Podcasts about The Shadow Brokers

Hacker group

  • 113PODCASTS
  • 238EPISODES
  • 38mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Dec 29, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about The Shadow Brokers

Latest podcast episodes about The Shadow Brokers

The Cybersecurity Defenders Podcast
#181 - Hacker Holidays: WannaCry

The Cybersecurity Defenders Podcast

Play Episode Listen Later Dec 29, 2024 19:13


In this episode of the Cybersecurity Defenders podcast, we recount some hacker history, and with the help of Marcus Hutchins, tell the story of the WannaCry ransomware attack. The WannaCry ransomware attack was a worldwide cyberattack in May 2017 by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency. It propagated by using EternalBlue, an exploit developed by the United States National Security Agency (NSA) for Windows systems. EternalBlue was stolen and leaked by a group called The Shadow Brokers a month prior to the attack. Researcher Marcus Hutchins discovered the kill switch domain hardcoded in the malware. Registering a domain name for a DNS sinkhole stopped the attack spreading as a worm, because the ransomware only encrypted the computer's files if it was unable to connect to that domain, which all computers infected with WannaCry before the website's registration had been unable to do. While this did not help already infected systems, it severely slowed the spread of the initial infection and gave time for defensive measures to be deployed worldwide, particularly in North America and Asia, which had not been attacked to the same extent as elsewhere.

The CyberWire
The Malware Mash

The CyberWire

Play Episode Listen Later Oct 31, 2024 4:51


Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight  for my malware threat score began to rise  and suddenly to my surprise... It did the Mash  It did the Malware Mash  The Malware Mash  It was a botnet smash  It did the Mash  It caught on 'cause of Flash  The Malware Mash  It did the Malware Mash From the Stuxnet worm squirming toward the near east  to the dark web souqs where the script kiddies feast  the APTs left their humble abodes  to get installed from rootkit payloads.  They did the Mash  They did the Malware Mash  The Malware Mash  It was an adware smash  They did the Mash  It caught on 'cause of Flash  The Malware Mash  They did the Malware Mash The botnets were having fun  The DDoS had just begun  The viruses hit the darknet,  with ransomware yet to come.  The keys were logging, phishing emails abound,  Snowden on chains, backed by his Russian hounds.  The Shadow Brokers were about to arrive  with their vocal group, "The NotPetya Five." They did the Mash  They played the Malware Mash The Malware Mash  It was a botnet smash  They did the Mash  It caught on 'cause of Flash  The Malware Mash  They played the Malware Mash Somewhere in Moscow Vlad's voice did ring  Seems he was troubled by just one thing.  He opened a shell then shook his fist  and said, "Whatever happened to my Turla Trojan twist."  It's now the Mash  It's now the Malware Mash  The Malware Mash  And it's a botnet smash  It's now the Mash  It caught on 'cause of Flash  The Malware Mash  It's now the Malware Mash Now everything's cool, Vlad's a part of the band  And the Malware Mash is the hit of the land.  For you, defenders, this mash was meant to  when you get to my door, tell them Creeper sent you. Then you can Mash  Then you can Malware Mash  The Malware Mash  And be a botnet smash  It is the Mash  Don't you dare download Flash  The Malware Mash  Just do the Malware Mash Learn more about your ad choices. Visit megaphone.fm/adchoices

Hacking Humans
The Malware Mash

Hacking Humans

Play Episode Listen Later Oct 31, 2024 3:51


Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight  for my malware threat score began to rise  and suddenly to my surprise... It did the Mash  It did the Malware Mash  The Malware Mash  It was a botnet smash  It did the Mash  It caught on 'cause of Flash  The Malware Mash  It did the Malware Mash From the Stuxnet worm squirming toward the near east  to the dark web souqs where the script kiddies feast  the APTs left their humble abodes  to get installed from rootkit payloads.  They did the Mash  They did the Malware Mash  The Malware Mash  It was an adware smash  They did the Mash  It caught on 'cause of Flash  The Malware Mash  They did the Malware Mash The botnets were having fun  The DDoS had just begun  The viruses hit the darknet,  with ransomware yet to come.  The keys were logging, phishing emails abound,  Snowden on chains, backed by his Russian hounds.  The Shadow Brokers were about to arrive  with their vocal group, "The NotPetya Five." They did the Mash  They played the Malware Mash The Malware Mash  It was a botnet smash  They did the Mash  It caught on 'cause of Flash  The Malware Mash  They played the Malware Mash Somewhere in Moscow Vlad's voice did ring  Seems he was troubled by just one thing.  He opened a shell then shook his fist  and said, "Whatever happened to my Turla Trojan twist."  It's now the Mash  It's now the Malware Mash  The Malware Mash  And it's a botnet smash  It's now the Mash  It caught on 'cause of Flash  The Malware Mash  It's now the Malware Mash Now everything's cool, Vlad's a part of the band  And the Malware Mash is the hit of the land.  For you, defenders, this mash was meant to  when you get to my door, tell them Creeper sent you. Then you can Mash  Then you can Malware Mash  The Malware Mash  And be a botnet smash  It is the Mash  Don't you dare download Flash  The Malware Mash  Just do the Malware Mash

