Podcasts about russian hackers

  • 224PODCASTS
  • 309EPISODES
  • 38mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • Sep 6, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about russian hackers

Latest podcast episodes about russian hackers

Computer Talk with TAB
Computer Talk 9-6-25 HR 2

Computer Talk with TAB

Play Episode Listen Later Sep 6, 2025 38:46


Taskbar location win 10/11, Scammers trick elderly into paying for oxygen, Apple Auto update not happening, So what happens if I don't update my PC to Windows 11? Cell Data Usage, US puts 10M bounty on Russian Hackers using a 7 year old exploit to gain access to US infrastructure, Old Laptop what brand? Android drops 120 major patch release, Crooks using Musk's AI to attack Musk's X.

Cybercrime Magazine Podcast
Cybercrime News For Sep. 5, 2025. U.S. Bounty: $10M for Russian Hackers. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Sep 5, 2025 2:38


The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

Cybercrime Magazine Podcast
Cybercrime News For Aug. 15, 2025. Russian Hackers Breach Norwegian Dam Controls. WCYB Digital Radio

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 15, 2025 2:42


The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

Minimum Competence
Legal News for Fri 8/15 - Russian Hackers Breach Federal Courts, Trial Over Trump Troop Deployment on US Streets, Legal Jobs Up Broadly, SCOTUS Declines to Pause Social Media Age Checks

Minimum Competence

Play Episode Listen Later Aug 15, 2025 15:08


This Day in Legal History: Starve or SellOn August 15, 1876, the United States Congress passed a coercive measure aimed at forcing the Sioux Nation to relinquish their sacred lands in the Black Hills of present-day South Dakota. Known informally as the "starve or sell" bill, the legislation declared that no further federal appropriations would be made for the Sioux's food or supplies unless they ceded the Black Hills to the U.S. government. This came just two months after the Lakota and Northern Cheyenne had defeated General George Custer at the Battle of the Little Bighorn, a major blow to U.S. military prestige.The Black Hills had been guaranteed to the Sioux in the 1868 Treaty of Fort Laramie, which recognized their sovereignty over the area. But when gold was discovered there in 1874 during Custer's expedition, settlers and miners flooded the region, violating the treaty. Rather than remove the intruders, the federal government shifted blame and sought to pressure the Sioux into surrendering the land.The 1876 bill effectively weaponized hunger by conditioning life-sustaining aid on land cession. This tactic ignored treaty obligations and relied on exploiting the Sioux's vulnerability after a harsh winter and military setbacks. Despite resistance from many tribal leaders, the U.S. government eventually secured signatures under extreme duress. In 1980, the U.S. Supreme Court in United States v. Sioux Nation of Indians ruled that the Black Hills were taken illegally and ordered compensation—money the Sioux have famously refused, insisting instead on the return of the land.Russian state-sponsored hackers infiltrated the U.S. federal court system and secretly accessed sealed records for years by exploiting stolen user credentials and a vulnerability in an outdated server. The breach, which remained undisclosed until recently, involved the deliberate targeting of sealed documents tied to sensitive matters like espionage, fraud, money laundering, and foreign agents. These records, normally protected by court order, often include details about confidential informants and active investigations. Investigators believe the hackers were backed by the Russian government, though they haven't been officially named in public disclosures.The Department of Justice has confirmed that “special measures” are now being taken to protect individuals potentially exposed in the breach. Acting Assistant Attorney General Matt Galeotti said that while technical and procedural safeguards are being implemented broadly, the DOJ is focusing particular attention on cases where sensitive information may have been compromised. He did not provide specifics but acknowledged that the situation demands urgent and tailored responses. Judges across the country were reportedly alerted in mid-July that at least eight federal court districts had been affected.This breach follows an earlier major compromise in 2020, also attributed to Russian actors, involving malicious code distributed through SolarWinds software. In response to both incidents, the judiciary has ramped up its cybersecurity efforts, including implementing multifactor authentication and revising policies on how sealed documents are handled. Some courts now require such documents to be filed only in hard copy. However, officials and experts alike have criticized Congress for underfunding judicial cybersecurity infrastructure, leaving it vulnerable to increasingly sophisticated attacks.The situation raises ongoing concerns about the security of national security cases and the exposure of individuals whose cooperation with law enforcement was meant to remain confidential. Lawmakers have requested classified briefings, and President Trump, who is set to meet with Russian President Vladimir Putin, acknowledged the breach but downplayed its significance.Russian Hackers Lurked in US Courts for Years, Took Sealed FilesUS taking 'special measures' to protect people possibly exposed in court records hack | ReutersA federal trial in California is testing the legal boundaries of the U.S. military's role in domestic affairs, focusing on President Donald Trump's deployment of troops to Los Angeles during protests in June. California Governor Gavin Newsom sued Trump, arguing the deployment of 700 Marines and 4,000 National Guard troops violated the Posse Comitatus Act, an 1878 law that prohibits the military from engaging in civilian law enforcement. Testimony revealed that troops, including armed units and combat vehicles, were involved in activities like detaining individuals and supporting immigration raids—actions critics argue cross into law enforcement.The Justice Department defended Trump's actions, asserting that the Constitution permits the president to deploy troops to protect federal property and personnel. They also claimed California lacks the standing to challenge the deployment in civil court, since Posse Comitatus is a criminal statute that can only be enforced through prosecution. U.S. District Judge Charles Breyer expressed concern about the lack of clear limits on presidential authority in such matters and questioned whether the logic behind the Justice Department's arguments would allow indefinite military involvement in domestic policing.Military officials testified that decisions in the field—such as setting up perimeters or detaining people—were made under broad interpretations of what constitutes protecting federal interests. The case took on added urgency when, on the trial's final day, Trump ordered 800 more National Guard troops to patrol Washington, D.C., citing high crime rates, despite statistical declines. The Justice Department has also invoked the president's immunity for official acts under a 2024 Supreme Court ruling, further complicating California's legal path.Trial shows fragility of limits on US military's domestic role | ReutersThe U.S. legal sector added jobs for the fifth consecutive month in July, nearing its all-time high of 1.2 million positions set in December 2023, according to preliminary Bureau of Labor Statistics (BLS) data. While this signals positive momentum, long-term growth remains modest; employment is only 1.7% higher than its May 2007 peak, showing how the 2008 financial crisis and the pandemic stalled progress. Big law firms, however, have seen major gains: between 1999 and 2021, the top 200 firms nearly doubled their lawyer headcount and saw revenues grow by 172%.Still, the wider legal job market—including paralegals and administrative staff—hasn't kept pace. Technological efficiencies and AI have reduced reliance on support staff, and the lawyer-to-staff ratio has declined steadily. Some general counsels are now using AI tools instead of outside firms for tasks like summarizing cases and compiling data, suggesting further disruption is on the horizon. Meanwhile, superstar lawyers at elite firms now earn upward of $10 million a year, driven by rising billing rates and high-demand corporate work.Broader U.S. job growth lagged in July, with the BLS issuing significant downward revisions for previous months. President Trump responded by firing BLS Commissioner Erika McEntarfer, accusing her without evidence of data manipulation. On the law firm side, Boies Schiller is handling high-profile litigation over Florida's immigration policies, with rates topping $875 an hour for partners. Separately, Eversheds Sutherland reported a 10% jump in global revenue, citing strong performance in its U.S. offices and a new Silicon Valley branch.US legal jobs are rising again, but gains are mixed | ReutersThe U.S. Supreme Court has declined to temporarily block a Mississippi law requiring social media platforms to verify users' ages and obtain parental consent for minors, while a legal challenge from tech industry group NetChoice moves through the courts. NetChoice, whose members include Meta, YouTube, and Snapchat, argues the law violates the First Amendment's free speech protections. Although Justice Brett Kavanaugh acknowledged the law is likely unconstitutional, he stated that NetChoice hadn't met the high standard necessary to halt enforcement at this early stage.The Mississippi law, passed unanimously by the state legislature, requires platforms to make “commercially reasonable” efforts to verify age and secure “express consent” from a parent or guardian before allowing minors to create accounts. The state can impose both civil and criminal penalties for violations. NetChoice initially won limited relief in lower court rulings, with a federal judge pausing enforcement against some of its members, but the Fifth Circuit Court of Appeals reversed that pause without explanation.Mississippi officials welcomed the Supreme Court's decision to allow the law to remain in effect for now, calling it a chance for “thoughtful consideration” of the legal issues. Meanwhile, NetChoice sees the order as a procedural setback but remains confident about the eventual outcome, citing Kavanaugh's statement. The case marks the first time the Supreme Court has been asked to weigh in on a state social media age-check law. Similar laws in seven other states have already been blocked by courts. Tech companies, facing increasing scrutiny over their platforms' impact on minors, insist they already provide parental controls and moderation tools.US Supreme Court declines for now to block Mississippi social media age-check law | ReutersThis week's closing theme is by Samuel Coleridge-Taylor.On this day in 1875, Samuel Coleridge-Taylor was born in London to an English mother and a Sierra Leonean father. A composer of striking originality and lyricism, Coleridge-Taylor rose to prominence in the late 19th and early 20th centuries, earning acclaim on both sides of the Atlantic. Often dubbed the “African Mahler” by American press during his tours of the U.S., he became a symbol of Black excellence in classical music at a time when such recognition was rare. He studied at the Royal College of Music under Charles Villiers Stanford, and by his early twenties, had already composed his most famous work, Hiawatha's Wedding Feast, which became a staple of British choral repertoire.Coleridge-Taylor's music blended Romanticism with rhythmic vitality, often inflected with the spirituals and folk influences he encountered during his visits to the United States. He was deeply inspired by African-American musical traditions and maintained a lifelong interest in promoting racial equality through the arts. His catalogue includes choral works, chamber music, orchestral pieces, and songs—each marked by melodic richness and emotional depth.This week, we close with the fifth and final movement of his 5 Fantasiestücke, Op. 5—titled "Dance." Composed when he was just 18, the piece captures the youthful exuberance and technical elegance that would characterize his career. Lively, rhythmically playful, and tinged with charm, “Dance” is a fitting celebration of Coleridge-Taylor's enduring legacy and a reminder of the brilliance he achieved in his all-too-brief life.Without further ado, Samuel Coleridge Taylor's 5 Fantasiestücke, Op. 5 – enjoy! This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.minimumcomp.com/subscribe

