show episodes
 
Artwork

1
We think we know

Pentest-Tools.com

Unsubscribe
Unsubscribe
Monthly+
 
We think we know how computer systems work, but how come they keep surprising us? We also think we know how humans behave, but we keep finding out we don’t. This podcast is for ethical hackers who are thirsty for challenges and who never settle for easy answers. We challenge some of the best offensive security pros in the world to reveal the unique traits, skills, and real-world experiences that got them where they are today. Get ready to be caught off guard as we debunk misconceptions, diss ...
  continue reading
 
The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations are able to make informed decisions. OWASP is in a unique position to provide impartial, practical information about AppSec to individuals, corporations, universities, government agencies, and other organizations worldwide. Operating as a communit ...
  continue reading
 
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
  continue reading
 
Artwork

1
I, Degen

Zak & Hunt

Unsubscribe
Unsubscribe
Monthly
 
Welcome! I, Degen is a podcast about crypto technology, security, and culture. With a healthy balance of enthusiasm and skepticism, we cut through the misinformation and hype in search of a signal in the noise. Our weekly round-up will keep you updated on the latest in crypto hacks and security. With our open-source audio audits, we interview founders and hackers to surface relevant info about how to stay safe in crypto land.
  continue reading
 
Karan Bajaj is an Indian technology entrepreneur, author, yogi, backpacker and hiker. Best known as founder and CEO of WhiteHat Jr., an Ed-tech company specializing in distance learning which was acquired by BYJU'S in 2020. He has put his visualizations to words in his 4 published novels and intends to plan a career in Public Service. In this podcast we have put voice to articles he published online, aimed at inspiring and guiding young entrepreneurs.
  continue reading
 
Loading …
show series
 
🚨 Welcome to Exploit Brokers! 🚨 In this episode, we're diving deep into the hidden world of fake cell towers and the alarming rise of cyber scam slavery. 📡💔 Did you know that your cell phone might be connecting to a fake tower, putting your personal information at risk? We explore a recent case in London where criminals set up a fake cell tower to …
  continue reading
 
Welcome back to another episode of Exploit Brokers with your host, Lauro! Today, we're diving deep into the darker uses of AI by criminals. From high-tech identity theft using AI-generated voices and images to unprecedented surges in digital crimes such as hacking and data breaches, we explore how these technologies are shaping modern criminal tact…
  continue reading
 
“Not everything works as configured. Not everyone behaves as trained.” The reality of this statement makes it possible for us, the people in offensive security, to have a job. It also highlights how unpredictable our work can be and how never-ending our learning process is. We work in a space where things are so complex that we need to combine big-…
  continue reading
 
In this thrilling episode of our cybersecurity series, we dive deep into the shadowy world of cyber espionage waged by two Chinese Advanced Persistent Threat (APT) groups against the nations of the Association of Southeast Asian Nations (ASEAN). Discover the tactics employed by infamous threat actors like Mustang Panda in their sophisticated digita…
  continue reading
 
In this episode, we continue to ask the meaningful questions: What makes a great pentester? How can you balance the art of manual testing with the efficiency of automation? What is the unique value that pentesters bring to offensive security? And what can't be commoditized in this craft? Gabrielle's mantra, “action for cyberpeace”, resonates throug…
  continue reading
 
With 20+ years of cybersecurity work, Tom unpacks the complexities of penetration testing, discussing the roles of vendors, practitioners, and technological advancements. He also shares his perspective on what makes a good pentester, the value of mentorship, and the ethical challenges in this line of work. Explore this conversation to learn: How pe…
  continue reading
 
Dive into the dark world of cybercrime with our latest episode on Exploit Brokers, where we unravel the complexities of the Black Cat ransomware group and its fallout with Change Healthcare and UnitedHealth Group. Witness the intricacies of digital extortion, the inner workings of cybercriminal networks, and the colossal impact on the healthcare se…
  continue reading
 
