Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hacking

Psychological Warfare: How Hackers Exploit Your Sense of Security

Have you ever felt completely safe in the comfort of your own home, surrounded by loved ones? Cybercriminals know this feeling all too well, and they're using it to their advantage. In this eye-opening video, we delve into the world of psychological warfare in the realm of cybersecurity. We discuss how hackers are no longer interested in just stealing data or causing chaos - they want to get paid, and they're going after high-profile targets, including executives, politicians, and R&D leaders. We examine how hackers use it to gain leverage over their victims.

How to Make Your Hackathon Project Stand Out?

In the last few years we have seen a massive spike in the opportunities for individuals and companies to come together at hackathons. The general goal of these events is to create something new that has never been created before. The great part about hackathons is that they take a normal person and put them into a position where they can be creative and create some amazing ideas that could result in a lot of success.

The 443 Episode 230 - Successfully Prosecuting a Russian Hacker

On today's episode, we discuss a recent court case resulting in the succesful conviction of a Russian national tied to breaking in to several publicly traded US companies. We also cover the latest details on the ESXiArgs ransomware attacks that have been impacting organizations globally as well as the latest CISA alert on nation-state ransomware activity. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Cybercriminal convicted of $90 million SEC earning reports hack

The owner of a Russian penetration-testing company has been found guilty of being part of an elaborate scheme that netted $90 million after stealing SEC earning reports. For nearly three years, 42-year-old Vladislav Klyushin - the owner of Moscow-based cybersecurity firm M-13 - and his co-conspirators had hacked into two US-based filing agents used by publicly-traded American companies to file earning reports to the Securities and Exchange Commission.

Negotiating With Hackers to Unlock Your Data - What You Need to Know!

Are you concerned about the recent ransomware attacks? Tune into this episode to gain valuable insight into the complexities of negotiating with a ransomware group. In this episode, I am joined by cyber security experts, Richard Cassidy and Oliver Rochford, to share their experiences and knowledge to help you understand the impact of ransomware and how best to respond to ransomware groups if you find yourself in that situation.

Why Hackers Love Credentials: Parsing Verizon's 2022 Breach Report

The 2022 Verizon Data Breach Investigations Report (DBIR), the fifteenth such report in as many years, leads off with a startling statistic: Credentials are the number one overall attack vector hackers use in data breaches. Use of stolen credentials accounts for nearly half the breaches studied by Verizon, far ahead of phishing and exploit vulnerabilities, which account for 19% and 8% of attacks, respectively. Botnets, the fourth most common entry path for hackers, represent a mere 1% of attacks.

This Valentine's Day, Swipe Left on Hackers

Online dating is one of the fastest-growing industries in the tech world. Online dating has quickly become a sustainable way to remain social and have a relationship with someone other than your cat. But what are the chances that you’ll be swiping right on a hacker? Mobile analytics platform, Adjust, reports that in 2021, 300 million adults used dating apps worldwide with 20 million users paying for premium features.

How The "No Fly List" Hack Highlights the Need for Cloud Security

The names of over 1.5 million individuals were published on the dark web in January after ahacker gained access to the TSA’s “No Fly List.” That’s a lot of names (including aliases and birth dates), so why wasn’t the list secure, and how did it get leaked? The entire breach came down to one small business with one misconfigured server.