Podcasts about have i been pwned

Consumer security website and email alert system

  • 233PODCASTS
  • 355EPISODES
  • 53mAVG DURATION
  • 1WEEKLY EPISODE
  • May 27, 2025LATEST
have i been pwned

POPULARITY

20172018201920202021202220232024


Best podcasts about have i been pwned

Latest podcast episodes about have i been pwned

Troy Hunt's Weekly Update Podcast

Have I Been Pwned 2.0 is Here; All About all the New Bits; Cloudflare Turnstile Anti-Automation https://www.troyhunt.com/weekly-update-453/See omnystudio.com/listener for privacy information.

DOU Podcast
Claude шантажував інженера | В «Дію» додадуть платні послуги | 1С заборонять – DOU News #199

DOU Podcast

Play Episode Listen Later May 26, 2025 31:58


Defence Connect Podcast
CYBER UNCUT: AI to solve housing troubles, ATO denies security issues, and our favourite data breach tool

Defence Connect Podcast

Play Episode Listen Later May 26, 2025 29:20


In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft have a chat about everything, from the NSW government's new drive to use AI to solve the housing crisis to deepfake takedowns, who may or may not be behind the hacking campaign targeting big-name UK retailers (still!), security issues at the Australian Taxation Office, and the relaunch of HaveIBeenPwned. Hollingworth and Croft start off with positive AI-related news, starting with the Trump administration's decision to enact new laws regarding deepfake and revenge porn, before swivelling to the NSW state government's plan to use AI to help address a housing construction backlog and grow the workforce. Then it's straight into cyber crime, with more twists and turns from the highly disruptive hacking campaign targeting UK retailers. The pair discuss why one chain is leaking money like a sieve as it tries to rebuild, and why another is getting back on its feet. It's a lesson everyone can learn from. Hollingworth and Croft wrap up this section of the podcast with a discussion of the ATO's issues with identity theft following revelations that hackers had compromised some individual accounts and stolen funds. The pair wrap things up with news of one of their favourite research tools – HaveIBeenPwned – launching a V2 of its website, and how useful it is for average consumers and researchers alike. Enjoy the podcast, The Cyber Uncut team

FLASH DIARIO de El Siglo 21 es Hoy
Hackers se disfrazan de Google

FLASH DIARIO de El Siglo 21 es Hoy

Play Episode Listen Later Apr 22, 2025 7:08


Ataque de phishing usa la infraestructura de Google y engaña a millones con un correo falso que parece legítimoPor Félix Riaño @LocutorCoUn ataque de phishing altamente sofisticado está poniendo en riesgo la información personal de 3.000 millones de usuarios de Gmail.Google ha confirmado un ataque de phishing tan convincente que logró pasar todas sus verificaciones de seguridad, engañando incluso a usuarios expertos. El correo fraudulento simula una alerta oficial sobre una citación judicial y dirige a los usuarios a un portal falso alojado en sites.google.com. La trampa: capturar credenciales y robar el acceso a las cuentas. ¿Cómo es posible que incluso los expertos estén cayendo en este engaño?El mensaje parece legítimo… hasta en los detalles más técnicosNick Johnson, desarrollador y experto en Ethereum, recibió un correo que parecía oficial. Decía que Google había recibido una citación judicial para acceder a su cuenta. El remitente: no-reply@accounts.google.com. Todo parecía normal, incluso el dominio tenía sello de verificación DKIM, una firma digital que certifica la autenticidad del correo. Hasta aquí, todo encajaba. Pero al hacer clic, lo llevó a un sitio clonado, una copia perfecta de la página de inicio de sesión de Google. Todo alojado en sites.google.com, parte de la infraestructura legítima de Google. Así, los delincuentes cibernéticos lograron sortear todas las defensas automáticas del sistema.Este ataque no fue obra de aficionados. Usaron un kit de phishing comprado en foros clandestinos, por menos de 25 dólares. Estos kits permiten crear páginas falsas, copiar sitios web reales y enviar correos con apariencia creíble. Lo más grave: pasaron los filtros de autenticación de Google, incluyendo DKIM, SPF y DMARC. Además, el mensaje se ubicó en la misma conversación de otras alertas reales de seguridad. Por eso, incluso usuarios expertos como Johnson y otros desarrolladores fueron engañados. Si no tienes activada la autenticación en dos pasos o no usas passkeys, tus datos pueden quedar expuestos.Google reconoció la falla y aseguró que ya está desplegando protecciones para cerrar esta puerta de entrada. Además, recomendó a todos los usuarios activar la autenticación multifactor o, mejor aún, usar passkeys. Estas llaves de acceso están vinculadas a un dispositivo físico, por lo que no pueden ser robadas con solo un correo falso. En caso de que un hacker cambie tu contraseña y los métodos de recuperación, Google da un plazo de siete días para intentar recuperar la cuenta con el número o correo de recuperación antiguos, siempre que ya estuvieran registrados.Las técnicas de suplantación avanzaron tanto que incluso Troy Hunt, creador del sitio Have I Been Pwned, fue víctima de un correo similar. Este ataque demuestra cómo los ciberdelincuentes aprovechan subdominios legítimos como sites.google.com y vulnerabilidades antiguas que permiten ejecutar scripts y embebidos en páginas aparentemente confiables. Según NordVPN, más de 85.000 URLs falsas imitaron a Google en 2024. El negocio detrás del phishing también creció: los atacantes compran kits completos que incluyen plantillas de correos, páginas falsas y bases de datos de contactos, todo listo para ejecutar.Evita hacer clic en enlaces de correos sospechosos. Abre siempre las páginas desde el navegador y revisa bien el dominio.Flash Diario en Spotify

Notnerd Podcast: Tech Better
Ep. 488: Pwned, Phished, and Patched

Notnerd Podcast: Tech Better

Play Episode Listen Later Apr 16, 2025 59:15


It sure seems like hacks and breaches are intensifying. This week, the man behind Have I Been Pwned was phished, if it can happen to him, it can happen to anyone. Be skeptical of any message you're getting that asks you to log in or do anything else that could compromise you. We've got some other tech news to cover, tips to tech better, and picks to get. Enjoy! Watch on YouTube! - Notnerd.com and Notpicks.com INTRO (00:00) Tax Day (04:15) Importance of video at SMMW (09:05) Minecraft Movie (09:50) MAIN TOPIC: You will be pwned (12:25) Have I Been Pwned owner Troy Hunt's mailing list compromised in phishing attack https://haveibeenpwned.com/ DAVE'S PRO-TIP OF THE WEEK:  Learn for FREE at online universities (19:50) JUST THE HEADLINES: (24:54) Blue Origin mission with all-female crew, including Katy Perry, completes space trip Hacked crosswalks in Bay Area play deepfake-style messages from tech billionaires 33-year-old AmigaOS for Commodore computers gets an unexpected update Microsoft warns that anyone who deleted mysterious folder that appeared after latest Windows 11 update must take action to put it back Hugging Face has acquired the open source robot startup Pollen Robotics to help “democratize” robotics Fintech founder charged with fraud after ‘AI' shopping app found to be powered by humans in the Philippines Instagram is working on an iPad app TAKES: ChatGPT was the world's most downloaded app last month (29:15) Microsoft Patch Tuesday, April 2025 Edition (34:40) Temu pulls its U.S. Google Shopping ads (37:05) BONUS ODD TAKE:  368 Chickens game (40:10) PICKS OF THE WEEK: Dave: Shark HV371 Rocket Pro DLX Corded Stick, Removable Hand Vacuum, Advanced Swivel Steering, XL Cup, Crevice Tool, Upholstery Tool & Anti-Allergen Dust Brush, Fuchsia, Capacity (44:25) Nate: Diymore USB C Power Meter Testers,USB C Tester Power Tester Color Screen,Multimeter Tester,Three Screens Switch to Display Current,Voltage,CPU Temperature,Voltage Meter,DC4-30V/0-12A (49:25) RAMAZON PURCHASE - Giveaway! (53:25)

Troy Hunt's Weekly Update Podcast

I'm Back Home; Perth Event Next Week; Partner Placement in Have I Been Pwned; The New UX is Looking *Amazing*! Sponsored by Malwarebytes https://www.troyhunt.com/weekly-update-447/See omnystudio.com/listener for privacy information.

Mon Carnet, l'actu numérique
{RÉFLEXION} - L'erreur est humaine

Mon Carnet, l'actu numérique

Play Episode Listen Later Apr 9, 2025 4:35


Dans son billet, Catherine Dupont-Gagnon revient sur une mésaventure vécue par Troy Hunt, figure reconnue de la cybersécurité et créateur du site Have I Been Pwned. Victime d'hameçonnage alors qu'il était fatigué.

Passwort - der Podcast von heise security
Security-News und Feedback von Oracle bis Web-PKI

Passwort - der Podcast von heise security

Play Episode Listen Later Apr 9, 2025 116:51


Achtung, die Blutdruckpillen werden ausgepackt! Christopher und Sylvester ärgern sich über laxe Sicherheitspraktiken bei Konzernen und deren undurchsichtige Krisen-PR. Sie freuen sich hingegen über reichlich Hörer-Feedback zu vergangenen Folgen und diskutieren über Neuerungen im Zertifikats-Ökosystem. Und auch eine sehr prominente, aber vorbildlich gemeisterte Phishing-Attacke wird zum Thema - die Hosts erklären, warum sich wirklich niemand schämen sollte, Opfer geworden zu sein. - https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN - https://github.com/wesaphzt/privatelock - https://eylenburg.github.io/android_comparison.htm - https://samwho.dev/bloom-filters/ - https://github.com/mozilla/clubcard Mitglieder unserer Security Community auf heise security PRO hören alle Folgen bereits zwei Tage früher. Mehr Infos: https://pro.heise.de/passwort

Ich glaube, es hackt!
Leak mich am Passwort!

