Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Negotiating with Ransomware: 3 Critical Factors to Consider

Ransomware attacks are becoming increasingly common, and it's not a matter of if, but when, you'll be targeted. When faced with a ransomware attack, it's crucial to have a plan in place, and that starts with understanding the threat you're up against. In this video, we discuss the three critical factors to consider before negotiating with ransomware attackers.

Psychological Warfare: How Hackers Exploit Your Sense of Security

Have you ever felt completely safe in the comfort of your own home, surrounded by loved ones? Cybercriminals know this feeling all too well, and they're using it to their advantage. In this eye-opening video, we delve into the world of psychological warfare in the realm of cybersecurity. We discuss how hackers are no longer interested in just stealing data or causing chaos - they want to get paid, and they're going after high-profile targets, including executives, politicians, and R&D leaders. We examine how hackers use it to gain leverage over their victims.

Is Your LinkedIn Profile Putting Your Security at Risk?

In today's age of information, it's becoming increasingly easier to gather information on anyone, including their professional lives on platforms like LinkedIn. While it may seem harmless to check out a colleague's profile or connect with a friend, it's important to consider the potential security risks involved. In this video, we explore the growing concern of side-channel attacks, where hackers can gain access to personal information through the connections and networks of individuals. We discuss how to identify potential risks and take steps to safeguard your personal and professional information.

The Dark Net's One-Stop-Shop for Cybercrime: Ransomware

In this video, I'll be taking you on a chilling journey through the inner workings of the dark net's cybercrime underworld. I'll show you how easy it is to buy a compromised server, purchase ransomware-as-a-service components, and install an Xbox kit to deploy the attack with friends. But the real eye-opener is the endgame: turning the stolen Bitcoin into cash. I'll reveal how Tumblr services on the dark net are used to launder money, and how traditional criminals use Doctrine to convert it into physical cash. Join me as I guide you step-by-step through this one-stop-shop for cybercrime, and expose the alarming ease with which it can all be accomplished. - Oliver Rochford

The Dark Side of AI: ChatGPT and the Rise of Malware Ransomware

In this video, we'll address the elephant in the room: the growing concern of AI being used for malicious purposes. With the rise of malware and ransomware attacks, it's becoming far too easy for outsiders to become insiders in this dangerous world. I'll be discussing ChatGPT and its role in this trend, as well as exploring the reasons why individuals turn to AI automation as a means of generating income. Join me for an eye-opening conversation about the dark side of AI and the urgent need for responsible use and regulation. - Richard Cassidy

Democratized Breach Damage: The Economics Behind Ransomware

In this video, we explore the economics behind ransomware and how it has been democratized through the use of cryptocurrencies like Bitcoin. While the recent breach affecting multiple companies is concerning, the real interesting aspect is the commercial, professional cybercrime as a service economy that has emerged as a result. We discuss how the ability to monetize ransomware has led to its rise and how alternative forms of payment like Amazon vouchers were previously used before the widespread adoption of cryptocurrencies. It's not just about the technology aspect - the economics behind ransomware are equally fascinating.

Applying Military Mindset to Cyber Security: A Holistic Approach

In this video, we explore how the military mindset and training can be applied to the cyber security domain. With a focus on defense in depth and a holistic approach to security, individuals in the forces community bring a unique perspective to the field. From personal weapons to security centers and countermeasures, the skills and methodologies learned in basic training can be translated to the cyber security space. By managing multiple streams and having a wider oversight of all domains, the elements can fit together seamlessly for a comprehensive and effective cyber security strategy.

Breaking into Cybersecurity: A Military Veteran's Journey

Getting into cybersecurity can seem daunting, but for military veterans, it's a natural transition. In this video, we follow one veteran's journey as they use their resettlement money to fast-track their career in cybersecurity. From getting the basics with certifications like CompTIA Security Plus and Network Plus to eventually obtaining their CISSP, watch as they navigate the world of cyber security and share their insights and surprises along the way.

Why Veterans Make Great Infosec Professionals

Infosec is a demanding field that requires individuals to be adaptable, quick-thinking, and able to handle difficult situations. In this video, James Rees explores why veterans are well-suited for infosec careers, with their unique experiences and skill sets making them ideal candidates for the industry. From their ability to handle high-pressure environments to their willingness to take on challenging subject matters, find out why veterans are making a big impact in infosec.

Negotiating With Hackers to Unlock Your Data - What You Need to Know!

Are you concerned about the recent ransomware attacks? Tune into this episode to gain valuable insight into the complexities of negotiating with a ransomware group. In this episode, I am joined by cyber security experts, Richard Cassidy and Oliver Rochford, to share their experiences and knowledge to help you understand the impact of ransomware and how best to respond to ransomware groups if you find yourself in that situation.