Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
…
continue reading
Podcasts from the MiSec, OWASP Detroit, and BSides Detroit communities.
…
continue reading
Whitehat is an Inbound Marketing Agency based in London. We work with B2B companies within the pharmaceutical & life science, technology (hardware & software), manufacturing, charity and educational sectors. These companies tend to be located within the UK or continental Europe and have an average turnover of between £5M and £100M. Their sales cycle is often 6 months or more. They typically have an active direct sales team of at least 5 people but with little or no internal marketing capability.
…
continue reading
At Bosses Who Brunch, we talk about the challenges, celebrate the successes, and hear real stories of what it’s like to start a business. Every other week, WhiteHat Magazine's editor-in-chief Chrisella Herzog sits down with an entrepreneur to talk about their path to starting a business, and some of the challenges they've overcome along the way. WhiteHat Magazine is a digital media organization that covers technology for social good and highlights diverse voices in science, tech, and entrepr ...
…
continue reading
The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations are able to make informed decisions. OWASP is in a unique position to provide impartial, practical information about AppSec to individuals, corporations, universities, government agencies, and other organizations worldwide. Operating as a communit ...
…
continue reading
Karan Bajaj is an Indian technology entrepreneur, author, yogi, backpacker and hiker. Best known as founder and CEO of WhiteHat Jr., an Ed-tech company specializing in distance learning which was acquired by BYJU'S in 2020. He has put his visualizations to words in his 4 published novels and intends to plan a career in Public Service. In this podcast we have put voice to articles he published online, aimed at inspiring and guiding young entrepreneurs.
…
continue reading
Welcome! I, Degen is a podcast about crypto technology, security, and culture. With a healthy balance of enthusiasm and skepticism, we cut through the misinformation and hype in search of a signal in the noise. Our weekly round-up will keep you updated on the latest in crypto hacks and security. With our open-source audio audits, we interview founders and hackers to surface relevant info about how to stay safe in crypto land.
…
continue reading
eCommerce tips, tricks, strategies and tactics to help new and experienced eCommerce retailers start, launch or grow their eCommerce Business. If you like eCommerceFuel, Shopify Master, Tropical MBA, Build My Online Store or eCommerce Momentum, you’ll love The Business of eCommerce.
…
continue reading
F-Sides is the annoyingly award-lacking, #1 ranked cybersecurity podcast according to Muscle Car Poetry Magazine...and not coincidentally, the biggest money-losing not-for-profit venture this side of starting an airline. Have you ever thought that Cybersecurity focuses on the wrong things? Every two weeks, join two experienced and often comfortably disagreeing CISOs as they focus on moving the elephant (“human psychology”) in Cyber. If you work in Cyber, are affected by it, or have an intere ...
…
continue reading
1
HN30 - Digital Intruders: The Complex Web of APTs Against ASEAN
24:43
24:43
Play later
Play later
Lists
Like
Liked
24:43
In this thrilling episode of our cybersecurity series, we dive deep into the shadowy world of cyber espionage waged by two Chinese Advanced Persistent Threat (APT) groups against the nations of the Association of Southeast Asian Nations (ASEAN). Discover the tactics employed by infamous threat actors like Mustang Panda in their sophisticated digita…
…
continue reading
1
HN29 - No Honor Among Thieves: The Internal Conflict of Black Cat Ransomware
25:43
25:43
Play later
Play later
Lists
Like
Liked
25:43
Dive into the dark world of cybercrime with our latest episode on Exploit Brokers, where we unravel the complexities of the Black Cat ransomware group and its fallout with Change Healthcare and UnitedHealth Group. Witness the intricacies of digital extortion, the inner workings of cybercriminal networks, and the colossal impact on the healthcare se…