Ich glaube, es hackt!

Play Episode Listen Later Apr 7, 2025 22:50


In dieser Episode diskutieren Rüdiger Trost und Tobi über die Bedeutung von Datenlecks und die verschiedenen Tools, die zur Überprüfung von E-Mail-Adressen auf mögliche Sicherheitsverletzungen verwendet werden können. Sie beleuchten die Funktionen von Leak-Checkern wie 'Have I Been Pwned' (https://haveibeenpwned.com/) und den HPI Identity Leak Checker, sowie die Wichtigkeit von Datenschutz und Privatsphäre. Zudem wird die Rolle von Künstlicher Intelligenz in der Bildgenerierung thematisiert, insbesondere die Herausforderungen und rechtlichen Aspekte, die damit verbunden sind. -- Wenn Euch unser Podcast gefallen hat, freuen wir uns über eine Bewertung! Feedback wie z.B. Themenwünsche könnt Ihr uns über sämtliche Kanäle zukommen lassen: Email: podcast@ichglaubeeshackt.de Web: podcast.ichglaubeeshackt.de Instagram: http://instagram.com/igehpodcast

YusufOnSecurity.com
217 - Phishing the Expert-The Unexpected Cybersecurity Breach - Part 2

YusufOnSecurity.com

Play Episode Listen Later Mar 29, 2025 28:32


Enjoying the content? Let us know your feedback!This week's episode is continuation of Troy Hunt's cautionary tale , the creator of HaveIBeenPwned. Despite being a renowned security expert, Troy recently fell victim to a sophisticated phishing attack through Mailchimp. We'll continue to break down what happened, how it happened, and what we can all learn from this incident. Stay tuned till the end where we bust our myth of the week!We will also look at this week's cyber security news which isUbuntu Linux security bypasses- https://blog.qualys.com: Qualys TRU Discovers Three Bypasses of Ubuntu Unprivileged User Namespace Restrictions- https://www.troyhunt.com: A sneaky phish just grabbed my Mailchimp mailing listBe sure to subscribe! You can also stream from https://yusufonsecurity.comIn there, you will find a list of all previous episodes in there too.

YusufOnSecurity.com
216 - Phishing The Expert-The Unexpected Cybersecurity Breach - Part 1

YusufOnSecurity.com

Play Episode Listen Later Mar 22, 2025 32:15


Enjoying the content? Let us know your feedback!In this week's episode we have a fascinating and cautionary tale about none other than Troy Hunt, the creator of HaveIBeenPwned. Despite being a renowned security expert, Troy recently fell victim to a sophisticated phishing attack through Mailchimp. We'll break down what happened, how it happened, and what we can all learn from this incident. Stay tuned till the end for tips on how to stay vigilant against phishing attacks and our myth of the week!we will also look at the cyber security news. Here is what caught my attention this week.- PSTools dll injection vulnerability- https://www.foto-video-it.de: Disclosure Sysinternals (You will need to translate to English if you are not a German speaker)- https://learn.microsoft.com: PSTool- https://www.troyhunt.com: A sneaky phish just grabbed my Mailchimp mailing listBe sure to subscribe! You can also stream from https://yusufonsecurity.comIn there, you will find a list of all previous episodes in there too.

Troy Hunt's Weekly Update Podcast

It’s the new Have I Been Pwned brand! Fresh new look, new UI, more features, better stickers, and much more

Giga TECH.täglich
Diese praktische Webseite besuche ich einmal im Monat – und ihr solltet es auch!

Giga TECH.täglich

Play Episode Listen Later Mar 15, 2025


Einmal im Monat tippe ich meine Mail-Adressen in den Online-Dienst von „Have I Been Pwned“ ein, um zu prüfen, ob meine Daten Opfer eines Datenlecks geworden sind. Denn dieser simple Check kann mich vor bösen Überraschungen bewahren.Ein Kommentar von Robert Kohlick.

Black Hills Information Security
2025-03-03 - Not Talking About Anything

Black Hills Information Security

Play Episode Listen Later Mar 5, 2025 58:41


00:00 - PreShow Banter™ — Not Talking About Anything04:29 - BHIS - Talkin' Bout [infosec] News 2025-03-0305:42 - Story # 1: FBI Warns iPhone, Android Users—We Want ‘Lawful Access' To All Your Encrypted Data24:28 - Story # 2: Disney engineer downloaded ‘helpful' AI tool that ended up completely destroying his life34:28 - Story # 3: Have I Been Pwned adds 284M accounts stolen by infostealer malware43:22 - Story # 4: Dragos's 8th Annual OT Cybersecurity Year in Review Is Now Available45:53 - Story # 5: Trump administration retreats in fight against Russian cyber threats55:19 - Story # 5b: Exclusive: US intel shows Russia and China are attempting to recruit disgruntled federal employees, sources say57:33 - Story # 6: Feds: Army soldier suspected of AT&T heist Googled ‘can hacking be treason,' ‘defecting to Russia'

Today in Health IT
2 Minute Drill: Healthcare Wins Most Breached Industry of 2024 with Drex DeFord

Today in Health IT

Play Episode Listen Later Mar 3, 2025 4:05 Transcription Available


According to Kroll's cyber risk team, healthcare leads as the most breached industry in 2024 at 23% of all incidents, with medical data valued up to $1,000 on dark markets compared to just $5 for credit card information. Drex provides updates on the Change Healthcare breach one year later, noting that notifications are still ongoing for the incident that affected nearly half of all Americans. The episode concludes with a spotlight on "Have I Been Pwned," a valuable resource for checking if your email has been compromised in data breaches, which now tracks nearly a thousand separate breach incidents.Remember, Stay a Little Paranoid Subscribe: This Week Health Twitter: This Week Health LinkedIn: This Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer

Cyber Security Headlines
GitHub repos exposed, HaveIBeenPwned adds 244M stolen passwords, Anagram gamifies cybersecurity training

Cyber Security Headlines

Play Episode Listen Later Feb 27, 2025 6:16


Thousands of exposed GitHub repositories, now private, can still be accessed through Copilot Cellebrite halts product use in Serbia following Amnesty surveillance report New Ghostwriter campaign targets Ukrainian Government and opposition activists in Belarus  Huge thanks to our sponsor, Conveyor It's 2025. This is your second sign to get a trust center if you don't already have one.  Reduce manual work by 80% when you can share one link to your trust center and let customers download what they need on demand. Trusted by the world's top B2B companies, Conveyor's enterprise-grade trust center is specially designed to handle multiple products, complex orgs, and with AI first so you can even push your customers to self-serve their own AI answers to questionnaires. Learn more at www.conveyor.com.

ohmTown
Pwned, Boogey Bees, DNA of Trees, and More

ohmTown

Play Episode Listen Later Feb 25, 2025 36:51


Welcome to ohmTown. The Non Sequitur News Show is held live via Twitch and Youtube every day. We, Mayor Watt and the AI that runs ohmTown, cover a selection of aggregated news articles and discuss them briefly with a perspective merging Science, Technology, and Society. You can visit https://www.youtube.com/ohmtown for the complete history since 2022.Articles Discussed during Non Sequitur News (s4e56) on 2/25/2025:Have I Been Pwned?https://www.ohmtown.com/groups/technologytoday/f/d/have-i-been-pwned-adds-284m-accounts-stolen-by-infostealer-malware/A 2000 Year Old Roman Swordhttps://www.ohmtown.com/groups/mobble/f/d/metal-detectorists-stumble-upon-a-rare-2000-year-old-roman-sword-in-poland/Boogey Beeshttps://www.ohmtown.com/groups/nonsequiturnews/f/d/for-bees-the-right-dance-moves-are-key-to-food-gathering-success/DNA of American Treeshttps://www.ohmtown.com/forums/d/scientists-decode-the-dna-of-one-of-americas-most-iconic-trees/Wooly Devil from a National Parkhttps://www.ohmtown.com/groups/mobble/f/d/meet-the-wooly-devil-the-first-new-plant-genus-discovered-in-a-national-park-since-1976/The Future of the Internethttps://www.ohmtown.com/groups/nonsequiturnews/f/d/the-future-of-the-internet-is-likely-smaller-communities-with-a-focus-on-curated-experiences/A Luxury Strawberry for $19https://www.ohmtown.com/groups/mobble/f/d/this-luxury-grocery-store-is-selling-single-strawberries-for-19/AI Replaces 4000 Roles at Bankhttps://www.ohmtown.com/groups/technologytoday/f/d/major-asia-bank-to-cut-4000-roles-as-ai-replaces-humans-2/Dressing for the Oscarshttps://www.ohmtown.com/groups/nonsequiturnews/f/d/it-costs-10-million-to-dress-an-a-list-actress-at-the-oscars-these-10-jaw-dropping-figures-reveal-the-price-tag-of-hollywoods-biggest-night/Felon in Love during Crime Spree

The CyberWire
AI's blind spots need human eyes.

