Podcasts about hackers

Computing term

  • 9,543PODCASTS
  • 26,911EPISODES
  • 43mAVG DURATION
  • 6DAILY NEW EPISODES
  • Jan 13, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories




    Best podcasts about hackers

    Show all podcasts related to hackers

    Latest podcast episodes about hackers

    Film Alchemist
    Red Rooms

    Film Alchemist

    Play Episode Listen Later Jan 13, 2025 50:54


    This week on the Pod we bear witness to a depraved case of brutal serial murders and the people who can't help but be drawn into this circus of the macabre. We discuss the use of long court room scenes to set a stage, people who delve into the darkness, the dark underbelly of the internet, and one of the most truly Messed Up Moments we've seen in a movie in quite a while.  Synopsis: A model becomes obsessed with a high-profile serial killer murder trial. Starring: Juliette Gariépy, Laurie Babyin, Elisabeth Locas, Maxwell McCabe-Lokos Director: Pascal Plante Join the Misfit Parade: https://www.misfitparade.net/ Support the show on the Patreon: https://www.patreon.com/messedupmoviespod Watch our newest short film Sugar Tits Now! https://www.youtube.com/watch?v=Sz7leFqqo4g  

    Paul's Security Weekly TV
    Building a map of hacker history, one conversation at a time - Nathan Sportsman - ESW #389

    Paul's Security Weekly TV

    Play Episode Listen Later Jan 13, 2025 31:25


    We're a fan of hacker lore and history here at Security Weekly. In fact, Paul's Security Weekly has interviewed some of the most notable (and notorious) personalities from both the business side of the industry and the hacker community. We're very excited to share this new effort to document hacker history through in-person interviews. The series is called "Where Warlocks Stay Up Late", and is the creation of Nathan Sportsman and other folks at Praetorian. The timing is crucial, as a lot of the original hackers and tech innovators are getting older, and we've already lost a few. References: Check out the Where the Warlocks Stay Up Late website and subscribe to get notified of each episode as it is released Check out the anthropological hacker map and relive your misspent youth! Show Notes: https://securityweekly.com/esw-389

    World vs Virus
    Global Cybersecurity Outlook: the risks we all face and how to fight back

    World vs Virus

    Play Episode Listen Later Jan 13, 2025 55:45


    Cyberspace is more complex and challenging than ever due to rapid technological advancements, growing cybercriminal sophistication and deeply interconnected supply chains. The World Economic Forum's new Global Cybersecurity Outlook aims to help us navigate these challenges and strengthen cyber resilience. Akshay Joshi, head of the World Economic Forum's Centre for Cybersecurity talks us through some of the headlines in the Outlook, and two industry experts advise on how to prepare for cyber attacks and raise awareness of the risks. Speakers: Akshay Joshi, Head, Centre for Cybersecurity, World Economic Forum Confidence Staveley, Executive Director, Cybersafe Foundation Keri Pearlson, Executive Director, Cybersecurity, MIT Sloan School of Management Links Global Cybersecurity Outlook: www.weforum.org/publications/global-cybersecurity-outlook-2025. Centre for Cybersecurity: https://centres.weforum.org/centre-for-cybersecurity/ Strategic Cybersecurity Talent Framework: https://www.weforum.org/publications/strategic-cybersecurity-talent-framework/ Unpacking Cyber Resilience: https://www.weforum.org/publications/unpacking-cyber-resilience/ Cybersafe Foundation: https://cybersafefoundation.org/ Cybersecurity at MIT: https://mitcybersecurity.mit.edu/ #WEF25: Catch up on all the action from the Annual Meeting 2025 at wef.ch/wef25 and across social media using the hashtag #WEF25. Related podcasts: Tinder Swindler: how 'romance fraud' became a multi-billion dollar cybercrime: https://www.weforum.org/podcasts/radio-davos/episodes/tinder-swindler-romance-fraud-cybercrime/ Top 10 Emerging Technologies 2024: https://www.weforum.org/podcasts/radio-davos/episodes/top-10-emerging-technologies-2024/ Cyber has a skills gap. How approaches to tech, hiring – and retaining women - can help: https://www.weforum.org/podcasts/meet-the-leader/episodes/petra-jenner-splunk-cyber-skills-gap/ Check out all our podcasts on wef.ch/podcasts: YouTube: - https://www.youtube.com/@wef/podcasts Radio Davos - subscribe: https://pod.link/1504682164 Meet the Leader - subscribe: https://pod.link/1534915560 Agenda Dialogues - subscribe: https://pod.link/1574956552 Join the World Economic Forum Podcast Club: https://www.facebook.com/groups/wefpodcastclub

    HRM-Podcast
    Cybersecurity ist Chefsache: CISO werden: Herausforderungen, Wege und Mythen im Berufsalltag

    HRM-Podcast

    Play Episode Listen Later Jan 13, 2025 39:50


    Tauche ein in die Welt der Cybersecurity mit „Cybersecurity ist Chefsache“!In dieser Episode begrüßt Nico Werner den erfahrenen Head of Security & Audit Timo Trabold von der operational services GmbH & Co. KG. Gemeinsam sprechen sie über den spannenden Weg zum CISO, die Herausforderungen in der täglichen Arbeit und die notwendigen Soft Skills, um in dieser Rolle erfolgreich zu sein.Themen dieser Folge:1️⃣ Karriereweg: Vom Schüler-Hacker bis zum Head of Security – Timos inspirierende Reise.2️⃣ Was macht einen CISO aus? Die Kombination aus technischem Know-how, Netzwerken und Führungskompetenz.3️⃣ Fehlerkultur leben: Warum kein CISO perfekt sein muss und warum Zusammenarbeit entscheidend ist.4️⃣ Compliance vs. Sicherheit: Wie CISOs die Balance zwischen Anforderungen und praktischen Lösungen finden.5️⃣ Zukunft der CISO-Rolle: Welche Herausforderungen durch AI und neue Gesetze auf die IT-Sicherheitswelt zukommen.Erfahre, wie ein ganzheitlicher Ansatz und ein starkes Netzwerk die Rolle des CISOs nachhaltig verändern können!____________________________________________

    Six Hats
    REPLAY of most popular episodes: Women bullying women with Dr Nathalie Martinek, Narcissistic hacker

    Six Hats

    Play Episode Listen Later Jan 13, 2025 32:04


    Nathalie is an an ex-systems biology and cancer researcher turned Narcissism Hacker, consultant and independent medical culture researcher. As a highly attuned observer she became acutely alive to the fact that toxic behaviours metastasize, just like the cancer tumours she was studying so closely. She  posed questions, developed and tested theories, researched, found others around the world and co-created collaborative programs to address issues such as saviour burnout among health professionals, executive leaders and activists.Her book, entitled The Little Book of Assertiveness (2019) provides practical strategies and scripts for responding to dominating, controlling behaviours without compromising the relationship or one's values.As a global consultant for leaders in healthcare, tech and related industries, she now helps individuals and small groups navigate professional relationships that feature narcissistic behaviours.  We talk about women bullying women - the reasons behind it and what we can do to protect ourselves. An episode not to be missed. Are you suffering from burnout? Take the MINT Clinic Burnout Quiz: https://mintclinic.scoreapp.com Disclaimer: The content in the podcast is not intended to constitute or be a substitute for professional medical advice, diagnosis or treatment. Always seek the advice of your health care provider with any questions you may have regarding a medical condition. Never disregard professional medical advice or delay in seeking it because of something you have heard on the podcast.  See omnystudio.com/listener for privacy information.