Cybercrime Magazine Podcast
Cybercrime News For Aug. 4, 2025. Russian Hackers Target Embassies with Malware. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 4, 2025 2:29


The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

Risky Business News
Risky Bulletin: Russian hackers abuse app-specific passwords to bypass MFA

Risky Business News

Play Episode Listen Later Jun 20, 2025 7:46


Russian hackers abuse app-specific passwords to bypass multi-factor, the tenth Salt Typhoon victim is identified, Predatory Sparrow destroys $90 million from an Iranian crypto-exchange, and Argentina arrests a Russian disinfo gang. Show notes

Privacy Please
S6, E239 - Russian Hackers, Leaked Military Secrets, and Your DNA

Privacy Please

Play Episode Listen Later Apr 7, 2025 20:54 Transcription Available


Send us a textPrivacy threats continue to escalate as human error undermines even the most secure systems, from military officials accidentally exposing classified information to Russian hackers targeting encrypted messaging apps.• Signal security breach occurred when defense officials accidentally added a reporter to their encrypted group chat discussing sensitive military operations• Russian-linked attackers targeting Signal users through QR code vulnerabilities, tricking users into linking their secure accounts to attacker-controlled instances• QR codes present broader security concerns as users can't verify where they lead before scanning them• Attackers can place malicious QR codes over legitimate ones in public spaces like restaurants and airports• 23andMe's bankruptcy raises critical questions about the fate of genetic data from 15 million users• When companies holding sensitive personal information go bankrupt, data ownership and protection becomes uncertain• Human error remains the primary vulnerability in most privacy and security systems• Always consider the long-term implications when sharing personal information with any serviceRemember to think beyond the present when sharing your data – consider what might happen to that information in 10, 20, or even 30 years from now. Support the show

Engadget
The Pentagon warned govt. officials that Signal is being targeted by Russian hackers, Instagram has a new program to report bullying, and Game Informer is back

Engadget

Play Episode Listen Later Mar 26, 2025 7:36


The Pentagon warned government officials that Signal is being targeted by Russian hackers, Instagram has a new program for school officials to report bullying, and Game Informer is back and so is its entire team. It's Wednesday, March 26th and this is Engadget News. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Chicago's Afternoon News with Steve Bertrand
Russian hackers disperse CPS students' information on the dark web

Chicago's Afternoon News with Steve Bertrand

Play Episode Listen Later Mar 10, 2025


Mila Koumpilova, Senior Reporter, Chalkbeat Chicago, joins Lisa Dent to discuss over 700,000 current and former Chicago students’ information being released on the dark web by Russian hackers.

AP Audio Stories
Pro-Russian hackers attack Italian websites after president compares invasion of Ukraine to Nazis

AP Audio Stories

Play Episode Listen Later Feb 18, 2025 0:46


AP correspondent Laurence Brooks reports on pro-Russian hackers attacking Italian government websites.