The CyberWire

Play Episode Listen Later Feb 14, 2025 34:10


Nakasone addresses AI at the Munich Cyber Security Conference. Court documents reveal the degree to which DOGE actually has access. Dutch police dismantle a bulletproof hosting operation. German officials investigate Apple's App Tracking. Hackers exploited security flaws in BeyondTrust. CISA issues 20 new ICS advisories. The new Astoroth phishing kit bypasses 2FA. Hackers waste no time exploiting a SonicWall proof-of-concept vulnerability. Our guest today is Lawrence Pingree, VP of Technical Marketing at Dispersive, joining us to discuss why preemptive defense is essential in the AI arms race. Have I Been Pwned ponders whether resellers are worth the trouble.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is Lawrence Pingree, VP of Technical Marketing at Dispersive, joining us to discuss why preemptive defense is essential in the AI arms race. You can read more in "How Cybercriminals Are Using AI: Exploring the New Threat Landscape." Selected Reading Putting the human back into AI is key, former NSA Director Nakasone says (The Record) Court Documents Shed New Light on DOGE Access and Activity at Treasury Department (Zero Day) Musk's DOGE team: Judges to consider barring it from US government systems (Reuters) Anyone Can Push Updates to the DOGE.gov Website (404 Media) Dutch Police seizes 127 XHost servers, dismantles bulletproof hoster (Bleeping Computer) Apple app tracking rules more strict for others – watchdog (The Register) PostgreSQL flaw exploited as zero-day in BeyondTrust breach (Bleeping Computer) CISA Releases 20 ICS Advisories Detailing Vulnerabilities & Exploits (Cyber Security News)  Astaroth 2FA Phishing Kit Targets Gmail, Yahoo, Office 365, and Third-Party Logins (GB Hackers)  SonicWall Firewall Vulnerability Exploited After PoC Publication (SecurityWeek) Have I Been Pwned likely to ban resellers (The Register) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Troy Hunt's Weekly Update Podcast

Geeking out on Home Theatres; Should We Ban Resellers from Have I Been Pwned; A Week of new Breaches; Sponsored by Report URI https://www.troyhunt.com/weekly-update-438/See omnystudio.com/listener for privacy information.

HealthcareNOW Radio - Insights and Discussion on Healthcare, Healthcare Information Technology and More

January News You Can Use Data Breach Diaries: Who Pwned Me Now? Change Data Breach impacting nearly 200 million people Get yourselves credit monitoring and securing personal information through tools like "Have I Been Pwned." Meanwhile get you credit locked with major agencies to prevent fraud and minimize exposure to breaches Stargate AI Computing Partnership - OpenAI's collaboration with Oracle aims to address growing computing demands Where will all these new data centers go in a competitive AI "arms race." RSV Vaccination for Pregnant Women shows effectiveness in providing significant immunity to newborns by transferring antibodies across the placenta We talk WHO and NIH Challenges and the decision to reduce involvement with the WHO We are concerned about losing vital global health collaboration and research dissemination To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”. Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen

HRM-Podcast
Cybersecurity ist Chefsache: Mythenknacker 02: Mythenknacker entlarvt: Ist dein Konto nach einem Leak in Gefahr?

HRM-Podcast

Play Episode Listen Later Jan 31, 2025 10:13


In der neuesten Episode des „Mythenknacker Podcast“ sprechen Nico Werner und Dave Wollmann über das Thema Datenleaks und Passwortsicherheit. Viele glauben, dass ein Eintrag bei „Have I Been Pwned“ bedeutet, dass ihr Konto automatisch gehackt ist – doch stimmt das wirklich?

HRM-Podcast
Cybersecurity ist Chefsache: Mythenknacker 02: Mythenknacker entlarvt: Ist dein Konto nach einem Leak in Gefahr?

HRM-Podcast

Play Episode Listen Later Jan 31, 2025 10:13


In der neuesten Episode des „Mythenknacker Podcast“ sprechen Nico Werner und Dave Wollmann über das Thema Datenleaks und Passwortsicherheit. Viele glauben, dass ein Eintrag bei „Have I Been Pwned“ bedeutet, dass ihr Konto automatisch gehackt ist – doch stimmt das wirklich?

Cybersecurity ist Chefsache - Der Podcast!
Mythenknacker 02: Mythenknacker entlarvt: Ist dein Konto nach einem Leak in Gefahr?

Cybersecurity ist Chefsache - Der Podcast!

Play Episode Listen Later Jan 31, 2025 10:13


In der neuesten Episode des „Mythenknacker Podcast“ sprechen Nico Werner und Dave Wollmann über das Thema Datenleaks und Passwortsicherheit. Viele glauben, dass ein Eintrag bei „Have I Been Pwned“ bedeutet, dass ihr Konto automatisch gehackt ist – doch stimmt das wirklich?

Troy Hunt's Weekly Update Podcast

Anyone Got a Security Contact? Processing Info Stealer Logs in Have I Been Pwned; Synology DiskStation Success; Sponsored by Report URI https://www.troyhunt.com/weekly-update-434/See omnystudio.com/listener for privacy information.

Troy Hunt's Weekly Update Podcast

Home Sweet 127.0.0.1; Rebuilding the Front End of Have I Been Pwned; Bluesky Users Cranky About X Links ; Sponsored by 1Password https://www.troyhunt.com/weekly-update-432/See omnystudio.com/listener for privacy information.

Troy Hunt's Weekly Update Podcast

I'm in Dubai; Welcoming the Armenian Government to Have I Been Pwned; Giving the “Pwned” Book Away for Free; Sponsored by Rubrik https://www.troyhunt.com/weekly-update-429/See omnystudio.com/listener for privacy information.

True Crime Cyber Geeks
What is a Password Leak?

True Crime Cyber Geeks

Play Episode Listen Later Dec 5, 2024 23:50


Hackers have been releasing password leaks for years. But what exactly is a password leak, and should you be concerned? In this episode of How Hacks Happen, we look at how password security has changed over the years, and how you can keep yourself safe in the ever-changing world of online security.ResourcesRockyou2024 analysis: Mega password list or just noise?Have I Been Pwned? Check your passwordNIST Special Publication: Digital Identity GuidelinesSend us a textEveryday AI: Your daily guide to grown with Generative AICan't keep up with AI? We've got you. Everyday AI helps you keep up and get ahead.Listen on: Apple Podcasts SpotifySupport the showJoin our Patreon to listen ad-free!

Notnerd Podcast: Tech Better
Ep. 466: Bitcoin Sets Records, What Does It Mean?

Notnerd Podcast: Tech Better

Play Episode Listen Later Nov 13, 2024 57:08


Over the last week, Bitcoin and many other cryptocurrencies have gone up significantly. Please don't take our investment advice, but we will examine the increase and how the election impacted it. It was a pretty slim week in tech news, but we found some interesting stories to cover and a rousing round of Just the Headlines. Also, we have some great tips and picks to help you tech better! Watch on YouTube! INTRO (00:00) MAIN TOPIC: CryptoWatch (02:45) Bitcoin touches record-high $85K, adds almost $20K in a week DAVE'S PRO-TIP OF THE WEEK: Navigating Google Workspace on the Web (10:35) JUST THE HEADLINES: (19:55) FDA forces Costco to recall 80,000 pounds of butter because packaging did not say it ‘contains milk' NASA investigates laser-beam welding in a vacuum for in-space manufacturing LG's new stretchable display can grow by 50%, bendy panels can be deformed into new form factors Apple Music is publishing a $450 hardcover book celebrating its 100 Best Albums Intel brings back workers' free coffee, seeking to stem morale decline Boeing reportedly considers selling off its space business TAKES iOS 18.1 added a new ‘Inactivity Reboot' security feature for iPhone (24:05) iOS 18.2 fixes one of the most annoying aspects of the new Photos app (28:05) Microsoft wants $30 to let you keep using Windows 10 securely for another year (31:00) Databreach.com emerges as an alternative to HaveIBeenPwned (36:50) BONUS ODD TAKE: The Quilt Index (40:10) PICKS OF THE WEEK: Dave: Stouchi 4 Packs Airtag Holder Key Ring with Soft TPU Case, Stainless Steel Invisible Slim Keychain Compatible with Airtag 2021 Finder Items, Dog, Key, Backpacks Air Tag Accessories (42:40) Nate: ESR for iPad Air 11 Inch Case M2, iPad Air 6th/5th/4th Gen , Powerful Magnetic Attachment, Slim Trifold Stand Case, Supports Pencil Pro&Pencil USB-C, Durable Protection, Grey (47:40) RAMAZON PURCHASE - Giveaway! (51:55)

Troy Hunt's Weekly Update Podcast

Let's go through everything that's currently sitting on the Have I Been Pwned backlog; what else can we add? Sponsored by 1Password https://www.troyhunt.com/weekly-update-424/See omnystudio.com/listener for privacy information.

