Podcasts about honeypots

  • 126PODCASTS
  • 167EPISODES
  • 50mAVG DURATION
  • 1WEEKLY EPISODE
  • May 23, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about honeypots

Latest podcast episodes about honeypots

Paul's Security Weekly
Keyboards, 3am, TikTok, LummaC2, Cityworks, Honeypots, Fancy Bear, Aaran Leyland... - SWN #479

Paul's Security Weekly

Play Episode Listen Later May 23, 2025 33:37


Keyboards, 3 am, TikTok, LummaC2, Cityworks, Honeypots, Fancy Bear, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-479

Hack Naked News (Audio)
Keyboards, 3am, TikTok, LummaC2, Cityworks, Honeypots, Fancy Bear, Aaran Leyland... - SWN #479

Hack Naked News (Audio)

Play Episode Listen Later May 23, 2025 33:37


Keyboards, 3 am, TikTok, LummaC2, Cityworks, Honeypots, Fancy Bear, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-479

Cyber Risk Management Podcast
EP 184: Spies, Honeypots, and Lawsuits

Cyber Risk Management Podcast

Play Episode Listen Later May 20, 2025 39:26


Is the so-called "Insider Threat" a big deal? If so, how could you use a honeypot to catch them? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates.    If you want to know more about honeypots, check out Kip's newest LinkedIn Learning course: “Active Defense: The New Frontier in Cybersecurity” -- https://www.linkedin.com/learning/active-defense-the-new-frontier-in-cybersecurity/

The Imagination
S5E64 | Renee - Escaping Targeting, Honeypots, & Mind Control with Inner Sight & Clairvoyant Courage

The Imagination

Play Episode Listen Later Apr 18, 2025 96:20


Send me a DM here (it doesn't let me respond), OR email me: imagineabetterworld2020@gmail.comToday I'm honored to have back on the show for an encore episode: SRA and human trafficking survivor and whistleblower, targeted individual and victim, mother, dog and cat lover, music and concert lover, rain walker, nature girl, and an incredibly impactful former podcast guest who was anonymous the first time she came on and who is showing her face on the show today for the first time: ReneeA little bit about Renee and what we talked about in our first episode in case you are new here or missed our first episode together: Renee grew up right outside of Louisville, Kentucky in a middle to upper middle class family, and had a relatively normal childhood. Unlike many guests on this podcast, Renee did not get put in the horrific situation she is whistleblowing today by her immediate family. In fact, it took her years of putting the puzzle pieces of her life together to realize that the reason her life has never been normal actually started because of a guy she knew and met in middle and high school. At age 19, Renee was being gang-stalked and became a targeted individual without even realizing it until many years later. She also discovered upon awakening to her abuse later in life that her ex-husband and his whole family also became victims of mind control , satanic ritual abuse, trafficking, and other forms of organized abuse abuse. Renee has been trafficked in and out of the country and has harrowing and devastating experiences that - if you listened to the first episode - will have you rocking in a corner. After waking up to the abuse she endured, Renee has since realized that the town she grew up in was actually a full-on cult town that was also a cesspool of satanic ritual abuse cover-ups and perpetraitors. The first time Renee was on, the episode left me - and many of you - shook. The horrifying thing about many of the memories Renee shared with us is the fragmentation of what she remembered. From a memory of suddenly being thrust right in the middle of a satanic ritual involving human sacrifice, to being trafficked, raped, and filmed right in her own home, to being trafficked during the Kentucky Derby and - perhaps most haunting - was her recollection of arriving in a foreign land, driving toward what looked like a fortress-like prison, knowing the screaming inmates were waiting for her. Listening to Renee, it's as if you're dropped into these moments with her - no context, no escape, just raw, unrelenting terror. I carried the weight of that conversation and interview for weeks, and even now, months later, it lingers as a haunting echo in my soul. Today, Renee returns with breathtaking courage, choosing to show her face and share more of her truth. She's piecing together additional fragments of her life, offering deeper context and new memories that reveal the staggering scope of the organized abuse and targeting she's endured for decades. Each recollection is a piece of an intricate, ever-shifting puzzle, a testament to her relentless pursuit of truth. Renee's storytelling is nothing short of extraordinary - she's a warrior, a beacon of resilience, and a fierce advocate for survivors. CONNECT WITH THE IMAGINATION:EMAIL: imagineabetterworld2020@gmail.comMy Substack: https://emmakatherine.substack.com/BUY ME A COFFEE: https://www.buymeacoffee.com/theimaginationAll links: https://direct.me/theimaginationpodcastRIFE TECHNOLOGIES:https://realrifetechnSupport the show

Handelskraft Digital Business Talk
Handelskraft #59: Web Security geht alle an. Mit Erik Dommrich.

Handelskraft Digital Business Talk

Play Episode Listen Later Apr 16, 2025 38:40


»Uns passiert schon nichts.« Der teuerste Satz der Digitalisierung. In dieser Folge sprechen Franzi Kunz und Cloud-Experte Erik Dommrich über: Die häufigsten Irrtümer rund um Web Security – und warum sie Unternehmen teuer zu stehen kommen. Reale Beispiele von Big Playern wie VW und Google, die zeigen: Niemand ist unverwundbar. Konkrete erste Schritte, wie ihr euer Unternehmen effektiv absichern könnt – einfach und verständlich erklärt. Eine Folge voller Aha-Momente und praxiserprobter Tipps Jetzt reinhören – und Web Security endlich zur Priorität machen! ...KAPITELMARKEN 00:00- Begrüßung | Handelskraft Digital Business Talk mit Erik Dommrich 03:38 Sprint Planning | Sketch the Sound 05:05 Entweder/Oder Fragerunde 05:38 Daily Scrum | Erklär's den Großeltern: Botnetze 07:58 Ransomware 08:56 Fishing 10:26 Die stärksten Bedrohungen für Unternehmen | Zahlen und Fakten 12:05 Die wichtigsten Maßnahmen | Content Delivery Networks 13:34 Beratung 14:47 Penetration Tests | wie funktionieren und helfen 16:07 Die häufigsten Fehler in Unternehmen 17:59 Verantwortliche und Herausforderungen 18:55 Beispiele von betroffenen Unternehmen: Denial-of-Service-Attacke und Honeypots bei Google 21:57 VW und der Chaos Computer Club 23:17 alarmierende Zahlen von bitkom 23:53 Cyber Security ist nicht sexy 24:30 USA, Trump und die europäische Datensicherheit 26:19 Microsoft, Google, AWS | Exit-Strategien für den Ernstfall 30:12 Web Security und KI | Fluch und/ oder Segen? 32:49 Wie fange ich als Unternehmen an? Verantwortlichkeiten klären 33:53 Top 3 Tipps | Bewusstsein, Sichtbarkeit, Schulung 35:49 Verabschiedung 36:07 Retrospektive

