used to identify a person or object in an image. A PhotoDNA hash is not reversible, and therefore cannot be used to recreate an image.)- https://www.microsoft.com/en-us/photodnaThe Trauma Floor The secret lives of Facebook moderators in America- https://www.theverge.com/2019/2/25/18229714/cognizant-facebook-content-moderator-interviews-trauma-working-conditions-arizonaMortal Kombat 11 Developer Was Diagnosed with PTSD Due to Graphic Violence- https://segmentnext.com/mortal-kombat-11-developer-ptsd/Facebook will pay $52 million in settlement with moderators who developed PTSD on the job- https://www.theverge.com/2020/5/12/21255870/facebook-content-moderator-settlement-scola-ptsd-mental-healthArtificial neural network (usually simply called neural networks (NNs), are computing systems inspired by the biological neural networks that constitute animal brains. An ANN is based on a collection of connected units or nodes called artificial neurons, which loosely model the neurons in a biological brain.)- https://en.wikipedia.org/wiki/Artificial_neural_networkBob's Burgers – The Snake Song- https://genius.com/Bobs-burgers-the-snake-song-lyrics- https://www.youtube.com/watch?v=-tvhw7jnYi0Financial crisis of 2007–2008 (also known as the global financial crisis (GFC), was a severe worldwide economic crisis. Prior to the COVID-19 recession in 2020, it was considered by many economists to have been the most serious financial crisis since the Great Depression.)- https://en.wikipedia.org/wiki/Financial_crisis_of_2007%E2%80%932008Halfbrick Studios (Australian video game developer based in Brisbane. The company primarily worked on licensed games until 2008. The company released Fruit Ninja (2010) and Jetpack Joyride (2011).)- https://en.wikipedia.org/wiki/Halfbrick_StudiosUntitled Goose Game (a 2019 puzzle stealth game developed by House House and published by Panic. Players control a goose who bothers the inhabitants of an English village. The player must use the goose's abilities to manipulate objects and non-player characters to complete objectives. It was released for Microsoft Windows, macOS, Nintendo Switch, PlayStation 4, and Xbox One.)- https://en.wikipedia.org/wiki/Untitled_Goose_GameFruit Ninja (a video game developed by Halfbrick. It was released April 21, 2010 for iPod Touch and iPhone devices, July 12, 2010 for the iPad, September 17, 2010 for Android OS devices.)- https://en.wikipedia.org/wiki/Fruit_NinjaFiverr (Israeli online marketplace for freelance services. The company provides a platform for freelancers to offer services to customers worldwide.)- https://en.wikipedia.org/wiki/FiverrActivision Blizzard Lawsuit Alleges Horrific Mistreatment Of Women- https://www.forbes.com/sites/paultassi/2021/07/22/activision-blizzard-lawsuit-alleges-horrific-mistreatment-of-women/?sh=56144afb166cYongYea - Scummy Amazon Policy That Steals Employees' Personal Game Projects Dropped After Backlash From Devs- https://www.youtube.com/watch?v=oQtKfutVFTIMotion Picture Production Code (a set of industry guidelines for the self-censorship of content that was applied to most United States motion pictures released by major studios from 1934 to 1968. It is also popularly known as the Hays Code, after Will H. Hays, who was the president of the Motion Picture Producers and Distributors of America (MPPDA) from 1922 to 1945.)- https://en.wikipedia.org/wiki/Motion_Picture_Production_CodeBreaking Bad (an American neo-Western crime drama television series created and produced by Vince Gilligan. The show aired on AMC from January 20, 2008, to September 29, 2013, consisting of five seasons for a total of 62 episodes.)- https://en.wikipedia.org/wiki/Breaking_Bad‘Simpsons' Episode Featuring Michael Jackson Kept Off Disney+- https://www.hollywoodreporter.com/tv/tv-news/simpsons-episode-featuring-michael-jackson-kept-disney-1254609/2012 (a 2009 American science fiction disaster film directed and written by Roland Emmerich. It was produced by Harald Kloser, Mark Gordon, and Larry J. Franco, and written by Kloser and Emmerich. The film stars John Cusack, Amanda Peet, Chiwetel Ejiofor, Oliver Platt, Thandiwe Newton, Danny Glover, and Woody Harrelson.)- https://en.wikipedia.org/wiki/2012_(film)Geostorm (a 2017 American science fiction disaster film directed, co-written, and co-produced by Dean Devlin (in his feature directorial debut). The film stars Gerard Butler, Jim Sturgess, Abbie Cornish, Ed Harris, and Andy García. It follows a satellite designer who tries to save the world from a storm of epic proportions caused by malfunctioning climate-controlling satellites.)- https://en.wikipedia.org/wiki/GeostormVolcano (a 1997 American disaster film directed by Mick Jackson, and produced by Andrew Z. Davis, Neal H. Moritz and Lauren Shuler Donner. The storyline was conceived from a screenplay written by Jerome Armstrong and Billy Ray, and is inspired by the 1943 formation of the Parícutin volcano in Paricutin, Mexico.)- https://en.wikipedia.org/wiki/Volcano_(1997_film)Thanos (a genocidal warlord from Titan, whose own main objective was to bring stability to the universe by wiping out half of all life at every level, as he believed its massive population would inevitably use up the universe's entire supply of resources and condemn this. To complete this goal, Thanos set about hunting down all the Infinity Stones, being confident that the combined power of the Stones would achieve his goal.)- https://marvelcinematicuniverse.fandom.com/wiki/ThanosNo Man's Sky Gameplay Trailer | E3 2014 | PS4- https://www.youtube.com/watch?v=nLtmEjqzg7MAngryJoeShow - No Man's Sky Angry Review- https://www.youtube.com/watch?v=uTTPlqK8AnY&t=1897sInternet Historian - The Engoodening of No Man's Sky- https://www.youtube.com/watch?v=O5BJVO3PDeQ&t=59sAgent Orange (a herbicide and defoliant chemical, one of the "tactical use" Rainbow Herbicides. It is widely known for its use by the U.S. military as part of its herbicidal warfare program, Operation Ranch Hand,during the Vietnam War from 1961 to 1971. It is a mixture of equal parts of two herbicides, 2,4,5-T and 2,4-D. In addition to its damaging environmental effects, traces of dioxin (mainly TCDD, the most toxic of its type) found in the mixture have caused major health problems for many individuals who were exposed, and their offspring. )- https://en.wikipedia.org/wiki/Agent_OrangeThe Tramp (also known as The Little Tramp, was British actor, Charlie Chaplin's most memorable on-screen character and an icon in world cinema during the era of silent film. The Tramp is also the title of a silent film starring Chaplin, which Chaplin wrote and directed in 1915.)- https://en.wikipedia.org/wiki/The_TrampApple – Think Different Commercial- https://www.youtube.com/watch?v=4oAB83Z1ydEAnti-Monopoly (a board game made by San Francisco State University Professor Ralph Anspach in response to Monopoly. The idea of an anti-monopoly board game dates to 1903 and the original Monopoly created by Lizzie Magie.)- https://en.wikipedia.org/wiki/Anti-MonopolyAnti-Monopoly, Inc. vs. General Mills Fun Group, Inc. court case 1976–1985 (Starting in 1974, Parker Brothers and its then corporate parent, General Mills, attempted to suppress publication of a game called Anti-Monopoly, designed by San Francisco State University economics professor Ralph Anspach and first published the previous year.)- https://en.wikipedia.org/wiki/History_of_Monopoly#Anti-Monopoly.2C_Inc._vs._General_Mills_Fun_Group.2C_Inc._court_case_1976.E2.80.931985The Rageaholic - Begun, The Comic Film Crash Has - A Rant- https://www.youtube.com/watch?v=Dlk3-NtOFkkTerror Australis Podcast (TNC podcast)- https://anchor.fm/terror-australis-podcastShout Outs 9th August 2021 – 5th Anniversary of No Man's Sky - https://www.nomanssky.com/2021/08/no-mans-sky-5th-anniversary/No Man's Sky is easily one of the most infamous titles in video game history, thanks to its extremely rocky launch and poor state at release. The game lacked many of its core promised features when it launched, resulting in heavy fan backlash. Within two years of its rollout, the tide started turning in No Man's Sky's favor, thanks in large part to updates that transformed the experience. NEXT counted as the first of such changes, ushering in multiplayer gameplay options that Hello Games teased in the lead up to launch. This particular update also overhauled the graphics and introduced refined base-building mechanics. Hello Games' efforts didn't stop there either; as such, the redemption arc for No Man's Sky has been rather impressive to watch unfold. With the game now celebrating its fifth year anniversary, Hello Games has put out a short video looking back at all of the updates we've seen so far, along with a tease of what's coming next.9th August 2021 – 25th anniversary of Escape from L.A. - https://movieweb.com/escape-from-la-25th-anniversary/Stylized on-screen as John Carpenter's Escape from L.A. A 1996 American post-apocalyptic action film co-written, co-scored, and directed by John Carpenter, co-written and produced by Debra Hill and Kurt Russell, with Russell also starring as Snake Plissken. A sequel to Escape from New York, Escape from L.A. co-stars Steve Buscemi, Stacy Keach, Bruce Campbell, and Pam Grier. The film gained a strong cult following. The film was in development for over 10 years. At one point, a script was commissioned in 1987 and was written by screenwriter Coleman Luck, with Dino De Laurentiis's company producing. Carpenter later described the script as "too light, too campy". In time, Carpenter and Kurt Russell got together to write with their long-time collaborator Debra Hill. Carpenter insists that Russell's persistence allowed the film to be made, since "Snake Plissken was a character he loved and wanted to play again." At the beginning of the film, Kurt Russell wears his costume from the original film, which still fits after fifteen years. The film takes place in 2013.10th August 2021 – 60th Anniversary of Operation Ranch Hand, spraying an estimated 20 million US gallons (76,000 m3) of defoliants and herbicides over rural areas of South Vietnam in an attempt to deprive the Viet Cong of food and vegetation cover - https://en.wikipedia.org/wiki/Operation_Ranch_HandOperation Ranch Hand was a U.S. military operation during the Vietnam War, lasting from 1962 until 1971. Largely inspired by the British use of 2,4,5-T and 2,4-D (Agent Orange) during the Malayan Emergency in the 1950s, it was part of the overall herbicidal warfare program during the war called "Operation Trail Dust". Ranch Hand involved spraying an estimated 20 million U.S. gallons (76,000 m3) of defoliants and herbicides over rural areas of South Vietnam in an attempt to deprive the Viet Cong of food and vegetation cover. Areas of Laos and Cambodia were also sprayed to a lesser extent. Nearly 20,000 sorties were flown between 1961 and 1971. The herbicides were sprayed by the U.S. Air Force flying C-123s using the call sign "Hades". The planes were fitted with specially developed spray tanks with a capacity of 1,000 U.S. gallons (4 m3) of herbicides. A plane sprayed a swath of land that was 80 meters wide and 16 kilometers (10 mi) long in about 4½ minutes, at