…
continue reading
1
HN28 - Ransomware Alert: Black Cat's Bold Move Against UnitedHealth
20:02
20:02
Play later
Play later
Lists
Like
Liked
20:02
In this gripping episode of Exploit Brokers, we dive deep into the shadows of cyberspace to uncover the resurgence of the notorious Black Cat ransomware group. Following their recent high-profile attack on UnitedHealth's technology unit, Optum, which disrupted prescription deliveries across the United States, Black Cat has declared war against the …
…
continue reading
1
HN27 - Massive Ransomware Empire Crumbles: Inside the Fall of LockBit
24:23
24:23
Play later
Play later
Lists
Like
Liked
24:23
In this explosive episode of Exploit Brokers, we delve into the groundbreaking takedown of LockBit, one of the most formidable names in the ransomware arena. With law enforcement agencies from the US, EU, and beyond joining forces, this rare international operation has sent shockwaves through the cybercrime world. From arrests in Ukraine and France…
…
continue reading
1
HN26 - AI and Cyber Attacks: Unveiling the Tactics of Nation State Hackers
18:01
18:01
Play later
Play later
Lists
Like
Liked
18:01
Welcome back to Exploit Brokers, where we delve deep into the world of cybersecurity, AI, and the digital battlegrounds of our time. In this episode, we're exploring a topic that sounds like it's straight out of a sci-fi movie, but is unfolding in real life: the integration of AI into military and cyber warfare by nation states. With an unprecedent…
…
continue reading
1
HN25 - Hacking Havoc: How Fulton County Became a Real-Life Cyberwar Zone
16:01
16:01
Play later
Play later
Lists
Like
Liked
16:01
Dive into the eye-opening world of cybersecurity as we dissect the recent cyber attack and Hacking Havoc that has plunged Fulton County into turmoil. Witness the frightening resemblance between fictional cyber threats depicted in shows like Mr. Robot and the stark reality facing our digital infrastructures today. This episode of Exploit Brokers tak…
…
continue reading
1
HN24 - Sandwich Data Breach Alert: Jason's Deli & Subway Under Attack
20:19
20:19
Play later
Play later
Lists
Like
Liked
20:19
🔒 Dive into the world of cybersecurity as we uncover the latest threats facing businesses in today's digital landscape. In this video, we dissect the Jason's Deli data breach, shedding light on the dangers of credential stuffing attacks. Discover how hackers exploit weak password habits and gain access to personal data, leaving thousands of custome…
…
continue reading
1
HN23 - One Click Away: The Alarming Reality of Data Theft Exploits
14:58
14:58
Play later
Play later
Lists
Like
Liked
14:58
In this eye-opening episode of Exploit Brokers, we delve deep into the world of cybercrime, dissecting the sinister Phemedrone Stealer malware and its ability to pilfer your precious data. Join us as we explore the chilling reality that just one click on a seemingly harmless URL can lead to a catastrophic data breach. Discover the insidious tactics…
…
continue reading
1
HN22 - Crypto Chaos: How a Fake SEC Tweet Triggered a Bitcoin Spike
19:29
19:29
Play later
Play later
Lists
Like
Liked
19:29
In this gripping episode of Exploit Brokers, we delve deep into the intricate world of cryptocurrency and cybersecurity. Our journey begins with the astonishing SEC Twitter hack, where hackers manipulated the SEC's account to spread false information about Bitcoin ETF approvals. This led to a monumental $2,000 surge in Bitcoin prices, leaving the c…
…
continue reading
1
HN21 - Underground Market for Twitter/X Accounts; Google OAuth Backdoor for Hackers
16:09
16:09
Play later
Play later
Lists
Like
Liked
16:09
Welcome to another captivating episode of Exploit Brokers! In this installment, we delve deep into the ever-evolving world of cybercrime and digital security. Join us as we unravel two gripping stories that shed light on the precarious nature of our online existence. First up, we explore the dark corners of the internet where cybercriminals flood t…
…
continue reading
1
HN20 - T-Mobile's Watchful Eye, Big Brother, and the Misconstrued Fines. The Prelude to Big Brother?
