The Hacker Files Podcast public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
Hacker Public Radio

Hacker Public Radio

Unsubscribe
Unsubscribe
Monthly
 
Hacker Public Radio is an podcast that releases shows every weekday Monday through Friday. Our shows are produced by the community (you) and can be on any topic that are of interest to hackers and hobbyists.
  continue reading
 
Artwork
 
The Hacker Mind is an original podcast from the makers of Mayhem Security. It’s the stories from the individuals behind the hacks you’ve read about. It’s about meeting some of the security challenges in software through advanced techniques such as fuzz testing. It’s a view of the hackers and their world that you may not have heard before.
  continue reading
 
Artwork

1
The Cyber Brief Podcast

National Cybersecurity Center

Unsubscribe
Unsubscribe
Monthly
 
The CyberBrief Podcast uncovers the latest cyber attacks, hacks, and stories that matter. Cyber crimes are growing exponentially, with many of the latest attacks & hacks being the biggest in history and costing billions of dollars. But what can we as cyber professionals, business leaders, or just people living in a digital age do? In this series, we’ll dive into the history of cybersecurity, some of the top hacks and scams in cyber, and what we can do about it. To mark Cybersecurity Awarenes ...
  continue reading
 
Artwork

1
Vulnerable U

Matt Johansen

Unsubscribe
Unsubscribe
Monthly+
 
Welcome to Vulnerable U, a podcast where we explore the intersection of vulnerability and cyber security. Each episode, we explore how vulnerability can drive growth and foster community resilience within our industry. Get ready for thought-provoking conversations, real-life stories, and curated news that inspire you to embrace discomfort on the road to a more vulnerable you.
  continue reading
 
Artwork

1
مذكرات العالم الخفي

Hidden World Diary | مذكرات العالم الخفي

Unsubscribe
Unsubscribe
Daily+
 
Hidden World Diary I'm a normal guy just like you who was so curious about the dark web. One day, my brother challenged me to hack our neighbor's WIFI and he did it while looking down at me. I was a little skeptical myself, so I accepted the challenge and started my research. As any ethical hacker out there, you know that gathering info is so important for any type of attack. I did some social engineering work, got into his network, scanned it, changed the password and of course he got kicke ...
  continue reading
 
Loading …
show series
 
Send us a Text Message. In the ever-evolving landscape of social media and online interactions, the phenomenon of cyberbullying has emerged as a pervasive and harmful issue, particularly among the younger demographic. The episode delves into the intricacies of cyberbullying, exploring its various forms, the psychological impact on victims, and the …
  continue reading
 
Are traditional healthcare models ready for the disruptive innovations of entrepreneurs like Dr. Sven Jungmann? With extensive medical expertise and entrepreneurial vision, Dr. Jungmann co-founded Halitus to develop state-of-the-art breath analysis devices. Using AI/ML and digital health, Dr. Jungmann is bridging healthcare and tech. We cover: Dr. …
  continue reading
 
Send us a Text Message. Humans are social creatures. Opportunities to interact have become more and more prevalent with those outside of your normal sphere. But, it's not all sunshine and rainbows. There are those out there that wish to harm others. Preying on those who don't know any better or who can't protect themselves. This episode will addres…
  continue reading
 
Today I Learnt more Bashtips Sgoti talksabout supplying options to bash scripts Tags: Bash tips, TIL, getopts #!/bin/bash# License: GPL v3# This program is free software: you can redistribute it and/or modify# it under the terms of the GNU General Public License as published by# the Free Software Foundation, either version 3 of the License, or# (at…
  continue reading
 
'AI-First' has replaced 'Data-Driven'. AI technology must be integrated into systems, teams, tools, and products to survive. But what about the legal and compliance? Ramakrishnan has been at the forefront of AI adoption for enterprises, having held executive and advisory roles at Element AI and Perpetua Labs. Currently, he's co-founder and CEO at A…
  continue reading
 
Send us a Text Message. While social media and gaming have been massive game changers in bringing the world together. Apps like TikTok have opened up endless possibilities for those willing to put themselves out there. Unfortunately, most don't think of the consequences that come with using such platforms. In this episode, we will discuss the dange…
  continue reading
 
Send us a Text Message. The Hacker Files Podcast: empowering families in the digital age. Hey, Anita and Ken here! We are excited to share our years of knowledge and experience as Cybersecurity professionals with you and help protect one of the most important commodities in existence, our families. Join us as we navigate through the dangers of Cybe…
  continue reading
 