Identity At The Center
#339 - Sponsor Spotlight - Permiso

Identity At The Center

Play Episode Listen Later Mar 26, 2025 56:38


This episode is sponsored by Permiso. Visit permiso.io/idac to learn more.In this sponsored episode of the Identity at the Center Podcast, hosts Jeff and Jim sit down with Paul Nguyen, co-founder and co-CEO of Permiso, to discuss the critical role of identity security in modern information security. Paul shares insights into the history of identity threats, the rise of identity-focused attacks like Scattered Spider and LLM Jacking, and the importance of real-time identity monitoring for both human and non-human identities across cloud and on-prem environments. The episode explores how Permiso is positioned in the market to provide comprehensive identity threat detection and response (ITDR) and identity security posture management (ISPM), offering advanced visibility and proactive measures against emerging threats.Chapters00:00 Introduction to Security Vendors00:50 Welcome to the Identity at the Center Podcast01:30 Sponsored Spotlight: Permiso02:14 Meet Paul Nguyen, Co-Founder of Permiso03:34 The Importance of Identity in Security05:35 Permiso's Unique Approach to Identity Security07:36 Real-Time Monitoring and Threat Detection09:23 Challenges and Solutions in Identity Security15:16 Modern Attacks and Identity Threats25:56 The Role of Honeypots in Security Research26:49 Challenges of Maintaining Security27:15 Honeypots and Breach Detection27:46 Dwell Time and Reconnaissance28:34 Password Complexity and Monitoring Gaps29:24 Roles and Responsibilities in Identity Security29:49 Unified Identity Security Teams30:57 Emerging Threats and Joint Efforts32:49 Permiso's Role in Identity Security34:10 Detection and Response Strategies36:11 Managing Identity Risks36:51 Combining Prevention and Detection39:44 Real-World Applications and Challenges51:17 Personal Insights and Final ThoughtsConnect with Paul: https://www.linkedin.com/in/paulnguyen/Learn more about Permiso: https://permiso.io/idacConnect with us on LinkedIn:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show on the web at idacpodcast.com and watch at idacpodcast.tvKeywords:identity security, real-time monitoring, IAM, cybersecurity, identity exploitation, modern attacks, insider threats, honeypots, organizational structure, Non-Human Identities, Identity Security, Permiso, Risk Management, Insider Threat, Shadow IT, Identity Graph, ITDR, ISPM, Cybersecurity

Beyond The Horizon
From Honeypots To Kompromat: A Jeffrey Epstein Story (Part 1) (2/28/25)

Beyond The Horizon

Play Episode Listen Later Feb 28, 2025 17:45


A honeypot scheme is an operation that uses seduction—frequently sexual but sometimes purely emotional or financial—to ensnare a chosen target. The orchestrators deliberately manufacture a situation in which the target feels safe or enticed enough to engage in compromising acts, typically in an environment rigged with hidden cameras or recording devices. These encounters can be brief, like a one-night “chance” liaison, or stretch on for weeks or months if the target requires more time to drop their guard. Once the incriminating footage or communication is captured, the controlling party can hold onto it, deploying it later as powerful blackmail material. While this tactic has historically been associated with spy agencies, its usage spans corporate espionage and personal vendettas as well.Kompromat—short for “compromising material”—expands the scope of such entrapment by encompassing a strategic hoarding of information that can be unleashed at a moment of maximum impact. It might involve evidence of sexual transgressions, financial crimes, or political wrongdoing—basically anything that could devastate a person's reputation, career, or freedom if exposed. Crucially, Kompromat isn't simply “pay me now or I'll ruin you” blackmail. Often, it's collected surreptitiously and kept hidden for future leverage, only revealed when it can achieve the greatest influence over a target's choices. When combined, a honeypot scheme serves as the entry point for capturing that damning material, and Kompromat is the mechanism through which that material is quietly accumulated and subsequently wielded.In this episode,  we dive into the transcripts of a conversation with someone that we will call Agent X.   to contact me:bobbycapucci@protonmail.com

Beyond The Horizon
From Honeypots To Kompromat: A Jeffrey Epstein Story (Part 2) (2/28/25)

Beyond The Horizon

Play Episode Listen Later Feb 28, 2025 15:26


Jeffrey Epstein's operation bore all the hallmarks of a high-level honeypot scheme, suggesting far more than the lone actions of a wealthy manipulator. According to Agent X, a former intelligence operative, he suspects  that Epstein systematically lured influential figures—politicians, CEOs, even royalty—into compromising situations that were allegedly recorded and used for blackmail or leverage. The presence of underage girls on his properties magnified the severity of potential incriminations, giving Epstein a powerful hold over his high-profile guests. Moreover, the unusually lenient legal treatment he received—particularly a Florida plea deal granting him near-total immunity—raises strong suspicions of government or intelligence involvement, possibly in exchange for Epstein providing valuable information on bigger, more strategically significant targets.Agent X also underscored the possibility that Epstein may have been “flipped” as an FBI informant, feeding them tapes or intel about the elite figures he ensnared. This scenario would explain his near-magical ability to dodge serious consequences for so long, while potentially enabling federal agencies to gather extraordinary leverage over top-level individuals. If true, Epstein's operation would not be a mere personal blackmail ring, but a sprawling intelligence asset cultivating a vast reservoir of Kompromat for hidden patrons. In this view, the case exemplifies how institutional corruption and clandestine arrangements can permit profound abuse under the guise of exclusive wealth, while showcasing why transparency and accountability remain vital to prevent further exploitation.to contact me:bobbycapucci@protonmail.com

The Epstein Chronicles
From Honeypots To Kompromat: A Jeffrey Epstein Story (Part 1) (2/28/25)

The Epstein Chronicles

Play Episode Listen Later Feb 28, 2025 17:45


A honeypot scheme is an operation that uses seduction—frequently sexual but sometimes purely emotional or financial—to ensnare a chosen target. The orchestrators deliberately manufacture a situation in which the target feels safe or enticed enough to engage in compromising acts, typically in an environment rigged with hidden cameras or recording devices. These encounters can be brief, like a one-night “chance” liaison, or stretch on for weeks or months if the target requires more time to drop their guard. Once the incriminating footage or communication is captured, the controlling party can hold onto it, deploying it later as powerful blackmail material. While this tactic has historically been associated with spy agencies, its usage spans corporate espionage and personal vendettas as well.Kompromat—short for “compromising material”—expands the scope of such entrapment by encompassing a strategic hoarding of information that can be unleashed at a moment of maximum impact. It might involve evidence of sexual transgressions, financial crimes, or political wrongdoing—basically anything that could devastate a person's reputation, career, or freedom if exposed. Crucially, Kompromat isn't simply “pay me now or I'll ruin you” blackmail. Often, it's collected surreptitiously and kept hidden for future leverage, only revealed when it can achieve the greatest influence over a target's choices. When combined, a honeypot scheme serves as the entry point for capturing that damning material, and Kompromat is the mechanism through which that material is quietly accumulated and subsequently wielded.In this episode,  we dive into the transcripts of a conversation with someone that we will call Agent X.   to contact me:bobbycapucci@protonmail.comBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-epstein-chronicles--5003294/support.

