Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Fraud. Abduction. Murder. Every week, Crime Story host and investigative journalist Kathleen Goldhar goes deep into a true crime case with the storyteller who knows it best. For early access to Crime Story episodes visit www.youtube.com/@cbcpodcasts or CBC's True Crime Premium Channel on Apple Podcasts (where episodes are also ad-free).
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
It aims at creating awareness around hackers stealing financial information and how cyber crime continues to evolve, with new threats surfacing every year. They can, in effect, destroy businesses and damage your financial and personal lives — especially if you’re the victim of identity theft. Cyber attacks are an evolving danger to organizations, employees and consumers. They may be designed to access or destroy sensitive data or extort money. At Hidden Files, hope listeners will be able to ...
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
The Future of Cybercrime is dedicated to helping security practitioners defend their organizations by distilling insights, best practices, and actionable tips from the world’s leading cyber crime experts. This show is brought you by KELA Cyber Threat Intelligence. For more information, visit www.kelacyber.com
…
continue reading
Take a journey into the dark depths of the Australian criminal underworld with Australia’s most formidable crime reporter - John Silvester.
…
continue reading
Join us as we unleash the latest innovations in science and tech to showcase engineering that is saving our planet and helping communities across the globe. From shark detection technology and artificial reefs bringing back marine wildlife, to the latest real-life cyber crime, nano materials and smart watches are saving lives, you can get thinking about what will be next. Kick start your way to making a difference and engineering a better world. Join us on social media @IETeducation for all ...
…
continue reading
Meet Alice – a burnt-out barista who turns to the Dark Web to pay off her student debt. But when cybercrime pulls her deeper than she could have ever imagined, only one question remains: can Alice get out before it’s too late? The Hacker Chronicles Season 2: Digital Nomad. Presented by Tenable. Starring Michael C. Hall as John Doe. And Chloe Taylor as Alice.
…
continue reading
I am targeting a market of IT professionals who enjoy woodworking as a hobby. Providing information around information technology topics like cyber security, cyber crime, and a few woodworking projects
…
continue reading
Reformed Hacker Bastien Treptel and the Team at CTRL Group take us through managing our cyber risks and security in an age where cyber-attacks can be carried out with ease. Detailing risks in the Start-Up, SME industries and cloud services as well as giving us an insight into how secure we are in our very own homes. For more episodes download the free LiSTNR app
…
continue reading
Our regular podcast series features threat research and security news, hosted by threat researchers from the Threat Hunter Team.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Impact: Coronavirus and Organized Crime
Global Initiative Against Transnational Organized Crime
The Impact: Coronavirus and Organized Crime is a special edition weekly podcast from the Global Initiative Against Transnational Organized Crime. We'll look at how the ongoing COVID-19 virus is impacting on organized crime around the world and how the illicit economy may affect our ability to respond to the virus. We'll be covering cyber crime, the illegal wildlife trade, counterfeit medicines, drug trafficking, human smuggling, corruption and human trafficking. This podcast uses the followi ...
…
continue reading
Hosted by two former federal agents who investigated computer crime, this is a technology Podcast covering Computer Security, Computer Crime and Computer Forensics Topics.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
DarkWeb.Today – Hackers & Cyber Security: Piercing the Veil, Empowering the Secure.
Alberto Daniel Hill
“DarkWeb.Today – Hackers & Cyber Security” is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that are central to our ...
…
continue reading
The CyberBrief Podcast uncovers the latest cyber attacks, hacks, and stories that matter. Cyber crimes are growing exponentially, with many of the latest attacks & hacks being the biggest in history and costing billions of dollars. But what can we as cyber professionals, business leaders, or just people living in a digital age do? In this series, we’ll dive into the history of cybersecurity, some of the top hacks and scams in cyber, and what we can do about it. To mark Cybersecurity Awarenes ...