CISSP Cyber Training Podcast - CISSP Training Program
CCT 168: Access Controls - Understanding Role, Rule, Mandatory, and Attribute Based Controls for the CISSP (Domain 5.4)

CISSP Cyber Training Podcast - CISSP Training Program

Play Episode Listen Later Aug 19, 2024 41:04 Transcription Available


Send us a Text Message.What would you do if your social security number was compromised in a massive data breach affecting billions? In our latest episode of the CISSP Cyber Training Podcast, we unpack the alarming reality of a recent breach that exposed the personal records of 3 billion people. We provide critical advice on how to protect yourself using tools like "Have I Been Pwned," setting up credit freezes, and enabling multi-factor authentication. It's not just about safeguarding your data; it's about arming yourself with the knowledge to navigate these digital threats effectively.Next, we dive into the realm of access controls with a keen focus on discretionary and non-discretionary systems. Discover why discretionary access control (DAC) might be a double-edged sword for smaller setups and how non-discretionary models such as mandatory access control (MAC), role-based access control (RBAC), and rule-based access control provide a structured, scalable framework for larger organizations. With real-world examples, we breakdown the benefits and challenges of each system, helping you understand which control model best suits your organization's needs.Finally, we explore the complexities of RBAC and rule-based access controls, emphasizing the necessity of efficient access management in large enterprises and regulated industries. Learn about the principle of least privilege, the intricacies of role assignment, and how predefined static rules can simplify or complicate access management. We also delve into mandatory access controls, using high-security environments like military clearances to illustrate their importance. Whether you're an industry professional or just passionate about cybersecurity, this episode brings essential insights right to your ear.Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

The Imposter Syndrome Network Podcast

In this episode, Zoe is back with a one-on-one with Troy Hunt. He is the founder of the pivotal cybersecurity resource “Have I Been Pwned”, the Microsoft regional director, MVP, Pluralsight instructor, and an active member of the security community.Troy shares his unexpected journey from aspiring pilot to tech influencer, revealing how a simple blog post evolved into a career-defining move. He discusses the power of public contributions to Stack Overflow, user group attendance, and open-source code repositories in establishing credibility in the tech world.We delve into the importance of communication skills, not just in tech but in life, and how blogging tests one's knowledge. We also touch on the challenges of self-employment, the balance between work and personal life, and the lessons learned from mistakes.Don't miss this candid conversation that explores the intersections of tech, career growth, and the personal journeys that shape us.-Just go out there and do stuff.Put yourself out there.-Links: LinkedInTwitterBloghttps://bigmachine.io/pwned/ --Thanks for being an imposter - a part of the Imposter Syndrome Network (ISN)! We'd love it if you connected with us on LinkedIn: https://www.linkedin.com/company/the-imposter-syndrome-network-podcast Make it a great day.

The Watchman Privacy Podcast
109 - MyDataRemoval: Opt Out of People Search Websites

The Watchman Privacy Podcast

Play Episode Listen Later Jun 17, 2024 42:36


Gabriel speaks with James Wilson of MyDataRemoval for a second time. They do a live test of how much information James can find on a person, and then discuss the disturbing nature and extent of people search websites, data brokers, and breach databases.   GUESTS LINKS AND PREVIOUS EPISODE → https://www.youtube.com/watch?v=9LTFbBlTZbM (Episode 44) → https://www.mydataremoval.com/   REFERENCED → https://krebsonsecurity.com/2024/03/ceo-of-data-privacy-company-onerep-com-founded-dozens-of-people-search-firms/ → https://krebsonsecurity.com/2024/03/mozilla-drops-onerep-after-ceo-admits-to-running-people-search-networks/   WATCHMAN PRIVACY (INCLUDING CONSULTING) → https://watchmanprivacy.com → https://twitter.com/watchmanprivacy → https://www.amazon.com/Watchman-Guide-Privacy-Financial-Lifestyle/dp/B08PX7KFS2   MONERO DONATION →8829DiYwJ344peEM7SzUspMtgUWKAjGJRHmu4Q6R8kEWMpafiXPPNBkeRBhNPK6sw27urqqMYTWWXZrsX6BLRrj7HiooPAy   BITCOIN DONATION →https://btcpay0.voltageapp.io/apps/3JDQDSj2rp56KDffH5sSZL19J1Lh/pos   Please subscribe to and rate this podcast wherever you can to help it thrive. Thank you! → https://www.youtube.com/@WatchmanPrivacy  → https://odysee.com/@WatchmanPrivacy TIMELINE 0:00 – Introduction  1:25 – Live test of people search database info 6:20 – How the data is used against you 8:10 – Self-replication of people search websites 12:10 – Additional danger of breach databases 15:30 – A crazy story 18:40 – Should non-Americans be concerned? 19:40 – Is this a “national security” risk? 23:20 – Where do our basic pieces of information exposure come from? 24:00 – PayPal is as bad as you think it is 25:25 – What is HaveIBeenPwned? 27:05 – What is the future of people search websites? 29:50 – Voter data is public? 30:30 – Bogus data as a strategy 32:40 – Basic info of MyDataRemoval.com   #MyDataRemoval #PeopleSearchDatabases #WatchmanPrivacy

Craig Peterson's Tech Talk
eSIM Exposed: Safeguarding Mobile Privacy & Combatting Hacks

Craig Peterson's Tech Talk

Play Episode Listen Later Apr 20, 2024 28:41


  Chris's $10,000 smartphone hack is just one instance of a concerning trend of cyberattacks. Today, we're delving deep into eSIM technology, a game-changer in mobile privacy and security. Cybersecurity Concerns: The rise in hacking incidents highlights the urgent need for robust cybersecurity measures, especially in the mobile space. eSIM Technology: Exploring the intricacies of eSIMs reveals both their potential and the security challenges they present. Online Privacy: With eSIMs becoming more prevalent, understanding their impact on online privacy is crucial for users. Combatting Hacking: Strategies for combatting hacking, including tips on how to keep your smartphone safe, are essential knowledge in today's digital landscape. haveibeenpawnd: Tools like Have I Been Pwned can help individuals check if their data has been compromised, adding another layer of security awareness. If you're intrigued by the intersection of technology, security, and privacy, this article is a must-read. Dive into the world of eSIMs and equip yourself with the knowledge to safeguard your digital life. Click the link below for insightful checklists and actionable advice. Unmasking the eSIM: A Deep-Dive into Mobile Privacy, Security, and the Combat against Hacking You can also catch Craig at the following stations and channels: With Jim Polito at 0836 on TuesdaysWTAG AM 580 - FM 94.9 Talk 1200News Radio 920 & 104.7 FM WHJJNewsRadio 560 WHYNWXTKCraigs Show Airs 0600 Saturday and Sunday With Jeff Katz 1630 - TuesdaysWRVA 96.1 FM, 1140 AM   WGAN Matt Gagnon 0730 WednesdaysCraigs Show Airs 1700 Saturday  WGIR 610 & News Radio 96.7

Dark Rhino Security Podcast
S14 E7 Cracking the Code: Password Manager Insights

Dark Rhino Security Podcast

Play Episode Listen Later Apr 12, 2024 54:10


This week on Dark Rhiino Security's Security Confidential podcast, Host Manoj Tandon talks to Troy Hunt. Troy is an Australian Microsoft Regional Director and MVP for Developer Security. He's known for his expertise in web security, as well as his creation of 'Have I Been Pwned?' He's a prolific author for Pluralsight, a sought-after speaker at global conferences, and has been featured in a number of articles with publications including Forbes, TIME magazine, Mashable, PCWorld, ZDNet and Yahoo! Tech. Aside from technology and security, Troy is an avid snowboarder, windsurfer and tennis player 00:00 Introduction 01:17 We're going to outsource you 05:20 Have I Been Pwned? 10:10 Does the value length matter? 15:13 Convenience vs Security 20:20 Recovering an account 34:08 What is the effectivity of 2FA? 37:45 Artificial Intelligence and NLP 443:27 If you're going to do nothing, at least do this 52:25 More about Troy -------------------------------------------- To learn more about Troy visit https://www.troyhunt.com/ https://haveibeenpwned.com/ https://ndcoslo.com/ To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @Darkrhiinosecurity Facebook: @Dark-Rhiino-Security-Inc Twitter: @darkrhiinosec LinkedIn: @dark-rhiino-security Youtube: @DarkRhiinoSecurity ​

Programming By Stealth
PBS 164 of X – jq: Working with Lookup Tables

Programming By Stealth

Play Episode Listen Later Mar 31, 2024 77:42


In our previous episode of Programming By Stealth, Bart Busschots taught us how to create lookup tables with jq from JSON data using the `from_entries` command. Just when we have that conquered, this time he teaches us how to do the exact opposite – disassemble lookup tables. I think this was a really fun lesson because taking data apart, reassembling it the way you want and then putting it back together again is a great way to really understand what we're doing with jq. I got much more comfortable as I started to recognize the patterns in what Bart was doing. We also get to play with a new data set, the Have I Been Pwned data gathered by Troy Hunt. If you're a data nerd, and really who amongst us isn't, you'll love this episode too. You can find Bart's fabulous tutorial shownotes at pbs.bartificer.net.

Chit Chat Across the Pond
CCATP #790 — Bart Busschots on PBS 164 of X – jq: Working with Lookup Tables

Chit Chat Across the Pond

Play Episode Listen Later Mar 31, 2024 77:42


In our previous episode of Programming By Stealth, Bart Busschots taught us how to create lookup tables with jq from JSON data using the `from_entries` command. Just when we have that conquered, this time he teaches us how to do the exact opposite – disassemble lookup tables. I think this was a really fun lesson because taking data apart, reassembling it the way you want and then putting it back together again is a great way to really understand what we're doing with jq. I got much more comfortable as I started to recognize the patterns in what Bart was doing. We also get to play with a new data set, the Have I Been Pwned data gathered by Troy Hunt. If you're a data nerd, and really who amongst us isn't, you'll love this episode too. You can find Bart's fabulous tutorial shownotes at pbs.bartificer.net.