    Cybersecurity ist Chefsache - Der Podcast!
    CISO werden: Herausforderungen, Wege und Mythen im Berufsalltag

    Cybersecurity ist Chefsache - Der Podcast!

    Play Episode Listen Later Jan 13, 2025 39:50


    Tauche ein in die Welt der Cybersecurity mit „Cybersecurity ist Chefsache“!In dieser Episode begrüßt Nico Werner den erfahrenen Head of Security & Audit Timo Trabold von der operational services GmbH & Co. KG. Gemeinsam sprechen sie über den spannenden Weg zum CISO, die Herausforderungen in der täglichen Arbeit und die notwendigen Soft Skills, um in dieser Rolle erfolgreich zu sein.Themen dieser Folge:1️⃣ Karriereweg: Vom Schüler-Hacker bis zum Head of Security – Timos inspirierende Reise.2️⃣ Was macht einen CISO aus? Die Kombination aus technischem Know-how, Netzwerken und Führungskompetenz.3️⃣ Fehlerkultur leben: Warum kein CISO perfekt sein muss und warum Zusammenarbeit entscheidend ist.4️⃣ Compliance vs. Sicherheit: Wie CISOs die Balance zwischen Anforderungen und praktischen Lösungen finden.5️⃣ Zukunft der CISO-Rolle: Welche Herausforderungen durch AI und neue Gesetze auf die IT-Sicherheitswelt zukommen.Erfahre, wie ein ganzheitlicher Ansatz und ein starkes Netzwerk die Rolle des CISOs nachhaltig verändern können!____________________________________________

    1010XL Jax Sports Radio
    Hacker After Dark 1-10-25

    1010XL Jax Sports Radio

    Play Episode Listen Later Jan 11, 2025 81:32


    Hacker After Dark 1-10-25 by 1010 XL Jax Sports Radio

    1010XL Florida Gators Podcast Channel
    How ELITE can Florida Gators Basketball be? Gator Bytes

    1010XL Florida Gators Podcast Channel

    Play Episode Listen Later Jan 10, 2025 34:22


    How ELITE can Florida Gators Basketball be?Hacker and Graham Marsh discuss on Gator Bytes, presented by Southeast Orthopedic Specialists.

    En.Digital Podcast
    Crecer haciendo crecer tus equipos con Felipe Polo

    En.Digital Podcast

    Play Episode Listen Later Jan 10, 2025 79:41


    En esta entrevista con Felipe Polo, exploramos una de las claves más poderosas del liderazgo moderno: la capacidad de crear contextos que impulsen el crecimiento tanto del equipo como de la empresa.Felipe comparte su visión sobre el rol del líder, no como alguien que cambia a las personas, sino como un diseñador de entornos donde las personas pueden dar su mejor versión.Newsletter de Felipe: https://www.teamhackers.es/Su nuevo proyecto Sherpa: https://sherpaplatform.com/A lo largo de la conversación, Felipe profundiza en cómo los equipos crecen de forma más sólida cuando operan bajo sistemas claros y bien diseñados, pero con la flexibilidad suficiente para adaptarse a los cambios. Su enfoque no se basa en la rigidez de los procesos, sino en la creación de estructuras abiertas que permitan la innovación continua. Esta forma de pensar resulta especialmente valiosa en momentos de caos o incertidumbre, donde la improvisación puede ser un riesgo para la organización.La conversación con Felipe no solo trata de liderazgo en términos de negocio, sino también de crecimiento personal. La importancia del feedback honesto y transformador, la necesidad de evitar una cultura de la culpa y la idea de priorizar los intangibles (como la cohesión y la cultura) por encima de los resultados puramente numéricos, son algunos de los aprendizajes que se extraen de esta charla. Para Felipe, el propósito y la visión compartida son la brújula que guía a los equipos hacia una forma de trabajar más humana y efectiva.Esta entrevista no solo es una guía para liderar mejor, sino también una invitación a liderarse a uno mismo.(00:00) Intro y presentación.(02:10) Felipe Polo: De Cáceres a fundador de Team Hackers.(07:25) Lecciones de crecimiento personal y profesional.(12:40) Escalando equipos: De 15 a 120 personas.(18:50) La importancia de delegar y sistematizar procesos.(23:30) Claves para construir una cultura organizacional sólida.(30:15) Transparencia y feedback en la gestión de equipos.(36:50) Cómo fomentar la innovación en equipos grandes.(42:30) Felipe Polo sobre los retos de liderar en tecnología.(49:00) El futuro de Team Hackers y nuevos proyectos.(55:20) Cierre y despedida.

    Nerdify
    What If...? - Temporada 3

    Nerdify

    Play Episode Listen Later Jan 10, 2025 33:23


    ¿Qué pasaría si solamente hubiéramos tenido 2 temporadas de "What If...?"? ¿O mejor aún, una sola temporada? La tercer y última temporada de esta serie de antología en donde de las múltiples posibilidades de historias que se pueden contar sobre el multiverso del MCU eligieron contar las más aburridas. ¿Qué pasaría si mejor nos dieran ya DareDevil: Born Again? Discusión 0:00 Patrocinador 24:02 Noticias 25:37 Síguenos en Facebook, Instagram y TikTok y escúchanos en las diferentes plataformas: https://linktr.ee/nerdifymx ¡Crea tu podcast hoy! #madeonzencastr. Utiliza nuestro link especial https://zencastr.com?via=nerdifymx⁠ y obten un descuento de Zencastr. Hackers por Karl Casey @ White Bat Audio | Donations (Sting) por Riot

