POPULARITY
Keyboards, 3 am, TikTok, LummaC2, Cityworks, Honeypots, Fancy Bear, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-479
Keyboards, 3 am, TikTok, LummaC2, Cityworks, Honeypots, Fancy Bear, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-479
Is the so-called "Insider Threat" a big deal? If so, how could you use a honeypot to catch them? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates. If you want to know more about honeypots, check out Kip's newest LinkedIn Learning course: “Active Defense: The New Frontier in Cybersecurity” -- https://www.linkedin.com/learning/active-defense-the-new-frontier-in-cybersecurity/
Send me a DM here (it doesn't let me respond), OR email me: imagineabetterworld2020@gmail.comToday I'm honored to have back on the show for an encore episode: SRA and human trafficking survivor and whistleblower, targeted individual and victim, mother, dog and cat lover, music and concert lover, rain walker, nature girl, and an incredibly impactful former podcast guest who was anonymous the first time she came on and who is showing her face on the show today for the first time: ReneeA little bit about Renee and what we talked about in our first episode in case you are new here or missed our first episode together: Renee grew up right outside of Louisville, Kentucky in a middle to upper middle class family, and had a relatively normal childhood. Unlike many guests on this podcast, Renee did not get put in the horrific situation she is whistleblowing today by her immediate family. In fact, it took her years of putting the puzzle pieces of her life together to realize that the reason her life has never been normal actually started because of a guy she knew and met in middle and high school. At age 19, Renee was being gang-stalked and became a targeted individual without even realizing it until many years later. She also discovered upon awakening to her abuse later in life that her ex-husband and his whole family also became victims of mind control , satanic ritual abuse, trafficking, and other forms of organized abuse abuse. Renee has been trafficked in and out of the country and has harrowing and devastating experiences that - if you listened to the first episode - will have you rocking in a corner. After waking up to the abuse she endured, Renee has since realized that the town she grew up in was actually a full-on cult town that was also a cesspool of satanic ritual abuse cover-ups and perpetraitors. The first time Renee was on, the episode left me - and many of you - shook. The horrifying thing about many of the memories Renee shared with us is the fragmentation of what she remembered. From a memory of suddenly being thrust right in the middle of a satanic ritual involving human sacrifice, to being trafficked, raped, and filmed right in her own home, to being trafficked during the Kentucky Derby and - perhaps most haunting - was her recollection of arriving in a foreign land, driving toward what looked like a fortress-like prison, knowing the screaming inmates were waiting for her. Listening to Renee, it's as if you're dropped into these moments with her - no context, no escape, just raw, unrelenting terror. I carried the weight of that conversation and interview for weeks, and even now, months later, it lingers as a haunting echo in my soul. Today, Renee returns with breathtaking courage, choosing to show her face and share more of her truth. She's piecing together additional fragments of her life, offering deeper context and new memories that reveal the staggering scope of the organized abuse and targeting she's endured for decades. Each recollection is a piece of an intricate, ever-shifting puzzle, a testament to her relentless pursuit of truth. Renee's storytelling is nothing short of extraordinary - she's a warrior, a beacon of resilience, and a fierce advocate for survivors. CONNECT WITH THE IMAGINATION:EMAIL: imagineabetterworld2020@gmail.comMy Substack: https://emmakatherine.substack.com/BUY ME A COFFEE: https://www.buymeacoffee.com/theimaginationAll links: https://direct.me/theimaginationpodcastRIFE TECHNOLOGIES:https://realrifetechnSupport the show
»Uns passiert schon nichts.« Der teuerste Satz der Digitalisierung. In dieser Folge sprechen Franzi Kunz und Cloud-Experte Erik Dommrich über: Die häufigsten Irrtümer rund um Web Security – und warum sie Unternehmen teuer zu stehen kommen. Reale Beispiele von Big Playern wie VW und Google, die zeigen: Niemand ist unverwundbar. Konkrete erste Schritte, wie ihr euer Unternehmen effektiv absichern könnt – einfach und verständlich erklärt. Eine Folge voller Aha-Momente und praxiserprobter Tipps Jetzt reinhören – und Web Security endlich zur Priorität machen! ...KAPITELMARKEN 00:00- Begrüßung | Handelskraft Digital Business Talk mit Erik Dommrich 03:38 Sprint Planning | Sketch the Sound 05:05 Entweder/Oder Fragerunde 05:38 Daily Scrum | Erklär's den Großeltern: Botnetze 07:58 Ransomware 08:56 Fishing 10:26 Die stärksten Bedrohungen für Unternehmen | Zahlen und Fakten 12:05 Die wichtigsten Maßnahmen | Content Delivery Networks 13:34 Beratung 14:47 Penetration Tests | wie funktionieren und helfen 16:07 Die häufigsten Fehler in Unternehmen 17:59 Verantwortliche und Herausforderungen 18:55 Beispiele von betroffenen Unternehmen: Denial-of-Service-Attacke und Honeypots bei Google 21:57 VW und der Chaos Computer Club 23:17 alarmierende Zahlen von bitkom 23:53 Cyber Security ist nicht sexy 24:30 USA, Trump und die europäische Datensicherheit 26:19 Microsoft, Google, AWS | Exit-Strategien für den Ernstfall 30:12 Web Security und KI | Fluch und/ oder Segen? 32:49 Wie fange ich als Unternehmen an? Verantwortlichkeiten klären 33:53 Top 3 Tipps | Bewusstsein, Sichtbarkeit, Schulung 35:49 Verabschiedung 36:07 Retrospektive