12:48
12:48
Play later
Play later
Lists
Like
Liked
12:48
In this episode of Exploit Brokers, we delve into a recent online uproar surrounding T-Mobile and its alleged imposition of fines for text messages containing hate speech and other violations. We take a closer look at the image that sparked the controversy, which led many to fear that T-Mobile was turning into a "Big Brother" figure, constantly mon…
…
continue reading
1
Season 2.5 Episode 4 - That's a Wrap - Q&A with the hosts
35:09
35:09
Play later
Play later
Lists
Like
Liked
35:09
Join us for our last episode of this half-season as we close out the year with some cool Q and A with the hosts. From how to learn as much from horrible bosses as you can from great bosses to CISOs having a MUCH smaller C than people may think...By Jason and Paul and Erika
…
continue reading
1
London - Hug - Presentation - Do More with SMS
31:02
31:02
Play later
Play later
Lists
Like
Liked
31:02
Talks from the London HUG event on 8th November 2023https://video.whitehat-seo.co.uk/hubspot-user-groupBy Whitehat Inbound Marketing Agency
…
continue reading
1
London - Hug - Presentation - Human Content In An AI World
33:20
33:20
Play later
Play later
Lists
Like
Liked
33:20
Talks from the London HUG event on 8th November 2023https://video.whitehat-seo.co.uk/hubspot-user-groupBy Whitehat Inbound Marketing Agency
…
continue reading
1
London - Hug - Presentation - Unlock Employee Productivity
16:20
16:20
Play later
Play later
Lists
Like
Liked
16:20
Talks from the London HUG event on 8th November 2023https://video.whitehat-seo.co.uk/hubspot-user-groupBy Whitehat Inbound Marketing Agency
…
continue reading
1
London - Hug - Presentation - Marketing Mary AI
54:31
54:31
Play later
Play later
Lists
Like
Liked
54:31
Talks from the London HUG event on 8th November 2023https://video.whitehat-seo.co.uk/hubspot-user-groupBy Whitehat Inbound Marketing Agency
…
continue reading
1
S02.5E03 - DEI and Recruiting with James Warren
34:57
34:57
Play later
Play later
Lists
Like
Liked
34:57
DEI...and we're bringing the party. Listen in as we speak to our favorite guest, James Warren, recruiter extraordinaire, about Diversity, Equity, and Inclusion, also known as representation, fair treatment, and allowing people to feel and be safe being their authentic selves. Trying to hire for DEI in Cybersecurity is like expecting an NHL hockey m…
…
continue reading
Skill Swam Meets. Wisdom Exchanges. More commonly known as mentorship programs have been around since our ancestors realized only having one person knowing how to create fire was a bad idea.... Listen in as we talk pros, cons and all about mentorships.By Jason and Paul and Erika
…
continue reading
1
S02.5E01 - Whitehats, Blackhats, A$$hats, and Cybersecurity Conferences, with Maria Bique
29:53
29:53
Play later
Play later
Lists
Like
Liked
29:53
Cybersecurity conferences. They are packed full of Whitehats - Ethical hackers who typically adhere to ethical guidelines and legal norms and aim to discover and fix security vulnerabilities to improve systems and protect users. They are packed full of Blackhats - hackers who often ignore ethical guidelines and legal norms and often exploit vulnera…
…
continue reading
1
HN19 - AI Conspiracy: Man's Deadly Plot Against The Queen Exposed | 23AndMe hacked and data leaked
10:34
10:34
Play later
Play later
Lists
Like
Liked
10:34
In this episode of Exploit Brokers, we delve into a chilling tale where artificial intelligence (AI) takes a dark turn, leading a young man down a perilous path of treason and an assassination plot against the Queen. The sinister liaison between man and machine unveils the unseen threats lurking in the digital shadows. Join Lauro as he dissects a r…
…
continue reading
1
HN18 - AI's Silent Takeover in the CIA & IRS
19:45
19:45
Play later
Play later
Lists
Like
Liked
19:45
🔍 In this episode of Exploit Brokers, we dive deep into the growing use of AI by government agencies like the CIA and IRS. Are we heading towards a world where AI is used in ways that could infringe upon our rights and privacy? Let's explore the concerns and implications. #AI #Privacy #GovernmentSurveillance #IRS #CIA #EthicalAI Join us as we disse…
…
continue reading
1
HN17 - Cyber Onslaught: MGM and Caesars Face Ransomware Threat | Hacker Group Attack Unveiled
21:43
21:43
Play later
Play later
Lists
Like
Liked
21:43