    Hacker-Geschichten | hackerfrei.de
    Digitale Sicherheit 2025

    Hacker-Geschichten | hackerfrei.de

    Play Episode Listen Later Jan 10, 2025 24:39


    Digitale Sicherheit wird gerade für kleine Unternehmen und Soloselbstständige immer wichtiger, denn Hacker greifen sie gerne an.Woran liegt das und was solltest du als Inhaber einer kleinen Firma jetzt machen? Das erfährst du in der neuen Folge.Hey, mein Name ist Frida und ich berate kleine Unternehmen zum Thema WordPress- und IT-Sicherheit.In diesem Podcast geht es um IT-Sicherheit.In jeder Folge erzähle ich dir eine Geschichte, einen Cyber-Krimi, in dem wir Internetbetrügereien und Cyber-Angriffe unter die Lupe nehmen und Hackern über die Schulter schauen, um wirklich zu verstehen, welche Gefahren die Digitalisierung gerade für kleine Unternehmen mit sich bringt.Mein Ziel ist es, dich zu unterhalten und dir gleichzeitig auf einfache und verständliche Weise zu zeigen, welche Risiken im Internet lauern, aber vor allem, wie du diese Gefahren sicher umgehen kannst.Ich möchte, dass du informiert bist, die Tricks der Hacker kennst und sie so erkennen kannst, bevor du zum Opfer wirst.Tauche mit mir ein in die spannende Unterwelt des Internets und lerne, wie ein Hacker zu denken.Mach den Sicherheits-TestMöchtest du wissen, wie sicher der digitale Teil deines Unternehmens, deiner Website oder dein Instagram-Account ist?Dann mach das Quiz und finde es heraus!www.HackerFrei.de/sicherheits-testHackerFrei NewsletterMöchtest du dein Business vor Hackern schützen, aber IT-Sicherheit klingt für dich wie ein Buch mit sieben Siegeln?Kein Problem! Mit meinem HackerFrei-Newsletter bekommst du einmal pro Woche einen kurzen 5-Minuten-Tipp, der einfach umzusetzen ist und dein Unternehmen ein Stück sicherer macht – ganz ohne Technik-Kauderwelsch! Melde dich jetzt an und werde mit jeder Email sicherer im Netz.Jetzt abonnieren! www.HackerFrei.de/newsletterWebsitewww.HackerFrei.de Instagram: @hackerfrei

    Komando On Demand
    ADT hides a cyberattack

    Komando On Demand

    Play Episode Listen Later Jan 9, 2025 33:16


    Hackers got into ADT's systems, stealing customer info, and they waited months to tell anyone. Plus, why cash apps aren't safe, Roblox's kid safety problems, and flip phones making a comeback.

    1010XL Jax Sports Radio
    Hacker After Dark 1-9-25

    1010XL Jax Sports Radio

    Play Episode Listen Later Jan 9, 2025 80:11


    Hacker After Dark 1-9-25 by 1010 XL Jax Sports Radio

    1010XL Jax Sports Radio
    Hacker After Dark 1-8-25

    1010XL Jax Sports Radio

    Play Episode Listen Later Jan 9, 2025 79:56


    Hacker After Dark 1-8-25 by 1010 XL Jax Sports Radio

    The Break Room
    Teenage Hackers

    The Break Room

    Play Episode Listen Later Jan 9, 2025 42:59


    The Break Room (THURSDAY 1/9/25) 7am Hour 1) What kind of punishment should kids of this age face for something that we all wished we could do in high school 2) Apparently you CAN have too much football

    The World Crypto Network Podcast
    The Bitcoin Group #431 - Trump Reserve - Hacker Sentenced - ETF Outflow - OG Investor

    The World Crypto Network Podcast

    Play Episode Listen Later Jan 9, 2025 42:04


    One wallet hodled from $0.06 to $90,000 - do you think it was easy?FEATURING:Dan Eve (https://twitter.com/cryptopoly)and Thomas Hunt (https://twitter.com/MadBitcoins)THIS WEEK:Trump could put billions into US Bitcoin reserve without Congress approvalhttps://cryptoslate.com/trump-could-put-billions-into-us-bitcoin-reserve-without-congress-approval/Senator Lummis' Proposal for BITCOIN Act - Sell Fed's Goldhttps://www.ccn.com/news/crypto/senator-lummis-proposal-for-bitcoin-act-sell-feds-gold-as-btc-overtakes-silver/Elon Musk Issues Surprise Crypto Endorsement Amid $3 Trillion Bitcoin And Dogecoin Price Boomhttps://www.forbes.com/sites/digital-assets/2024/11/14/elon-musk-issues-surprise-crypto-endorsement-amid-3-trillion-bitcoin-dogecoin-and-crypto-price-boom/US hacker sentenced over Bitcoin heist worth billionshttps://www.bbc.com/news/articles/c2dl70wed1loBitcoin ETFs See Third Highest Outflow Since Launch, the Other Two Times Was Just Before BTC Price Bottominghttps://www.coindesk.com/markets/2024/11/15/bitcoin-etfs-witness-third-highest-outflow-since-launch-the-other-two-times-foreshadowed-price-bottoms/Gary Gensler claims SEC helped crypto, takes credit for Bitcoin ETFs, dismisses altcoins and hints at resignationhttps://cryptoslate.com/gary-gensler-takes-credit-for-bitcoin-etfs-claims-sec-helped-crypto-dismisses-altcoins-and-hints-at-resignation/This OG Bitcoin (BTC) Investor Just Turned $120 Into $178Mhttps://www.coindesk.com/markets/2024/11/15/this-og-bitcoin-investor-just-turned-120-into-178m/________________________________________World Crypto Networkhttps://www.worldcryptonetwork.com/On This Day in World Crypto Network Historyhttps://www.worldcryptonetwork.com/onthisday/-----------------------------------------------------Please Subscribe to our Youtube Channelhttps://m.youtube.com/channel/UCR9gdpWisRwnk_k23GsHf

    Tech & Main Presents
    Gamifying Cybersecurity: Insights from Hacker Rangers' CEO, Vinicius Perallis

    Tech & Main Presents

    Play Episode Listen Later Jan 9, 2025 26:39


    In this episode of Tech & Main Presents, we sit down with Vinicius Perallis, a trailblazer in the world of cybersecurity and the CEO of Hacker Rangers. Vinicius has pioneered the use of gamification to instill robust cybersecurity practices within businesses, having trained over 500 companies across Brazil and worldwide. His unique approach combines innovation, passion, and extensive experience from his time at IBM and other leading tech firms. Join us as Vinicius shares: His journey: From his early days in technology to founding Hacker Rangers. The excitement of daily work: What fuels his passion and keeps him inspired. Cybersecurity awareness for business leaders: Practical advice for fostering a security-first mindset within organizations. Career guidance for aspiring cybersecurity professionals: Tips for young people looking to break into the field. Personal insights: Fun answers about his favorite musician, hobby, vacation spot, and the teacher who shaped his path. Life lessons: The advice he'd give his 18-year-old self. If you're interested in the intersection of cybersecurity, education, and gamification—or simply want to hear from a visionary in the field—this episode is a must-listen. Connect with Vinicius Perallis: LinkedIn: https://www.linkedin.com/in/vperallis Website: https://hackerrangers.com

    Kim Komando Today
    ADT hides a cyberattack

    Kim Komando Today

    Play Episode Listen Later Jan 9, 2025 33:16


    Hackers got into ADT's systems, stealing customer info, and they waited months to tell anyone. Plus, why cash apps aren't safe, Roblox's kid safety problems, and flip phones making a comeback.