a rate of about 3 U.S. gallons per acre (3 m3/km2). Sorties usually consisted of three to five aircraft flying side by side. 95% of the herbicides and defoliants used in the war were sprayed by the U.S. Air Force as part of Operation Ranch Hand. The remaining 5% were sprayed by the U.S. Chemical Corps, other military branches, and the Republic of Vietnam using hand sprayers, spray trucks, helicopters and boats, primarily around U.S. military installations. The use of herbicides in the Vietnam War was controversial from the beginning, particularly for crop destruction. The scientific community began to protest the use of herbicides in Vietnam as early as 1964, when the Federation of American Scientists objected to the use of defoliants. In 1967, seventeen Nobel laureates and 5,000 other scientists signed a petition asking for the immediate end to the use of herbicides in Vietnam. According to the Vietnamese government, the US program exposed approximately 4.8 million Vietnamese people to Agent Orange, resulted in 400,000 deaths due to a range of cancers and other ailments. The Vietnamese population has suffered a range of ailments with three million Vietnamese people suffering health problems, one million birth defects caused directly by exposure to Agent Orange, and 24% of the area of Vietnam being defoliated.12th August 2021 – 40th birthday of the IBM 5150 - https://en.wikipedia.org/wiki/IBM_Personal_Computer#DebutOn August 12, 1981, Don Esteridge, who was unknown at the time, announced the release of the new personal computer created by his company. The head of development at IBM Entry Level Systems presented the 5150, or IBM PC, a concept that would revolutionize the computer industry forever. The machine was based on open architecture and a substantial market of third-party peripherals, expansion cards and software grew up rapidly to support it. The PC had a substantial influence on the personal computer market. The specifications of the IBM PC became one of the most popular computer design standards in the world, and the only significant competition it faced from a non-compatible platform throughout the 1980s was from the Apple Macintosh product line. The majority of modern personal computers are distant descendants of the IBM PC.Pricing started at $1,565 for a configuration with 16K RAM, Color Graphics Adapter, and no disk drives. The price was designed to compete with comparable machines in the market. For comparison, the Datamaster, announced two weeks earlier as IBM's least expensive computer, cost $10,000. IBM's marketing campaign licensed the likeness of Charlie Chaplin's character "The Little Tramp" for a series of advertisements based on Chaplin's movies, played by Billy Scudder. The PC was IBM's first attempt to sell a computer through retail channels rather than directly to customers. Reception was overwhelmingly positive, with sales estimates from analysts suggesting billions of dollars in sales over the next few years, and the IBM PC immediately became the talk of the entire computing industry. Dealers were overwhelmed with orders, including customers offering pre-payment for machines with no guaranteed delivery date. By the time the machine was shipping, the term "PC" was becoming a household name.Remembrances10th August 2010 - David L. Wolper - https://en.wikipedia.org/wiki/David_L._WolperAmerican television and film producer, responsible for shows such as Roots, The Thorn Birds, North and South, L.A. Confidential, and Willy Wonka & the Chocolate Factory (1971). He was awarded the Jean Hersholt Humanitarian Award at the 57th Academy Awards in 1985 for his work producing the opening and closing ceremonies of the XXIIIrd Olympiad, Los Angeles 1984 as well as helping to bring the games to L.A. His 1971 film (as executive producer) about the study of insects, The Hellstrom Chronicle, won an Academy Award. On March 13, 1974, one of his crews filming a National Geographic history of Australopithecus at Mammoth Mountain Ski Area was killed when their Sierra Pacific Airlines Corvair 440 slammed into the White Mountains shortly after takeoff from Eastern Sierra Regional Airport in Bishop, California, killing all 35 on board, including 31 Wolper crew members. The filmed segment was recovered in the wreckage and was broadcast in the television series Primal Man. The cause of the crash remains unsolved. In 1988, Wolper was inducted into the Television Hall of Fame. For his work on television, he had received his star on the Hollywood Walk of Fame. He died from congestive heart disease and complications of Parkinson's disease at the age of 82 in Beverly Hills, California.Famous Birthdays10th August 1889 – Charles Darrow - https://en.wikipedia.org/wiki/Charles_DarrowAmerican who modified the design of Lizzie Magie's original invention The Landlord's Game. He became the first millionaire game designer in history, and although Magie patented her invention she received only $500. Parker Brothers falsely credited Darrow as the original inventor. While Darrow eventually sold his version of Monopoly to Parker Brothers, claiming it to be his own invention, modern historians credit Darrow as just one of the game's final developers. Monopoly is a board game which focuses on the acquisition of fictional real estate titles, with the incorporation of elements of chance. After losing his job at a sales company following the Stock Market Crash of 1929, Darrow worked at various odd jobs. Seeing his neighbors and acquaintances play a board game in which the object was to buy and sell property, he decided to publish his own version of the game, with the help of his first son, William, and his wife Esther. Darrow marketed his version of the game under the name Monopoly. In truth, Darrow was just one of many people in the American Midwest and East Coast who had been playing a game of buying and trading property. The game's direct ancestor was The Landlord's Game, created by Elizabeth Magie. The Darrow family initially made their game sets on flexible, round pieces of oilcloth instead of rigid, square carton. Charles drew the designs of the properties with drafting pens, and his son and wife filled in the spaces with colors and made the title deed cards and Chance and Community Chest cards. In 1970, three years after Darrow's death, Atlantic City placed a commemorative plaque in his honor on The Boardwalk, near the corner of Park Place. In 1973 Ralph Anspach, an economics professor at San Francisco State University, produced Anti-Monopoly, a game similar to Monopoly, and for this was sued by Parker Brothers. He was born in Philadelphia, Pennsylvania.Events of Interest10th August 1960 – Dinosaurus! was released - https://www.imdb.com/title/tt0053768/ On this day in 1960, it was 'Jurassic Park' all over again with the release of Dinosaurus! The feature starred Ward Ramsey and Kristina Hanson, and here's the plot summary: "After undersea explosions near a Caribbean island, prehistoric creatures are unleashed on the unsuspecting population. Freed from his watery tomb, as well, is a very friendly Neanderthal man who proceeds to befriend a local orphan boy. The boy, Neanderthal and irritated dinosaur make for an interesting dramatic climax." The leading role was intended for Steve McQueen, who starred in The Blob two years earlier, also produced by Harris and directed by Yeaworth. McQueen passed on the film to make The Magnificent Seven instead. The dinosaurs were filmed using the technique of stop-motion animation as well as puppets for close-ups. The film promulgates the naïve idea that herbivorous animals (such as the brontosaurus) are not dangerous (a similar claim was made in Spielberg's 'Jurassic Park', 1993). The cape buffalo is one of the most aggressive and dangerous animals in Africa (and only weighs about 5% of what a brontosaurus is estimated to have weighed). Marcel Delgado was given less than half the time originally agreed upon to create the dinosaur models used in the film. The studio initially agreed to give him five to six weeks, as he requested, but two weeks later he was told that they would begin production on Tuesday. When Betty is captured by the neanderthal and taken to his cave, she's wearing a white dress and a pearl necklace. Combined with her red hair, she bears a striking resemblance to Wilma Flintstone, one of the stars of the TV cartoon series "The Flintstones" (1960), which would debut on American television one month after this movies US release (coincidentally, Betty is the name of Wilma's best friend).10th August 1990 – The Magellan space probe reaches Venus. - https://en.wikipedia.org/wiki/Magellan_(spacecraft)#Orbital_encounter_of_Venus On August 10, 1990, the American Magellan probe, named after the explorer Ferdinand Magellan, arrived at its orbit around the planet and started a mission of detailed radar mapping at a frequency of 2.38 GHz. It began the orbital insertion maneuver which placed the spacecraft into a three-hour, nine minute, elliptical orbit that brought the spacecraft 295-kilometers from the surface at about 10 degrees North during the periapsis and out to 7762-kilometers during apoapsis. During each orbit, the space probe captured radar data while the spacecraft was closest to the surface, and then transmit it back to Earth as it moved away from Venus. This maneuver required extensive use of the reaction wheels to rotate the spacecraft as it imaged the surface for 37-minutes and as it pointed toward Earth for two hours. The primary mission intended for the spacecraft to return images of at least 70 percent of the surface during one Venusian day, which lasts 243 Earth days as the planet slowly spins. To avoid overly-redundant data at the highest and lowest latitudes, the Magellan probe alternated between a Northern-swath, a region designated as 90 degrees north latitude to 54 degrees south latitude, and a Southern-swath, designated as 76 degrees north latitude to 68 degrees south latitude. However, due to periapsis being 10 degrees north of the equatorial line, imaging the South Pole region was unlikely. The resulting maps were comparable to visible-light photographs of other planets, and are still the most detailed in existence. Magellan greatly improved scientific understanding of the geology of Venus: the probe found no signs of plate tectonics, but the scarcity of impact craters suggested the surface was relatively young, and there were lava channels thousands of kilometers long.IntroArtist – Goblins from MarsSong Title – Super Mario - Overworld Theme (GFM Trap Remix)Song Link - https://www.youtube.com/watch?v=-GNMe6kF0j0&index=4&list=PLHmTsVREU3Ar1AJWkimkl6Pux3R5PB-QJFollow us onFacebook- Page - https://www.facebook.com/NerdsAmalgamated/- Group - https://www.facebook.com/groups/440485136816406/Twitter - https://twitter.com/NAmalgamatedSpotify - https://open.spotify.com/show/6Nux69rftdBeeEXwD8GXrSiTunes - https://itunes.apple.com/au/podcast/top-shelf-nerds/id1347661094Instagram - https://www.instagram.com/nerds_amalgamated/Email - Nerds.Amalgamated@gmail.comSupport via Podhero- https://podhero.com/podcast/449127/nerds-amalgamated See acast.com/privacy for privacy and opt-out information.

