The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives. Skills Gap: List ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
The Breach Report gives you a front-row seat to the latest cybersecurity news and insights, as Rense and Robert share practical takeaways from their day-to-day work in threat intelligence and incident response. Take theory into action!
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
The Cyber-Savvy Boardroom, a Google Cloud Office of the CISO podcast, offers monthly 15-20 minute episodes featuring security leaders, board members, and thought leaders. Hosted by David Homovich and rotating Office of the CISO members, experts share insights for strategic clarity and improved organizational security. Guests include board members, Google Cloud/Google executives, Office of the CISO Board Insights team members, board advisors, and industry thought leaders.
…
continue reading
The Mazars Tech for Leaders podcast delves into the latest technology developments and how business leaders can tackle challenges whilst ensuring they are protected from a risk, security and compliance perspective. Join Mazars Technology and Digital experts as they speak with industry guests, specialist speakers and subject matter experts on all things tech.
…
continue reading
Welcome to Maddocks on the Mic — the official podcast of Maddocks, the modern Australian law firm — operating in Canberra, Melbourne and Sydney, Australia. Dive into bite-sized series from around the firm aimed at educating and hopefully entertaining too!
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.
…
continue reading
Every week, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Welcome to NucleCast, the official podcast of the ANWA Deterrence Center. NucleCast is an engaging, educational podcast featuring a series of discussions and interviews with experts in nuclear policy, technology, and deterrence. The show is hosted by Dr. Adam Lowther, Strategic Advisor to the ANWA Deterrence Center and an expert on nuclear deterrence.
…
continue reading
The podcast making sense of cyber and technology issues impacting business.
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
Welcome to the new realities of cyber security podcast series, where we'll be looking at the key challenges and opportunities faced by businesses in the rapidly evolving area of cyber security. From digital crime scene forensics to GDPR, this series covers topical issues that matter.
…
continue reading
Welcome to Futurecast, Vitech's forward-thinking podcast dedicated to exploring the evolving landscape of the group insurance and retirement industries. Our mission is to equip industry leaders with cutting-edge insights and strategic foresight to future-proof your business in an increasingly dynamic market. In each episode, we engage with pioneering executives, innovative thought leaders, and industry disruptors from the insurance, pension, and pension risk transfer (PRT) sectors to uncover ...
…
continue reading
Welcome to "Securely Connected Everything," a dynamic podcast hosted by Michael van Rooyen (MVR), dedicated to exploring the intricate relationship between connectivity and security in the digital age. Each week, MVR welcomes guests from diverse backgrounds, to shed some light on cutting-edge technologies and methodologies that enhance digital experiences while safeguarding against potential threats. From exploring the origins and capabilities of innovative solutions, to dissecting the impli ...
…
continue reading
A Podcast For Jamf Employees And Customers
…
continue reading
A look at developments from the technology sector and what they mean for investors. The Allianz Technology Trust investment team will offer their insight, as they discuss cutting edge companies and how they are changing our lives. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The Looking Glass is the premier international relations podcast by The SAIS Review of International Affairs with support from The Foreign Policy Institute. Showcasing fresh, policy-relevant perspectives from professional and student experts, The Looking Glass is dedicated to advancing the debate on leading contemporary issues in world affairs. *The views and opinions expressed in this podcast are the speakers' own, and they do not represent the views or opinions of The SAIS Review of Intern ...
…
continue reading
Radio station and place for veteran Entrepreneurs , veterans and the kickass get After mentality and spirit warriorship
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Today’s cyber attacks target people, not technology. Protecting People is a podcast focused on the human side of cybersecurity. Each episode, you’ll learn how today’s threats really work, who’s being targeted by them, and what you can do to safeguard your people, data and systems.Get real-world insight and learn about the latest trends in social engineering, malware, threat protection, cloud security and more. Protecting People is cybersecurity for the rest of us.
…
continue reading
This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
…
continue reading

