3 friends discussing the important topics in our tiny little lives this week
…
continue reading
Join us for State of Cybercrime, where experts discuss the latest trends and developments in the world of cybercrime and provide insights into how organizations can protect themselves from potential threats. Sponsored by Varonis
…
continue reading
1
ChatGPT Memory Manipulation + Salt Typhoon
28:28
28:28
Na później
Na później
Listy
Polub
Polubione
28:28
Hosts Matt Radolec and David Gibson explain how cybercriminals are manipulating AI models like ChatGPT to plant false memories and steal data, along with other cybercrime-related stories like Salt Typhoon. Salt Typhoon is a Chinese hacking group that has reportedly breached multiple key U.S. broadband providers, raising significant concerns about t…
…
continue reading
THE SECOND PART: Emilio uses his topic to run a surprise D&D game!! what is going on??Autor: Christian, Emilio, Laz
…
continue reading
1
CST: GENE TALK, Ep. 1: Genetics, Military Training, and Talking about kids
1:24:18
1:24:18
Na później
Na później
Listy
Polub
Polubione
1:24:18
Laz misses the beginning, christian is not fit, and emilio has... a surprise ending!!!Autor: Christian, Emilio, Laz
…
continue reading
The North Korean Lazarus group is running multiple high-risk campaigns: one exploiting Windows and another installing malware through fraudulent blockchain job offers. State of Cybercrime hosts Matt Radolec and David Gibson discuss the various APT groups, including a prolific ransomware-as-a-service operation and a Chinese cyber espionage gang know…
…
continue reading
1
SHED JUNKIES, Ep. 1: Sheds, bidets, and hobbies we abandoned
1:37:28
1:37:28
Na później
Na później
Listy
Polub
Polubione
1:37:28
Autor: Christian, Emilio, Laz
…
continue reading
One of us has a duckAutor: Christian, Emilio, Laz
…
continue reading
Matt Radolec and David Gibson discuss how an unknown attacker recently exploited a vulnerability in Proofpoint’s email routing system, allowing them to bypass security measures and send millions of spoofed emails on behalf of major companies. The co-hosts also cover: + The North Korean threat actor hired using AI + The biggest ransomware payment ev…
…
continue reading
Autor: Christian, Emilio, Laz
…
continue reading
In this episode of State of Cybercrime, co-hosts Matthew Radolec and David Gibson dive into the details around LockBit, and cover other news including: + The MOVEit authentication bypass flaw + Developments in the Polyfill supply chain attack affecting millions of websites + Updates on the targeted campaign against Snowflake +A massive insider brea…
…
continue reading
1
StrengthsFinder® Chat, Ep. 1 - Thank you to our sponsor Gallup.com
1:40:11
1:40:11
Na później
Na później
Listy
Polub
Polubione
1:40:11
Autor: Christian, Emilio, Laz
…
continue reading
What are you the Scalabrine of? What is your most pathetic moment? Video StoresAutor: Christian, Emilio, Laz
…
continue reading
1
ELDERS INC. Ep. 1: Dandelions, Shortcuts, Resilience, and Eldership
1:37:57
1:37:57
Na później
Na później
Listy
Polub
Polubione
1:37:57
Autor: Christian, Emilio, Laz
…
continue reading
Snowflake, a cloud storage platform used by some of the largest companies in the world, is investigating a targeted attack on its users who lack multifactor authentication. Join Matt Radolec and David Gibson for an episode of State of Cybercrime in which we discuss the increased attacks on Snowflake customers and share our five-point checklist for …
…
continue reading
1
BURY BERRY TALK Ep. 1: Christian meets the Mayor, nose types, building stuff, and BERRIES
1:21:16
1:21:16
Na później
Na później
Listy
Polub
Polubione
1:21:16
Music: https://soundcloud.com/magicalboombox/reckless-joy-practice-4Autor: Christian, Emilio, Laz
…
continue reading
1
CST PRODUCTS POD, Ep. 1: Best products, muscle memory, and is Christian a psychopath or not?
1:48:45
1:48:45
Na później
Na później
Listy
Polub
Polubione
1:48:45
Thank you to our sponsors "electric kettles" and BarillaAutor: Christian, Emilio, Laz
…
continue reading
1
Exercise Induced Asthma (The Podcast) - Ep. 1: Mormon basketball, being giant in Japan, and dumping your stuff in the lake w/special guest Al Pacino!!