covid-19 united states america tv american new york california history game children english google israel earth starting apple internet los angeles discover mexico british san francisco africa philadelphia australian western pennsylvania events south iphone financial north greek ptsd fbi fame harris vietnam escape players pc roots caribbean panic southern playstation academy awards dune ipads air force republic east coast ibm artificial pricing hackers stones jurassic park parkinson areas soviet union nintendo switch brisbane playstation 4 nobel national geographic monopoly northern beverly hills amc vietnam war carpenter aaa john carpenter cambodia hades thanos great depression spielberg vietnamese federation landlords no man freed food network volcanos xbox one willy wonka angelina jolie magie war games scorsese atlantic city laos macos confidential moritz protects kurt russell reception woody harrelson chocolate factory blob charlie chaplin complete guide neanderthals south pole steve mcqueen flintstones chaplin bruce campbell hays tramp john cusack magnificent seven general mills gerard butler san bernardino dealers mcqueen steve buscemi superhero movies san francisco state university federal bureau ed harris danny glover hollywood walk bobs australian government orbital matthew broderick roland emmerich boardwalk agent orange national security agency magellan gfc distributors matthew lillard microsoft windows david l infinity stones jason mamoa chiwetel ejiofor pam grier white mountains parkes stock market crash ipod touch electronic frontier foundation vince gilligan sorties captcha viet cong emmerich billy ray south vietnam american midwest john wood games industry geostorm darrow ghz oliver platt venusian ally sheedy perceptual hays code hello games snake plissken fisher stevens dabney coleman stacy keach investigation fbi thandiwe newton debra hill mark gordon american scientists john badham ferdinand magellan parker brothers fruit ninja amanda peet park place australopithecus android os jonny lee miller dean devlin apple macintosh ibm pc house house tim apple recaptcha dino de laurentiis worst cooks jim sturgess iphone 5c abbie cornish dinosaurus jetpack joyride stylized amalgamated mick jackson john gilmore jesse bradford andy garc john perry barlow lizzie magie ranch hand duncan idaho iain softley mitch kapor little tramp charles darrow elizabeth magie podhero nns graphic violence equation group american cold war television hall of fame when betty tcdd harald kloser kloser fbi apple wilma flintstone halfbrick walter f parkes jerome armstrong
Symantec Cyber Security Brief Podcast
Accellion product vulns, Equation group tool copied by Chinese APT, and software supply chain attacks in France