    IT Privacy and Security Weekly update.
    EP224.5 Deep Dive - Loose lips sink ships. The IT Privacy and Security Weekly Update for the Week Ending January 7th 2025.

    IT Privacy and Security Weekly update.

    Play Episode Listen Later Jan 9, 2025 17:44


    Tech & Security Weekly FAQ: January 7th, 2025 1. Why is Apple paying $95 million in a lawsuit about Siri? Apple is settling a lawsuit alleging Siri "unintentionally" recorded private conversations without user consent. The lawsuit claimed these recordings were shared with third parties and used for targeted advertising. While denying wrongdoing, Apple will compensate affected users up to $20 per Siri-enabled device purchased between September 2014 and December 2024 and delete recordings obtained before October 2019. 2. What happened to MyGiftCardSupply's customer data? MyGiftCardSupply, an online gift card store, exposed hundreds of thousands of customers' identity documents due to a publicly accessible storage server with no password protection. This server contained sensitive information like driver licenses, passports, and selfies taken for KYC compliance, putting customers at risk of identity theft. 3. Are Chrome extensions safe to use? Hackers are increasingly targeting Chrome extensions, including popular VPNs and AI tools, by injecting malicious code through updates. This can compromise user data and accounts. Users are advised to carefully review extension permissions, only install extensions from trusted sources, and be cautious of unexpected updates. 4. Is Windows 10 still relevant despite the release of Windows 11? Despite Microsoft's promotion of Windows 11, Windows 10 remains the dominant desktop OS, holding a 62.7% market share. This is partly due to user reluctance to upgrade and a significant increase in Windows 10 installations in the US. However, support for many Windows 10 versions ends in October 2025, pushing users towards either extended security updates or potential vulnerabilities. 5. Why is outdated firmware a concern for medical devices? The Illumina iSeq 100 DNA sequencer and other medical devices use outdated firmware, leaving them vulnerable to malware attacks. Without security features like Secure Boot, malicious code can hide in the firmware, compromising device integrity and potentially patient safety. This highlights the need for manufacturers to prioritize firmware updates and security protocols in medical equipment. 6. How are Chinese hackers evolving their tactics? Chinese hackers, allegedly linked to the military and intelligence, have shifted from corporate espionage to targeting critical US infrastructure, including water utilities, airports, and energy grids. This suggests preparation for potential geopolitical conflicts, particularly concerning Taiwan, aiming to disrupt US response capabilities. The sophistication and potential impact of these attacks raise serious concerns about escalating cyber-warfare between the two countries. 7. Why are New Yorkers saying goodbye to the R46 subway cars? New York City is retiring its iconic R46 subway cars, known for their unique seating arrangement and nostalgic charm. These trains are being replaced by the modern R211 cars, featuring brighter lighting, enhanced accessibility, and longitudinal seating to optimize passenger flow. While some lament the loss of a cultural symbol, the upgrade promises a more efficient and modern transit experience. 8. What does Meta's decision to end fact-checking mean for Facebook and Instagram users? Meta, the parent company of Facebook and Instagram, is ending its fact-checking program and loosening content moderation policies. Zuckerberg claims this aims to promote free speech, but critics argue it will lead to a surge in misinformation and harmful content. This shift raises concerns about the platforms' role in shaping online discourse and their potential impact on political and social issues.

    David Bombal
    #486: 2025 Ethical Hacker Roadmap with lots of free training (NOT Sponsored)

    David Bombal

    Play Episode Listen Later Jan 9, 2025 44:39


    This video is NOT sponsored by TCM Security and I DO NOT get any affiliate commission if you use the links in the video description to buy courses etc from TCM. Also, in the interest of transparency: Heath mentions in the video and in the linked article that references to TCM Security are marked as self-promotion. I love it that Heath is providing so much free training and low cost training to the community. Heath is very well known and respected in the cybersecurity community. I love that he is making so much content available for free via his YouTube channel and on his website. Watch his content on YouTube, take the free courses and also do you own research and make your own decisions about the training and references he mentions. There are so many options out there for free training - see my other videos for options like free training from Cisco and other providers. // Article / Blog REFERENCE // How to be an Ethical Hacker in 2025: https://tcm-sec.com/how-to-be-an-ethi... // YouTube Video REFERENCE // Real World Windows Pentest Tutorial (Demos of 5 Active Directory Hacks): • Real World Windows Pentest Tutorial (... Hacking Roadmap to Success: • Hacking Roadmap to Success: AMA with ... // TCM Security SOCIAL// YouTube (The Cyber Mentor): / thecybermentor LinkedIn : / tcm-security-inc Twitter : / tcmsecurity Discord: / discord Instagram: / tcmsecurity Facebook: / tcmsecure TikTok: / tcmsecurity Academy Website: https://academy.tcm-sec.com/ TCM Certifications: https://certifications.tcm-sec.com/ Discord: / discord Website: https://tcm-sec.com/ Breach Point Website: https://breachpoint.com/ // Heath Adam's SOCIAL // LinkedIn: / heathadams // David's SOCIAL // Discord: / discord X: / davidbombal Instagram: / davidbombal LinkedIn: / davidbombal Facebook: / davidbombal.co TikTok: / davidbombal YouTube: / @davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. // MENU // 0:00 - Coming up 0:28 - Intro 01:44 - Foundational Skills 03:14 - Basic IT Skills & Courses 04:48 - TCM Security Courses 06:01 - Networking Skills & Courses 07:17 - CCNA or Network+ ? 08:20 - Linux Skills & Course 10:33 - Learning should be free 11:05 - Coding/Scripting Skills & Course 13:52 - Security Skills & Course 16:20 - Ethical Hacking Skills & Course 20:40 - Content on Youtube 21:40 - Building up your skill set as a junior hacker 23:07 - Active Directory 23:36 - Web and Mobile Application Hacking 29:23 - Wireless Hacking 30:23 - Certifications 35:04 - Privilege Escalation 36:46 - Will AI Take Our Jobs? 38:27 - What Hacking Path Should You Take? 40:03 - How to Connect with Heath 42:52 - Heath's Advice 44:32 - Outro

