
How Did the FBI Caught Hacker Pompompurin?
Another great video from Seytonic. Sources: https://thehackernews.com/2023/03/breachforums-administrator-baphomet.html https://thehackernews.com/2023/03/breachforums-administrator-baphomet.html https://www.bleepingcomputer.com/news/security/breached-hacking-forum-shuts-down-fears-its-not-safe-from-fbi/ https://www.bleepingcomputer.com/news/security/breached-hacking-forum-shuts-down-fears-its-not-safe-from-fbi/ https://www.bleepingcomputer.com/news/security/breached-hacking-forum-shuts-down-fears-its-not-safe-from-fbi/ https://therecord.media/breachforums-arrest-new-administrator https://www.darkreading.com/threat-intelligence/cops-nab-breachforums-boss-new-york https://go.theregister.com/feed/www.theregister.com/2023/03/20/in_brief_security/ https://regmedia.co.uk/2023/03/17/breachforums.pdf
Read More
Linus Tech Tips YouTube Channel HACKED | BREAKING NEWS
In this video, CyberNews reports on the Linus Tech Tips YouTube channel being hacked.
Read More
Hackers Breach Dish Network: What You Need to Know
- Frank
- March 18, 2023
- cyber attack
- DISH
- dish data breach
- dish network
- dish network cyber attack
- dish network data breach
- dish network data leak
- dish network hacked
- dish network outage
- hacked
- last pass leak
- lastpass
- lastpass corporate vault
- lastpass hacked
- lastpass vault hacked
- mental
- Mental Outlaw
- network
- outlaw
In this video Mental Outlaw covers what is known about the recent cyber attack on dish network and lastpass.
Read More
Introduction to Azure DDoS Protection and to Azure Web Application Firewall
Learn how to guard your Azure services from a denial of service attack using Azure DDoS Protection. Then, describe how Azure Web Application Firewall protects Azure web applications from common attacks, including its features, how it’s deployed, and its common use cases.
Read More
3 HACKING gadgets you have to TRY!!
In this video, NetworkChuck shows you how to create 3 hacking projects with a Raspberry Pi Zero W (Raspberry Pi 0 W). These projects include the P4wnP1 A.L.O.A., the pwnagotchi and Kali Linux.
Read More
illegal Phone Tracking Exposed
Seytonic exposes US Gov’s illegal Phone Tracking. Sources: https://www.theregister.com/2023/03/04/dhs_secret_service_ice_stingray/ https://www.eff.org/deeplinks/2023/03/report-ice-and-secret-service-conducted-illegal-surveillance-cell-phones https://www.oig.dhs.gov/sites/default/files/assets/2023-03/OIG-23-17-Feb23-Redacted.pdf https://theintercept.com/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/ https://www.engadget.com/2018-06-08-fcc-shrugs-at-fake-cell-towers-around-the-white-house.html https://theintercept.com/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/ https://www.hackread.com/bidencash-leaks-2-million-credit-cards/ https://cybernews.com/news/bidencash-leaks-millions-payment-cards/ https://www.paymentsjournal.com/bidencash-credit-card-leak-strikes-again/ https://blog.cyble.com/2023/03/01/over-2-million-cards-leaked-by-bidencash/ https://www.bleepingcomputer.com/news/security/chick-fil-a-confirms-accounts-hacked-in-months-long-automated-attack/ https://apps.web.maine.gov/online/aeviewer/ME/40/66699dcb-5f86-40bb-9d12-d64dea06faca.shtml
Read More
What is PsyOps? Darknet Diaries Explores
This video is from Jack Rhysider. PSYOPs, or “Psychological Operations” are happening all around us, 24/7. Sometimes they’re used in warfare against foreign enemies, and sometimes we know them by different names: Marketing, PR, spin, and propaganda. This is the story about information being weaponized for good and shady ends.
Read More
2FA Isn’t Secure – Here’s What You Need Instead!
- Frank
- March 5, 2023
- 2 factor authentication security key
- 2fa
- 2fa authenticator
- 2fa key
- 2fa key setup
- 2fa security
- 2fa setup
- 2fa solution
- google authenticator app
- how to set up a 2fa key
- how to set up yubikey
- how to use yubikey
- online security
- online security tips
- Privacy
- security key
- setting up a 2fa key
- two factor authentication
- what is two factor authentication
- yubi key setup
- yubikey 5 nfc
- yubikey 5ci
- yubikey authenticator
- yubikey review
Shannon Morse explains why two factor authentication is no longer good enough. References: https://fidoalliance.org/specs/u2f-specs-1.0-bt-nfc-id-amendment/fido-u2f-implementation-considerations.html#token-counters https://www.pcmag.com/news/hacking-fingerprints-is-actually-pretty-easy-and-cheap https://www.reddit.com/r/reddit/comments/10y427y/we_had_a_security_incident_heres_what_we_know/ https://www.protocol.com/bulletins/uber-breach-hacker-twilio-mfa https://blog.cloudflare.com/2022-07-sms-phishing-attacks/ https://techcrunch.com/2022/10/28/twilio-june-data-breach/ https://www.zdnet.com/article/should-you-worry-about-hackers-cloning-your-2fa-hardware-security-keys/ https://blog.twitter.com/en_us/topics/product/2023/an-update-on-two-factor-authentication-using-sms-on-twitter
Read More
Hacker Drones are Finally Here
In this video is from Seytonic, learn about a new creative use for drones. Sources: https://go.theregister.com/feed/www.theregister.com/2022/10/12/drone-roof-attack/ https://www.darkreading.com/threat-intelligence/drones-cyber-spy-exploits-in-the-wild https://twitter.com/Laughing_Mantis/status/1579550302172508161 https://www.bleepingcomputer.com/news/security/police-tricks-deadbolt-ransomware-out-of-155-decryption-keys/ https://www.politie.nl/nieuws/2022/oktober/14/09-nederlandse-gedupeerde-geholpen-in-unieke-ransomware-actie.html https://support.bitso.com/hc/en-us/articles/4414984898452-What-are-the-Bitcoin-confirmations- https://nakedsecurity.sophos.com/2022/09/07/deadbolt-ransomware-rears-its-head-again-attacks-qnap-devices/
Read More
What is the ChatGPT Scam?
Seytonic highlights the latest in security news and among the stories is a devious use case for ChatGPT.
Read More