Symantec Cyber Security Brief Podcast

Play Episode Listen Later Feb 25, 2021 23:21


On this week’s Cyber Security Brief podcast, Dick O’Brien and Brigid O’Gorman discuss some of the biggest cyber security stories of the last few weeks. Among the stories up for discussion are the bugs in Accellion’s 20-year-old FTA product, which led to multiple companies worldwide reporting breaches related to it. We also talk about the reports saying the Sandworm group has been carrying out a long-running spying campaign against multiple French IT services providers by compromising an open-source IT monitoring tool called Centreon, and a Chinese APT group reportedly cloning an Equation group tool. Some interesting law enforcement activity in recent weeks is also up for discussion.

The CyberWire
Facebook takes down Myanmar military page. Chinese cyberespionage and cloned Equation Group tools. Supply chain compromises. Threat trends.

The CyberWire

Play Episode Listen Later Feb 22, 2021 23:49


Facebook takes down Myanmar junta’s main page. APT31 clones Equation Group tools. Silver Sparrow’s up to...something or other. Bogus Flash Player update serves fake news and malware. Effects of supply chain compromises spread. Clubhouse’s privacy issues. VC firm breached. CrowdStrike releases its annual threat report. We welcome Josh Ray from Accenture security to our show. Rick Howard examines Google’s cloud services. And a Maryland school concludes its annual cyber challenge. For links to all of today's stories check out our CyberWire daily news brief: https://www.thecyberwire.com/newsletters/daily-briefing/10/34

Unresolved
The Shadow Brokers (Part One: Auction)

Unresolved

Play Episode Listen Later Sep 28, 2019 43:37


In August of 2016, a mysterious hacker collective began releasing files and folders stolen directly from the NSA.Many of the programs this person or group released appeared to be legitimate cyber-weapons, which had been developed by U.S. intelligence. Despite the audaciousness of their posts - which became more immature and unhinged as time went on - the files they released seemed to have come directly from an NSA server. A leak of this magnitude had never been seen before, and the cyber-intel community struggled to stop the bleeding. But over the next several months, the Shadow Brokers would continue to wage a one-sided campaign against their sworn enemy: a secretive branch of the NSA nicknamed the "Equation Group"... Part 1/2Special thanks to: Jeremy (Podcasts We Listen To), Jesse (Devil's Teeth, Podcast 1289), Nina (Already Gone, Don't Talk To Strangers), Erin and Shea (All Crime No Cattle), and Brett (husband of Lanie from True Crime Fan Club & Crimes of Passion) for lending their voices to this episodeEpisode researched, written, hosted, and produced by Micheal WhelanOriginal music created by Micheal Whelan through Amper MusicTheme music created and composed by Ailsa TravesProducers: Maggyjames, Ben Krokum, Roberta Janson, Matthew Brock, Quil Carter, Peggy Belarde, Evan White, Laura Hannan, Katherine Vatalaro, Damion Moore, Amy Hampton Miller, Scott Meesey, Steven Wilson, Scott Patzold, Marie Vanglund, Lori Rodriguez, Emily McMehen, Jessica Yount, Aimee McGregor, Lauren Harris, Danny Williams, Cody Ketterling, Brian Rollins, and Sue KirkLearn more about this podcast at http://unresolved.meIf you would like to support this podcast and others, consider heading to https://www.patreon.com/unresolvedpod to become a Patron or Producer

ShadowTalk by Digital Shadows
“Buckeye” APT group used Equation Group tools before 2017 leak

ShadowTalk by Digital Shadows

Play Episode Listen Later May 10, 2019 27:55


Kacey and Alex join HVR to talk through the key stories this week including a new threat group called “Mirrorthief” conducting “Magecart”-like digital skimming attacks against university websites, various code-sharing repositories being targeted and held for ransom by an unknown threat actor; and new ransomware, “Sodinokibi”, which used a zero-day vulnerability in Oracle WebLogic. Simon Hall and Dr. Richard Gold then join to dive deeper into the “Buckeye” APT group, which has recently been said to develop its own version of a tool that was likely created by the U.S. National Security Agency (NSA) prior to being leaked by the “ShadowBrokers” in 2017. Read the full findings at https://resources.digitalshadows.com/weekly-intelligence-summary/weekly-intelligence-summary-02-may-09-may-2019.

Symantec Cyber Security Brief Podcast
Buckeye’s use of Equation group tools pre Shadow Brokers leak, IoT security, and targeted ransomware

Symantec Cyber Security Brief Podcast

Play Episode Listen Later May 9, 2019 19:51


On this week’s Cyber Security Brief podcast, we discuss our newly-released research into the Buckeye espionage group, and its use of Equation group tools prior to the Shadow Brokers leak. Dick O’Brien is joined by Symantec analyst Sylvester Segura to discuss the findings and to share more details about Symantec’s investigation into this activity. Also this week, we chat about the growing threat of targeted ransomware, and look at what the UK government is planning to do to improve the security of IoT devices.

