Socializing Cybersecurity. Translating Cyber into business terms. Home of the Vigilance Newsletter, the latest Cyber News from the Dark web, research and insider info. We interview Leaders, share True Cyber Crime and provide advice on how to advance your career. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
Mind the Tech ist ein Podcast, der die dunklen Seiten der IT- und Tech-Welt beleuchtet. Dazu zählen legendäre Hackerangriffe, Datendiebstähle und Cyberattacken. Ebenso kommen die unzähligen Geschichten von Menschen auf den Tisch, die es mit Recht und Gesetz im Web nicht so ernst nehmen – und irgendwann die Konsequenzen ihres Handelns zu spüren bekommen. Wir widmen uns Antitrends und Mythen, stellen Entwicklungen im und rund ums Internet in Frage, wägen ab. Denn wir sind fest davon überzeugt: ...
…
continue reading
The Future of Cybercrime is dedicated to helping security practitioners defend their organizations by distilling insights, best practices, and actionable tips from the world’s leading cyber crime experts. This show is brought you by KELA Cyber Threat Intelligence. For more information, visit www.kelacyber.com
…
continue reading
1
Top Cyber Risks in Higher Education
58:17
58:17
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
58:17
John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss …
…
continue reading
Denial of Service attacks are annoying at best, and can endanger people at worst. Usually you need a lot of manpower to launch one, but a new method was developed recently that requires just one machine. Sources: https://pastebin.com/NS7RuYSiChloe Thonus által
…
continue reading
1
Staffel-Finale: Was ist, was bleibt?
17:44
17:44
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
17:44
Erkenntnisse, Zweifel und ein Preis +++++++ Links +++++++ https://www.rnd.de/politik/afd-dominiert-social-media-plattformen-populistische-parolen-treiben-die-interaktion-an-DUN5TA6ZZNDZDN7LGQR7EYNSJM.html https://t3n.de/news/netz-rechts-diese-kennt-antwort-1216257/ https://www.t-online.de/nachrichten/deutschland/id_100356112/bitkom-af d-position-sc…
…
continue reading
Details explained on blockbuster new episodes coming, weekly live-streams and our new Webinar series starts April 30th. Find details at www.CyberCrimeJunkies.com Key topics: Effective ways to protect business from cyber crime, How employees can create insider threats, How intelligence gathering is critical to security, How to stop social engineerin…
…
continue reading
1
Hidden Cyber Security Risks In Software-As-A-Service (SaaS) Platforms
38:08
38:08
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
38:08
How safe are software-as-a-service platforms? Yasir Ali is the Founder and CEO of Polymer, explores hidden cyber security risks in software as a service platforms and innovative ways to reduce risks in software messaging apps. Polymer is a data loss prevention platform for Software-as-a-service platforms. It leverages AI which automates the protect…
…
continue reading
1
How To Plan For Ransomware
40:59
40:59
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
40:59
This episode includes cyber security leader, Chris Gardner a data security and recoverability expert with Rubrik (www.Rubrik.com) and we know it’s something cybercrime junkies will enjoy because it addresses the crux of cyber crime: data protection and ransomware. We dive into what to do after ransomware attack and how to plan up front so you can g…
…
continue reading
Fore more see www.cybercrimejunkies.com Find video of this on YouTube @CyberCrimeJunkiesPodcast Try KiteWorks today at www.KiteWorks.com Don't Miss our Video on this Exciting KiteWorks Offer! Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Quest…
…
continue reading
Change Healthcare is a major medical clearinghouse, nearly half of all insurance transactions go through them, so when ransomware struck the effect was felt all over the healthcare industry. However it gets stranger, as the group responsible seems to have scammed their affiliates and faked a takedown. Sources: https://pastebin.com/PRmnEGnL…
…
continue reading
1
How Business Can Transfer Cyber Risk
41:18
41:18
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
41:18
In this conversation, Jeff Severino and Nathan Borghardt discuss the importance of cyber insurance for small businesses. They share their background and approach to cyber insurance, emphasizing the need for risk transfer. They highlight 12 low-cost measures that small businesses can implement to reduce their cyber risk. The conversation also explor…
…
continue reading
1
UBER Crime Story 2. How Security Leaders Can be Liable.