…
continue reading
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
…
continue reading
Australian businesses were targeted with more advanced malware and cyber intrusions in 2014 than any other. We believe its time for Australian organisations to realize that we are firmly in the cross-hairs of global cyber criminals. This blog and podcast is so we can provide a platform to share stories of cyber crime from Australia and the rest of the world, and hopefully find ways Australian businesses can protect their organisation, customers and employees data from these threats.
…
continue reading
National Cyber Security Radio gives the hottest topics in cyber security news and reveals all the Fake News by other experts. Topics include, hacker for hire murders, how to make money cyber security, should you get your college degree or certification in cyber security, plus over 20 over topics. Execute Produced by one of the world’s most known and respected Ex-hacker Gregory Evans (GregoryDEvans.com) listeners will not be disappointed.
…
continue reading
In a world where we are so dependent on our phones, our computers and the internet, we explore what happens when you don't protect yourself online. Criminal Domain will expose the ways we leave ourselves open to potential hacking and phishing attacks, and how perpetrators use technology to manipulate us. World renowned futurist Mark Pesce and respected investigative journalist Claire Aird speak to victims of cyber crime to inform us how to better protect ourselves online.
…
continue reading
Decoding Security is a podcast from Microsoft Australia about how to protect your business from the ever changing threat of cyber crime. On the show, you’ll hear from leaders in cybersecurity, as well as Microsoft experts, as we break down strategies to help keep your business secure. From identifying threats, to managing incidents — we’ll crack the code to help you stay resilient, agile and competitive.
…
continue reading
The UN and Organized Crime Podcast is a series from the Global Initiative against Transnational Organized Crime. As multilateralism itself comes under intense pressure, and as existing responses to transnational organized crime continue to fail, we’ll analyse the UN responses to the issue with some of the world’s leading experts as we try to unpack diplomatic discussions, policy developments and programme implementation.
…
continue reading
A riveting, original and comprehensive account of international crime and a brilliant critique of globalisation's dark side, McMafia contains full and often terrible stories behind today's most sensational headlines, charting a parallel universe of crime. Find out more at www.bodleyhead.co.uk.
…
continue reading
FINCast is an exciting hub of conversation encompassing the world's most pressing financial integrity-related issues, including anti-money laundering/counter-terrorist financing (AML/CFT), anti-bribery and corruption, financial and cyber crime vulnerabilities, and fin-tech and new technologies.
…
continue reading
Welcome to the new realities of cyber security podcast series, where we'll be looking at the key challenges and opportunities faced by businesses in the rapidly evolving area of cyber security. From digital crime scene forensics to GDPR, this series covers topical issues that matter.
…
continue reading
Nicholas Edgwood rides a wave of good karma–a job he excels at, a new girlfriend, and a bright future. When he gets framed for a cyber-crime he did not commit, he must run for his life while his entire world crumbles around him. Betrayal and murder replace peace and hope as he finds himself in unfamiliar territory. He may not be the biggest and baddest guy out there, but he has skills, the kind garnered from a career steeped in computers and code. Now he must leverage these skills to their f ...
…
continue reading
Roughly once every 37 seconds, someone on earth falls victim to Cyber Crime. At least, that's what our most recent google search indicated. It's difficult to rationalize just how large the internet is, and can be even harder to truly understand just how important it is to stay safe in such a hostile environment. If nothing else, The Incident Handler's Guide to the Galaxy aims to equip its listeners with tools and real-world stories, offering a deeper dive into current events, tips, tricks an ...
…
continue reading
Fraudish is a podcast to help those working in fraud. Hosted by Kelly Paxton, Certified Fraud Examiner, Private Investigator, and Pink Collar Crime Expert. Kelly is a former special agent turned investigator specializing in embezzlement and workplace dishonesty cases. Fraudish interviews outstanding fraud professionals so you can continue to move forward in your career. Origin stories, tips, resources are just some of the amazing fraud content you will hear each Tuesday.
