cyber security

Security Windows

CODE RED: The Billion Dollar Buffer Overflow & How it Worked

How does a buffer overflow work and what does it have to do with CODE RED, one of the biggest security holes ever found (so far)? Join retired Microsoft developer Dave Plummer as he explains how CODE RED was unleashed on the world and how it worked so that you can avoid the mistakes of […]

Read More
Security

Learn Cyber Security In 12 Hours

This free Cyber Security full course helps you learn cybersecurity in 12 Hours. In this cybersecurity tutorial for beginners, you will learn the importance of cybersecurity, cybersecurity skills, what cybersecurity means, and the types of cyberattacks with a hands-on demo for each. This video also covers cryptography, ethical hacking, and the top cybersecurity certifications. Below […]

Read More
Security

Hackers Are Using Morse Code in 2021?!

To say that times are strange would be an understatement. Not only is the world in chaos, I recently saw a Judas Priest sticker on a minivan. In that context, Hackers using Morse code in 2021 isn’t all that odd. Time stamps 0:21 Hackers Revert To Morse Code 2:53 Free PCBs! (ad) 3:36 $600m Crypto […]

Read More
Apple Privacy

Why Apple Will Scan All Your Photos

Here’s an interesting take on Apple’s move to scan all the photos on your device. The odd is a strange one given Apple’s efforts in the past to protect consumer privacy. Sources: https://www.theregister.com/2021/08/05/apple_csam_scanning/ https://thehackernews.com/2021/08/apple-to-scan-every-device-for-child.html https://www.ft.com/content/14440f81-d405-452f-97e2-a81458f5411f https://twitter.com/matthew_d_green/status/1423110719533371393 https://twitter.com/Snowden/status/1423469854347169798 https://www.reuters.com/article/us-apple-fbi-icloud-exclusive-idUSKBN1ZK1CT https://www.apple.com/child-safety/pdf/CSAM_Detection_Technical_Summary.pdf https://www.apple.com/child-safety/ https://threatpost.com/affiliate-leaks-conti-ransomware-playbook/168442/ https://www.bleepingcomputer.com/news/security/angry-conti-ransomware-affiliate-leaks-gangs-attack-playbook/ https://therecord.media/disgruntled-ransomware-affiliate-leaks-the-conti-gangs-technical-manuals/ https://krebsonsecurity.com/2021/08/ransomware-gangs-and-the-name-game-distraction/ https://www.bleepingcomputer.com/news/security/us-govt-offers-10-million-reward-for-tips-on-nation-state-hackers/

Read More
Security

Hacker Group ‘Imperial Kitten’ Caught Catfishing…

There’s little to laugh about in the realm of cyber security. Fortunately, though, a creative group name brings a little levity to the situation. Time stamps: 0:00 Intro 0:27 ‘Imperial Kitten’ ‘Cat’fish defense employees 3:10 Major Telecoms Hack 6:11 Ransomware Gang Ransomed with uhh… Sources: https://thehackernews.com/2021/07/hackers-posed-as-aerobics-instructors.html https://www.bloomberg.com/news/articles/2021-07-28/hackers-pose-as-flirty-aerobics-instructor-to-target-employees?srnd=code-wars https://www.proofpoint.com/us/blog/threat-insight/i-knew-you-were-trouble-ta456-targets-defense-contractor-alluring-social-media https://about.fb.com/news/2021/07/taking-action-against-hackers-in-iran/ https://www.cybereason.com/blog/deadringer-exposing-chinese-threat-actors-targeting-major-telcos https://www.bloomberg.com/news/articles/2021-08-03/chinese-hackers-compromised-telecom-companies-researchers-say?srnd=code-wars https://www.telegraphindia.com/business/cybersecurity-researchers-fear-chinese-telecom-hack/cid/1825165 https://www.scmp.com/news/china/diplomacy/article/3143676/chinese-hackers-targeted-telecoms-firms-southeast-asia-report?module=perpetual_scroll&pgtype=article&campaign=3143676 https://www.theverge.com/2021/7/19/22583251/us-government-blames-china-cyberattacks-microsoft-exchange-hack https://www.bloomberg.com/news/articles/2021-07-20/china-denies-microsoft-hack-says-u-s-and-allies-ganging-up […]

Read More
Security

Hackers Caught Hiding Credit Cards In Images

Seytonic covers the latest stories in online security, including a case where steganography is used to hide credit card information.

Read More