POPULARITY
AP correspondent Laurence Brooks reports on pro-Russian hackers attacking Italian government websites.
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
Welcome back to Exploit Brokers! In today's video, we dive deep into a critical 7‑Zip vulnerability that's being exploited by Russian cybercriminals to bypass Windows' security protections. If you've used 7‑Zip at all, you need to know how this flaw can let hackers sneak past the Mark-of-the-Web (MOTW) and deploy dangerous malware like Smoke Loader. We'll also explore a parallel threat in the Go ecosystem—malicious packages exploiting caching mechanisms to gain persistent remote access to your system. From double-zipped archives to supply chain attacks, we break down the tactics, the risks, and most importantly, what you can do to protect yourself and your organization. In this video you'll learn: How the 7‑Zip vulnerability works and why updating to the latest version is crucial. The role of Windows' MOTW and how hackers are bypassing this key security feature. Details on the deployment of Smoke Loader malware and its implications. How malicious Go packages and supply chain attacks can compromise your systems. Practical tips to safeguard your data and networks against these emerging threats. Stay informed, stay secure—hit that like button, subscribe, and ring the bell for more cybersecurity insights! Drop your questions or thoughts in the comments below—we love hearing from you! #Cybersecurity #7Zip #WindowsSecurity #Malware #SmokeLoader #GoLang #SupplyChainAttack #Cybercrime #InfoSec #Hacking #RussianHackers #APT #NationStateHackers #exploits #ZeroDays
Andrew Tate's platform, formerly known as Hustler's University, has been hacked, exposing the data of over 800,000 users. Meanwhile, Russian hackers have exploited critical zero-day vulnerabilities in Firefox and Windows, demonstrating the growing sophistication of cyberattacks. In this video, we'll break down the Andrew Tate hack, the implications of leaked user data, and how Russian threat actors are chaining vulnerabilities for remote code execution. Stay informed on the latest in cybersecurity and learn how to protect yourself against these emerging threats. If you enjoy this content, don't forget to like, comment, and subscribe to stay updated on the latest in digital crime and cybersecurity! #AndrewTate #Cybersecurity #Hackers #DataBreach #ZeroDay #RussianHackers #HustlersUniversity #TheRealWorld #CyberThreats #DigitalSafety #Malware #Hacktivism #DataLeaks #FirefoxExploit #WindowsExploit #NationStateHackers #TechNews #OnlineSecurity #TheRealWorld
PEBCAK Podcast: Information Security News by Some All Around Good People
Welcome to this week's episode of the PEBCAK Podcast! We've got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast TSA bypassed by SQL injection attack https://www.bleepingcomputer.com/news/security/researchers-find-sql-injection-to-bypass-airport-tsa-security-checks/ https://xkcd.com/327/ https://arstechnica.com/information-technology/2023/10/sob-story-about-dead-grandma-tricks-microsoft-ai-into-solving-captcha/ Russian APT29 uses commercial spyware exploits https://www.bleepingcomputer.com/news/security/russian-apt29-hackers-use-ios-chrome-exploits-created-by-spyware-vendors/ https://www.darkreading.com/threat-intelligence/commercial-spyware-vendors-have-a-copycat-in-top-russian-apt People too good at spotting phishing https://krebsonsecurity.com/2024/08/when-get-out-the-vote-efforts-look-like-phishing/ https://krebsonsecurity.com/2018/07/notorious-hijack-factory-shunned-from-web/ Career Goals https://guykawasaki.com/guy-kawasaki/ Dad Joke of the Week (DJOW) Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Glenn - https://www.linkedin.com/in/glennmedina/ Jason - https://www.linkedin.com/in/jason-seemann-12b7075/
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
In this episode of Exploit Brokers, we delve into two major cyber stories making headlines. First, we uncover the details behind the recent breach of water facilities by Russian hacktivists and the subsequent U.S. sanctions. Discover the risks posed by SCADA system vulnerabilities and the potential for catastrophic damage to critical infrastructure. Next, we explore the chaos caused by a CrowdStrike update glitch, leading to blue screens of death and widespread disruption. Learn how cybercriminals are exploiting the situation with fake fixes, phishing emails, and malware attacks. Stay informed about the latest threats and gain valuable insights into the world of cybersecurity. Don't forget to like, subscribe, and share to help us spread the word. Also, check out our podcast on Spotify and Apple Podcasts for more in-depth discussions. #CyberSecurity #HackingNews #SCADA #CrowdStrike #Malware #DataBreach #Phishing #CyberThreats #WaterSupply #CriticalInfrastructure #ExploitBrokers #TechNews #CyberAwareness #AI #CyberCrime #DigitalSecurity #ExploitBrokers #TechNews #CyberSecurity #DataBreach #Malware #Hackers #TechEducation #InformationSecurity #CyberSecurity #CyberEspionage #APTGroups #DigitalWarfare #ChineseHackers #CyberCrime #Hacking #Malware #Phishing #ZeroDay #CyberThreats #InformationSecurity #InfoSec #NetworkSecurity #DigitalDefense #CyberAttack #DataBreach #CyberIntelligence #InternetSafety #TechNews #CyberAware #OnlineSecurity #PrivacyProtection #CyberSafety #CyberWar #NationalSecurity #ThreatIntelligence #CyberSovereignty #TechCrimes #CyberAttack #OnlineSafety #EthicalHacking #InternetSecurity #DigitalFraud #Phishing #Ransomware #AIinSecurity #DataProtection #IdentityTheft #CyberDefense #TechTrends #InnovationInTech #DigitalForensics #TechTalk #SecurityBreach #CyberAwareness Sources: * Russia Sanctions due to water facilities hack * https://www.bleepingcomputer.com/news/security/us-sanctions-russian-hacktivists-who-breached-water-facilities/ * Crowdstrike Phisphing * https://www.bleepingcomputer.com/news/security/fake-crowdstrike-fixes-target-companies-with-malware-data-wipers/ * Waterhole clip: https://yarn.co/yarn-clip/fa5ea940-7ab9-4b37-b486-5ae8a580061c