Christian Historical Fiction Talk
Episode 196 - Michelle Griep Author Chat

Christian Historical Fiction Talk

Play Episode Listen Later Sep 18, 2024 30:12


Christian Historical Fiction Talk is listener supported. When you buy things through this site, we may earn an affiliate commission.Become a patron and enjoy special perks and bonus content.Michelle Griep stops by this week to talk about her new book, Of Gold and Shadows. We discuss how a Christian author deals with supposed curses, her English Garden, and she tells the story of Iron Bridge in England. Patrons hear what makes her a hippie homesteader.Of Gold and Shadows by Michelle GriepThe shadows hold secrets darker than they ever imagined. . . .In 1888 Victorian England, Ami Dalton navigates a clandestine dual life. By day, she strives to establish herself as a respected Egyptologist, overcoming the gender biases that permeate academia. But with a heart for saving black-market artifacts from falling into the wrong hands, she is most often disguised as her alter ego, the Shadow Broker.After eight years in India, Oxford's most eligible bachelor, Edmund Price, has come out of the shadows to run for Parliament and is in search of an Egyptologist to value a newly acquired collection. Expecting a renowned Oxford professor, Edmund instead finds himself entangled with Ami, the professor's determined daughter. As they delve into the treasures, their connection deepens, but trouble emerges when a golden griffin--rumored to bear the curse of Amentuk--surfaces, and they're left to wonder if the curse really is at play, or if something more nefarious is hiding among the shadows. . . ."Don't miss all the romance, adventure, and danger in [this] new page-turner."--JULIE KLASSEN, bestselling author of Shadows of Swanford AbbeyGet your copy of Of Gold and Shadows by Michelle Griep.Michelle Griep is an author, blogger, and occasional super-hero when her cape is clean.Dare I be so bold as to call myself an author? Being that I'm one of those freaks who attended poetry workshops instead of summer camp during my formative years, yes, I will. While other teens busied themselves throwing parties when their parents weren't home, I was the nerd holed up in my room with pen and paper.A RELATIVEI'm a wife of thirty-something years and mother of two sons and two daughters. And yes, it's true…boys are way easier than girls, unless drama is something you crave. The last of my nestlings has flown the homeschooling nest and I'm now a crazy hippy homesteader.A PRINCESSNo, I'm not currently on medication for delusions of grandeur. I am a daughter of a King. Seriously. I take the Bible as inspired truth and that's what it says (Romans 8:16, 17).AN ANGLOPHILEWhat's the deal with me and Great Britain? Beats me. I'm as passionate about anything English as I am about chocolate and java. Oddly enough, I prefer Bronte over Austen, and if you'd like to debate the qualities of Typhoo versus PG Tips, feel free to e-mail me.A CHEFSorry, I did not graduate from the Cordon Bleu. I didn't even cough up the cash to attend. I am, however, a veteran of once-a-month cooking, and you can be, too. Also, if you'd like to email me, I'll send you my favorite brownie recipe. Just go to my contact page and gimme a holler.Visit Michelle's website.Create your podcast today! #madeonzencastr

The Because Fiction Podcast
Episode 362: A Chat with Michelle Griep

The Because Fiction Podcast

Play Episode Listen Later Sep 10, 2024 29:39


One of my all time favorite authors has another book coming out in a couple of weeks, and I for one, am crazy excited to see what she's done with this new series!  Listen in to find out what the Time's Lost Treasures series has in store and more about the first book! note: links may be affiliate links that provide me with a small commission at no extra expense to you.  Author of Dickens reimaginings, Regency stories from a different perspective, the Blackfriars Lane series, and the Monsters & Men series, Michelle Griep is a genius at pulling unexpected stories from the familiar and unfamiliar both. We chatted about Of Gold and Shadows and how it delves into the Egyptology mania of the 19th century.   I can't wait to see what she does with this series!   Of Gold and Shadows by Michelle Griep The shadows hold secrets darker than they ever imagined. . . . In 1888 Victorian England, Ami Dalton navigates a clandestine dual life. By day, she strives to establish herself as a respected Egyptologist, overcoming the gender biases that permeate academia. But with a heart for saving black-market artifacts from falling into the wrong hands, she is most often disguised as her alter ego, the Shadow Broker. After eight years in India, Oxford's most eligible bachelor, Edmund Price, has come out of the shadows to run for Parliament and is in search of an Egyptologist to value a newly acquired collection. Expecting a renowned Oxford professor, Edmund instead finds himself entangled with Ami, the professor's determined daughter. As they delve into the treasures, their connection deepens, but trouble emerges when a golden griffin--rumored to bear the curse of Amentuk--surfaces, and they're left to wonder if the curse really is at play, or if something more nefarious is hiding among the shadows. . . . "Don't miss all the romance, adventure, and danger in [this] new page-turner."--JULIE KLASSEN, bestselling author of Shadows of Swanford Abbey Learn more about Michelle on her WEBSITE and follow her on GoodReads and BookBub. Like to listen on the go? You can find Because Fiction Podcast at: Apple  Castbox  Google Play Libsyn  RSS Spotify Amazon and more!

The Ranger Ryan Show | Trade Paperbacks
Mass Effect 2 | BioWare

The Ranger Ryan Show | Trade Paperbacks

Play Episode Listen Later Aug 17, 2024 9:55


For the game, BioWare changed several gameplay elements and further emphasized third-person shooter aspects, including limited ammunition and regenerable health. In contrast to the exclusive focus on the main story of the original Mass Effect, the developers opted to create a plot where optional missions had as much intensity as the main mission. Mass Effect composer Jack Wall returned to compose Mass Effect 2's music, aiming for a darker and more mature sound to match the game's mood. Mass Effect 2 also supports a variety of downloadable content packs, ranging from single in-game character outfits to entirely new plot-related missions. Notable packs include Kasumi – Stolen Memory, Overlord, Lair of the Shadow Broker, and Arrival.

Modem Mischief
Shadow Brokers

Modem Mischief

Play Episode Listen Later Apr 29, 2024 25:46


On this episode: secret government tools, ransomware, and one of the biggest unsolved hacks of all time. This is the story of the Shadow Brokers. Create, Produced & Hosted by Keith Korneluk Written & Researched by David Burgis Mixed & Mastered by David Swope Theme Song You Are Digital by Computerbandit.

All Things Policy
Cyber Crimes and How to Fight Them | Police Chowki

All Things Policy

Play Episode Listen Later Jul 31, 2023 55:21


As cyberspace grows, cyber crimes have also increased in number and variety. In this episode of Police Chowki, Shrikrishna Upadhyaya quizzes Javeed Ahmad (ex-IPS & ex-DGP of Uttar Pradesh) and Dr. Aravind Chaturvedi (IPS & SP, Vigilance, Uttar Pradesh) on how to classify cyber crimes, aspects of cyber security, how should individuals and organisations protect themselves in the cyber world, and the police organisational structure and investigative methods in solving cyber crime. They also reflect on how cyber crimes are not merely a law & order matters, but a reflection of more significant socioeconomic reasons, in the context of the emergence of cybercrime hubs like Jamtara, Alwar, Nuh, and others. Do follow IVM Podcasts on social media. We are @‌IVMPodcasts on Facebook, Twitter, & Instagram. https://twitter.com/IVMPodcasts https://www.instagram.com/ivmpodcasts/?hl=en https://www.facebook.com/ivmpodcasts/ You can check out our website at https://shows.ivmpodcasts.com/featured Follow the show across platforms: Spotify, Google Podcasts, Apple Podcasts, JioSaavn, Gaana, Amazon Music Do share the word with your folks!  See omnystudio.com/listener for privacy information.

World of DaaS
Nicole Perlroth: Future of Cybersecurity

World of DaaS

Play Episode Listen Later Apr 11, 2023 55:17


Nicole Perlroth was the New York Times' lead cybersecurity reporter for over a decade. She's an advisor to the Department of Homeland Security's Cybersecurity Advisory Committee and the author of the bestselling book This Is How They Tell Me The World Ends.Auren and Nicole discuss the global cyber landscape— which countries have the strongest hacking capabilities, how Ukraine has changed cyber warfare, and where the US stacks up against its adversaries. Nicole also shares insights on personal opsec and recounts her experience tracking down a potential leaker behind the Shadow Brokers hack of the NSA. World of DaaS is brought to you by SafeGraph & Flex Capital. For more episodes, visit safegraph.com/podcastsYou can find Auren Hoffman on Twitter at @auren and Nicole Perlroth on Twitter at @nicoleperlroth.

