Look for any podcast host, guest or anyone
Showing episodes and shows of

Chloe Thonus

Shows

Bite Sized Cyber CrimeBite Sized Cyber CrimeInside a North Korean Laptop Farm SchemeAn Arizona woman was arrested for running a North Korean IT worker laptop farm out of her home, and this gave us a little look into the strange world of how these threat actors are able to infiltrate US organizations. Sources: https://pastebin.com/qvrWirYa 2025-07-2805 minBite Sized Cyber CrimeBite Sized Cyber CrimeNew FIDO MFA Downgrade Attack ExploitedFIDO is the passwordless authentication set of protocols of the future, however that doesn't mean it's perfect and as cyber defenders attack, so do attackers. This novel exploit isn't a flaw within FIDO exploit but does threaten improperly implemented versions of it. Sources: https://pastebin.com/fmUZEBAM 2025-07-2106 minBite Sized Cyber CrimeBite Sized Cyber CrimePerfektBlue Vulnerabilities Impacts Vehicle BluetoothWith cars becoming just another type of computer, and having rather complicated implementations, vulnerabilities in one system are major. A recent series of vulnerabilities discovered in OpenSynergy's BlueSDK could prove dangerous. Sources: https://pastebin.com/5JHAyuAV 2025-07-1406 minBite Sized Cyber CrimeBite Sized Cyber CrimeRansomware Negociator Received Payments from Ransomware GroupsRansomware negotiators may be called in to save some financial burden on organizations suffering from one of the worst cyberattacks they can. However, they seem like the natural people for ransomware groups to corrupt, and allegedly one such group did corrupt one such person.   Sources: https://pastebin.com/fANnhtTj 2025-07-0707 minBite Sized Cyber CrimeBite Sized Cyber CrimeBrother Printers Affected by Unpatchable Critical VulnerabilityPrinters are the bane of many's existence, but they may have just gotten worse for security professionals. Rapid7 discovered 8 new vulnerabilities mostly impacting Brother branded printers, one of which cannot be patched by the vendor and leaks the admin password of the device. Sources: https://pastebin.com/vNDbrwsU 2025-06-3006 minBite Sized Cyber CrimeBite Sized Cyber CrimeWere 16 Billion Passwords Just Leaked?News has hit the mainstream media that all your passwords have been leaked yet again, in a massive password leak including Google, Meta, and Apple. But how much of that sensationalized story is true? Sources: https://pastebin.com/Xi1MPpFg 2025-06-2307 minBite Sized Cyber CrimeBite Sized Cyber CrimeI Got ScammedAnd it could happen to you too. On this week's episode of Bite Size Cyber Crime I detail an actual scam I fell for and emphasize that anyone can be a victim of a scam anywhere on the internet. 2025-06-1607 minBite Sized Cyber CrimeBite Sized Cyber CrimeMalwareception: SakuraRAT is a Backdoor to Trick Script KiddiesMalware is everywhere, even inside of other malware. One tool advertising itself as an advanced remote access trojan ended up being much more, a backdoor infecting novice hackers. This was not just a one off, however, and lead to the discovery of a massive backdoored malware campaign infecting other hackers and gaming cheaters. Sources: https://pastebin.com/C4DG6LTw 2025-06-0906 minBite Sized Cyber CrimeBite Sized Cyber CrimeMSP Customers Face Ransomware after Remote Assist Tool CompromisedUsing an MSP can be handy for getting your IT set up or managing technical support without hiring a lot of full time staff, but there are risks that can come with outsourcing your IT to a third party. One MSP was compromised, leading to many customers having ransomware headaches. Sources: https://pastebin.com/hLKSqRaS 2025-06-0206 minBite Sized Cyber CrimeBite Sized Cyber CrimeMalware Spread via fake TikTok Piracy TutorialsPiracy and accidentally getting malware go hand in hand for many, and though the days of Limewire viruses on your Linkin Park albums are mostly over, modern problems require modern solutions so attackers have moved to modern platforms to spread malware to those not interested in paying for software. Sources: https://pastebin.com/i7yriZXy 2025-05-2606 minBite Sized Cyber CrimeBite Sized Cyber CrimeCoinbase Insiders Bribed to Hand Over Data to ScammersCoinbase is one of the largest crypto exchanges, but when corrupt employees are compromised into handing over data to scammers, a series of social engineering attacks took