Cyber Security public
[search 0]
Mai Mult
Download the App!
show episodes
 
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
  continue reading
 
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
  continue reading
 
Artwork
 
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
  continue reading
 
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
  continue reading
 
Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals commit ...
  continue reading
 
Welcome to "Cyber Security", the podcast that dives deep into the ever-evolving world of digital protection. Each episode explores the latest cyber threats, data breaches, hacking techniques, and the tools and strategies used to defend against them. Whether you're a tech enthusiast, IT professional, or just curious about how to stay safe online, this show offers expert insights, real-world case studies, and practical advice to help you navigate the complex digital landscape. Tune in and stay ...
  continue reading
 
北欧に居住していた古代民族にとって、サウナストーンと呼ばれる石の熱と、石に水をかけて立ち上る蒸気は、人間の生命力として考えられていました。サウナは今日でも、健康のためだけではなく、人々の意見交換の場としても使用されています WithSecureの日本語ポッドキャスト『Cyber SecurityサウナJapan』は、社内外のセキュリティエキスパートをホスト/ゲストとして、様々なことが起こっているセキュリティ業界でのホットなトレンドやテクノロジーに関する情報、そしてインサイトをお届けしていきます。
  continue reading
 
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
  continue reading
 
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
  continue reading
 
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
  continue reading
 
The UK's leading small business cybersecurity podcast helping SMEs protect against cyber threats without breaking the bank. Join cybersecurity veterans Noel Bradford (CIO at Boutique Security First MSP) and Mauven MacLeod (ex-UK Government Cyber Analyst) as they translate enterprise-level security expertise into practical, affordable solutions for UK small businesses. 🎯 WHAT YOU'LL LEARN: - Cyber Essentials certification guidance - Protecting against ransomware & phishing attacks - GDPR comp ...
  continue reading
 
Artwork

1
Cyber Security Weekly Podcast

MySecurity Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Săptămânal
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Artwork

1
Cyber Security Solution

Cyber Security Solution

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Zilnic+
 
At Cyber Security Solutions, we specialize in providing a wide range of cybersecurity services designed to protect your digital assets and ensure the security of your online presence. We offer tailored solutions to meet the unique security needs of individuals and businesses alike.
  continue reading
 
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
  continue reading
 
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
  continue reading
 
Cyber Security Course Arabic كيف ابدأ في مجال أمن المعلومات الأمن الإلكتروني كيفية شراء البيتكوين في المملكة العربية السعودية ببطاقة الائتمان أسرع طريقة في ثواني تذكر الاشتراك عبر هذا الرابط ، كي تحصل على خصم 10٪ من جميع رسوم شراء البيتكوين على بيانس https://www.binance.com/en/register?ref=F2IKGVD8 جزاكم الله خيرا
  continue reading
 
Artwork
 
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
  continue reading
 
Artwork

1
The Small Business Cyber Security Guy

The Small Business Cyber Security Guy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Zilnic+
 
Host Noel Bradford teams up with cybersecurity experts to deliver essential tech insights for UK small businesses and consumers. Cutting through jargon with wit and authority, each episode tackles real-world cyber threats, updates, and digital security challenges that actually matter to your business. From patch management to data protection, get actionable advice that doesn't require a computer science degree.Where cybersecurity meets practicality.
  continue reading
 
Artwork

1
Cyber Security Grey Beard®

Cyber Security Grey Beard®

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Lunar
 
Cyber security focused discussions geared towards students, early professionals and individuals moving into the cyber security profession. I use my ~30 years' experience in industry and provide examples, stories, suggestions and answer questions. This podcast is designed to help listeners learn, grown and advance in the cyber security profession. Recognized by Million Podcasts in their top 100 Cyber Security Podcasts.
  continue reading
 
Artwork

1
Cyber Security Café

Beverley Roche

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Lunar
 
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
  continue reading
 
Welcome to the Cyber Security Happy Hour Podcast. This podcast is dedicated to discussing a variety of topics in all things Cyber Security.. Each episode features our host Christie Ogubere This is Cyber Security podcast - do not forget to protect your data in transit by using our affiliate link for Nordvpn. GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free Website: https: ...
  continue reading
 