The Daily Decrypt - Cyber News and Discussions
40,000 Home Routers Compromised, Critical Infrastructure Reporting Mandate, Midnight Blizzard Microsoft Breach Recap with Dogespan – CyberSecurity News and Discussions

The Daily Decrypt - Cyber News and Discussions

Play Episode Listen Later Mar 28, 2024


The growth of TheMoon malware and its contribution to the Faceless proxy network, shining a light on the vital role of cybersecurity in safeguarding critical infrastructure. Featuring insights from Lumen Technologies' Black Lotus Labs and CISA's new reporting mandates. [00:02:53] The Moon Malware [00:07:37] Critical Infrastructure Cybersecurity Updates [00:17:08] Personal Cybersecurity Tips & Encouragement Original URLs: https://blog.lumen.com/the-darkside-of-themoon/ https://krebsonsecurity.com/2023/04/giving-a-face-to-the-malware-proxy-service-faceless/ https://www.cybersecuritydive.com/news/cisa-notice-critical-infrastructure/711506/ https://www.cisa.gov/news-events/news/cisa-marks-important-milestone-addressing-cyber-incidents-seeks-input-circia-notice-proposed https://thehackernews.com/2024/03/key-lesson-from-microsofts-password.html Follow us on Instagram: https://www.instagram.com/the_daily_decrypt/ Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/ Logo Design by https://www.zackgraber.com/ Tags: cybersecurity, TheMoon malware, Faceless network, Lumen Technologies, CISA, critical infrastructure, cyber incident reporting, Microsoft, Midnight Blizzard, NOBELIUM, password spray hack, IoT security, proxy services, cyber threats, router vulnerabilities Search Phrases: Exploring TheMoon malware and its impact on cybersecurity Understanding Faceless proxy service and cyber anonymity Lumen Technologies' fight against cyber threats CISA's new cyber incident reporting rules for critical infrastructure Microsoft's response to Midnight Blizzard cyber attacks NOBELIUM's tactics in cyber espionage How to protect routers from cyber attacks The significance of cybersecurity in safeguarding critical infrastructure Cybersecurity best practices for IoT devices Strategies to counter password spray hacks Importance of secure accounts in preventing cyber attacks Analyzing the growth of proxy networks in cybercrime The role of critical infrastructure in national cybersecurity Updates and insights from CISA on cyber incident management Microsoft's investigation into state-sponsored cyber threats Transcript: Transition (Short) Low Energy [00:00:00] Welcome & Introduction offsetkeyz: Welcome back to the Daily Decrypt. Fly me to the moon. [00:00:08] The Rise of The Moon Malware offsetkeyz: The Moon malware is now covertly amassing over 7, 000 SOHO routers and IoT devices each week into the faceless proxy network, as unveiled by Black Lotus Labs at Lumen Technologies, signaling a worrying escalation in cybercriminal capabilities. What steps can be taken to prevent devices from falling prey to the moon malware and contributing to the expansion of the faceless proxy network? Critical infrastructure entities such as power and water are now mandated to swiftly report cyber incidents and ransom payments following new rules proposed by the cybersecurity and infrastructure security agency known as CISA. Marking a crucial advancement in bolstering the nation's cybersecurity defenses. And finally, we've got the expert dogespan back to discuss some lessons learned from the recent midnight Blizzard Microsoft breach. So stick around for that juicy goodness. So recently we reported on Soho routers, which is small home. What is small, dogespan: small, office, home office. offsetkeyz: small home office office, small. Is it small office, home office? dogespan: Yeah. South of Houston street, offsetkeyz: So yeah, recently there's been some news on Soho routers being vulnerable to these malwares. pulling them into proxy networks. And so this isn't necessarily breaking news, but there has been some recent research coming out that shows some pretty staggering numbers. So the latest findings by Lumen Technologies Black Lotus Labs spotlight a startling expansion of the faceless proxy network, with the moon malware enrolling over 7, 000 new users. per week into its ranks. That's a lot of routers. dogespan: ISP routers right there? offsetkeyz: I would hope not, but your ISP has no incentive whatsoever to replace that router and you're paying a rental fee. So dogespan: Yep. offsetkeyz: There's a little bit more information linked in the show notes below, but. An aggressive campaign in early March of 2024 saw over 6, 000 ASUS routers compromised in less than 72 hours. So at this rate, they're well over 40, 000 last we checked in February, plus 7, 000 each week. The Moon malware continues to refine its infection methods, targeting devices with accessible shell environments before implementing a series of IP table modifications. This prepares the compromised device to serve as a proxy facilitating anonymous internet usage for malicious actors through the faceless service. [00:02:53] The Moon Malware offsetkeyz: First of all, we can talk about what a proxy network is. It's essentially just. It's essentially just tens of thousands of devices that cybercriminals are able to route their traffic through. So that's bad news for you, whether you're trying to avoid people snooping on you, or you're trying to protect your privacy, or you're trying to not be an accomplice in cybercrime. In the article linked in the show notes below, you'll be able to see some indicators of compromise, but the biggest thing is that's the gateway to the internet for you. So everything going in and everything coming out of your house. is now accessible to these attackers. They're probably not interested in that. They're interested in just having the power to route their criminal activity through 40, 000 routers. But when you hand criminals a bunch of free data, they're probably going to get around to using it. So what can you do to prevent your router from being part of this proxy network? Make sure it's up to date. And that's kind of tricky for most users. You're going to actually have to go into the router, which is a bit of a process. You also really want to make sure the username and passwords to your router are changed because they're probably accessible via the internet. Like I could go Google your router model number and find out what the username and password is, enter it in, and B boom. dogespan: There's a number of them, just out on the internet, you can throw creds at them at any point in time. offsetkeyz: Yeah. Once you start getting into cybersecurity, you'll quickly come across the sites that just index all vulnerable routers, what, what's the site that I'm thinking of? Do you remember? Doja Span. dogespan: Shodan. Shodan. offsetkeyz: If you just go on there, you can, first of all, you can check your IP and see what the deal is. But yeah there, there's a lot of 'em. So this proxy network is growing quickly. Probably thanks to Shodan, but mostly because there's a lot of vulnerable routers out there, even if they're not end of life People just don't change their password. They don't know. So tell your mom, tell your friends, tell your grandpa, change your router password it's a big deal. Honestly. dogespan: Yeah, it's interesting, we like, of course there is the proxy implication, so the attacker is like you said, most likely just using it to hide and cover their tracks, and one of the things that could come out of that, I think you did mention it, that you could be legally implicated. for certain types of activity. And while you're not the person doing it, if you are like the exit node or close enough in the chain for beginning or end, you might get picked up. So Definitely see if this is something that is affecting you, a lot of this malware, you can just reboot the router, like give it an unplug for 10 seconds, 30 seconds, and plug it back in, a lot of the malware will will die off, but then of course, make sure it's updated. One thing you can do is request that your ISP updates your router. So if you have been paying that monthly lease, if it's been two years, call them and tell them that you want a new one. offsetkeyz: Yeah, I'm sure it's even built into your contract that you're entitled to a new router after X amount of months, and it probably isn't more than 18. dogespan: Mm hmm. offsetkeyz: know they're not updating it, they're not forcing updates, and they know you're not updating it. so they probably legally have to offer you a new one. So all you have to do is call, and you might be on hold for a while, but just, yeah, get a new router if you've inherited an ISP router and you feel really proud of yourself because you're not paying the 7 a month anymore, and you've had the same router for five years. this right here serves as your official notice to not do that. Go get a new one. So yeah, to wrap this up, the article linked in the show notes recommends a couple things. They recommend first of all blocking botnet traffic based on certain indicators of compromise. So if you're a network defender, see that article for those IOCs. But consumers with SOHO routers should follow best practices of regularly rebooting routers, as dogespan said, and installing security updates and patches. And they provide a full link on how to do that. offsetkeyz: by the Canadian Center for Cybersecurity. So thanks, Canadia. And, for organizations that manage SOHO routers, make sure the devices do not rely upon common default passwords. They should also ensure the management interfaces are properly secured and not accessible via the internet. And again, another article explaining exactly how to do that. So, do those things, call your ISP, and you should be good to go. transition: DOG. DOG. DOG. DOG. [00:07:37] Critical Infrastructure Cybersecurity Updates offsetkeyz: So one of the common themes, if you've been listening for a while, is critical infrastructure. The White House has been releasing guidance to critical infrastructure IT departments. There's been a real emphasis on securing critical infrastructure. Turns out that's because it's constantly under attack and it's our Achilles heel. If attackers can get our critical infrastructure, they can probably shut down our internet, and then we have no way of protecting ourselves. They can shut down our power, we have no security cameras, you know, We have no food, can't nourish our bodies, to go to cyber war. the most recent step in this effort is the Cybersecurity and Infrastructure Security Agency, known as CISA, introduced a proposed rule mandating that critical infrastructure entities report significant cyber incidents within 72 hours and ransom payments within 24 hours. So this is pretty huge because we don't really have the data. We don't know how these critical infrastructures are getting attacked, if they're paying, if they're not paying. We're all kind of guessing. So It's gonna suck a little. Another checklist item while you're under attack. but it's going to help overall critical infrastructure stay secure. dogespan: Yeah, Critical Infrastructure definitely needs to be reporting that up as soon as possible. It's such a big deal. And I do like that they're imposing that on Critical Infrastructure. It's a really good step in the right direction. 72 hours? offsetkeyz: Yeah, that's a little generous and yeah, there's a lot of conflicting feelings about this, especially if. you're under ransomware attack, attackers are telling you not to report it, attackers are saying they're going to shred your data, they're going to destroy it if you report it up, and when you're under attack, you're afraid, and you might have the money, and you might just pay them, and you might forget to report, and that might cause fines or whatever, so that's just one of the cons to this, but we really need this data, It's going to help keep critical infrastructure more secure. It looks like this rule is expected to affect over 316, 000 entities with an estimated cost of 2. 