In a digital era where cybersecurity stands as the frontier's edge of organizational safety, even titans of industry find themselves under siege. The glittering giants of the gaming & hospitality industry, MGM and Caesars, have recently fallen prey to a formidable ransomware hacker group. We are seeing the opening of a new chapter in the narrative …
…
continue reading
1
HN16 - Zero-Click iPhone Horror: Pegasus Spyware Attack Against Exiled Russian Journalist #hackingnews
12:54
12:54
Play later
Play later
Lists
Like
Liked
12:54
Zero-Click iPhone Horror: Pegasus Spyware Attack Against Exiled Russian Journalist In today's episode we dive and explore the alarming cyberattack that targeted an exiled Russian journalist through a zero-click iPhone exploit, leading to the deployment of the notorious Pegasus spyware. This incident sheds light on the escalating cybersecurity threa…
…
continue reading
1
HN 15 New Chaes Malware Variant Attack on Banking and Financial Apps
15:23
15:23
Play later
Play later
Lists
Like
Liked
15:23
We are unveiling the Threat: Chaes Malware's Attack on Banking and Financial Apps. We discuss the breadth of the attack and go over details as they were shared with "TheHackerNews". Join us as we help shed light on the increasing amount of malware and cyber attacks. #hackingnews #cybersecurity #malware #cyberattack #infosec #technews Source: https:…
…
continue reading
1
HN 14 - Is Your Fingerprint Safe? X Is Collecting Your Biometric Data and NCSC Cautions Building With LLMs
16:40
16:40
Play later
Play later
Lists
Like
Liked
16:40
…
continue reading
1
HN 13 - Roblox Developers Beware! Tricked by Imitation NPM Packages. #hackingnews #supplychainhack
9:35
9:35
Play later
Play later
Lists
Like
Liked
9:35
Beware! Roblox developers are being tricked by imitation npm packages, and your security is at risk. This video is a warning to all Roblox developers, and it's essential that you take steps to protect yourself from this type of attack. Stay safe online and make sure to keep your passwords safe! Source: https://www.darkreading.com/vulnerabilities-th…
…
continue reading
1
HN 12 - The Dark Side of Hacking: Russian Hackers' Infrastructural Shift and Google AI's Fuzzing
14:46
14:46
Play later
Play later
Lists
Like
Liked
14:46
In the Dark Side of Hacking, we take a look at how Russian Hackers have shifted their focus to attacking infrastructure rather than individuals after being identified and putting victims through panic. Google AI launches a new bug hunting strategy called Fuzzing, which uses a machine learning algorithm to search for flaws in software. Fuzzing is a …
…
continue reading
1
AppSec Days PNW 2023 Portland: A conversation with Jeevan Singh and Chelsea Willis
26:43
26:43
Play later
Play later
Lists
Like
Liked
26:43
AppSec Days PNW leaders Jeevan Singh and Chelsea Willis join us to talk about the upcoming OWASP collaborative event from the OWASP chapters of Vancouver, Victoria, Seattle, and Portland happening this year in Portland on June 10th. AppSec Days PNW has been running for three years now and this is the first in person event. You can learn more and re…
…
continue reading
1
S02E09 - Incident Response at 36,000 Feet
30:56
30:56
Play later
Play later
Lists
Like
Liked
30:56
On this episode, our third last of Season 2...or maybe second last, we really don't know yet..are you confused as we are? Ok. Let's try this. On this LAST-ISH episode of Season 2 we talk about Incident Response in the context of a dramatic event that recently occurred Sunday, March 5th, on United Flight 2609 from Boston to Los Angeles. One of the c…
…
continue reading
No! Non! Nein! Niet! Or in multiple languages, what a lot of people call the Cybersecurity department. If you're tired of hearing podcasts, conference talks, or CISOs prattle (disclaimer: this was written IN London - apologies from the writer who seems to be having a bad case of language osmosis) on about how Cybersecurity must align with the busin…
…
continue reading
1
S02E07 - Building High-Flying Teams with Delta Air Lines CISO Debbie Wheeler
28:36
28:36
Play later
Play later
Lists
Like
Liked
28:36
Want to know how to get your team to “Fly Like an Eagle?” Listen in on our next episode coming this Tuesday, Feb 7th. We chat with Debbie Wheeler, CISO of Delta Air Lines. Debbie shows that building a high-flying security team isn’t actually as hard as landing a “Jet Airliner.” We discuss everything leadership, from what “Threshold” you can set for…
…
continue reading
1
HN11 – T-Mobile Hacked, PayPal Hacked, and new Hook Android Banking Malware.