The CyberWire
Reverse engineering Equation Group attack tools (and putting them to bad use). Hacking, jamming, and airstrikes. Taking down coordinated inauthenticity. How big is the dark web?

The CyberWire

Play Episode Listen Later May 7, 2019 20:33


Buckeye seems to have reengineered some of Uncle Sam’s cyber tools, and they did it without, apparently, help from the ShadowBrokers. More on airstrikes as retaliation for hacking, with a brief excursus on electronic warfare. Notes on malicious commitment as one of the hazards of open source software development. How big is the dark web? Big enough, but maybe not as big as everyone thinks. And beware of bogus Avengers Endgame sites. David Dufour from Webroot with thoughts on HTTPS security concerns. Guest is Michael Figueroa from the Advance Cyber Security Center on their recent report identifying a need for a board-level cyber risk management standard. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_07.html  Support our show

The CyberWire
AWS S3 misconfigurations. Kaspersky's report on the Equation Group affair. Cybercrime notes. DPRK cyber campaigns. The VEP reviews continue positive. Amazon Key has issues.

The CyberWire

Play Episode Listen Later Nov 17, 2017 20:46


In today's podcast, we hear about more misconfigured S3 buckets (these in Australia). Kaspersky Lab protests its innocence as it releases a study of Equation Group leaks. Notes from the world of crime: dual-purpose Trojans, fake-news-as-a-service, and how the cops are keeping the robbers hopping. Some thoughts on Hidden Cobra, and what it means for ICS operators in particular. More positive notices for the VEP. Chris Poulin from BAH on AI ethical conundrums with self-driving cars. Jeremy Wittkop from InteliSecure on the trouble with Social Security Numbers. And Amazon Key may unlock more than one would like.  

The CyberWire
Email brute-forcing. Aadhaar woes. Leaked Equation Group exploits remain a problem. Hijacked Chrome extensions. Pulse wave DDoS. FBI interviews "Profexor." Extremism and vigilantism. OurMine hacks HBO Twitter, Facebook.

The CyberWire

Play Episode Listen Later Aug 17, 2017 16:31


In today's podcast, we hear that Holyrood is defending itself with some success against email brute-forcing. India's national ID system compromised, again. ShadowBroker-leaked exploits continue to do damage. Hijacked Chrome extensions prove difficult to eradicate. New variants of Locky and other ransomware are out. "Pulse wave" DDoS attacks are observed. Researchers find DDoS-as-a-service for sale in Chinese online souks. Governments express suspicion of foreign IT. Extremist site loses hosts, but its content will go on, even as opposing vigilantes mistakenly dox innocent targets. Emily Wilson from Terbium Labs with thoughts from Black Hat and shifting awareness of the dark web.  Brad Stone from Booz Allen on a recently released report on NotPetya. And OurMine hijacks HBO social media accounts. Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper. Your patient data depends on incident response plans. Prepare with DeltaRisk's webinar. Domain Tools leverages both human and machine intelligence to expose malicious infrastructure. Learn more in their white paper.

The CyberWire
NIST SP 800-53 updated. Attack on Scotland Parliament's email system. Consequences of Equation Group leaks. "Mr. Smith" and HBO. Attacks of note: Trickbot, OLE exploits, NetSarang backdoor. Extremist inspiration. BEC.

The CyberWire

Play Episode Listen Later Aug 16, 2017 16:45


In today's podcast, we hear about a new draft of NIST SP 800-53. There's been an attempt to brute-force email credentials in Scotland's Parliament. Fancy Bear's romp through high-end hotel Wi-Fi suggests the Equation Group leaks will be with us for some time. "Mr. Smith" remains at large, and still wants to be paid. Trickbot uses unusually convincing counterfeit sites. PowerPoint malware vectors may be part of a criminal test. NetSarang urges swift patching of a backdoor in its software. Extremist inspiration persists.  Ben Yelin from UMD CHHS on privacy concerns with robot vacuum cleaners. Guest is Jeff Pederson from Kroll Ontrack, a data recovery firm, with tips on data recovery.And some guy in Nigeria with more moxie than skills is behind a big business email compromise campaign. Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper. Your patient data depends on incident response plans. Prepare with DeltaRisk's webinar. Domain Tools leverages both human and machine intelligence to expose malicious infrastructure. Learn more in their white paper.  

The CyberWire
OilRig hires the Russian cyber-mob. WannaCry updates. Other EternalBlue exploits surface in the wild. Pending legislation in the US Congress. NIST issues guidelines for Executive Order compliance.

The CyberWire

Play Episode Listen Later May 18, 2017 14:55


In today's podcast, we hear that Iran's OilRig cyberespionage campaign seems to employing Russian hoods, and BlackEnergy. WannaCry recovery continues, but there may be worse to come. Still talking funny, the ShadowBrokers say you'll be able to subscribe to an Equation Group leak service next month. The US Senate considers putting the Vulnerability Equities Process on a legal foundation. NIST issues draft guidance on cyber Executive Order implementation. Level 3 Communications' Dale Drew predicts there's more ransomware in our futures. Mandeep Khera from Arxan Technologies outines vulnerabilities in mobile apps. And political parties in Western Europe still stink at email security, for all their worries about Fancy Bear.

Risk & Repeat
Risk & Repeat: More Equation Group cyberweapons leaked

Risk & Repeat

Play Episode Listen Later Apr 28, 2017


In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss the latest round of Equation Group cyberweapons and how Microsoft patched them.

Risk & Repeat
Risk & Repeat: More Equation Group cyberweapons leaked

Risk & Repeat

Play Episode Listen Later Apr 28, 2017


In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss the latest round of Equation Group cyberweapons and how Microsoft patched them.

Risk & Repeat
Risk & Repeat: More Equation Group cyberweapons leaked

Risk & Repeat

Play Episode Listen Later Apr 28, 2017


In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss the latest round of Equation Group cyberweapons and how Microsoft patched them.

Chiens de garde
Les Chiens de garde #43 - 2017/04/14

Chiens de garde

Play Episode Listen Later Apr 13, 2017 37:10


Une sécurité des données déficiente au SPVM, ShadowBrokers qui publie des outils de la NSA et le démantèlement du botnet Kelihos

Smashing Security
011: WikiLeaks and the CIA

Smashing Security

Play Episode Listen Later Mar 9, 2017 33:45


Has the CIA been using a Weeping Angel to spy on you via your Smart TV? Have WhatsApp, Telegram and Signal been compromised? What is the secret of the SATAN ransomware? And can you avoid having your data searched as you pass through border control? Computer security veterans Graham Cluley, Carole Theriault and special guest Paul Ducklin discuss. SHOW NOTES: Nintendo Classic Mini WikiLeaks says it releases files on CIA cyber spying tools The CIA didn't break Signal or WhatsApp, despite what you've heard After NSA hacking exposé, CIA staffers asked where Equation Group went wrong Apple, Samsung Respond To Wikileaks Claims Of CIA Hacking Programs Twitter reactions to the WikiLeaks CIA data dump Is the CIA's Weeping Angel spying on TV viewers? Satan ransomware: old name, new business model 3 (free) things that journalists can do right now to protect their data and their sources at the border The US Gov Can Download the Entire Contents of Your Computer at Border Crossings What Are Your Rights if Border Agents Want to Search Your Phone? Stop Fabricating Travel Security Advice  This episode of Smashing Security is sponsored by Foursys - check out their free end-user cybersecurity training kit - it's everything you need to roll out infosecurity best practice training (right from your desk). Grab it now from https://www.foursys.co.uk/toolkit Thanks to Foursys for sponsoring this episode of Smashing Security. Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes. Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening! Warning: This podcast may contain nuts, adult themes, and rude language. Special Guest: Paul Ducklin.