…
continue reading
Embark on a riveting journey into the heart of the cybersecurity career with host Lesline Gilzene, as she immerses you in the exploration of data breaches, incident response, and captivating real-world cybercrime narratives, uncovering the thriving stories of those on the front line of digital defense.
…
continue reading
Let us dive into the world of corporate integrity, ethical leadership, and its success factors. Without being sensitised, we quickly find ourselves surrounded by different patterns of white-collar crime, non-compliance, and cyber-crime. Compressed knowledge in easily digestible doses to protect your company, your employees, your customers, and yourself - as a business leader or entrepreneur. Are you a decision-maker? A game changer towards corporate integrity and ethical leadership? The podc ...
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Are you at Risk? Personal Liability Cyber Breaches.
55:54
55:54
Play later
Play later
Lists
Like
Liked
55:54
NEW! Text Us Direct Here! We interview Joseph Brunsman of the Brunsman Group, a thought leader in cybersecurity insurance. They discuss the liability in data breaches and the changes happening in the cybersecurity insurance industry. They also explore the impact of AI on cyber insurance and the importance of accurate application and underwriting pr…
…
continue reading
The biggest IT outage across the world just happened. Planes were grounded, hospitals and 911 dispatch centers were down, people couldn't turn their computers on, all on a massive global scale never seen before. So what is CrowdStrike, and how did this happen? Sources: https://pastebin.com/vxfyMcd4By Chloe Thonus
…
continue reading
In this interview at SINCON 2024, Dr. Joshua James, a Regional Counter Cyber Crime Coordinator for the United Nations Office on Drugs and Crime (UNODC), shared his insights on the Regional Counter-cybercrime programme at UNODC. Dr. James argued that while law enforcement agencies are getting better at responding to cybercrime, the cyber criminals a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The_X_Show_-_CROWDSRIKE_BREACH_DISCUSSION
1:48:06
1:48:06
Play later
Play later
Lists
Like
Liked
1:48:06
The_X_Show_-_CROWDSRIKE_BREACH_DISCUSSION_ft_CIABOB_pt_1_or_2___$JNE MASSIVE DEVELOPMENTS!!! F'IN CRUDS! JOIN US FOR NO HOLDS BARRED FFA AMA Q&A W CIABOB ON THE @CrowdStrike BREACH!! @IBelieveUSA001I HEREBY INVITE @ADanielHill to PARTICIPATE - ALL INSIGHTS APPRECIATED
…
continue reading
This week, Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe, as they celebrate Maria joining the Hacking Humans podcast every week! Maria's story is from a listener this week who writes in with a story on an IT company that is a third party for a healthcare company, and the dangers that can come from that. Dave and Joe s…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Flash Point. Breaking News on Insider Threats to US Organizations
24:03
24:03
Play later
Play later
Lists
Like
Liked
24:03
NEW! Text Us Direct Here! How would you know if a seemingly perfect employee was actually an imposter? Behind this facade was a North Korean operative, a meticulously trained spy. In Cyber Flash Point we cover Breaking News on Insider Threats to US Organizations. Topics: Insider Threats to US Organizations, how to reduce insider threats, top cyber …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Ethical AI: Controlling AI Ethically while Navigating Cybercrime
54:00
54:00
Play later
Play later
Lists
Like
Liked
54:00
NEW! Text Us Direct Here! We interview Steve Orrin, the CTO of Intel, who essentially make the chips (brains) of most computers on the planet. We discuss these topics: Controlling AI Ethically, how to control AI ethically, what are the ethical considerations of AI, use of AI in cybersecurity, use of AI in cybercrime, deep fakes, zero trust and more…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
SN 984: CrowdStruck - Crowdstrike, Cellebrite, More Entrust
2:27:05
2:27:05
Play later
Play later
Lists
Like
Liked
2:27:05