Authors on the Air Global Radio Network
Author Trace Conger on Now, Appalachia

Authors on the Air Global Radio Network

Play Episode Listen Later Mar 31, 2023 33:00


On the latest episode of Now, Appalachia, Eliot interviews suspense and thriller writer Trace Conger about his new book THE WICKED SIDE. Trace Conger is an award-winning author in the crime, thriller, and suspense genres. He writes the Connor Harding (Thriller) series and the Mr. Finn (PI) series. His Connor Harding series follows freelance “Mirage Man” Connor Harding as he solves problems for the world's most dangerous criminals. The Mr. Finn series follows private investigator Finn Harding as he straddles the fine line between right and wrong. Conger won a Shamus Award for his debut novel, THE SHADOW BROKER. His suspense novella, THE WHITE BOY, won the Fresh Ink Award for Best Novella of 2020.

Now, Appalachia Interview with author Trace Conger

"Now, Appalachia"

Play Episode Listen Later Mar 31, 2023 33:00


On the latest episode of Now, Appalachia, Eliot interviews suspense and thriller writer Trace Conger about his new book THE WICKED SIDE. Trace Conger is an award-winning author in the crime, thriller, and suspense genres. He writes the Connor Harding (Thriller) series and the Mr. Finn (PI) series. His Connor Harding series follows freelance “Mirage Man” Connor Harding as he solves problems for the world's most dangerous criminals. The Mr. Finn series follows private investigator Finn Harding as he straddles the fine line between right and wrong. Conger won a Shamus Award for his debut novel, THE SHADOW BROKER. His suspense novella, THE WHITE BOY, won the Fresh Ink Award for Best Novella of 2020.  --- Support this podcast: https://podcasters.spotify.com/pod/show/eliot-parker/support

Authors on the Air Global Radio Network
Author Trace Conger on Now, Appalachia

Authors on the Air Global Radio Network

Play Episode Listen Later Mar 31, 2023 33:00


On the latest episode of Now, Appalachia, Eliot interviews suspense and thriller writer Trace Conger about his new book THE WICKED SIDE. Trace Conger is an award-winning author in the crime, thriller, and suspense genres. He writes the Connor Harding (Thriller) series and the Mr. Finn (PI) series. His Connor Harding series follows freelance “Mirage Man” Connor Harding as he solves problems for the world's most dangerous criminals. The Mr. Finn series follows private investigator Finn Harding as he straddles the fine line between right and wrong. Conger won a Shamus Award for his debut novel, THE SHADOW BROKER. His suspense novella, THE WHITE BOY, won the Fresh Ink Award for Best Novella of 2020.

The Cybersecurity Defenders Podcast
#20 - Hacker History: WannaCry

The Cybersecurity Defenders Podcast

Play Episode Listen Later Feb 22, 2023 18:32


In this episode of the Cybersecurity Defenders podcast, we recount some hacker history, and with the help of Marcus Hutchins, tell the story of the WannaCry ransomware attack.The WannaCry ransomware attack was a worldwide cyberattack in May 2017 by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency. It propagated by using EternalBlue, an exploit developed by the United States National Security Agency (NSA) for Windows systems. EternalBlue was stolen and leaked by a group called The Shadow Brokers a month prior to the attack. Researcher Marcus Hutchins discovered the kill switch domain hardcoded in the malware. Registering a domain name for a DNS sinkhole stopped the attack spreading as a worm, because the ransomware only encrypted the computer's files if it was unable to connect to that domain, which all computers infected with WannaCry before the website's registration had been unable to do. While this did not help already infected systems, it severely slowed the spread of the initial infection and gave time for defensive measures to be deployed worldwide, particularly in North America and Asia, which had not been attacked to the same extent as elsewhere.The Cybersecurity Defenders Podcast: a show about cybersecurity and the people that defend the internet.

Asynchronous - A Video Game Catch-Up Show
Mass Effect 3 | Earth & Mars (with Adam and Trout a.k.a. Tricksy Wizard!)

Asynchronous - A Video Game Catch-Up Show

Play Episode Listen Later Feb 9, 2023 117:55


To Whom It May Concern,Hello!I wanted to make you aware of a reorganization in the Lair of the Shadow Broker. Moving forward I, Liara T'Soni (she/her), will handle all Shadow Broker business. Please do not come to my ship (located in the atmosphere of Hagalaz) unless you are explicitly invited.I look forward to growing this brand with you and any of your compatriots.All my best,Liara T'SoniShadow BrokerThessia University Class of 2174 (Go Varren!)//Back Witchy Cakes on Kickstarter!Follow Tricksy Wizard!Check out the misadventures of Lord Nigel Montgomery Shepard!Watch AJ & Kim play the intro!//Follow us!The show - https://asynchpod.tumblr.com/Kim - https://ohkimmies.tumblr.com/AJ - https://notajfillari.tumblr.com///Thanks to _amaranthine for our theme music! Listen to his other stuff on bandcamp! - https://amaranthine.bandcamp.com/Follow him on Twitter! - https://twitter.com/_amrnthneThanks to Scout for making our art! Check out her ko-fi! - https://ko-fi.com/humblegoatFollow her on Twitter! - https://twitter.com/humblegoat//Produced & edited by AJ Fillarihttps://theworstgarbage.online/ (00:00) - Intro (02:02) - Check out Witchy Cakes on Kickstarter! (04:35) - The Sweetest Bullshit (28:20) - Histories with the series! (34:30) - The beginning of Mass Effect 3 (34:52) - Earth, Vancouver (50:16) - Back aboard the Normandy (53:40) - Mars (01:15:51) - The Normandy // Post-Mars (01:17:29) - The Citadel (01:24:35) - The Citadel // The Medbay (01:27:21) - The Citadel // The Council & Udina (01:33:24) - The Dream (01:34:53) - The Normandy // Liara & Traynor & Hackett (01:45:20) - The Normandy // James (01:51:24) - And that's it (01:52:46) - Support Witchy Cakes! (01:55:26) - Thanks for listening!