The CyberWire
Daily: Grid hacking in Ukraine? German terror investigations. Airliner vulnerability dispute. NIST wants post-quantum crypto standards. Project Wycheproof. Wassenaar update.

The CyberWire

Play Episode Listen Later Dec 21, 2016 14:55


In today's podcast, we hear about Ukraine's investigation of Saturday's power outages around Kiev—speculation says it was either a demonstration or misdirection. German police track terrorists' spoor online. Pakistani hackers hit Google's Bangladesh domain, possibly for the lulz. (Speaking of the lulz, OurMine is back and messing with Twitter accounts.) Panasonic and IOActive disagree over reports of airline vulnerabilities. Verizon mulls its Yahoo! acquisition plans, post-breach. NIST is looking for some post-quantum standards. Google's Project Wycheproof gets good early reviews. Joe Carrigan from the Johns Hopkins University Information Security Institute discusses the utility of burner email addresses. Sam McLane from Arctic Wolf reviews your incident response plan. Wassenaar renegotiation goes on hold. And the ShadowBrokers offer a low, low price, for Equation Group code, if you act now. (But we say "pass.")

The CyberWire
Daily: Another Ukrainian power grid outage may have cyber causes. ShadowBrokers may have got Equation Group code from a rogue insider. WordPress brute-forcing. Evading volumetric detection. Methbot ad fraud. Wassenaar remains controversial. 

The CyberWire

Play Episode Listen Later Dec 20, 2016 14:37


In today's podcast, we discuss another possible cyber incident that hit Ukraine's power grid last Saturday. Flashpoint looks at the ShadowBrokers' alleged Equation Group code and sees a rogue insider behind the leak. WordPress sites are receiving a lot of brute-forcing attempts. New spam and other attack techniques are evading volumetric detection. Mirai is sniffing for new IoT bots, and Dave Larson from Corero Network Security tells us what to expect in 2017. Jonathan Katz from the University of Maryland outlines advances in fully homomorphic encryption. Russian crooks skim ad revenue with the Methbot scam. Wassenaar cyber arms control remains controversial. And informed speculation suggests the ShadowBrokers and Bocephus Cleetus are—da—effectively, the same people.

The CyberWire
Daily: ShadowBrokers update. More consequences of the Yahoo! breach. Other sites suffer data compromises. US investigations of, plans for retaliation against, Russian influence operations proceed.

The CyberWire

Play Episode Listen Later Dec 19, 2016 14:58


In today's podcast, we hear about how the ShadowBrokers are stocking their discount rack with Equation Group bargains. Yahoo's data breach attracts regulatory, investor, and due diligence scrutiny. Yahoo's stolen data is also being offered for sale on the dark web. Multiple other data breaches come to light, and skids hit online games with DDoS attacks. Ben-Gurion University's Yisroel Mirsky describes vulnerabilities of the US 911 system. US investigation of Russian election influence operations continues, and the US says it's planning some sort of retaliation.

Säkerhetspodcasten
Säkerhetspodcasten #67 - The Shadow Brokers och Equation Group

Säkerhetspodcasten

Play Episode Listen Later Sep 12, 2016 54:05


I veckans avsnitt gör panelen en djupdykning i en hackergrupp omsvept av rykten och tveksamma fakta. Vilka är egentligen The Shadow Brokers? Vad innehåller den krypterade datadump som de släppt publikt på nätet? Är det 0-days och annan känslig information stulen från NSA, eller är det bara en scam för att lura nyfikna på bitcoins? Vi går igenom historiken och det material som finns att analysera för att försöka reda ut begreppen och många motsägelsefulla konspirationsteorier.

The Cyberlaw Podcast
Interview with Scott DePasquale

The Cyberlaw Podcast

Play Episode Listen Later Sep 7, 2016 52:24


In our 128th episode of the Steptoe Cyberlaw Podcast, Stewart Baker and Maury Shenk discuss: SWIFT Fraud Privacy Shield is up, and a lot of companies are signing up Equation Group tools outed – was NSA hacked by Shadow Brokers? Crypto World War Russia is hacking US politics CareFirst is kicking butt in injury-free breach lawsuits [Stewart] ECJ limits data protection jurisdiction LabMD loses before FTC and now can go to a neutral forum FTC loses turf in Ninth Circuit FTC finally notices that NIST has a Cybersecurity Framework UK watchdog endorses bulk collection of data Baltimore uses aerial surveillance tool from Iraq war Yahoo! skates with meaningless settlement of wiretap class action Our interview is with Scott DePasquale, CEO of Utilidata, to talk about cybersecurity and his contribution to the Internet Security Alliance’s upcoming book, The Cyber Security Social Contract. The views expressed in this podcast are those of the speakers and do not reflect the opinions of the firm.

The CyberWire
Daily: Slap leather, Vlad. If cyberspace is the "Wild West," here's the best showdown since Blazing Saddles, and more.

The CyberWire

Play Episode Listen Later Sep 6, 2016 14:03


In today's podcast, we hear about some Pokémon-themed Linux rootkits. An evolved Linux Trojan is herding I0T botnets. Social media monitoring leads to convictions of jihadist plotters in Australia and the UK. Pegasus spyware and NSO Group's pricelist. Election hacking on four continents. Are the Shadow Brokers engaged in intelligence or influence operations? (In any case, no one's really bidding on the Equation Group code the Brokers say they're auctioning.) The FBI releases information on its investigation into former Secretary of State Clinton's email. Accenture Labs' Malek Ben Salem describes frameworks for Industrial IoT. And for a while it looked like cyber high noon at the G20 talks. 

Risk & Repeat
Risk & Repeat: Shadow Brokers' dump shakes IT industry

Risk & Repeat

Play Episode Listen Later Aug 29, 2016


In part two of Risk & Repeat's podcast on the Equation Group, SearchSecurity editors discuss the zero-day vulnerabilities discovered in the Shadow Brokers' data dump.

Risk & Repeat
Risk & Repeat: Shadow Brokers' dump shakes IT industry

Risk & Repeat

Play Episode Listen Later Aug 29, 2016


In part two of Risk & Repeat's podcast on the Equation Group, SearchSecurity editors discuss the zero-day vulnerabilities discovered in the Shadow Brokers' data dump.