place. The scammers demanded a ransom, but Coinbase fired back. Sources: https://pastebin.com/dTZR6hKw 2025-05-1906 minBite Sized Cyber CrimeBite Sized Cyber CrimePearson Breached Via Exposed GitLab TokenPearson is an education giant, providing learning tools and standardized assessments across many fields, schools, and organizations. Recently they were breached by what was likely a series of relatively minor mistakes. Sources: https://pastebin.com/YemUE0Xi 2025-05-1205 minBite Sized Cyber CrimeBite Sized Cyber CrimeSecurity Firm CEO Installs Malware on Hospital ComputerThis is one of the craziest stories I've ever covered in my 3 years of this podcast, and hearing both sides somehow makes the situation even less clear. Cybersecurity firm CEO Jeff Bowie accessed hospital computers and wrote malicious scripts on them intended to steal data. But why? Sources: https://pastebin.com/qqLMem11 2025-05-0509 minBite Sized Cyber CrimeBite Sized Cyber CrimeSuperCardX Steals Payment Data via NFCNFC has allowed for payments to be easier than ever, but it was only a matter of time before this method was exploited by threat actors. A bold, new real time malware that leverages NFC has been making rounds. Sources: https://pastebin.com/QgquMLj8 2025-04-2806 minBite Sized Cyber CrimeBite Sized Cyber CrimeWhat's Going on With CVE?The CVE program is essential for tracking vulnerabilities all across the technology industry, but what happens when funding is cut? Let's talk about what's been going on with the CVE program. Sources: https://pastebin.com/QPVXe6kD 2025-04-2106 minBite Sized Cyber CrimeBite Sized Cyber CrimeUSB Drive Drops Infostealer Malware on Military DevicesYou're always told to never plug in a random flash drive because it may have malware on it, but is that really a thing? The answer is yes, and it can potentially compromise a military mission. Sources: https://pastebin.com/LURNpcH5 2025-04-1406 minBite Sized Cyber CrimeBite Sized Cyber CrimeTax Season and ScamsTax season is a stressful time for many in the US, and this creates the perfect opportunity for a number of scams against virtually anyone living in the US. Be aware of fake documents, fake filing services, and unusual emails. Sources: https://pastebin.com/zJQGMndk 2025-04-0706 minBite Sized Cyber CrimeBite Sized Cyber CrimeOracle Denies Data Breach, Evidence Suggests OtherwiseA hacker claimed to have stolen 6 million lines of data from Oracle, which Oracle swiftly denied. However when security firms received data samples and showed them to customers, the data was confirmed to be real. Sources: https://pastebin.com/6WnaeYZs 2025-03-3108 minBite Sized Cyber CrimeBite Sized Cyber CrimeGoogle Aquires Wiz for $32 BillionGoogle, though a tech giant, has lagged behind Amazon and Microsoft when it comes to cloud computing, but this bold new acquisition could bridge that gap... or introduce legal troubles.   Sources: https://pastebin.com/004Wu6hv 2025-03-2405 minBite Sized Cyber CrimeBite Sized Cyber CrimeX DDoSed Multiple TimesElon Musk has become a controversial political figure, leaving little surprise that one of his projects, the X platform, became a target for a hacktivist group, leaving the major social media platform down from a DDoS attack. Sources: https://pastebin.com/Pa6b0nrm 2025-03-1707 minBite Sized Cyber CrimeBite Sized Cyber CrimeRansomware Group Bypasses EDR using WebcamRansomware groups sometimes run into issues, like being blocked by security tools, and often have to pivot. Some techniques are less conventional than others, but are just as destructive. Here's how a webcam led to ransomware being deployed org wide. Sources: https://pastebin.com/FHxVYgBg 2025-03-1006 minBite Sized Cyber CrimeBite Sized Cyber CrimeAccess Management Systems Exposed on InternetBuilding access management is an important part of physical security that has only become more intelligent. However, with all the data on these systems that exist on employees it is important that they are properly secured. Recently, 49,000 systems were found unsecured on the open internet with data viewable, and sometimes modifiable. Sources: https://pastebin.com/8feGBvEu 2025-03-0307 minBite Sized Cyber CrimeBite Sized Cyber CrimeHNFS Pays $11 Million Settlement for False Security CertificationsGovernment contractors are expected to follow certain compliance policies, so what happens when