6 billion. There is some debate as to what qualifies as critical infrastructure, and I'm surprised that this guidance came out with gray area at all. It should be pretty exhaustive, but it According to the article linked in the show notes, which we always encourage you to read for yourself, don't just listen to what we're saying as truth go read it for yourself. The U. S. recognizes 16 critical infrastructure sectors, but debates continue about the scope of entities required to comply. For example, UnitedHealthcare group. qualifies under the current definitions, but the status of change healthcare, which was recently breached, is kind of gray. It's uncertain, which doesn't make sense to me, if there's uncertainty, people aren't going to report and then they're going to claim they didn't know. So let's figure that out. dogespan: Yeah, definitely like to see them move in the direction of just, when in doubt, report. Because if you're getting CISA involved, they're going to lend that expert help. If you're not equipped to do the investigation, you're better off just letting them know and cooperating with them. Even with ransomware and you going and paying it, you're hoping that they live up to their word? And that's a criminal. offsetkeyz: Yeah, exactly. It's a lesson in all facets of life. from big enterprises down to personal as well. If you need help, ask for it. If you did something wrong, tell the people it impacts. Any smart person receiving this information is going to try to help as hard as they can, and they're not going to hold it against you. Simply telling the truth always wins, so do it, dogespan: That's exactly what I tell my kids. offsetkeyz: and they need to hear it, and so do many others. dogespan: Alright, so the last one. Midnight Blizzard, also known as Nobellium, a Russian state sponsored actor, got into Microsoft and they did so through the use of password sprays. So password spray being they just go down the line hitting as many passwords as they can on any account and hoping for the best. Well, this was against Microsoft and it ended up being successful. Nobelium got access to a dev account and This account ended up having elevated privileges. Throughout the stages of this attack, they ended up going up higher and higher and higher through privilege escalation. . This one was a privileged account, but it was in a development environment. They ended up getting access to an account and started sending off phishing emails across the board to their executives. Well, they ended up getting a couple of hits and there was no MFA. on those higher up accounts. That's probably the most shocking aspect of that. We know that. This was all previous information. So, what's happening now? Microsoft has gotten them out and they have been doing all their recursive investigations. So the evidence of this is that they got access to, well, source code and internal systems. Luckily, no customer facing systems were compromised. They did have access to source code, but nothing customer related, so we are still in the clear. However, go change your passwords. Now, being that they've had access to this stuff, they've been able to start probing at systems a little bit more in depth, and these Well, Microsoft has noticed since this that password sprays have increased by a tenfold. offsetkeyz: What? Against Microsoft, or in general? dogespan: Probably Microsoft systems since they have access to that kind of data, but they, it does say here that they are increasing their security investments. Good, good, good. cross enterprise coordination and enhanced defense capabilities against this persistent threat. So that sounds like they are working with customers to make sure that everybody's safe and sound. Good on them. Overall, I think they've done a good job with this response. In recent weeks, they have seen that Midnight Blizzard is using the information that they originally exfiltrated to attempt to gain more unauthorized access. This comes from two different sources. One was directly from Microsoft's blog and then the other was a summary from the Hacker News. I'd like how the Hacker News, they've gone and broken little bits of it and kind of translated it more targeted at a smaller organization and not so much, you know, how Microsoft got hit by this stuff. And one of the things that they mentioned is the importance of protecting all accounts. this ended up being an attack against a privileged developer account or an developer environment. And a lot of times what happens in larger organizations is you kind of create accounts, you create stuff, and it serves its purpose, and you never delete it. So it's super important to make sure that you're either, have good security on it in the first place, or you delete it as soon as you're done with it. Now, how does that translate to the regular user? You mentioned this yesterday's podcast. when you're downloading an app for a single purpose, do you typically leave it on your system or do you delete it afterwards? One of the things that I try to think about is, ordering food. a lot of them, you cannot order food through a web browser, unless you're actually like physically on a computer. it's going to be so persistent to try to get you to go to that app. A lot of times it won't even let you like McDonald's is one of those good ones. You are automatically rerouted to that app. Every single time I download that app, order my food, pick up my food, and then I delete that app. And it's not so much. That it's McDonald's, but you just don't know what else is involved in that. And McDonald's is all about food, not data security. offsetkeyz: No, I mean, they are a fortune five company, probably. so hopefully they have a good security system, but yeah, you'd be surprised at the permissions the McDonald's app asks for. And Hawkrow Farmer and I were discussing this a week or two ago. when you're hungry, there is a serious sense of urgency. And attackers know. Under what circumstances there's a sense of urgency. So if you're on DoorDash and you're having a hard time getting the food, you might pivot over to some other delivery service by Googling it, clicking on an ad, and then downloading the app from that ad. Because you're really hungry and you're just trying to get your food. So now you've downloaded the wrong app, you create an account, username, same password you use on your bank, same email you use on your bank, they now have that, they go to your bank, they get you, whatever. Now you're in a proxy network because you left that app. There's so many bad things that happen, but, but the one thing about, that's a good example, doges, is urgency. And when you're hungry, things feel very urgent. dogespan: Very, very urgent. If an attacker has access to a password and it's associated with an email, they're going to try it anywhere and everywhere. And one of the key areas that they're going to try it is your email provider, because that is clear evidence that you have an account there. So that's the main takeaway with it from this, even on a large enterprise scale, is all accounts need to be protected. [00:17:08] Personal Cybersecurity Tips & Encouragement dogespan: If you can't protect those accounts Use them for what you need to and remove it. Whether that's just getting an app on your phone or creating an account just for the purpose of ordering some food. Delete it afterwards. offsetkeyz: Yeah, we'd like to just harp on not reusing passwords. Um, if someone can get into your email, they can reset any password on any account that you have, because, I mean, what's the first step? I think I talked about it in yesterday's episode. When you click the reset password button, what does it do? It sends you an email to click on a link to go reset your password. And that's all it is. So if, if the attacker has access to your email address, they can reset any password, including your bank, including your Instagram. You know, the more I talk to people about password reuse and password managers and multifactor authentication, the more I met with fear and shame. Shame is really the key one, and the shame doesn't quite outweigh the fear. like it never is enough to get them going, but it is a negative feeling associated with passwords. And what I mean by that is people are just always ashamed that they haven't done this, or they haven't done that, whatever. They reuse their password. They're really ashamed. Well, this can serve as a good example for you that even executives at Microsoft haven't enabled multi factor authentication. You're doing okay. Just try to chip away at it. one piece at a time, try to enable multi factor authentication. Don't surrender to the shame. dogespan: It doesn't have to be something that you, you know, you decide Today when you wake up. That. I'm going to go enable MFA on all of my accounts. How I handle that is when I log in and I don't get prompted to authenticate myself, I think, is there a way to get MFA? Put a little sticky note somewhere that says, go check your security settings on this website when you're done with what you're doing. So you don't have to break focus, just real quick, security settings. Go back to it after you've checked your balance or whatever it is you went to. And then the next time you log into something else and you don't get prompted for MFA, offsetkeyz: it's a slow process. and that's okay. It's okay to be a slow process. Really focus on the important things to start and the more you get going, the easier it gets. But right now, if you haven't started, it seems like it's going to be really painful, but think about it. What happens when you accomplish really painful, really hard tasks? You get a flood of dopamine. Look forward to that dopamine hit when you actually enable MFA and change your password and download that pass password manager It sounds impossible right now. It will feel so good I still get that dopamine hit every time I make a little chip away at my security dogespan: Leave a comment. Let us know that you did it and we will praise you. offsetkeyz: We will we will I'll make a freaking whole podcast episode about you Dude, I was talking to my parents this week. Shout out to my parents my dad Unprompted made his first passkey for Amazon. dogespan: Oh, offsetkeyz: Yeah. and my dad is an electrical engineer and he actually informed me that he has some patents in encryption algorithms. And so I said, dad, I don't know how passkeys work. I spent two hours banging my head against the desk trying to figure it out. So if you figure it out, I'm bringing you on the podcast. You get to explain it to my listeners. So, really excited. You guys get to meet my dad, but he was so excited when he enabled his passkey and you too can share that joy. So yeah, to bring it back to the Microsoft thing, and I don't want to make this an ethics podcast per se, but it is always So it ignites fire within both me and DogeSpan, uh, just personal security and how easy it actually is, not to shame you by any means, but you can take certain easy steps to drastically improve your security. But Microsoft here is doing exactly what we were preaching in the previous segment, which is reporting things. They're doing a great job. They're saying they messed up and, hey, we're kind of on board. We're like, wow, great. Thank you so much. It's when. It's when companies try to hide it, like LastPass, for example. Um, I was a diehard LastPass user and hey, LastPass is better than nothing, even still, but it was really the fact that they hid their breach and tried to downplay their breach that ultimately got me to switch off of LastPass. I think their service now is great. It's fine. I would trust it a lot. So if you have LastPass, great. But it's ultimately. the way that LastPass makes you feel. Like, no more warm fuzzies. More like cold sharpies. You know, it's just stabbing me when I think about LastPass. So, good on Microsoft for just reporting and continuing to uncover new things, and we can all learn something from them. I dogespan: close to a month now, about how consumers are actually taking that into consideration more and more. Where I was under the impression that it was just us tech nerds that were looking at it and going, ew, you got a, you got a breach and you didn't handle it poorly, but more consumers are looking at that and everybody is going to get hacked. If you haven't been hacked yet, you just don't know it. It has happened. Own up to it, it's fine. Handle it well. Go the appropriate steps. offsetkeyz: mean, this story is evidence of that more than anything, that Microsoft just got hacked. I mean, they, they made the, they made the first computer. They made the internet. So yeah, no shame, especially nowadays when the weekly breaches are, it's a very long list of breaches out there. I like this article from the Hacker News. Another great thing is it has a section titled defend against password spray attacks. and it has four actionable steps. I'm surprised multi factor authentication isn't the first one. Should be the first one. but if you're in an organization and you have access to the Active Directory domain controller or admin rights there, you can run password audits. Have any of the passwords for any account on your Active Directory shown up on the dark web? there's search engines that just list passwords on the dark web. There's search engines that list email addresses, which is probably more applicable for the day to day user, but you can just, yeah, search. I think it's even Have I Been Pwned. Like they have a password search feature and Have I Been Pwned has an API, so you can set up using an API and automate it. but that's something I haven't considered. is just audits. That could have saved it if they're unwilling to enable multi factor authentication. Multi factor authentication, we talk about it like it's a, like a silver bullet, but it is susceptible to attacks too, especially MFA bombing or MFA fatigue. The weakest link in anything, in anything security is the human element. So even if you have enabled MFA, You can still do these password audits. You can only secure yourself more. So yeah, that's, those are just some of the action items you can take either as an individual or as a corporation. And yeah, the point of bringing this up was just to kind of recap on this big attack and have a discussion. So, got anything else for us dogespan? dogespan: No. Get a password manager. offsetkeyz: And as always, get a password manager. I'm gonna, it's like a drinking game around my house. How many times do I say password manager in a night? And I'm heading to a bar after this where you better believe I will be talking about password managers. [00:24:57] Closing Thoughts & Thanks offsetkeyz: But that's all we got for you today. Thanks so much to Dogespan for coming back. We've missed you. Our editing software has missed you and we hope you'll be more of a frequent guest. Oh, he's back, baby. And I hope your work or organization place where you work lets you have Friday off like mine does. Uh, so TBD, if we'll have an episode tomorrow, probably because I'm an addict, but if we don't have a great weekend, we'll talk to you later.