    1010XL Jax Sports Radio
    Hacker After Dark 1-7-25

    1010XL Jax Sports Radio

    Play Episode Listen Later Jan 8, 2025 79:10


    Hacker After Dark 1-7-25 by 1010 XL Jax Sports Radio

    Land Line Now
    Land Line Now, Jan. 7, 2025

    Land Line Now

    Play Episode Listen Later Jan 8, 2025 50:06


    It seems like a day doesn't go by without some sort of cybersecurity breach. Land Line Now talks with Ben Wilkens and Joe Ohr of the National Motor Freight Traffic Association about what they're seeing and how you can protect yourself. Also, express lanes are growing in popularity, but they aren't without their problems. The Colorado DOT has hatched an enforcement plan to keep traffic moving and drivers safe. 0:00 – Fuel prices and freight rate predictions 10:06 – Cybersecurity and protecting yourself 25:00 – Colorado clamps down on express lane abuse

    Cyber Security Today
    North Korean Hackers Targeting MacOS: Cyber Security Today for Wednesday, January 8, 2025

    Cyber Security Today

    Play Episode Listen Later Jan 8, 2025 6:47 Transcription Available


    Cybersecurity Updates: New US Cyber Trust Mark & Rising Threats In this episode of Cyber Security Today, host Jim Love discusses the launch of the US Cyber Trust Mark, a new cybersecurity safety label for smart devices. The episode also covers increasing Mac OS attacks by North Korean hackers, including the discovery of the Spectral Blur backdoor, and US Treasury sanctions against Integrity Technology Group for supporting Chinese state-sponsored hacking. Tune in for critical insights on these pressing cybersecurity issues. 00:00 Cyber Security Safety Labels for Smart Devices 02:27 North Korean Hackers Targeting Mac OS 04:03 U.S. Sanctions Chinese Cybersecurity Firm 06:24 Conclusion and Contact Information

    Cybercrime Magazine Podcast
    Hitman-For-Hire Darknet Site Exposed. Fraud Scheme Uncovered. Carl Miller, Journalist.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Jan 8, 2025 19:19


    Carl Miller is a journalist and co-founder of the Centre for the Analysis of Social Media. In this episode, he joins host Melissa O'Leary to discuss his investigation into a dark net website called Besa Mafia: “Hire a Killer or a Hacker.” Together, they discuss how he discovered the site, uncovered the fraud scheme, and his own podcast that breaks down the story in further detail. Listen to all episodes at https://podcasts.apple.com/us/podcast/kill-list/id1769072368. • For more on cybersecurity, visit us at https://cybersecurityventures.com

    Data Hackers
    Meta vai encher Instagram e Facebook com Bots de IA; Novo modelo da OpenAI (o3) revolta pesquisadores por falta de transparência - Data Hackers News #61

    Data Hackers

    Play Episode Listen Later Jan 8, 2025 18:28


    Está no ar, o Data Hackers News !! Os assuntos mais quentes da semana, com as principais notícias da área de Dados, IA e Tecnologia, que você também encontra na nossa Newsletter semanal, agora no Podcast do Data Hackers !! Aperte o play e ouça agora, o Data Hackers News dessa semana ! Para saber tudo sobre o que está acontecendo na área de dados, se inscreva na Newsletter semanal: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.datahackers.news/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Conheça nossos comentaristas do Data Hackers News: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Monique Femme⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Paulo Vasconcellos ⁠Matérias/assuntos comentados: Meta vai encher Instagram e Facebook com bots de IA: Novo modelo da OpenAI (o3) revolta pesquisadores por falta de transparência. Demais canais do Data Hackers: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Site⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Linkedin⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Instagram⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Tik Tok⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠You Tube⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

    IT Privacy and Security Weekly update.
    Loose Lips Sink Ships. The IT Privacy and Security Weekly Update for the Week Ending January 7th 2025.

    IT Privacy and Security Weekly update.

    Play Episode Listen Later Jan 8, 2025 18:48


    Episode  224 Loose Lips Sink Ships.  The IT Privacy and Security Weekly Update for the Week Ending January 7th 2025. 1/7/2025 0 Comments ​Episode  224- click the pic to hear the podcast - In this week's update:  Siri couldn't keep her ear shut, and then her loose lips cost Apple $95M as they learned the lesson: "Privacy isn't optional."Nothing says 'secure' like a password-free server holding 600,000 IDs, turning this gift card gaffe into MyGiftCardSupply's latest disaster.Hackers taught Chrome extensions a new trick, making Chrome chaos all about stealing your data, now enhanced with AI flair.Windows 10 users are hanging on tighter than your grandma's grip on her landline, epitomizing Windows woes as the OS refuses to fade.When your DNA sequencer runs firmware older than your Spotify playlist, this medical equipment drama becomes more science fiction than science.Chinese hackers aren't just stealing blueprints—they're blueprinting the future of cyberwarfare, potentially marking cyber as the next battleground.Be kind to New Yorkers this week, they lose their 50 year old R46 subway cars, where love-seats met New York grit, and gain a congestion charge that is hitting them like a new variant of Covid.Zuck says goodbye to fact-checking, ensuring Meta leaves the internet or at least their portion of it, bracing for chaos (again).Siri can't hear us if we keep moving.  Let's go! Find the full transcript for this podcast here.

    The CyberWire
    U.S. sanctions spark cyber showdown with China.

    The CyberWire

    Play Episode Listen Later Jan 7, 2025 33:17


    China criticizes U.S. sanctions. School districts face cyberattacks over the holiday season. The U.N.'s International Civil Aviation Organization (ICAO) is investigating a potential data breach. Eagerbee malware targets government organizations and ISPs in the Middle East. A major New York medical center notifies 674,000 individuals of a data breach. Hackers infiltrate Argentina's Airport Security Police (PSA) payroll system. An industrial networking firm identifies critical vulnerabilities in its cellular routers, secure routers, and network security appliances. Phishing click rates among enterprise users surged in 2024. A California man is suing three banks for allegedly enabling criminals to steal nearly $1 million from him. On our Threat Vector segment, we preview this week's episode where host David Moulton speaks with Margaret Kelley about the evolving landscape of cloud breaches. Microsoft's Bing demonstrates imitation is the sincerest form of flattery.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Segment On our Threat Vector segment, we preview this week's episode where host David Moulton speaks with Margaret Kelley about the evolving landscape of cloud breaches and how organizations can defend against sophisticated attacks. You can catch new episodes of Threat Vector every Thursday here and on your favorite podcast app.  Selected Reading China Protests US Sanctions for Its Alleged Role in Hacking, Complains of Foreign Hacker Attacks (SecurityWeek) Tencent added to US list of 'Chinese military companies' (The Register) School districts in Maine, Tennessee respond to holiday cyberattacks (The Record)  UN aviation agency 'actively investigating' cybercriminal's claimed data breach (The Record)  Eagerbee backdoor deployed against Middle Eastern govt orgs, ISPs (Bleeping Computer) Staten Island Hospital Notifying 674,000 of May 2023 Hack (BankInfo Security) Industrial networking manufacturer Moxa reports 'critical' router bugs (CyberScoop) Phishing Click Rates Triple in 2024 (Infosecurity Magazine) Pig butchering victim sues banks for allowing scammers to open accounts (The Record)  Hackers Compromised Argentina's Airport Security Payroll System (GB Hackers) Microsoft is using Bing to trick people into thinking they're on Google (The Verge)  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

    1010XL Jax Sports Radio
    Hacker After Dark 1-6-25

    1010XL Jax Sports Radio

    Play Episode Listen Later Jan 7, 2025 83:06


    Hacker After Dark 1-6-25 by 1010 XL Jax Sports Radio

    ETDPODCAST
    Di 07.01.25 Guten Morgen-Newsletter

    ETDPODCAST

    Play Episode Listen Later Jan 7, 2025 8:37


    Guten Morgen! Politisches Beben in Österreich. — Ein Doppelklick und schon könnten Hacker auf ihrem Rechner Zugriff haben. — Wärmepumpen werden nach einer Flaute wieder gefragter. Warum? Erfahren Sie mehr … mit Epoch Times.