Risk & Repeat
Risk & Repeat: Equation Group hack raises questions for NSA

Risk & Repeat

Play Episode Listen Later Aug 25, 2016


In this Risk & Repeat podcast, SearchSecurity editors discuss the mystery behind the recent Equation Group hack and the motives and identity of the Shadow Brokers.

Risk & Repeat
Risk & Repeat: Equation Group hack raises questions for NSA

Risk & Repeat

Play Episode Listen Later Aug 25, 2016


In this Risk & Repeat podcast, SearchSecurity editors discuss the mystery behind the recent Equation Group hack and the motives and identity of the Shadow Brokers.

Loud & Clear
Cyber Warfare: Hackers Steal NSA Weapons, Offer Them To The Highest Bidder.

Loud & Clear

Play Episode Listen Later Aug 19, 2016 50:54


On today's episode of Loud & Clear, Brian Becker is joined by NSA whistleblower William Binney to discuss if the NSA was actually hacked and what kind of tools may have been acquired.A hacking group calling itself the Shadow Brokers says it has infiltrated the NSA's Equation Group and is now looking to sell off “cyber weapons” used by the agency, asking for a payment of $1 billion in bitcoin. Who could be behind the hack and what does it mean for the future of the NSA and cyber warfare?Former President Bill Clinton turns 70 today. Becker is joined by Kevin Akin of the Peace & Freedom Party and activist Jane Cutter to discuss Bill's real legacy: war against Yugoslavia, the end of welfare at home, millions of jobs sent overseas, prisons overflowing in record numbers with impoverished young people, and the destruction of the liberal wing of the Democratic Party. Joe Biden visited Serbia this week where he was greeted by crowds of protesters. Now activists will erect a monument to the victims of the NATO bombing of Novi Sad. Becker is joined by human rights attorney Christopher Black to talk about the legacy of the U.S. bombing of Yugoslavia and what comes next in the U.S.-Serbia relationship.

Banking Information Security Podcast
Unraveling the Mystery Behind the Equation Group

Banking Information Security Podcast

Play Episode Listen Later Aug 19, 2016


Careers Information Security Podcast
Unraveling the Mystery Behind the Equation Group

Careers Information Security Podcast

Play Episode Listen Later Aug 19, 2016


Data Breach Today Podcast
Unraveling the Mystery Behind the Equation Group

Data Breach Today Podcast

Play Episode Listen Later Aug 19, 2016


Info Risk Today Podcast
Unraveling the Mystery Behind the Equation Group

Info Risk Today Podcast

Play Episode Listen Later Aug 19, 2016


Webcology
Moz Layoffs, Gawkers Googbye, and the NSA hacked

Webcology

Play Episode Listen Later Aug 18, 2016 49:19


Moz LayoffsThe search marketing world was stunned late yesterday with the announcement Moz is laying off 28% of its staff in a move to become profitable. Moz CEO Sarah Bird made an emotional blog post yesterday titled, “Moz is Doubling Down on Search” outlining a renewed focus on core SEO related products in the Moz Toolbox such as rank tracking, keyword research, local search listings, duplicate management, onpage items, web crawl, and links analysis. Left unmentioned in her post was the community Moz had created and sustained for several years. In fact, all layoffs happened in the community divisions of Moz, including the extraordinary Jennifer Sable Lopez. Rand Fishkin later tweeted this was about getting the company revenue-right. For Moz and the extremely tight internal community they’ve built, this must be an awful day; even more so for those let go, not because of their performance but because of a management decision to marshal their energies in a more focused direction. In the long run, if Moz can make itself profitable without outside funding, it may well turn out to be the wisest decision Moz has ever made. For the time being, it feels like there’s a hole in the entire SEO community this morning. Big love to Moz, the Mozzers, and the now expanded Moz Alumni. Thanks for all the contributions over the years and we all look forward to seeing what comes next. Gawker to cease publishing next week. The 14 year old online tabloid was targeted by billionaire PayPal founder Peter Theil in a massive series of direct and indirect legal actions. Gawker Media, the parent company that owned Gawker was sold last week to Univision for $135million. They publish six other online magazines; Deadspin, Lifehacker, Gizmodo, Kotaku, Jalopnik, and Jezebel. Details on what will happen to those properties or to Gawker’s archives have yet to be announced. The Univision purchase is pending a decision to allow the sale which is expected today from a Manhattan bankruptcy court.NSA Hacked! In an ironic and somewhat dangerous role reversal, the National Security Agency, otherwise known as America’s cyber-spooks were hacked, quite heavily. A group calling itself the Shadow Brokers are asking for 1million  Bitcoins, which is about $570million US in an auction to release the best cyberweapons and release a treasure-trove of secret files. The hack happened to a division of the NSA known as the Equation Group which, according to Kaspersky security, has been active for over 20 years. In a report published by Kaspersky in 2015, the Equation group was described as “a threat actor that surpasses anything known in terms of complexity and sophistication of techniques, and that has been active for almost two decades,”  The group is thought to be responsible for the infamous Stuxnet attack on Iran’s centrifuges in 2007.

Webcology on WebmasterRadio.fm
Moz Layoffs, Gawkers Googbye, and the NSA hacked

Webcology on WebmasterRadio.fm

Play Episode Listen Later Aug 18, 2016 49:19


Moz LayoffsThe search marketing world was stunned late yesterday with the announcement Moz is laying off 28% of its staff in a move to become profitable. Moz CEO Sarah Bird made an emotional blog post yesterday titled, “Moz is Doubling Down on Search” outlining a renewed focus on core SEO related products in the Moz Toolbox such as rank tracking, keyword research, local search listings, duplicate management, onpage items, web crawl, and links analysis. Left unmentioned in her post was the community Moz had created and sustained for several years. In fact, all layoffs happened in the community divisions of Moz, including the extraordinary Jennifer Sable Lopez. Rand Fishkin later tweeted this was about getting the company revenue-right. For Moz and the extremely tight internal community they've built, this must be an awful day; even more so for those let go, not because of their performance but because of a management decision to marshal their energies in a more focused direction. In the long run, if Moz can make itself profitable without outside funding, it may well turn out to be the wisest decision Moz has ever made. For the time being, it feels like there's a hole in the entire SEO community this morning. Big love to Moz, the Mozzers, and the now expanded Moz Alumni. Thanks for all the contributions over the years and we all look forward to seeing what comes next. Gawker to cease publishing next week. The 14 year old online tabloid was targeted by billionaire PayPal founder Peter Theil in a massive series of direct and indirect legal actions. Gawker Media, the parent company that owned Gawker was sold last week to Univision for $135million. They publish six other online magazines; Deadspin, Lifehacker, Gizmodo, Kotaku, Jalopnik, and Jezebel. Details on what will happen to those properties or to Gawker's archives have yet to be announced. The Univision purchase is pending a decision to allow the sale which is expected today from a Manhattan bankruptcy court.NSA Hacked! In an ironic and somewhat dangerous role reversal, the National Security Agency, otherwise known as America's cyber-spooks were hacked, quite heavily. A group calling itself the Shadow Brokers are asking for 1million  Bitcoins, which is about $570million US in an auction to release the best cyberweapons and release a treasure-trove of secret files. The hack happened to a division of the NSA known as the Equation Group which, according to Kaspersky security, has been active for over 20 years. In a report published by Kaspersky in 2015, the Equation group was described as “a threat actor that surpasses anything known in terms of complexity and sophistication of techniques, and that has been active for almost two decades,”  The group is thought to be responsible for the infamous Stuxnet attack on Iran's centrifuges in 2007.