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
In today's episode, we delve into the latest cybersecurity incidents, including Cylance confirming old data sold by Sp1d3r for $750,000, ongoing disruptions in the NHS due to a Russian Qilin ransomware attack, and Google's takedown of coordinated influence campaigns linked to China, Russia, and Indonesia. We also highlight Snowflake account breaches connected to recent data compromises at Advance Auto Parts, Santander, and Ticketmaster. Join us as we explore the implications of these attacks and the latest reports from BleepingComputer, The Guardian, and The Hacker News. References: https://www.bleepingcomputer.com/news/security/cylance-confirms-data-breach-linked-to-third-party-platform/ https://thehackernews.com/2024/06/google-takes-down-influence-campaigns.html https://www.theguardian.com/society/article/2024/jun/11/cyber-attack-on-london-hospitals-to-take-many-months-to-resolve Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/ Logo Design by https://www.zackgraber.com/ Tags: Sp1d3r, Cylance, Snowflake, UNC5537, Google, YouTube, Blogger, Propaganda, Russian hackers, NHS, Disruption, Mitigate Search Phrases: Notorious hacker Sp1d3r data breach Cylance marketing data dark web Snowflake cybersecurity vulnerabilities UNC5537 Snowflake account security Google influence operation crackdown YouTube channel shutdown China propaganda Blogger blog purge misinformation Russia Russian hackers NHS disruption NHS cybersecurity breach recovery Mitigating hacker impact on NHS Cylance confirms data breach linked to 'third-party' platform https://www.bleepingcomputer.com/news/security/cylance-confirms-data-breach-linked-to-third-party-platform/ ---`Flash Briefing: Data Breach Disclosure: Cylance confirmed that data being sold on a hacking forum is legitimate but old, stolen from a third-party platform. The data allegedly includes 34 million customer and employee emails and personally identifiable information. Source: BleepingComputer. Threat Actor Activity: A hacker known as Sp1d3r is selling the stolen data for $750,000. Researchers indicated this data seems to be old marketing information. BlackBerry Cylance stated no current customers or sensitive data are impacted. Source: Dark Web Informer. Snowflake Links: The same threat actor, Sp1d3r, is also selling 3TB of data from Advance Auto Parts, allegedly breached through a Snowflake account. Other recent breaches at Santander, Ticketmaster, and QuoteWizard also link to Snowflake attacks. Source: BleepingComputer. Credential Theft: Attackers used stolen customer credentials to target Snowflake accounts without multi-factor authentication (MFA). Mandiant linked these attacks to a financially motivated threat actor, UNC5537, who has been active since at least 2020. Source: Mandiant. Recommendations: Ensure all accounts, particularly those related to third-party platforms, have MFA enabled. Regularly update and rotate credentials, and implement network allow lists to restrict access to trusted locations. Source: CrowdStrike, Mandiant. Ongoing Notifications: Snowflake and Mandiant have notified around 165 organizations about potential exposure to these attacks, emphasizing the importance of cybersecurity hygiene and proactive measures. Source: Snowflake. Google Takes Down Influence Campaigns Tied to China, Indonesia, and Russia https://thehackernews.com/2024/06/google-takes-down-influence-campaigns.html ---`- Google Takes Down Inauthentic Channels: Google dismantled a coordinated influence operation connected to the People's Republic of China, removing 1,320 YouTube channels and 1,177 Blogger blogs spreading content about China and U.S. foreign affairs. (Source: Google Threat Analysis Group) Influence Operations Linked to Indonesia: Google also terminated accounts linked to two influence operations from Indonesia that supported the ruling party, further showcasing the global nature of these coordinated efforts. (Source: Google Threat Analysis Group) Russian Influence Network Dismantled: Google removed 378 YouTube channels operated by a Russian consulting firm that spread pro-Russia and anti-Ukraine content, highlighting the ongoing digital battlegrounds. (Source: Google Threat Analysis Group) Monetary Motives Behind Fake Content: Financial incentives drove a network linked to individuals from the Philippines and India, spreading English and Norwegian content about food, sports, and lifestyle topics. (Source: Google Threat Analysis Group) Global Influence Campaigns: Networks from Pakistan, France, Russia, and Myanmar also faced shutdowns for spreading politically charged and nationalistic content, illustrating the diverse sources of disinformation. (Source: Google Threat Analysis Group) Meta and OpenAI Disrupt Tel Aviv-Based Operation: Meta and OpenAI disrupted a Tel Aviv-based influence operation dubbed Storm-1099, which targeted U.S. and Canadian audiences with content regarding the Israel-Hamas conflict. (Source: Meta via CyberScoop) Israel's Ministry of Diaspora Affairs Linked: The New York Times reported Israel's Ministry of Diaspora Affairs funded the covert influence campaign with around $2 million, marking another instance of state-sponsored disinformation. (Source: The New York Times) Microsoft Warns of Russian Disinformation: Microsoft warned of increasing Russian disinformation campaigns targeting the 2024 Summer Olympics in Paris, using AI-generated content to undermine the event and spread fear. (Source: Microsoft Threat Analysis Center) Olympics as a Cyber Threat Target: Google-owned Mandiant and Recorded Future identified the Paris Olympics as a high-risk target for cyber threats, including ransomware, espionage, and hacktivist attacks, emphasizing the need for robust cybersecurity measures. (Source: Mandiant and Recorded Future) Cyber-attack on London hospitals to take ‘many months' to resolve https://www.theguardian.com/society/article/2024/jun/11/cyber-attack-on-london-hospitals-to-take-many-months-to-resolve --- Cyber-attack Impact Duration: A senior NHS source warned that the cyber-attack disrupting hospitals and GP surgeries in London may take "many months" to resolve. Key recovery factors: understanding hacker access, affected records, and data retrievability. Scope and Perpetrators: Six NHS trusts and numerous GP practices in south-east London, serving 2 million patients, are affected. Russian Qilin gang believed responsible, using ransomware to lock systems and demand money for decryption keys. Service Disruptions: Critical incident declared due to inability to perform non-urgent operations, including cancer procedures and planned C-sections. Blood test analysis severely restricted, forcing rationing and cancellation of many medical procedures. Recovery Challenges: IT systems encrypted by attackers force victims to rebuild infrastructure, even if decrypted. Former NCSC head, Ciaran Martin, noted that recovery from such attacks often takes weeks or months. Mitigation Efforts: NHS London region employs "mutual aid" by redistributing tasks to unaffected trusts to mitigate care delivery impact. Example: Patients with heart issues transferred from affected hospitals to St George's hospital. Leadership Insights: NHS England's chief executive, Amanda Pritchard, emphasized the vulnerability to international events and the critical, often unseen, role of pathology services. Ongoing Threats: Qilin gang typically also steals data, posting it on the dark web for extortion if ransom isn't paid. No data has been posted yet.
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
“They want to destroy as many of our systems and resources as they can get the access to." - Yevhenii In this episode Ian Andrews (CMO, Chainalysis) speaks to Yevhenii Panchenko (Head of Operational Analysis, Ukraine Cyberpolice Department. Yevhenii discusses the global fight against Russian cyber actors, who target not only Ukraine but also other countries and shares the work his organization is doing to combat cyber threats, including investigating crimes related to fraud, ransomware, and illegal content. He shares the challenges they face in stopping Russian organizations and the importance of international collaboration and volunteers in identifying fraud and scam projects. Yevhenii also announces their new project, SCAMFARI and how they use OSINT to identify crypto fraud and collect data and the impressive features of the DIIA City and the implementation of digital documents in Ukraine. Minute-by-minute episode breakdown 2 | Discussion on the Ukraine Cyber Police mandate and global nature of cyber threats 5 | Describing Russian cyber attacks on Ukrainian infrastructure 8 | A day in the life of the Ukraine Cyber Police Unit 10 | Russian hackers using cryptocurrency to receive ransoms and evade sanctions 12 | Collaboration with US and EU agencies and training on using Chainalysis 15 | Discussion on the effectiveness of sanctions on crypto flows 18 | What is Scamfari and how they use OSINT to identify crypto fraud and collect data 21 | Impressive features of the DIIA City and the implementation of digital documents 23 | Recommendations for supporting Ukraine, including cryptocurrency investigation skills Related resources Check out more resources provided by Chainalysis that perfectly complement this episode of the Public Key. Website: Cyber Police of Ukraine is a law enforcement agency within the Ministry of Internal Affairs of Ukraine dedicated to combating cyber crime. Blog: Summary of Yevhenii Panchenko speech at Chainalysis Links Conference (NYC 2024) Article: Ukraine's cyber police talks crypto, ransomware and documenting war crimes after Russia's invasion Blog: SCAMFARI: This Ukrainian Startup Is Looking to Automate Crypto Crime Reporting Using Smart Contracts, AI Registration: Digital premiere of Links 2024 (NYC Main Stage Content and more - Register Now!) Blog: Crypto Staking Overview: How It Works, Benefits, Risks, and Future Blog - OFAC and Department of State Sanction Nearly 300 Individuals and Entities Involved in Russia's War Machine, One Known to Have Accepted Crypto YouTube: Chainalysis YouTube page Twitter: Chainalysis Twitter: Building trust in blockchain Tik Tok: Building trust in #blockchains among people, businesses, and governments. Telegram: Chainalysis on Telegram Speakers on today's episode Ian Andrews * Host * (Chief Marketing Officer, Chainalysis) Yevhenii Panchenko (Head of Operational Analysis, Cyberpolice Department, National Police of Ukraine) This website may contain links to third-party sites that are not under the control of Chainalysis, Inc. or its affiliates (collectively “Chainalysis”). Access to such information does not imply association with, endorsement of, approval of, or recommendation by Chainalysis of the site or its operators, and Chainalysis is not responsible for the products, services, or other content hosted therein. Our podcasts are for informational purposes only, and are not intended to provide legal, tax, financial, or investment advice. Listeners should consult their own advisors before making these types of decisions. Chainalysis has no responsibility or liability for any decision made or any other acts or omissions in connection with your use of this material. Chainalysis does not guarantee or warrant the accuracy, completeness, timeliness, suitability or validity of the information in any particular podcast and will not be responsible for any claim attributable to errors, omissions, or other inaccuracies of any part of such material. Unless stated otherwise, reference to any specific product or entity does not constitute an endorsement or recommendation by Chainalysis. The views expressed by guests are their own and their appearance on the program does not imply an endorsement of them or any entity they represent. Views and opinions expressed by Chainalysis employees are those of the employees and do not necessarily reflect the views of the company.