1:40:39
1:40:39
Na później
Na później
Listy
Polub
Polubione
1:40:39
Special thanks to the one and only Al Pacino for his appearance early on. Class actAutor: Christian, Emilio, Laz
…
continue reading
1
MAP TALK with the Country Chicken Lawyer, Ep. 1
1:25:03
1:25:03
Na później
Na później
Listy
Polub
Polubione
1:25:03
We're looking at our towns on a map and asking questionsAutor: Christian, Emilio, Laz
…
continue reading
1
TOOTH TALK with The Toothman Ep. 1: Big life moments, Shogun, and chickens are gross
1:33:03
1:33:03
Na później
Na później
Listy
Polub
Polubione
1:33:03
Autor: Christian, Emilio, Laz
…
continue reading
1
MIXED NUTS ARE ALWAYS ON THE TABLE - Ep. 1: D&D table top and nothing else
1:18:04
1:18:04
Na później
Na później
Listy
Polub
Polubione
1:18:04
Emilio just finished a 6 hour d&d session. He's drunk, he's tired, he's probably incoherent -- LET'S ROLL. (pun intended)Autor: Christian, Emilio, Laz
…
continue reading
1
Iglesias Hour Ep. 1: Cremation, The Star Trek computer is HERE, and do millennials edit because they're anxious?
1:45:32
1:45:32
Na później
Na później
Listy
Polub
Polubione
1:45:32
Autor: Christian, Emilio, Laz
…
continue reading
1
BLADDOW! Ep. 1: Wills, parenting, and being too fat for your clothes
1:35:15
1:35:15
Na później
Na później
Listy
Polub
Polubione
1:35:15
Completely uncensored Real Talk with your hosts CHICO, LAZ, and THA BUTTAutor: Christian, Emilio, Laz
…
continue reading
1
Critical Space Theory, Ep. 1: Gaming, Vacations, and When to Move
1:21:51
1:21:51
Na później
Na później
Listy
Polub
Polubione
1:21:51
Emilio, Christian, and Laz kick off episode one of CST with the important topics of the week and Emilio's Gripe CornerAutor: Christian, Emilio, Laz
…
continue reading
A new data leak of more than 500 documents published to GitHub reveals the big business behind China’s state-sponsored hacking groups — from top-secret surveillance tools to details of offensive cyber ops carried out on behalf of the Chinese government. Join Matt and David for a special State of Cybercrime, which dives into China's espionage campai…
…
continue reading
CISA issued an emergency directive to mitigate Ivanti Connect Secure and Ivanti Policy Secure vulnerabilities after learning of malware targeting the software company, allowing unauthenticated threat actors to access Ivanti VPNs and steal sensitive data. CISA is requiring all federal agencies to disconnect from affected Ivanti products by EOD Febru…
…
continue reading
Enjoy our first State of Cybercrime episode of 2024 as Matt Radolec and David Gibson cover: Who is to blame for 23andMe’s big breach SEC’s X account getting hacked Threat actors swatting patients Varonis Threat Labs research on a new, widespread vulnerability: https://www.varonis.com/blog/outlook-vulnerability-new-ways-to-leak-ntlm-hashes Mentioned…
…
continue reading
In this episode of 'State of Cybercrime', the hosts discuss various topics including an executive order on Artificial Intelligence(AI) by President Biden promoting a balance between AI safety, security, privacy and innovation, as well as implications for American leadership in AI. They covered the disruptive Mozi Botnet, SolarWinds CISO's challenge…
…
continue reading
Few breaches have drawn as much social media fervor as the recent 23andMe incident, in which the genomics company was victim to a massive credential stuffing attack that leveraged leaked and reused passwords to target accounts without MFA. What differentiates this attack from others is that 23andMe itself was not breached, but an entire wave of its…
…
continue reading
Join Matt Radolec and David Gibson for this episode of the State of Cybercrime, recording from Black Hat 2023, as they cover the latest threats you need to know about.Also be sure to check out our webinar, New SEC Cyber Rules: Action Plan for CISOs and CFOs on Tuesday, August 22 | 12 p.m. ET. Link here:https://info.varonis.com/en/webinar/what-the-n…
…
continue reading
The Storm-0558 incident has proven to be even more widespread than initially reported. While Microsoft originally stated that only Outlook.com and Exchange Online were affected, Wiz Research has discovered that the compromised signing key may have allowed the cybercriminal group to forge access tokens for SharePoint, Teams, OneDrive, and every othe…
