A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
Stryker is a med tech giant, but they have fallen rather hard after a politically motivated ransomware attack wiped thousands of devices after stealing over 50 terabytes of data.
Sources: https://pastebin.com/xJEhrhvS
Wikipedia is often used as a starting point for research, and recently it was seemingly under attack. Vandalism is common, but what is uncommon is the activation of malicious code that sat waiting on their systems for years before it was set off by an admin reviewing code.
Sources: https://pastebin.com/QRYXC05C
I've noticed a concerning trend and legislation coming up in some countries that will require government ID to access certain social media websites. The issue stems from child safety, which is a worthy cause, but it will end up not only putting children at risk, but everyone else as well.
Usually data breaches happen from an attacker breaking in, but sometimes an organization inadvertently leaks their own data, PayPal did just this with the most sensitive data about small business owners and it sat on the internet for 6 months.
Sources: https://pastebin.com/hxqJeJey
Outlook add ins can really improve the user experience of the application, allowing for extended capabilities. However if a developer abandons an add in project and leaves it without updates without properly removing it or discontinuing support it could lead to threat actors hijacking a trusted add in and using it to steal information.
Sources: https://pastebin.com/7Kny6W8M
The Shiny Hunters failed to extort Panera in a data theft attack and leaked the data found. Thankfully the damage seems rather minimal as the information is, for the most part, not all that sensitive.
Sources: https://pastebin.com/EXKcrrDL
They say never to pay a ransomware, but this one you should especially never pay because you will definitely not get anything back if you do. As it turns out vibe coding can lead to mistakes that end up with threat actors losing the keys to their own ransomware.
Sources: https://pastebin.com/VuSZpJKQ
Bug bounty programs are a good way to practice your hacking skills while contributing to the greater good, but unfortunately some people want the rewards without having the skills, which have resulted in cURL being overwhelmed by completely nonsensical AI slop bug reports.
Sources: https://pastebin.com/ZBdpci1U
Bluetooth is the standard these days for listening to audio but it presents some issues that wired doesn't, and I don't mean sound quality. Implementations of Bluetooth protocols can have vulnerabilities and when those hit it could mean you're being listened to.
Sources: https://pastebin.com/Kq9TieQC
Instagram users saw a barrage of password reset attempts on their accounts and it seems to be related to a dataset that was just leaked to BreachForums of scraped user data.
Sources: https://pastebin.com/AfMVFBDm
The holiday season is a rather expensive time of year, not just with gift buying but with scams that take advantage of the season. One thing rather unexpected however, was a Christmas Eve update that drained the wallets of some TrustWallet users.
Sources: https://pastebin.com/NHqAjqzM
Most threat actors come and go with the times, not lasting more than a couple years. Prince of Persia was assumed to be one such group, but it turns out they not only returned but never left in the first place.
Sources: https://pastebin.com/9yJ1fxP3
Usually ransomware targets large entities, but as always no one is truly safe online. This specific malware targets individual android users sideloading apps from illegitimate sources.
Sources: https://pastebin.com/3J3uAVHt
CIS recently released an advisory warning of a stealthy backdoor that has been targeting VMWare shots and stealing data from snapshots of virtual machines. These are the details of that backdoor
Sources: https://pastebin.com/ppt9V3b1
In the security world it is becoming more and more necessarily to invest in controls around AI and the web browser. This attack targets both and often leaves absolutely no trace on your end, as the attack never leaves the browser.
Sources: https://pastebin.com/rz744p1b
Cloudflare had a massive outage on Tuesday morning that many suspected was some kind of big attack by nation state hackers, however it turns out to have been a lot more simple than that. A little internal error caused a domino effect that took out much of the web for several hours.
Sources: https://pastebin.com/ftmYtFv7
We have our fears of AI taking over the world and killing all the humans, which we are still rather far from, however a more urgent worry is the use of AI automomous agents taking the place of hackers themselves. Once such group managed to offload 80% of the technical hacking work to Claude Code.
Sources: https://pastebin.com/PzTM7dZT
Last week we discussed a weird email sent to students, staff, alumni, or basically anyone associated with the University of Pennsylvania. This week some new developments in the case occurred that could leave data at risk, but the attacker's motivations and actions seem odd.
Sources: https://pastebin.com/GDKhPmrE
I learned how to generate censorship bleeps! But also a strange and vulgar email was sent out to alumni, donors, clients, staff, and current students from the University of Pennsylvania warning that a data leak was inevitable. But is there any substance?
Sources: https://pastebin.com/MbJwdrYA
We've talked about North Korean threat actors being hired for jobs in order to steal data, but what about North Korean threat actors hiring people to steal data? Seems backwards, but it's been going on for years and recently teh defense sector has become a target of these attacks.
Sources: https://pastebin.com/yrWK4K20
Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com
If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.
How do the smartest marketers and business entrepreneurs cut through the noise? And how do they manage to do it again and again? It's a combination of math—the strategy and analytics—and magic, the creative spark. Join iHeartMedia Chairman and CEO Bob Pittman as he analyzes the Math and Magic of marketing—sitting down with today's most gifted disruptors and compelling storytellers.
Saskia Inwood woke up one morning, knowing her life would never be the same. The night before, she learned the unimaginable – that the husband she knew in the light of day was a different person after dark. This season unpacks Saskia’s discovery of her husband’s secret life and her fight to bring him to justice. Along the way, we expose a crime that is just coming to light. This is also a story about the myth of the “perfect victim:” who gets believed, who gets doubted, and why. We follow Saskia as she works to reclaim her body, her voice, and her life. If you would like to reach out to the Betrayal Team, email us at betrayalpod@gmail.com. Follow us on Instagram @betrayalpod and @glasspodcasts. Please join our Substack for additional exclusive content, curated book recommendations, and community discussions. Sign up FREE by clicking this link Beyond Betrayal Substack. Join our community dedicated to truth, resilience, and healing. Your voice matters! Be a part of our Betrayal journey on Substack.
The Dan Bongino Show delivers no-nonsense analysis of the day’s most important political and cultural stories. Hosted by the former Deputy Director of the FBI, former Secret Service agent, NYPD officer, and bestselling author Dan Bongino, the show cuts through media spin with facts, accountability, and unapologetic conviction. Whether it’s exposing government overreach, defending constitutional freedoms, or connecting the dots the mainstream media ignores, The Dan Bongino Show provides in-depth analysis of the issues shaping America today. Each episode features sharp commentary, deep dives into breaking news, and behind-the-scenes insight you won’t hear anywhere else. Apple: https://podcasts.apple.com/us/podcast/the-dan-bongino-show/id965293227?mt=2 Spotify: https://open.spotify.com/show/4sftHO603JaFqpuQBEZReL?si=PBlx46DyS5KxCuCXMOrQvw Rumble: https://rumble.com/c/bongino?e9s=src_v1_sa%2Csrc_v4_sa_o