1
EP4 Jamie Collier on the Current Threat Landscape
0:11
0:11
Play later
Play later
Lists
Like
Liked
0:11Hosts: David Homovich, Customer Advocacy Lead, Office of the CISO, Google Cloud Anton Chuvakin, Advisor at Office of the CISO, Google Cloud, co-host of Cloud Security Podcast by Google Guest: Jamie Collier, Lead Advisor (Europe) at Google Threat Intelligence Group Resources: Board of Directors Insights Hub Perspectives on Security for the Board, 7t…
…
continue reading

1
South American Cyber Shockwave_ Teenage Hackers, Political Hacks, and the Exploding Threat Landscape
19:20
19:20
Play later
Play later
Lists
Like
Liked
19:20South American Cyber Shockwave_ Teenage Hackers, Political Hacks, and the Exploding Threat Landscape Notable Cyber Actors and Incidents Across South AmericaI. Executive Summary * **Featured Hacker/Case: Alberto Daniel Hill (Cybersecurity Expert, Controversially Imprisoned)**The case of Alberto Daniel Hill in Uruguay presents a unique narrative, foc…
…
continue reading

1
CYFIRMA Research- While Trump Disrupts World Order China Prepares for War Over Taiwan
11:29
11:29
Play later
Play later
Lists
Like
Liked
11:29Read CYFIRMA’s latest geo-political analysis, regarding Trump’s continued disruption of the world order, calling U.S. alliances into question while an emboldened China prepares for war over Taiwan. Link to the Research Report: https://www.cyfirma.com/research/while-trump-disrupts-the-world-order-china-prepares-for-war-over-taiwan/ #Geopolitics #CYF…
…
continue reading

1
Catching Up on Cloud Attack Paths with Cloud Threat Specialist Sebastian Walla
28:53
28:53
Play later
Play later
Lists
Like
Liked
28:53Today’s adversaries are increasingly operating in the cloud — and Sebastian Walla, Deputy Manager of Emerging Threats at CrowdStrike, is watching them. In this episode, he joins Adam and Cristian to dive into the latest cloud attack techniques and the adversaries behind them. So, who are they? SCATTERED SPIDER and LABYRINTH CHOLLIMA are two of the …
…
continue reading

1
Hacker, Hero, or Hostage of the Law_ The Alberto Hill Story.
14:07
14:07
Play later
Play later
Lists
Like
Liked
14:07Hacker, Hero, or Hostage of the Law_ The Alberto Hill Story.
…
continue reading

1
Chapter 3: Listen to "Overview of the book "Violeta Digital: A Novella of Code and Conscience" by Alberto Daniel Hill
17:30
17:30
Play later
Play later
Lists
Like
Liked
17:30Chapter 3: Listen to "Overview of the book "Violeta Digital: A Novella of Code and Conscience" by Alberto Daniel Hill
…
continue reading

1
Listen to "Chapter 3: Listen to "Overview of the book "Violeta Digital: A Novella of Code and Conscience" by Alberto Daniel Hill"
12:42
12:42
Play later
Play later
Lists
Like
Liked
12:42Listen to "Chapter 3: Listen to "Overview of the book "Violeta Digital: A Novella of Code and Conscience" by Alberto Daniel Hill"
…
continue reading

1
OT Under Threat: Dragos' Robert M. Lee on Navigating Cyber-Physical Risks
53:29
53:29
Play later
Play later
Lists
Like
Liked
53:29Originally Released September 11, 2024 In this episode of Cyber Focus we’re revisiting the conversation Frank Cilluffo had last September with Robert M. Lee. Rob is the CEO and co-founder of Dragos, a leading firm in industrial control systems (ICS) and operational technology (OT) cybersecurity. Rob unpacks the real-world consequences of cyber-enab…
…
continue reading

1
Chapter 2: Listen to "Overview of the book "Violeta Digital: A Novella of Code and Conscience" by Alberto Daniel Hill
30:02
30:02
Play later
Play later
Lists
Like
Liked
30:02Chapter 2: Listen to "Overview of the book "Violeta Digital: A Novella of Code and
…
continue reading

1
Chapter 1: Listen to "Overview of the book "Violeta Digital: A Novella of Code and Conscience" by Alberto Daniel Hill.
15:30
15:30
Play later
Play later
Lists
Like
Liked
15:30Chapter 1: Listen to "Overview of the book "Violeta Digital: A Novella of Code and Conscience" by Alberto Daniel Hill.
…
continue reading