Cybercrime Magazine Podcast
Cybercrime News For Feb. 14, 2025. Russian Hackers Expand Targets Beyond Ukraine. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Feb 14, 2025 2:47


The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

Exploit Brokers - Hacking News
HN55 - Double Zipping Danger: The 7-Zip Exploit That Could Hack Your PC

Exploit Brokers - Hacking News

Play Episode Listen Later Feb 6, 2025 27:18


Welcome back to Exploit Brokers! In today's video, we dive deep into a critical 7‑Zip vulnerability that's being exploited by Russian cybercriminals to bypass Windows' security protections. If you've used 7‑Zip at all, you need to know how this flaw can let hackers sneak past the Mark-of-the-Web (MOTW) and deploy dangerous malware like Smoke Loader. We'll also explore a parallel threat in the Go ecosystem—malicious packages exploiting caching mechanisms to gain persistent remote access to your system. From double-zipped archives to supply chain attacks, we break down the tactics, the risks, and most importantly, what you can do to protect yourself and your organization. In this video you'll learn: How the 7‑Zip vulnerability works and why updating to the latest version is crucial. The role of Windows' MOTW and how hackers are bypassing this key security feature. Details on the deployment of Smoke Loader malware and its implications. How malicious Go packages and supply chain attacks can compromise your systems. Practical tips to safeguard your data and networks against these emerging threats. Stay informed, stay secure—hit that like button, subscribe, and ring the bell for more cybersecurity insights! Drop your questions or thoughts in the comments below—we love hearing from you! #Cybersecurity #7Zip #WindowsSecurity #Malware #SmokeLoader #GoLang #SupplyChainAttack #Cybercrime #InfoSec #Hacking #RussianHackers #APT #NationStateHackers #exploits #ZeroDays

Exploit Brokers - Hacking News
HN47 - Andrew Tate's Platform Hacked by Activists + Russian Hackers Exploit Zero-Days

Exploit Brokers - Hacking News

Play Episode Listen Later Nov 28, 2024 18:03


Andrew Tate's platform, formerly known as Hustler's University, has been hacked, exposing the data of over 800,000 users. Meanwhile, Russian hackers have exploited critical zero-day vulnerabilities in Firefox and Windows, demonstrating the growing sophistication of cyberattacks. In this video, we'll break down the Andrew Tate hack, the implications of leaked user data, and how Russian threat actors are chaining vulnerabilities for remote code execution. Stay informed on the latest in cybersecurity and learn how to protect yourself against these emerging threats. If you enjoy this content, don't forget to like, comment, and subscribe to stay updated on the latest in digital crime and cybersecurity! #AndrewTate #Cybersecurity #Hackers #DataBreach #ZeroDay #RussianHackers #HustlersUniversity #TheRealWorld #CyberThreats #DigitalSafety #Malware #Hacktivism #DataLeaks #FirefoxExploit #WindowsExploit #NationStateHackers #TechNews #OnlineSecurity #TheRealWorld

PEBCAK Podcast: Information Security News by Some All Around Good People
Episode 177 - Airport Security Bypassed with SQLi, Russian Hackers Use NSO Group Exploits, Users Get Too Good Identifying Phishing, Career Goals

PEBCAK Podcast: Information Security News by Some All Around Good People

Play Episode Listen Later Sep 9, 2024 55:25


Welcome to this week's episode of the PEBCAK Podcast!  We've got four amazing stories this week so sit back, relax, and keep being awesome!  Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast   TSA bypassed by SQL injection attack https://www.bleepingcomputer.com/news/security/researchers-find-sql-injection-to-bypass-airport-tsa-security-checks/  https://xkcd.com/327/ https://arstechnica.com/information-technology/2023/10/sob-story-about-dead-grandma-tricks-microsoft-ai-into-solving-captcha/   Russian APT29 uses commercial spyware exploits https://www.bleepingcomputer.com/news/security/russian-apt29-hackers-use-ios-chrome-exploits-created-by-spyware-vendors/  https://www.darkreading.com/threat-intelligence/commercial-spyware-vendors-have-a-copycat-in-top-russian-apt   People too good at spotting phishing https://krebsonsecurity.com/2024/08/when-get-out-the-vote-efforts-look-like-phishing/  https://krebsonsecurity.com/2018/07/notorious-hijack-factory-shunned-from-web/   Career Goals https://guykawasaki.com/guy-kawasaki/   Dad Joke of the Week (DJOW)   Please share this podcast with someone you know!  It helps us grow the podcast and we really appreciate it!   Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Glenn - https://www.linkedin.com/in/glennmedina/ Jason - https://www.linkedin.com/in/jason-seemann-12b7075/

Cybercrime Magazine Podcast
Cybercrime News For Aug. 5, 2024. Russian Hackers First U.S. Cybercriminal Swap. WCYB Digital Radio

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 5, 2024 2:52


The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

Exploit Brokers - Hacking News
HN33 - CrowdStrike Chaos: Fake Fixes and Malware Attacks

Exploit Brokers - Hacking News

Play Episode Listen Later Jul 25, 2024 17:39


In this episode of Exploit Brokers, we delve into two major cyber stories making headlines. First, we uncover the details behind the recent breach of water facilities by Russian hacktivists and the subsequent U.S. sanctions. Discover the risks posed by SCADA system vulnerabilities and the potential for catastrophic damage to critical infrastructure. Next, we explore the chaos caused by a CrowdStrike update glitch, leading to blue screens of death and widespread disruption. Learn how cybercriminals are exploiting the situation with fake fixes, phishing emails, and malware attacks. Stay informed about the latest threats and gain valuable insights into the world of cybersecurity. Don't forget to like, subscribe, and share to help us spread the word. Also, check out our podcast on Spotify and Apple Podcasts for more in-depth discussions. #CyberSecurity #HackingNews #SCADA #CrowdStrike #Malware #DataBreach #Phishing #CyberThreats #WaterSupply #CriticalInfrastructure #ExploitBrokers #TechNews #CyberAwareness #AI #CyberCrime #DigitalSecurity #ExploitBrokers #TechNews #CyberSecurity #DataBreach #Malware #Hackers #TechEducation #InformationSecurity #CyberSecurity #CyberEspionage #APTGroups #DigitalWarfare #ChineseHackers #CyberCrime #Hacking #Malware #Phishing #ZeroDay #CyberThreats #InformationSecurity #InfoSec #NetworkSecurity #DigitalDefense #CyberAttack #DataBreach #CyberIntelligence #InternetSafety #TechNews #CyberAware #OnlineSecurity #PrivacyProtection #CyberSafety #CyberWar #NationalSecurity #ThreatIntelligence #CyberSovereignty #TechCrimes #CyberAttack #OnlineSafety #EthicalHacking #InternetSecurity #DigitalFraud #Phishing #Ransomware #AIinSecurity #DataProtection #IdentityTheft #CyberDefense #TechTrends #InnovationInTech #DigitalForensics #TechTalk #SecurityBreach #CyberAwareness Sources: * Russia Sanctions due to water facilities hack     * https://www.bleepingcomputer.com/news/security/us-sanctions-russian-hacktivists-who-breached-water-facilities/ * Crowdstrike Phisphing     * https://www.bleepingcomputer.com/news/security/fake-crowdstrike-fixes-target-companies-with-malware-data-wipers/ * Waterhole clip: https://yarn.co/yarn-clip/fa5ea940-7ab9-4b37-b486-5ae8a580061c