a company lies about compliance? Hefty fines tend to follow. Sources: https://pastebin.com/vJPEikD9 2025-02-2409 minBite Sized Cyber CrimeBite Sized Cyber CrimeSerial SWATter Sentenced to 4 Years in PrisonSWATting is a dangerous crime that involves making extreme police reports against people to illicit a response from the SWAT team. This has resulted in innocent people being killed or injured. One teen turned making these reports into a business and was recently sentenced to 4 years in prison for it. Learn about his crimes and methodology today. Sources: https://pastebin.com/ET9xMi85 2025-02-1708 minBite Sized Cyber CrimeBite Sized Cyber CrimeCrypto Stealer Searches Gallery for Wallet PassphrasesRecently a new crypto stealing malware was found in apps on both the Google Play, and the famously restrictive Apple App Store, but it seems not to be its own app, but rather something inserted into existing apps at a later time to steal passphrases for crypto wallets from images on devices. Sources: https://pastebin.com/fHgDP4fg 2025-02-1009 minBite Sized Cyber CrimeBite Sized Cyber CrimeWhat's the Deal with Deepseek?Recently a brand new generative AI model came out of nowhere and blew up overnight. There are a lot of controversies and concerns surrounding this model, providing more efficient AI but also bringing a lot of data sensitivity risks and topics of government censorship to the forefront. Sources: https://pastebin.com/WRGERYCE 2025-02-0310 minBite Sized Cyber CrimeBite Sized Cyber CrimeEV Chargers Hacked in Pwn2Own AutomotivePwn2Own by TrendMicro's Zero Day Initiative is a hacking contest where people try to hack "up to date" products to discover zero day vulnerabilities in them and win cash prizes for doing so. The automotive version of this contest not only involved cars themselves, but chargers for electric vehicles. Sources: https://pastebin.com/4siwYEYK 2025-01-2706 minBite Sized Cyber CrimeBite Sized Cyber CrimeCrowdstrike Phishing Email Installs Crypto MinerJob offer scams are sadly rather common, but most of the time it's a waste of time or an identity theft scam rather than a scam that installs unauthorized crypto miners on your devices. A new scam email impersonating Crowdstrike that is targeting developers does just that. Sources: https://pastebin.com/Lpg673yh 2025-01-1309 minBite Sized Cyber CrimeBite Sized Cyber CrimeUS Treasury Hacked in String of Chinese Nation State CyberattacksThe US Department of Treasury was targeted in a suspected state-sponsored hack. No ransomware was deployed, though the threat actors compromised machines remotely, linked to a BeyondTrust data breach and accessed many unclassified documents. Sources: https://pastebin.com/rUi3Wdxg 2025-01-0607 minBite Sized Cyber CrimeBite Sized Cyber CrimeDeepfakes Used to Commit Financial FraudDeepfakes and AI image and video generation have become nearly indistinguishable from real people to the naked eye. This creates a problem when it comes to identity verification that involves previously very difficult to fake Face ID systems. Recently a deep web identity fraud database was being build was scraped data and images with the intention to target financial accounts. Sources: https://pastebin.com/X7acHzs9 2024-12-3011 minBite Sized Cyber CrimeBite Sized Cyber CrimeAscension Notifies 5.6 Million of BreachThe healthcare industry remains one of the top targeted by hackers, and even the biggest healthcare organizations are not safe. Sources: https://pastebin.com/UgauFXsL 2024-12-2305 minBite Sized Cyber CrimeBite Sized Cyber CrimeThe Melissa VirusIn 1999 one of the most infamous viruses was released on the world, slowing down email systems and causing chaos in the corporate world and among personal computer users. Sources: https://pastebin.com/FgE9ETKk 2024-12-1608 minBite Sized Cyber CrimeBite Sized Cyber CrimeFBI Advisory: Use Encrypted Channels for TextingTelecom providers across many countries have been compromised by an APT, which means your text messages may be vulnerable if you text people with different phones, due to insecurities in text message protocols. Fortunately there's some solutions. Sources: https://pastebin.com/pMnEP6Lj 2024-12-0907 minBite Sized Cyber CrimeBite Sized Cyber CrimeGodot Game Engine Exploited to Distribute MalwareGame engines are used to help developers create games we love, but where code can be