A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
Discord is a popular chat app used by gamers, technologists, and even local communities. Recently however, it potentially had a very serious data breach involving the government identification of its users.
Sources: https://pastebin.com/1QJdNW5b
In many doomsday scenarios AI become sentient and try to kill mankind, but has this already started to happen? Many sensational headlines would lead you to believe so, but the answer is a little more complicated than that...
Sources: https://pastebin.com/sgjfdr8j
3 notorious hacking groups have teamed up to form one huge site threatening to extort 39 major organizations out of their Salesforce data, which was acquired through a series of phishing attacks. Though Salesforce was not actually a target themselves, they also face extortion and some reputational damage.
Sources: https://pastebin.com/jNr9Qsrr
Oh how the mighty have fallen. It takes a lot for a business to survive even 5 years after an attack, let alone 158. So what could kill such a strong business that clearly has it figured out? It turns out the Achilles heel is often just a single bad password.
Sources: https://pastebin.com/7M6vKycy
Spear phishing can potentially get even more realistic with the use of generative AI. Recently North Korean threat actors leveraged prompt injection to create surprisingly realistic South Korean military documents
Sources: https://pastebin.com/H4qH2YuK
Supply chain attacks are one of the most devastating if done right, and one of the biggest in the history of NPM just occurred. However it was probably less fruitful than the attackers were hoping...
Sources: https://pastebin.com/GfquiVgZ
Tech giants have been collecting a lot of data on us for years with the use of cookies, and though efforts have been made to reduce this they have been futile. France recently fined Google hundreds of millions for cookie consent violations, but it may only be a minor cost of business to them.
Sources: https://pastebin.com/GkPf9W1c
Usually in phishing cases, you are emailed by the attackers first, but can attackers lie in wait for you to email them first? Surprisingly, yes. How is this even possible? Find out today!
Sources: https://pastebin.com/4b2vsrwH
Everyone may get elaborate revenge fantasies but few follow through due to the bad outweighing the satisfaction. One man, sensing he was to be terminated soon, however, decided if he were to go he would try to take the whole company down with him. Last week he was sentenced to 4 years in prison.
Sources: https://pastebin.com/Pi0YSFUt
Water and energy are both critical resources to society. In a display of fear, pro-Russia hacktivists compromised a dam in Norway remotely, demonstrating that cyberattacks can have very physical implications.
Sources: https://pastebin.com/mwwrPwtR
The UK recently proposed the banning of public sector organizations from paying ransomware ransoms, in an effort to discourage cybercriminals from targeting them. How may this end up working out though?
Sources: https://pastebin.com/37jGGd9X
CISA has developed many interesting and powerful tools over the year for cybersecurity, but recently they made one of malware analysis and automation open source and available for the public to use. Thorium. Let's talk about what this tool can do.
Sources: https://pastebin.com/zhmAvguE
An Arizona woman was arrested for running a North Korean IT worker laptop farm out of her home, and this gave us a little look into the strange world of how these threat actors are able to infiltrate US organizations.
Sources: https://pastebin.com/qvrWirYa
FIDO is the passwordless authentication set of protocols of the future, however that doesn't mean it's perfect and as cyber defenders attack, so do attackers. This novel exploit isn't a flaw within FIDO exploit but does threaten improperly implemented versions of it.
Sources: https://pastebin.com/fmUZEBAM
With cars becoming just another type of computer, and having rather complicated implementations, vulnerabilities in one system are major. A recent series of vulnerabilities discovered in OpenSynergy's BlueSDK could prove dangerous.
Sources: https://pastebin.com/5JHAyuAV
Ransomware negotiators may be called in to save some financial burden on organizations suffering from one of the worst cyberattacks they can. However, they seem like the natural people for ransomware groups to corrupt, and allegedly one such group did corrupt one such person.
Sources: https://pastebin.com/fANnhtTj
Printers are the bane of many's existence, but they may have just gotten worse for security professionals. Rapid7 discovered 8 new vulnerabilities mostly impacting Brother branded printers, one of which cannot be patched by the vendor and leaks the admin password of the device.
Sources: https://pastebin.com/vNDbrwsU
News has hit the mainstream media that all your passwords have been leaked yet again, in a massive password leak including Google, Meta, and Apple. But how much of that sensationalized story is true?
Sources: https://pastebin.com/Xi1MPpFg
And it could happen to you too. On this week's episode of Bite Size Cyber Crime I detail an actual scam I fell for and emphasize that anyone can be a victim of a scam anywhere on the internet.
Malware is everywhere, even inside of other malware. One tool advertising itself as an advanced remote access trojan ended up being much more, a backdoor infecting novice hackers. This was not just a one off, however, and lead to the discovery of a massive backdoored malware campaign infecting other hackers and gaming cheaters.
Sources: https://pastebin.com/C4DG6LTw
If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.
Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com
It’s 1996 in rural North Carolina, and an oddball crew makes history when they pull off America’s third largest cash heist. But it’s all downhill from there. Join host Johnny Knoxville as he unspools a wild and woolly tale about a group of regular ‘ol folks who risked it all for a chance at a better life. CrimeLess: Hillbilly Heist answers the question: what would you do with 17.3 million dollars? The answer includes diamond rings, mansions, velvet Elvis paintings, plus a run for the border, murder-for-hire-plots, and FBI busts.
The World's Most Dangerous Morning Show, The Breakfast Club, With DJ Envy, Jess Hilarious, And Charlamagne Tha God!
Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're a seasoned true crime enthusiast or new to the genre, you'll find yourself on the edge of your seat awaiting a new episode every Monday. If you can never get enough true crime... Congratulations, you’ve found your people. Follow to join a community of Crime Junkies! Crime Junkie is presented by audiochuck Media Company.