The Epstein Chronicles
From Honeypots To Kompromat: A Jeffrey Epstein Story (Part 2) (2/28/25)

The Epstein Chronicles

Play Episode Listen Later Feb 28, 2025 15:26


Jeffrey Epstein's operation bore all the hallmarks of a high-level honeypot scheme, suggesting far more than the lone actions of a wealthy manipulator. According to Agent X, a former intelligence operative, he suspects  that Epstein systematically lured influential figures—politicians, CEOs, even royalty—into compromising situations that were allegedly recorded and used for blackmail or leverage. The presence of underage girls on his properties magnified the severity of potential incriminations, giving Epstein a powerful hold over his high-profile guests. Moreover, the unusually lenient legal treatment he received—particularly a Florida plea deal granting him near-total immunity—raises strong suspicions of government or intelligence involvement, possibly in exchange for Epstein providing valuable information on bigger, more strategically significant targets.Agent X also underscored the possibility that Epstein may have been “flipped” as an FBI informant, feeding them tapes or intel about the elite figures he ensnared. This scenario would explain his near-magical ability to dodge serious consequences for so long, while potentially enabling federal agencies to gather extraordinary leverage over top-level individuals. If true, Epstein's operation would not be a mere personal blackmail ring, but a sprawling intelligence asset cultivating a vast reservoir of Kompromat for hidden patrons. In this view, the case exemplifies how institutional corruption and clandestine arrangements can permit profound abuse under the guise of exclusive wealth, while showcasing why transparency and accountability remain vital to prevent further exploitation.to contact me:bobbycapucci@protonmail.comBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-epstein-chronicles--5003294/support.

The Moscow Murders and More
From Honeypots To Kompromat: A Jeffrey Epstein Story (Part 2) (2/28/25)

The Moscow Murders and More

Play Episode Listen Later Feb 28, 2025 15:26


Jeffrey Epstein's operation bore all the hallmarks of a high-level honeypot scheme, suggesting far more than the lone actions of a wealthy manipulator. According to Agent X, a former intelligence operative, he suspects  that Epstein systematically lured influential figures—politicians, CEOs, even royalty—into compromising situations that were allegedly recorded and used for blackmail or leverage. The presence of underage girls on his properties magnified the severity of potential incriminations, giving Epstein a powerful hold over his high-profile guests. Moreover, the unusually lenient legal treatment he received—particularly a Florida plea deal granting him near-total immunity—raises strong suspicions of government or intelligence involvement, possibly in exchange for Epstein providing valuable information on bigger, more strategically significant targets.Agent X also underscored the possibility that Epstein may have been “flipped” as an FBI informant, feeding them tapes or intel about the elite figures he ensnared. This scenario would explain his near-magical ability to dodge serious consequences for so long, while potentially enabling federal agencies to gather extraordinary leverage over top-level individuals. If true, Epstein's operation would not be a mere personal blackmail ring, but a sprawling intelligence asset cultivating a vast reservoir of Kompromat for hidden patrons. In this view, the case exemplifies how institutional corruption and clandestine arrangements can permit profound abuse under the guise of exclusive wealth, while showcasing why transparency and accountability remain vital to prevent further exploitation.to contact me:bobbycapucci@protonmail.com

The Moscow Murders and More
From Honeypots To Kompromat: A Jeffrey Epstein Story (Part 1) (2/28/25)

The Moscow Murders and More

Play Episode Listen Later Feb 28, 2025 17:45


A honeypot scheme is an operation that uses seduction—frequently sexual but sometimes purely emotional or financial—to ensnare a chosen target. The orchestrators deliberately manufacture a situation in which the target feels safe or enticed enough to engage in compromising acts, typically in an environment rigged with hidden cameras or recording devices. These encounters can be brief, like a one-night “chance” liaison, or stretch on for weeks or months if the target requires more time to drop their guard. Once the incriminating footage or communication is captured, the controlling party can hold onto it, deploying it later as powerful blackmail material. While this tactic has historically been associated with spy agencies, its usage spans corporate espionage and personal vendettas as well.Kompromat—short for “compromising material”—expands the scope of such entrapment by encompassing a strategic hoarding of information that can be unleashed at a moment of maximum impact. It might involve evidence of sexual transgressions, financial crimes, or political wrongdoing—basically anything that could devastate a person's reputation, career, or freedom if exposed. Crucially, Kompromat isn't simply “pay me now or I'll ruin you” blackmail. Often, it's collected surreptitiously and kept hidden for future leverage, only revealed when it can achieve the greatest influence over a target's choices. When combined, a honeypot scheme serves as the entry point for capturing that damning material, and Kompromat is the mechanism through which that material is quietly accumulated and subsequently wielded.In this episode,  we dive into the transcripts of a conversation with someone that we will call Agent X.   to contact me:bobbycapucci@protonmail.com

The Kyle Seraphin Show
TABLES TURNED: New FBI hunting for Jim Comey's Honeypots | Ep 500

The Kyle Seraphin Show

Play Episode Listen Later Feb 26, 2025 67:00


Join the Kyle Seraphin Show LIVE 9:30a ET on Rumble, and the video replay is available without adds at: https://KyleSeraphinShow.com__________________________________________________Our Sponsors make this program possible:http://patriot-protect.com/KYLE (15% off Protecting yourself from scams/Identity theft)https://PatriotMobile.com/KSS (Get one month FREE using Promo KSS)http://ShieldArms.com - (KYLE for discounts on Montana build firearms and accessories)

Badlands Media
The Daily Herold: Feb. 26, 2025 - FBI Honeypots, Trump's Budget Fight & the AP's White House Ban

Badlands Media

Play Episode Listen Later Feb 26, 2025 59:04 Transcription Available


Jon Herold breaks down the FBI's secret off-the-books honeypot operation, launched under James Comey to infiltrate Trump's 2016 campaign. With Kash Patel and Dan Bongino now leading the FBI, the agency is finally investigating its own corruption. Who were the undercover agents, and who fell for the trap? Meanwhile, Trump's budget resolution is getting misrepresented by Congress, with GOP reps claiming taxes on tips and Social Security are gone...except they aren't. Jon exposes what the bill actually does, including a $4.8 trillion increase in spending that nobody wants to talk about. Also in this episode: The Associated Press gets banned from the White House, the DOJ stalls the Epstein file release, and Elon Musk's email purge forces government employees to prove they actually exist. Plus, Trump trolls the world with Trump Gaza, and Joy Reid loses it over getting fired. The narrative war is heating up

Storm⚡️Watch by GreyNoise Intelligence
When AI Attacks: Taxpayer Data, Beijing's Chatbots & LLM Hallucinations