written, malware can be written, and one group has figured out a way to exploit the Godot game engine to discreetly package malware that often goes undetected. Sources: https://pastebin.com/5b3LcJpW 2024-12-0205 minBite Sized Cyber CrimeBite Sized Cyber CrimeFord Data Sold for 2 Dollars on Hacking ForumsA hacking group boasted about breaching car manufacturer Ford's network and stealing data on 44,000 customers, selling it for 2 dollars on hacking forums for everyone to enjoy. The only problem? That data isn't exactly what they claimed. Sources: https://pastebin.com/d7r88Q7m 2024-11-2507 minBite Sized Cyber CrimeBite Sized Cyber CrimeSitting Duck Attack Allows Hackers to Hijack WebsitesSimple misconfiguration can often lead to disaster, and sometimes that disaster is a threat actor sneakily taking over your trusted website and using it to host malware, send phishing emails, or control botnets. Here's a surprisingly easily exploited DNS oversight that has allowed threat actors to take over 70,000 websites. Sources: https://pastebin.com/DqXL1BRb 2024-11-1809 minBite Sized Cyber CrimeBite Sized Cyber CrimeRansomware Group Requests Payment in BaguettesRansomware groups typically request payments in the form of crypto, but newcomers Hellcat wanted to get this bread in a more literal sense. So why bread? There may be a more realistic reason than you'd think... Sources: https://pastebin.com/kAkdLJD5 2024-11-1107 minBite Sized Cyber CrimeBite Sized Cyber CrimePhish N Ship Scams Infect Sites with Fake ProductsThere's all sorts of online shopping scams, but one of the newest ones discovered exploits legitimate eshops by creating fake product listings on other people's websites and redirecting shoppers to an attacker-controlled page that will steal credit card data.   Sources: https://pastebin.com/VS9XFHRF 2024-11-0406 minBite Sized Cyber CrimeBite Sized Cyber CrimeWhat Can the Flipper Zero Actually Do?The Flipper Zero is a notorious hacking tool used to wreak havoc on traffic lights, banks, locks, and cars. Or is it? What can the Flipper actually do, and is it really as dangerous as it seems on Tik Tok? Sources: https://pastebin.com/cnJyQkXC 2024-10-2810 minBite Sized Cyber CrimeBite Sized Cyber CrimeThe New Guy May be a North Korean Threat ActorA couple months ago security education company KnowBe4 accidentally hired a North Korean threat actor who tried to install malware on their machine. Turns out this may not be as uncommon as you'd think. Recently a network of North Korean threat actors applying for jobs, and US citizens helping them, has been uncovered. Sources: https://pastebin.com/1npHD8cA 2024-10-2106 minBite Sized Cyber CrimeBite Sized Cyber CrimeThe Internet Archive is Under AttackThe Internet Archive is a website vital in the preservation of digital information, and recently it was attacked on two separate occasions. Here's what went down. Sources: https://pastebin.com/nbhNFAv5 2024-10-1408 minBite Sized Cyber CrimeBite Sized Cyber CrimePig Butchering ScamsEver receive a weird wrong number text or match with someone on a dating site who starts talking about crypto? It may be part of a long term scam meant to drain you of as much money as you're willing to part with to make a big investment. Once it seems too good to be true and you go to withdraw your earnings, suddenly you realize you've lost it all. 2024-10-0707 minBite Sized Cyber CrimeBite Sized Cyber CrimeKia Exploit Almost Allowd Remote Control Over Millions of CarsCars are just big computers now, and that means they are vulnerable to exploits that could allow a concerning amount of control over them. Security researchers discovered a vulnerability in the Kia dealer portal that could allow a hacker remote control over millions of cars made after 2013. Sources: https://pastebin.com/tsJGg8jq 2024-09-3005 minBite Sized Cyber CrimeBite Sized Cyber CrimeWas the Tor Network Just Cracked?The Tor network allows for anonymous connections to unindexed search engines, including to online criminal services. Recently though, German authorities claimed to have de-anonymized a user using Tor and made an arrest. Has Tor finally been cracked, or is this a scare tactic to instill fear in threat actors? Sources: https://pastebin.com/Hfrrbdag 2024-09-2307 minBite Sized Cyber CrimeBite Sized Cyber CrimeYubiKey Vulnerability Allows for Device CloningYubiKeys are physical authentication devices that have a lot of flexibility and are compatible with just about every service, but as it turns out if you know a lot about math and electronics you can uncover the private keys and clone the device!   