Join us to dive into the world of AI infrastructure with Wes Cummins, CEO and Chairman of Applied Digital. Prior to founding the company he also founded and led 272 Capital LP and led B. Riley Asset Management as President. Applied Digital (Nasdaq: APLD) designs, develops and operates next-generation datacenters across North America to provide digi…
  continue reading
 
Ben Parr is a tech industry veteran with a career spanning from award-winning author to influential editor at CNET and Mashable. He's also the co-founder of Octane AI and the driving force behind the AI Analyst, a decade-long voice at the intersection of tech, business, media, and society. 💼🚀📱 🎙️ Looking for daily strategies on how to integrate AI …
  continue reading
 
Bots are actionable scripts that can slow your day to day business, be enlisted in denial of service attacks, or even keep you from getting those tickets Taylor Swift you desperately want. Antoine Vastel from DataDome explains how it's an arms race: the better we get at detecting them, the more the bots evolve to evade detection. Transcript here.…
  continue reading
 
Engineers and data leads engaged in grassroots AI projects or tackling challenges related to AI headcount, budget, and ROI expectations might find this episode particularly resonates. Hadrian's Klaas Meinke and Jasper Insinger join us to share their experiences in founding AI projects at Hadrian, collaborating across functions, and achieving busine…
  continue reading
 
Howdy friends. This week I discuss how ALPHV/Blackcat filed a SEC complaint against one of their ransomware victims, ALPHV/Blackcat’s use of Google Ads to target victims, LockBit’s leak of Boeing’s files, Google’s confirmation that they will disable uBlock in Chrome in 2024, the release of new CVSS 4.0 vulnerability severity rating standard, YouTub…
  continue reading
 
You would think there is a procedure to End-of-Life a medical device, right? Erase personal health info. Erase network configuration info. Speaking at SecTor 2023, Deral Heiland from Rapid 7 said he found that he was able to buy infusion pumps on the secondary market with the network credentials for the original Health Care Delivery Organization in…
  continue reading
 
Howdy friends. This week I cover Biden’s AI executive order, the pledge that 40 countries took to not pay ransom to cybercriminals, Prolific Puma, Lazarus hacking group’s focus on infecting blockchain experts with malware, the pwning of the JFK taxi system by Russian hackers, and Boeing’s recent ‘cyber incident’. We’re sticking with just the news o…
  continue reading
 
Overview Recently Ken Fallon did a show on HPR, number3962, in which he used a Bashpipeline of multiple commands feeding their output into awhile loop. In the loop he processed the lines produced bythe pipeline and used what he found to download audio files belonging toa series with wget. This was a great show and contained some excellent advice, b…
  continue reading
 
Howdy friends. This week I go over the Okta security breach, SolarWinds and their Chief Information Security Officer charged by the SEC with Fraud, Cisco’s second recent 0-day, Browser-based attacks on Apple devices, Telegram’s continued leaks, and the 34 Spanish cyber criminals arrested for stealing 4 million people's data. We’re sticking with jus…
  continue reading
 
With the recent Clop attack on customers of MoveIt, ransomware is now old news. Attackers are skipping the encryption and simply extorting the exfiltrated data, according to Thomas “Mannie” Wilken, from the Accenture Cyber Threat Intelligence Dark Web Reconnaissance Team. He should know; he spends his days on the Dark Web seeing the rise of new inf…
  continue reading
 
Howdy friends. This week I discuss the North Korean IT workers found to have been sending wages from their remote jobs back to North Korea to fund weapons programs, the massive Cisco device 0-day, the fall of the ACG hacking group, a complex malvertising campaign that was recently uncovered, and the discovery of government-backed hackers exploiting…
  continue reading
 
Welcome to a special edition of the Cyber Brief Podcast, the cybersecurity show that uncovers the latest cyber-attacks, hacks, and stories that matter to all of us. This podcast is brought to you by the National Cybersecurity Center. We’re bringing to you our nationally acclaimed cyber training from our Cyber for Government Leaders Program, package…
  continue reading
 
Welcome to a special edition of the Cyber Brief Podcast, the cybersecurity show that uncovers the latest cyber-attacks, hacks, and stories that matter to all of us. This podcast is brought to you by the National Cybersecurity Center. We’re bringing to you our nationally acclaimed cyber training from our Cyber for Government Leaders Program, package…
  continue reading
 