    Storm⚡️Watch by GreyNoise Intelligence
    Chinese Hackers Strike Again: BeyondTrust & Salt Typhoon Breaches Expose Critical U.S. Infrastructure

    Storm⚡️Watch by GreyNoise Intelligence

    Play Episode Listen Later Jan 7, 2025 63:37


    Forecast: Cyber conditions are turbulent with two major Chinese state-sponsored storms impacting U.S. infrastructure, with aftershocks expected into mid-January. ‍ In today's episode of Storm Watch, we cover two major cybersecurity incidents that have significantly impacted U.S. infrastructure. The BeyondTrust breach, initially discovered in early December 2024, involved a compromised Remote Support SaaS API key that allowed attackers to reset passwords and access workstations remotely. The Treasury Department was notably affected, with attackers accessing unclassified documents in the Office of Financial Research and Office of Foreign Assets Control. The incident exposed critical vulnerabilities, including a severe command injection flaw with a CVSS score of 9.8, and over 13,500 BeyondTrust instances remain exposed online. The conversation then shifts to the extensive telecommunications breaches known as the Salt Typhoon campaign, where Chinese state actors successfully infiltrated nine major U.S. telecom companies. This sophisticated espionage operation gained the capability to geolocate millions of individuals and potentially record phone calls, though actual communication interception was limited to fewer than 100 high-profile targets. The breach revealed shocking security lapses, such as a single administrator account having access to over 100,000 routers and the use of primitive passwords like "1111" for management systems. Major carriers including AT&T, Verizon, and Lumen Technologies were among the affected companies, with varying degrees of impact and response effectiveness. T-Mobile stands out for their quick detection and mitigation of the attack. In response to these incidents, the FCC is preparing to vote on new cybersecurity regulations by mid-January 2025, while the White House has outlined key areas for improvement including configuration management, vulnerability management, network segmentation, and enhanced information sharing across the sector. The episode wraps up with insights from recent Censys Rapid Response posts and the latest GreyNoise blog entry about profiling benign internet scanners in 2024, along with VulnCheck's analysis of the most dangerous software weaknesses and a discussion of the Four-Faith Industrial Router vulnerability being exploited in the wild. Storm Watch Homepage >> Learn more about GreyNoise >>  

    All Talk with Jordan and Dietz
    Growth from Chinese Hackers

    All Talk with Jordan and Dietz

    Play Episode Listen Later Jan 7, 2025 9:06


    January 7, 2025 ~ Chinese hackers have graduated from corporate thieves to military weapons. Peter Meijer joins Kevin to discuss the significance of this.

    ETDPODCAST
    Risiko Doppelklick: Experte warnt vor neuem Hackerangriff bei gängigen Browsern - 7029

    ETDPODCAST

    Play Episode Listen Later Jan 6, 2025 5:34


    Eine neue Internetbedrohung nutzt die geringe Zeit eines Doppelklicks aus, um den Browserschutz zu umgehen. Hacker könnten so Zugriff auf Benutzerdaten und Konten erlangen.

    Stories from the Stacks
    Securing the System: Phone Phreaks, Hackers, and Political Order, 1963-2013 with Jacob Bruggeman

    Stories from the Stacks

    Play Episode Listen Later Jan 6, 2025 31:25


    Large technological systems can be vulnerable to manipulation, perhaps especially when they are centralized, monopolistic, and complacent. That was the situation in American telecommunications in the early 1960s when a generation of hackers developed techniques to manipulate the Bell telephone system to their advantage, a practice known as phone phreaking. In his dissertation research, Jacob Bruggeman, PhD candidate at the Johns Hopkins University, digs into the technology and politics of hackers, tracing their trajectory from anti-establishment actors on the fringes of technological systems, to positions of influence and control over the very same systems. In parallel to these developments in the hacker community, major organizations, both public and private, adopted new positions and policies designed to secure the system. In support of his research, Bruggeman received funding from the Center for the History of Business, Technology, and Society at the Hagley Museum and Library. For more information, and more Hagley History Hangouts, please visit us online at hagley.org

    Radio Wave
    Vlna: Složitá hesla nedávají smysl, tvrdí etický hacker Marek Hrúz. Děsím se, co přinesou deepfake videa

    Radio Wave

    Play Episode Listen Later Jan 6, 2025 28:31


    Co dělá etický hacker? Jak můžou firmy, ale i jednotlivci čelit každodenním online hrozbám? Jaká hesla si zvolit a jakou aplikaci si vybrat pro jejich spravování, když jich máte hodně? Co pomůže v záplavě podezřelých emailů a vylákávání údajů?

    1010 XL Podcast Network
    Jaguars-Colts Week 18 instant recap | Duval Rundown ep. 49

    1010 XL Podcast Network

    Play Episode Listen Later Jan 5, 2025 35:43


    Gus Logue is joined by Hacker and Mia O'Brien for a live postgame reaction to the Jacksonville Jaguars' season finale against the Indianapolis Colts. Will Doug Pederson and Trent Baalke be fired on Monday?

    1010XL Jax Sports Radio
    Hacker After Dark 1-3-25

    1010XL Jax Sports Radio

    Play Episode Listen Later Jan 4, 2025 82:50


    Hacker After Dark 1-3-25 by 1010 XL Jax Sports Radio

    TechStuff
    What the Tech Happened? Part One

    TechStuff

    Play Episode Listen Later Jan 3, 2025 45:45 Transcription Available


    Since TechStuff first launched in 2008, a lot of stuff has happened in the world of tech. Join Jonathan as he looks back on a big tech story for each year of his experience in hosting a technology podcast.See omnystudio.com/listener for privacy information.