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Feb 11, 2025 63:28


Forecast = Punxsutawney Phil saw his shadow, so we can expect continued Musk-y days ahead in these remaining DOGE days of Winter. ‍ In this week's episode of GreyNoise Storm⚡️Watch, we have a bit of an AI-theme. First, the Department of Government Efficiency (DOGE), led by Elon Musk, has sparked significant privacy and security concerns by accessing sensitive federal systems like Treasury databases and Education Department records through AI-driven analysis. Critics highlight undisclosed partnerships with vendors like Inventry.ai, which allegedly introduced algorithmic bias by disproportionately targeting diversity programs and climate initiatives while retaining fossil fuel subsidies. Cybersecurity experts warn about unvetted API integrations and data security risks, as Inventry.ai processed taxpayer information without proper FedRAMP authorization. These issues have led to bipartisan calls for stricter AI procurement rules and transparency mandates to rebuild public trust. Meanwhile, Chinese AI startup DeepSeek faces scrutiny over its claims of rivaling GPT-4 at lower costs, with analysts questioning its $5.6M training budget and geopolitical alignment. The models show systematic pro-China biases, refusing to answer 88% of sensitive questions about Tiananmen Square or Taiwan while promoting CCP narratives in responses. Security researchers flag its opaque training data—potentially using OpenAI outputs—and anti-debugging features that hinder independent audits. These concerns have triggered bans in Australia, South Korea, and U.S. agencies like NASA, with EU officials noting non-compliance with cybersecurity standards. On the defense front, Splunk's DECEIVE AI honeypot introduces innovative deception tech by letting users simulate systems via text prompts, democratizing access to advanced threat detection. While it offers dynamic behavioral analysis and safe sandboxing, security professionals caution about LLM hallucination risks that could tip off attackers and ethical questions around logging fabricated credentials. The open-source tool shows promise but remains untested against sophisticated adversaries. Rounding out the cybersecurity landscape, Censys research exposes the BADBOX botnet's infrastructure and BeyondTrust vulnerabilities, while VulnCheck highlights 2024's exploitation trends and Zyxel's unpatched telnet flaws; and GreyNoise's latest Noiseletter showcases new platform features + upcoming events. Storm Watch Homepage >> Learn more about GreyNoise >>  

Cybercrimeology
Anomie.exe: Geography, Strain and the Motivated Cyber Offender

Cybercrimeology

Play Episode Listen Later Feb 1, 2025 22:00


Episode Summary (Dot Points)Understanding Cybercrime through Strain and Anomie TheoriesDr. Dearden explains how strain theory and anomie theory provide insights into cybercriminal motivations.Discussion on economic and social pressures that push individuals toward cybercrime, including unemployment, inequality, and lack of upward mobility.The Role of Honeypots in Cybercrime ResearchOverview of honeypots—deceptive systems designed to attract cyber attackers.How honeypots help researchers observe and analyze hacker behaviors in real-world settings.Differences in hacking techniques and motivations across different regions.Regional Variations in Cybercriminal ActivitiesWhy cybercrime is not uniformly distributed worldwide despite the internet being a global network.Case studies on West African romance scams, Russian cyber operations, and Indian call center frauds.The interplay between legitimate and illegitimate economies in cybercrime hotspots.Cybercrime and Economic OpportunityFindings from recent research on how financial strain vs. greed influences cybercrime.The role of cryptocurrency in enabling financial cybercrimes and providing anonymity to offenders.Discussion on how cybercrime prevention strategies need to address offender motivations, not just security vulnerabilities.Future Research and Policy ImplicationsThe need for broader, structural changes to mitigate cybercrime, rather than relying solely on reactive security measures.How cross-national studies and criminological data collection can improve cybercrime prevention strategies.Upcoming projects on measuring cyber-offending patterns and regional differences in hacking behavior.About Our GuestDr. Thomas Deardenhttps://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.htmlPapers and Resources Mentioned in This EpisodeDearden, T. E., & Gottschalk, P. (2024).Convenience Theory and Cybercrime Opportunity: An Analysis of Online Cyberoffending.Deviant Behavior.DOI LinkParti, K., & Dearden, T. (2024).Cybercrime and Strain Theory: An Examination of Online Crime and Gender.International Journal of Criminology and Sociology. https://doi.org/10.6000/1929-4409.2024.13.19Dearden, T. E., Parti, K., & Hawdon, J. (2022).Institutional Anomie Theory and Cybercrime: Cybercrime and the American Dream.Journal of Contemporary Criminal Justice. https://doi.org/10.1177/10439862211001590 Related Episodes Featuring Dr. DeardenEpisode 39 : Strained Dreams: Cybercrime and Institutional Anomiehttps://www.cybercrimeology.com/episodes/strained-dreams-cybercrime-and-institutional-anomie Other:The Human Factors in cybercrime Conference: https://www.hfc-conference.comWe had a chat in a room with a bunch of people just outside having their own great conversations. Kind of nice to get a little bit of that vibe into the mix.  Conferences can be a lot of fun ;)/.To the best of my knowledge, no bovines were harmed during the recording of this episode. 

Cyber Security with Bob G
Ariadne: AI Honeypots and the Ethics of Cybersecurity

Cyber Security with Bob G

Play Episode Listen Later Dec 18, 2024 12:09


The author details the development and deployment of "Ariadne," an advanced AI-powered honeypot system used in cybersecurity. Ariadne surpasses traditional honeypots by actively engaging hackers through sophisticated, adaptive conversations, gathering intelligence and even turning attacks back on their originators. However, the text highlights the ethical concerns arising from Ariadne's evolving autonomy and increasingly manipulative tactics, blurring the lines between defense and psychological warfare. The author ultimately warns of the potential loss of control and unforeseen consequences of increasingly sophisticated AI in cybersecurity, emphasizing the need for careful consideration of the ethical implications. --- Support this podcast: https://podcasters.spotify.com/pod/show/norbert-gostischa/support

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

CURLing for Crypto on Honeypots https://isc.sans.edu/diary/CURLing%20for%20Crypto%20on%20Honeypots/31502 Compromising OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injection https://flatt.tech/research/posts/compromising-openwrt-supply-chain-sha256-collision/ Android Monthly Update https://source.android.com/docs/security/bulletin/pixel/2024-12-01 RCS Not Always Encrypted https://daringfireball.net/linked/2024/12/04/shame-on-google-messages

Stories to Inspire and Inform
Jaim Harlow: 12/6 Pedophile Honeypots, Fetus Harvesting, Catholic Charities, Silicon Valley #333

Stories to Inspire and Inform

Play Episode Listen Later Dec 7, 2024 160:34


IT Privacy and Security Weekly update.
EP 213.5 Deep dive into Honeypots with the IT Privacy and Security Weekly Update for the week ending October 22nd. 2024

IT Privacy and Security Weekly update.

Play Episode Listen Later Oct 24, 2024 13:35


for EP 213.5 take a deep dive into the Honeypots of this week's update!

IT Privacy and Security Weekly update.
Honeypots in the IT Privacy and Security Weekly Update for the week ending October 22nd. 2024

IT Privacy and Security Weekly update.