Welcome to a special edition of the Cyber Brief Podcast, the cybersecurity show that uncovers the latest cyber-attacks, hacks, and stories that matter to all of us. This podcast is brought to you by the National Cybersecurity Center. We’re bringing to you our nationally acclaimed cyber training from our Cyber for Government Leaders Program, package…
  continue reading
 
Welcome to a special edition of the Cyber Brief Podcast, the cybersecurity show that uncovers the latest cyber-attacks, hacks, and stories that matter to all of us. This podcast is brought to you by the National Cybersecurity Center. We’re bringing to you our nationally acclaimed cyber training from our Cyber for Government Leaders Program, package…
  continue reading
 
Welcome to a special edition of the Cyber Brief Podcast, the cybersecurity show that uncovers the latest cyber-attacks, hacks, and stories that matter to all of us. This podcast is brought to you by the National Cybersecurity Center. We’re bringing to you our nationally acclaimed cyber training from our Cyber for Government Leaders Program, package…
  continue reading
 
Imagine a data dump of files similar to the Snowden Leaks in 2013, only this it’s not from the NSA but from NT Vulkan, a Russian contractor. And it’s a framework for targeting critical IT infrastructures. In a talk at DEF CON 31, Joe Slowick from Huntress, shares what a Russian whistleblower released in the form of emails and documents, and how we …
  continue reading
 
Joseph Reeve from Amplitude Analytics' AI R&D team explores the world of building intelligent digital products using AI and ML. In our conversation we cover: Data Governance: Discussion on the importance of data governance, including proactive and reactive strategies. Proactive governance involves planning data collection, while reactive governance…
  continue reading
 
Howdy friends. This week I explain the 23andMe data breach, the new group responsible for attacking iPhone encryption backed by a political dark-money network, the uptick in police use of Google’s data, the increase in hacking scam on the elderly community, Cisco Emergency Responder static credential vulnerability, the iOS 17 0-day, Qualcomm's thre…
  continue reading
 
Hello all. This is gemlog from Terrace, bc, canada just up near thealaska panhandle. Some of you may know me from in COM chat on sdf dot org or as afedizen on the tilde dot zone instance of mastodon. Now, the other day I finally got around to checking out HPR properly,even though my masto-pal claw-dio-m turned me on to it a couple of yearsago. Rece…
  continue reading
 
You can view screen-share from Paul on Youtube here In this episode, Keeper's Founder and CEO Paul Koullick explores the transformative impact of AI for tax preparation software. He discusses the limitations of rules-based systems and how AI, as exemplified by Keeper, simplifies tax preparation with machine learning. Paul also delves into the chang…
  continue reading
 
Rather than use backdoor exploits, attackers are stealing credentials going through the front door. How are they gaining credentials. Sometimes it’s from the tools we trust. Paul Geste and Thomas Chauchefoin discuss their DEF CON 31 presentation Visual Studio Code is why I have (Workspace) Trust issues as well as the larger question of how much we …
  continue reading
 
Howdy friends. This week I dive into the WebP 0day, the Youth hacking ring at the center of recent cybercrime spree, the financially motivated UNC3944 threat actor that has shifted its focus to ransomware attacks, University of Minnesota’s data breach, the $200 million crypto hack on Mixin, and the discovery of China-linked threat actors who have m…
  continue reading
 
Welcome to a special edition of the Cyber Brief Podcast, the cybersecurity show that uncovers the latest cyber-attacks, hacks, and stories that matter to all of us. This podcast is brought to you by the National Cybersecurity Center. We’re bringing to you our nationally acclaimed cyber training from our Cyber for Government Leaders Program, package…
  continue reading
 
Welcome to a special edition of the Cyber Brief Podcast, the cybersecurity show that uncovers the latest cyber-attacks, hacks, and stories that matter to all of us. This podcast is brought to you by the National Cybersecurity Center. We’re bringing to you our nationally acclaimed cyber training from our Cyber for Government Leaders Program, package…
  continue reading
 
Welcome to a special edition of the Cyber Brief Podcast, the cybersecurity show that uncovers the latest cyber-attacks, hacks, and stories that matter to all of us. This podcast is brought to you by the National Cybersecurity Center. We’re bringing to you our nationally acclaimed cyber training from our Cyber for Government Leaders Program, package…
  continue reading
 