9:05
9:05
Play later
Play later
Lists
Like
Liked
9:05
Hey guys T-Mobile got hacked, PayPal gets hit by a massive credential stuffing attack, a new android malware that is an evolution of an existing banking malware, and a phone ad scheme that infected real apps. All this in this episode of Exploit Broker’s Hacking News Round up. You’re not going to want to miss this. Show Notes: https://exploitbrokers…
…
continue reading
1
S02E06 - The Metrics System...no, the OTHER metrics
31:17
31:17
Play later
Play later
Lists
Like
Liked
31:17
Can metrics tell stories? They better be! if you want them to be of any value. In this episode, we talk about, there's that word again, storytelling and how metrics can be good at it or bad at it. From bad jokes about the Red Hot Chili peppers, to Legos to 10th graders with I-Pads - if you want to know how to build good metrics - listen in!…
…
continue reading
1
HN10 - License Plates Hacked, Canada Reclassifies Tether, JsonWebToken Vulnerability, & More.
8:37
8:37
Play later
Play later
Lists
Like
Liked
8:37
Intro Hey guys and welcome to Exploit Brokers where we break down articles, recap recent hacking events, and give insight on the technical aspects of the hacking events. I will explain things and give my opinion on tech and hacking events so let’s get started. Show Notes: https://exploitbrokers.com/podcasts/hn10…
…
continue reading
1
S02E05 - Scaling Culture with Dean Sysman CEO of Axonius
35:23
35:23
Play later
Play later
Lists
Like
Liked
35:23
Have you ever had a favorite TV Show hit it big in it’s first season - only to see subsequent seasons fall flat? (West World, anyone?). It can also happen to companies when they grow too fast. In this episode, we talk to a CEO who is ensuring that does NOT happen. A CEO of a cybersecurity company that has rocketship growth yet has maintained its cu…
…
continue reading
1
S02E04 - Controls - The Speedometer, Brakes, and Highway Patrol of Cyber
28:56
28:56
Play later
Play later
Lists
Like
Liked
28:56
Ever had a speeding ticket? Or have you ever slowed down as you see a speed limit sign? Or used your brakes? If you answered YES to any of these - great! It means you drive. And it means you've encountered a "control" No, not the awesome seminal work of Janet Jackson, but what cybersecurity (and, oh maybe LIFE) uses to function. In our 4th episode …
…
continue reading
1
S02E03 - Crisis of Infinite Podcasts - Threat-X Crossover
40:14
40:14
Play later
Play later
Lists
Like
Liked
40:14
What’s better than one F-Sides podcast? TWO podcasts. Listen in as we join forces for our first-ever crossover episode with Gene Fay, ThreatX CEO, and host of the “eXecutive Security” podcast. And unlike those pesky DC comic crossovers where you can’t keep track of what multiverse of plots you’re following, ours is easy. We’re talking about careers…
…
continue reading
What do Lestat, Dracula, and Morbius have in common? They're all rookies when it comes to the best of the best energy vampires - aka annoying vendors. In this season 2 episode, we bite into why working with vendors can be draining. Are you a vendor and want to know how not to suck? Tune in as we talk all things sales/vendors from a CISO and custome…
…
continue reading
1
E22 - Securing the Merge W/David Theodore From The Ethereum Foundation - 11/15/2022
57:55
57:55
Play later
Play later
Lists
Like
Liked
57:55
Show Notes--->https://wolfdefi.com/i-degen/e22-ethereum-merge-security-with-david-theodore/By Zak & Hunt
…
continue reading
