Artwork

A tartalmat a Risky Creative biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Risky Creative vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.
Player FM - Podcast alkalmazás
Lépjen offline állapotba az Player FM alkalmazással!

Can Attackers really turn safety tools into weapons?

59:05
 
Megosztás
 

Manage episode 519840648 series 3672475
A tartalmat a Risky Creative biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Risky Creative vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.

📢 Subscribe on your favourite platforms and visit https://linktr.ee/riskycreative for more of ∠The Awareness Angle

This week on The Awareness Angle, Ant Davis and Luke Pettigrew break down a wild mix of stories that show how everyday tools are becoming attack surfaces.

This episode digs into the human habits, design gaps and risky shortcuts that make these attacks possible.

🔓 Google Find Hub Used for Remote Wipe

A North Korean group found a way to hijack Google accounts, track victims and remotely wipe Android devices. Ant and Luke talk through how cloud accounts have quietly become the true kill switch for modern phones.

🤖 The First AI Orchestrated Cyber Attack

A Chinese state linked group jailbroke Claude Code and used it to run eighty to ninety percent of a full intrusion chain. No big team. No complex tooling. Just structured tasks and an AI agent that never gets tired.

💸 Checkout dot com Turns Extortion Into Something Positive

Instead of paying, they donated the ransom amount to cybercrime research at Oxford and Carnegie Mellon. A rare example of turning an attack into something that helps the whole community.

📡 Two Billion Credential Dump

HIBP indexes a massive set of recycled passwords and emails. The boys explain why password reuse is still at the root of so many real world breaches.

🔍 Ofcom Monitoring VPN Usage

A UK regulator tracking VPN use with an unnamed vendor. Ant and Luke get into the privacy implications and why transparency matters.

🚌 Chinese Built Buses That Can Be Stopped Remotely

A strange but worrying discovery in Norway. Even legitimate remote access can become a serious operational risk.

🧠 PlusCIISec Live, clever awareness ideas on LinkedIn, why timeless videos still work, and a worrying text scam that shows how vulnerable people are still the biggest targets for social engineering.

#cybersecurity #securityawareness #phishing #podcast #cloudsecurity #passwords #AIsecurity #infosec

🕒 Timestamps:

  • 00:00 Intro and catch up
  • 01:52 Breach Watch begins
  • 02:27 Doctor Alliance healthcare breach
  • 04:02 Synnovis NHS ransomware investigation
  • 07:06 DoorDash social engineering breach
  • 08:56 Checkout dot com extortion attempt
  • 10:10 Synthient credential stuffing dump
  • 13:25 Ofcom monitoring VPN usage
  • 16:20 Chinese built buses can be remotely stopped
  • 21:59 Google Find Hub remote wipe attack
  • 25:55 AI orchestrated espionage using Claude Code
  • 29:55 Scotland launches cyber observatory
  • 31:00 UK Cyber Security and Resilience Bill
  • 35:06 Quantum Route Redirect phishing kit
  • 38:11 Awareness Awareness
  • 40:59 Think and Share challenge
  • 44:34 Right Hand Cyber Halloween posters
  • 47:07 Jimmy Kimmel password clip
  • 50:16 Leanne Potter on language shaping cyber and AI
  • 52:48 Luke’s topic, Lloyds Bank text scam
  • 54:40 Ant’s topic, suspicious car finance email example
  • 58:20 Wrap up

https://www.youtube.com/@riskycreative

🟦 https://www.linkedin.com/company/riskycreative

🟩 https://open.spotify.com/user/riskycreative

📧 [email protected]

🔗 https://www.riskycreative.com

🎵 Our Intro and Outro Song (© 16 by falling forever)

https://fallingforever.bandcamp.com/track/16

License: CC BY 4.0https://creativecommons.org/licenses/by/4.0

  continue reading

61 epizódok

Artwork
iconMegosztás
 
Manage episode 519840648 series 3672475
A tartalmat a Risky Creative biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Risky Creative vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.