1
Overview of the book "Violeta Digital: A Novella of Code and Conscience
7:46
7:46
Play later
Play later
Lists
Like
Liked
7:46Overview of the book "Violeta Digital: A Novella of Code and Conscience. By Alberto Daniel Hill
…
continue reading

1
Radioactive Roots: Life Finds a Way (Even if it Glows a Bit)
50:08
50:08
Play later
Play later
Lists
Like
Liked
50:08Nuclear catastrophes like Chernobyl and Fukushima serve as a stark reminder of the risks that come with harnessing atomic energy — we hear about the evacuations, the health impacts, the geopolitical consequences. But what about the landscapes left behind? What happens to plants, animals, and entire ecosystems when exposed to high levels of radiatio…
…
continue reading

1
Dr. Stephen Nagy: Navigating Japan's Strategic Landscape
32:48
32:48
Play later
Play later
Lists
Like
Liked
32:48Dr. Stephen Nagy discusses Japan's strategic positioning in a complex geopolitical landscape, particularly in relation to the U.S.-China rivalry. He explores Japan's economic ties with China, the challenges posed by regional security threats, and the evolving strategies Japan is employing to navigate these issues. The conversation delves into Japan…
…
continue reading

1
Hackers, Phreaks, and the Hunt for Par. The Genesis of Cybercrime
24:46
24:46
Play later
Play later
Lists
Like
Liked
24:46Hackers, Phreaks, and the Hunt for Par. The Genesis of Cybercrime. The term "hacker" evokes a multitude of images, from the playful intellectual tinkerer to the shadowy cybercriminal. This report delves into the multifaceted history of hacking, tracing its evolution from nascent academic subcultures to a globally recognized phenomenon with profound…
…
continue reading

1
Making It Rain? The Promises and Pitfalls of Cloud Seeding
32:09
32:09
Play later
Play later
Lists
Like
Liked
32:09Welcome back, everyone, to the SAIS Review’s The Looking Glass Podcast. We are your hosts, Nassim Ali Ahmad and Rachel Fink. As the world confronts new and novel future crises, among the most concerning will be environmental challenges, driven in many places by the sheer scarcity of water. One answer to that dilemma comes from geoengineering, or th…
…
continue reading

1
CYFIRMA Research: GhostSpy- Web-Based Android RAT
6:08
6:08
Play later
Play later
Lists
Like
Liked
6:08A high-risk Android malware poses a serious threat by targeting banking apps, bypassing screenshot protections through UI reconstruction to steal sensitive financial data. It records live screen activity, captures video, and audio in real time, SMS, Contacts, Call logs, files and silently auto-grants all permissions. Once installed, it takes full c…
…
continue reading

1
From Teen Idol to Survivor_ The Unfolding Story of Nicole Eggert
7:49
7:49
Play later
Play later
Lists
Like
Liked
7:49From Teen Idol to Survivor_ The Unfolding Story of Nicole Eggert
…
continue reading

1
Inside the attack chain: A new methodology for tracking compartmentalized threats
16:29
16:29
Play later
Play later
Lists
Like
Liked
16:29Edmund Brumaghin joins Hazel to discuss how threat actors (including state sponsored attackers), are increasingly compartmentalizing their attacks i.e they're bringing in specialist skillsets from other groups to handle different aspects of the attack chain. Edmund discusses why this is happening, and the challenges this poses for defenders when it…
…
continue reading

1
SubSeven Unmasked: The Real Story of the Legendary RAT and the Mobman Imposter
26:10
26:10
Play later
Play later
Lists
Like
Liked
26:10SubSeven Unmasked: The Real Story of the Legendary RAT and the Mobman Imposter "In the nascent, often chaotic, digital landscape of the late 1990s and early 2000s, few pieces of malicious software achieved the notoriety or inspired the same blend of fear and fascination as SubSeven. More than just a string of code, it became a legend—a potent Remot…
…
continue reading