Ever wondered how to break into the cybersecurity field? Maybe you're already in and know that retaining talent is a challenge. Or want to know what employees and employers are looking for in Cyber? Or maybe you just like cats... if you thought, "Hey, that's what I'm thinking" to any of these - you're in luck! We have a great episode for you kickin…
…
continue reading
1
E21 - Gala Games Attacked By A Whitehat & 50K BTC Silkroad Hacker Pleads Guilty
43:19
43:19
Play later
Play later
Lists
Like
Liked
43:19
Full show notes --> https://wolfdefi.com/i-degen/e21-gala-games-gets-owned-by-a-whitehat/By Zak & Hunt
…
continue reading
1
E20 - Team Finance, FriesDAO, & Layer2DAO Hacked - Profanity Woes Continue - 11/1/2022
45:43
45:43
Play later
Play later
Lists
Like
Liked
45:43
Full show notes --> https://wolfdefi.com/i-degen/e20-team-finance-hacked-profanity-hacks-continue/By Zak & Hunt
…
continue reading
1
E19 - Alpha Hunting w/Threat Intel Bots & Devcon 6 Security Talk Gem Hunt 1 - 10/21/2022
1:04:18
1:04:18
Play later
Play later
Lists
Like
Liked
1:04:18
Full Show notes can be found here. Be on the lookout for a new I, Degen Sequence on Zeevo in the next few days 😉 Stay up, fren.By Zak & Hunt
…
continue reading
1
E18 - Patriarch Glossy Manohar, you are being liquidated! - 10/14/2022
1:04:35
1:04:35
Play later
Play later
Lists
Like
Liked
1:04:35
Full show notes on -->WolfDeFi.com 💀By Zak & Hunt
…
continue reading
---> Full show notes on HackMD
…
continue reading
1
E16 - Reversible Transactions - 10/1/2022
1:13:07
1:13:07
Play later
Play later
Lists
Like
Liked
1:13:07
Listen at: idegen.fm Contact us: @idegenfm Intro Welcome to I, Degen - A podcast about crypto technology, security, and culture. With a healthy balance of enthusiasm and skepticism, we dig into a weekly look at crypto, cutting through the misinformation and hype in search of signal in the noise. Episode Summary This week we discuss the draft of the…
…
continue reading
1
E15 - Wintermute's 160 Million Dollar Key Generation Lesson - 9/20/2022
57:03
57:03
Play later
Play later
Lists
Like
Liked
57:03
Listen at: idegen.fm Contact us: @idegenfm Intro Welcome to I, Degen - A podcast about crypto technology, security, and culture. With a healthy balance of enthusiasm and skepticism, we dig into a weekly look at crypto, cutting through the misinformation and hype in search of signal in the noise. Episode Summary In this episode, we hunt for Do Kwon …
…
continue reading
I, Degen - E14: All Eyes On Ethereum - 9/11/2022 Listen at: idegen.fm Contact us: @idegenfm Full show notes with images on HackMD - https://hackmd.io/@idegen/E14-All-Eyes-On-Ethereum Intro Welcome to I, Degen - A podcast about crypto technology, security, and culture. With a healthy balance of enthusiasm and skepticism, we dig into a weekly look at…
…
continue reading
1
S01E09 - "Compliance and Security" - Why Can't We All Just Be Friends
21:29
21:29
Play later
Play later
Lists
Like
Liked
21:29
In this episode, join Paul and Jason as they talk about what is better - being secure, or being compliant. It's the age-old argument that's been around since the dawn of time... or maybe just since PCI.... 2.0.By Jason and Paul
…
continue reading
1
E13 - NiftyApes Open Source Audit w/Kevin Seagraves & Zach Herring - 9/1/2022
1:17:56
1:17:56
Play later
Play later
Lists
Like
Liked
1:17:56
I, Degen - Episode 13 - Open Source Audio Audit with Kevin Seagraves & Zach Herring from Niftyapes.money If you have a moment, please check out episode 13 I, Degen sequence on Zeevo. Give your feedback on the show, and we'll mint you a custom token of appreciation 🙏 Listen at: idegen.fm Contact us: @idegenfm Intro On this episode of I, Degen we cha…
…
continue reading