    Trick or Treat Radio
    TorTR #649 - Assimilate the Verisimilitude

    Trick or Treat Radio

    Play Episode Listen Later Jan 3, 2025 171:35


    Send us a textThree podcasting nobodies make the decision to crash the last major celebration at their pal's house before the end of the world. The night becomes even crazier than they could have ever dreamed when Stone Cold Sanders cashes in his money in the bank! On Episode 649 of Trick or Treat Radio we are joined by our pal, Anthony Landry of the Horror Nerds Comedy Podcast to discuss the film Y2K from director Kyle Mooney! We reminisce about the late 90s, the Y2K scare, pixelated videos, and AIM messages. So grab your JNCO jeans from the back of your closet, break out your glowsticks, and strap on for the world's most dangerous podcast!Stuff we talk about: Friday the 13th game, Jason Voorhees, Count Orcock, Cocksferatu, Anthony Landry, The Horror Nerds Comedy Podcast, Samantha Hale, Bonnie Marie Williams, Burden, Ice Nine Kills, James Nanney Jr., Richard D. James, Aphex Twin, Come to Daddy, Rubber Johnny, Chris Cunningham, RIP Olivia Hussey, Black Christmas, Bob Clark, Psycho IV, Henry Thomas, Batman Beyond, Ice Cream Man, The Corsican Brothers, Cheech and Chong, RIP Jimmy Carter, Stone Cold Sanders, Bernie 3:16, Y2K, Kyle Mooney, Jaeden Martell, Rachel Zegler, Fred Durst, Limp Bizkit, Signs, M. Night Shyamalan, Papa Ginos, late 90s culture and fashion, The Ramones, Northampton, MA, Words and Pictures Museum, The Lawnmower Man, Matrix, Hackers, Superbad, Maximum Overdrive, Can't Hardly Wait, Cock Clap, Harvey Danger, Sneaker Pimps, AIM, pixelated videos, the early days of the internet, The Mr. Zsasz of Masturbation, Starship Video, the Champagne Room, In-Da-Penis Day, Transformers, hive mind, Maximum Overdrive, Haley's Comet, Alicia Silverstone, Tim Heidecker, Clueless, The Crush, Aerosmith, I Saw the TV Glow, Time Cut, Timecop, Virus, Chopping Mall, Wargames, Matthew Broderick, Dabney Coleman, Ally Sheedy, The Terminator, Westworld, Yul Brynner, West Hollywood Undead, Strange Days, Angela Bassett, Juliette Lewis, Michael Wincott, The Monster Beneath Us, and Y2K is a bunch of bologna so come on in for a large pepperoni!Support us on Patreon: https://www.patreon.com/trickortreatradioJoin our Discord Community: discord.trickortreatradio.comSend Email/Voicemail: mailto:podcast@trickortreatradio.comVisit our website: http://trickortreatradio.comStart your own podcast: https://www.buzzsprout.com/?referrer_id=386Use our Amazon link: http://amzn.to/2CTdZzKFB Group: http://www.facebook.com/groups/trickortreatradioTwitter: http://twitter.com/TrickTreatRadioFacebook: http://facebook.com/TrickOrTreatRadioYouTube: http://youtube.com/TrickOrTreatRadioInstagram: http://instagram.com/TrickorTreatRadioSupport the show

    Hacking Humans
    The intersection of hackers, scammers, and false collaborations.

    Hacking Humans

    Play Episode Listen Later Jan 2, 2025 42:10


    On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. First off, our hosts share some follow up, Asher wrote in to discuss follow up on the AI granny. Maria's story covers a "new QR code scam" involving unsolicited packages and brushing tactics, where scammers lure victims into scanning malicious QR codes to steal personal and financial information. Joe's story highlights how the FBI and CISA urge Americans to secure their text messages using end-to-end encryption to combat sophisticated hacking campaigns linked to China's government, which target telecom networks and user data. Dave's story highlights how pallet liquidation scams target buyers with offers of discounted merchandise, warning against red flags like unrealistic prices and unverified sellers. Our Catch of the Day comes from Jim, who shares a suspicious email he received offering a collaboration under the guise of a business partnership, which included overly generic language and an unusual sign-off from "Robert De Niro." Resources and links to stories: New warning about ‘brushing' scam as victims are reported in Colorado FBI warns Americans to keep their text messages secure: What to know Pallet liquidation scams and how to recognize them Mobile Communications Best Practice Guidance You can hear more from the T-Minus space daily show here. Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.

    Critical Thinking - Bug Bounty Podcast
    Episode 104: 2024 Hacker Stats & 2025 Goals

    Critical Thinking - Bug Bounty Podcast

    Play Episode Listen Later Jan 2, 2025 29:00


    Episode 104: In this episode of Critical Thinking - Bug Bounty Podcast Justin reflects upon the past year and walks through some of the bug bounty goals he had for 2024, and how he feels like he did. Then he sets some goals for 2025, as well as some exciting CT news for the coming year.Follow us on twitter at: @ctbbpodcastWe're new to this podcasting thing, so feel free to send us any feedback here: info@criticalthinkingpodcast.ioShoutout to YTCracker for the awesome intro music!------ Links ------Follow your hosts Rhynorater & Rez0 on X:https://x.com/rhynoraterhttps://x.com/rez0__------ Ways to Support CTBBPodcast ------Hop on the CTBB Discord at https://ctbb.show/discord!We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.Check out our new SWAG store at https://ctbb.show/swag!ResourcesCTBB Full Time Guildctbb.show/ftCritical Research Labctbb.show/crlCT Episode 51 - 2024 Goalshttps://www.criticalthinkingpodcast.io/episode-51-hacker-stats-2023-2024-goals/Personal BB inventory and goalshttps://ctbb.show/blogTimestamps(00:00:00) introduction(00:00:57) Critical Thinking 2025 Announcements(00:04:21) Personal Inventory of 2024(00:24:05) Goals for 2025

    Land Line Now
    Land Line Now, Jan. 1, 2025

    Land Line Now

    Play Episode Listen Later Jan 2, 2025 50:34


    Truckers have many concerns regarding autonomous trucks – among them, cybersecurity. Also, Bryan Martin of Chrome Shop Mafia offers some advice for the owner of a 2003 Peterbilt 379 about trading in one set of keys for another. Then, the claims process can take a long time, but video footage can speed up that process and save you some money. And what sort of advice would you give four wheelers if you had the chance? One trucker recently offered some in a blog post that's gone viral.   0:00 – Autonomous trucks raise cybersecurity concerns 10:06 – The role of sentimentality in choosing a truck 25:00 – How a dashcam could help you with a claim 39:51 – Some advice for the ones with four wheels

    Grow My Accounting Practice | Tips for Accountants & Bookkeepers to Grow Their Business

    Show Summary: In this episode of the Grow My Accounting Practice podcast, Jeremiah Baker—author of Confessions of a Hacker—reveals how he spent the last 17 years ethically hacking into companies' networks and web applications to identify vulnerabilities before cybercriminals do. He discusses the most common and damaging cyberattacks targeting individuals and businesses today, from phishing schemes to ransomware, and explains how these threats can cause significant financial and reputational harm if left unaddressed. Jeremiah also outlines practical steps that anyone can take to strengthen their cyber defenses, including recognizing suspicious emails, implementing multi-factor authentication, and updating systems and software regularly. Whether you're part of a larger firm or a solo practitioner, you'll learn why proactive cybersecurity is essential for protecting sensitive data, maintaining trust, and staying ahead of rapidly evolving threats. LinkedIn:https://www.linkedin.com/in/jeremiahbaker/ Corporate Partner:Impressia Bank - https://impressiabank.bank/   Make Your Business Permanently Profitable with the PROFIT FIRST APP!