Cybercrime Magazine Podcast
Cybercrime News For Jul. 23, 2024. US Sanctions Alleged Russian Hackers. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 23, 2024 3:07


The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

The Daily Decrypt - Cyber News and Discussions
Sp1d3r Hacks Cylance, Google Busts Propaganda, NHS Hit by Russian Hackers

The Daily Decrypt - Cyber News and Discussions

Play Episode Listen Later Jun 12, 2024


In today's episode, we delve into the latest cybersecurity incidents, including Cylance confirming old data sold by Sp1d3r for $750,000, ongoing disruptions in the NHS due to a Russian Qilin ransomware attack, and Google's takedown of coordinated influence campaigns linked to China, Russia, and Indonesia. We also highlight Snowflake account breaches connected to recent data compromises at Advance Auto Parts, Santander, and Ticketmaster. Join us as we explore the implications of these attacks and the latest reports from BleepingComputer, The Guardian, and The Hacker News. References: https://www.bleepingcomputer.com/news/security/cylance-confirms-data-breach-linked-to-third-party-platform/ https://thehackernews.com/2024/06/google-takes-down-influence-campaigns.html https://www.theguardian.com/society/article/2024/jun/11/cyber-attack-on-london-hospitals-to-take-many-months-to-resolve Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/ Logo Design by https://www.zackgraber.com/ Tags: Sp1d3r, Cylance, Snowflake, UNC5537, Google, YouTube, Blogger, Propaganda, Russian hackers, NHS, Disruption, Mitigate Search Phrases: Notorious hacker Sp1d3r data breach Cylance marketing data dark web Snowflake cybersecurity vulnerabilities UNC5537 Snowflake account security Google influence operation crackdown YouTube channel shutdown China propaganda Blogger blog purge misinformation Russia Russian hackers NHS disruption NHS cybersecurity breach recovery Mitigating hacker impact on NHS Cylance confirms data breach linked to 'third-party' platform https://www.bleepingcomputer.com/news/security/cylance-confirms-data-breach-linked-to-third-party-platform/ ---`Flash Briefing: Data Breach Disclosure: Cylance confirmed that data being sold on a hacking forum is legitimate but old, stolen from a third-party platform. The data allegedly includes 34 million customer and employee emails and personally identifiable information. Source: BleepingComputer. Threat Actor Activity: A hacker known as Sp1d3r is selling the stolen data for $750,000. Researchers indicated this data seems to be old marketing information. BlackBerry Cylance stated no current customers or sensitive data are impacted. Source: Dark Web Informer. Snowflake Links: The same threat actor, Sp1d3r, is also selling 3TB of data from Advance Auto Parts, allegedly breached through a Snowflake account. Other recent breaches at Santander, Ticketmaster, and QuoteWizard also link to Snowflake attacks. Source: BleepingComputer. Credential Theft: Attackers used stolen customer credentials to target Snowflake accounts without multi-factor authentication (MFA). Mandiant linked these attacks to a financially motivated threat actor, UNC5537, who has been active since at least 2020. Source: Mandiant. Recommendations: Ensure all accounts, particularly those related to third-party platforms, have MFA enabled. Regularly update and rotate credentials, and implement network allow lists to restrict access to trusted locations. Source: CrowdStrike, Mandiant. Ongoing Notifications: Snowflake and Mandiant have notified around 165 organizations about potential exposure to these attacks, emphasizing the importance of cybersecurity hygiene and proactive measures. Source: Snowflake. Google Takes Down Influence Campaigns Tied to China, Indonesia, and Russia https://thehackernews.com/2024/06/google-takes-down-influence-campaigns.html ---`- Google Takes Down Inauthentic Channels: Google dismantled a coordinated influence operation connected to the People's Republic of China, removing 1,320 YouTube channels and 1,177 Blogger blogs spreading content about China and U.S. foreign affairs. (Source: Google Threat Analysis Group) Influence Operations Linked to Indonesia: Google also terminated accounts linked to two influence operations from Indonesia that supported the ruling party, further showcasing the global nature of these coordinated efforts. (Source: Google Threat Analysis Group) Russian Influence Network Dismantled: Google removed 378 YouTube channels operated by a Russian consulting firm that spread pro-Russia and anti-Ukraine content, highlighting the ongoing digital battlegrounds. (Source: Google Threat Analysis Group) Monetary Motives Behind Fake Content: Financial incentives drove a network linked to individuals from the Philippines and India, spreading English and Norwegian content about food, sports, and lifestyle topics. (Source: Google Threat Analysis Group) Global Influence Campaigns: Networks from Pakistan, France, Russia, and Myanmar also faced shutdowns for spreading politically charged and nationalistic content, illustrating the diverse sources of disinformation. (Source: Google Threat Analysis Group) Meta and OpenAI Disrupt Tel Aviv-Based Operation: Meta and OpenAI disrupted a Tel Aviv-based influence operation dubbed Storm-1099, which targeted U.S. and Canadian audiences with content regarding the Israel-Hamas conflict. (Source: Meta via CyberScoop) Israel's Ministry of Diaspora Affairs Linked: The New York Times reported Israel's Ministry of Diaspora Affairs funded the covert influence campaign with around $2 million, marking another instance of state-sponsored disinformation. (Source: The New York Times) Microsoft Warns of Russian Disinformation: Microsoft warned of increasing Russian disinformation campaigns targeting the 2024 Summer Olympics in Paris, using AI-generated content to undermine the event and spread fear. (Source: Microsoft Threat Analysis Center) Olympics as a Cyber Threat Target: Google-owned Mandiant and Recorded Future identified the Paris Olympics as a high-risk target for cyber threats, including ransomware, espionage, and hacktivist attacks, emphasizing the need for robust cybersecurity measures. (Source: Mandiant and Recorded Future) Cyber-attack on London hospitals to take ‘many months' to resolve https://www.theguardian.com/society/article/2024/jun/11/cyber-attack-on-london-hospitals-to-take-many-months-to-resolve --- Cyber-attack Impact Duration: A senior NHS source warned that the cyber-attack disrupting hospitals and GP surgeries in London may take "many months" to resolve. Key recovery factors: understanding hacker access, affected records, and data retrievability. Scope and Perpetrators: Six NHS trusts and numerous GP practices in south-east London, serving 2 million patients, are affected. Russian Qilin gang believed responsible, using ransomware to lock systems and demand money for decryption keys. Service Disruptions: Critical incident declared due to inability to perform non-urgent operations, including cancer procedures and planned C-sections. Blood test analysis severely restricted, forcing rationing and cancellation of many medical procedures. Recovery Challenges: IT systems encrypted by attackers force victims to rebuild infrastructure, even if decrypted. Former NCSC head, Ciaran Martin, noted that recovery from such attacks often takes weeks or months. Mitigation Efforts: NHS London region employs "mutual aid" by redistributing tasks to unaffected trusts to mitigate care delivery impact. Example: Patients with heart issues transferred from affected hospitals to St George's hospital. Leadership Insights: NHS England's chief executive, Amanda Pritchard, emphasized the vulnerability to international events and the critical, often unseen, role of pathology services. Ongoing Threats: Qilin gang typically also steals data, posting it on the dark web for extortion if ransom isn't paid. No data has been posted yet.