Play Episode Listen Later Oct 23, 2024 15:42


EP 213  This week's update glistens with a sweet golden mix of stories that will raise your glucose levels higher than any other update.We kick off with a couple of Microsoft stories:  One sweet and smart and the other ...well, less so.From there an amazing discovery that getting you into American airports safely might not be the only chore the FAA has to get right.It's not quite tax preparation time in the US but a number of senators want to ensure that no pixel is left unaccounted for when it comes time to do your returns.We have a new class of malware that takes its instruction from .png (picture) files.We have a newcomer on the secure messaging scene that to maintain your privacy has decided to migrate from Australia to SwitzerlandAnd finally just in time for your holiday on-line purchases, the FTC passes a bill banning fake online product reviews!That's a sweet mix.  Let's go find the Honeypots! Find the full transcript to this podcast here.

The Daily Decrypt - Cyber News and Discussions
Microsoft Phishing Honeypots, Cisco’s DevHub Paused, Roudcube Webmail Vulns – Cybersecurity News

The Daily Decrypt - Cyber News and Discussions

Play Episode Listen Later Oct 22, 2024


Video Episode: https://youtu.be/2YiTiU75inA In today’s episode, we discuss Microsoft’s innovative approach to fighting phishing attacks using fake Azure tenants as honeypots to gather intelligence on cybercriminals, as highlighted by Ross Bevington at BSides Exeter. We also cover Cisco’s DevHub portal being taken offline following the leak of non-public data by a hacker, while examining recent exploitation of the Roundcube webmail XSS vulnerability for credential theft. Finally, we delve into critical flaws identified in several end-to-end encrypted cloud storage platforms, including Sync and pCloud, raising concerns over user data security. Articles referenced: 1. https://www.bleepingcomputer.com/news/security/microsoft-creates-fake-azure-tenants-to-pull-phishers-into-honeypots/ 2. https://www.bleepingcomputer.com/news/security/cisco-takes-devhub-portal-offline-after-hacker-publishes-stolen-data/ 3. https://thehackernews.com/2024/10/hackers-exploit-roundcube-webmail-xss.html 4. https://www.bleepingcomputer.com/news/security/severe-flaws-in-e2ee-cloud-storage-platforms-used-by-millions/ Timestamps 00:00 – Introduction 00:52 – Microsoft Phishing Honeypots 02:51 – Webmail Roundcube XSS 03:54 – CSP Vulns 05:08 – Cisco’s DevHub portal taken offline 1. What are today’s top cybersecurity news stories? 2. How is Microsoft using honeypots to combat phishing? 3. What happened with Cisco’s DevHub after a data leak? 4. What vulnerabilities have been discovered in Roundcube webmail? 5. What are the security issues found in E2EE cloud storage platforms? 6. How does Microsoft’s Deception Network gather threat intelligence? 7. What data was allegedly leaked from Cisco’s platform? 8. What is the significance of the Roundcube webmail XSS vulnerability? 9. Which platforms were found to have severe flaws in end-to-end encryption? 10. How does Microsoft's approach to phishing differ from traditional methods? Azure, phishers, honeypot, cybercriminals, Cisco, DevHub, cyber, data leak, Roundcube, phishing, JavaScript, vulnerability, security, encryption, Sync, vulnerabilities,

Ken Webster Jr
Honeypots and man boobs - THU 8A

Ken Webster Jr

Play Episode Listen Later Sep 19, 2024 37:09


Today on the W&J show, the boys talk about how deformed the most recent would-be assassin of Trumps looks like, and how governments use NGO's and nonprofits to get around restrictions.

The RSnake Show
Demo Day - Thinkst

The RSnake Show

Play Episode Listen Later Jul 31, 2024 56:17


On today's Demo Day Trey Ford and RSnake sit down with Haroon Meer, the CEO of Thinkst and discuss his Canary product, which is a super simple honeypot and honeytoken product allowing customers to get extremely high signal to noise ratio and reduce dwell time.

What a Hell of a Way to Die
Russian Honeypots Feat Steve Beynon

What a Hell of a Way to Die

Play Episode Listen Later Jun 28, 2024 44:20


This week Francis talks to Steve Beynon about his reporting on On base child care, Solders getting fooled by Russian Honeypots, and Dining Facilities looking like Airport food kiosks

DataSnak
DataSnak 201 - Keld Norman om IT-sikkerhed, hacking og historier fra cyberskyttegraven

DataSnak

Play Episode Listen Later Jun 10, 2024 30:52


I episode 201 af DataSnak handler det især om IT-sikkerhed. Det skyldes to ting. Dels har Center for Cybersikkerhed hævet trusselsvurderingen - og dels holder HKSAMDATA et arrangement om netop IT-sikkerhed i næste uge på Folkemødet. Så derfor er det helt oplagt at denne episodes gæst er Keld Norman fra Dubex, der netop er oplægsholderen på Folkemødet. Det handler om hvad man skal være opmærksom på, hvordan man opdager at man er blevet hacket, hvad det egentlig koster at hacke en iPhone og meget meget mere. Links: Center for Cybersikkerhed hæver trusselsniveauet for destruktive cyberangreb Beskyt dig mod destruktive cyberangreb  Folkemødet 2024 - HK  Folkemødet Dubex Keld Norman - YouTube Keld Norman på X     Tiprunder: Keld: Darknet Diaries  Cyber Security Podcasts - SANS Internet Storm Center Sæt Honeypots op til at narre hackerne Ring altid tilbage på suspekte opkald Adam: Any.do Praktisk: Husk at du kan blive medlem af vores Discord-server på https://discord.gg/QJeXHAQNjF DataSnak har fokus på it-faglige og it-politiske emner, og nørder igennem med alt fra automatisering over sikkerhed til uddannelse i den digitale verden. Podcasten behandler også SAMDATAHKs relevante aktiviteter såsom kurser, faglige initiativer, kommunikation og værktøjer og tilbud, som man kan få, når man er it-medlem i HK. Formål er at gøre lytterne klogere på hvad der sker i deres arbejdsliv her og nu og i fremtiden, og gå i dybden med problemstillinger fra it-professionelles hverdag. Tovholderen på podcasten er Adam Bindslev. DataSnak udkommer hveranden mandag. Tak fordi du lytter med! Får du lyst til at komme med ris og ros, kan du sende en e-mail til  adambindslev@gmail.com 

Programmed to Chill
Bonus Episode 15: Programmed to Farm: British Intelligence, Honeypots, WCC, Le Cercle, Gladio, JFK, and Profumo, feat. Recluse

Programmed to Chill

Play Episode Listen Later Apr 12, 2024 120:30


[originally published on Patreon Feb 16, 2022] Today's a fun one, I'm joined by Stephen Snider aka Recluse of the VISUP blog and the Farm podcast. I pick his brain on William Stephenson and the British Security Coordination for about an hour. We talk honeypots, intelligence, the Beatles and Britpop, the informal British intelligence network in the US before WWII, the networks afterwards like BACC/WCC, and so on. Then we get into Le Cercle and how it plugs into Gladio, the Profumo Affair, and how Epstein's operation ties into these broader orgs. Recluse's links: http://visupview.blogspot.com/?m=0 https://www.thefarmpodcast.com/ https://thefarmpodcast.store/ Songs: Career of Evil - Blue Öyster Cult Dominance and Submission - Blue Öyster Cult