Cellebrite unlocks Trump's would-be assassin's phone. Cisco reported on a CVSS of 10.0 Entrust drops the other shoe Google gives up on removing 3rd-party cookies Miscellany Snowflake and data warehouse applications CDK auto dealership outage Polyfill.io and resource hashes MITM Blocking Copilot Blocking incoming connections via IP CrowdStruck Show …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
SN 984: CrowdStruck - Crowdstrike, Cellebrite, More Entrust
2:27:05
2:27:05
Play later
Play later
Lists
Like
Liked
2:27:05
Cellebrite unlocks Trump's would-be assassin's phone. Cisco reported on a CVSS of 10.0 Entrust drops the other shoe Google gives up on removing 3rd-party cookies Miscellany Snowflake and data warehouse applications CDK auto dealership outage Polyfill.io and resource hashes MITM Blocking Copilot Blocking incoming connections via IP CrowdStruck Show …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Morning Edition: John Silvester on the criminal gangs infiltrating the CFMEU
20:49
20:49
Play later
Play later
Lists
Like
Liked
20:49
For more than 45 years, John Silvester has been reporting on Australia’s criminal underworld. Some notable figures, like Mick Gatto, a key player in the gangland wars that were immortalised in the popular TV series, Underbelly, are now implicated in an investigation that has rocked the highest offices in the country. That of alleged corruption in t…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How Magic Tricks Mirror Fraud Tactics with John Tonsick CPA & CFE
34:12
34:12
Play later
Play later
Lists
Like
Liked
34:12
“Magic and fraud have a great deal in common.” In this episode of Fraudish, host Kelly Paxton interviews John Tonsick, a CPA, CFE, and magician. John shares his unique journey from serving in the Navy to becoming a forensic accountant. He discusses the intriguing parallels between magic and fraud, emphasizing how both involve manipulation and decep…
…
continue reading
An acronym for Advanced Persistent Threat to describe hacker groups or campaigns normally, but not always, associated with nation state cyber espionage and continuous low-level cyber conflict operations.By N2K Networks
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Olympic Terror: Serial bomber Eric Rudolph and the 7-year manhunt to find him
37:18
37:18
Play later
Play later
Lists
Like
Liked
37:18
For 5 years, the 1996 Atlanta Olympic bomber had been living on the lam in the woods. Locals sold shirts that read “Eric Rudolph: 1998 Hide and Seek champion.” Meanwhile, Eric ate salamanders, shot bears, and racked up the bill for one of the most costly manhunts in U.S. history. How did he do it? What were his motivations? And why was he able to p…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Making your ICS/OT environments cyber secure, with Dragos’ Lesley Carhart
45:02
45:02
Play later
Play later
Lists
Like
Liked
45:02
In this episode of the Cyber Uncut podcast, Lesley Carhart, director of incident response for North America at Dragos, joins host Liam Garman to unpack how businesses can improve their ICS/OT cyber processes, before giving some tangible advice for business leaders on how they can build their incident response plans. The pair begin the podcast by un…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
When Gamers Start Swatting: Violence for Hire Online
54:20
54:20
Play later
Play later
Lists
Like
Liked
54:20
NEW! Text Us Direct Here! We discuss true cyber crimes of When Gamers Start Swatting: Violence for Hire Online. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors. Visit kiteworks.com to get started. W…
…
continue reading
NEW! Text Us Direct Here! Summary This conversation shines a light on the dark web, discussing its purpose, dangers, and what is available on it. It explores the increase in dark web activity and the sale of stolen data, including passwords and personal information. The conversation also delves into the operations of cybercrime gangs and their recr…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Mind Games: Exploring Brain Reactions in Social Engineering
53:49
53:49
Play later
Play later
Lists
Like
Liked
53:49
NEW! Text Us Direct Here! We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing. Find out more about Dr Marono, her research and findings at https://www.abbiemarono.com/ A…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Welcome to a new age in digital deception.