Cybercrime Magazine Podcast
Cybercrime News For May 6, 2024. Poland Condemns Russian Hackers. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later May 6, 2024 3:06


The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

Public Key
How Ukrainian Cyber Police are Fighting Russian Hackers

Public Key

Play Episode Listen Later May 2, 2024 24:08


“They want to destroy as many of our systems and resources as they can get the access to." - Yevhenii In this episode Ian Andrews (CMO, Chainalysis) speaks to Yevhenii Panchenko (Head of Operational Analysis, Ukraine Cyberpolice Department. Yevhenii discusses the global fight against Russian cyber actors, who target not only Ukraine but also other countries and shares the work his organization is doing to combat cyber threats, including investigating crimes related to fraud, ransomware, and illegal content. He shares the challenges they face in stopping Russian organizations and the importance of international collaboration and volunteers in identifying fraud and scam projects. Yevhenii also announces their new project, SCAMFARI and how they use OSINT to identify crypto fraud and collect data and the impressive features of the DIIA City and the implementation of digital documents in Ukraine.  Minute-by-minute episode breakdown 2 | Discussion on the Ukraine Cyber Police mandate and global nature of cyber threats  5 | Describing Russian cyber attacks on Ukrainian infrastructure  8 | A day in the life of the Ukraine Cyber Police Unit 10 | Russian hackers using cryptocurrency to receive ransoms and evade sanctions  12 | Collaboration with US and  EU agencies and training on using Chainalysis  15 | Discussion on the effectiveness of sanctions on crypto flows  18 | What is Scamfari and how they use OSINT to identify crypto fraud and collect data 21 | Impressive features of the DIIA City and the implementation of digital documents  23 | Recommendations for supporting Ukraine, including cryptocurrency investigation skills  Related resources Check out more resources provided by Chainalysis that perfectly complement this episode of the Public Key. Website: Cyber Police of Ukraine is a law enforcement agency within the Ministry of Internal Affairs of Ukraine dedicated to combating cyber crime. Blog: Summary of Yevhenii Panchenko speech at Chainalysis Links Conference (NYC 2024) Article: Ukraine's cyber police talks crypto, ransomware and documenting war crimes after Russia's invasion Blog: SCAMFARI: This Ukrainian Startup Is Looking to Automate Crypto Crime Reporting Using Smart Contracts, AI Registration: Digital premiere of Links 2024 (NYC Main Stage Content and more - Register Now!) Blog: Crypto Staking Overview: How It Works, Benefits, Risks, and Future Blog - OFAC and Department of State Sanction Nearly 300 Individuals and Entities Involved in Russia's War Machine, One Known to Have Accepted Crypto YouTube: Chainalysis YouTube page Twitter: Chainalysis Twitter: Building trust in blockchain Tik Tok: Building trust in #blockchains among people, businesses, and governments. Telegram: Chainalysis on Telegram  Speakers on today's episode Ian Andrews * Host * (Chief Marketing Officer, Chainalysis)  Yevhenii Panchenko (Head of Operational Analysis, Cyberpolice Department, National Police of Ukraine) This website may contain links to third-party sites that are not under the control of Chainalysis, Inc. or its affiliates (collectively “Chainalysis”). Access to such information does not imply association with, endorsement of, approval of, or recommendation by Chainalysis of the site or its operators, and Chainalysis is not responsible for the products, services, or other content hosted therein. Our podcasts are for informational purposes only, and are not intended to provide legal, tax, financial, or investment advice. Listeners should consult their own advisors before making these types of decisions. Chainalysis has no responsibility or liability for any decision made or any other acts or omissions in connection with your use of this material. Chainalysis does not guarantee or warrant the accuracy, completeness, timeliness, suitability or validity of the information in any particular podcast and will not be responsible for any claim attributable to errors, omissions, or other inaccuracies of any part of such material.  Unless stated otherwise, reference to any specific product or entity does not constitute an endorsement or recommendation by Chainalysis. The views expressed by guests are their own and their appearance on the program does not imply an endorsement of them or any entity they represent. Views and opinions expressed by Chainalysis employees are those of the employees and do not necessarily reflect the views of the company.  

The Deep Dive Radio Show and Nick's Nerd News
Russian Hackers Hit US Water Plants!

The Deep Dive Radio Show and Nick's Nerd News

Play Episode Listen Later Apr 24, 2024 4:06


Steve Cochran on The Big 89
Russian hackers target water tower in small Texas town

Steve Cochran on The Big 89

Play Episode Listen Later Apr 22, 2024 9:15


A small town in Texas was targeted by Russian hackers who caused their water tower to overflow, sending the message that nowhere is safe. Small towns may be the target because of the lack of updated cybersecurity and software infrastructure. Plus, how did a hack cause the tower to overflow?See omnystudio.com/listener for privacy information.

The President's Daily Brief
April 19th, 2024: Israel Strikes Back, Russian Hackers, & Zelensky's Close Call

The President's Daily Brief

Play Episode Listen Later Apr 19, 2024 18:49


In this episode of The President's Daily Brief: Israel launches its retaliatory strike, striking a target inside the territory of Iran. A pivotal moment at the United Nations Security Council as members prepare to vote on a Palestinian bid for full UN membership. What are the stakes and potential outcomes of this critical vote? Alarming developments in cybersecurity as a report uncovers Russian military hackers targeting water treatment facilities in the U.S., Poland, and France, with a possible breach in Texas. In the Back of the Brief, we delve into Russia's covert operations against Ukraine, including a foiled assassination attempt on Ukrainian President Volodymyr Zelensky by a Polish-based operative. To listen to the show ad-free, become a premium member of The President's Daily Brief by visiting PDBPremium.com. Please remember to subscribe if you enjoyed this episode of The President's Daily Brief. Email: PDB@TheFirstTV.com Learn more about your ad choices. Visit megaphone.fm/adchoices

Federal Drive with Tom Temin
CISA directs agencies to investigate if Russian hackers stole Microsoft account details