59:41
59:41
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
59:41
This episode delves into the significance of a major data breach and the trial of Joe Sullivan, Uber's former chief security officer, discussing how Security Leaders can be liable. This conversation discusses the Uber breach and the ongoing trial of Joseph Sullivan, the former chief security officer of Uber The conversation explores how the hacker …
…
continue reading
1
What Happened at UBER. A Crime Story. Part 1
36:33
36:33
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
36:33
This episode explores the rise and controversies of Uber, including its inception, expansion, rebranding, leadership changes, autonomous vehicle program, protests, toxic culture, and legal troubles. It also delves into the significance of a major data breach and the trial of Joe Sullivan, Uber's former chief security officer, who faces criminal cha…
…
continue reading
1
Missing CEO. Dead or Alive.
1:01:30
1:01:30
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:01:30
Story of A dead or missing CEO, Gerald Cotten, CEO of Quadriga CX, the largest Exchange in Canada. Topics: missing ceo dead or alive, the ultimate exit scam, exit scams explained, faking death for cyber crime, exist scams for cyber crime, exist scams explained, why people fake their death, how people change identity, why people change identity, exi…
…
continue reading
Tesla is a tech company as much as it is a car company, which can present unique challenges when trying to incorporate security. Even intended features can end up being major vulnerabilities, like the feature to add a car key to a cell phone. Sources: https://pastebin.com/S7Sb2KCbChloe Thonus által
…
continue reading
1
Start-Up Fraud Stories. How They Caught Elizabeth Holmes.
52:54
52:54
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
52:54
This is story of how they caught Elizabeth Holmes and the rise and fall of THERANOS. From youngest female billionaire to convict. The technology never worked as promised. Was her intent to hope that the tech would “catch up” to what they had promised investors and regulators? Or had Theranos and Elizabeth Holmes crossed the line of NO return when t…
…
continue reading
Ransomware-As-Service. What It’s Really All About. Evil Online. Come inside the minds o f the most notorious ransomware gangs. Topics: best ways to keep up to date on security news, breaking cyber crime news, getting to know the people behind ransomware, how ransomware kills in real life, how to limit cyber attack liability, how to limit liability …
…
continue reading
1
Compliance vs Security. What it Means.
1:07:56
1:07:56
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:07:56
How to Improve Compliance Audits with Security in Mind with special guest Paul Perry. Video episode Here. Paul is a CPA, a Member of the Warren Averett firm and practice leader of the Security, Risk and Controls Group. Paul and his team @ Warren Averett focus on cybersecurity, risk assessments, internal controls & internal for major clients across …
…
continue reading
1
A Story of Innovation in Privacy. Merry Marwig.
55:33
55:33
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
55:33
This is the story of Merry Marwig and Innovative Approaches To Data Privacy. Second Episode in series on Privacy with Merry. Merry Marwig, a privacy professional with DataGrail, discusses how to reduce risk when managing data privacy. She emphasizes the value and power of data, as well as the need for transparency and consent. Merry also discusses …
…
continue reading
1
How To Reduce Risk When Managing Data Privacy. Merry Marwig.
40:42
40:42
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
40:42
Merry Marwig, a privacy professional with DataGrail, discusses how to reduce risk when managing data privacy. We explore the importance of privacy in today's digital world. She shares her personal journey into the field of privacy and highlights the need for awareness and education. Merry explains the impact of privacy harms and the vast amount of …
…
continue reading
1
Why Facebook Was Down. Exit Scams and Cyber Crime.