Sources: https://pastebin.com/WacbUmA1 2024-09-1605 minBite Sized Cyber CrimeBite Sized Cyber CrimeColumbus Ohio Sues Researcher for Exposing Severity of Data BreachThe city of Columbus, Ohio had a data breach occur in July. According to the mayor, the information leaked was nothing important to hackers. A security researcher proved that this was not the case, that the data was incredibly sensitive. In response, the city sued him. Sources: https://pastebin.com/C632hthD 2024-09-0207 minBite Sized Cyber CrimeBite Sized Cyber CrimeGPO Used to Steal Credentials from Chrome BrowserUsing native Windows tools rather than custom malware is becoming a better technique of pulling off attacks while remaining under the radar. Qilin was caught doing just this to steal credentials right from the Chrome web browser.   Sources: https://pastebin.com/Ccvhs7Pd 2024-08-2607 minBite Sized Cyber CrimeBite Sized Cyber CrimeMalware That Uses a Driver to Kill EDR SoftwareAntimalware solutions like EDR are meant to keep a careful watch on our systems to ensure they are protected from even sneaky threats. But what happens when malware can take out an EDR solution before it is spotted? Sources: https://pastebin.com/6uRVy4Yd 2024-08-1905 minBite Sized Cyber CrimeBite Sized Cyber Crime3 Billion Impacted in Background Check Company BreachOften times we can reduce our risk to cyber crime by being careful about the websites we sign up for, but what if someone has our data that we never consented to giving them and ends up being breached? Just that happened, with a company you've probably never heard of. Sources: https://pastebin.com/Yms285F5 2024-08-1206 minBite Sized Cyber CrimeBite Sized Cyber CrimeDark Angels Recieved the Biggest Ever Ransomware PayoutRansomware threat actors are one of the biggest modern threats, and things will only ramp up when threat actors see just how much an organization is willing to pay to have their data back. Recently it was uncovered that a covert ransomware group quietly received the largest payout ever recorded in ransomware history. Sources: https://pastebin.com/uLQ9sFh0 2024-08-0507 minBite Sized Cyber CrimeBite Sized Cyber CrimeKnowBe4 Accidentally Hired a North Korean HackerKnowBe4 has employed hacker Kevin Mitnick as a spokesperson in their security training materials. But what happens when you employ a hacker by accident and they immediately try loading malware on the company provided laptop? Sources: https://pastebin.com/XrMa4bsS 2024-07-2909 minBite Sized Cyber CrimeBite Sized Cyber CrimeHow CrowdStrike Broke the InternetThe biggest IT outage across the world just happened. Planes were grounded, hospitals and 911 dispatch centers were down, people couldn't turn their computers on, all on a massive global scale never seen before. So what is CrowdStrike, and how did this happen?   Sources: https://pastebin.com/vxfyMcd4 2024-07-2212 minBite Sized Cyber CrimeBite Sized Cyber CrimeMultiple Data Breaches Linked to Snowflake Cloud ProviderTicketmaster, AT&T, Neiman Marcus, Advanced Auto Parts. These organizations may not seem like they have anything in common, but they all were customers of Snowflake that had a data breach within the past couple months. With conflicting reports from Snowflake, the victims, the threat actors, and different security firms, who is really at fault here? Sources: https://pastebin.com/E1H5rgkd 2024-07-1507 minBite Sized Cyber CrimeBite Sized Cyber Crime33 Million Authy User Phone Numbers BreachedAuthy is an app that allows for multifactor authentication, recently the phone numbers of 33 million Authy customers were leaked due to an unsecured API, which could lead to attacks on those users. Sources: https://pastebin.com/qLsuL1Qb 2024-07-0807 minBite Sized Cyber CrimeBite Sized Cyber CrimeLockBit Lies About Hacking US Federal ReserveAfter Lockbit was taken down in a multinational effort, they appear to still be a major threat after hacking the US Federal Reserve. Or did they? And why lie about such a major attack?   