A small town in Texas was targeted by Russian hackers who caused their water tower to overflow, sending the message that nowhere is safe. Small towns may be the target because of the lack of updated cybersecurity and software infrastructure. Plus, how did a hack cause the tower to overflow?See omnystudio.com/listener for privacy information.
In this episode of The President's Daily Brief: Israel launches its retaliatory strike, striking a target inside the territory of Iran. A pivotal moment at the United Nations Security Council as members prepare to vote on a Palestinian bid for full UN membership. What are the stakes and potential outcomes of this critical vote? Alarming developments in cybersecurity as a report uncovers Russian military hackers targeting water treatment facilities in the U.S., Poland, and France, with a possible breach in Texas. In the Back of the Brief, we delve into Russia's covert operations against Ukraine, including a foiled assassination attempt on Ukrainian President Volodymyr Zelensky by a Polish-based operative. To listen to the show ad-free, become a premium member of The President's Daily Brief by visiting PDBPremium.com. Please remember to subscribe if you enjoyed this episode of The President's Daily Brief. Email: PDB@TheFirstTV.com Learn more about your ad choices. Visit megaphone.fm/adchoices
The Cybersecurity and Infrastructure Security Agency has directed multiple federal agencies to scrub their Microsoft accounts for signs of compromise after Russia-linked hackers potentially accessed agency passwords and other sensitive log-in details. In an emergency directive publicly released today, CISA said multiple federal agencies had their email correspondence with Microsoft stolen by the Russian state-sponsored group “Midnight Blizzard.” CISA said the stolen emails pose a “grave” risk to the federal government. The group gained access to sensitive agency information by compromising Microsoft's corporate email accounts starting in January. The hackers are now trying to use the information in those stolen emails, which include authentication details, to gain additional access to Microsoft customer systems, CISA said. Learn more about your ad choices. Visit megaphone.fm/adchoices
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
In this episode, Ryan and Shannon discuss the recent theft of Microsoft's source code by Russian government hackers. They highlight the use of password spraying and the lack of lockouts as a vulnerability that allowed the attack to occur. They also emphasize Microsoft's global presence and the potential impact of the breach on various countries and organizations. The delayed detection of the attack raises concerns about Microsoft's security measures. The conversation explores the ongoing investigation and the need for more information. Lessons learned from the incident and the potential future threats are discussed, including the importance of access control and privileged accounts. Takeaways Password spraying and the lack of lockouts can leave organizations vulnerable to attacks. Microsoft's global presence makes it a prime target for hackers. Delayed detection of attacks can have serious consequences. Access control and privileged accounts should be carefully managed to prevent unauthorized access. Article: Microsoft Says Russian Gov Hackers Stole Source Code After Spying on Executive Emails https://www.securityweek.com/microsoft-says-russian-gov-hackers-stole-source-code-after-spying-on-executive-emails/?fbclid=IwAR3Tt7ypxIK2ZxFSk3MaXBz0Ydj0-co1AP09NA8ze1JmK85lscfA38EtKXc Socials: Website - https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/ Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181 Instagram (IG) - https://www.instagram.com/theothersideofthefw/ X (Twitter) - https://twitter.com/Ask_a_CISSP YouTube - https://www.youtube.com/channel/UCXZgdDvlcQ8bP_V4dEF02Yw Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/ Chapters 00:00 Introduction 00:35 Microsoft's Source Code Theft 02:28 Microsoft's Global Presence 03:28 Delayed Detection of the Attack 04:24 Microsoft's Vulnerability and Targeted Attacks 05:30 Incomplete Information and Ongoing Investigation 06:28 Lessons Learned and Future Threats 07:06 Access Control and Privileged Accounts 07:39 Legacy Accounts and Identity Access Management 08:04 Expectations and Follow-up 08:55 Call to Action #cybersecurity #microsoft #russia
A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird. You can find the newsletter version of this podcast here.
A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird. You can find the newsletter version of this podcast here.
Facebook Meltdown, Facebook account takeover,41 State AGs tired of fielding Facebook takeover complaints, Russian Hackers got more from Microsoft then Microsoft thought, My iPhone battery stinks after update, Is VoIP more secure than POTs service, AI where is it going? Thunderbird Mail Client saying, How do I use an old HD in my new PC?
A round-up of the main headlines in Sweden on February 27th 2024. You can hear more reports on our homepage www.radiosweden.se, or in the app Sveriges Radio Play. Presenter: Roza BicerProducer: Michael Walsh
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
News and Updates: NASA's Mars helicopter has flown its last mission after 72 flights The same Russian hacker that tried to get into Microsoft, try to get into HPE Toyota says Hydrogen-Powered Cars are the future, not EV's Apple's Vision Pro and the data collected are still up for grabs YouTube and Netflix will not build apps for the Vision Pro, for now
AP correspondent Ben Thomas reports on HP Enterprise-Russian Hackers.