…
continue reading
A Microsoft zero-day vulnerability has allowed hacking group Storm-0558 to forge Azure AD authentication tokens, and breach organizations — including U.S. government agencies — in the past week.Watch this State of Cybercrime episode to hear our experts break down how this attack happened, see the discoveries made by the Varonis Threat Labs team, an…
…
continue reading
Across the globe, CL0P ransomware group is extorting hundreds of organizations after exploiting an unknown SQL injection vulnerability in file transfer service MOVEit. The victims need to contact the ransomware group by June 14 or their stolen data will be published publicly on the group’s extortion site.Join Matt Radolec, David Gibson, and special…
…
continue reading
In the wake of the U.S. defense leak, the Pentagon CIO has given a one-week deadline for all defense agencies to ensure compliance with DOD information security protocols. But what does that actually mean?Join Matt, David, and Varonis Team Lead Engineer for U.S. Public Sector Trevor Brenn for a State of Cybercrime episode that breaks down what the …
…
continue reading
Links mentioned in this episode: • Video course (free) on building an IR plan: https://info.varonis.com/thank-you/course/cyber-incident-response • Blog post about LockBit: https://www.varonis.com/blog/anatomy-of-a-ransomware-attack • Blog post about HardBit: https://www.varonis.com/blog/hardbit-2.0-ransomware…
…
continue reading
Recent cyberattacks, zero-days, and APTs have positioned China as a cybersecurity adversary.Join Matt Radolec and David Gibson for a special State of Cybercrime episode, during which the two will discuss the recent wave of stealth Chinese cyberattacks against U.S. private networks and what this means for U.S.-Chinese relations in 2023.Matt and Davi…
…
continue reading
Still reeling from last year’s data breach, password manager LastPass recently shared that the same attacker who targeted the organization in August has struck again, this time using stolen data to hack an employee’s home computer. Join Matt Radolec and David Gibson as they walk you through the multi-stage attack, revisiting the discussion of the i…
…
continue reading
We're back! Kind of. We'll soon relaunch this podcast and wanted to give you a quick update on what's happening.Autor: Kelsea Morrison
…
continue reading
Thanks for watching the first season of the security tools podcast! Want more? We're live on the SecurityFwd YouTube channel twice per week! Come hack with us or watch any of the previously recorded streams.Autor: Kody Kinzie
…
continue reading
1
Hacking Through School: College Cybersecurity Jobs with Nick Godshall
49:26
49:26
Na później
Na później
Listy
Polub
Polubione
49:26
Nick's Twitter: https://twitter.com/nickgodshall Kody's Twitter: https://twitter.com/kodykinzie Varonis Cyber Attack Workshop: https://www.varonis.com/cyber-workshop/Autor: Kelsea Morrison
…
continue reading
1
Catching Russian Hackers in Decommissioned Servers with Adrian from Thinkst
50:50
50:50
Na później
Na później
Listy
Polub
Polubione
50:50
Canary Tokens - https://canarytokens.org/generate Learn more about canaries - https://canary.tools/ Adrian's Twitter - https://twitter.com/sawabaAutor: Adrian Sanabria, Kody Kinzie
…
continue reading
1
Breaking Facial Recognition With Vic From F-Secure
58:35
58:35
Na później
Na później
Listy
Polub
Polubione
58:35
Apologies for the scratchy mic! Vic's Blog on Defeating Facial Recognition: https://vicharkness.co.uk/2019/02/01/the-art-of-defeating-facial-detection-systems-part-two-the-art-communitys-efforts/ Check out Vic's Twitter: https://twitter.com/VicHarkness Kody's Twitter: https://twitter.com/kodykinzie Varonis Cyber Attack Workshop: https://www.varonis…
…
continue reading
1
Automating the Fight Against Scammers & Unfair Parking Tickets with DoNotPay
43:54
43:54
Na później
Na później
Listy
Polub
Polubione
43:54
Joshua's Twitter: https://twitter.com/jbrowder1 DoNotPay's website: https://donotpay.com Sue Phone Scammers: https://donotpay.com/learn/robocall-compensation This podcast is brought to you by Varonis, if you'd like to learn more check out the Cyber Attack Lab at https://www.varonis.com/cyber-workshop/…