In this gripping episode of Exploit Brokers, we dive deep into the shadows of cyberspace to uncover the resurgence of the notorious Black Cat ransomware group. Following their recent high-profile attack on UnitedHealth's technology unit, Optum, which disrupted prescription deliveries across the United States, Black Cat has declared war against the …
  continue reading
 
Stay tuned as we explore how tools like Nmap and sqlmap have shaped penetration testing over the last two decades, and stick around to discover which aspects make pentesting predominantly a craft - and which parts have become standardized (and what that means for your work). Unpack this conversation to discover: The depth of the work involved in cr…
  continue reading
 
In this explosive episode of Exploit Brokers, we delve into the groundbreaking takedown of LockBit, one of the most formidable names in the ransomware arena. With law enforcement agencies from the US, EU, and beyond joining forces, this rare international operation has sent shockwaves through the cybercrime world. From arrests in Ukraine and France…
  continue reading
 
Welcome back to Exploit Brokers, where we delve deep into the world of cybersecurity, AI, and the digital battlegrounds of our time. In this episode, we're exploring a topic that sounds like it's straight out of a sci-fi movie, but is unfolding in real life: the integration of AI into military and cyber warfare by nation states. With an unprecedent…
  continue reading
 
Inti not only sheds light on what happens when expectations meet reality, but he also shares his unique approach to problem-solving with real-life examples you can add to your own process. With 12+ years of experience in this space, Inti De Ceukelaire is a Belgian ethical hacker and cybercrime investigator. He currently works as the Chief Hacker Of…
  continue reading
 
Dive into the eye-opening world of cybersecurity as we dissect the recent cyber attack and Hacking Havoc that has plunged Fulton County into turmoil. Witness the frightening resemblance between fictional cyber threats depicted in shows like Mr. Robot and the stark reality facing our digital infrastructures today. This episode of Exploit Brokers tak…
  continue reading
 
Today’s guest, Willa Riggins, talks about how “every small piece contributes to the larger picture” in pentesting and explains why “it's about understanding the intricacies and appreciating the craftsmanship." From the mindset behind excellent pentesting work to the (difficult) things that are never going to change in this space, we glide through W…
  continue reading
 
🔒 Dive into the world of cybersecurity as we uncover the latest threats facing businesses in today's digital landscape. In this video, we dissect the Jason's Deli data breach, shedding light on the dangers of credential stuffing attacks. Discover how hackers exploit weak password habits and gain access to personal data, leaving thousands of custome…
  continue reading
 
In this eye-opening episode of Exploit Brokers, we delve deep into the world of cybercrime, dissecting the sinister Phemedrone Stealer malware and its ability to pilfer your precious data. Join us as we explore the chilling reality that just one click on a seemingly harmless URL can lead to a catastrophic data breach. Discover the insidious tactics…
  continue reading
 
There’s a constant loop of learning, doing, and improving in offensive security. And one way to develop the “muscle” to tackle complex security challenges is through hands-on training. That’s what IppSec, our guest, does with kindness, passion, and in the community’s best interest. IppSec helps us bust a couple of common myths which, if left unques…
  continue reading
 
In this gripping episode of Exploit Brokers, we delve deep into the intricate world of cryptocurrency and cybersecurity. Our journey begins with the astonishing SEC Twitter hack, where hackers manipulated the SEC's account to spread false information about Bitcoin ETF approvals. This led to a monumental $2,000 surge in Bitcoin prices, leaving the c…
  continue reading
 
Welcome to another captivating episode of Exploit Brokers! In this installment, we delve deep into the ever-evolving world of cybercrime and digital security. Join us as we unravel two gripping stories that shed light on the precarious nature of our online existence. First up, we explore the dark corners of the internet where cybercriminals flood t…
  continue reading
 
Ready to excel in offensive security this year? Delve into the mind of Vivek Ramachandran, a cybersecurity virtuoso who’s seen (and learned) a lot in this field. He's a force that fuels both his current company and the broader cybersecurity landscape with original thinking, educational and actionable insights. And there's more to Vivek than just te…
  continue reading
 
