Bite Sized Cyber Crime
Bite Sized Cyber Crime
  • Видео 119
  • Просмотров 4 693
US Govt Bans Kaspersky Antivirus
Source:
www.podbean.com/eau/pb-kmkja-164afe1
Geopolitical tensions are a major factor in cyber crime as our lives become more and more online, due to concerns about Kaspersky antivirus being based in Russia, the US government has banned sales of the product, any new business agreements with Kaspersky and US orgs, and has barred them from sending software updates to Kaspersky AV users. But why ban an antivirus product at all?
Sources: pastebin.com/DHzqYVhB
Просмотров: 153

Видео

Creeper and Reaper: The First Virus and Antivirus
Просмотров 6День назад
Source: www.podbean.com/eau/pb-wx28r-1637137 Have you ever wondered what the first malware ever was? It was more like an experiment rather than a malicious tool of destruction that malware has become today. Although Creeper didn't do much damage it's interesting to reflect on how far malware has come. Sources: pastebin.com/68f9yTu1
Microsoft Address Recall AI Security Concern
Просмотров 1114 дней назад
Source: www.podbean.com/eau/pb-5bkwi-1637129 Microsoft introduced an upcoming AI tool that is able to remember everything you did on your PC and fetch results if you need to go back in time and remember. However with this tool came a mountain of distrust and security concerns. These are the concerns and how Microsoft addressed them. Sources: pastebin.com/QGdtx4Np
Ticketmaster Breach Impacts Half a Billion Users
21 день назад
Source: www.podbean.com/eau/pb-pc88g-162bf6e If you go to concerts or live shows sometimes like I do you've likely used Ticketmaster, as it has a strangehold over the industry. The morning after I saw a concert I woke up, checked Twitter, and saw that Ticketmaster had a massive data breach. This is what happened. Sources pastebin.com/8dSztCJg
This Podcast is Not Sponsored by BetterHelp
Просмотров 18Месяц назад
Source: www.podbean.com/eau/pb-w7tbc-16208c7 After COVID-19 hit, telehealth businesses started booming and BetterHelp became especially prominent via RUclips and podcast sponsorships. However BetterHelp has been criticized for their data sharing practices, and the gray area they are in when it comes to regulations. Sources: pastebin.com/8fxw3sQy
$25 Million in Ethereum Stolen from Trading Bots
Просмотров 60Месяц назад
Source: www.podbean.com/eau/pb-2h8hg-1616626 Ethereum is a popular cryptocurrency, and some have started using bots to frontrun. Two brothers learned how they could exploit a vulnerability in these bots and make themselves $25 million richer. Sources: pastebin.com/xuQZ1ard
Dell Breach Exposed Data of 49 Million Customers
Просмотров 219Месяц назад
Source: www.podbean.com/eau/pb-q7ipi-160c837 Dell is a massive provider of technology for organizations and home users alike, and although on first glance their data breach seems not to contain sensitive data it has likely opened the floodgates for scams and phishing opportunities. Sources: pastebin.com/6jSYQM4P
Fake USPS Sites Get Almost the Same Traffic as the Real One
Просмотров 19Месяц назад
Source: www.podbean.com/eau/pb-8tvrg-1603067 With online shopping being so popular, getting delivery updates is not so uncommon, but this has led to the rise of a prolific scam that is much bigger than you may think. Sources: pastebin.com/mW6kWtWx
Cloudbleed and the Vitality of Cloud Security
Просмотров 6Месяц назад
Source: www.podbean.com/eau/pb-h4z7b-15a530e The cloud is ever expanding and allowing people to easily scale up at rates previously impossible. However one thing that must be considered is that security becomes complicated. You have to really trust your cloud provider to hold up their end, and even trusted providers can have oversights. Sources: pastebin.com/2LJPjrVx
Threat Actors Bribing Mobile Carriers into SIM Swapping
Просмотров 1392 месяца назад
Source: www.podbean.com/eau/pb-hpnqb-15ed277 MFA is becoming more and more common, but with every security innovation, threat actors figure out ways around them. Recently it came out that an unknown actor was bribing employees at T-Mobile and Verizon to perform SIM swapping attacks, which can compromise SMS based MFA codes. Sources: pastebin.com/h47Mijdt
Storm Worm: The Malware that Took Down Warnings of Itself
Просмотров 1312 месяца назад