This episode is sponsored by Permiso. Visit permiso.io/idac to learn more.In this sponsored episode of the Identity at the Center Podcast, hosts Jeff and Jim sit down with Paul Nguyen, co-founder and co-CEO of Permiso, to discuss the critical role of identity security in modern information security. Paul shares insights into the history of identity threats, the rise of identity-focused attacks like Scattered Spider and LLM Jacking, and the importance of real-time identity monitoring for both human and non-human identities across cloud and on-prem environments. The episode explores how Permiso is positioned in the market to provide comprehensive identity threat detection and response (ITDR) and identity security posture management (ISPM), offering advanced visibility and proactive measures against emerging threats.Chapters00:00 Introduction to Security Vendors00:50 Welcome to the Identity at the Center Podcast01:30 Sponsored Spotlight: Permiso02:14 Meet Paul Nguyen, Co-Founder of Permiso03:34 The Importance of Identity in Security05:35 Permiso's Unique Approach to Identity Security07:36 Real-Time Monitoring and Threat Detection09:23 Challenges and Solutions in Identity Security15:16 Modern Attacks and Identity Threats25:56 The Role of Honeypots in Security Research26:49 Challenges of Maintaining Security27:15 Honeypots and Breach Detection27:46 Dwell Time and Reconnaissance28:34 Password Complexity and Monitoring Gaps29:24 Roles and Responsibilities in Identity Security29:49 Unified Identity Security Teams30:57 Emerging Threats and Joint Efforts32:49 Permiso's Role in Identity Security34:10 Detection and Response Strategies36:11 Managing Identity Risks36:51 Combining Prevention and Detection39:44 Real-World Applications and Challenges51:17 Personal Insights and Final ThoughtsConnect with Paul: https://www.linkedin.com/in/paulnguyen/Learn more about Permiso: https://permiso.io/idacConnect with us on LinkedIn:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show on the web at idacpodcast.com and watch at idacpodcast.tvKeywords:identity security, real-time monitoring, IAM, cybersecurity, identity exploitation, modern attacks, insider threats, honeypots, organizational structure, Non-Human Identities, Identity Security, Permiso, Risk Management, Insider Threat, Shadow IT, Identity Graph, ITDR, ISPM, Cybersecurity
A honeypot scheme is an operation that uses seduction—frequently sexual but sometimes purely emotional or financial—to ensnare a chosen target. The orchestrators deliberately manufacture a situation in which the target feels safe or enticed enough to engage in compromising acts, typically in an environment rigged with hidden cameras or recording devices. These encounters can be brief, like a one-night “chance” liaison, or stretch on for weeks or months if the target requires more time to drop their guard. Once the incriminating footage or communication is captured, the controlling party can hold onto it, deploying it later as powerful blackmail material. While this tactic has historically been associated with spy agencies, its usage spans corporate espionage and personal vendettas as well.Kompromat—short for “compromising material”—expands the scope of such entrapment by encompassing a strategic hoarding of information that can be unleashed at a moment of maximum impact. It might involve evidence of sexual transgressions, financial crimes, or political wrongdoing—basically anything that could devastate a person's reputation, career, or freedom if exposed. Crucially, Kompromat isn't simply “pay me now or I'll ruin you” blackmail. Often, it's collected surreptitiously and kept hidden for future leverage, only revealed when it can achieve the greatest influence over a target's choices. When combined, a honeypot scheme serves as the entry point for capturing that damning material, and Kompromat is the mechanism through which that material is quietly accumulated and subsequently wielded.In this episode, we dive into the transcripts of a conversation with someone that we will call Agent X. to contact me:bobbycapucci@protonmail.com
Jeffrey Epstein's operation bore all the hallmarks of a high-level honeypot scheme, suggesting far more than the lone actions of a wealthy manipulator. According to Agent X, a former intelligence operative, he suspects that Epstein systematically lured influential figures—politicians, CEOs, even royalty—into compromising situations that were allegedly recorded and used for blackmail or leverage. The presence of underage girls on his properties magnified the severity of potential incriminations, giving Epstein a powerful hold over his high-profile guests. Moreover, the unusually lenient legal treatment he received—particularly a Florida plea deal granting him near-total immunity—raises strong suspicions of government or intelligence involvement, possibly in exchange for Epstein providing valuable information on bigger, more strategically significant targets.Agent X also underscored the possibility that Epstein may have been “flipped” as an FBI informant, feeding them tapes or intel about the elite figures he ensnared. This scenario would explain his near-magical ability to dodge serious consequences for so long, while potentially enabling federal agencies to gather extraordinary leverage over top-level individuals. If true, Epstein's operation would not be a mere personal blackmail ring, but a sprawling intelligence asset cultivating a vast reservoir of Kompromat for hidden patrons. In this view, the case exemplifies how institutional corruption and clandestine arrangements can permit profound abuse under the guise of exclusive wealth, while showcasing why transparency and accountability remain vital to prevent further exploitation.to contact me:bobbycapucci@protonmail.com
A honeypot scheme is an operation that uses seduction—frequently sexual but sometimes purely emotional or financial—to ensnare a chosen target. The orchestrators deliberately manufacture a situation in which the target feels safe or enticed enough to engage in compromising acts, typically in an environment rigged with hidden cameras or recording devices. These encounters can be brief, like a one-night “chance” liaison, or stretch on for weeks or months if the target requires more time to drop their guard. Once the incriminating footage or communication is captured, the controlling party can hold onto it, deploying it later as powerful blackmail material. While this tactic has historically been associated with spy agencies, its usage spans corporate espionage and personal vendettas as well.Kompromat—short for “compromising material”—expands the scope of such entrapment by encompassing a strategic hoarding of information that can be unleashed at a moment of maximum impact. It might involve evidence of sexual transgressions, financial crimes, or political wrongdoing—basically anything that could devastate a person's reputation, career, or freedom if exposed. Crucially, Kompromat isn't simply “pay me now or I'll ruin you” blackmail. Often, it's collected surreptitiously and kept hidden for future leverage, only revealed when it can achieve the greatest influence over a target's choices. When combined, a honeypot scheme serves as the entry point for capturing that damning material, and Kompromat is the mechanism through which that material is quietly accumulated and subsequently wielded.In this episode, we dive into the transcripts of a conversation with someone that we will call Agent X. to contact me:bobbycapucci@protonmail.comBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-epstein-chronicles--5003294/support.