1
Do What Matters | New Beginnings – Our journey from students to lawyers & podcasters at Maddocks
19:10
19:10
Play later
Play later
Lists
Like
Liked
19:10New hosts Pete Gavralas and Emily Kidd share their career stories, discuss what matters to them at Maddocks and provide listeners with previews of the exciting topics and conversations expected in future episodes. With our Sydney and Canberra clerkship applications opening on Monday 9 June (Melbourne on Monday 7 July), this series is a must-listen …
…
continue reading

1
Uruguay Under Cyber Siege_ Unpacking the 2024-25 Attacks and What's Next?
20:51
20:51
Play later
Play later
Lists
Like
Liked
20:51Uruguay Under Cyber Siege_ Unpacking the 2024-25 Attacks and What's Next?
…
continue reading

1
__gov (2).eth_ Digital Ghost, Real Harm - Unmasking a Hacker's Twisted Ideology__.eth_ Digital Ghost, Real Harm - Unmasking a Hacker's Twisted Ideology__
16:12
16:12
Play later
Play later
Lists
Like
Liked
16:12__gov (2).eth_ Digital Ghost, Real Harm - Unmasking a Hacker's Twisted Ideology__.eth_ Digital Ghost, Real Harm - Unmasking a Hacker's Twisted Ideology__
…
continue reading

1
Mexico: Narco-State Symbiosis, Tech Wars, and the Price of Impunity
36:31
36:31
Play later
Play later
Lists
Like
Liked
36:31Mexico: Narco-State Symbiosis, Tech Wars, and the Price of Impunity-
…
continue reading

1
When Fraud Meets Cyber: The Retail Sector’s Expanding Risk Landscape with NRF’s Christian Beckner
18:34
18:34
Play later
Play later
Lists
Like
Liked
18:34In this episode of the Cyber Focus podcast, recorded on April 30 at the RSA Conference in San Francisco, host Frank Cilluffo sits down with Christian Beckner, Vice President of Retail Technology and Cybersecurity at the National Retail Federation. Beckner provides a wide-ranging look at how cybersecurity, fraud, and emerging technologies are reshap…
…
continue reading
Hello and welcome to today’s episode of the SAIS Review’s The Looking Glass Podcast. We are your hosts Talita Fernandes and Hantong Wu. Natural disaster relief can pose many challenges, and we have seen that they are only exacerbated by domestic conflict in the area. Since 2021, when the military deposed the democratically elected government, Myanm…
…
continue reading

1
General (Ret) Glen VanHerck: Cyber Threats and Homeland Defense Strategies
34:26
34:26
Play later
Play later
Lists
Like
Liked
34:26General VanHerck, former commander of U.S. Northern Command, shares his insights on deterrence, homeland defense, and the evolving threats facing the United States. He emphasizes the importance of cyber awareness, missile defense, and the need for a layered approach to national security. He also stresses the significance of relationships with allie…
…
continue reading

1
S3 E7: Cybersecurity Chat with Chuck Sapp | From Military Service to Cyber Awareness
38:06
38:06
Play later
Play later
Lists
Like
Liked
38:06Join hosts Josh and Wade as they sit down with Charles (Chuck) Sapp, a seasoned cybersecurity expert and security awareness specialist. In this episode, Chuck shares his unique journey from serving in the Marine Corps to becoming an influencer in the cybersecurity community. Gain insights into his military background, his passion for educating othe…
…
continue reading
JP Glab (Mandiant Consulting) joins host Luke to discuss responding to activity from North Korean IT workers. He walks through what initially triggered the investigation at this organization, how it progressed in parallel with an HR investigation, and ultimately what was discovered. For more on the DPRK IT workers and trends in incident response, c…
…
continue reading

1
__NATO Police Nightmare_ When a Breakup Becomes an International Crisis__
20:12
20:12
Play later
Play later
Lists
Like
Liked
20:12__NATO Police Nightmare_ When a Breakup Becomes an International Crisis__
…
continue reading

1
CYFIRMA Research- Tracking Ransomware: April 2025
7:39
7:39
Play later
Play later
Lists
Like
Liked
7:39Stay ahead of evolving ransomware threats with CYFIRMA’s April 2025 Ransomware Report. Last month revealed shifting dynamics—Qilin surged by 71%, while Play and DragonForce increased by 75% and 25% respectively. Despite a 29% drop in total incidents from March, the Manufacturing, IT, and Consumer sectors remained heavily targeted. The U.S. topped t…
…
continue reading