Rich On Tech
Best Web Browsers to Protect Your Privacy & Preventing Payment Card Fraud

Rich On Tech

Play Episode Listen Later Feb 25, 2024 105:21


Rich talked about the AT&T outage and the healthcare hack this week, and how it got him to thinking about having a backup plan.International authorities busted a major ransomware hacking group called LockBit and released free software to help victims unlock their files.Thurman in Massachusetts wants an alternative to the Thunderbird email app. Rich recommends checking out a website called AlternativeTo.net.Bill in San Diego wants to retrieve text messages from his deceased sister's phone. He has the passcode. Rich recommends the iMazing App.Rose in Los Angeles looking for more information about Google's Results About You feature. Rich mentioned DIY opt-out guides at DeleteMe and HaveIBeenPwned.comVivian in Menifee says she is locked out of her iPhone because she forgot her passcode.Ring stops selling its Car Cam.Google is pausing its Gemini AI image generator until it can get things right.ZJ in Anaheim wants to obscure his home on Google Maps. Rich says to follow the directions here. Find your home on Street View and tap Report a Problem in the lower right-hand corner. Here, you can request to blur out your home. Google says they will “review your report as fast as we can.”Chris in Long Beach wants to know if auto-generated passwords are a good thing. Rich recommends using a password manager and also setting it as the Autofill on your iPhone or Android.Arthur Edelstein of PrivacyTests.org, open-source tests of web browser privacyPam in Ventura is worried about her credit card being hacked. Rich mentioned some ways to protect your card number including using Tap to Pay and the chip when possible. And when shopping online protect your number with a one-time use number from a service like Privacy.com.Samsung released a major software update for the S24 series that improves the display and camera.Samsung will bring its new AI features to older flagship phones including the S23 series in March.Elsa in Playa Del Rey, CA says be careful with fraud alerts. Most of the time banks won't call, so if you get a call be aware it could be a scam.Alan in West LA wants to know how to get a streaming service for his parents in a simple way. Rich recommends Fire TV stick.Apple Sports is a free new app that lets you choose your favorite sports teams and see when they're playing, scores, betting odds and more.Apple is making iMessage encryption even stronger to combat quantum computers cracking the code.Neal O'Farrell, founder of the Center for AI Crime will share 20 ways AI is accelerating all kinds of scams and frauds.Beware of Facebook funeral scams.Turns out, rice isn't the best way to dry out a wet smartphone.60 - February 24, 2024Rich DeMuro talks tech news, tips, gadget reviews and conducts interviews in this weekly show.Airs 11 AM - 2 PM PT on KFI AM 640 and syndicated on stations nationwide through Premiere Networks.Stream live on the iHeartRadio App or subscribe to the podcast.Follow Rich on X, Instagram and Facebook.Call 1-888-RICH-101 (1-888-742-4101) to join in!Links may be affiliate.RichOnTech.tvRichOnTech.tv/wikiSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Mostly Security
320: Onion Volcano

Mostly Security

Play Episode Listen Later Jan 27, 2024 35:08


The Oregon Thaw has happened and Eric and Jon can leave their houses. There was much rejoicing. Are or will AI Sleeper Agents be a thing, a President Biden Deepfake encouraging New Hampshire voters to stay home, and an extremely large data breach posted to Have I Been Pwned. For fun, the soon to be demise of the Leap Second, and a hidden city discovered in the Amazon thanks to lidar. 0:00 - Intro 10:20 - AI Sleeper Agents 16:44 - Don't Vote Deepfake 22:20 - Naz.API List 27:23 - Leap Seconds No More 30:59 - Ancient Amazon City

The Daily Decrypt - Cyber News and Discussions
January 24, 2024 – BianLian Ransomware, Apple Zero-Day, New Mobile ATO Defense

The Daily Decrypt - Cyber News and Discussions

Play Episode Listen Later Jan 24, 2024


Episode Summary: In today's episode of the Daily Decrypt, we delve into several critical cybersecurity topics: - **BianLian Ransomware's Evolving Threat**: Analyzing the shift in tactics by the BianLian ransomware group, highlighting its focus on extortion without encryption and its significant threat to the healthcare and manufacturing sectors. - **Apple's Response to Zero-Day Vulnerability**: Discussing Apple's critical patch for a zero-day flaw in iPhones and Macs, emphasizing the urgency and importance of updating devices. - **New Defense Against Mobile Account Takeovers**: Exploring an innovative method to safeguard against mobile account takeovers, providing insights into preventing complex hacking attacks. Here are the stories discussed: **Threat Assessment of BianLian Ransomware** [Link](https://unit42.paloaltonetworks.com/bianlian-ransomware-group-threat-assessment/?&web_view=true) Published Date: 23 Jan 2024 16:30:00 +0000 GUID: [BianLian Ransomware Group Threat Assessment](https://unit42.paloaltonetworks.com/bianlian-ransomware-group-threat-assessment/?&web_view=true) Description: The BianLian ransomware group has shifted from a double extortion scheme to a focus on extortion without encryption, posing a significant threat to organizations, particularly in the healthcare and manufacturing sectors in the US and Europe. Category: Malware and Vulnerabilities **Apple Issues Patch for Critical Zero-Day in iPhones, Macs - Update Now** [Link](https://thehackernews.com/2024/01/apple-issues-patch-for-critical-zero.html?&web_view=true) Published Date: 23 Jan 2024 14:00:00 +0000 GUID: [Apple Issues Patch for Critical Zero-Day](https://thehackernews.com/2024/01/apple-issues-patch-for-critical-zero.html?&web_view=true) Description: The vulnerability, tracked as CVE-2024-23222, is a type confusion bug in the WebKit browser engine that could lead to arbitrary code execution when processing malicious web content. Category: Malware and Vulnerabilities **New Method To Safeguard Against Mobile Account Takeovers** [Link](https://www.helpnetsecurity.com/2024/01/22/safeguard-against-mobile-account-takeovers/?&web_view=true) Published Date: 23 Jan 2024 13:00:00 +0000 GUID: [Safeguard Against Mobile Account Takeovers](https://www.helpnetsecurity.com/2024/01/22/safeguard-against-mobile-account-takeovers/?&web_view=true) Transcript Offset Keyz: Good morning, everybody. Today, we've got three riveting stories for you. First, we're going to talk about the Beyond the Horn ransomware group, whose sophisticated tactics have put industries like healthcare and manufacturing on high alert. We're also going to discuss Apple's swift action against a critical zero-day vulnerability. And finally, we'll explore an innovative approach to safeguarding mobile accounts against takeover attacks, a method set to revolutionize how we understand and protect our digital identities, which affects everybody. So let's dive right in. Today's first story, from an insightful article by Daniel Frank at Unit 42 Palo Alto Networks, discusses the recent activities of the Beyond the Iron Ransomware Group. Emerging in 2022, this group has been active, targeting sectors like healthcare and manufacturing in North America, the EU, and India. Beyond the Iron's strategy has evolved from a double extortion scheme, encrypting victims' assets and demanding ransom, to a more straightforward approach of stealing data for extortion. A notable attack was on a California-based hospital where they exfiltrated 1.7 terabytes of data, including sensitive patient and employee information. Considering the mostly text-based nature of this data, 1.7 terabytes is substantial. An interesting aspect of Beyond the Iron is their possible connection to the Meiko Ransomware Group, sharing a custom .NET tool for file enumeration, registry, and clipboard data retrieval. This tool, containing Russian language elements, suggests shared tools or developers, a common practice among cybercrime groups. Beyond the Iron executes attacks by gaining initial access through stolen Remote Desktop Protocol (RDP) credentials or by exploiting vulnerabilities like ProxyShell. They use public tools for lateral movement and credential dumping, employing a backdoor component for persistence. For individuals, this underscores the importance of strong password hygiene and regular checks on sites like Have I Been Pwned. For organizations, especially in healthcare and manufacturing, it emphasizes the need for robust security measures like regular patching and threat hunting. Next, we're discussing the critical zero-day patch for Apple devices released on Monday. This addresses a zero-day flaw, CVE-2020-423222, found in the WebKit browser engine, which could allow threat actors to execute arbitrary code. This bug affects a range of devices, from iPhone Xs to the latest macOS versions. Apple's response with improved checks is commendable. Users should update their devices immediately to protect against potential data compromise or device takeover. Finally, we're discussing a new defensive strategy against mobile account takeovers, highlighted in an article from Help Net Security. Developed by Dr. Luca Annibale and others, this method aims to identify weaknesses vulnerable to account takeovers in mobile devices. By cataloging security vulnerabilities and modeling account takeovers, this approach offers a detailed representation of potential security breaches. The researchers tested their methodology against various devices, finding security gaps in brands like Apple, Samsung, and Xiaomi. Google accounts showed resilience against these attack strategies. This research has implications for both users and tech companies, emphasizing the importance of security in shared accounts and the need for continuous innovation in cybersecurity defenses. Thanks for tuning into the Daily Decrypt. Stay tuned for more episodes this week, and don't miss our bonus episode this weekend on responder hijacking attacks in the Windows ecosystem. Again, thanks for listening, and we'll talk to you tomorrow.