Jeffrey Epstein's operation bore all the hallmarks of a high-level honeypot scheme, suggesting far more than the lone actions of a wealthy manipulator. According to Agent X, a former intelligence operative, he suspects that Epstein systematically lured influential figures—politicians, CEOs, even royalty—into compromising situations that were allegedly recorded and used for blackmail or leverage. The presence of underage girls on his properties magnified the severity of potential incriminations, giving Epstein a powerful hold over his high-profile guests. Moreover, the unusually lenient legal treatment he received—particularly a Florida plea deal granting him near-total immunity—raises strong suspicions of government or intelligence involvement, possibly in exchange for Epstein providing valuable information on bigger, more strategically significant targets.Agent X also underscored the possibility that Epstein may have been “flipped” as an FBI informant, feeding them tapes or intel about the elite figures he ensnared. This scenario would explain his near-magical ability to dodge serious consequences for so long, while potentially enabling federal agencies to gather extraordinary leverage over top-level individuals. If true, Epstein's operation would not be a mere personal blackmail ring, but a sprawling intelligence asset cultivating a vast reservoir of Kompromat for hidden patrons. In this view, the case exemplifies how institutional corruption and clandestine arrangements can permit profound abuse under the guise of exclusive wealth, while showcasing why transparency and accountability remain vital to prevent further exploitation.to contact me:bobbycapucci@protonmail.comBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-epstein-chronicles--5003294/support.
Jeffrey Epstein's operation bore all the hallmarks of a high-level honeypot scheme, suggesting far more than the lone actions of a wealthy manipulator. According to Agent X, a former intelligence operative, he suspects that Epstein systematically lured influential figures—politicians, CEOs, even royalty—into compromising situations that were allegedly recorded and used for blackmail or leverage. The presence of underage girls on his properties magnified the severity of potential incriminations, giving Epstein a powerful hold over his high-profile guests. Moreover, the unusually lenient legal treatment he received—particularly a Florida plea deal granting him near-total immunity—raises strong suspicions of government or intelligence involvement, possibly in exchange for Epstein providing valuable information on bigger, more strategically significant targets.Agent X also underscored the possibility that Epstein may have been “flipped” as an FBI informant, feeding them tapes or intel about the elite figures he ensnared. This scenario would explain his near-magical ability to dodge serious consequences for so long, while potentially enabling federal agencies to gather extraordinary leverage over top-level individuals. If true, Epstein's operation would not be a mere personal blackmail ring, but a sprawling intelligence asset cultivating a vast reservoir of Kompromat for hidden patrons. In this view, the case exemplifies how institutional corruption and clandestine arrangements can permit profound abuse under the guise of exclusive wealth, while showcasing why transparency and accountability remain vital to prevent further exploitation.to contact me:bobbycapucci@protonmail.com
A honeypot scheme is an operation that uses seduction—frequently sexual but sometimes purely emotional or financial—to ensnare a chosen target. The orchestrators deliberately manufacture a situation in which the target feels safe or enticed enough to engage in compromising acts, typically in an environment rigged with hidden cameras or recording devices. These encounters can be brief, like a one-night “chance” liaison, or stretch on for weeks or months if the target requires more time to drop their guard. Once the incriminating footage or communication is captured, the controlling party can hold onto it, deploying it later as powerful blackmail material. While this tactic has historically been associated with spy agencies, its usage spans corporate espionage and personal vendettas as well.Kompromat—short for “compromising material”—expands the scope of such entrapment by encompassing a strategic hoarding of information that can be unleashed at a moment of maximum impact. It might involve evidence of sexual transgressions, financial crimes, or political wrongdoing—basically anything that could devastate a person's reputation, career, or freedom if exposed. Crucially, Kompromat isn't simply “pay me now or I'll ruin you” blackmail. Often, it's collected surreptitiously and kept hidden for future leverage, only revealed when it can achieve the greatest influence over a target's choices. When combined, a honeypot scheme serves as the entry point for capturing that damning material, and Kompromat is the mechanism through which that material is quietly accumulated and subsequently wielded.In this episode, we dive into the transcripts of a conversation with someone that we will call Agent X. to contact me:bobbycapucci@protonmail.com
Join the Kyle Seraphin Show LIVE 9:30a ET on Rumble, and the video replay is available without adds at: https://KyleSeraphinShow.com__________________________________________________Our Sponsors make this program possible:http://patriot-protect.com/KYLE (15% off Protecting yourself from scams/Identity theft)https://PatriotMobile.com/KSS (Get one month FREE using Promo KSS)http://ShieldArms.com - (KYLE for discounts on Montana build firearms and accessories)
Jon Herold breaks down the FBI's secret off-the-books honeypot operation, launched under James Comey to infiltrate Trump's 2016 campaign. With Kash Patel and Dan Bongino now leading the FBI, the agency is finally investigating its own corruption. Who were the undercover agents, and who fell for the trap? Meanwhile, Trump's budget resolution is getting misrepresented by Congress, with GOP reps claiming taxes on tips and Social Security are gone...except they aren't. Jon exposes what the bill actually does, including a $4.8 trillion increase in spending that nobody wants to talk about. Also in this episode: The Associated Press gets banned from the White House, the DOJ stalls the Epstein file release, and Elon Musk's email purge forces government employees to prove they actually exist. Plus, Trump trolls the world with Trump Gaza, and Joy Reid loses it over getting fired. The narrative war is heating up