Federal Drive with Tom Temin

Play Episode Listen Later Apr 12, 2024 8:30


The Cybersecurity and Infrastructure Security Agency has directed multiple federal agencies to scrub their Microsoft accounts for signs of compromise after Russia-linked hackers potentially accessed agency passwords and other sensitive log-in details. In an emergency directive publicly released today, CISA said multiple federal agencies had their email correspondence with Microsoft stolen by the Russian state-sponsored group “Midnight Blizzard.” CISA said the stolen emails pose a “grave” risk to the federal government. The group gained access to sensitive agency information by compromising Microsoft's corporate email accounts starting in January. The hackers are now trying to use the information in those stolen emails, which include authentication details, to gain additional access to Microsoft customer systems, CISA said. Learn more about your ad choices. Visit megaphone.fm/adchoices

Federal Drive with Tom Temin
CISA directs agencies to investigate if Russian hackers stole Microsoft account details

Federal Drive with Tom Temin

Play Episode Listen Later Apr 12, 2024 7:45


The Cybersecurity and Infrastructure Security Agency has directed multiple federal agencies to scrub their Microsoft accounts for signs of compromise after Russia-linked hackers potentially accessed agency passwords and other sensitive log-in details.In an emergency directive publicly released today, CISA said multiple federal agencies had their email correspondence with Microsoft stolen by the Russian state-sponsored group “Midnight Blizzard.” CISA said the stolen emails pose a “grave” risk to the federal government.The group gained access to sensitive agency information by compromising Microsoft's corporate email accounts starting in January. The hackers are now trying to use the information in those stolen emails, which include authentication details, to gain additional access to Microsoft customer systems, CISA said. Learn more about your ad choices. Visit podcastchoices.com/adchoicesSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Cybercrime Magazine Podcast
Cybercrime News For Mar. 20, 2024. Russian Hackers Exploit Windows Feature. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Mar 20, 2024 3:42


The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

The Other Side Of The Firewall
Russian Hackers Breach Microsoft

The Other Side Of The Firewall

Play Episode Listen Later Mar 11, 2024 8:36


In this episode, Ryan and Shannon discuss the recent theft of Microsoft's source code by Russian government hackers. They highlight the use of password spraying and the lack of lockouts as a vulnerability that allowed the attack to occur. They also emphasize Microsoft's global presence and the potential impact of the breach on various countries and organizations. The delayed detection of the attack raises concerns about Microsoft's security measures. The conversation explores the ongoing investigation and the need for more information. Lessons learned from the incident and the potential future threats are discussed, including the importance of access control and privileged accounts. Takeaways Password spraying and the lack of lockouts can leave organizations vulnerable to attacks. Microsoft's global presence makes it a prime target for hackers. Delayed detection of attacks can have serious consequences. Access control and privileged accounts should be carefully managed to prevent unauthorized access. Article: Microsoft Says Russian Gov Hackers Stole Source Code After Spying on Executive Emails https://www.securityweek.com/microsoft-says-russian-gov-hackers-stole-source-code-after-spying-on-executive-emails/?fbclid=IwAR3Tt7ypxIK2ZxFSk3MaXBz0Ydj0-co1AP09NA8ze1JmK85lscfA38EtKXc Socials: Website - https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/ Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181 Instagram (IG) - https://www.instagram.com/theothersideofthefw/ X (Twitter) - https://twitter.com/Ask_a_CISSP YouTube - https://www.youtube.com/channel/UCXZgdDvlcQ8bP_V4dEF02Yw Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/ Chapters 00:00 Introduction 00:35 Microsoft's Source Code Theft 02:28 Microsoft's Global Presence 03:28 Delayed Detection of the Attack 04:24 Microsoft's Vulnerability and Targeted Attacks 05:30 Incomplete Information and Ongoing Investigation 06:28 Lessons Learned and Future Threats 07:06 Access Control and Privileged Accounts 07:39 Legacy Accounts and Identity Access Management 08:04 Expectations and Follow-up 08:55 Call to Action #cybersecurity #microsoft #russia

Risky Business News
Risky Biz News: Russian hackers stole Microsoft's source code

Risky Business News

Play Episode Listen Later Mar 11, 2024


A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird. You can find the newsletter version of this podcast here.

Risky Business News
Risky Biz News: Russian hackers stole Microsoft's source code

Risky Business News

Play Episode Listen Later Mar 10, 2024 7:34


A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird. You can find the newsletter version of this podcast here.

Computer Talk with TAB
Computer Talk 3-9-24 HR 1

Computer Talk with TAB

Play Episode Listen Later Mar 9, 2024 38:08


Facebook Meltdown, Facebook account takeover,41 State AGs tired of fielding Facebook takeover complaints,  Russian Hackers got more from Microsoft then Microsoft thought, My iPhone battery stinks after update, Is VoIP more secure than POTs service, AI where is it going? Thunderbird Mail Client saying, How do I use an old HD in my new PC?

Radio Sweden
Russian hackers threaten municipality, Swedish neighbors celebrate Nato news, Kiruna church to be relocated, arctic fox missing from zoo

Radio Sweden

Play Episode Listen Later Feb 27, 2024 2:11


A round-up of the main headlines in Sweden on February 27th 2024. You can hear more reports on our homepage www.radiosweden.se, or in the app Sveriges Radio Play. Presenter: Roza BicerProducer: Michael Walsh

Cybercrime Magazine Podcast
Cybercrime News For Feb. 22, 2024. Russian Hackers Target Ukrainian Media. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Feb 22, 2024 2:45


The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

Tech Gumbo
Ingenuity Flies Its Last Mission, Russian Hackers Hit HPE, Toyota Promotes Hydrogen-Powered Cars, Apple's Vision Pro Has Privacy and App Issues

Tech Gumbo

Play Episode Listen Later Feb 5, 2024 21:59


News and Updates: NASA's Mars helicopter has flown its last mission after 72 flights The same Russian hacker that tried to get into Microsoft, try to get into HPE Toyota says Hydrogen-Powered Cars are the future, not EV's Apple's Vision Pro and the data collected are still up for grabs YouTube and Netflix will not build apps for the Vision Pro, for now

AP Audio Stories
HP Enterprise discloses hack by suspected state-backed Russian hackers

AP Audio Stories

Play Episode Listen Later Jan 25, 2024 0:47


AP correspondent Ben Thomas reports on HP Enterprise-Russian Hackers.

Coder Radio
554: The App Store Addiction

Coder Radio

Play Episode Listen Later Jan 24, 2024 58:24


We knew they'd be petulant, but even our expectations were higher than this. We dig into how Apple dunked on devs after last week's show, yet another Microsoft hack, and more.