National Cyber Security Radio gives the hottest topics in cyber security news and reveals all the Fake News by other experts. Topics include, hacker for hire murders, how to make money cyber security, should you get your college degree or certification in cyber security, plus over 20 over topics. Execute Produced by one of the world’s most known and respected Ex-hacker Gregory Evans (GregoryDEvans.com) listeners will not be disappointed.
  continue reading
 
Control System Cyber Security Association International, or (CS)²AI, is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 34,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education, and directly support OT and ICS cyber security professional development in every way. Our founder, Derek Harp, intervi ...
  continue reading
 
Artwork

1
Cyber security risks and solutions

Cyber security risks and solut

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Lunar
 
Today’s built environment we face ever increasing risk from cyber security. In this podcast we explore some of the challenges and or imports solutions Cover art photo provided by bharath g s on Unsplash: https://unsplash.com/@xen0m0rph
  continue reading
 
Artwork

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple

Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Lunar
 
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
  continue reading
 
The cyber security podcast from PwC UK covers the latest developments in cyber risk, resilience and threat intelligence. In each episode we’re joined by special guests to give you practical insight on how to improve your cyber security and create a more resilient business.
  continue reading
 
Your all in one comprehensive view of what is happening across the real estate industry -- straight from some of the industry's earliest technology adopters and foremost experts in Technology, Marketing, Government Policy, Brokerage, Capital, Construction & Cyber Security in Real Estate. The show is broken down into three parts: Part I: Introductions and what's new for each panelist and the business sector Part II: Sector Focus on the past month's most prominent news and paradigm shifts Part ...
  continue reading
 
Welcome to the new realities of cyber security podcast series, where we'll be looking at the key challenges and opportunities faced by businesses in the rapidly evolving area of cyber security. From digital crime scene forensics to GDPR, this series covers topical issues that matter.
  continue reading
 
Artwork

1
Cyber Security Leadership

Yaron Levi & Jeff Snyder

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Lunar
 
We believe in empowering security leaders to maximize their strengths, equip them with the skills needed for the top security job and inspire them to become the leaders that their organizations and teams require and deserve. In this podcast Jeff Snyder, Executive coach and Cybersecurity Recruiter since 1997, and Yaron Levi, CISO and Security Advisor will share their experiences and the lessons learned in order to empower others to become the best version of themselves. This is our way to giv ...
  continue reading
 
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
  continue reading
 
This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
  continue reading
 
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
  continue reading
 
Cyber Security for Small Businesses doesn't need to be complicated or expensive. Most of the time it comes down to planning, procedures and good Systems Administration. Learn the techniques that you can use to increase Cyber Resilience in your Small Business. The podcast covers auditing tools like the ACSC Essential 8, NIST and ISO 27001. It will look at ways that you can identify, protect, detect, respond and recovery to a cyber incident. You will learn about: Malware Denial of Service Man ...
  continue reading
 
Cyber Sentinel is your go-to podcast for expert insights into cybersecurity, digital privacy, and cutting-edge tech—featuring voices from pioneering companies like https://menavpn1.com/ . Hosted by Alex Carter of ByteShield, each episode features in-depth conversations with developers, ethical hackers, and privacy advocates working on the front lines of digital defense. Whether you’re a tech enthusiast, policy wonk, or developer, Cyber Sentinel brings you the knowledge and perspectives you n ...
  continue reading
 
Loading …
show series
 
Google uncovers PROMPTFLUX malware CISA warns of CentOS Web Panel bug Threat group targets academics Huge thanks to our sponsor, ThreatLocker Cybercriminals don't knock — they sneak in through the cracks other tools miss. That's why organizations are turning to ThreatLocker. As a zero-trust endpoint protection platform, ThreatLocker puts you back i…
  continue reading
 