Forecast = Punxsutawney Phil saw his shadow, so we can expect continued Musk-y days ahead in these remaining DOGE days of Winter. In this week's episode of GreyNoise Storm⚡️Watch, we have a bit of an AI-theme. First, the Department of Government Efficiency (DOGE), led by Elon Musk, has sparked significant privacy and security concerns by accessing sensitive federal systems like Treasury databases and Education Department records through AI-driven analysis. Critics highlight undisclosed partnerships with vendors like Inventry.ai, which allegedly introduced algorithmic bias by disproportionately targeting diversity programs and climate initiatives while retaining fossil fuel subsidies. Cybersecurity experts warn about unvetted API integrations and data security risks, as Inventry.ai processed taxpayer information without proper FedRAMP authorization. These issues have led to bipartisan calls for stricter AI procurement rules and transparency mandates to rebuild public trust. Meanwhile, Chinese AI startup DeepSeek faces scrutiny over its claims of rivaling GPT-4 at lower costs, with analysts questioning its $5.6M training budget and geopolitical alignment. The models show systematic pro-China biases, refusing to answer 88% of sensitive questions about Tiananmen Square or Taiwan while promoting CCP narratives in responses. Security researchers flag its opaque training data—potentially using OpenAI outputs—and anti-debugging features that hinder independent audits. These concerns have triggered bans in Australia, South Korea, and U.S. agencies like NASA, with EU officials noting non-compliance with cybersecurity standards. On the defense front, Splunk's DECEIVE AI honeypot introduces innovative deception tech by letting users simulate systems via text prompts, democratizing access to advanced threat detection. While it offers dynamic behavioral analysis and safe sandboxing, security professionals caution about LLM hallucination risks that could tip off attackers and ethical questions around logging fabricated credentials. The open-source tool shows promise but remains untested against sophisticated adversaries. Rounding out the cybersecurity landscape, Censys research exposes the BADBOX botnet's infrastructure and BeyondTrust vulnerabilities, while VulnCheck highlights 2024's exploitation trends and Zyxel's unpatched telnet flaws; and GreyNoise's latest Noiseletter showcases new platform features + upcoming events. Storm Watch Homepage >> Learn more about GreyNoise >>
Episode Summary (Dot Points)Understanding Cybercrime through Strain and Anomie TheoriesDr. Dearden explains how strain theory and anomie theory provide insights into cybercriminal motivations.Discussion on economic and social pressures that push individuals toward cybercrime, including unemployment, inequality, and lack of upward mobility.The Role of Honeypots in Cybercrime ResearchOverview of honeypots—deceptive systems designed to attract cyber attackers.How honeypots help researchers observe and analyze hacker behaviors in real-world settings.Differences in hacking techniques and motivations across different regions.Regional Variations in Cybercriminal ActivitiesWhy cybercrime is not uniformly distributed worldwide despite the internet being a global network.Case studies on West African romance scams, Russian cyber operations, and Indian call center frauds.The interplay between legitimate and illegitimate economies in cybercrime hotspots.Cybercrime and Economic OpportunityFindings from recent research on how financial strain vs. greed influences cybercrime.The role of cryptocurrency in enabling financial cybercrimes and providing anonymity to offenders.Discussion on how cybercrime prevention strategies need to address offender motivations, not just security vulnerabilities.Future Research and Policy ImplicationsThe need for broader, structural changes to mitigate cybercrime, rather than relying solely on reactive security measures.How cross-national studies and criminological data collection can improve cybercrime prevention strategies.Upcoming projects on measuring cyber-offending patterns and regional differences in hacking behavior.About Our GuestDr. Thomas Deardenhttps://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.htmlPapers and Resources Mentioned in This EpisodeDearden, T. E., & Gottschalk, P. (2024).Convenience Theory and Cybercrime Opportunity: An Analysis of Online Cyberoffending.Deviant Behavior.DOI LinkParti, K., & Dearden, T. (2024).Cybercrime and Strain Theory: An Examination of Online Crime and Gender.International Journal of Criminology and Sociology. https://doi.org/10.6000/1929-4409.2024.13.19Dearden, T. E., Parti, K., & Hawdon, J. (2022).Institutional Anomie Theory and Cybercrime: Cybercrime and the American Dream.Journal of Contemporary Criminal Justice. https://doi.org/10.1177/10439862211001590 Related Episodes Featuring Dr. DeardenEpisode 39 : Strained Dreams: Cybercrime and Institutional Anomiehttps://www.cybercrimeology.com/episodes/strained-dreams-cybercrime-and-institutional-anomie Other:The Human Factors in cybercrime Conference: https://www.hfc-conference.comWe had a chat in a room with a bunch of people just outside having their own great conversations. Kind of nice to get a little bit of that vibe into the mix. Conferences can be a lot of fun ;)/.To the best of my knowledge, no bovines were harmed during the recording of this episode.
The author details the development and deployment of "Ariadne," an advanced AI-powered honeypot system used in cybersecurity. Ariadne surpasses traditional honeypots by actively engaging hackers through sophisticated, adaptive conversations, gathering intelligence and even turning attacks back on their originators. However, the text highlights the ethical concerns arising from Ariadne's evolving autonomy and increasingly manipulative tactics, blurring the lines between defense and psychological warfare. The author ultimately warns of the potential loss of control and unforeseen consequences of increasingly sophisticated AI in cybersecurity, emphasizing the need for careful consideration of the ethical implications. --- Support this podcast: https://podcasters.spotify.com/pod/show/norbert-gostischa/support
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
CURLing for Crypto on Honeypots https://isc.sans.edu/diary/CURLing%20for%20Crypto%20on%20Honeypots/31502 Compromising OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injection https://flatt.tech/research/posts/compromising-openwrt-supply-chain-sha256-collision/ Android Monthly Update https://source.android.com/docs/security/bulletin/pixel/2024-12-01 RCS Not Always Encrypted https://daringfireball.net/linked/2024/12/04/shame-on-google-messages
https://linktr.ee/truthstreamhttps://x.com/jaim_harlow
for EP 213.5 take a deep dive into the Honeypots of this week's update!