Sources: https://pastebin.com/y8aYFSZv 2024-07-0106 minBite Sized Cyber CrimeBite Sized Cyber CrimeUS Govt Bans Kaspersky AntivirusGeopolitical tensions are a major factor in cyber crime as our lives become more and more online, due to concerns about Kaspersky antivirus being based in Russia, the US government has banned sales of the product, any new business agreements with Kaspersky and US orgs, and has barred them from sending software updates to Kaspersky AV users. But why ban an antivirus product at all?   Sources: https://pastebin.com/DHzqYVhB 2024-06-2406 minBite Sized Cyber CrimeBite Sized Cyber CrimeCreeper and Reaper: The First Virus and AntivirusHave you ever wondered what the first malware ever was? It was more like an experiment rather than a malicious tool of destruction that malware has become today. Although Creeper didn't do much damage it's interesting to reflect on how far malware has come. Sources: https://pastebin.com/68f9yTu1 2024-06-1705 minBite Sized Cyber CrimeBite Sized Cyber CrimeMicrosoft Address Recall AI Security ConcernMicrosoft introduced an upcoming AI tool that is able to remember everything you did on your PC and fetch results if you need to go back in time and remember. However with this tool came a mountain of distrust and security concerns. These are the concerns and how Microsoft addressed them. Sources: https://pastebin.com/QGdtx4Np 2024-06-1007 minBite Sized Cyber CrimeBite Sized Cyber CrimeTicketmaster Breach Impacts Half a Billion UsersIf you go to concerts or live shows sometimes like I do you've likely used Ticketmaster, as it has a strangehold over the industry. The morning after I saw a concert I woke up, checked Twitter, and saw that Ticketmaster had a massive data breach. This is what happened. Sources https://pastebin.com/8dSztCJg 2024-06-0306 minBite Sized Cyber CrimeBite Sized Cyber CrimeThis Podcast is Not Sponsored by BetterHelpAfter COVID-19 hit, telehealth businesses started booming and BetterHelp became especially prominent via YouTube and podcast sponsorships. However BetterHelp has been criticized for their data sharing practices, and the gray area they are in when it comes to regulations. Sources: https://pastebin.com/8fxw3sQy 2024-05-2707 minBite Sized Cyber CrimeBite Sized Cyber Crime$25 Million in Ethereum Stolen from Trading BotsEthereum is a popular cryptocurrency, and some have started using bots to frontrun. Two brothers learned how they could exploit a vulnerability in these bots and make themselves $25 million richer. Sources: https://pastebin.com/xuQZ1ard 2024-05-2005 minBite Sized Cyber CrimeBite Sized Cyber CrimeDell Breach Exposed Data of 49 Million CustomersDell is a massive provider of technology for organizations and home users alike, and although on first glance their data breach seems not to contain sensitive data it has likely opened the floodgates for scams and phishing opportunities. Sources: https://pastebin.com/6jSYQM4P 2024-05-1307 minBite Sized Cyber CrimeBite Sized Cyber CrimeFake USPS Sites Get Almost the Same Traffic as the Real OneWith online shopping being so popular, getting delivery updates is not so uncommon, but this has led to the rise of a prolific scam that is much bigger than you may think. Sources: https://pastebin.com/mW6kWtWx 2024-05-0607 minBite Sized Cyber CrimeBite Sized Cyber CrimeCloudbleed and the Vitality of Cloud SecurityThe cloud is ever expanding and allowing people to easily scale up at rates previously impossible. However one thing that must be considered is that security becomes complicated. You have to really trust your cloud provider to hold up their end, and even trusted providers can have oversights. Sources: https://pastebin.com/2LJPjrVx 2024-04-2908 minBite Sized Cyber CrimeBite Sized Cyber CrimeThreat Actors Bribing Mobile Carriers into SIM SwappingMFA is becoming more and more common, but with every security innovation, threat actors figure out ways around them. Recently it came out that an unknown actor was bribing employees at T-Mobile and Verizon to perform SIM swapping attacks, which can compromise SMS based MFA codes.   