Mysterious Universe
29.02 - MU Podcast - The Enchanted Zone

Mysterious Universe

Play Episode Listen Later Jan 20, 2023 70:41


We enter the "enchanted zone" of reincarnation for this episode and discuss some of the most unusual cases of past life memories. We consider the role of Psi, telepathy, synchronicity and cosmic order in relation to death survival and dive into stories of transplant memories, the Jungle men and the importance of the 700 year cycle. We'll also take a look at "Spyfail" and hear how a deadly mixture of arrogance and ill preparedness has left the world vulnerable to a potentially catastrophic cyber disaster. Links Reincarnation: True Stories of Past Lives Bigelow Institute for Consciousness Studies Essay Contest A Rational Guide to the Best Evidence of Postmortem Survival Beyond Death: The Best Evidence for the Survival of Human Consciousness A Change of Heart Plus+ Extension The extension of the show is EXCLUSIVE to Plus+ Members. To join, click HERE. Spyfail: Foreign Spies, Moles, Saboteurs, and the Collapse of America's Counterintelligence Who Are the Shadow Brokers? Former NSA TAO hacker sentenced to 66 months in prison over Kaspersky Leak Former NSA contractor sentenced to 9 years for theft of government info Learn more about your ad choices. Visit megaphone.fm/adchoices

Hacker And The Fed
The Infamous Shadow Brokers and Apple's New Security Posture

Hacker And The Fed

Play Episode Listen Later Dec 19, 2022 50:27


This week on Hacker And The Fed we discuss the infamous Shadow Brokers, a group (or individual hacker) who compromised the NSA back in 2016. We explore and explain this hack from the perspective of a former FBI agent and a former black hat hacker. We also detail Apple's new security posture deploying end-to-end encryption. -- For more information on Chris and his current work visit naxo.com Follow Hector @hxmonsegur

RPG Fan's Retro Encounter
352 - Mass Effect 2

RPG Fan's Retro Encounter

Play Episode Listen Later Nov 17, 2022 93:56


I am the very model of a sci-fi shooter RPG! From Omega to Luna I'm the zenith and the apogee! 2010's Mass Effect 2 continues the story of Commander Shepard's quest to save the galaxy, but with new crew members, new benefactors, and way more planet scanning. An RPGFan away team discusses Mass Effect 2's villains-turned-allies, new alien cultures, and daring final mission in today's episode of Retro Encounter! Featuring: Michael Sollosi, Wes Iliff, Jonathan Logan; Edited by Anthony KrolikowskiOpening and ending music by Miles MorkriGet in Touch:RPGFan.comRPGFan ShopEmail us: retro@rpgfan.comTwitter: @rpgfancomInstagram: @rpgfancomFacebook: rpgfancomTwitch: rpgfancomRelated Links:Mass Effect 2 on RPGFan

The N7 Project
S2E13 - Yahg Days of Summer (Lair of the Shadow Broker)

The N7 Project

Play Episode Listen Later Sep 13, 2022 42:27


Playthrough Roadmap The Show can be found on twitter or at our website. Discord Patreon Our other projects: Breathing Space, Fading Frontier The Monster Mechanics Podcast Cowboy Classics with Scott Paladin

Asynchronous - A Video Game Catch-Up Show
Mass Effect 2 | The Prodigal, Lair of the Shadow Broker

Asynchronous - A Video Game Catch-Up Show

Play Episode Listen Later Sep 8, 2022 102:39


In an act that shows Miranda does not, in fact, have a Black Heart, Jin and Gourtney Shepard Run Away with Her to save her sister Oriana. A lot of Emotion in that mission. Later, the captains of the Normandy talk to Liara about her Boy Problems and All That, and decide to Make the Most of the Night by hunting down the Shadow Broker. After the mission, Liara tells Gourtney that she could still Really Like Her and that, if Shepard wants, Liara won't Just Come to the Normandy to Dance (if you know what I mean).Carly Rae Jepsen's 2015 Masterpiece:  E·MO·TION'Mass Effect 2: Overlord' Should Have Stayed in 2010 by M. Wesley AlveyWatch Kim stream Mass Effect 2! - https://twitch.tv/ohkimmies//Follow us!The show - https://twitter.com/asynchpodKim - https://twitter.com/OhKimmiesAJ - https://twitter.com/ajfillari//Thanks to _amaranthine for our theme music! Listen to his other stuff on bandcamp! - https://amaranthine.bandcamp.com/Follow him on Twitter! - https://twitter.com/_amrnthneThanks to Scout for making our art! Check out her ko-fi! - https://ko-fi.com/humblegoatFollow her on Twitter! - https://twitter.com/humblegoat//Produced & edited by AJ Fillarihttps://theworstgarbage.online/

TRENDIFIER with Julian Dorey
#99 - This Guy Met With Julian Assange & Edward Snowden | Andy Greenberg

TRENDIFIER with Julian Dorey

Play Episode Listen Later May 12, 2022 179:10


(***TIMESTAMPS & Book Links in description below) ~ Andy Greenberg is an award-winning reporter, author, and hacking expert. Currently, Andy is a senior writer for WIRED, covering security, privacy, and information freedom. Throughout his career at Wired (and Forbes before that), Greenberg has been the go-to reporter on major international news stories including: Julian Assange & Wikileaks, Ross Ulbricht & Silk Road, Government-Sponsored hacking in Russia, China, & North Korea –– and the underworld of cryptocurrency. He's the author of “Sandworm” and “This Machine Kills Secrets” –– as well as the forthcoming book “Tracers in the Dark.” Furthermore, he was a main feature in the 2015 Documentary, “Deep Web,” about the downfall of Silk Road. “Sandworm” by Andy Greenberg: https://www.amazon.com/dp/B07GD4MFW2/ref=dp-kindle-redirect?_encoding=UTF8&btkr=1  “This Machine Kills Secrets” by Andy Greenberg: https://rb.gy/4k2suv  ***TIMESTAMPS*** 0:00 - Intro; Andy remembers his first book about Wikileaks; The 2010 Collateral Murder Wikileaks drop; The Cypherpunks 18:03 - Andy talks about when Wikileaks came on his radar; How Andy got into contact with Julian Assange and landed 2010 in person interview with him in London; Andy talks about his sitdown Assange and what he thinks of him; How Wikileaks operates 43:54 - US Bias in Wikileaks reporting?; Assange and his impact on the 2016 election with the DNC email hack; Did Assange know who the source of the hack was?; Guccifer and how the DNC hack went down; The “religious” nature of the hacking argument 1:02:03 - How Andy came to discover the Sandworm story and begin reporting on it; The Ukrainian Power Grid takedowns of 2015 and 2016 and how it went down; The three agencies in Russia and where Sandworm fits in 1:23:57 - Andy explains NotPetya and the Ransomware attacks that groups like Sandworm in Russia utilized to hack and create chaos; The Equation Group hackers at the NSA; Zero Day explained; The Shadow Brokers and Eternal Blue; How Sandworm got into Ukraine's power systems in 2015 1:37:48  - Andy tells the story of the 2017 Maersk global NotPetya attack; The downstream effects across many industries from the Maersk attack; The sobering reality of our modern day all-tech world; Andy explains what happened with the NSA's Stuxnet attack on Iranian Nuclear Centrifuges 2:03:30 - Debating the Mutually Assured Destruction argument with respect to the cyberwar; China's activity in international hacking; “If Russia is a hurricane, China is climate change”; North Korea's criminal hacking teams; The White House just put a bounty on Sandworm 2:22:38 - We need a Geneva Convention for Cyber Warfare and Cyber crimes; The Obama and Trump Whitehouse positions on Russian hacking; Andy's conversation about Sandworm with Obama's Cybersecurity Czar J. Michael Daniel 2:39:22 - Boots on the ground  vs cyber on the ground in Ukraine Russia War?; China's place in the Russia Ukraine Conflict; Andy talks about sitting with Edward Snowden in Russia for an interview ahead of his book, “Sandworm”; What's Snowden like? ~ YouTube EPISODES & CLIPS: https://www.youtube.com/channel/UC0A-v_DL-h76F75xik8h03Q ~ Get $150 Off The Eight Sleep Pod Pro Mattress / Mattress Cover (USING CODE: “TRENDIFIER”): https://eight-sleep.ioym.net/trendifier   PRIVADO VPN FOR $4.99/Month: https://privadovpn.com/trendifier/#a_aid=Julian Julian's Instagram: https://www.instagram.com/julianddorey ~ Beat provided by: https://freebeats.io Music Produced by White Hot