We knew they'd be petulant, but even our expectations were higher than this. We dig into how Apple dunked on devs after last week's show, yet another Microsoft hack, and more.
Brace yourself for a digital odyssey that's as enlightening as it is entertaining, where cybersecurity meets sub-zero strain on electric vehicles. First, Microsoft is hit with a cyber security attack, and then we dissect the chilling effects of cold weather on EV batteries – a cautionary tale for tech-savvy motorists. But that's not all – we reveal the startling shift of Vroom from car sales to the cutting-edge world of AI and auto financing, a move revving up the industry in unexpected ways. Grab your favorite whiskey glass – you're going to need it when we crack open the underbelly of online scams on LETTERS with Cohosts Mike Gorday and Marc Gregoire. We'll arm you with knowledge and a dash of humor to navigate the murky waters of the internet, sharing personal stories of near-misses with cryptocurrency cons and the importance of a healthy dose of skepticism.As we raise our glasses to National King Day, we'll share the warmth of our Castle & Key Restoration Rye Single Barrel whiskey experience, inviting you to savor the "Hmmm Moment" in technology.Episode 189: Starts at :30In this week's episode, we'll cover a range of topics that will pique your interest. First up, last week, senior Microsoft leaders' emails were accessed by state-backed Russian hackers. Next, we'll be discussing the extreme weather battery alert that has been issued due to the inability of electric vehicle batteries to handle cold temperatures. Then, a primary online car seller hit the brakes on its online used car business to go full throttle on auto financing and AI. We'll be looking at this decision and what it means for the company's future.Later in the show, we'll take a trip down memory lane as we look back at the iconic DeLorean DMC-123. Finally, we have a profanity-laced technology failure that we'll be discussing. We'll be looking at what went wrong and what lessons can be learned from this incident.Stay tuned for all this and more, only on TechTime Radio with Nathan Mumm, the show that makes you go "Humm" Technology news of the week for January 21st - 27th, 2024--- [Now on Today's Show]: Starts at 2:17--- [Top Stories in Technology]: Starts at 4:08Microsoft to overhaul internal security practices after Midnight Blizzard attack - http://tinyurl.com/32k46jbmTesla Batteries Died in the Bitter Cold Weather. It's Another Black Eye for EVs - http://tinyurl.com/45xppw2yVroom hits the brakes on its online used car business to go full throttle on auto financing and AI - http://tinyurl.com/ye4a9df6 --- [Pick of the Day - Whiskey Tasting Reveal]: Starts at 20:32Castle & Key Restoration Rye Single Barrel | 121.9 Proof | $65.00--- [Letters]: Starts at 24:00Mike and Nathan share this week's informative emails that were received during the week. This includes scams, phishing emails, and all-out mistruths disguised as legitimate emails.--- [This Week in Technology]: Starts at 42:08This Week in Technology: January 21, 1981 - Production of DeLorean DMC-12 begins --- [Marc's Whiskey Mumble]: Starts at 44:17Marc Gregoire's review of this week's whiskey--- [Technology Fail of the Week]: Starts at 47:08This week's “Technology Fail” comes to us from the parcel delivery firm DPD chatbot was rude and was swearing at customers.--- [Mike's Mesmerizing Moment brought to us by StoriCoffee®]: Starts at 50:19 Question: Why do we want things to stay inexpensive?--- [Nathan Nugget]: Starts atRan out of Time--- [Pick of the Day Whiskey Review]: Starts at 52:32Castle & Key Restoration Rye Single Barrel | 121.9 Proof | $65.00Mike: Thumbs UpNathan: Thumbs Up
Microsoft was hit by another nation-state attack, this time by the same Russian group behind the SolarWinds attack. ElevenLabs, a startup that just landed $80 million in funding and achieved unicorn status, is making it easier than ever to replace human voice actors with AI-generated voices. TextReader.ai is a free text-to-speech generator with some of the most realistic AI voices. "Is the Emergence of Life an Expected Phase Transition in the Evolving Universe?" challenges our current ideas about the emergence of life and opens up new avenues for research. Contact: sergi@earkind.com Timestamps: 00:34 Introduction 01:25 Microsoft ‘senior leadership' emails accessed by Russian SolarWinds hackers 03:18 Voice cloning startup ElevenLabs lands $80M, achieves unicorn status 05:29 Text Reader - Free text to speech generator with realistic AI voices 06:45 Fake sponsor 08:33 Spotting LLMs With Binoculars: Zero-Shot Detection of Machine-Generated Text 10:10 Is the Emergence of Life an Expected Phase Transition in the Evolving Universe? 11:57 EmerDiff: Emerging Pixel-level Semantic Knowledge in Diffusion Models 13:45 Outro
AP correspondent Jackie Quinn reports on Microsoft Russian Hackers.
Unsere Reporterin Maria bekommt einen Anruf aus dem Gefängnis. Am Hörer: Eine der gefährlichsten Hackerinnen der Welt. Zumindest wenn man der US-Justiz glaubt. Wer ist Alla Witte wirklich? Und: Kann man aus Versehen zur Hackerin werden?