Sources: https://pastebin.com/h47Mijdt 2024-04-2206 minBite Sized Cyber CrimeBite Sized Cyber CrimeStorm Worm: The Malware that Took Down Warnings of ItselfIn 2007 clickbait emails could make you part of a botnet that silenced cybersecurity professionals and performed attacks for anyone on the dark web willing to pay. Not a worm, but a Trojan, this is how the Storm Worm was ahead of its time. Sources: https://pastebin.com/nPbinx0i 2024-04-1507 minBite Sized Cyber CrimeBite Sized Cyber CrimePassword Stuffing: Why you Should Use Unique Passwords for Every SiteThere's a reason you should use a unique password for every website you use, but most people simply don't. How are you supposed to make and remember dozens of passwords for each site that are completely unique and can't be written down? What if I told you it doesn't have to be that difficult? 2024-04-0810 minBite Sized Cyber CrimeBite Sized Cyber CrimeXZ Utils Contains a Backdoor on Unstable Linux DistrosXZ Utils is an inconspicuous program in many Linux distributions that allows you to compress files. However, it seems one maintainer of the open source project had much more malicious plans.   Sources: https://pastebin.com/awZzM7qk 2024-04-0107 minBite Sized Cyber CrimeBite Sized Cyber CrimeNew DoS Method Traps UDP Protocols in a LoopDenial of Service attacks are annoying at best, and can endanger people at worst. Usually you need a lot of manpower to launch one, but a new method was developed recently that requires just one machine.   Sources: https://pastebin.com/NS7RuYSi 2024-03-2506 minBite Sized Cyber CrimeBite Sized Cyber CrimeALPHV Disbands after Hacking Change Healthcare?Change Healthcare is a major medical clearinghouse, nearly half of all insurance transactions go through them, so when ransomware struck the effect was felt all over the healthcare industry. However it gets stranger, as the group responsible seems to have scammed their affiliates and faked a takedown. Sources: https://pastebin.com/PRmnEGnL 2024-03-1806 minBite Sized Cyber CrimeBite Sized Cyber CrimeFake WiFi Network Allows for Stealing TeslasTesla is a tech company as much as it is a car company, which can present unique challenges when trying to incorporate security. Even intended features can end up being major vulnerabilities, like the feature to add a car key to a cell phone. Sources: https://pastebin.com/S7Sb2KCb 2024-03-1108 minBite Sized Cyber CrimeBite Sized Cyber CrimeIvanti ICT Failed to Catch Malware with Root PersistenceVPN gateways are supposed to securely connect you to an environment, however Ivanti gateways are rather exploitable, and their built in integrity checker may give you a false sense of security. Sources: https://pastebin.com/G7H6f4kL 2024-03-0406 minBite Sized Cyber CrimeBite Sized Cyber CrimeLockbit Taken Down, but Still a ThreatLockbit is one of the most notorious ransomware gangs out there, and recently a multinational operation arrested several people involved, stole back extorted cash, and released a decryptor for the ransomware. However, Lockbit isn't quite dead yet. Sources: https://pastebin.com/Y6rTab6R 2024-02-2607 minBite Sized Cyber CrimeBite Sized Cyber CrimeEFAIL: The Bug That Broke Email EncryptionEmail encryption is important for keeping confidential information safe, as well as communicating over unsecured networks, or in potentially hostile nations. One bug in 2017 was able to break this encryption though, exposing the plaintext content of encrypted emails.   Sources: https://pastebin.com/UZ2r4Pcq 2024-02-1908 minBite Sized Cyber CrimeBite Sized Cyber CrimeLurie Children's Hopsital Down for Weeks due to HackersOne of the best renowned children's hospitals, Lurie, in Chicago has been experiencing an outage for nearly two weeks, with parents feeling as they've been left in the dark. Recently it was revealed that a "known cyber threat" was responsible. Sources: https://pastebin.com/1CwAkQ7Q 2024-02-1207 minBite Sized Cyber CrimeBite Sized Cyber CrimeHacker Fakes and Tries to Sell Europcar DataData breaches are the worst nightmare of many organizations that collect sensitive data. Europcar was going to be the next company breached, except on closer inspection, none of the data posted was real. Sources: https://pastebin.com/wDwTunKb 2024-02-0506 minBite Sized Cyber CrimeBite Sized Cyber CrimePegasus: The Spyware Sold to GovernmentsThe fear that the government or someone else is spying on you is a common one, moreso with modern technology. In some cases, that fear is not unreasonable. Pegasus is spyware developed by Israeli cyber-arms company NSO Group, and it has been sold to many governments and fallen into the wrong hands. Sources: https://pastebin.com/9JHz3ZDU 2024-01-2907 minBite Sized Cyber CrimeBite Sized Cyber