Open Source Security Podcast
Episode 412 - Blame the users for bad passwords!

Open Source Security Podcast

Play Episode Listen Later Jan 22, 2024 33:03


Josh and Kurt talk about the 23andMe compromise and how they are blaming the users. It's obviously the the fault of the users, but there's still a lot of things to discuss on this one. Every company has to care about cybersecurity now, even if they don't want to. Show Notes Security leaders weigh in on 23andme hack Don't need a gun when you have a Donk - Crocodile Dundee 2 Hackers can infect network-connected wrenches to install ransomware My disappointment is immeasurable, and my day is ruined

The Jerich Show Podcast
71 million new emails added to HIBP, Bosch thermostat dangers, SEC hacked, and more!

The Jerich Show Podcast

Play Episode Listen Later Jan 19, 2024 24:59


In thie episode, Erich and Javvad are talking about the SEC Twitter/x/whateveritis account getting hacked, a vulnerability in Bosch thermostats, the NCA director getting sacked over using personal accounts for sensitive info, and more! Check us out on LinkedIn, YouTube or as an audio-only podcast on all of your favorite platforms     Some stories from the show: Have I Been Pwned adds 71 million emails from Naz.API stolen account list https://www.bleepingcomputer.com/news/security/have-i-been-pwned-adds-71-million-emails-from-nazapi-stolen-account-list/ Bosch thermostats vulnerable to malware attacks https://www.scmagazine.com/brief/bosch-thermostats-vulnerable-to-malware-attacks Senators Want Better SEC Cybersecurity After EFT-Related Hack https://www.pymnts.com/cybersecurity/2024/senators-want-better-sec-cybersecurity-after-eft-related-hack/ NCA director sacked after WhatsApp and email security breaches https://www.computerweekly.com/news/366566272/NCA-director-sacked-after-WhatsApp-and-email-security-breaches

Cyber Security Headlines
Drone threats, PixieFail firmware, HIBP dataset

Cyber Security Headlines

Play Episode Listen Later Jan 18, 2024 7:03


Chinese drones considered national security threat PixieFail could spell trouble for cloud providers Have I Been Pwned adds “statistically significant” data leak Huge thanks to our sponsor, Savvy Security Shadow identities on SaaS apps are growing unchecked, rapidly expanding an attack surface where businesses have little-to-no visibility or control. Savvy helps security teams safely embrace SaaS benefits by automating the discovery and removal of the most toxic combinations of SaaS identity risk. Savvy's automation playbooks and just-in-time security guardrails guide users at scale towards proper identity hygiene. That's Savvy—Identity-First SaaS Security.  Learn more at savvy.security/headlines. 

Easy Prey
The Changing World of Data Breaches with Troy Hunt

Easy Prey

Play Episode Listen Later Dec 13, 2023 52:11


Everyone who's on the internet is exposed to risk. Every time you set up a new account or app, you create another place where your data can be hacked or breached. This makes your differing passwords crucial. Today's guest is Troy Hunt. Troy is a Pluralsight author and instructor, Microsoft Regional Director, and Most Valued Professional specializing in online security and cloud development. He is a conference speaker and runs workshops on how to build more secure software with organizations. He is also the creator of the popular data breach aggregation service known as Have I Been Pwned. Show Notes: [1:26] - Troy shares what he currently does and the work he is known for. [2:57] - You can put your data in one place and it can traverse the internet and end up in places you don't expect. [6:54] - There's a challenge in running a site that has millions of queries at any time. [9:25] - Troy shares some of the accomplishments of Have I Been Pwned. [13:32] - Does he experience a lot of malicious traffic? He used to. Troy explains how he has managed this. [18:14] - Have I Been Pwned has been around for a while and began as a lot of manual labor for Troy. [23:10] - It is crucial for organizations to be receptive to security reports. [25:09] - In a lot of ransoms, data of specific groups of people are used as threats. [27:56] - Troy lists some of the things that happen on the back end of running a site like Have I Been Pwned. [30:36] - Cloud services have been an amazing advancement in technology, but they open up more points of entry. [33:35] - There is a hierarchy of multi-factor authentication. Troy discusses the current strategies that are best practice. [35:45] - For users, what is the second-factor authentication you can manage to use? [37:27] - There are different risk levels to different things. What do you actually need to carefully protect and what level of inconvenience are you willing to bear? [39:59] - Troy shares how his parents have been impacted by confusing technology. What is the right technology for a demographic? [43:15] - Some data is more important than other pieces of information. [45:33] - Some data is also more or less important to different individuals. [46:54] - For those managing and discussing data breaches, we also need to be aware that there are pieces of data that could be important to someone but isn't important to others. [48:24] - Unfortunately, data breaches haven't gotten less common and aren't really getting better. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Have I Been Pwned? Troy Hunt's Website

Troy Hunt's Weekly Update Podcast

It's the Have I Been Pwned 10th birthday special! Join Charlotte and I for random discussion on a decade of Pwned. Sponsored by ANY.RUN https://www.troyhunt.com/weekly-update-377/See omnystudio.com/listener for privacy information.

Cold Email Outreach with Jeremy & Jack
#330 - Building A Great Campaign Without A Great List

Cold Email Outreach with Jeremy & Jack

Play Episode Listen Later Oct 18, 2023 16:37


Today Jeremy and Jack are giving you some expert hacks! The two outreach experts are sharing the biggest hacks that you can use to get the most out of a list of emails!   HERE'S WHAT WE COVER IN THIS EPISODE:   -Checking with data providers -Do you actually have a good list of emails? -Get rid of THESE emails ASAP!! -Using names to your advantage -Have I Been Pwned? -Enriching your domains -How to target small companies -LinkedIn scraping for finding out emails -Using clearbit to finalize your email list -Send in your questions for a rapid-fire episode!  Ready to take on your big competitors? Start crafting agency-level emails for your campaigns in just 8 weeks with our Cold Email Masterclass at https://course.quickmail.io/! Try it for 30 days risk-free!   Have an email you want us to teardown? Send us your emails, cold emailing questions, and campaign examples at podcast@quickmail.io and it could be featured on the air!   Happy Cold Emailing! Jeremy and Jack

LINUX Unplugged
516: The Fixer-Upper

LINUX Unplugged

Play Episode Listen Later Jun 26, 2023 69:13


Chris tears into two old PCs, and builds a surprisingly powerful multi-monitor Wayland workstation. Plus, Wes has a new device, and Brent wants answers.

Talk Python To Me - Python conversations for passionate developers
#418: How To Keep A Secret in Python Apps

Talk Python To Me - Python conversations for passionate developers

Play Episode Listen Later Jun 2, 2023 67:11


Think about the different APIs and databases your application works with. Every one of them requires either an API key or a database connection string that itself contains a password. How do you let your application access this sensitive information without storing it in source code or putting in other compromising locations? We have Glyph Lefkowitz on the show to share his security fable as well as just good advice for keeping secrets out of Python code. Links from the show Glyph on Mastodon: @glyph@mastodon.social ShhGit: github.com Encrust: github.com GitHub Security Alerts: github.com CIA Triad: fortinet.com pinpal: github.com XKCD Authorization: xkcd.com Tokenring: github.com AWS Vault: github.com Gimme-AWS-creds: github.com Secrets in GitHub Actions: github.com Python Client for HashiCorp Vault: python-hvac.org Pomodouroboros app: github.com DateType: pypi.org Haveibeenpwned: haveibeenpwned.com PEP 541: peps.python.org Glyph's security talk at PyCon: us.pycon.org Watch this episode on YouTube: youtube.com Episode transcripts: talkpython.fm --- Stay in touch with us --- Subscribe to us on YouTube: youtube.com Follow Talk Python on Mastodon: talkpython Follow Michael on Mastodon: mkennedy Sponsors PyCharm RedHat Talk Python Training