Bridging the CISO-board disconnect which hinders your cyber-security progress Measuring cyber-risk in financial, economic and operational terms and demonstrating value in cyber-investments Focusing on governance and compliance – how to answer when asked “are we compliant? Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Zia …
  continue reading
 
Updates to Domainname API Some updates to our domainname API will make it more flexible and make it easier and faster to get the complete dataset. https://isc.sans.edu/diary/Updates%20to%20Domainname%20API/32452 Microsoft Teams Impersonation and Spoofing Vulnerabilities Checkpoint released details about recently patched spoofing and impersonation v…
  continue reading
 
An overview of #OpChildSafety, an ongoing hacktivist operation founded by the decentralized collective Anonymous, which focuses on digital vigilantism to protect minors from online child exploitation. This dedicated effort emerged as part of Anonymous' broader campaigns, gaining prominence between 2018 and 2024, motivated in part by perceived limit…
  continue reading
 
Want to be the first to hear our episodes each week? Become a Patreon donor here. Links we discuss this week: https://thehackernews.com/2025/10/self-spreading-glassworm-infects-vs.html?m=1 https://www.cybersecuritydive.com/news/artificial-intelligence-security-risks-ey-report/803490/ https://www.cybersecuritydive.com/news/ai-augment-security-identi…
  continue reading
 
What happens when the dark side gets its hands on cutting-edge AI and why might even seasoned defenders find themselves playing catch-up? Welcome back to Razorwire, where I’m joined by Oliver Rochford and Richard Cassidy to discuss how criminals are using AI, what's actually working and how the threat landscape is changing. We explore how adversari…
  continue reading
 
In episode 45, we sit down with Jasson Casey, CEO and Co-Founder of Beyond Identity, to explore how identity has become the new perimeter in cybersecurity. With over two decades of experience across security, networking, and software-defined infrastructure, Jasson unpacks why traditional defenses are failing and how the next generation of identity …
  continue reading
 
In this AMA edition of DailyCyber, I explore the challenges and opportunities defining the next wave of cybersecurity leadership. From AI threats to emotional intelligence, this session breaks down what’s shaping 2025’s security landscape — and how to stay ahead. 🔥 What We’ll Cover: 1️⃣ AI-Driven Threats & Deepfakes – How attackers are using AI to …
  continue reading
 
This episode is a deep dive into the mathematics, implementation, and vulnerabilities of modern digital security, focusing on the powerful role of Elliptic Curve Cryptography (ECC). ECC has largely superseded older algorithms like RSA because of its superior efficiency, providing equivalent security strength with significantly shorter keys, a cruci…
  continue reading
 
The sources provide a comprehensive overview of the 764 network, classified as a decentralized, international online group operating as a violent extremist organization primarily targeting minors for grooming, sextortion, and coercion into self-harm. Originating around 2021 as an offshoot of an earlier group called CVLT, the network employs sophist…
  continue reading
 
An overview of #OpChildSafety, an ongoing hacktivist operation founded by the decentralized collective Anonymous, which focuses on digital vigilantism to protect minors from online child exploitation. This dedicated effort emerged as part of Anonymous' broader campaigns, gaining prominence between 2018 and 2024, motivated in part by perceived limit…
  continue reading
 
A comprehensive overview of the 764 network, classified as a decentralized, international online group operating as a violent extremist organization primarily targeting minors for grooming, sextortion, and coercion into self-harm. Originating around 2021 as an offshoot of an earlier group called CVLT, the network employs sophisticated psychological…
  continue reading
 
Scattered Spider, LAPSUS$, and ShinyHunters join forces Nikkei reports data breach impacting 17,000 people React Native NPM flaw leads to attacks Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero…
  continue reading
 
Apple Patches Everything, Again Apple released a minor OS upgrade across its lineup, fixing a number of security vulnerabilities. https://isc.sans.edu/diary/Apple%20Patches%20Everything%2C%20Again/32448 Remote Access Tools Used to Compromise Trucking and Logistics Attackers infect trucking and logistics companies with regular remote management tool…
  continue reading
 