In this episode of Exploit Brokers, we delve into a recent online uproar surrounding T-Mobile and its alleged imposition of fines for text messages containing hate speech and other violations. We take a closer look at the image that sparked the controversy, which led many to fear that T-Mobile was turning into a "Big Brother" figure, constantly mon…
  continue reading
 
If you have questions that boggle your mind about penetration testing, Jayson is the person to learn from. In the fourth episode of our We think we know podcast, we delve into the world of ethical hacking with the legendary Jayson E. Street. As an icon in the penetration testing community, Jayson brings a unique blend of wit, wisdom, empathy, and a…
  continue reading
 
“There is no end goal in this industry. You're always going to keep moving forward.” This quote from our guest does a great job at capturing the conversation we explore in this podcast: the love for the process, the hunger for knowledge, how to add value for clients, and become a better penetration tester. For the third episode of We think we know,…
  continue reading
 
It’s not just penetration testing, just like today’s guest is not just an offensive security pro. If you’re the ambitious type who’s always up for new challenges, then you’re most likely going to resonate with today’s guest and his approach. Experienced penetration tester and Volkis co-founder, Alexei Doudkine joins us in the second episode of the …
  continue reading
 
Welcome to the kick-off episode of the We think we know podcast! Whether you’re looking for a fresh perspective, to learn about and from our guest, or just to see if this podcast is worth your time, thanks for choosing to spend some time with us! We don’t take it for granted. Today, we've got the fantastic Alethe Denis with us. Wearer of many hats …
  continue reading
 
🤩 We’re launching a podcast! On Nov. 7, the first episode of We Think We Know will be in your headphones! Here's the low-down: 🤔 What is it about? Learning how to be better hackers by challenging assumptions and digging deeper into the why, how, and what of offensive security. In the 1st season, we're unpacking why #penetrationtesting is a craft an…
  continue reading
 
In this episode of Exploit Brokers, we delve into a chilling tale where artificial intelligence (AI) takes a dark turn, leading a young man down a perilous path of treason and an assassination plot against the Queen. The sinister liaison between man and machine unveils the unseen threats lurking in the digital shadows. Join Lauro as he dissects a r…
  continue reading
 
🔍 In this episode of Exploit Brokers, we dive deep into the growing use of AI by government agencies like the CIA and IRS. Are we heading towards a world where AI is used in ways that could infringe upon our rights and privacy? Let's explore the concerns and implications. #AI #Privacy #GovernmentSurveillance #IRS #CIA #EthicalAI Join us as we disse…
  continue reading
 
In a digital era where cybersecurity stands as the frontier's edge of organizational safety, even titans of industry find themselves under siege. The glittering giants of the gaming & hospitality industry, MGM and Caesars, have recently fallen prey to a formidable ransomware hacker group. We are seeing the opening of a new chapter in the narrative …
  continue reading
 
Zero-Click iPhone Horror: Pegasus Spyware Attack Against Exiled Russian Journalist In today's episode we dive and explore the alarming cyberattack that targeted an exiled Russian journalist through a zero-click iPhone exploit, leading to the deployment of the notorious Pegasus spyware. This incident sheds light on the escalating cybersecurity threa…
  continue reading
 
We are unveiling the Threat: Chaes Malware's Attack on Banking and Financial Apps. We discuss the breadth of the attack and go over details as they were shared with "TheHackerNews". Join us as we help shed light on the increasing amount of malware and cyber attacks. #hackingnews #cybersecurity #malware #cyberattack #infosec #technews Source: https:…
  continue reading
 
Beware! Roblox developers are being tricked by imitation npm packages, and your security is at risk. This video is a warning to all Roblox developers, and it's essential that you take steps to protect yourself from this type of attack. Stay safe online and make sure to keep your passwords safe! Source: https://www.darkreading.com/vulnerabilities-th…
  continue reading
 