Boogieman Buddies
Mass Effect: Before Contact Session 3 - Pilgrimage

Boogieman Buddies

Play Episode Listen Later Apr 25, 2022 137:39


Ahili, Kenzak, and Kunk have agreed to help Deciter, an agent for the elusive Shadow Broker. Their goal is to find Ruumu'Hasa Nar Joyya, a quarian, and convince her to live up to their end of the bargain they struck with the Turian. However, she's not willing to give up so easily. Will the crew manage to find a peaceful solution for once, or will they screw it up again? Music Credits: Intro: Mass Effect Theme - Jack Wall & Sam Hulick Omega: Criminal Elements - Jack Wall Investigation: Finding Samara - Jack Wall Negotiations: Negotiating With Miranda - Jack Wall Party Time: The Normandy - Sam Hulick A Tense Situation: Tension Rising - Chris Lennertz Stealth Mode: Infiltration - Jack Wall Fight Theme 1: Combat Simulator Tier 1 - Sam Hulick End of Session: Reflections - Jack Wall Outro: Farewell and Into the Inevitable - Sam Hulick Support the show on Patreon! For as little as a dollar you get access to all sorts of cool bonus content, and for $5 you get access to episodes a week early. https://www.patreon.com/BoogiemanBuddiesCast

ZD Tech : tout comprendre en moins de 3 minutes avec ZDNet
Wannacry : quand le ransomware passe à la vitesse supérieure

ZD Tech : tout comprendre en moins de 3 minutes avec ZDNet

Play Episode Listen Later Apr 13, 2022 3:20


Bonjour à tous et bienvenue dans le ZDTech, le podcast quotidien de la rédaction de ZDNet. Je m'appelle Louis Adam et aujourd'hui, je vais vous expliquer pourquoi l'épidémie du rançongiciel Wannacry a fait date dans l'histoire de la sécurité informatique. Le 12 mai 2017, de nombreux administrateurs systèmes voient rouge. La cause ? Le ransomware Wannacry, qui commence ce matin là à infecter des ordinateurs à travers le monde. Pour les victimes, le résultat est toujours le même : l'ordinateur affecté et les données qu'ils contient deviennent inaccessible et un écran rouge s'affiche, demandant le paiement d'une rançon en bitcoin pour récupérer l'accès aux données.  En 2017, les rançongiciels sont une menace connue. Mais Wannacry se distingue par sa vitesse de prolifération : en l'espace d'une journée, on estime que le logiciel aurait infecté un peu plus de 200 000 machines dans plus de 150 pays. Et tout le monde semble visé, de la PME aux grands hôpitaux britanniques.  Dans cette situation, la réaction ne se fait pas attendre. Microsoft diffuse rapidement un correctif de sécurité visant à combler l'une des vulnérabilités utilisées par Wannacry pour se propager. Des chercheurs analysent le logiciel malveillant et découvrent également un « killswitch », un mécanisme prévu par les concepteurs de Wannacry pour stopper sa propagation. Celui ci est activé et parvient à ralentir la diffusion du logiciel pendant quelques heures, avant que de nouvelles versions n'apparaissent.   Une course contre la montre s'empare du secteur, et le nombre d'infection par Wannacry finit enfin par chuter quelques jours après sa découverte. L'attaque laisse tout de même de nombreuses victimes sur le carreau : les dégâts sont difficiles à estimer mais se comptent en centaines de millions de dollars. Mais l'efficacité de Wannacry n'est pas due au hasard. Celui ci dispose de fonctionnalités lui permettant de se diffuser très rapidement sur les réseaux de ses cibles. Une vitesse de propagation rendue possible par l'utilisation de deux outils connus sous les noms d'Eternal Blue et de Doublepulsar.  Il s'agit de logiciels développés par la NSA, l'agence américaine du renseignement, et diffusés publiquement sur le web par le mystérieux groupe des Shadow Brokers au milieu de l'année 2016. Eternalblue exploite notamment une faille de sécurité qui permet à Wannacry de se propager à la vitesse de l'éclair. Cette vulnérabilité avait pourtant été corrigée quelques semaines auparavant, mais rien dans les indications de Microsoft ne laissait penser que ce correctif avait une importance particulière.  Wannacry a été une implacable démonstration des dégâts que pouvait causer une attaque informatique à très grande échelle. Mais l'affaire pose encore de nombreuses questions : les États Unis ont ainsi accusé la Corée du nord d'être à l'origine de cette attaque. Mais certains chercheurs estiment que les créateurs étaient d'origine chinoise.  Et l'objectif final des auteurs de WannaCry n'est toujours pas clair, même aujourd'hui. Le montant des rançons récoltées par les attaquants reste faible, de l'ordre de 100 000 dollars selon certains experts. Soit un chiffre dérisoire en regard des dégâts causés.  Et voilà, normalement on a fait le tour du sujet. Pour en savoir plus, rendez vous sur ZDNet.fr, et retrouvez tous les jours un épisode du ZDTech sur vos plateformes de podcast préférées. 

Squad Goals — A Mass Effect Legendary Edition
#40: Broking Bad: On the Shadow Broker DLC

Squad Goals — A Mass Effect Legendary Edition

Play Episode Listen Later Mar 21, 2022 66:00


Liara drags Shepard into her quest to make a run at the Shadow Broker and pits them against a rogue Spectre and a Yahg.

