Cyber Crime открытые
[search 0]
Больше
Download the App!
show episodes
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies-David Mauro

Unsubscribe
Unsubscribe
Еженедельно+
 
Socializing Cybersecurity. Translating Cyber into business terms. Home of the Vigilance Newsletter, the latest Cyber News from the Dark web, research and insider info. We interview Leaders, share True Cyber Crime and provide advice on how to advance your career. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Artwork

1
Bite Sized Cyber Crime

Chloe Thonus

Unsubscribe
Unsubscribe
Еженедельно
 
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
  continue reading
 
Mind the Tech ist ein Podcast, der die dunklen Seiten der IT- und Tech-Welt beleuchtet. Dazu zählen legendäre Hackerangriffe, Datendiebstähle und Cyberattacken. Ebenso kommen die unzähligen Geschichten von Menschen auf den Tisch, die es mit Recht und Gesetz im Web nicht so ernst nehmen – und irgendwann die Konsequenzen ihres Handelns zu spüren bekommen. Wir widmen uns Antitrends und Mythen, stellen Entwicklungen im und rund ums Internet in Frage, wägen ab. Denn wir sind fest davon überzeugt: ...
  continue reading
 
Artwork
 
The Future of Cybercrime is dedicated to helping security practitioners defend their organizations by distilling insights, best practices, and actionable tips from the world’s leading cyber crime experts. This show is brought you by KELA Cyber Threat Intelligence. For more information, visit www.kelacyber.com
  continue reading
 
Loading …
show series
 
Denial of Service attacks are annoying at best, and can endanger people at worst. Usually you need a lot of manpower to launch one, but a new method was developed recently that requires just one machine. Sources: https://pastebin.com/NS7RuYSiChloe Thonus
  continue reading
 
How safe are software-as-a-service platforms? Yasir Ali is the Founder and CEO of Polymer, explores hidden cyber security risks in software as a service platforms and innovative ways to reduce risks in software messaging apps. Polymer is a data loss prevention platform for Software-as-a-service platforms. It leverages AI which automates the protect…
  continue reading
 
Erkenntnisse, Zweifel und ein Preis +++++++ Links +++++++ https://www.rnd.de/politik/afd-dominiert-social-media-plattformen-populistische-parolen-treiben-die-interaktion-an-DUN5TA6ZZNDZDN7LGQR7EYNSJM.html https://t3n.de/news/netz-rechts-diese-kennt-antwort-1216257/ https://www.t-online.de/nachrichten/deutschland/id_100356112/bitkom-af d-position-sc…
  continue reading
 
This episode includes cyber security leader, Chris Gardner a data security and recoverability expert with Rubrik (www.Rubrik.com) and we know it’s something cybercrime junkies will enjoy because it addresses the crux of cyber crime: data protection and ransomware. We dive into what to do after ransomware attack and how to plan up front so you can g…
  continue reading
 
Fore more see www.cybercrimejunkies.com Find video of this on YouTube @CyberCrimeJunkiesPodcast Try KiteWorks today at www.KiteWorks.com Don't Miss our Video on this Exciting KiteWorks Offer! Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Quest…
  continue reading
 
Change Healthcare is a major medical clearinghouse, nearly half of all insurance transactions go through them, so when ransomware struck the effect was felt all over the healthcare industry. However it gets stranger, as the group responsible seems to have scammed their affiliates and faked a takedown. Sources: https://pastebin.com/PRmnEGnL…
  continue reading
 
In this conversation, Jeff Severino and Nathan Borghardt discuss the importance of cyber insurance for small businesses. They share their background and approach to cyber insurance, emphasizing the need for risk transfer. They highlight 12 low-cost measures that small businesses can implement to reduce their cyber risk. The conversation also explor…
  continue reading
 
This episode delves into the significance of a major data breach and the trial of Joe Sullivan, Uber's former chief security officer, discussing how Security Leaders can be liable. This conversation discusses the Uber breach and the ongoing trial of Joseph Sullivan, the former chief security officer of Uber The conversation explores how the hacker …
  continue reading
 
This episode explores the rise and controversies of Uber, including its inception, expansion, rebranding, leadership changes, autonomous vehicle program, protests, toxic culture, and legal troubles. It also delves into the significance of a major data breach and the trial of Joe Sullivan, Uber's former chief security officer, who faces criminal cha…
  continue reading
 
Story of A dead or missing CEO, Gerald Cotten, CEO of Quadriga CX, the largest Exchange in Canada. Topics: missing ceo dead or alive, the ultimate exit scam, exit scams explained, faking death for cyber crime, exist scams for cyber crime, exist scams explained, why people fake their death, how people change identity, why people change identity, exi…
  continue reading
 
Tesla is a tech company as much as it is a car company, which can present unique challenges when trying to incorporate security. Even intended features can end up being major vulnerabilities, like the feature to add a car key to a cell phone. Sources: https://pastebin.com/S7Sb2KCbChloe Thonus
  continue reading
 
This is story of how they caught Elizabeth Holmes and the rise and fall of THERANOS. From youngest female billionaire to convict. The technology never worked as promised. Was her intent to hope that the tech would “catch up” to what they had promised investors and regulators? Or had Theranos and Elizabeth Holmes crossed the line of NO return when t…
  continue reading
 
How to Improve Compliance Audits with Security in Mind with special guest Paul Perry. Video episode Here. Paul is a CPA, a Member of the Warren Averett firm and practice leader of the Security, Risk and Controls Group. Paul and his team @ Warren Averett focus on cybersecurity, risk assessments, internal controls & internal for major clients across …
  continue reading
 
