Cyber Security News público
[search 0]
Mais
Download the App!
show episodes
 
This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
  continue reading
 
Loading …
show series
 
Today's episode is a little different. We have the opportunity to speak to the host of ITPodcast.Club, available on major podcasting platforms and who is in their last year of university. This episode is a bit longer around 30 minutes, but Alwin and I talk about a few topics including, paid and free learning resources, how we learn, entry level wor…
  continue reading
 
Hello and welcome back to USB our Guest, Cyber Security tips. I’m Theo, here to help you break down cyber security news and hacks and how they affect you. However, today I am interviewing Anyaacii a Linux in HPC Administrator. We recorded the interview in an open discord voice channel with video while monitoring chat with Text-to-speech developed b…
  continue reading
 
Another interview! Yup! Today I am interviewing Tech Penguin who is a Senior Penetration Tester in the Netherlands. We recorded the interview in an open discord voice channel with video while monitoring chat with Text-to-speech developed by Security_Live. The Tech Penguin has 5 years experience as a penetration tester and a different entry to the C…
  continue reading
 
Today I am interviewing The MonoSpace Mentor, CEO and CTO of their own managed web hosting business. We recorded the interview in an open discord voice channel with video while monitoring chat with Text-to-speech developed by Security_Live. The MonoSpace mentor has a wealth of life experience that I will attempt to draw on. From early beginnings, g…
  continue reading
 
Today I am interviewing Tegora, an L3 System Administrator & Senior Technical Leader with technical responsibilities for Networking/Linux/HPC. We recorded the interview in an open discord voice channel with video while monitoring chat with Text-to-speech developed by Security_Live. While this time I had his volume level closer to mine, the music wa…
  continue reading
 
Hello and welcome back to USB our Guest, Cyber Security tips. I’m Theo, here to help you break down cyber security news and hacks and how they affect you. However, today I am interviewing Zoogs. He has been in the industry for a bit now and I wanted to pick his brain on a variety of topics. We decided to record this live on twitch with chat using t…
  continue reading
 
In this video Episode of USB our Guest, I Phish myself Repeatedly. Today I wanted to do something a little different and something I've wanted to do for a while. I'm getting phished, repeatedly. I'm going to show you multiple legitimate login screens next to spoofed login screens that actually steal credentials. We're gonna talk about when and wher…
  continue reading
 
This episode cover the LastPass breach that occurred in August. Links to the LastPass blog and articles referenced in the show are below. You can also find me on twitch at https://www.twitch.tv/b7h30. [LastPass - Notice of Recent Security Incident](https://blog.lastpass.com/2022/08/notice-of-recent-security-incident/) [Explore how LastPass keeps yo…
  continue reading
 
I sit down with Stefan from the Tech Hatters Discord for a discussion on the Russia / Ukraine Cyber War. Stefan is a University student working in the industry. Please see all the links for all the articles we discussed below. Feel free to run all the links provided below through VirusTotal to ensure safe to click. I do not suggest using the 1920.i…
  continue reading
 
Today’s episode covers the vulnerability affecting Java logging package, Log4j. This episode took a little longer to make than expected due to its complexity. Please see links below used to create the episode. TryHackMe’s Solar, exploiting log4j https://tryhackme.com/room/solar The Log4J Vulnerability Will Haunt the Internet for Years https://www.w…
  continue reading
 
Today's episode covers the recent Twitch hack. yikes. The entirety of Twitch has reportedly been leaked https://www.videogameschronicle.com/news/the-entirety-of-twitch-has-reportedly-been-leaked/ A Devastating Twitch Hack Sends Streamers Reeling - https://www.wired.com/story/devastating-twitch-hack-sends-streamers-reeling/ Twitch confirms it was ha…
  continue reading
 
This episode is about the recent EA/Electronic Arts hack that occurred on June 6th. TL:DR/L - only download from Legit game retailers. Hackers Steal Wealth of Data from Game Giant EA - https://www.vice.com/en/article/wx5xpx/hackers-steal-data-electronic-arts-ea-fifa-source-code Hackers leak full EA data after failed extortion attempt - https://ther…
  continue reading
 
Today’s episode is about the Ransomware attack that occurred on May 7th that forced Colonial Pipeline to shut down its operations. A Closer Look at the DarkSide Ransomware Gang - https://krebsonsecurity.com/2021/05/a-closer-look-at-the-darkside-ransomware-gang/#more-55529 Colonial Pipeline attack: Everything you need to know- https://www.zdnet.com/…
  continue reading
 