RNZ: Standing Room Only
Thriller writer Tina Clough

RNZ: Standing Room Only

Play Episode Listen Later Feb 27, 2022 13:17


A new novel invites us to fast forward four years. State surveillance is everywhere in Aotearoa, and if you dare to search for evidence of government corruption you could end up on the Kill List. That's the premise for Tina Clough's new thriller, The Shadow Broker. When Minnie finds a burner phone and starts to read suspicious coded messages, she turns to her friend Rumble to help her to make sense of them. Lynn Freeman asks Tina why she set the story just four years in the future, and how scarily prescient the plot seems to be.

Bookenz
Bookenz - Tina Clough and Sue Allison

Bookenz

Play Episode Listen Later Feb 21, 2022 25:33


Ruth chats with crime writer Tina Clough about her new book ' The Shadow Broker' and Morrin talks with Sue Allison about her book ' Friends In Deed'

Mass Effect Lorecast: Video Game Lore, News & More
29: Factions: The Shadow Broker

Mass Effect Lorecast: Video Game Lore, News & More

Play Episode Listen Later Oct 19, 2021 70:08


The Shadow Broker - a mysterious title for a mysterious person, entity, position, group? We reveal everything we know about who they are, how they came to power, and what effect they have had on the Mass Effect universe. Subscribe so you don't miss any Mass Effect Lorecast Podcast episodes, lore, and other Mass Effect content from Robots Radio! Support us on Patreon! https://patreon.com/masseffectlorecast Storyblocks.com: Storyblocks.com/robotsradio Want to support the show for no extra cost? Use the link to sign up for Game Pass now! Click: http://bit.ly/XBGPass Join us LIVE Sunday 10:30pm EST / 7:30pm PST: https://twitch.tv/robotsradio Discord: https://discord.gg/JXKfVhM Twitter: twitter.com/masseffectcast Email: masseffectlorecast@gmail.com Music: Screen Saver by Kevin MacLeod Link: https://incompetech.filmmusic.io/song/5715-screen-saver License: https://filmmusic.io/standard-license ROBOTSRADIO.net Learn more about your ad choices. Visit megaphone.fm/adchoices

Cyber Security Grey Beard
S3E5 Cyber Security Grey Beard Information Security Book Reviews

Cyber Security Grey Beard

Play Episode Listen Later Aug 18, 2021 21:41


Book reviews of four cyber security books published between 2019-2020. Dark Mirror: Edward Snowden and the American Surveillance State by Barton Gellman 2020, The Hacker and The State by Ben Buchanan, 2020, Sandworm by Andy Greenberg, 2019 and The Coming Cyber War by Marc Crudgington, 2020.  These books provide great insight to where we are in the cyber security profession.  They discuss history, technology, and attacks.  Cyber security professionals need to understand the threat landscape.  These books all help with that in their own way.Dark Mirror: https://www.barnesandnoble.com/w/dark-mirror-barton-gellman/1122928803?ean=9780143110477Hacker and The State: https://www.barnesandnoble.com/w/the-hacker-and-the-state-ben-buchanan/1132885872?ean=9780674987555Sandworm: https://www.barnesandnoble.com/w/sandworm-andy-greenberg/1129288539?ean=9780525564638The Coming Cyber War:  https://www.barnesandnoble.com/w/the-coming-cyber-war-marc-crudgington/1137913105?ean=9781735916309PRISM:  https://www.masslive.com/politics/2013/06codename_prism_secret_program_data_mining.htmlShadow Brokers:  https://darkwebjournal.com/shadow-brokers/Stuxnet:  https://www.csoonline.com/article/3218104/what-is-stuxnet-who-created-it-and-how-does-it-work.htmlWiper:  https://iranprimer.usip.org/blog/2019/oct/25/invisible-us-iran-cyber-warFancy Bear: https://www.crowdstrike.com/blog/who-is-fancy-bear/Sandworm: https://resources.infosecinstitute.com/topic/apt-sandworm-notpetya-technical-overview/Gucifer:  https://www.justice.gov/opa/pr/romanian-hacker-guccifer-sentenced-52-months-prison-computer-hacking-crimesEternal Blue: https://www.cisecurity.org/wp-content/uploads/2019/01/Security-Primer-EternalBlue.pdfSands Casino Hack: https://money.cnn.com/2015/02/27/technology/security/iran-hack-casino/index.htmlDNC Hack: https://www.wusa9.com/article/news/russians-hack-the-dnc-a-timeline/65-bd1326a7-7ed5-4cd7-92a3-63eed75f1bd9

The Farm
The Strange Death of John McAfee, Ufology, and Other Oddities w/ David Troy, Lestat, Defango & Recluse

The Farm

Play Episode Listen Later Jul 5, 2021 127:26


Brittany Kaiser, Cambridge Analytica, Shadow Brokers, IARPA, UAREHERE, MUFON, Obama, Obama campaign, 2008 election, Democratic Party, Occupy Wall Street, Ufology, Project Camelot, Project Avalon, Serpo, Tyroan Simpson, Lin Simpson, Thomas Schoenberger, QAnon, Cicada 3301, Kim Dotcom, piracy, cryptography, Discordianism, cypherpunks, alternate reality games, Benjamin Fulford, Robert David Steele, Lisa Clapier, NESARA, Mormonism, the Mighty I Am, mythmaking, Theosophy, cryptocurrencies, Ripple, XRP, Bruno Borges, John McAfee, ShadowBox

The Farm
Inside Cicada 3301 & QAnon w/ Lestat & Recluse

The Farm

Play Episode Listen Later Jun 14, 2021 98:09


alternate reality games, Cicada 3301, cryptography, Thomas Schoenberger, Defango, cypherpunks, cryptocurrencies, Bitcoin, Satoshi Nakamoto, ShadowBox, 2012, Doug Hagmann, QAnon, 4chan, 8chan, Jim Watkins, Ron Watkins, IARPA, Cambridge Analytica, Shadow Brokers, Brittany Kaiser, Michael Flynn, gamejacking

WIRED Security: News, Advice, and More
China Hijacked an NSA Hacking Tool in 2014—and Used It for Years

WIRED Security: News, Advice, and More

Play Episode Listen Later Mar 3, 2021 9:01


The hackers used the agency's EpMe exploit to attack Windows devices years before the Shadow Brokers leaked the agency's zero-day arsenal online.

WIRED Security: News, Advice, and More
China Hijacked an NSA Hacking Tool in 2014—and Used It for Years

WIRED Security: News, Advice, and More

Play Episode Listen Later Mar 3, 2021 9:01


The hackers used the agency’s EpMe exploit to attack Windows devices years before the Shadow Brokers leaked the agency’s zero-day arsenal online.