37:37
37:37
Play later
Play later
Lists
Like
Liked
37:37
This week, Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe, as they celebrate Maria joining the Hacking Humans podcast every week! Maria's story is on supplement scams, as there has been a significant surge in health-related supplement scams on social media platforms, utilizing advanced technologies like AI-generated im…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
SN 983: A Snowflake's Chance - CDN Safety, Microsoft's Behavior, CDK Ransomware Attack
2:07:11
2:07:11
Play later
Play later
Lists
Like
Liked
2:07:11
Using Content Delivery Networks Safely The CDK Global Ransomware Attack The IRS and Entrust Polyfill.io fallout Microsoft's Behavior A Snowflake's Chance Show Notes - https://www.grc.com/sn/SN-983-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TW…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
SN 983: A Snowflake's Chance - CDN Safety, Microsoft's Behavior, CDK Ransomware Attack
2:07:11
2:07:11
Play later
Play later
Lists
Like
Liked
2:07:11
Using Content Delivery Networks Safely The CDK Global Ransomware Attack The IRS and Entrust Polyfill.io fallout Microsoft's Behavior A Snowflake's Chance Show Notes - https://www.grc.com/sn/SN-983-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TW…
…
continue reading
An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.By N2K Networks
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Inside the Growing Grey Collar Crime Wave with Christina Fiscella
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36
When you think of retirees do you ever think of them committing fraud? This week on Fraudish Kelly speaks with Christina Fiscella, CFE, about the fascinating wave of grey collar crime and the two shades of grey. The 2008 financial crisis is a turning point for grey collar crime. The "golden years" should be about enjoying retirement and not committ…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Inside the Mind: Unveiling Cyber Criminals' Motives and the Real-World Dangers of Ransomware
51:10
51:10
Play later
Play later
Lists
Like
Liked
51:10
NEW! Text Us Direct Here! We explore the motives of cyber criminals, examples of cyber crime gang activities, risks of physical harm from ransomware, understanding cyber crime motive, and why its important to understand cyber crime MO (Modus Operandi). Overview of the MO (Modus Operandi) of REVIL, CONTI, HIVE, DARKSIDE and other ransomware gangs an…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Sobre seguridad, etica, desinformacion, tiroteos, etc
2:32:36
2:32:36
Play later
Play later
Lists
Like
Liked
2:32:36
Sobre seguridad, etica, desinformacion, tiroteos, etc
…
continue reading
![Artwork](/static/images/128pixel.png)
1
From Hacker to Hero: The Michael Calce Story – How 'Mafia Boy' Took Down The Internet
32:51
32:51
Play later
Play later
Lists
Like
Liked
32:51
NEW! Text Us Direct Here! Summary This episode explores the true cybercrime story of Michael Calce, also known as Mafia Boy, who was responsible for taking down major websites like Yahoo, E-Trade, eBay, and more during the dot com bubble. Michael's journey into hacking began when he received his first computer at the age of six and became fascinate…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Multiple Data Breaches Linked to Snowflake Cloud Provider
7:32
7:32
Play later
Play later
Lists
Like
Liked
7:32
Ticketmaster, AT&T, Neiman Marcus, Advanced Auto Parts. These organizations may not seem like they have anything in common, but they all were customers of Snowflake that had a data breach within the past couple months. With conflicting reports from Snowflake, the victims, the threat actors, and different security firms, who is really at fault here?…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Jinx (Part 2/2): Andrew Jarecki and Zac Stuart-Pontier on catching a killer
31:15
31:15
Play later
Play later
Lists
Like
Liked
31:15
In part two of our conversation, The Jinx creators Andrew Jarecki and Zac Stuart-Pontier reflect on what it was like watching Robert Durst take the stand, how his inner circle enabled his strange behaviour, and the impact of documenting a suspected killer for 20 years. For ad-free listening to Crime Story, subscribe to CBC's True Crime channel on A…
…
continue reading