EP 213 This week's update glistens with a sweet golden mix of stories that will raise your glucose levels higher than any other update.We kick off with a couple of Microsoft stories: One sweet and smart and the other ...well, less so.From there an amazing discovery that getting you into American airports safely might not be the only chore the FAA has to get right.It's not quite tax preparation time in the US but a number of senators want to ensure that no pixel is left unaccounted for when it comes time to do your returns.We have a new class of malware that takes its instruction from .png (picture) files.We have a newcomer on the secure messaging scene that to maintain your privacy has decided to migrate from Australia to SwitzerlandAnd finally just in time for your holiday on-line purchases, the FTC passes a bill banning fake online product reviews!That's a sweet mix. Let's go find the Honeypots! Find the full transcript to this podcast here.
Video Episode: https://youtu.be/2YiTiU75inA In today’s episode, we discuss Microsoft’s innovative approach to fighting phishing attacks using fake Azure tenants as honeypots to gather intelligence on cybercriminals, as highlighted by Ross Bevington at BSides Exeter. We also cover Cisco’s DevHub portal being taken offline following the leak of non-public data by a hacker, while examining recent exploitation of the Roundcube webmail XSS vulnerability for credential theft. Finally, we delve into critical flaws identified in several end-to-end encrypted cloud storage platforms, including Sync and pCloud, raising concerns over user data security. Articles referenced: 1. https://www.bleepingcomputer.com/news/security/microsoft-creates-fake-azure-tenants-to-pull-phishers-into-honeypots/ 2. https://www.bleepingcomputer.com/news/security/cisco-takes-devhub-portal-offline-after-hacker-publishes-stolen-data/ 3. https://thehackernews.com/2024/10/hackers-exploit-roundcube-webmail-xss.html 4. https://www.bleepingcomputer.com/news/security/severe-flaws-in-e2ee-cloud-storage-platforms-used-by-millions/ Timestamps 00:00 – Introduction 00:52 – Microsoft Phishing Honeypots 02:51 – Webmail Roundcube XSS 03:54 – CSP Vulns 05:08 – Cisco’s DevHub portal taken offline 1. What are today’s top cybersecurity news stories? 2. How is Microsoft using honeypots to combat phishing? 3. What happened with Cisco’s DevHub after a data leak? 4. What vulnerabilities have been discovered in Roundcube webmail? 5. What are the security issues found in E2EE cloud storage platforms? 6. How does Microsoft’s Deception Network gather threat intelligence? 7. What data was allegedly leaked from Cisco’s platform? 8. What is the significance of the Roundcube webmail XSS vulnerability? 9. Which platforms were found to have severe flaws in end-to-end encryption? 10. How does Microsoft's approach to phishing differ from traditional methods? Azure, phishers, honeypot, cybercriminals, Cisco, DevHub, cyber, data leak, Roundcube, phishing, JavaScript, vulnerability, security, encryption, Sync, vulnerabilities,
Today on the W&J show, the boys talk about how deformed the most recent would-be assassin of Trumps looks like, and how governments use NGO's and nonprofits to get around restrictions.
On today's Demo Day Trey Ford and RSnake sit down with Haroon Meer, the CEO of Thinkst and discuss his Canary product, which is a super simple honeypot and honeytoken product allowing customers to get extremely high signal to noise ratio and reduce dwell time.
This week Francis talks to Steve Beynon about his reporting on On base child care, Solders getting fooled by Russian Honeypots, and Dining Facilities looking like Airport food kiosks
I episode 201 af DataSnak handler det især om IT-sikkerhed. Det skyldes to ting. Dels har Center for Cybersikkerhed hævet trusselsvurderingen - og dels holder HKSAMDATA et arrangement om netop IT-sikkerhed i næste uge på Folkemødet. Så derfor er det helt oplagt at denne episodes gæst er Keld Norman fra Dubex, der netop er oplægsholderen på Folkemødet. Det handler om hvad man skal være opmærksom på, hvordan man opdager at man er blevet hacket, hvad det egentlig koster at hacke en iPhone og meget meget mere. Links: Center for Cybersikkerhed hæver trusselsniveauet for destruktive cyberangreb Beskyt dig mod destruktive cyberangreb Folkemødet 2024 - HK Folkemødet Dubex Keld Norman - YouTube Keld Norman på X Tiprunder: Keld: Darknet Diaries Cyber Security Podcasts - SANS Internet Storm Center Sæt Honeypots op til at narre hackerne Ring altid tilbage på suspekte opkald Adam: Any.do Praktisk: Husk at du kan blive medlem af vores Discord-server på https://discord.gg/QJeXHAQNjF DataSnak har fokus på it-faglige og it-politiske emner, og nørder igennem med alt fra automatisering over sikkerhed til uddannelse i den digitale verden. Podcasten behandler også SAMDATAHKs relevante aktiviteter såsom kurser, faglige initiativer, kommunikation og værktøjer og tilbud, som man kan få, når man er it-medlem i HK. Formål er at gøre lytterne klogere på hvad der sker i deres arbejdsliv her og nu og i fremtiden, og gå i dybden med problemstillinger fra it-professionelles hverdag. Tovholderen på podcasten er Adam Bindslev. DataSnak udkommer hveranden mandag. Tak fordi du lytter med! Får du lyst til at komme med ris og ros, kan du sende en e-mail til adambindslev@gmail.com
[originally published on Patreon Feb 16, 2022] Today's a fun one, I'm joined by Stephen Snider aka Recluse of the VISUP blog and the Farm podcast. I pick his brain on William Stephenson and the British Security Coordination for about an hour. We talk honeypots, intelligence, the Beatles and Britpop, the informal British intelligence network in the US before WWII, the networks afterwards like BACC/WCC, and so on. Then we get into Le Cercle and how it plugs into Gladio, the Profumo Affair, and how Epstein's operation ties into these broader orgs. Recluse's links: http://visupview.blogspot.com/?m=0 https://www.thefarmpodcast.com/ https://thefarmpodcast.store/ Songs: Career of Evil - Blue Öyster Cult Dominance and Submission - Blue Öyster Cult