Sandworm was in Kyivstar's networks for months. Museums face online outages. Emsisoft suggests a ransomware payment ban. An ambulance service suffers a data breach. Mandiant's social media gets hacked. GXC Team's latest offerings in the C2C underground market. 23andMe blames their breach on password reuse. Lawyers are using outdated encryption. On today's Threat Vector segment, David Moulton chats with Garrett Boyd, senior consultant at Palo Alto Networks Unit 42 about the importance of internal training and mentorship in cybersecurity. And in Russia, holiday cheers turn to political jeers. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On today's Threat Vector segment with David Moulton features Garrett Boyd, a senior consultant at Unit 42 by Palo Alto Networks with a background as a Marine and professor, discusses the importance of internal training and mentorship in cybersecurity. He provides insights into how training prepares professionals for industry challenges and how mentorship fosters professional growth and innovation. Garrett emphasizes the need for a mentorship culture in organizations and the responsibility of both mentors and mentees in this dynamic. The episode highlights the transformative impact of mentorship through personal experiences and concludes with an invitation for listeners to share their stories and a reminder to stay vigilant in the digital world. Threat Vector To learn what is top of mind each month from the experts at Unit 42 sign up for their Threat Intel Bulletin. Selected Reading Compromised accounts and C2C markets. Cyberespionage and state-directed hacktivism. (CyberWire) Exclusive: Russian hackers were inside Ukraine telecoms giant for months (Reuters) Hackers linked to Russian spy agency claim cyberattack on Ukrainian cell network (reuters) Museum World Hit by Cyberattack on Widely Used Software (The New York Times) The State of Ransomware in the U.S.: Report and Statistics 2023 (Emsisoft) Nearly 1 million affected by ambulance service data breach (The Record) Mandiant's account on X hacked to push cryptocurrency scam (Bleeping Computer) Cybercriminals Implemented Artificial Intelligence (AI) For Invoice Fraud (Resecurity) 23andMe tells victims it's their fault that their data was breached (TechCrunch+) The Curious Case of MD5 (katelynsills) Firmware prank causes LED curtain in Russia to display ‘Slava Ukraini' — police arrest apartment owner (The Record) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Reporterin Mariia bekommt einen Anruf aus dem Gefängnis. Am Hörer: Eine der gefährlichsten Hackerinnen der Welt. Zumindest wenn man der US-Justiz glaubt. In dieser Wild Wild Web Recherche geht es um so genannte Ransomware. Die Frau im Gefängnis soll geholfen haben Infrastruktur zu hacken und lahmzulegen, um Geld zu erpressen. Wer ist Alla Witte wirklich? Und: Kann man aus Versehen zur Hackerin werden?
Federal officials have seized websites belonging to a prolific Russian hacking group. In today's Tech and Business Report, KCBS Radio news anchor Nikki Medoro spoke to Bloomberg's Jeff Stone for more about the hacking group, called BlackCat, and some of the hacks they have claimed responsibility for.
Latest news from 13 December 2023, as reported in the Ukrainian media. Easy ways to support us: Subscribe to our Patreon to give monthly support https://www.patreon.com/highlightsfromukraine Send us a one-time 'thank you' tip via PayPal at: highlightsfromukraine@gmail.com Out YouTube channel: https://bit.ly/3oH111z Special thanks to our top Patreon supporters - Helena Pszczolko O'Callaghan, mattg629, krissi, Jared and Dick Warner!
The Run Home with Joel and Fletch and the boys caught up with Ian Smith live in India after the incredible innings from Glenn Maxwell. Fletch has himself a horse themed Wacky Team after the Melbourne Cup yesterday. Bozza joined for all things round ball and when de he go to school? Plus, the best hangover cures Key Moments: What to do with The Sugar Files? (3:45) Sugar phoning people drunk (5:00) Soulcombe's Melbourne Cup Ride (7:30) Best horse races in Australia (11:00) Optus Network Outage (11:30) Russian Hackers (12:20) Breaking into homes (17:00) Tracking the family location (18:20) Glenn Maxwell World Cup Heroics (27:45) Chris from the Gold Coast winning at the Cup (34:20) Former New Zealand Cricketer and World Cup Commentator Ian Smith (42:00) Glenn Maxwell's incredible innings (43:20) Angelo Matthews scandal (48:00) New Zealand's chances (50:20) Vibe in India (52:00) Bulldogs announce 4 new signings (54:50) Hangover Cures (01:11:00) Wacky Team Wednesday (01:12:50) Stan Sport Expert Mark Bosnich (01:18:40) Fletch's Love Lounge (01:39:50) Sportsbet Market Update with Sean Ormerod (01:42:20) Wavy Team Wednesday Announcements (01:50:00) Mili Vanilli documentary (01:54:00) *timecodes approximate Learn more about your ad choices. Visit megaphone.fm/adchoices
The Cybercrime Magazine Podcast brings you daily cybercrime news that airs each day on WCYB Digital Radio, the first and only 7x24x365 Internet radio station devoted to cybersecurity. Our host keeps you on the cutting edge of cyber with a rundown of the latest cyberattacks, hacks, data breaches, and more. Don't miss an episode! Airs every half-hour on WCYB Digital Radio and every day on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news
This week on Hacker And The Fed your car may know all the details about your sex life, the Swiss fined an insurer 3 million dollars for horrible cyber security practices, the US Departments of State and Commerce were compromised because of a two-year-old Windows crash report, Iran and New Korea hacking crews have active campaigns against security researchers, and two victories over Russian hackers for the US government. Links from the episode: Insurer Fined $3M for Exposing Data of 650k Clients for Two Years https://www.bleepingcomputer.com/news/security/insurer-fined-3m-for-exposing-data-of-650k-clients-for-two-years/ If You've Got a New Car, It's a Data Privacy Nightmare https://gizmodo.com/mozilla-new-cars-data-privacy-report-1850805416 https://arstechnica.com/cars/2023/09/connected-cars-are-a-privacy-nightmare-mozilla-foundation-says/ Microsoft Finally Explains Cause of Azure Breach: An Engineer's Account Was Hacked