Ransomware-As-Service. What It’s Really All About. Evil Online. Come inside the minds o f the most notorious ransomware gangs. Topics: best ways to keep up to date on security news, breaking cyber crime news, getting to know the people behind ransomware, how ransomware kills in real life, how to limit cyber attack liability, how to limit liability …
  continue reading
 
This is the story of Merry Marwig and Innovative Approaches To Data Privacy. Second Episode in series on Privacy with Merry. Merry Marwig, a privacy professional with DataGrail, discusses how to reduce risk when managing data privacy. She emphasizes the value and power of data, as well as the need for transparency and consent. Merry also discusses …
  continue reading
 
We discuss the recent Facebook outage and explores possible causes, including technical issues and DDoS attacks. The conversation then delves into the importance of reputation for cybercrime gangs and the impact of law enforcement on disrupting their operations. The focus shifts to the exit scam of Black Hat and AlphaV, two prominent cybercrime gan…
  continue reading
 
Merry Marwig, a privacy professional with DataGrail, discusses how to reduce risk when managing data privacy. We explore the importance of privacy in today's digital world. She shares her personal journey into the field of privacy and highlights the need for awareness and education. Merry explains the impact of privacy harms and the vast amount of …
  continue reading
 
VPN gateways are supposed to securely connect you to an environment, however Ivanti gateways are rather exploitable, and their built in integrity checker may give you a false sense of security. Sources: https://pastebin.com/G7H6f4kLChloe Thonus
  continue reading
 
Joined by covert investigator and analyst with Searchlight Cyber (www.slcyber.io), which helps law enforcement with Dark Web Investigations and Best-selling author, Chris Hadnagy, founder of the Innocent Lives Foundation (www.innocentlivesfoundation.org) who helps law enforcement with ways to help prosecute online predators. We discuss topics on da…
  continue reading
 
Top security researcher, Jon DiMaggio of Analyst 1 joins us to discuss his recent findings in Ransomware Diaries Vol 4. https://analyst1.com/ransomware-diaries-volume-4/#Significant_Findings Discussing how to expose cyber criminals how to expose cyber criminals and how he exposed RansomVC, how they caused a class action suit based on fake facts and…
  continue reading
 
Lockbit is one of the most notorious ransomware gangs out there, and recently a multinational operation arrested several people involved, stole back extorted cash, and released a decryptor for the ransomware. However, Lockbit isn't quite dead yet. Sources: https://pastebin.com/Y6rTab6RChloe Thonus
  continue reading
 
This is the story of Lester Chng, CISSP and the Art of How To Use War Games In Business. Topics discussed: how to use war games in business, understanding war game exercises in business, leveraging war games in business, how to use war games in security, how to use war games in cyber security, war games in cyber security, how war games are like tab…
  continue reading
 
Paul Eckloff was a US Secret Service Agent for 23 years. 14 of which were spent protecting the US Presidents. Before that? Paul was a High School Teacher. Today? Paul is one of the top leaders with Lexis/Nexis Risk Solutions. Topics discussed: ai effect on national security, us secret service approaches, ai powered social engineering, how ai helps …
  continue reading
 
Paul Eckloff was a US Secret Service Agent for 23 years. 14 of which were spent protecting the US Presidents. Before that? Paul was a High School Teacher. Today? Paul is one of the top leaders with Lexis/Nexis Risk Solutions. Topics discussed: us secret service in action, ai effect on national security, us secret service approaches, ai powered soci…
  continue reading
 
Latest Analysis on LOCKBIT. What to know with expert Jon DiMaggio, Chief Security Strategist at ANALYST 1 on cyberwarfare, LOCKBIT RANSOMWARE GANG and REVIL. VIDEO EPISODE HERE Jon is the best-selling author of The ART of CYBERWARFARE. Grab your copy here. Thank you for being a CCJ! Try KiteWorks today at www.KiteWorks.com Don't Miss our Video on t…
  continue reading
 
Email encryption is important for keeping confidential information safe, as well as communicating over unsecured networks, or in potentially hostile nations. One bug in 2017 was able to break this encryption though, exposing the plaintext content of encrypted emails. Sources: https://pastebin.com/UZ2r4Pcq…
  continue reading
 
The Science Behind Social Engineering. Expert Analysis with Dr Marono We Speak with renowned expert, Dr Abbie Marono on the biological and psychological elements of social engineering and learn practical ways to protect ourselves online. Find out more about Dr Marono, her research and findings at https://www.abbiemarono.com/ Try KiteWorks today at …
  continue reading
 
Im Gespräch mit Tobias Fernholz (bpb) +++++++ Links +++++++ 👉 Bundeszentrale für politische Bildung https://www.bpb.de/ 👉 Dossier: Digitale Desinformation (2019) Im Vorfeld von Wahlen stellt sich zunehmend die Frage, welchen Einfluss haben Bots und andere Formen automatisierter Kommunikation auf Meinungsbildung und Wahlentscheidung? Wer kontrollier…
  continue reading
 
Famous Hacks and How To Protect Yourself with Celebrity Hacker Chris Roberts Part 2 EXCLUSIVE CANDID DISCUSSION. In this PART 2 discussion we got the rare chance to sit down in length and learn from one of world’s brightest and most-respected hackers and security experts, Chris Roberts. He also shares some candid exclusive stories on aspects some o…
  continue reading
 
Loading …

Краткое руководство