    EpochTV
    Could China Bring Down Our Power Grid?

    EpochTV

    Play Episode Listen Later Jan 1, 2025 22:17


    Chinese hackers are working to position themselves inside U.S. power grids, oil pipelines, and water plants—waiting to cripple the United States when Beijing decides the time is right. President-elect Donald Trump is just three weeks away from taking office. How should he approach the situation in Taiwan? An expert breaks it down. ⭕️ Watch in-depth videos based on Truth & Tradition at Epoch TV

    1010XL Jax Sports Radio
    Hacker After Dark 12-31-24

    1010XL Jax Sports Radio

    Play Episode Listen Later Jan 1, 2025 86:16


    Hacker After Dark 12-31-24 by 1010 XL Jax Sports Radio

    The Cybersecurity Defenders Podcast
    #184 - Hacker Holidays: The Colonial Pipeline

    The Cybersecurity Defenders Podcast

    Play Episode Listen Later Jan 1, 2025 21:51


    In this episode of The Cybersecurity Defenders Podcast, we recount some hacker history, and with the help of Casey Ellis, Founder and CSO at Bugcrowd, tell the story of the largest critical infrastructure ransomware attacks in history: The Colonial PipelineOn May 7, 2021, Colonial Pipeline, an American oil pipeline system that originates in Houston, Texas, and carries gasoline and jet fuel mainly to the Southeastern United States, suffered a ransomware cyberattack that impacted computerized equipment managing the pipeline. The Colonial Pipeline Company halted all pipeline operations to contain the attack. Overseen by the FBI, the company paid the amount that was asked by the hacker group (75 bitcoin or $4.4 million USD) within several hours; upon receipt of the ransom, an IT tool was provided to the Colonial Pipeline Company by DarkSide to restore the system. However, the tool required a very long processing time to restore the system to a working state.This episode was written by the talented Nathaniel Nelson.Casey Ellis can be found on LinkedIn here.

    The President's Daily Brief
    PDB Afternoon Bulletin | December 31st, 2024: Chinese Hackers Breach US Treasury & The Taliban's Campaign Of 'Gender Apartheid'

    The President's Daily Brief

    Play Episode Listen Later Dec 31, 2024 12:37


    In this episode of The PDB Afternoon Bulletin:   First, state-backed Chinese hackers have executed another major breach of sensitive U.S. networks, this time stealing a trove of documents from the U.S. Treasury Department. Then, we'll look at the latest crackdown by the Taliban on woman in Afghanistan, part of their intensifying campaign to erase women from public life under their system of "gender apartheid." To listen to the show ad-free, become a premium member of The President's Daily Brief by visiting PDBPremium.com. Please remember to subscribe if you enjoyed this episode of The President's Daily Brief. YouTube: youtube.com/@presidentsdailybrief Learn more about your ad choices. Visit megaphone.fm/adchoices

    Timeless with Julie Hartman
    China Hackers Breach Treasury Dept – The Life and Legacy of Jimmy Carter – 2024 Was A Doozy

    Timeless with Julie Hartman

    Play Episode Listen Later Dec 31, 2024 47:08


    Join Julie live Monday, Tuesday, and Wednesday at 1p PT, call in number: 844-861-5537Check out other Julie Hartman videos: https://www.youtube.com/@juliehartman Follow Julie Hartman on social media: Website: https://juliehartmanshow.com/Instagram: https://www.instagram.com/julierhartman/X: https://twitter.com/JulieRHartmanEnter to win a trip to Washington, DC for the 2025 Inauguration of Donald Trump. Trip includes airfare for two, hotel accommodations for three nights, tickets to the Presidential Inauguration, and much more. To enter, click this link: https://dennisprager.com/promotion/win-a-trip-to-the-inaugurationSee omnystudio.com/listener for privacy information.

    The Mark Thompson Show
    What Chinese Hackers Stole From US Treasury! Plus, Richard Greene the Civics Dean Joins 12/31/24

    The Mark Thompson Show

    Play Episode Listen Later Dec 31, 2024 122:00


    Chinese hackers tunneled their way into US Treasury employee workstations via a compromised third-party software service provider. It's not what they took, but that they were even able to get in that is raising alarms.Trump isn't the only Republican politician selling stuff. “The Guardian” says there's a right wing “Knick-Knack racquet.”Jefferson Graham joins for Tech Tuesday. The Mark Thompson Show 12/31/24Patreon subscribers are the backbone of the show! If you'd like to help, here's our Patreon Link:https://www.patreon.com/themarkthompsonshowMaybe you're more into PayPal.  https://www.paypal.com/donate/?hosted_button_id=PVBS3R7KJXV24And you'll find everything on our website: https://www.themarkthompsonshow.com

    EpochTV
    How CCP Narratives Corrupted American Reporting; Puerto Rico Loses Power Ahead of New Year's Eve | Capitol Report

    EpochTV

    Play Episode Listen Later Dec 31, 2024 48:41


    New details emerge in the deadly New York City subway arson case. Police have now identified the woman burned to death. What is Mayor Eric Adams saying about the horrific incident? From Mike Johnson's speakership fight to President Joe Biden's recent environmental push, we unpack the political battles shaping up for 2025 with former Rep. Joe Walsh
and Republican strategist Melik Abdul. A massive power outage strikes Puerto Rico. We have more about the cause and the restoration work underway. An infamous China-backed hacking group adds a key U.S. agency to its list of victims in a major cyber breach. Seven articles have now been published in American mainstream media targeting an arts company founded by practitioners of the spiritual group Falun Gong, which the Chinese Communist Party (CCP) has been plotting to eradicate for decades. We uncover the truth about the CCP's influence on American media, and hear directly from an emcee with Shen Yun. ⭕️ Watch in-depth videos based on Truth & Tradition at Epoch TV

    1010XL Jax Sports Radio
    Hacker After Dark 12-30-24

    1010XL Jax Sports Radio

    Play Episode Listen Later Dec 31, 2024 84:15


    Hacker After Dark 12-30-24 by 1010 XL Jax Sports Radio