https://arstechnica.com/security/2023/09/hack-of-a-microsoft-corporate-account-led-to-azure-breach-by-chinese-hackers/ https://twitter.com/0xdabbad00/status/1699596048392736812 Hacker Group Disguised as Marketing Company to Attack Enterprise Targets https://gbhackers.com/hacker-group-disguised-as-marketing/ Active North Korean Campaign Targeting Security Researchers https://blog.google/threat-analysis-group/active-north-korean-campaign-targeting-security-researchers/ Russian Infosec Boss Gets Nine Years for $100M Insider-Trading Caper Using Stolen Data https://www.theregister.com/AMP/2023/09/08/russian_insider_training_prison/ United States and United Kingdom Sanction Additional Members of the Russia-Based Trickbot Cybercrime Gang https://home.treasury.gov/news/press-releases/jy1714 Support our sponsors: Go to JoinDeleteMe.com/FED and use the code FED20 for 20% off Get your Hacker and the Fed merchandise at hackerandthefed.com Send HATF your questions at questions@hackerandthefed.com
In the Dark Side of Hacking, we take a look at how Russian Hackers have shifted their focus to attacking infrastructure rather than individuals after being identified and putting victims through panic. Google AI launches a new bug hunting strategy called Fuzzing, which uses a machine learning algorithm to search for flaws in software. Fuzzing is a more targeted approach to bug hunting that can be used to find vulnerabilities before they are exploited. Article: https://exploitbrokers.com/hacking-news/hn-12-the-dark-side-of-hacking-russian-hackers-infrastructural-shift-and-google-ais-fuzzing/
You've probably encountered phishing emails or computer viruses. Or maybe one or more of your accounts has been hacked or compromised. How and why do hackers hack and what are they generally seeking? Our guest this week points out that understanding the answers to those questions is essential for making sense of the psychological, economic, political and social effects of cybercrime. Scott Shapiro is Southmayd Professor of Law and Professor of Philosophy at Yale Law School. He is the author of a new book called, “Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks.” The book dives into five historical examples, one of which involves its namesake, Fancy Bear, a Russian cyberintelligence unit responsible for hacking the Democratic National Convention. Shapiro joins WITHpod to discuss some of the biggest inflection points in the history of hacking, why the internet is so vulnerable, the role that generative AI may place in future cybercrime and his thoughts on if we should really be concerned about cyberwar.
The Cybercrime Magazine Podcast brings you daily cybercrime news that airs each day on WCYB Digital Radio, the first and only 7x24x365 Internet radio station devoted to cybersecurity. Our host keeps you on the cutting edge of cyber with a rundown of the latest cyberattacks, hacks, data breaches, and more. Don't miss an episode! Airs every half-hour on WCYB and every day on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news
Since the onset of the Ukraine War, everyone's been checking under their bed and looking in their closet for the boogeyman - a.k.a Russian Hackers - but they haven't been there. Today's video is coming to you from Wānaka, New Zealand. Full Newsletter: https://mailchi.mp/zeihan/where-are-all-the-russian-hackers
Leaked Pentagon documents say hackers working with Russia's spy agencies claim to have disrupted operations and inflicted costly damage to Canada's pipeline infrastructure. How verifiable are the claims? Canada's national cryptologic agency warns the threat of a cyber hack could cause real damage and is "one of the most serious scenarios envisioned" because of the Russian war in Ukraine. What could happen if hackers succeed? What safety measures are the oil and gas sector implementing? How vulnerable is Canada to these attacks?See omnystudio.com/listener for privacy information.
Canadian officials have been warning since the war in Ukraine began of potential cyber attacks from Russia as retribution for Canada helping Ukraine. This week, at least two Canadian government websites were down, courtesy of Russian hackers, and claims surfaced that Russian hackers had compromised a Canadian gas company.Steven Chase is The Globe's senior parliamentary reporter. He's seen the documents detailing the alleged attack on the Canadian company. He'll tell us about these attacks, and how they fit into Russia's broader plan to punish supporters of Ukraine.Questions? Comments? Ideas? Email us at thedecibel@globeandmail.com
This week on the podcast, we discussed two major geopolitical events that occurred: Russian hackers attacked US medical sites and Iran was attacked by an Israeli drone. We also discussed the United States' and Russia's discussion of the end of the Start nuclear treaty, Iran's potential to join the Shanghai Cooperation Organization, the US and India rebuilding their relationship, China's increasing pressure on Taiwan, and Saudi Arabia's potential new ally, China. In addition, the conversation turned to South America and the geopolitical repercussions of Iran placing military bases in Latin America.Loved this episode? Leave us a review and rating here: Apple | Spotify---------------------------------------------------------------------------------------------------------If you liked this conversation please head over to https://aucoinanalytics.comYou can find Aucoin Analytics across multiple social media platforms:Twitter | Instagramemail: info@aucoinanalytics.comAnd don't forget to support the podcast by subscribing for free, reviewing, and sharing with friends and family.Also add your email to our private intelligence community by visiting this link: Sign Up-------------------------------------------------------Go to blendjet.com and use code thisweek12 at checkout to save 12% off your order OR use my special link and the discount will be applied at checkout zen.ai/thisweek12-----------------------------------------------------Check out Screen Echo here: https://open.spotify.com/show/1P3OoeIMPYN8E7o5GyLZO3?si=d024431bb65248bf
Puerto Rican presidents, Gay Spitroasts, hotdog pizza, car accidents, hit and run, doctors, nightmares, drugs, HNJ, Russian Hackers, Marijuana, Coming out, demons, picza, and wholesome advice w the crew!