In the Dark Side of Hacking, we take a look at how Russian Hackers have shifted their focus to attacking infrastructure rather than individuals after being identified and putting victims through panic. Google AI launches a new bug hunting strategy called Fuzzing, which uses a machine learning algorithm to search for flaws in software. Fuzzing is a …
  continue reading
 
AppSec Days PNW leaders Jeevan Singh and Chelsea Willis join us to talk about the upcoming OWASP collaborative event from the OWASP chapters of Vancouver, Victoria, Seattle, and Portland happening this year in Portland on June 10th. AppSec Days PNW has been running for three years now and this is the first in person event. You can learn more and re…
  continue reading
 
Hey guys T-Mobile got hacked, PayPal gets hit by a massive credential stuffing attack, a new android malware that is an evolution of an existing banking malware, and a phone ad scheme that infected real apps. All this in this episode of Exploit Broker’s Hacking News Round up. You’re not going to want to miss this. Show Notes: https://exploitbrokers…
  continue reading
 
Intro Hey guys and welcome to Exploit Brokers where we break down articles, recap recent hacking events, and give insight on the technical aspects of the hacking events. I will explain things and give my opinion on tech and hacking events so let’s get started. Show Notes: https://exploitbrokers.com/podcasts/hn10…
  continue reading
 
Listen at: idegen.fm Contact us: @idegenfm Intro Welcome to I, Degen - A podcast about crypto technology, security, and culture. With a healthy balance of enthusiasm and skepticism, we dig into a weekly look at crypto, cutting through the misinformation and hype in search of signal in the noise. Episode Summary This week we discuss the draft of the…
  continue reading
 
Listen at: idegen.fm Contact us: @idegenfm Intro Welcome to I, Degen - A podcast about crypto technology, security, and culture. With a healthy balance of enthusiasm and skepticism, we dig into a weekly look at crypto, cutting through the misinformation and hype in search of signal in the noise. Episode Summary In this episode, we hunt for Do Kwon …
  continue reading
 
I, Degen - E14: All Eyes On Ethereum - 9/11/2022 Listen at: idegen.fm Contact us: @idegenfm Full show notes with images on HackMD - https://hackmd.io/@idegen/E14-All-Eyes-On-Ethereum Intro Welcome to I, Degen - A podcast about crypto technology, security, and culture. With a healthy balance of enthusiasm and skepticism, we dig into a weekly look at…
  continue reading
 
I, Degen - Episode 13 - Open Source Audio Audit with Kevin Seagraves & Zach Herring from Niftyapes.money If you have a moment, please check out episode 13 I, Degen sequence on Zeevo. Give your feedback on the show, and we'll mint you a custom token of appreciation 🙏 Listen at: idegen.fm Contact us: @idegenfm Intro On this episode of I, Degen we cha…
  continue reading
 
I, Degen - E12: Ethereum Fights to Remain Censorship Resistant - 8/24/2022 Listen at: idegen.fm Contact us: @idegenfm Intro Welcome to I, Degen - Each week, we track down and explore the most exciting crypto stories. Hacks, mysteries, exploits, and anything that feeds our crypto curiosity. We dig in, cutting through the misinformation and hype in s…
  continue reading
 
show notes here -->https://hackmd.io/@idegen/E11-Acala-hack-and-anti-crypto-sentiment I, Degen - E11 - Acala Bug Exploited & Exploration of Popular Anti-crypto Sentiment - 8/18/2022 Comment Listen at: idegen.fm Contact us: @idegenfm Intro Welcome to I, Degen - We track down and explore the most exciting crypto hacks, mysteries, exploits, and anythi…
  continue reading
 
https://hackmd.io/@idegen/E10-Tornado-Cash-Sanctioned-Saber-Protocol-Unmasked I, Degen - E10: Tornado Cash Sanctioned, Saber Protocol Unmasked - 8/11/2022 Listen at: idegen.fm Contact us: @idegenfm Intro Welcome to I, Degen - We track down and explore the most exciting crypto hacks, mysteries, exploits, and anything that feeds our crypto curiosity …
  continue reading
 
Loading …

Quick Reference Guide