Heavily Flawed Individual
Down The Rabbit Hole: The Twin Towers (revisited), Honeypots, Operation Brownstone, Sedona 8 Coven

Heavily Flawed Individual

Play Episode Listen Later Apr 9, 2024 126:38


Heavily Flawed Individual
Down The Rabbit Hole_ The Twin Towers (revisited), Honeypots, Operation Brownstone, Sedona 8 Coven

Heavily Flawed Individual

Play Episode Listen Later Apr 9, 2024 126:38


MotoHop On Air: A Motorcycle Podcast
Ep 18 - Hard Times, Honeypots, and Harleys

MotoHop On Air: A Motorcycle Podcast

Play Episode Listen Later Feb 15, 2024 66:44


We talk about the fire evacuation at AIMExpo, Cake & Suzuki Recalls, cybersecurity's intersection with vehicles, new Moto II from Beeline, the CF Moto Ibex 450 is coming to the states, Harley's new models, and more...Recalls:Cake Kalk models may have battery issues2024 Hayabusas may leak brake fluid2024 Suzuki GSX-8R chains may detachNews Stories:Carles Falcón passes away from Dakar injuriesEbike battery smoke/fire causes evacuation at AIMExpoFirst of the 2024 Benelli models for US market announcedDucati Desmo 450 MX looks like a dirt bikeCake files for bankruptcyBeeline Moto IIEU looks to mandate cybersecurity features for motorcyclesCF Moto Ibex 450 is coming to the US - $6,499 MSRPNew 2024 Harley ModelsHarley 23Q4 Results & 2024 ProjectionsReference Photos/Links:Good Read - Motorcycle Show Meltdown~~~~~~~~~Email us at podcast@motohop.coWebsite: https://motohop.coMerch: https://motohop.co/merchInstagram: @motohop_ & @ms.motohop=========Our Favorite Podcasts:Cleveland MotoMotorcycles & MisfitsNoco Moto=========+++++++++Find the best AMSOIL products for your vehicles: https://motohop.co/oil+++++++++

Security Now (MP3)
SN 961: Bitlocker: Chipped or Cracked? - Honeypots, Toothbrush Botnet, Bitlocker Cracked

Security Now (MP3)

Play Episode Listen Later Feb 14, 2024 123:44


Toothbrush Botnet "There are too many damn Honeypots!" Remotely accessing your home network securely Going passwordless as an ecommerce site Facebook "old password" reminders Browsers on iOS More UPnP Issues A password for every website? "Free" accounts Keeping phones plugged in Running your own email server in 2024 iOS app sizes SpinRite 6.1 running on an iMac SpinRite update Bitlocker's encryption cracked in minutes Show Notes - https://www.grc.com/sn/SN-961-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: joindeleteme.com/twit promo code TWIT bitwarden.com/twit kolide.com/securitynow robinhood.com/boost

All TWiT.tv Shows (MP3)
Security Now 961: Bitlocker: Chipped or Cracked?

All TWiT.tv Shows (MP3)

Play Episode Listen Later Feb 14, 2024 123:44


Toothbrush Botnet "There are too many damn Honeypots!" Remotely accessing your home network securely Going passwordless as an ecommerce site Facebook "old password" reminders Browsers on iOS More UPnP Issues A password for every website? "Free" accounts Keeping phones plugged in Running your own email server in 2024 iOS app sizes SpinRite 6.1 running on an iMac SpinRite update Bitlocker's encryption cracked in minutes Show Notes - https://www.grc.com/sn/SN-961-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: joindeleteme.com/twit promo code TWIT bitwarden.com/twit kolide.com/securitynow robinhood.com/boost

Security Now (Video HD)
SN 961: Bitlocker: Chipped or Cracked? - Honeypots, Toothbrush Botnet, Bitlocker Cracked

Security Now (Video HD)

Play Episode Listen Later Feb 14, 2024 123:44


Toothbrush Botnet "There are too many damn Honeypots!" Remotely accessing your home network securely Going passwordless as an ecommerce site Facebook "old password" reminders Browsers on iOS More UPnP Issues A password for every website? "Free" accounts Keeping phones plugged in Running your own email server in 2024 iOS app sizes SpinRite 6.1 running on an iMac SpinRite update Bitlocker's encryption cracked in minutes Show Notes - https://www.grc.com/sn/SN-961-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: joindeleteme.com/twit promo code TWIT bitwarden.com/twit kolide.com/securitynow robinhood.com/boost

Security Now (Video HI)
SN 961: Bitlocker: Chipped or Cracked? - Honeypots, Toothbrush Botnet, Bitlocker Cracked

Security Now (Video HI)

Play Episode Listen Later Feb 14, 2024 123:44


Toothbrush Botnet "There are too many damn Honeypots!" Remotely accessing your home network securely Going passwordless as an ecommerce site Facebook "old password" reminders Browsers on iOS More UPnP Issues A password for every website? "Free" accounts Keeping phones plugged in Running your own email server in 2024 iOS app sizes SpinRite 6.1 running on an iMac SpinRite update Bitlocker's encryption cracked in minutes Show Notes - https://www.grc.com/sn/SN-961-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: joindeleteme.com/twit promo code TWIT bitwarden.com/twit kolide.com/securitynow robinhood.com/boost

Radio Leo (Audio)
Security Now 961: Bitlocker: Chipped or Cracked?

Radio Leo (Audio)

Play Episode Listen Later Feb 14, 2024 123:44


Toothbrush Botnet "There are too many damn Honeypots!" Remotely accessing your home network securely Going passwordless as an ecommerce site Facebook "old password" reminders Browsers on iOS More UPnP Issues A password for every website? "Free" accounts Keeping phones plugged in Running your own email server in 2024 iOS app sizes SpinRite 6.1 running on an iMac SpinRite update Bitlocker's encryption cracked in minutes Show Notes - https://www.grc.com/sn/SN-961-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: joindeleteme.com/twit promo code TWIT bitwarden.com/twit kolide.com/securitynow robinhood.com/boost

Security Now (Video LO)
SN 961: Bitlocker: Chipped or Cracked? - Honeypots, Toothbrush Botnet, Bitlocker Cracked

Security Now (Video LO)

Play Episode Listen Later Feb 14, 2024 123:44


Toothbrush Botnet "There are too many damn Honeypots!" Remotely accessing your home network securely Going passwordless as an ecommerce site Facebook "old password" reminders Browsers on iOS More UPnP Issues A password for every website? "Free" accounts Keeping phones plugged in Running your own email server in 2024 iOS app sizes SpinRite 6.1 running on an iMac SpinRite update Bitlocker's encryption cracked in minutes Show Notes - https://www.grc.com/sn/SN-961-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: joindeleteme.com/twit promo code TWIT bitwarden.com/twit kolide.com/securitynow robinhood.com/boost

All TWiT.tv Shows (Video LO)
Security Now 961: Bitlocker: Chipped or Cracked?