TechTimeRadio
189: Microsoft leaders' emails were accessed by state-backed Russian hackers. EV Challenges in the cold, Vroom hits the brakes, and in "LETTERS" We Reveal Online Scams, A Look Back at the DeLorean | Air Date: 1/21 - 1/27/24

TechTimeRadio

Play Episode Listen Later Jan 24, 2024 54:55 Transcription Available


Brace yourself for a digital odyssey that's as enlightening as it is entertaining, where cybersecurity meets sub-zero strain on electric vehicles. First, Microsoft is hit with a cyber security attack, and then we dissect the chilling effects of cold weather on EV batteries – a cautionary tale for tech-savvy motorists. But that's not all – we reveal the startling shift of Vroom from car sales to the cutting-edge world of AI and auto financing, a move revving up the industry in unexpected ways. Grab your favorite whiskey glass – you're going to need it when we crack open the underbelly of online scams on LETTERS with Cohosts Mike Gorday and Marc Gregoire. We'll arm you with knowledge and a dash of humor to navigate the murky waters of the internet, sharing personal stories of near-misses with cryptocurrency cons and the importance of a healthy dose of skepticism.As we raise our glasses to National King Day, we'll share the warmth of our Castle & Key Restoration Rye Single Barrel whiskey experience, inviting you to savor the "Hmmm Moment" in technology.Episode 189: Starts at :30In this week's episode, we'll cover a range of topics that will pique your interest. First up, last week, senior Microsoft leaders' emails were accessed by state-backed Russian hackers. Next, we'll be discussing the extreme weather battery alert that has been issued due to the inability of electric vehicle batteries to handle cold temperatures. Then, a primary online car seller hit the brakes on its online used car business to go full throttle on auto financing and AI. We'll be looking at this decision and what it means for the company's future.Later in the show, we'll take a trip down memory lane as we look back at the iconic DeLorean DMC-123. Finally, we have a profanity-laced technology failure that we'll be discussing. We'll be looking at what went wrong and what lessons can be learned from this incident.Stay tuned for all this and more, only on TechTime Radio with Nathan Mumm, the show that makes you go "Humm" Technology news of the week for January 21st - 27th, 2024--- [Now on Today's Show]: Starts at 2:17--- [Top Stories in Technology]: Starts at 4:08Microsoft to overhaul internal security practices after Midnight Blizzard attack - http://tinyurl.com/32k46jbmTesla Batteries Died in the Bitter Cold Weather. It's Another Black Eye for EVs - http://tinyurl.com/45xppw2yVroom hits the brakes on its online used car business to go full throttle on auto financing and AI - http://tinyurl.com/ye4a9df6 --- [Pick of the Day - Whiskey Tasting Reveal]: Starts at 20:32Castle & Key Restoration Rye Single Barrel | 121.9 Proof | $65.00--- [Letters]: Starts at 24:00Mike and Nathan share this week's informative emails that were received during the week. This includes scams, phishing emails, and all-out mistruths disguised as legitimate emails.--- [This Week in Technology]: Starts at 42:08This Week in Technology: January 21, 1981 - Production of DeLorean DMC-12 begins  --- [Marc's Whiskey Mumble]: Starts at 44:17Marc Gregoire's review of this week's whiskey--- [Technology Fail of the Week]: Starts at 47:08This week's “Technology Fail” comes to us from the parcel delivery firm DPD chatbot was rude and was swearing at customers.--- [Mike's Mesmerizing Moment brought to us by StoriCoffee®]: Starts at 50:19 Question: Why do we want things to stay inexpensive?--- [Nathan Nugget]: Starts atRan out of Time--- [Pick of the Day Whiskey Review]: Starts at 52:32Castle & Key Restoration Rye Single Barrel | 121.9 Proof | $65.00Mike: Thumbs UpNathan: Thumbs Up

AP Audio Stories
Microsoft says state-backed Russian hackers accessed emails of senior leadership team members

AP Audio Stories

Play Episode Listen Later Jan 20, 2024 0:55


AP correspondent Jackie Quinn reports on Microsoft Russian Hackers.

Wild Wild Web - Der Pornhub Effekt
#08 The Queen of Russian Hackers

Wild Wild Web - Der Pornhub Effekt

Play Episode Listen Later Jan 10, 2024 49:55


Unsere Reporterin Maria bekommt einen Anruf aus dem Gefängnis. Am Hörer: Eine der gefährlichsten Hackerinnen der Welt. Zumindest wenn man der US-Justiz glaubt. Wer ist Alla Witte wirklich? Und: Kann man aus Versehen zur Hackerin werden?

The CyberWire
Russian hackers hide in Ukraine telecoms for months.

The CyberWire

Play Episode Listen Later Jan 4, 2024 32:00


Sandworm was in Kyivstar's networks for months. Museums face online outages. Emsisoft suggests a ransomware payment ban. An ambulance service suffers a data breach. Mandiant's social media gets hacked. GXC Team's latest offerings in the C2C underground market. 23andMe blames their breach on password reuse. Lawyers are using outdated encryption.  On today's Threat Vector segment, David Moulton chats with Garrett Boyd,  senior consultant at Palo Alto Networks Unit 42  about the importance of internal training and mentorship in cybersecurity. And in Russia, holiday cheers turn to political jeers.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On today's Threat Vector segment with David Moulton features Garrett Boyd, a senior consultant at Unit 42 by Palo Alto Networks with a background as a Marine and professor, discusses the importance of internal training and mentorship in cybersecurity. He provides insights into how training prepares professionals for industry challenges and how mentorship fosters professional growth and innovation. Garrett emphasizes the need for a mentorship culture in organizations and the responsibility of both mentors and mentees in this dynamic. The episode highlights the transformative impact of mentorship through personal experiences and concludes with an invitation for listeners to share their stories and a reminder to stay vigilant in the digital world. Threat Vector To learn what is top of mind each month from the experts at Unit 42 sign up for their Threat Intel Bulletin.  Selected Reading Compromised accounts and C2C markets. Cyberespionage and state-directed hacktivism. (CyberWire) Exclusive: Russian hackers were inside Ukraine telecoms giant for months (Reuters) Hackers linked to Russian spy agency claim cyberattack on Ukrainian cell network (reuters) Museum World Hit by Cyberattack on Widely Used Software (The New York Times) The State of Ransomware in the U.S.: Report and Statistics 2023 (Emsisoft) Nearly 1 million affected by ambulance service data breach (The Record) Mandiant's account on X hacked to push cryptocurrency scam (Bleeping Computer) Cybercriminals Implemented Artificial Intelligence (AI) For Invoice Fraud (Resecurity) 23andMe tells victims it's their fault that their data was breached (TechCrunch+) The Curious Case of MD5 (katelynsills) Firmware prank causes LED curtain in Russia to display ‘Slava Ukraini' — police arrest apartment owner (The Record) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

Emily Chang’s Tech Briefing
Feds seize websites owned by prolific Russian hackers, but will it slow them down?

Emily Chang’s Tech Briefing

Play Episode Listen Later Dec 19, 2023 3:22


Federal officials have seized websites belonging to a prolific Russian hacking group. In today's Tech and Business Report, KCBS Radio news anchor Nikki Medoro spoke to Bloomberg's Jeff Stone for more about the hacking group, called BlackCat, and some of the hacks they have claimed responsibility for.  