1
Cartel Cell Networks_ Beyond Burner Phones & Encrypted Apps
13:12
13:12
Play later
Play later
Lists
Like
Liked
13:12The assertion that Mexican drug cartels have engineered and deployed their own sophisticated, independent cellular networks to circumvent governmental surveillance, as detailed in the primary source article 1, presents a significant development in the operational capabilities of transnational criminal organizations. This report offers an exhaustive…
…
continue reading

1
Stolen Star Power: How Lana Rose's Online Life Fuels Romance Scams
17:01
17:01
Play later
Play later
Lists
Like
Liked
17:01Stolen Star Power: How Lana Rose's Online Life Fuels Romance Scams A significant challenge in this analysis is the current inaccessibility of the live Instagram profile @lanarose786. Consequently, this assessment relies on data from third-party analytics providers such as HypeAuditor , publicly accessible information from platforms including YouTub…
…
continue reading

1
Havana Syndrome Unpacked: From Sonic Attacks to Scientific Uncertainty
23:24
23:24
Play later
Play later
Lists
Like
Liked
23:24Anomalous Health Incidents: An In-Depth Examination of the “Havana Syndrome” PhenomenonI. The Emergence of a Medical Mystery: Unexplained Health Incidents The perplexing saga of what became popularly known as “Havana Syndrome” began to unfold against a backdrop of shifting geopolitical tides. Its emergence not only presented a novel medical challen…
…
continue reading

1
Overview: Georgia Protests and Anonymous Activism
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49This episode features a compelling conversation covering personal stories and insights into the world of cybersecurity and the challenges individuals face when navigating its complexities and interacting with legal systems. The discussion centers around the experiences of guests, including Alberto Daniel Hill, who shares his remarkable and difficul…
…
continue reading

1
Beneath the Black River-Oil Spills in Ecuador’s Amazon Rainforests
41:42
41:42
Play later
Play later
Lists
Like
Liked
41:42The March 2025 oil spill in Ecuador’s Esmeraldas province is one of the country’s worst recent environmental disasters. Over 25,000 barrels of crude oil leaked from the SOTE pipeline, contaminating rivers, farmland, and coastal mangroves. This spill destroyed local biodiversity, poisoned water supplies, and disrupted the lives of more than half a m…
…
continue reading

1
Follow the motive: Rethinking defense against Initial Access Groups
16:38
16:38
Play later
Play later
Lists
Like
Liked
16:38In this episode, Hazel welcomes Talos researcher Ashley Shen to discuss the evolution of initial access brokers (IABs) and the importance of distinguishing between different types of IABs. We talk about the need for a new taxonomy to categorize IABs into three types: financially motivated (FIA), state-sponsored (SIA), and opportunistic (OIA) initia…
…
continue reading

1
Compliance, Launch Daemons and Jamf Account, Oh My!
48:39
48:39
Play later
Play later
Lists
Like
Liked
48:39Join co-hosts Kat Garbis & Sean Rabbitt with guest Isaac Ordonez of Mann Consulting, a Jamf Partner, to discuss what it is like to be a managed service provider (MSP) and provide insight on ways they leverage Jamf. Isaac discusses unique ways they are supporting Jamf to help their customers achieve compliance, building applications and integrations…
…
continue reading

1
The One-Way Street of Digital Transformation: OT Cybersecurity with Nozomi's Edgard Capdevielle
20:24
20:24
Play later
Play later
Lists
Like
Liked
20:24In this special RSA Conference edition of Cyber Focus, host Frank Cilluffo sits down with Edgard Capdevielle, President and CEO of Nozomi Networks, to unpack the evolving landscape of operational technology (OT) cybersecurity. Together, they explore how digital transformation and the convergence of IT and OT are reshaping the threat environment for…
…
continue reading