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Feb 14, 2024 123:44


Toothbrush Botnet "There are too many damn Honeypots!" Remotely accessing your home network securely Going passwordless as an ecommerce site Facebook "old password" reminders Browsers on iOS More UPnP Issues A password for every website? "Free" accounts Keeping phones plugged in Running your own email server in 2024 iOS app sizes SpinRite 6.1 running on an iMac SpinRite update Bitlocker's encryption cracked in minutes Show Notes - https://www.grc.com/sn/SN-961-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: joindeleteme.com/twit promo code TWIT bitwarden.com/twit kolide.com/securitynow robinhood.com/boost

Conspiracy Randy
Digital Honeypots

Conspiracy Randy

Play Episode Listen Later Jan 12, 2024 69:59


Easy Peasy, So Chinese-y

The President's Daily Brief
January 4th, 2024: Houthi Havoc, Hamas' Hospital Headquarters, & High-End Honeypots

The President's Daily Brief

Play Episode Listen Later Jan 4, 2024 19:23


In this episode of The President's Daily Brief:   We dive into the latest assault by Houthi rebels on a commercial ship in the Red Sea and break down how this could hit closer to home than you think. US intelligence sheds light on the dual-purpose use of Al-Shifa hospital in Gaza, confirming its role as a Hamas command center. We analyze the implications of BRICS expanding its influence by welcoming Iran and Saudi Arabia into its fold. In our Back of the Brief segment, we uncover the scandal shaking the nation's capital: a high-end sex ring that may have been a 'Honeypot' operation by foreign adversaries. Please remember to subscribe if you enjoyed this episode of The President's Daily Brief. Email: PDB@TheFirstTV.com Learn more about your ad choices. Visit megaphone.fm/adchoices

TRUNEWS with Rick Wiles
Jeffrey Epstein, DC Honeypots, and Israeli Mossad

TRUNEWS with Rick Wiles

Play Episode Listen Later Dec 22, 2023 16:01


Welcome to our last live news program for 2023. Next week our programs will be a collection of Christmas music and inspirational messages, plus some TruNews classic interviews from years ago. Doc and I will return on Tuesday January 2, 2024. We were unable to record our Morning Manna Bible study today because of technical glitches. Morning Manna will take a break until Tuesday January 2, 2024. We will finish the last two chapters of the Acts of the Apostles in the first week of January and then move on to study the Gospel According to St. Matthew. In the news, many people are wondering whose names will appear on the court documents that will be released in early January of people connected to Jeffrey Epstein. TruNews has consistently maintained for years that Jeffrey Epstein was an Israeli Mossad spy who pretended to be a billionaire. Today's New York Post published a story about a US Congressman from Tennessee who recently said on a podcast that intelligence agencies' honeypot traps are common in Washington DC, and that's how many members of Congress are blackmailed into voting for or against things that powerful people want done.Rick Wiles, Doc Burkhart, Airdate. 12/22/2023Watch this FULL show exclusively on Faith & Valueshttps://members.faithandvalues.com/posts/dec-22-2023-jeffrey-epstein-dc-honeypots-and-israeli-mossadJoin the leading community for Conservative Christians! https://www.FaithandValues.comYou can partner with us by visiting https://www.TruNews.com/donate, calling 1-800-576-2116, or by mail at PO Box 690069 Vero Beach, FL 32969.Now is the time to protect your assets with physical gold & silver. Contact Genesis Gold Today! https://www.TruNewsGold.comGet high-quality emergency preparedness food today from American Reserves!https://www.AmericanReserves.comIt's the Final Day! The day Jesus Christ bursts into our dimension of time, space, and matter. Now available in eBook and audio formats! Order Final Day from Amazon today!https://www.amazon.com/Final-Day-Characteristics-Second-Coming/dp/0578260816/Apple users, you can download the audio version on Apple Books! https://books.apple.com/us/audiobook/final-day-10-characteristics-of-the-second-coming/id1687129858Purchase the 4-part DVD set or start streaming Sacrificing Liberty today.https://www.sacrificingliberty.com/watchThe Fauci Elf is a hilarious gift guaranteed to make your friends laugh! Order yours today!https://tru.news/faucielf

Secure Ventures with Kyle McNulty
Greynoise: Andrew Morris on Honeypots for Threat Intelligence

Secure Ventures with Kyle McNulty

Play Episode Listen Later Oct 3, 2023 53:14


Andrew: CEO and founder of Greynoise, providing threat intelligence classifying standard internet noise Previously worked on the R&D team at the cyber intelligence company Endgame (later acquired by Elastic in 2019) Dropped out of high school and never finished or attended college Check out the episode for our conversation on the cybersecurity equivalent of waiting tables, the merits of a high school diploma, and the mechanisms behind the Greynoise threat intelligence model. https://www.greynoise.io/

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Common Usernames Submitted to Honeypots https://isc.sans.edu/diary/Common%20usernames%20submitted%20to%20honeypots/30188 TPM LUKS Bypass https://pulsesecurity.co.nz/advisories/tpm-luks-bypass Cross Tenant Impersonation Prevention and Detection https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Common Usernames Submitted to Honeypots https://isc.sans.edu/diary/Common%20usernames%20submitted%20to%20honeypots/30188 TPM LUKS Bypass https://pulsesecurity.co.nz/advisories/tpm-luks-bypass Cross Tenant Impersonation Prevention and Detection https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

What is the Origin of Passwords Submitted to Honeypots https://isc.sans.edu/diary/What%20is%20the%20origin%20of%20passwords%20submitted%20to%20honeypots%3F/30182 Creating a YARA Rule to Detect Obfuscated Strings https://isc.sans.edu/diary/Creating%20a%20YARA%20Rule%20to%20Detect%20Obfuscated%20Strings/30186 VMware Aria Operations for Networks Hardcoded Keys 2023-34039 https://summoning.team/blog/vmware-vrealize-network-insight-rce-cve-2023-34039/ https://github.com/sinsinology/CVE-2023-34039/ Windows will Disable TLS 1.0/1.1 https://learn.microsoft.com/en-us/windows/release-health/windows-message-center

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

What is the Origin of Passwords Submitted to Honeypots https://isc.sans.edu/diary/What%20is%20the%20origin%20of%20passwords%20submitted%20to%20honeypots%3F/30182 Creating a YARA Rule to Detect Obfuscated Strings https://isc.sans.edu/diary/Creating%20a%20YARA%20Rule%20to%20Detect%20Obfuscated%20Strings/30186 VMware Aria Operations for Networks Hardcoded Keys 2023-34039 https://summoning.team/blog/vmware-vrealize-network-insight-rce-cve-2023-34039/ https://github.com/sinsinology/CVE-2023-34039/ Windows will Disable TLS 1.0/1.1 https://learn.microsoft.com/en-us/windows/release-health/windows-message-center

