show episodes
 
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
  continue reading
 
Have you ever clicked on a link you were unsure of, or downloaded a risky attachment? If so, then you are in danger of becoming part of a Botnet, also known as a ‘zombie army'. The term ‘zombie army’ is used to refer to a number of computer networks that have become infected as a result of malicious third party software sneaking onto a user’s computer and then linking it to others to send spam to, or steal data from. ‘How to Survive a Botnets Attack’ is a short animation that explains how to ...
  continue reading
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
  continue reading
 
Artwork

1
Radio Free Security

WatchGuard LiveSecurity Service

Unsubscribe
Unsubscribe
Monthly
 
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
  continue reading
 
Artwork

1
Security Masterminds

Security Masterminds

Unsubscribe
Unsubscribe
Monthly
 
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
  continue reading
 
Artwork
 
Struggling to understand all of the tech buzz words in the news? We break down complex technology concepts into bite-size pieces to talk about how to keep yourself safe online.
  continue reading
 
Hear the epic true tales of how developers, programmers, hackers, geeks, and open source rebels are revolutionizing the technology landscape. Command Line Heroes is an award-winning podcast hosted by Saron Yitbarek and produced by Red Hat. Get root access to show notes, transcripts, and other associated content at https://redhat.com/commandlineheroes
  continue reading
 
Artwork

1
Safe Zone

Brussec Security

Unsubscribe
Unsubscribe
Daily+
 
Welcome to the Safe Zone, a cyber security podcast by Brussec Security where we help businesses and individuals stay safe online. As professional cyber security consultants we help you secure your IT using the latest techniques.
  continue reading
 
This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
  continue reading
 
Artwork

1
Tech Pulse

Tech Pulse Podcasters

Unsubscribe
Unsubscribe
Monthly
 
Hosted by experienced geeks, Tech Pulse is chock full of the hottest industry news, computer tips and tricks, software and hardware picks, and more! Mac or Windows user, professional or hobbyist, you're sure to like this podcast.
  continue reading
 
This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
  continue reading
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings in Japan 2006 was held October 5-6 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Mitsugu Okatani, Joint Staff Office, J6, Japan Defense Agency was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/b ...
  continue reading
 
Loading …
show series
 
Send us a Text Message. Dave Lewis, the global advisory CISO at OnePassword, shares his fascinating journey from the music industry to a thriving career in cybersecurity. With a background in music and a natural curiosity for computers, Dave's unconventional path highlights the diverse entry points into the cybersecurity field. His extensive experi…
  continue reading
 
You can do lot of damage by changing someone's bike gear at the wrong time. A collection of stories including a DIY laser mad science project that aims to replicate a $150,000 piece of equipment, and one of the largest leaks of US Social Security Numbers. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
🚨 AI Propaganda Exposed: How It’s Influencing Elections Right Now! 🚨 In this episode of Exploit Brokers, we dive deep into the unsettling world of AI-driven misinformation campaigns. From targeting voters on both sides to spreading chaos across social media, AI is being weaponized in ways that sound like science fiction but are shockingly real. We’…
  continue reading
 
We're back for Q3 2024. Quick question of the day ... then onto the topics of the day. Topic 1: MIT Releases the AI Risk Repository Thanks to the Massachusetts Institute of Technology for a major resource. It's definitely more for you than your clients. But we see great opportunity here. The public database contains 700+ risks as documented by publ…
  continue reading
 
DEFCON: The Biggest Hacking Event in the World Every year DEFCON, the world’s biggest hacking conference, descends on Las Vegas for a weekend of digital mad science, security, and community building. We braved the desert heat to go find out what it’s all about and to see how many people would talk into a microphone at privacy-centric event. Check o…
  continue reading
 
In this episode of Exploit Brokers, we dive into a significant new threat spreading across the web—Trojan malware hidden in malicious browser extensions. These sneaky extensions are distributed through fake download sites mimicking popular software like Roblox FPS Unlocker, YouTube, VLC, or KeePass. We’ll discuss how these Trojans operate, how they…
  continue reading
 
Send us a Text Message. This is the extra part of the episode where we go through and ask a speed round of questions for not only their insights into cybersecurity, but a little bit of their personal life too! Enjoy! Connect with Jack Rhysider DarkNet Diaries: https://darknetdiaries.com/ X: https://x.com/JackRhysider Connect with us Website: securi…
  continue reading
 
In this episode of Exploit Brokers, we're diving into a new and alarming trend in cybersecurity: Remote Access Trojans (RATs) targeting IT professionals. Discover how malware disguised as legitimate tools is being installed by unsuspecting IT teams, leading to severe breaches and ransomware attacks. We'll explore the tactics used by Hunter's Intern…
  continue reading
 
Send us a Text Message. Want to strengthen your advocacy for privacy protection and cybersecurity awareness? Get ready to hear the solution that will help you achieve this result and empower you to make a difference. Let's dive into it! Jack Rhysider's cybersecurity journey is sparked by a deep concern for data privacy and a desire to advocate for …
  continue reading
 