Source: www.podbean.com/eau/pb-gsg47-15ddc15 In 2007 clickbait emails could make you part of a botnet that silenced cybersecurity professionals and performed attacks for anyone on the dark web willing to pay. Not a worm, but a Trojan, this is how the Storm Worm was ahead of its time. Sources: pastebin.com/nPbinx0i
Password Stuffing: Why you Should Use Unique Passwords for Every Site
Просмотров 92 месяца назад
Source: www.podbean.com/eau/pb-fh4yr-15c8624 There's a reason you should use a unique password for every website you use, but most people simply don't. How are you supposed to make and remember dozens of passwords for each site that are completely unique and can't be written down? What if I told you it doesn't have to be that difficult?
XZ Utils Contains a Backdoor on Unstable Linux Distros
Просмотров 322 месяца назад
Source: www.podbean.com/eau/pb-fdqyz-15c9c8c XZ Utils is an inconspicuous program in many Linux distributions that allows you to compress files. However, it seems one maintainer of the open source project had much more malicious plans. Sources: pastebin.com/awZzM7qk
New DoS Method Traps UDP Protocols in a Loop
Просмотров 113 месяца назад
Source: www.podbean.com/eau/pb-srcen-15bd52c Denial of Service attacks are annoying at best, and can endanger people at worst. Usually you need a lot of manpower to launch one, but a new method was developed recently that requires just one machine. Sources: pastebin.com/NS7RuYSi
ALPHV Disbands after Hacking Change Healthcare?
Просмотров 103 месяца назад
Source: www.podbean.com/eau/pb-wkb5w-15b0518 Change Healthcare is a major medical clearinghouse, nearly half of all insurance transactions go through them, so when ransomware struck the effect was felt all over the healthcare industry. However it gets stranger, as the group responsible seems to have scammed their affiliates and faked a takedown. Sources: pastebin.com/PRmnEGnL
Ivanti ICT Failed to Catch Malware with Root Persistence
Просмотров 13 месяца назад
Ivanti ICT Failed to Catch Malware with Root Persistence
Lockbit Taken Down, but Still a Threat
Просмотров 354 месяца назад
Lockbit Taken Down, but Still a Threat
EFAIL: The Bug That Broke Email Encryption
Просмотров 134 месяца назад
EFAIL: The Bug That Broke Email Encryption
Lurie Children's Hopsital Down for Weeks due to Hackers
Просмотров 94 месяца назад
Lurie Children's Hopsital Down for Weeks due to Hackers
Hacker Fakes and Tries to Sell Europcar Data
Просмотров 44 месяца назад
Hacker Fakes and Tries to Sell Europcar Data
Pegasus: The Spyware Sold to Governments
Просмотров 224 месяца назад
Pegasus: The Spyware Sold to Governments
iShutDown: A New Method for Detecting iOS Spyware
Просмотров 1105 месяцев назад
iShutDown: A New Method for Detecting iOS Spyware
Russian and Ukrainian Hackers Take Down Each Other’s ISPs
Просмотров 105 месяцев назад
Russian and Ukrainian Hackers Take Down Each Other’s ISPs
Terrapin Vulnerability Leaves Millions of SSH Servers Vulnerable
Просмотров 685 месяцев назад
Terrapin Vulnerability Leaves Millions of SSH Servers Vulnerable
GTA6 Hacker Sentenced to Secure Hospital
Просмотров 195 месяцев назад
GTA6 Hacker Sentenced to Secure Hospital
ALPHV Seized by FBI... But not for Long
Просмотров 266 месяцев назад
ALPHV Seized by FBI... But not for Long
Cybercrime as a Service Ring Shut Down and Sued by Microsoft
Просмотров 86 месяцев назад
Cybercrime as a Service Ring Shut Down and Sued by Microsoft
Bluetooth Flaw Allows Hackers Remote Access to Devices
Просмотров 206 месяцев назад
Bluetooth Flaw Allows Hackers Remote Access to Devices
Iranian Hacktivists Compromise PA Water Facility
Просмотров 56 месяцев назад
Iranian Hacktivists Compromise PA Water Facility
The Time I Bought a Keyboard with Malware
Просмотров 327 месяцев назад
The Time I Bought a Keyboard with Malware

Комментарии

  • @CrashCraftLabs
    @CrashCraftLabs 2 дня назад

    its not an anti virus tho, its malware, everyone should know by now using it will infect your system, its been infectious since the late 90s early 2000s ... its a well known virus im surprised its been on the market this whole time... also there is no such thing as cyber security, there are 77k viruses created a day and it takes roughly 30 days to create a cure for one virus... its a losing battle, best to just avoid clicking on links on social media, the 2nd page of google searches and in emails...