1
Politics of Disaster Miniseries: Disaster Capitalism in Lebanon
47:28
47:28
Play later
Play later
Lists
Like
Liked
47:28Welcome back everybody to the SAIS Review’s The Looking Glass Podcast. We are your hosts, Nadia Sleiman and Amber Escudero-Kontostathis. Today, we are diving into the critical topic of disaster capitalism in Lebanon amidst its ongoing financial crisis. As Lebanon grapples with currency collapse, inflation, and government paralysis, important questi…
…
continue reading

1
Tom Summers: The Balance of Safety and Mission in Nuclear Operations
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34In this episode of NucleCast, Adam interviews Tom Summers, the acting chairman of the Defense Nuclear Facility Safety Board (DNFSB). They discuss the DNFSB's mission to ensure safety in nuclear operations, the balance between safety and mission accomplishment, the challenges of aging infrastructure, and the board's commitment to modernization and t…
…
continue reading

1
S3 E6: From Submarines to Cybersecurity - Navigating Small Business Security
44:37
44:37
Play later
Play later
Lists
Like
Liked
44:37Welcome to another episode of Simply Defensive! In this installment, hosts Josh Mason and Wade Wells are joined by cybersecurity expert James Bierly. James shares his unique journey from a submarine sonar technician in the Navy to founding his own security firm, Secure Point Solutions, which specializes in helping small businesses tackle cybersecur…
…
continue reading

1
CYFIRMA Research- PupkinStealer : A .NET-Based Info-Stealer
4:33
4:33
Play later
Play later
Lists
Like
Liked
4:33CYFIRMA’s latest threat report reveals the workings of PupkinStealer, a .NET-based information stealer designed to extract a focused set of sensitive data from victim systems. Targeting browser credentials, desktop files, Telegram and Discord sessions, and screenshots, the malware compresses all stolen content into a ZIP archive and exfiltrates it …
…
continue reading

1
Logged Into Hell. An Injustice, a Fortune Lost, and the Resilience That Followed (2/2)
4:12
4:12
Play later
Play later
Lists
Like
Liked
4:12Logged Into Hell. An Injustice, a Fortune Lost, and the Resilience That Followed (2/2) This article was prepared by the Global Institute for Digital Rights and Justice.
…
continue reading

1
Logged Into Hell. An Injustice, a Fortune Lost, and the Resilience That Followed (1/2)
5:30
5:30
Play later
Play later
Lists
Like
Liked
5:30Logged Into Hell. An Injustice, a Fortune Lost, and the Resilience That Followed. This article was prepared by the Global Institute for Digital Rights and Justice.
…
continue reading

1
Trump's Signal Clone App was Hacked in 15 minutes
8:11
8:11
Play later
Play later
Lists
Like
Liked
8:11Trump's Signal Clone App was Hacked in 15 minutes
…
continue reading

1
**"To Hell and Back" - my talk @ekoparty 2022 - For Spotify Video with English subtitles!**
48:33
48:33
Play later
Play later
Lists
Like
Liked
48:33**"To Hell and Back" - my talk @ekoparty 2022 - with English subtitles!** In 2014, Alberto Daniel Hill, a cybersecurity expert, discovered a security vulnerability on a medical provider's website. While reporting on the issue, he became the first person imprisoned in Uruguay for a computer-related crime—a crime he did not commit and that likely nev…
…
continue reading

1
Jonathan Scott - Full Episode- Apple products and privacy.
2:14:38
2:14:38
Play later
Play later
Lists
Like
Liked
2:14:38We are speaking about YOUR privacy and YOUR #HumanRightsViolated tonight. I will disclose the tools that @Apple has, and show you the truth about what has been going on for a long time. VPN logs, Contacts, Emails, SMS logs, and much more. @jonathandata1
…
continue reading

1
Mano a mano con el hacker mas buscado del Rio de la Plata gov.eth - Alberto Daniel Hill
2:00:22
2:00:22
Play later
Play later
Lists
Like
Liked
2:00:22Mano a mano con el hacker mas buscado del Rio de la Plata gov.eth - Alberto Daniel Hill#policia #argentina #hacker #goveth -------------------Alberto Daniel Hill https://albertohill.com https://x.com/ADanielHill https://cybermidnight.club https://t.me/cybermidnight #hacker #uruguay #cybersecurity #cybersecuritytips #infosecurity #hacking #police #p…
…
continue reading