26:44
26:44
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
26:44
We discuss the recent Facebook outage and explores possible causes, including technical issues and DDoS attacks. The conversation then delves into the importance of reputation for cybercrime gangs and the impact of law enforcement on disrupting their operations. The focus shifts to the exit scam of Black Hat and AlphaV, two prominent cybercrime gan…
…
continue reading
VPN gateways are supposed to securely connect you to an environment, however Ivanti gateways are rather exploitable, and their built in integrity checker may give you a false sense of security. Sources: https://pastebin.com/G7H6f4kLChloe Thonus által
…
continue reading
1
New Ways to Stop Online Predators
42:23
42:23
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
42:23
Joined by covert investigator and analyst with Searchlight Cyber (www.slcyber.io), which helps law enforcement with Dark Web Investigations and Best-selling author, Chris Hadnagy, founder of the Innocent Lives Foundation (www.innocentlivesfoundation.org) who helps law enforcement with ways to help prosecute online predators. We discuss topics on da…
…
continue reading
1
Crime Stories Exposing Cyber Criminals
1:05:11
1:05:11
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:05:11
Top security researcher, Jon DiMaggio of Analyst 1 joins us to discuss his recent findings in Ransomware Diaries Vol 4. https://analyst1.com/ransomware-diaries-volume-4/#Significant_Findings Discussing how to expose cyber criminals how to expose cyber criminals and how he exposed RansomVC, how they caused a class action suit based on fake facts and…
…
continue reading
Lockbit is one of the most notorious ransomware gangs out there, and recently a multinational operation arrested several people involved, stole back extorted cash, and released a decryptor for the ransomware. However, Lockbit isn't quite dead yet. Sources: https://pastebin.com/Y6rTab6RChloe Thonus által
…
continue reading
1
War Games. In Business.
46:51
46:51
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
46:51
This is the story of Lester Chng, CISSP and the Art of How To Use War Games In Business. Topics discussed: how to use war games in business, understanding war game exercises in business, leveraging war games in business, how to use war games in security, how to use war games in cyber security, war games in cyber security, how war games are like tab…
…
continue reading
1
AI Effect on National Security.
39:39
39:39
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
39:39
Paul Eckloff was a US Secret Service Agent for 23 years. 14 of which were spent protecting the US Presidents. Before that? Paul was a High School Teacher. Today? Paul is one of the top leaders with Lexis/Nexis Risk Solutions. Topics discussed: ai effect on national security, us secret service approaches, ai powered social engineering, how ai helps …
…
continue reading
1
US Secret Service in Action. Exclusive.
50:40
50:40
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
50:40
Paul Eckloff was a US Secret Service Agent for 23 years. 14 of which were spent protecting the US Presidents. Before that? Paul was a High School Teacher. Today? Paul is one of the top leaders with Lexis/Nexis Risk Solutions. Topics discussed: us secret service in action, ai effect on national security, us secret service approaches, ai powered soci…
…
continue reading
1
Art of CyberWarfare & Exclusive Insight into LOCKBIT. Expert Jon DiMaggio.
1:15:52
1:15:52
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:15:52
Latest Analysis on LOCKBIT. What to know with expert Jon DiMaggio, Chief Security Strategist at ANALYST 1 on cyberwarfare, LOCKBIT RANSOMWARE GANG and REVIL. VIDEO EPISODE HERE Jon is the best-selling author of The ART of CYBERWARFARE. Grab your copy here. Thank you for being a CCJ! Try KiteWorks today at www.KiteWorks.com Don't Miss our Video on t…
…
continue reading
Email encryption is important for keeping confidential information safe, as well as communicating over unsecured networks, or in potentially hostile nations. One bug in 2017 was able to break this encryption though, exposing the plaintext content of encrypted emails. Sources: https://pastebin.com/UZ2r4Pcq…
…
continue reading
1
The Science Behind Social Engineering. Expert Analysis with Dr Marono
51:02
51:02
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
51:02
The Science Behind Social Engineering. Expert Analysis with Dr Marono We Speak with renowned expert, Dr Abbie Marono on the biological and psychological elements of social engineering and learn practical ways to protect ourselves online. Find out more about Dr Marono, her research and findings at https://www.abbiemarono.com/ Try KiteWorks today at …
…
continue reading