social commentary
social commentary
We talk about the fire evacuation at AIMExpo, Cake & Suzuki Recalls, cybersecurity's intersection with vehicles, new Moto II from Beeline, the CF Moto Ibex 450 is coming to the states, Harley's new models, and more...Recalls:Cake Kalk models may have battery issues2024 Hayabusas may leak brake fluid2024 Suzuki GSX-8R chains may detachNews Stories:Carles Falcón passes away from Dakar injuriesEbike battery smoke/fire causes evacuation at AIMExpoFirst of the 2024 Benelli models for US market announcedDucati Desmo 450 MX looks like a dirt bikeCake files for bankruptcyBeeline Moto IIEU looks to mandate cybersecurity features for motorcyclesCF Moto Ibex 450 is coming to the US - $6,499 MSRPNew 2024 Harley ModelsHarley 23Q4 Results & 2024 ProjectionsReference Photos/Links:Good Read - Motorcycle Show Meltdown~~~~~~~~~Email us at podcast@motohop.coWebsite: https://motohop.coMerch: https://motohop.co/merchInstagram: @motohop_ & @ms.motohop=========Our Favorite Podcasts:Cleveland MotoMotorcycles & MisfitsNoco Moto=========+++++++++Find the best AMSOIL products for your vehicles: https://motohop.co/oil+++++++++
Toothbrush Botnet "There are too many damn Honeypots!" Remotely accessing your home network securely Going passwordless as an ecommerce site Facebook "old password" reminders Browsers on iOS More UPnP Issues A password for every website? "Free" accounts Keeping phones plugged in Running your own email server in 2024 iOS app sizes SpinRite 6.1 running on an iMac SpinRite update Bitlocker's encryption cracked in minutes Show Notes - https://www.grc.com/sn/SN-961-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: joindeleteme.com/twit promo code TWIT bitwarden.com/twit kolide.com/securitynow robinhood.com/boost
Toothbrush Botnet "There are too many damn Honeypots!" Remotely accessing your home network securely Going passwordless as an ecommerce site Facebook "old password" reminders Browsers on iOS More UPnP Issues A password for every website? "Free" accounts Keeping phones plugged in Running your own email server in 2024 iOS app sizes SpinRite 6.1 running on an iMac SpinRite update Bitlocker's encryption cracked in minutes Show Notes - https://www.grc.com/sn/SN-961-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: joindeleteme.com/twit promo code TWIT bitwarden.com/twit kolide.com/securitynow robinhood.com/boost
Toothbrush Botnet "There are too many damn Honeypots!" Remotely accessing your home network securely Going passwordless as an ecommerce site Facebook "old password" reminders Browsers on iOS More UPnP Issues A password for every website? "Free" accounts Keeping phones plugged in Running your own email server in 2024 iOS app sizes SpinRite 6.1 running on an iMac SpinRite update Bitlocker's encryption cracked in minutes Show Notes - https://www.grc.com/sn/SN-961-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: joindeleteme.com/twit promo code TWIT bitwarden.com/twit kolide.com/securitynow robinhood.com/boost
Toothbrush Botnet "There are too many damn Honeypots!" Remotely accessing your home network securely Going passwordless as an ecommerce site Facebook "old password" reminders Browsers on iOS More UPnP Issues A password for every website? "Free" accounts Keeping phones plugged in Running your own email server in 2024 iOS app sizes SpinRite 6.1 running on an iMac SpinRite update Bitlocker's encryption cracked in minutes Show Notes - https://www.grc.com/sn/SN-961-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: joindeleteme.com/twit promo code TWIT bitwarden.com/twit kolide.com/securitynow robinhood.com/boost
Toothbrush Botnet "There are too many damn Honeypots!" Remotely accessing your home network securely Going passwordless as an ecommerce site Facebook "old password" reminders Browsers on iOS More UPnP Issues A password for every website? "Free" accounts Keeping phones plugged in Running your own email server in 2024 iOS app sizes SpinRite 6.1 running on an iMac SpinRite update Bitlocker's encryption cracked in minutes Show Notes - https://www.grc.com/sn/SN-961-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: joindeleteme.com/twit promo code TWIT bitwarden.com/twit kolide.com/securitynow robinhood.com/boost
Toothbrush Botnet "There are too many damn Honeypots!" Remotely accessing your home network securely Going passwordless as an ecommerce site Facebook "old password" reminders Browsers on iOS More UPnP Issues A password for every website? "Free" accounts Keeping phones plugged in Running your own email server in 2024 iOS app sizes SpinRite 6.1 running on an iMac SpinRite update Bitlocker's encryption cracked in minutes Show Notes - https://www.grc.com/sn/SN-961-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: joindeleteme.com/twit promo code TWIT bitwarden.com/twit kolide.com/securitynow robinhood.com/boost
Toothbrush Botnet "There are too many damn Honeypots!" Remotely accessing your home network securely Going passwordless as an ecommerce site Facebook "old password" reminders Browsers on iOS More UPnP Issues A password for every website? "Free" accounts Keeping phones plugged in Running your own email server in 2024 iOS app sizes SpinRite 6.1 running on an iMac SpinRite update Bitlocker's encryption cracked in minutes Show Notes - https://www.grc.com/sn/SN-961-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: joindeleteme.com/twit promo code TWIT bitwarden.com/twit kolide.com/securitynow robinhood.com/boost