📢 Subscribe on your favourite platforms and visit https://linktr.ee/riskycreative for more of ∠The Awareness Angle

This week on The Awareness Angle, Ant Davis and Luke Pettigrew break down a wild mix of stories that show how everyday tools are becoming attack surfaces.

This episode digs into the human habits, design gaps and risky shortcuts that make these attacks possible.

🔓 Google Find Hub Used for Remote Wipe

A North Korean group found a way to hijack Google accounts, track victims and remotely wipe Android devices. Ant and Luke talk through how cloud accounts have quietly become the true kill switch for modern phones.

🤖 The First AI Orchestrated Cyber Attack

A Chinese state linked group jailbroke Claude Code and used it to run eighty to ninety percent of a full intrusion chain. No big team. No complex tooling. Just structured tasks and an AI agent that never gets tired.

💸 Checkout dot com Turns Extortion Into Something Positive

Instead of paying, they donated the ransom amount to cybercrime research at Oxford and Carnegie Mellon. A rare example of turning an attack into something that helps the whole community.

📡 Two Billion Credential Dump

HIBP indexes a massive set of recycled passwords and emails. The boys explain why password reuse is still at the root of so many real world breaches.

🔍 Ofcom Monitoring VPN Usage

A UK regulator tracking VPN use with an unnamed vendor. Ant and Luke get into the privacy implications and why transparency matters.

🚌 Chinese Built Buses That Can Be Stopped Remotely

A strange but worrying discovery in Norway. Even legitimate remote access can become a serious operational risk.

🧠 PlusCIISec Live, clever awareness ideas on LinkedIn, why timeless videos still work, and a worrying text scam that shows how vulnerable people are still the biggest targets for social engineering.

#cybersecurity #securityawareness #phishing #podcast #cloudsecurity #passwords #AIsecurity #infosec

🕒 Timestamps:

  • 00:00 Intro and catch up
  • 01:52 Breach Watch begins
  • 02:27 Doctor Alliance healthcare breach
  • 04:02 Synnovis NHS ransomware investigation
  • 07:06 DoorDash social engineering breach
  • 08:56 Checkout dot com extortion attempt
  • 10:10 Synthient credential stuffing dump
  • 13:25 Ofcom monitoring VPN usage
  • 16:20 Chinese built buses can be remotely stopped
  • 21:59 Google Find Hub remote wipe attack
  • 25:55 AI orchestrated espionage using Claude Code
  • 29:55 Scotland launches cyber observatory
  • 31:00 UK Cyber Security and Resilience Bill
  • 35:06 Quantum Route Redirect phishing kit
  • 38:11 Awareness Awareness
  • 40:59 Think and Share challenge
  • 44:34 Right Hand Cyber Halloween posters
  • 47:07 Jimmy Kimmel password clip
  • 50:16 Leanne Potter on language shaping cyber and AI
  • 52:48 Luke’s topic, Lloyds Bank text scam
  • 54:40 Ant’s topic, suspicious car finance email example
  • 58:20 Wrap up

https://www.youtube.com/@riskycreative

🟦 https://www.linkedin.com/company/riskycreative

🟩 https://open.spotify.com/user/riskycreative

📧 [email protected]

🔗 https://www.riskycreative.com

🎵 Our Intro and Outro Song (© 16 by falling forever)

https://fallingforever.bandcamp.com/track/16

License: CC BY 4.0https://creativecommons.org/licenses/by/4.0

  continue reading

61 epizódok

Minden epizód

×
 
Loading …

Üdvözlünk a Player FM-nél!

A Player FM lejátszó az internetet böngészi a kiváló minőségű podcastok után, hogy ön élvezhesse azokat. Ez a legjobb podcast-alkalmazás, Androidon, iPhone-on és a weben is működik. Jelentkezzen be az feliratkozások szinkronizálásához az eszközök között.

 

Gyors referencia kézikönyv

Hallgassa ezt a műsort, miközben felfedezi
Lejátszás