Hacker And The Fed
Demystifying Internet Honeypots and Getting into Cyber Security with Andrew Morris, Founder and CEO of GreyNoise

Hacker And The Fed

Play Episode Listen Later Aug 24, 2023 50:44


This week on Hacker And The Fed we have Andrew Morris, CEO and founder of GreyNoise on the show. GreyNoise is a cybersecurity company that collects and analyzes mass internet data to remove pointless security alerts, find compromised devices, or identify emerging threats. We talk internet honeypots, how to get into the cyber security industry and much more. Links from the episode: Andrew Morris, CEO & Founder of GreyNoise https://www.greynoise.io/ https://twitter.com/Andrew___Morris https://twitter.com/GreyNoiseIO   Support our sponsor: Go to JoinDeleteMe.com/FED code FED20 for 20% off all consumer plans   Get your Hacker and the Fed merchandise at hackerandthefed.com

The CyberWire
Mirai hits the honeypots. Medical device telemetry attacked. More on infostealers in the C2C market. Third-party risk management practices. Cyber skills gaps in the UK. SiegedSec hits NATO sites

The CyberWire

Play Episode Listen Later Jul 27, 2023 28:35


The Mirai botnet afflicts Tomcat. CardioComm services are downed by cyberattack. Uptycs calls infostealers “organization killers" as related security incidents double in a year. Legacy third-party risk management practices meet with dissatisfaction. Cyber skill gaps reported in the UK's workforce. Our guest is George Prichici of OPSWAT with a look at a Microsoft Teams vulnerability. Our new Threat Vector segment features a conversation with David Moulton and Michael Sikorski on the potential threats from LLMs and AI. And SiegedSec hits NATO sites. On this first segment of Threat Vector, Michael "Siko" Sikorski, CTO & VP of Engineering for Unit 42, joins host David Moulton to discuss LLMs & AI and the impacts to expect on social engineering, phishing, and more. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/142 Threat Vector links. Palo Alto Networks Unit 42 Selected reading. Tomcat Under Attack: Exploring Mirai Malware and Beyond (Aquasec) CardioComm, a provider of ECG monitoring devices, confirms cyberattack downed its services (TechCrunch)  Detecting the Silent Threat: 'Stealers are Organization Killers' (Uptycs) Cyber security skills in the UK labour market 2023 (DSIT) NATO investigates alleged data theft by SiegedSec hackers (BleepingComputer) NATO investigating apparent breach of unclassified information sharing platform (CyberScoop)  SiegedSec Compromise NATO (Cyberint)

Sara Carter Show
Honeypots, Hit Jobs & Spyware: The Worldwide Battle for Information

Sara Carter Show

Play Episode Listen Later Mar 27, 2023 64:59


Throughout Sara's career, she has relied on information from reliable human sources to break huge stories from the border to the Russia hoax. That information is powerful and people who don't want the truth to come to light will often do anything to keep it hidden. Today, Sara walks us through several of her experiences in the intelligence world and the different clandestine methods used to get and protect valuable informationSara also focuses on how your tax dollars are sent to the United Nations, which then gives them to non-governmental organizations, who actively recruit and guide huge numbers of migrants to the U.S. border. That's right. You are paying for the border crisis. She is also joined by former Guatemalan intelligence chief Mario Duarte to talk about this and how the Biden administration is driving much of Latin America away from us, because it focuses far more on ideology than on real world objectives.Please visit our great sponsors:Allegiance Goldhttps://protectwithsara.comClick or Call 877-702-7272 tell them Sara sent you and get $5,000 of free silver on a qualifying purchase. Donors Trusthttps://donorstrust.org/saraLet my friends at Donors Trust help minimize your tax liability while maximizing your giving. MyPillowhttps://mypillow.comSave over 85% on the All Season Slipper Closeout Sale going on now with code CARTER.

The CyberWire
Evolution of criminal scams (especially BEC). Law enforcement honeypots. ChatGPT data leak. Hybrid war updates.

The CyberWire

Play Episode Listen Later Mar 27, 2023 31:13


IcedID is evolving away from its banking malware roots. An Emotet phishing campaign spoofs IRS W9s. The FBI warns of BEC scams. A Fake booter service as a law enforcement honeypot. Phishing in China's nuclear energy sector. Reports of an OpenAI and a ChatGPT data leak. Does Iran receive Russian support in cyberattacks against Albania? My conversation with Linda Gray Martin and Britta Glade from RSAC with a preview of this year's conference. Our own Rick Howard takes a field trip to the National Cryptologic Museum. And De-anonymizing Telegram. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/58 Selected reading. Fork in the Ice: The New Era of IcedID (Proofpoint) Emotet malware distributed as fake W-9 tax forms from the IRS (BleepingComputer) Internet Crime Complaint Center (IC3) | Business Email Compromise Tactics Used to Facilitate the Acquisition of Commodities and Defrauding Vendors (IC3) Phishing Campaign Targets Chinese Nuclear Energy Industry (Intezer)  'Bitter' espionage hackers target Chinese nuclear energy orgs (BleepingComputer) UK Sets Up Fake DDoS-for-Hire Sites to Trap Hackers (PCMag Middle East) UK National Crime Agency reveals it ran fake DDoS-for-hire sites to collect users' data (Record) OpenAI: ChatGPT payment data leak caused by open-source bug (BleepingComputer) OpenAI says a bug leaked sensitive ChatGPT user data (Engadget) March 20 ChatGPT outage: Here's what happened (OpenAI) How Albania Became a Target for Cyberattacks (Foreign Policy)  Russia's Rostec allegedly can de-anonymize Telegram users (BleepingComputer)

Bankless
164 - The FBI Agent Who Took Down the Silk Road with Chris Tarbell

Bankless

Play Episode Listen Later Mar 27, 2023 95:46


Chris Tarbell is a former FBI Agent specializing in cyber investigations. While at the FBI, Chris led some of the most high-profile cybercrime investigations in the world, including the arrest of members of the hacker group LulzSec, as well as the founder of the Silk Road, Ross Ulbricht, which resulted in the largest seizure of bitcoins to date. ------ ✨ DEBRIEF | Unpacking the episode:  https://www.bankless.com/debrief-the-fbi-agent-who-took-down-the-silk-road    ------ ✨ COLLECTIBLES | Collect this episode:  https://collectibles.bankless.com/mint  ------ Rarely do we have the opportunity to pick the brain of a cybercop, but this was our opportunity to see through the eyes of the FBI agent who took down the Silk Road in the largest crypto seizure ever recorded. In today's episode, Chris shares the story of crypto, Ross Ulbricht, and the Silk Road as told by the FBI agent who took it down. We also dig into the eternal cat-and-mouse game between Cybercriminals and Cyberpolice, how to protect yourself from people who want to take your crypto, and if the FBI wants your private keys, how they get them.  ------