Welcome to a special edition of the Cyber Brief Podcast, the cybersecurity show that uncovers the latest cyber-attacks, hacks, and stories that matter to all of us. This podcast is brought to you by the National Cybersecurity Center. We’re bringing to you our nationally acclaimed cyber training from our Cyber for Government Leaders Program, package…
  continue reading
 
Welcome to a special edition of the Cyber Brief Podcast, the cybersecurity show that uncovers the latest cyber-attacks, hacks, and stories that matter to all of us. This podcast is brought to you by the National Cybersecurity Center. We’re bringing to you our nationally acclaimed cyber training from our Cyber for Government Leaders Program, package…
  continue reading
 
Amin's journey into the world of artificial intelligence (AI) began around 2006 when he became captivated by the potential of neural networks to learn from data. He noticed that AI experienced periods of intense hype followed by quieter moments. Amin delved into AI by building neural networks from scratch in C. This hands-on experience enabled him …
  continue reading
 
Howdy friends. This week I will discuss the MGM Resorts and Caesars Entertainment hacks, Github’s launch of passkeys, Mark Cuban’s crypto wallet hack, the Microsoft AI researchers accidental data leak, the Microsoft teams phishing problem, Cisco’s acquisition of Splunk, and the latest T-mobile data breach We’re sticking with just the news on this v…
  continue reading
 
How do you conduct an incident response for an entire country? When it’s 27 different life-critical government ministries each with up to 850 individual devices -- that’s uncharted territory. Esteban Jimenez of ATTI Cyber talks about his experience with the reconstruction of the cybersecurity system following Conti, how the country handled a second…
  continue reading
 
Howdy friends. This week I am covering the China-backed Flax Tycoon hack on Taiwan, a Brazilian phone spyware that was hacked, the MOVEit hack statistics, the FBI and partners dismantling of Qakbot infrastructure in a massive international cyber takedown, a fake Signal app planted on the Google Play store, and the tragic death of a Saudi man by dea…
  continue reading
 
Howdy friends. In this video I go over UK Surveillance requirement revisions, CloudNordic’s ransomware incident, a SIM-Swap Crypto Hack perpetrated on a crypto investor, the Citrix Sharefile flaw exploit, Tesla’s massive data breach of employee’s personal information, and updates on the Discord and Lapsus$ stories from last week We’re sticking with…
  continue reading
 
What is is like to hack an entire country, to take it’s government services offline, to deny a government an ability to function? Costa Rica knows. Esteban Jimenez of ATTI Cyber has been helping Costa Rica improve its cybersecurity posture for more than 16 years, and he has been helping them recently recover from a crippling ransomware attack in Ap…
  continue reading
 
Howdy friends. In this video, I cover GitHub’s plans to require two-factor authentication, Discord.io’s recent data breach and shutdown, the Kubernetes misconfiguration that exposes data of several Fortune 500 companies and possibly hundreds more, the PSNI and UK voter breaches and why they should be taken more seriously, and finally the $70 device…
  continue reading
 
Howdy friends. In this video, I go over how hackers have rigged casino card-shuffling machines, my take on the Rapid7 layoffs, Homeland Security’s report on the Lapsus$ breaches, EvilProxys phishing campaign, and the cyberattack that caused medical provider CardioComm to take their system offline. We’re sticking with just the news on this video, bu…
  continue reading
 
Howdy friends. In this video, the juiciest in infosec news including a vulnerability that led to unlimited airline miles, Microsoft gets called out, and Russian phishing in MS Teams. We’re sticking with just the news on this video, but you can find more Vulnerable U personal and professional growth content on my blog: https://www.mattjay.com/blog/ …
  continue reading
 
Speaking at Black Hat 2023, Kelly Shortridge is bringing cybersecurity out of the dark ages by infusing security by design to create secure patterns and practices. It’s a subject of her new book on Security Chaos Computing, and it’s a topic that’s long overdue to be discussed in the field. Transcript.…
  continue reading
 
Howdy friends. In this video, I walk through the SEC vote requiring companies to disclose cybersecurity incidents, an intentional backdoor discovered in radio comms, Google’s 0-day year in review, malware in Call of Duty, and Lazarus linked to two heists. We’re sticking with just the news on this video, but you can find more Vulnerable U personal a…
  continue reading
 
Loading …

Quick Reference Guide