Security

Security

How Did the FBI Caught Hacker Pompompurin?

Another great video from Seytonic. Sources: https://thehackernews.com/2023/03/breachforums-administrator-baphomet.html https://thehackernews.com/2023/03/breachforums-administrator-baphomet.html https://www.bleepingcomputer.com/news/security/breached-hacking-forum-shuts-down-fears-its-not-safe-from-fbi/ https://www.bleepingcomputer.com/news/security/breached-hacking-forum-shuts-down-fears-its-not-safe-from-fbi/ https://www.bleepingcomputer.com/news/security/breached-hacking-forum-shuts-down-fears-its-not-safe-from-fbi/ https://therecord.media/breachforums-arrest-new-administrator https://www.darkreading.com/threat-intelligence/cops-nab-breachforums-boss-new-york https://go.theregister.com/feed/www.theregister.com/2023/03/20/in_brief_security/ https://regmedia.co.uk/2023/03/17/breachforums.pdf

Read More
Security

Linus Tech Tips YouTube Channel HACKED | BREAKING NEWS

In this video, CyberNews reports on the Linus Tech Tips YouTube channel being hacked.

Read More
Azure Security

Introduction to Azure DDoS Protection and to Azure Web Application Firewall

Learn how to guard your Azure services from a denial of service attack using Azure DDoS Protection. Then, describe how Azure Web Application Firewall protects Azure web applications from common attacks, including its features, how it’s deployed, and its common use cases.

Read More
Hardware Security

3 HACKING gadgets you have to TRY!!

In this video, NetworkChuck shows you how to create 3 hacking projects with a Raspberry Pi Zero W (Raspberry Pi 0 W). These projects include the P4wnP1 A.L.O.A., the pwnagotchi and Kali Linux.

Read More
Privacy Security

illegal Phone Tracking Exposed

Seytonic exposes US Gov’s illegal Phone Tracking. Sources: https://www.theregister.com/2023/03/04/dhs_secret_service_ice_stingray/ https://www.eff.org/deeplinks/2023/03/report-ice-and-secret-service-conducted-illegal-surveillance-cell-phones https://www.oig.dhs.gov/sites/default/files/assets/2023-03/OIG-23-17-Feb23-Redacted.pdf https://theintercept.com/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/ https://www.engadget.com/2018-06-08-fcc-shrugs-at-fake-cell-towers-around-the-white-house.html https://theintercept.com/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/ https://www.hackread.com/bidencash-leaks-2-million-credit-cards/ https://cybernews.com/news/bidencash-leaks-millions-payment-cards/ https://www.paymentsjournal.com/bidencash-credit-card-leak-strikes-again/ https://blog.cyble.com/2023/03/01/over-2-million-cards-leaked-by-bidencash/ https://www.bleepingcomputer.com/news/security/chick-fil-a-confirms-accounts-hacked-in-months-long-automated-attack/ https://apps.web.maine.gov/online/aeviewer/ME/40/66699dcb-5f86-40bb-9d12-d64dea06faca.shtml

Read More
Interesting Security

What is PsyOps? Darknet Diaries Explores

This video is from Jack Rhysider. PSYOPs, or “Psychological Operations” are happening all around us, 24/7. Sometimes they’re used in warfare against foreign enemies, and sometimes we know them by different names: Marketing, PR, spin, and propaganda. This is the story about information being weaponized for good and shady ends.

Read More
Security

2FA Isn’t Secure – Here’s What You Need Instead!

Shannon Morse explains why two factor authentication is no longer good enough. References: https://fidoalliance.org/specs/u2f-specs-1.0-bt-nfc-id-amendment/fido-u2f-implementation-considerations.html#token-counters https://www.pcmag.com/news/hacking-fingerprints-is-actually-pretty-easy-and-cheap https://www.reddit.com/r/reddit/comments/10y427y/we_had_a_security_incident_heres_what_we_know/ https://www.protocol.com/bulletins/uber-breach-hacker-twilio-mfa https://blog.cloudflare.com/2022-07-sms-phishing-attacks/ https://techcrunch.com/2022/10/28/twilio-june-data-breach/ https://www.zdnet.com/article/should-you-worry-about-hackers-cloning-your-2fa-hardware-security-keys/ https://blog.twitter.com/en_us/topics/product/2023/an-update-on-two-factor-authentication-using-sms-on-twitter

Read More
Drones Security

Hacker Drones are Finally Here

In this video is from Seytonic, learn about a new creative use for drones. Sources: https://go.theregister.com/feed/www.theregister.com/2022/10/12/drone-roof-attack/ https://www.darkreading.com/threat-intelligence/drones-cyber-spy-exploits-in-the-wild https://twitter.com/Laughing_Mantis/status/1579550302172508161 https://www.bleepingcomputer.com/news/security/police-tricks-deadbolt-ransomware-out-of-155-decryption-keys/ https://www.politie.nl/nieuws/2022/oktober/14/09-nederlandse-gedupeerde-geholpen-in-unieke-ransomware-actie.html https://support.bitso.com/hc/en-us/articles/4414984898452-What-are-the-Bitcoin-confirmations- https://nakedsecurity.sophos.com/2022/09/07/deadbolt-ransomware-rears-its-head-again-attacks-qnap-devices/

Read More
AI Security

What is the ChatGPT Scam?

Seytonic highlights the latest in security news and among the stories is a devious use case for ChatGPT.

Read More