All TWiT.tv Shows (Video HD)
This Week in Enterprise Tech 432: DevOps Repository Stomps Bad Code with Baby Ducks

All TWiT.tv Shows (Video HD)

Play Episode Listen Later Feb 27, 2021 76:27


Chinese hackers had a hacking tool before it was leaked online Microsoft's free tool for finding SolarWinds malware Maryland sued by tech groups to block digital-ad tax Laser-based random number generators Google invests in Linux kernel devs Treasury nominee Yellen may want to curtail the use of cryptocurrency Nevada to allow big tech "innovation zones" Apple is already working on developing 6G wireless tech Bad UI design costs Citibank $500 million MWC to proceed w/o vaccination requirements GitLab's Sr. Developer Evangelist Brendan O' Leary talks about managing rapid releases without sacrificing code quality Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Brendan O' Leary Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: enterprisetech30.com Melissa.com/twit canary.tools/twit - use code: TWIT

This Week in Enterprise Tech (Video LO)
TWiET 432: DevOps Repository Stomps Bad Code with Baby Ducks - GitLab on the managing rapid releases without sacrificing code quality

This Week in Enterprise Tech (Video LO)

Play Episode Listen Later Feb 27, 2021 76:27


Chinese hackers had a hacking tool before it was leaked online Microsoft's free tool for finding SolarWinds malware Maryland sued by tech groups to block digital-ad tax Laser-based random number generators Google invests in Linux kernel devs Treasury nominee Yellen may want to curtail the use of cryptocurrency Nevada to allow big tech "innovation zones" Apple is already working on developing 6G wireless tech Bad UI design costs Citibank $500 million MWC to proceed w/o vaccination requirements GitLab's Sr. Developer Evangelist Brendan O' Leary talks about managing rapid releases without sacrificing code quality Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Brendan O' Leary Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: enterprisetech30.com Melissa.com/twit canary.tools/twit - use code: TWIT

This Week in Enterprise Tech (MP3)
TWiET 432: DevOps Repository Stomps Bad Code with Baby Ducks - GitLab on the managing rapid releases without sacrificing code quality

This Week in Enterprise Tech (MP3)

Play Episode Listen Later Feb 27, 2021 76:27


Chinese hackers had a hacking tool before it was leaked online Microsoft's free tool for finding SolarWinds malware Maryland sued by tech groups to block digital-ad tax Laser-based random number generators Google invests in Linux kernel devs Treasury nominee Yellen may want to curtail the use of cryptocurrency Nevada to allow big tech "innovation zones" Apple is already working on developing 6G wireless tech Bad UI design costs Citibank $500 million MWC to proceed w/o vaccination requirements GitLab's Sr. Developer Evangelist Brendan O' Leary talks about managing rapid releases without sacrificing code quality Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Brendan O' Leary Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: enterprisetech30.com Melissa.com/twit canary.tools/twit - use code: TWIT

All TWiT.tv Shows (Video LO)
This Week in Enterprise Tech 432: DevOps Repository Stomps Bad Code with Baby Ducks

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Feb 27, 2021 76:27


Chinese hackers had a hacking tool before it was leaked online Microsoft's free tool for finding SolarWinds malware Maryland sued by tech groups to block digital-ad tax Laser-based random number generators Google invests in Linux kernel devs Treasury nominee Yellen may want to curtail the use of cryptocurrency Nevada to allow big tech "innovation zones" Apple is already working on developing 6G wireless tech Bad UI design costs Citibank $500 million MWC to proceed w/o vaccination requirements GitLab's Sr. Developer Evangelist Brendan O' Leary talks about managing rapid releases without sacrificing code quality Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Brendan O' Leary Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: enterprisetech30.com Melissa.com/twit canary.tools/twit - use code: TWIT

This Week in Enterprise Tech (Video HD)
TWiET 432: DevOps Repository Stomps Bad Code with Baby Ducks - GitLab on the managing rapid releases without sacrificing code quality

This Week in Enterprise Tech (Video HD)

Play Episode Listen Later Feb 27, 2021 76:27


Chinese hackers had a hacking tool before it was leaked online Microsoft's free tool for finding SolarWinds malware Maryland sued by tech groups to block digital-ad tax Laser-based random number generators Google invests in Linux kernel devs Treasury nominee Yellen may want to curtail the use of cryptocurrency Nevada to allow big tech "innovation zones" Apple is already working on developing 6G wireless tech Bad UI design costs Citibank $500 million MWC to proceed w/o vaccination requirements GitLab's Sr. Developer Evangelist Brendan O' Leary talks about managing rapid releases without sacrificing code quality Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Brendan O' Leary Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: enterprisetech30.com Melissa.com/twit canary.tools/twit - use code: TWIT

All TWiT.tv Shows (Video HI)
This Week in Enterprise Tech 432: DevOps Repository Stomps Bad Code with Baby Ducks

All TWiT.tv Shows (Video HI)

Play Episode Listen Later Feb 27, 2021 76:27


Chinese hackers had a hacking tool before it was leaked online Microsoft's free tool for finding SolarWinds malware Maryland sued by tech groups to block digital-ad tax Laser-based random number generators Google invests in Linux kernel devs Treasury nominee Yellen may want to curtail the use of cryptocurrency Nevada to allow big tech "innovation zones" Apple is already working on developing 6G wireless tech Bad UI design costs Citibank $500 million MWC to proceed w/o vaccination requirements GitLab's Sr. Developer Evangelist Brendan O' Leary talks about managing rapid releases without sacrificing code quality Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Brendan O' Leary Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: enterprisetech30.com Melissa.com/twit canary.tools/twit - use code: TWIT

All TWiT.tv Shows (MP3)
This Week in Enterprise Tech 432: DevOps Repository Stomps Bad Code with Baby Ducks

All TWiT.tv Shows (MP3)

Play Episode Listen Later Feb 27, 2021 76:27


Chinese hackers had a hacking tool before it was leaked online Microsoft's free tool for finding SolarWinds malware Maryland sued by tech groups to block digital-ad tax Laser-based random number generators Google invests in Linux kernel devs Treasury nominee Yellen may want to curtail the use of cryptocurrency Nevada to allow big tech "innovation zones" Apple is already working on developing 6G wireless tech Bad UI design costs Citibank $500 million MWC to proceed w/o vaccination requirements GitLab's Sr. Developer Evangelist Brendan O' Leary talks about managing rapid releases without sacrificing code quality Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Brendan O' Leary Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: enterprisetech30.com Melissa.com/twit canary.tools/twit - use code: TWIT

This Week in Enterprise Tech (Video HI)
TWiET 432: DevOps Repository Stomps Bad Code with Baby Ducks - GitLab on the managing rapid releases without sacrificing code quality

This Week in Enterprise Tech (Video HI)