"SleepyDuck" uses Ethereum to keep command server alive SesameOp abuses OpenAI Assistants API Organized crime cybercrooks steal cargo Huge thanks to our sponsor, ThreatLocker Cybercriminals don't knock — they sneak in through the cracks other tools miss. That's why organizations are turning to ThreatLocker. As a zero-trust endpoint protection platf…
  continue reading
 
XWiki SolrSearch Exploit Attempts CVE-2025-24893 We have detected a number of exploit attempts against XWiki taking advantage of a vulnerability that was added to the KEV list on Friday. https://isc.sans.edu/diary/XWiki%20SolrSearch%20Exploit%20Attempts%20%28CVE-2025-24893%29%20with%20link%20to%20Chicago%20Gangs%20Rappers/32444 AMD Zen 5 Random Num…
  continue reading
 
Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Davi Ottenheimer, vp, digital trust and ethics, Inrupt, and Rob Teel, Field CTO, GigaOm Thanks to our show sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's w…
  continue reading
 
Australia warns of BADCANDY attacks exploiting Cisco IOS XE Chinese hackers exploiting Cisco ASA firewalls used by governments worldwide OpenAI's Aardvark GPT-5 agent finds and fixes code flaws automatically Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything…
  continue reading
 
Scans for WSUS: Port 8530/8531 TCP, CVE-2025-59287 We did observe an increase in scans for TCP ports 8530 and 8531. These ports are associated with WSUS and the scans are likely looking for servers vulnerable to CVE-2025-59287 https://isc.sans.edu/diary/Scans%20for%20Port%208530%208531%20%28TCP%29.%20Likely%20related%20to%20WSUS%20Vulnerability%20C…
  continue reading
 
These sources provide a detailed comparative analysis of two significant ransomware threats: Crypto24 and LockBit. The first source offers a side-by-side comparison, establishing that LockBit operates as a massive Ransomware-as-a-Service (RaaS) model with highly variable tactics due to its use of affiliates, while the newer Crypto24 is characterize…
  continue reading
 
LinkedIn users have until Monday to opt out of its AI training program New names surface for NSA leadership Open-source security group pulls out of U.S. grant, citing DEI restrictions Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer re…
  continue reading
 
X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are supposed to identify the researcher conducting the scans https://isc.sans.edu/diary/X-Request-Purpose%3A%20…
  continue reading
 
The sources consist of an in-depth LinkedIn article detailing the Crypto24 ransomware attack on a bank and a LinkedIn error page that suggests alternative content to explore. The article, written by Michael Slowik, explains how the Crypto24 group successfully breached the bank by exploiting basic security vulnerabilities such as weak passwords and …
  continue reading
 
LG Uplus confirms cybersecurity incident 10 million+ impacted by Conduent breach Russian hackers exploit tools against Ukrainian targets Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer requests for documentation or answers. But Convey…
  continue reading
 
How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like dd do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems/32432 Microsoft Azure Front Door Outage Today, Microsoft s Azure Front Door servi…
  continue reading
 
A Regulatory Crossroads for Uruguay’s Digital Future Uruguay stands at a critical juncture in the formation of its digital policy, navigating a landscape defined by a stark “policy bifurcation.” This division is evident in the contrast between two distinct regulatory efforts: the swift, consensus-driven passage of a law governing the economic and l…
  continue reading
 
The source provides excerpts from a transcript of a video interview with John McAfee, the British-American computer programmer and founder of the McAfee software company. McAfee, who notes he and his wife Janice are on the run from US authorities, discusses his rejection of traditional finance and investment, favoring cryptocurrencies like Monero a…
  continue reading
 
New Android malware types like a human Sanctions weaken nation-state cyber ecosystems Side-channel attack extracts Intel, AMD secrets Huge thanks to our sponsor, Conveyor Have you been personally victimized by a questionnaire this week? The queue never ends. But Conveyor can change that story. With AI that answers questionnaires of any format, and …
  continue reading
 