Hey everyone, welcome back to another episode of Exploit Brokers! In today's video, we're diving deep into some dangerous Android apps you should avoid installing. We'll also explore how AI is being used to detect wildfires and identify AI-generated videos, proving that technology can indeed fight back against digital threats. With the rise of data…
  continue reading
 
In this episode of Exploit Brokers, we delve into two major cyber stories making headlines. First, we uncover the details behind the recent breach of water facilities by Russian hacktivists and the subsequent U.S. sanctions. Discover the risks posed by SCADA system vulnerabilities and the potential for catastrophic damage to critical infrastructure…
  continue reading
 
Send us a Text Message. The bonus episode of the rapid fire questions with Loren Kohnfelder. Connect with Loren Kohnfelder LinkedIn: https://www.linkedin.com/in/kohnfelder/ Designing Secure Software Book: https://a.co/d/07h5nQna Connect with us Website: securitymasterminds.buzzsprout.com KnowBe4 Resources: KnowBe4 Blog: https://blog.knowbe4.com Jam…
  continue reading
 
We got a lot of messages about the Ticketmaster hack that went down since our last episode. We dive into all the weird angles of that evolving story, a strange real time news update about the AT&T hack, and spend a surprising amount of time hyping a Canadian movie about Blackberry. Learn more about your ad choices. Visit podcastchoices.com/adchoice…
  continue reading
 
Send us a Text Message. Do you want to gain a deeper understanding of how PKI, AI, and cryptography are shaping software development? Our special guest is Loren Kohnfelder Loren Kohnfelder's journey into the world of AI and cybersecurity began with an early exposure to mainframe programming at the age of twelve. His fascination with software develo…
  continue reading
 
Few things impact the shape of the internet more than Google Search, yet its inner workings are mostly a mystery. In May, Rand Fishkin received alleged leaked documents that peal back the curtain as to how it works. We speak with Rand Fishkin about his involvement in the Google API leaks. Learn more about your ad choices. Visit podcastchoices.com/a…
  continue reading
 
Send us a Text Message. This is the extra part of the episode where we go through and ask a speed round of questions to Lee for not only his insights into cybersecurity, but a little bit of his personal life too! Enjoy! Connect with Dr. Lee Mangold LinkedIn: https://www.linkedin.com/in/leemangold/ Connect with us Website: securitymasterminds.buzzsp…
  continue reading
 
Topic 1: Massive Botnet Network Taken Down Police coordinated by the European Union's justice and police agencies have taken down computer networks responsible for spreading ransomware via infected emails, in what they called the biggest-ever international operation against the lucrative form of cybercrime. The European Union's judicial cooperation…
  continue reading
 
You've seen the headlines, but what really is AI? We talk about machine learning, large language models, and why you need to be careful browsing the Internet nowadays, even if you haven't jumped in on the AI craze. Links: Clip from the Mitchells vs the Machines: https://www.youtube.com/watch?v=bjj7J18-gv0 Reddit Charting for AI Training Data: https…
  continue reading
 
We discuss a bunch of stories, including the bizarre tale of how an anonymous business registration company let a massive IT scam unfold in the US, a TikTok zero day, Microsoft recall and Apple Private Cloud Compute, and a home-brew cell tower hack in the UK. NOTE: I (JB) misspeak at about 18 minutes in. I say "US" when we're talking about the UK. …
  continue reading
 
🚨 Welcome to Exploit Brokers! 🚨 In this episode, we're diving deep into the hidden world of fake cell towers and the alarming rise of cyber scam slavery. 📡💔 Did you know that your cell phone might be connecting to a fake tower, putting your personal information at risk? We explore a recent case in London where criminals set up a fake cell tower to …
  continue reading
 
Spaz tells us about his early days dabbling in carding, socially engineering various ISPs, and working with affiliate networks. Guest: Spaz Host: Steve Stonebraker Audio Editor: Sam Fox CoverArt: Created by Broast (⁠⁠⁠⁠⁠⁠⁠https://broast.org⁠⁠⁠⁠⁠⁠⁠), original idea by LampGold. -- AOL Underground Podcast Follow us on twitter - ⁠⁠⁠⁠⁠⁠⁠@AOLUnderground⁠…
  continue reading
 
Send us a Text Message. If you're feeling overwhelmed and stressed out about keeping up with new cybersecurity technologies, then you are not alone! The constant flood of new technologies and emerging threats can make it feel like you're falling behind, leaving you feeling exhausted and frustrated. It's time to find a way to cut through the overwhe…
  continue reading
 
It's our third call in episode and we're cooking now. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss accidentally causing internet outages, creating a botnet pandoras box, and the proud tradition of hacking into stuff to play great songs the man does't want you to. Learn more about your ad …
  continue reading
 
Loading …

Quick Reference Guide