Play Episode Listen Later Feb 27, 2021 76:27


Chinese hackers had a hacking tool before it was leaked online Microsoft's free tool for finding SolarWinds malware Maryland sued by tech groups to block digital-ad tax Laser-based random number generators Google invests in Linux kernel devs Treasury nominee Yellen may want to curtail the use of cryptocurrency Nevada to allow big tech "innovation zones" Apple is already working on developing 6G wireless tech Bad UI design costs Citibank $500 million MWC to proceed w/o vaccination requirements GitLab's Sr. Developer Evangelist Brendan O' Leary talks about managing rapid releases without sacrificing code quality Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Brendan O' Leary Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: enterprisetech30.com Melissa.com/twit canary.tools/twit - use code: TWIT

Octarine Pod
El Ataque NotPetya - Crimenes Informaticos

Octarine Pod

Play Episode Listen Later Feb 5, 2021 34:45


Como consecuencia de las filtraciones que hicieron los Shadow Brokers, fue posible este ataque de escala global llamado NotPetya. Aqui escucharemos la historia y las consecuencias de ese ataque poderoso y de un alcance inimaginable y con consecuencias reales en la vida diaria de las personas. --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app Support this podcast: https://anchor.fm/octarinepod/support

La French Connection
Episode 0x169 (Hebdo) - 16 janvier 2021

La French Connection

Play Episode Listen Later Jan 22, 2021 62:12


16 janvier 2021 Shameless plug Hackfest 2021 novembre QuebecSec Pisciculture 101 Webinaire Fasken 20 janvier 2021 - 08h30 - Savez-vous garder un secret? La cybersécurité et les secrets commerciaux, enjeux pour l'entreprise d'aujourd'hui Formation de cybersécurité aux entreprises - Séminaire de Sherbrooke - 6-20 février / 13-27 mars 2021 - En ligne Revoyez Hackfest Holiday Event Shownotes and Links CRTC vs zombies ️

Octarine Pod
Crimenes Informaticos: Shadow Brokers

Octarine Pod

Play Episode Listen Later Dec 27, 2020 15:29


No te pierdas la oportunidad de ganarte mi notebook! https://www.octarinecode.com/notebook En esta ocasion vamos a conocer la historia de Shadow Brokers, un grupo de hackers que hackearon nada mas y nada menos que a los hackers de la NSA!! Las repercuciones e implicancias de este hecho han sido gravisimas y al dia de hoy se sufren las consecuencias de las filtraciones que hicieron. --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app Support this podcast: https://anchor.fm/octarinepod/support

Octarine Pod
Shadow Brokers pt2

Octarine Pod

Play Episode Listen Later Dec 27, 2020 16:13


Tras la aparicion de los Shadow Brokers, un grupo de hackers que hackearon nada mas y nada menos que a los hackers de la NSA, el panomarama InfoSec vio un antes y un despues. Las repercuciones e implicancias de este hecho han sido gravisimas y al dia de hoy se sufren las consecuencias de las filtraciones que hicieron. --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app Support this podcast: https://anchor.fm/octarinepod/support

All My Fantasy Children
161. Horace Teldavere: The New Shadow Broker

All My Fantasy Children

Play Episode Listen Later Dec 14, 2020 61:36


Welcome, Junior Wizards! This week, lets visit the charming and humble Cider Creek Delivery Service, a company that helps distribute mail all over the wonderful city of Moon Crescent! There is no way that Horace Teldavere, the person in charge, could ever be involved in the information game being played by the Great Houses of the city. No, that would be so unlikely as its just a small and charming delivery service. Enjoy!

Let's Know Things
Ransomware

Let's Know Things

Play Episode Listen Later Jun 4, 2019 27:49


This week we talk about The Shadow Brokers, patches, and EternalBlue.We also discuss OTA programming, cyberwar, and the NSA's TAO. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit letsknowthings.substack.com/subscribe

WIRED Security: News, Advice, and More
The Elite Microsoft Hacker Team That Keeps Windows PCs Safe

WIRED Security: News, Advice, and More

Play Episode Listen Later Jun 12, 2018 8:42


One of them jailbroke Nintendo handhelds in a former life. Another has more than one zero-day exploit to his name. A third signed on just prior to the devastating Shadow Brokers leak. These are a few of the members of the Windows red team, a group of hackers inside Microsoft who spend their days finding holes in the world's most popular operating system. Without them, you'd be toast.

Mostly Security
013: Android P and network devices as a critical vector

Mostly Security

Play Episode Listen Later Mar 9, 2018 35:27


  Security implications of Google's Android 'P' first developer preview. Newly unclassified documents from 2016 (likely Shadow Broker fallout). Girl Scout cybersecurity badges and drones in Puerto Rico. Links: GitHub DDoS - https://github.com/649/Memcrashed-DDoS-Exploit Android P security features - https://www.theverge.com/2018/3/7/17088394/android-p-developer-preview-notifications-kotlin-microphone Android ecosystem statistics - https://developer.android.com/about/dashboards/index.html Unclassified 2016 'BOD-16-02' - https://twitter.com/RidT/status/970880435411709952 Girl Scouts cybersecurity badges - https://www.nbcnews.com/tech/tech-news/girl-scouts-fight-cybercrime-new-cybersecurity-badge-n852971 Drones in Puerto Rico - https://www.wired.com/story/drones-electricity-puerto-rico/

WIRED Security: News, Advice, and More
Spy v. Spy: An NSA Leak Reveals the Agency's List of Enemy Hackers

WIRED Security: News, Advice, and More

Play Episode Listen Later Mar 7, 2018 9:32


When the still-unidentified group calling itself the Shadow Brokers spilled a collection of NSA tools onto the internet in a series of leaks starting in 2016, they offered a rare glimpse into the internal operations of the the world's most advanced and stealthy hackers. But those leaks haven't just let the outside world see into the NSA's secret capabilities. They might also let us see the rest of the world's hackers through the NSA's eyes.

Task Force 7 Cyber Security Radio
Ep. 9: Are Insiders in U.S. Intelligence Agencies Damaging Our Mission?

Task Force 7 Cyber Security Radio

Play Episode Listen Later Nov 20, 2017 60:35


We dedicate the entire episode to reviewing the damaging leaks of cyber weapons from the CIA and NSA over the last year and a half and how they are being used to attack western businesses and American interests across the globe. We also review what the CIA, NSA, WIkileaks, Bank Security Professionals, and many other cyber security professionals have to say about the leaks and what consumers should be focused on to protect themselves.

The Station Chief: Insights on Global Intelligence
0029-The Station Chief: The Art Of DIstraction

The Station Chief: Insights on Global Intelligence

Play Episode Listen Later Jun 2, 2017 30:58


This Week: Bob Knorpp and Scott Uehlinger discuss Putin's almost-admission, another BAH blunder, a ShadowBrokers' subscription service, and the President's efforts to distract us from Russia.