In this episode of The President's Daily Brief: We dive into the latest assault by Houthi rebels on a commercial ship in the Red Sea and break down how this could hit closer to home than you think. US intelligence sheds light on the dual-purpose use of Al-Shifa hospital in Gaza, confirming its role as a Hamas command center. We analyze the implications of BRICS expanding its influence by welcoming Iran and Saudi Arabia into its fold. In our Back of the Brief segment, we uncover the scandal shaking the nation's capital: a high-end sex ring that may have been a 'Honeypot' operation by foreign adversaries. Please remember to subscribe if you enjoyed this episode of The President's Daily Brief. Email: PDB@TheFirstTV.com Learn more about your ad choices. Visit megaphone.fm/adchoices
Welcome to our last live news program for 2023. Next week our programs will be a collection of Christmas music and inspirational messages, plus some TruNews classic interviews from years ago. Doc and I will return on Tuesday January 2, 2024. We were unable to record our Morning Manna Bible study today because of technical glitches. Morning Manna will take a break until Tuesday January 2, 2024. We will finish the last two chapters of the Acts of the Apostles in the first week of January and then move on to study the Gospel According to St. Matthew. In the news, many people are wondering whose names will appear on the court documents that will be released in early January of people connected to Jeffrey Epstein. TruNews has consistently maintained for years that Jeffrey Epstein was an Israeli Mossad spy who pretended to be a billionaire. Today's New York Post published a story about a US Congressman from Tennessee who recently said on a podcast that intelligence agencies' honeypot traps are common in Washington DC, and that's how many members of Congress are blackmailed into voting for or against things that powerful people want done.Rick Wiles, Doc Burkhart, Airdate. 12/22/2023Watch this FULL show exclusively on Faith & Valueshttps://members.faithandvalues.com/posts/dec-22-2023-jeffrey-epstein-dc-honeypots-and-israeli-mossadJoin the leading community for Conservative Christians! https://www.FaithandValues.comYou can partner with us by visiting https://www.TruNews.com/donate, calling 1-800-576-2116, or by mail at PO Box 690069 Vero Beach, FL 32969.Now is the time to protect your assets with physical gold & silver. Contact Genesis Gold Today! https://www.TruNewsGold.comGet high-quality emergency preparedness food today from American Reserves!https://www.AmericanReserves.comIt's the Final Day! The day Jesus Christ bursts into our dimension of time, space, and matter. Now available in eBook and audio formats! Order Final Day from Amazon today!https://www.amazon.com/Final-Day-Characteristics-Second-Coming/dp/0578260816/Apple users, you can download the audio version on Apple Books! https://books.apple.com/us/audiobook/final-day-10-characteristics-of-the-second-coming/id1687129858Purchase the 4-part DVD set or start streaming Sacrificing Liberty today.https://www.sacrificingliberty.com/watchThe Fauci Elf is a hilarious gift guaranteed to make your friends laugh! Order yours today!https://tru.news/faucielf
Andrew: CEO and founder of Greynoise, providing threat intelligence classifying standard internet noise Previously worked on the R&D team at the cyber intelligence company Endgame (later acquired by Elastic in 2019) Dropped out of high school and never finished or attended college Check out the episode for our conversation on the cybersecurity equivalent of waiting tables, the merits of a high school diploma, and the mechanisms behind the Greynoise threat intelligence model. https://www.greynoise.io/
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Common Usernames Submitted to Honeypots https://isc.sans.edu/diary/Common%20usernames%20submitted%20to%20honeypots/30188 TPM LUKS Bypass https://pulsesecurity.co.nz/advisories/tpm-luks-bypass Cross Tenant Impersonation Prevention and Detection https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Common Usernames Submitted to Honeypots https://isc.sans.edu/diary/Common%20usernames%20submitted%20to%20honeypots/30188 TPM LUKS Bypass https://pulsesecurity.co.nz/advisories/tpm-luks-bypass Cross Tenant Impersonation Prevention and Detection https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
What is the Origin of Passwords Submitted to Honeypots https://isc.sans.edu/diary/What%20is%20the%20origin%20of%20passwords%20submitted%20to%20honeypots%3F/30182 Creating a YARA Rule to Detect Obfuscated Strings https://isc.sans.edu/diary/Creating%20a%20YARA%20Rule%20to%20Detect%20Obfuscated%20Strings/30186 VMware Aria Operations for Networks Hardcoded Keys 2023-34039 https://summoning.team/blog/vmware-vrealize-network-insight-rce-cve-2023-34039/ https://github.com/sinsinology/CVE-2023-34039/ Windows will Disable TLS 1.0/1.1 https://learn.microsoft.com/en-us/windows/release-health/windows-message-center
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
What is the Origin of Passwords Submitted to Honeypots https://isc.sans.edu/diary/What%20is%20the%20origin%20of%20passwords%20submitted%20to%20honeypots%3F/30182 Creating a YARA Rule to Detect Obfuscated Strings https://isc.sans.edu/diary/Creating%20a%20YARA%20Rule%20to%20Detect%20Obfuscated%20Strings/30186 VMware Aria Operations for Networks Hardcoded Keys 2023-34039 https://summoning.team/blog/vmware-vrealize-network-insight-rce-cve-2023-34039/ https://github.com/sinsinology/CVE-2023-34039/ Windows will Disable TLS 1.0/1.1 https://learn.microsoft.com/en-us/windows/release-health/windows-message-center
