Cybersecurity

Security

Malware Uses Ancient Encryption to Avoid Detection

Everything old is new again. Time stamps: 0:00 The Raids 0:44 The Lure 1:38 Mekotio’s Features 3:32 Obfuscation 4:16 Super Cool BadUSBs

Read More
Hardware Security

Nvidia Gets Into Cybersecurity and Networking?

Nvidia makes more than GPUs! They are one of the biggest players in Networking and CyberSecurity!! This interview with Kevin DeierlIng, the SVP of Networking at Nvidia, gets into how they are changing the game with their Bluefield DPUs.

Read More
Security

US Bans Sale Of Hacking Tools

Looks like things are heating up in cybersecurity, but why now? Time stamps: 0:00 Intro 0:24 Why Now? 0:56 The New Rules Are Complicated! 2:20 Why This Is Probably Pointless 3:42 Pegasus Spyware 4:36 Protect Your Passwords!

Read More
Security

Hackers Are Using Morse Code in 2021?!

To say that times are strange would be an understatement. Not only is the world in chaos, I recently saw a Judas Priest sticker on a minivan. In that context, Hackers using Morse code in 2021 isn’t all that odd. Time stamps 0:21 Hackers Revert To Morse Code 2:53 Free PCBs! (ad) 3:36 $600m Crypto […]

Read More
Apple Privacy

Why Apple Will Scan All Your Photos

Here’s an interesting take on Apple’s move to scan all the photos on your device. The odd is a strange one given Apple’s efforts in the past to protect consumer privacy. Sources: https://www.theregister.com/2021/08/05/apple_csam_scanning/ https://thehackernews.com/2021/08/apple-to-scan-every-device-for-child.html https://www.ft.com/content/14440f81-d405-452f-97e2-a81458f5411f https://twitter.com/matthew_d_green/status/1423110719533371393 https://twitter.com/Snowden/status/1423469854347169798 https://www.reuters.com/article/us-apple-fbi-icloud-exclusive-idUSKBN1ZK1CT https://www.apple.com/child-safety/pdf/CSAM_Detection_Technical_Summary.pdf https://www.apple.com/child-safety/ https://threatpost.com/affiliate-leaks-conti-ransomware-playbook/168442/ https://www.bleepingcomputer.com/news/security/angry-conti-ransomware-affiliate-leaks-gangs-attack-playbook/ https://therecord.media/disgruntled-ransomware-affiliate-leaks-the-conti-gangs-technical-manuals/ https://krebsonsecurity.com/2021/08/ransomware-gangs-and-the-name-game-distraction/ https://www.bleepingcomputer.com/news/security/us-govt-offers-10-million-reward-for-tips-on-nation-state-hackers/

Read More
Security

Hacker Group ‘Imperial Kitten’ Caught Catfishing…

There’s little to laugh about in the realm of cyber security. Fortunately, though, a creative group name brings a little levity to the situation. Time stamps: 0:00 Intro 0:27 ‘Imperial Kitten’ ‘Cat’fish defense employees 3:10 Major Telecoms Hack 6:11 Ransomware Gang Ransomed with uhh… Sources: https://thehackernews.com/2021/07/hackers-posed-as-aerobics-instructors.html https://www.bloomberg.com/news/articles/2021-07-28/hackers-pose-as-flirty-aerobics-instructor-to-target-employees?srnd=code-wars https://www.proofpoint.com/us/blog/threat-insight/i-knew-you-were-trouble-ta456-targets-defense-contractor-alluring-social-media https://about.fb.com/news/2021/07/taking-action-against-hackers-in-iran/ https://www.cybereason.com/blog/deadringer-exposing-chinese-threat-actors-targeting-major-telcos https://www.bloomberg.com/news/articles/2021-08-03/chinese-hackers-compromised-telecom-companies-researchers-say?srnd=code-wars https://www.telegraphindia.com/business/cybersecurity-researchers-fear-chinese-telecom-hack/cid/1825165 https://www.scmp.com/news/china/diplomacy/article/3143676/chinese-hackers-targeted-telecoms-firms-southeast-asia-report?module=perpetual_scroll&pgtype=article&campaign=3143676 https://www.theverge.com/2021/7/19/22583251/us-government-blames-china-cyberattacks-microsoft-exchange-hack https://www.bloomberg.com/news/articles/2021-07-20/china-denies-microsoft-hack-says-u-s-and-allies-ganging-up […]

Read More