Bite Sized Cyber Crime

Bite Sized Cyber Crime

A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime

Episodes

October 20, 2025 7 mins

Discord is a popular chat app used by gamers, technologists, and even local communities. Recently however, it potentially had a very serious data breach involving the government identification of its users.

Sources: https://pastebin.com/1QJdNW5b

Mark as Played

In many doomsday scenarios AI become sentient and try to kill mankind, but has this already started to happen? Many sensational headlines would lead you to believe so, but the answer is a little more complicated than that...

Sources: https://pastebin.com/sgjfdr8j

Mark as Played

3 notorious hacking groups have teamed up to form one huge site threatening to extort 39 major organizations out of their Salesforce data, which was acquired through a series of phishing attacks. Though Salesforce was not actually a target themselves, they also face extortion and some reputational damage.

Sources: https://pastebin.com/jNr9Qsrr

Mark as Played
September 29, 2025 11 mins

Oh how the mighty have fallen. It takes a lot for a business to survive even 5 years after an attack, let alone 158. So what could kill such a strong business that clearly has it figured out? It turns out the Achilles heel is often just a single bad password.

Sources: https://pastebin.com/7M6vKycy

Mark as Played

Spear phishing can potentially get even more realistic with the use of generative AI. Recently North Korean threat actors leveraged prompt injection to create surprisingly realistic South Korean military documents

Sources: https://pastebin.com/H4qH2YuK

Mark as Played

Supply chain attacks are one of the most devastating if done right, and one of the biggest in the history of NPM just occurred. However it was probably less fruitful than the attackers were hoping...

Sources: https://pastebin.com/GfquiVgZ

Mark as Played
September 8, 2025 6 mins

Tech giants have been collecting a lot of data on us for years with the use of cookies, and though efforts have been made to reduce this they have been futile. France recently fined Google hundreds of millions for cookie consent violations, but it may only be a minor cost of business to them.

Sources: https://pastebin.com/GkPf9W1c

Mark as Played

Usually in phishing cases, you are emailed by the attackers first, but can attackers lie in wait for you to email them first? Surprisingly, yes. How is this even possible? Find out today!

Sources: https://pastebin.com/4b2vsrwH

Mark as Played

Everyone may get elaborate revenge fantasies but few follow through due to the bad outweighing the satisfaction. One man, sensing he was to be terminated soon, however, decided if he were to go he would try to take the whole company down with him. Last week he was sentenced to 4 years in prison.

Sources: https://pastebin.com/Pi0YSFUt

Mark as Played
August 18, 2025 6 mins

Water and energy are both critical resources to society. In a display of fear, pro-Russia hacktivists compromised a dam in Norway remotely, demonstrating that cyberattacks can have very physical implications.

Sources: https://pastebin.com/mwwrPwtR

Mark as Played

The UK recently proposed the banning of public sector organizations from paying ransomware ransoms, in an effort to discourage cybercriminals from targeting them. How may this end up working out though?

Sources: https://pastebin.com/37jGGd9X

Mark as Played
August 4, 2025 6 mins

CISA has developed many interesting and powerful tools over the year for cybersecurity, but recently they made one of malware analysis and automation open source and available for the public to use. Thorium. Let's talk about what this tool can do.

Sources: https://pastebin.com/zhmAvguE

Mark as Played

An Arizona woman was arrested for running a North Korean IT worker laptop farm out of her home, and this gave us a little look into the strange world of how these threat actors are able to infiltrate US organizations.

Sources: https://pastebin.com/qvrWirYa

Mark as Played

FIDO is the passwordless authentication set of protocols of the future, however that doesn't mean it's perfect and as cyber defenders attack, so do attackers. This novel exploit isn't a flaw within FIDO exploit but does threaten improperly implemented versions of it.

Sources: https://pastebin.com/fmUZEBAM

Mark as Played

With cars becoming just another type of computer, and having rather complicated implementations, vulnerabilities in one system are major. A recent series of vulnerabilities discovered in OpenSynergy's BlueSDK could prove dangerous.

Sources: https://pastebin.com/5JHAyuAV

Mark as Played

Ransomware negotiators may be called in to save some financial burden on organizations suffering from one of the worst cyberattacks they can. However, they seem like the natural people for ransomware groups to corrupt, and allegedly one such group did corrupt one such person.

 

Sources: https://pastebin.com/fANnhtTj

Mark as Played

Printers are the bane of many's existence, but they may have just gotten worse for security professionals. Rapid7 discovered 8 new vulnerabilities mostly impacting Brother branded printers, one of which cannot be patched by the vendor and leaks the admin password of the device.

Sources: https://pastebin.com/vNDbrwsU

Mark as Played

News has hit the mainstream media that all your passwords have been leaked yet again, in a massive password leak including Google, Meta, and Apple. But how much of that sensationalized story is true?

Sources: https://pastebin.com/Xi1MPpFg

Mark as Played
June 16, 2025 7 mins

And it could happen to you too. On this week's episode of Bite Size Cyber Crime I detail an actual scam I fell for and emphasize that anyone can be a victim of a scam anywhere on the internet.

Mark as Played

Malware is everywhere, even inside of other malware. One tool advertising itself as an advanced remote access trojan ended up being much more, a backdoor infecting novice hackers. This was not just a one off, however, and lead to the discovery of a massive backdoored malware campaign infecting other hackers and gaming cheaters.

Sources: https://pastebin.com/C4DG6LTw

Mark as Played

Popular Podcasts

    If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

    Dateline NBC

    Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

    CrimeLess: Hillbilly Heist

    It’s 1996 in rural North Carolina, and an oddball crew makes history when they pull off America’s third largest cash heist. But it’s all downhill from there. Join host Johnny Knoxville as he unspools a wild and woolly tale about a group of regular ‘ol folks who risked it all for a chance at a better life. CrimeLess: Hillbilly Heist answers the question: what would you do with 17.3 million dollars? The answer includes diamond rings, mansions, velvet Elvis paintings, plus a run for the border, murder-for-hire-plots, and FBI busts.

    The Breakfast Club

    The World's Most Dangerous Morning Show, The Breakfast Club, With DJ Envy, Jess Hilarious, And Charlamagne Tha God!

    Crime Junkie

    Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're a seasoned true crime enthusiast or new to the genre, you'll find yourself on the edge of your seat awaiting a new episode every Monday. If you can never get enough true crime... Congratulations, you’ve found your people. Follow to join a community of Crime Junkies! Crime Junkie is presented by audiochuck Media Company.

Advertise With Us
Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.