Join us on TechTime Radio with Nathan Mumm, the show that makes you go "Hummmm" Technology news of the week for October 9th – October 15th, 2022.Today on TechTime with Nathan Mumm, Pro-Russian Hackers took down US airports' sites in a calculated DDoS attack. Artificial Intelligence could soon diagnose illness, BMW wants you to stay in your car to play video games once parked, and we are talking robots with Gwen Way. This week, the "Technology Fail" comes to us from Apple with many ups and downs. In addition, we have our standard features, including "Mike's Mesmerizing Moment," "This Week in Technology," and a possible "Nathan Nugget." Finally, our "Pick of the Day" whiskey tasting. So, sit back, raise a glass, and welcome to TechTime with Nathan Mumm.Episode 122: Starts at 1:35--- [Now on Today's Show]: Starts at 4:06--- [Top Stories in The First Five Minutes]: Starts at 5:17US airports' sites taken down in DDoS attacks by pro-Russian hackers - https://tinyurl.com/4r3xs66u Artificial intelligence could soon diagnose illness based on the sound of your voice - https://tinyurl.com/h4uyu6c4BMW partners with AirConsole to bring in-car gaming in 2023 - https://tinyurl.com/54h9f9y3 How to watch "Meta Connect's 2022" keynote (hint: Facebook) - https://tinyurl.com/yc8dn9kn --- [Pick of the Day - Whiskey Tasting Reveal]: Starts at 21:26Rough Rider Bull Moose Triple Barrel Rye Whiskey | 90 Proof |$28.49--- [Gadgets and Gear with Gwen Way]: Starts at 23:40Meet Loona - The most Intelligent Petbot - She's so playful and affectionate you'll forget she's a robot. https://www.kickstarter.com/projects/keyitechnology/meet-loona-the-petbot-you-will-fall-in-love?ref=discovery_category --- [This Week in Technology]: Starts at 36:13October 10, 1980 - Midway releases Pac-Man, the video game to North American arcades. In contrast, the Japanese release under "Puck-Man" occurred earlier in May of that year. --- [Marc's Mumble Whiskey Details]: Starts at 40:13 --- [Technology Fail of the Week]: Starts at 43:00Don't take an iPhone to Kings Island amusement park outside Cincinnati, Ohio, as many of its rollercoaster rides trigger new iPhones' emergency calls.According to the Wall Street Journal (WSJ), the plummeting rides have activated the iPhones' crash detection system. The feature was introduced in the new iPhone 14 and Apple Watch Series 8, Ultra, and SE with the latest OS. So don't plan and having your new iPhone with you to capture a picture at these parks. Cheers come from all Android users that love roller coasters.--- [Mike's Mesmerizing Moment brought to us by StoriCoffee®]: Starts at 47:50--- [Nathan Nugget]: Starts at 50:45--- [Pick of the Day]: Starts a 53:01Rough Rider Bull Moose Triple Barrel Rye Whiskey | 90 Proof |$28.49Mike: Thumbs UpNathan: Thumbs Up
Russian hackers strike again, this time attacking U.S. airports. Ukraine's capitol, Kyiv, was targeted with air strikes Monday. The attack killed around a dozen civilians and injured nearly 100 others. President Joe Biden is calling it an act of brutality. Taiwan is vowing to bolster its defenses against a Chinese invasion. What does the Taiwanese president say about a potential war with Beijing? Florida's surgeon general had a tweet blocked by the media platform. The tweet shared findings by Florida's Health Department on the side effects of the COVID-19 vaccine in men. Another doctor has been banned from Twitter. Cardiologist and author Dr. Peter McCullough joins us. Is there encroachment on Second Amendment rights? The FBI is beginning to collect the addresses of some gun buyers. ⭕️Watch in-depth videos based on Truth & Tradition at Epoch TV
Madeleine Albright died 50 decades too late, The White House is now predicting Russian Hackers are going to take down critical infrastructure, Brian Kemp is giving Georgia some money back, Perdue wants to eliminate the income tax and Abrams wants more control over health care on this episode of Radical!
Season 5, Episode 106.Emails expose Fauci as a giant fraud, Biden thinks white supremacist terrorism is our most lethal homeland threat, Kamala bails on the border and the Russians are attacking meat. Plus Kurt Schlichter joins the show.Please subscribe to the podcast! And get more exclusive content from Buck at BuckSexton.com.Find Buck on:Twitter @BuckSexton Facebook @BuckSexton Instagram @BuckSexton Email the show: TeamBuck@IHeartMedia.com Learn more about your ad-choices at https://www.iheartpodcastnetwork.comFollow Clay & Buck on YouTube: https://www.youtube.com/c/clayandbuckSee omnystudio.com/listener for privacy information.