This week on Hacker And The Fed we have Andrew Morris, CEO and founder of GreyNoise on the show. GreyNoise is a cybersecurity company that collects and analyzes mass internet data to remove pointless security alerts, find compromised devices, or identify emerging threats. We talk internet honeypots, how to get into the cyber security industry and much more. Links from the episode: Andrew Morris, CEO & Founder of GreyNoise https://www.greynoise.io/ https://twitter.com/Andrew___Morris https://twitter.com/GreyNoiseIO Support our sponsor: Go to JoinDeleteMe.com/FED code FED20 for 20% off all consumer plans Get your Hacker and the Fed merchandise at hackerandthefed.com
The Mirai botnet afflicts Tomcat. CardioComm services are downed by cyberattack. Uptycs calls infostealers “organization killers" as related security incidents double in a year. Legacy third-party risk management practices meet with dissatisfaction. Cyber skill gaps reported in the UK's workforce. Our guest is George Prichici of OPSWAT with a look at a Microsoft Teams vulnerability. Our new Threat Vector segment features a conversation with David Moulton and Michael Sikorski on the potential threats from LLMs and AI. And SiegedSec hits NATO sites. On this first segment of Threat Vector, Michael "Siko" Sikorski, CTO & VP of Engineering for Unit 42, joins host David Moulton to discuss LLMs & AI and the impacts to expect on social engineering, phishing, and more. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/142 Threat Vector links. Palo Alto Networks Unit 42 Selected reading. Tomcat Under Attack: Exploring Mirai Malware and Beyond (Aquasec) CardioComm, a provider of ECG monitoring devices, confirms cyberattack downed its services (TechCrunch) Detecting the Silent Threat: 'Stealers are Organization Killers' (Uptycs) Cyber security skills in the UK labour market 2023 (DSIT) NATO investigates alleged data theft by SiegedSec hackers (BleepingComputer) NATO investigating apparent breach of unclassified information sharing platform (CyberScoop) SiegedSec Compromise NATO (Cyberint)
Throughout Sara's career, she has relied on information from reliable human sources to break huge stories from the border to the Russia hoax. That information is powerful and people who don't want the truth to come to light will often do anything to keep it hidden. Today, Sara walks us through several of her experiences in the intelligence world and the different clandestine methods used to get and protect valuable informationSara also focuses on how your tax dollars are sent to the United Nations, which then gives them to non-governmental organizations, who actively recruit and guide huge numbers of migrants to the U.S. border. That's right. You are paying for the border crisis. She is also joined by former Guatemalan intelligence chief Mario Duarte to talk about this and how the Biden administration is driving much of Latin America away from us, because it focuses far more on ideology than on real world objectives.Please visit our great sponsors:Allegiance Goldhttps://protectwithsara.comClick or Call 877-702-7272 tell them Sara sent you and get $5,000 of free silver on a qualifying purchase. Donors Trusthttps://donorstrust.org/saraLet my friends at Donors Trust help minimize your tax liability while maximizing your giving. MyPillowhttps://mypillow.comSave over 85% on the All Season Slipper Closeout Sale going on now with code CARTER.
IcedID is evolving away from its banking malware roots. An Emotet phishing campaign spoofs IRS W9s. The FBI warns of BEC scams. A Fake booter service as a law enforcement honeypot. Phishing in China's nuclear energy sector. Reports of an OpenAI and a ChatGPT data leak. Does Iran receive Russian support in cyberattacks against Albania? My conversation with Linda Gray Martin and Britta Glade from RSAC with a preview of this year's conference. Our own Rick Howard takes a field trip to the National Cryptologic Museum. And De-anonymizing Telegram. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/58 Selected reading. Fork in the Ice: The New Era of IcedID (Proofpoint) Emotet malware distributed as fake W-9 tax forms from the IRS (BleepingComputer) Internet Crime Complaint Center (IC3) | Business Email Compromise Tactics Used to Facilitate the Acquisition of Commodities and Defrauding Vendors (IC3) Phishing Campaign Targets Chinese Nuclear Energy Industry (Intezer) 'Bitter' espionage hackers target Chinese nuclear energy orgs (BleepingComputer) UK Sets Up Fake DDoS-for-Hire Sites to Trap Hackers (PCMag Middle East) UK National Crime Agency reveals it ran fake DDoS-for-hire sites to collect users' data (Record) OpenAI: ChatGPT payment data leak caused by open-source bug (BleepingComputer) OpenAI says a bug leaked sensitive ChatGPT user data (Engadget) March 20 ChatGPT outage: Here's what happened (OpenAI) How Albania Became a Target for Cyberattacks (Foreign Policy) Russia's Rostec allegedly can de-anonymize Telegram users (BleepingComputer)
Chris Tarbell is a former FBI Agent specializing in cyber investigations. While at the FBI, Chris led some of the most high-profile cybercrime investigations in the world, including the arrest of members of the hacker group LulzSec, as well as the founder of the Silk Road, Ross Ulbricht, which resulted in the largest seizure of bitcoins to date. ------ ✨ DEBRIEF | Unpacking the episode: https://www.bankless.com/debrief-the-fbi-agent-who-took-down-the-silk-road ------ ✨ COLLECTIBLES | Collect this episode: https://collectibles.bankless.com/mint ------ Rarely do we have the opportunity to pick the brain of a cybercop, but this was our opportunity to see through the eyes of the FBI agent who took down the Silk Road in the largest crypto seizure ever recorded. In today's episode, Chris shares the story of crypto, Ross Ulbricht, and the Silk Road as told by the FBI agent who took it down. We also dig into the eternal cat-and-mouse game between Cybercriminals and Cyberpolice, how to protect yourself from people who want to take your crypto, and if the FBI wants your private keys, how they get them. ------