Un Nuevo Paradigma de Amenaza Híbrida Este briefing tiene como propósito analizar la convergencia de tres fuerzas que están redefiniendo el panorama de la seguridad en México: la creciente sofisticación tecnológica del crimen organizado, la existencia de vulnerabilidades digitales críticas en la infraestructura nacional y una corrupción institucion…
  continue reading
 
Cuando se Apagaron las Luces El 30 de septiembre de 2025, una sombra digital se cernió sobre Uruguay. El Banco Hipotecario (BHU), una entidad estatal clave para la vivienda y la economía del país, sufrió un apagón total en su red. Este evento no fue un “incidente informático” aislado, como insistieron las voces oficiales. Fue la materialización pre…
  continue reading
 
Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters that should be rendered. https://isc.sans.edu/diary/A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line…
  continue reading
 
The source, a transcript from a YouTube video titled "HACKEAN A LA GUARDIA NACIONAL," discusses a critical cybersecurity vulnerability involving geo-stationary satellites where sensitive data is transmitted unencrypted. Researchers from the University of California San Diego and the University of Maryland demonstrated that with readily available eq…
  continue reading
 
En la azotea de una universidad, un grupo de “cerebritos”, como los llama su fuente, apuntó una antena hacia el cielo. No buscaban estrellas ni señales extraterrestres. Buscaban secretos. Y con un equipo de apenas 14,000 pesos mexicanos, encontraron más de los que jamás imaginaron, desvelando las comunicaciones internas de la Guardia Nacional de Mé…
  continue reading
 
1. Introducción: Un Router Comprometido en Irán En 2010, un router Huawei recién instalado en la oficina de un político iraní se convirtió en la herramienta de vigilancia perfecta. Sin que nadie lo supiera, una falla de diseño permitía a un atacante eludir la contraseña con un simple comando, una “llave maestra” digital que abría la puerta a todos …
  continue reading
 
The source provides an overview of Operation Shotgiant, a sophisticated cyber-espionage effort by the National Security Agency (NSA) of the United States targeting the Chinese telecommunications giant, Huawei. The operation began with an effort to determine if Huawei was spying on behalf of the Chinese government, as well as to map the company's in…
  continue reading
 
Introducción: Un Cebo en la RedEn diciembre de 2012, el investigador de ciberseguridad Kyle Wilhoit lanzó un experimento fascinante. Creó una planta de tratamiento de agua completamente virtual, con sistemas de control industrial, documentación detallada y hasta un sitio web. Aunque supuestamente estaba ubicada en Missouri, en realidad funcionaba d…
  continue reading
 
The source provides an overview of Operation Shady Rat, a long-running, extensive campaign of cyber-espionage attributed to a unit of the Chinese military (Unit 61398) starting around 2006. This operation involved Advanced Persistent Threats (APTs) utilizing simple but effective spear-phishing emails to install malware (often referred to as a "rat"…
  continue reading
 
Introducción: El Asalto de los $600 Millones En marzo de 2022, millones de jugadores del popular videojuego Axie Infinity comenzaron a experimentar algo extraño. Lo que al principio parecía una simple falla técnica —algunas funciones dejaron de responder— pronto se reveló como algo mucho más siniestro. El sistema no se podía arreglar porque no esta…
  continue reading
 
The video transcript explores the phenomenon of highly effective North Korean state-sponsored hacking, contrasting this technological prowess with the nation's overall economic poverty and technological isolation enforced by its Juche ideology. It details how the government identifies and trains gifted math and science students to become hackers, o…
  continue reading
 
Introducción: El Apagón que Conmocionó al Mundo de los Videojuegos El 20 de abril de 2011, el universo de los videojuegos se detuvo. Sin previo aviso, una fuerza misteriosa desconectó la PlayStation Network (PSN) de Sony, sumiendo a millones de jugadores en un silencio digital. Lo que comenzó como una simple interrupción del servicio se convirtió r…
  continue reading
 
Loading …

Ghid rapid de referință

Listen to this show while you explore
Play