Highlights from Ukraine
13 Dec: Zelenskyy visited Norway, new support announced, Kyivstar mobile operator resumed phone calls, Russian hackers connected to special services took responsibility

Highlights from Ukraine

Play Episode Listen Later Dec 14, 2023 4:18


Latest news from 13 December 2023, as reported in the Ukrainian media. Easy ways to support us: Subscribe to our Patreon to give monthly support https://www.patreon.com/highlightsfromukraine Send us a one-time 'thank you' tip via PayPal at: highlightsfromukraine@gmail.com Out YouTube channel: https://bit.ly/3oH111z Special thanks to our top Patreon supporters - Helena Pszczolko O'Callaghan, mattg629, krissi, Jared and Dick Warner!

Cybercrime Magazine Podcast
Cybercrime News For Oct. 3, 2023. Russian Hackers Crash Royal Family's Website. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Oct 3, 2023 4:10


The Cybercrime Magazine Podcast brings you daily cybercrime news that airs each day on WCYB Digital Radio, the first and only 7x24x365 Internet radio station devoted to cybersecurity. Our host keeps you on the cutting edge of cyber with a rundown of the latest cyberattacks, hacks, data breaches, and more. Don't miss an episode! Airs every half-hour on WCYB Digital Radio and every day on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news

Hacker And The Fed
Your Car and Your Sex Life, US Departments of State and Commerce Compromised, Iran and North Korea Hacking Crews, and Victories Over Russian Hackers

Hacker And The Fed

Play Episode Listen Later Sep 14, 2023 65:21


This week on Hacker And The Fed your car may know all the details about your sex life, the Swiss fined an insurer 3 million dollars for horrible cyber security practices, the US Departments of State and Commerce were compromised because of a two-year-old Windows crash report, Iran and New Korea hacking crews have active campaigns against security researchers, and two victories over Russian hackers for the US government. Links from the episode: Insurer Fined $3M for Exposing Data of 650k Clients for Two Years https://www.bleepingcomputer.com/news/security/insurer-fined-3m-for-exposing-data-of-650k-clients-for-two-years/   If You've Got a New Car, It's a Data Privacy Nightmare https://gizmodo.com/mozilla-new-cars-data-privacy-report-1850805416 https://arstechnica.com/cars/2023/09/connected-cars-are-a-privacy-nightmare-mozilla-foundation-says/   Microsoft Finally Explains Cause of Azure Breach: An Engineer's Account Was Hacked https://arstechnica.com/security/2023/09/hack-of-a-microsoft-corporate-account-led-to-azure-breach-by-chinese-hackers/ https://twitter.com/0xdabbad00/status/1699596048392736812   Hacker Group Disguised as Marketing Company to Attack Enterprise Targets https://gbhackers.com/hacker-group-disguised-as-marketing/   Active North Korean Campaign Targeting Security Researchers https://blog.google/threat-analysis-group/active-north-korean-campaign-targeting-security-researchers/   Russian Infosec Boss Gets Nine Years for $100M Insider-Trading Caper Using Stolen Data https://www.theregister.com/AMP/2023/09/08/russian_insider_training_prison/   United States and United Kingdom Sanction Additional Members of the Russia-Based Trickbot Cybercrime Gang https://home.treasury.gov/news/press-releases/jy1714   Support our sponsors: Go to JoinDeleteMe.com/FED and use the code FED20 for 20% off Get your Hacker and the Fed merchandise at hackerandthefed.com Send HATF your questions at questions@hackerandthefed.com

Exploit Brokers - Hacking News
HN 12 - The Dark Side of Hacking: Russian Hackers' Infrastructural Shift and Google AI's Fuzzing

Exploit Brokers - Hacking News

Play Episode Listen Later Aug 24, 2023 14:46


In the Dark Side of Hacking, we take a look at how Russian Hackers have shifted their focus to attacking infrastructure rather than individuals after being identified and putting victims through panic. Google AI launches a new bug hunting strategy called Fuzzing, which uses a machine learning algorithm to search for flaws in software. Fuzzing is a more targeted approach to bug hunting that can be used to find vulnerabilities before they are exploited.   Article: https://exploitbrokers.com/hacking-news/hn-12-the-dark-side-of-hacking-russian-hackers-infrastructural-shift-and-google-ais-fuzzing/    

Why Is This Happening? with Chris Hayes
Decoding The Information Age with Scott Shapiro

Why Is This Happening? with Chris Hayes

Play Episode Listen Later Jul 4, 2023 46:33


You've probably encountered phishing emails or computer viruses. Or maybe one or more of your accounts has been hacked or compromised. How and why do hackers hack and what are they generally seeking? Our guest this week points out that understanding the answers to those questions is essential for making sense of the psychological, economic, political and social effects of cybercrime. Scott Shapiro is Southmayd Professor of Law and Professor of Philosophy at Yale Law School. He is the author of a new book called, “Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks.” The book dives into five historical examples, one of which involves its namesake, Fancy Bear, a Russian cyberintelligence unit responsible for hacking the Democratic National Convention. Shapiro joins WITHpod to discuss some of the biggest inflection points in the history of hacking, why the internet is so vulnerable, the role that generative AI may place in future cybercrime and his thoughts on if we should really be concerned about cyberwar.

Cybercrime Magazine Podcast
Cybercrime News For May 16, 2023. Russian Hackers Take Aim At Sweden. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later May 16, 2023 3:17


The Cybercrime Magazine Podcast brings you daily cybercrime news that airs each day on WCYB Digital Radio, the first and only 7x24x365 Internet radio station devoted to cybersecurity. Our host keeps you on the cutting edge of cyber with a rundown of the latest cyberattacks, hacks, data breaches, and more. Don't miss an episode! Airs every half-hour on WCYB and every day on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news

The Peter Zeihan Podcast Series
Where Are All the Russian Hackers? || Peter Zeihan

The Peter Zeihan Podcast Series

Play Episode Listen Later May 2, 2023 5:00


Since the onset of the Ukraine War, everyone's been checking under their bed and looking in their closet for the boogeyman - a.k.a Russian Hackers - but they haven't been there. Today's video is coming to you from Wānaka, New Zealand. Full Newsletter: https://mailchi.mp/zeihan/where-are-all-the-russian-hackers

The Decibel
Russian hackers are targeting Canada for supporting Ukraine

The Decibel

Play Episode Listen Later Apr 13, 2023 18:24


Canadian officials have been warning since the war in Ukraine began of potential cyber attacks from Russia as retribution for Canada helping Ukraine. This week, at least two Canadian government websites were down, courtesy of Russian hackers, and claims surfaced that Russian hackers had compromised a Canadian gas company.Steven Chase is The Globe's senior parliamentary reporter. He's seen the documents detailing the alleged attack on the Canadian company. He'll tell us about these attacks, and how they fit into Russia's broader plan to punish supporters of Ukraine.Questions? Comments? Ideas? Email us at thedecibel@globeandmail.com