…
continue reading
1
Hacking the Wi-fi of Today & Tomorrow With Mathy Vanhoef
1:06:49
1:06:49
Na później
Na później
Listy
Polub
Polubione
1:06:49
Mathy's Website: https://www.mathyvanhoef.com Mathy's YouTube Channel: https://twitter.com/vanhoefm Mathy's Paper on Defeating MAC Address Randomization: https://papers.mathyvanhoef.com/asiaccs2016.pdf This podcast is brought to you by Varonis, if you'd like to learn more check out the Cyber Attack Lab at https://www.varonis.com/cyber-workshop/…
…
continue reading
Seytonic's Malduino Website: https://maltronics.com/ Seytonic's Website: https://seytonic.com/ Seytonic's YouTube Channel: https://www.youtube.com/channel/UCW6xlqxSY3gGur4PkGPEUeA This podcast is brought to you by Varonis, if you'd like to learn more check out the Cyber Attack Lab at https://www.varonis.com/cyber-workshop/…
…
continue reading
1
CreepDetector - Detecting Stalkers with Wardriving
47:24
47:24
Na później
Na później
Listy
Polub
Polubione
47:24
Alex's Website: http://alexlynd.com Check out the Creep Detector Video: https://www.youtube.com/watch?v=ug9dHwm3h0s Alex Lynd's Twitter: https://twitter.com/alexlynd Check out Alex's GitHub: https://github.com/AlexLynd This podcast is brought to you by Varonis, if you'd like to learn more check out the Cyber Attack Lab at https://www.varonis.com/cy…
…
continue reading
1
Maltego - Open-source Intelligence and Forensics
50:10
50:10
Na później
Na później
Listy
Polub
Polubione
50:10
Check out Maltego: https://www.maltego.com/ Maltego Twitter: https://twitter.com/maltegohq Check out Maltego use cases: https://docs.maltego.com/support/solutions/articles/15000012022-use-cases This podcast is brought to you by Varonis, if you'd like to learn more check out the Cyber Attack Lab at https://www.varonis.com/cyber-workshop/…
…
continue reading
1
Objective-See - Advanced MacOS Security Tools by Ex-NSA Hacker Patrick Wardle
56:23
56:23
Na później
Na później
Listy
Polub
Polubione
56:23
Check out Objective-See: https://objective-see.com/ Objective-See Twitter: https://twitter.com/objective_see Objective-See Patreon: https://www.patreon.com/objective_see While In Russia: Patrick's RSA talk on hacking journalists - Patrick's Twitter: https://twitter.com/patrickwardle This podcast is brought to you by Varonis, if you'd like to learn …
…
continue reading
1
ESP8266 - The Low-cost Wi-Fi Microchip with a Full TCP/IP Stack
48:52
48:52
Na później
Na później
Listy
Polub
Polubione
48:52
Stefan's Site with links to all of his projects: https://spacehuhn.io/ Twitter: https://twitter.com/spacehuhn YouTube: https://www.youtube.com/channel/UCFmjA6dnjv-phqrFACyI8tw An overview of the ESP8266 https://www.espressif.com/en/products/hardware/esp8266ex/overview Stefan's Github https://github.com/spacehuhn ESP8266 Deauther 2.0 https://github.…
…
continue reading
1
Grabify - the IP Logging, Honeypot Tracking URL Shortener
45:01
45:01
Na później
Na później
Listy
Polub
Polubione
45:01
A honeypot is a tool that acts as bait, luring an attacker into revealing themselves by presenting a seemingly juicy target. In our first Security Tools podcast, we explore a free tool called Grabify that can gather information about scammers or attackers when they click on a honeypot tracking link. https://grabify.link/ https://jlynx.net/ https://…
…
continue reading
We wanted you to be the first to know that next week; we will be back in this same feed with a new security podcast from Varonis. The new Security Tools podcast will keep you up to date with the most exciting and useful tools the Infosec community has to offer. Join us on the new show to hear from the researchers and hackers behind tools like Grabi…
…
continue reading
Summer is approaching, and of course, that’s when we feel the most heat. However, for cybersecurity managers, they feel the heat all the time. They must be right every time because cybercriminals only have to be right once. So summer can potentially feel like it’s year-round for cybersecurity pros and it can cause job burnout. Another problem that …
…
continue reading