The CyberWire
Daily: Shadow Brokers warn 'Wealthy Elite'--new cyber cold war? And cybercrooks are still out there.

The CyberWire

Play Episode Listen Later Aug 17, 2016 14:52


In today's podcast we follow the continuing story of the Shadow Brokers and their claims of having got their hands on Equation Group attack code (as bizarre as their story is, a lot of informed observers think the code they've posted is the real deal). Many see the Shadow Brokers incident as an escalation of a cyber cold war between Russia and the United States. More banking Trojan activity in South America. DNSSEC is exploited in DDoS attacks, and Cerber is still number one in the ransomware-as-a-service market (where Shark is a dodgy upstart). Kensington's Rob Humphrey shares the results of their recently security survey, and Johns Hopkins University's Joe Carrigan weighs in on securing your devices in the real world.  And yes, more Pokémon stuff.

The CyberWire
Daily: All your attack code are belong us. Guccifer 2.0 suddenly more fluent.

The CyberWire

Play Episode Listen Later Aug 16, 2016 14:45


In today's podcast we learn about claims made by hackers calling themselves "the Shadow Brokers." They say they've pwned the Equation Group, and obtained NSA attack code which they're now selling for one million Bitcoin. Guccifer 2.0 gets a lot more polished and even leakier. A bogus QuadRooter patch is serving malware in Google's Play Store. Fidelis tells us about Vawtrak's evolution. Someone's watching the Veracrypt audit. Iran looks into possible cyber causes of oil-and-gas facility fires. Fake Pokémon installers have trainers choosing ransomware. No more Pokéstops allowed in Germany's Flughafen. Vikram Sharma from Quintessence Labs outlines the challenges and opportunities of combining cutting edge science with market realities. Hardik Modi from Fidelis Cybersecurity expains changes they're tracking in the Vawtrak banking trojan. And British lawyers get a license to hunt hackers. 

Cantabria Oculta
EL Ovni de Porcieda- Cantabria Oculta-1x07

Cantabria Oculta

Play Episode Listen Later Jan 25, 2016 88:05


En este séptimo programa de Cantabria Oculta y primero del año donde trataremos y analizaremos los siguientes temas: EL Ovni de Porcieda, entrevistaremos a Jonathan Valle y Cristina Cuétara investigadores de lo paranormal que pertenecen al grupo de investigación In Search Of Ghosts, Jesus Vega nos hablara del Equation Group y como siempre "Diario de un soldado". Esperamos que os guste. SAPERE AUDE.

Cantabria Oculta
EL Ovni de Porcieda- Cantabria Oculta-1x07

Cantabria Oculta

Play Episode Listen Later Jan 25, 2016 88:05


En este séptimo programa de Cantabria Oculta y primero del año donde trataremos y analizaremos los siguientes temas: EL Ovni de Porcieda, entrevistaremos a Jonathan Valle y Cristina Cuétara investigadores de lo paranormal que pertenecen al grupo de investigación In Search Of Ghosts, Jesus Vega nos hablara del Equation Group y como siempre "Diario de un soldado". Esperamos que os guste. SAPERE AUDE.

The Cyberlaw Podcast
Interview with Ben Wittes

The Cyberlaw Podcast

Play Episode Listen Later Feb 19, 2015 57:03


In our fifty-fourth episode of the Steptoe Cyberlaw Podcast, Stewart Baker and Jason Weinstein discuss: President Obama’s cybersecurity summit; Attorney Generals’ critique Anthem for their delay in identifying potential victims of the hack; NSA wins a round against the Electronic Frontier Foundation in Jewel case; two Kaspersky security reports identify new hacking tactics and dangers for computer networks; up to $1 billion stolen from banks in cyberheist; NY State Department of Financial Services issues report on insurance company cybersecurity; and the “Equation” Group used firmware exploits to access a variety of hard drives. In our second half we have an interview with Ben Wittes, co-founder and editor in chief of Lawfare. Ben and Stewart discuss Ben’s forthcoming book, The Future of Violence, co-authored with Gabriella Blum. The views expressed in this podcast are those of the speakers and do not reflect the opinions of the firm.

El gato de Turing
22 – ¡Oferta! ¡Tu PC hackeado de fábrica!

El gato de Turing

Play Episode Listen Later Feb 19, 2015 52:52


En esta ocasión, tras una semana de parón a causa de una gripe, os traemos un episodio lleno de actualidad, en la que explicaremos grandes problemas de seguridad con Lenovo y discos duros controlados por la NSA. Además, traemos una sección de ciencia muy completa en la que entre otras cosas, ¡hablaremos del Big Bang! Tecnología La NSA también se cuela en los discos duros gracias al misterioso grupo hacker Equation Group – https://www.xataka.com/privacidad/la-nsa-tambien-se-cuela-en-los-discos-duros-gracias-al-misterioso-grupo-hacker-equation-groupPolémica con Lenovo y su malware instalado de fábrica en sus ordenadores: explicamos cómo eliminarlo – https://www.xataka.com/ordenadores/polemica-con-lenovo-y-su-malware-instalado-de-fabrica-en-sus-ordenadores-explicamos-como-eliminarloYa se financia la primera compañía en materializar Hyperloop, el transporte del futuro soñado por Elon Musk – https://wwwhatsnew.com/2015/02/12/financia-primera-compania-materializar-hyperloop-el-transporte-futuro-sonado-elon-musk/Estos serían los expertos contratados por Apple para la creación de su coche – https://hipertextual.com/2015/02/apple-coche-expertos Espacio y demás ciencias Sí hubo Big Bang – https://cuentos-cuanticos.com/2015/02/11/si-hubo-big-bang/Lanzado el vehículo experimental IXV de la ESA (Vega VV04) – https://danielmarin.naukas.com/2015/02/11/lanzado-el-vehiculo-experimental-ixv-de-la-esa-vega-vv04/Antivacunas y regreso de enfermedades, una historia de miedo e irracionalidad – https://www.xataka.com/medicina-y-salud/antivacunas-y-regreso-de-enfermedades-una-historia-de-miedo-e-irracionalidadLos científicos de EE UU quieren investigar cómo alterar el clima – https://elpais.com/elpais/2015/02/13/ciencia/1423813149_720630.htmlLas misteriosas nubes marcianas de gran altitud – http://danielmarin.naukas.com/2015/02/17/las-misteriosas-nubes-marcianas-de-gran-altitud/La nave ‘Rosetta' hace un vuelo rasante sobre el cometa 67P – https://elpais.com/elpais/2015/02/17/ciencia/1424198874_068896.html Podéis encontrarnos en Twitter y en Facebook!