  • @athkon
    @athkon 2 дня назад

    Nice try fed, I still won't pay my taxes.

  • @snikrepak
    @snikrepak 2 дня назад

    Targeting hospitals, education, or civilian infrastructure, is a low low low low move.

  • @antonseverchenko747
    @antonseverchenko747 2 дня назад

    Kaspersky is part of FSB, it is a spyware from the time they started to use online updates.

  • @henlofren7321
    @henlofren7321 Месяц назад

    This isn't theft.

  • @user-in2cs1vp6o
    @user-in2cs1vp6o Месяц назад

    Big OOF

  • @delresearch5416
    @delresearch5416 2 месяца назад

    Real hackers rubber ducky there pcs or get a friend a job

    • @BiteSizedCyberCrime
      @BiteSizedCyberCrime 2 месяца назад

      Social engineering is both a very real and very important form of hacking and is the leading cause of compromise. It should not be underestimated what a good social engineer can do.

    • @MrMew
      @MrMew 2 месяца назад

      @@BiteSizedCyberCrimeActually, Social engineering is just a clever word for betraying. If you're stupid enough to provide that information then welp yeah. When you put your trust into things, you will get betrayed. This isn't the time of "Kings and Queens." People should never trust anyone. Especially their own family. And in 2024, defo not their spouse. The old term perfect for todays era is "Keep your friends close but your enemies closer." only, when we are young, we won't realize they are our enemies until much later.

  • @WalterHildahl
    @WalterHildahl 2 месяца назад

    How could anyone remember them all?

    • @BiteSizedCyberCrime
      @BiteSizedCyberCrime 2 месяца назад

      I go over this in the episode! There's many ways to make or store passwords that remove the difficult memorization aspect

  • @HairyandFinanciallySolvent
    @HairyandFinanciallySolvent 7 месяцев назад

    Every keyboard uses a keylogger, kind of suspicious.

  • @ChristopherCasler
    @ChristopherCasler 8 месяцев назад

    How do I get my network back from this attack?

  • @tazanteflight8670
    @tazanteflight8670 Год назад

    use an ad blocker

  • @SSH1mkus
    @SSH1mkus Год назад

    Thanks for sharing! This episode was super interesting and informative. I always get virus terminology confused, so this was a nice refresher.

    • @BiteSizedCyberCrime
      @BiteSizedCyberCrime Год назад

      Glad you enjoyed the episode! I love talking about different types of malware

  • @havivahmagner9643
    @havivahmagner9643 Год назад

    p̳r̳o̳m̳o̳s̳m̳ 🎉

  • @PeterRH432
    @PeterRH432 Год назад

    My PC Is Trying Its Best To Prevent It… I Keep Trying To Remove It… I Dont Know How Last This Comment Would Exist, Til This Bot Enters It… I Only Have An Weekend + An Day Left… My Heart And Brain Is Increasing Stress… While I Have Autism… My Family, And An Community Are Trying Their Best To Help Me… In The Next Week At Monday Or Tuesday… On An Very High Chance… It Will Never End Up, Happy Ever After For Me…

  • @temetnosce7482
    @temetnosce7482 Год назад

    Would using alternate firmware like openwrt protect an asus router that would normally be vulnerable (or is the exploit hardware based?)

    • @BiteSizedCyberCrime
      @BiteSizedCyberCrime Год назад

      Since it uses MIPS architecture, using another firmware will protect your router against this malware. Openwrt has pretty good security as well, even without extra hardening efforts.

    • @temetnosce7482
      @temetnosce7482 Год назад

      @@BiteSizedCyberCrime Thanks!! So ARM devices aren't even affected by ZuoRAT?

    • @BiteSizedCyberCrime
      @BiteSizedCyberCrime Год назад

      @@temetnosce7482 Yep, that seems to be the case so far. It's definitely one of the more interesting examples of malware architecturally.

  • @fassin666
    @fassin666 Год назад

    Omg hi 👋 this is 🧚