Today’s episode covers the FBI’s Unprecedented helpful remote hacking of Hafnium infected servers. The FBI is remotely hacking hundreds of computers to protect them from Hafnium- https://www.theverge.com/2021/4/13/22382821/fbi-doj-hafnium-remote-access-removal-hack The FBI got a court order to delete backdoors from hacked Exchange servers- https://…
  continue reading
 
Today's episode is about cheaters or modders getting infected with RAT’s or a Remote Access Trojans. Tech Republic - Malicious attack now targeting video gamers and modders https://www.techrepublic.com/article/malicious-attack-now-targeting-video-gamers-and-modders/ Cisco Talos - Cheating the cheater: How adversaries are using backdoored video game…
  continue reading
 
Today’s episode covers RATs or Remote Access Trojans. There is a great article on DarkReading that gives an overview of what RATs do and I’ll include it in the show notes. In This episode we will cover What are RATs, how do they find their way on your computer, what they do when they find themselves on there and what you can do to protect your devi…
  continue reading
 
Today’s episode covers the Microsoft Server Exchange Hack. So disclaimer here, this is a fairly technical hack. The purpose of this episode is to give you a high level overview of the hack, a timeline, who is responsible and what to do? Krebs on Security - At Least 30,000 U.S. Organizations Newly Hacked Via Holes in Microsoft’s Email Software - htt…
  continue reading
 
Silver Sparrow as discovered by Red Canary RedCanary's silver sparrow discovery - https://redcanary.com/blog/clipping-silver-sparrows-wings/ Computer world - https://www.computerworld.com/article/3609611/30k-macs-infected-with-silver-sparrow-virus-m1-mac-ssd-health.html MITRE|ATT&CK - LaunchAgents - https://attack.mitre.org/techniques/T1543/001/ Cy…
  continue reading
 
Hello and welcome back to USB our Guest Cyber Security tips. Today's episode is about CD Projekt Red's CyberPunk2077 Breach. Spoiler, they tell hackers 'no thank you' to ransom demands and restore from backup. Wired article https://www.wired.com/story/cd-projekt-red-ransomware-hack-cyberpunk-2077-source-code/ knowbe4 blog https://blog.knowbe4.com/c…
  continue reading
 
Today's episode covers Zero Days. What are they, why you should know about them and what you should do when you hear about them.Recent Windows Zero day - https://www.darkreading.com/vulnerabilities---threats/microsoft-fixes-windows-zero-day-in-patch-tuesday-rollout/d/d-id/1340114FireEye Zero-Day definition - https://www.fireeye.com/current-threats/…
  continue reading
 
Today's topic is Coronavirus Phishing Scams.https://www.consumer.ftc.gov/blog/2020/06/help-covid-19-contact-tracers-not-scammers https://www.irs.gov/coronavirus/economic-impact-payments https://www.consumer.ftc.gov/blog/2020/04/coronavirus-stimulus-payment-scams-what-you-need-know https://coronavirus.ohio.gov/wps/portal/gov/covid-19/covid-19-vaccin…
  continue reading
 
Today's episode is about whaling. What is it and what can you do to thwart an attack. There is a great article on Rapid7's Blog on whaling. Find it here. https://www.rapid7.com/fundamentals/whaling-phishing-attacks/ . As mentioned at the end of the podcast, I wanted to try something a little different. For a chance to win a $10 Amazon Gift card, se…
  continue reading
 
Today's Episode covers Backups. What are backups, why you should use them and how to do them. Find the PC mag article referenced in the podcast at https://www.pcmag.com/news/the-beginners-guide-to-pc-backup Find the Microsoft support article referenced in the podcast at https://support.microsoft.com/en-us/help/4027408/windows-10-backup-and-restore …
  continue reading
 
Today's Episode covers Ransomware. What is it and how can you protect yourself from it. Find the knowbe4 article we referenced in the show at https://www.knowbe4.com/ransomware . Find the Sophos article I referenced at the end of the episode at https://news.sophos.com/en-us/2020/09/17/maze-attackers-adopt-ragnar-locker-virtual-machine-technique/ Su…
  continue reading
 
Two-Factor Authentication: What is it and why do I need it to stay safe online? https://blog.trendmicro.com/two-factor-authentication-what-is-it-and-why-do-i-need-it-to-stay-safe-online/ Google Authenticator Apple https://apps.apple.com/us/app/google-authenticator/id388497605 Microsoft Authenticator https://www.microsoft.com/en-us/account/authentic…
  continue reading
 
Never plug a USB flash drive into your computer that is not your own. Malicious Code could be saved on the flash drive and programmed to run keyloggers or backdoors when plugged in. Some of these devices appear to be USB flash drives but instead are microcontrollers designed to run files or control you computer without your permission. As a best pr…
  continue reading
 
Loading …

Guia rápido de referências