CrimeiShutDown: A New Method for Detecting iOS SpywareMobile devices are everywhere, carried with us everywhere we go in our day. This makes them perfect targets for Spyware. Recently a new method was discovered to uncover hidden Spyware on suspected infected phones. Sources: https://pastebin.com/5pYN9bnj 2024-01-2205 minBite Sized Cyber CrimeBite Sized Cyber CrimeRussian and Ukrainian Hackers Take Down Each Other’s ISPsRussia and Ukraine are at war, but these days war is not always boots on the ground. The internet and modern technology introduced a whole new way to attack enemies, and after Russia took down Ukraine's biggest telecoms provider a Ukrainian group decided to take revenge. Sources: https://pastebin.com/SwDJiy1r 2024-01-1506 minBite Sized Cyber CrimeBite Sized Cyber CrimeTerrapin Vulnerability Leaves Millions of SSH Servers VulnerableA new attack method against the SSH protocol, the very first of its kind, was recently discovered by German researchers. It leaves millions of servers at risk of attack, and it practical to exploit, but is it as bad as it sounds? Find out today!   Sources: https://pastebin.com/kTpwXexy 2024-01-0806 minBite Sized Cyber CrimeBite Sized Cyber CrimeGTA6 Hacker Sentenced to Secure HospitalRockstar Games recently released the trailer for GTA6, around the same time a Lapsus$ hacker was sentenced indefinitely to a secure hospital. This sentence has stirred up some controversy and misunderstanding that i will try to contextualize and clarify.   Sources: https://pastebin.com/dsSb7uDX 2024-01-0106 minBite Sized Cyber CrimeBite Sized Cyber CrimeALPHV Seized by FBI... But not for LongAfter infiltrating a prolific ransomware gang, the FBI seized their website and decrypted data for hundreds of companies for free! But instead of going out peacefully, ALPHV may be out with a vengeance. Sources: https://pastebin.com/VgL3MRii 2023-12-2507 minBite Sized Cyber CrimeBite Sized Cyber CrimeCybercrime as a Service Ring Shut Down and Sued by MicrosoftTypically the cybercrime gangs we see launch major ransomware attacks, holding even the biggest companies hostage. However, there are also groups that provide fake accounts and services to those attackers to make their attacks quicker and easier. One of them, Storm-1152 was shut down by Microsoft and Arkose labs. Listen all about it today! Sources: https://pastebin.com/BeJEAybk 2023-12-1807 minBite Sized Cyber CrimeBite Sized Cyber CrimeBluetooth Flaw Allows Hackers Remote Access to DevicesBluetooth is a wireless protocol we all know and love that has freed us from headphone wires getting caught on anything. But recently an old flaw in Bluetooth was discovered that allows hackers to trick your phone into thinking a Bluetooth keyboard is connected, allowing a lot of access.   Sources: https://pastebin.com/z9pZxPVd 2023-12-1105 minBite Sized Cyber CrimeBite Sized Cyber CrimeIranian Hacktivists Compromise PA Water FacilitySmart devices are making their ways into homes without people understanding how to properly secure them. This it self is dangerous, but smart devices also exist in critical infrastructure, and may be similarly poorly secured. A compromise of these systems could be deadly, it is fortunate this one was not. Sources: https://pastebin.com/r3YqNc7x 2023-12-0406 minBite Sized Cyber CrimeBite Sized Cyber CrimeThe Time I Bought a Keyboard with MalwareBuying electronics is something we may not give a second thought about, especially with companies like Amazon making it convenient. Buying used electronics to get a good deal is also not unusual for some. But sometimes you end up unlucky and have a keyboard that tries to steal your own password from under your fingertips. 2023-11-2707 minBite Sized Cyber CrimeBite Sized Cyber CrimeHackers Report Victim to the SECRansomware is already a major threat for many organizations without bringing regulators into it. The ALPHV ransomware group reported its own victims to the SEC for failure to disclose a data breach that they caused, sending a rather unusual warning for the future. Sources: https://pastebin.com/53izNKFg 2023-11-2005 minBite Sized Cyber CrimeBite Sized Cyber CrimePlastic Surgery Hack Leads to Sensitive Patient Photos Being LeakedPlastic surgery is already a taboo subject, so hackers targeted Hankins and Sohn with hopes that the leverage of personal medical information would lead to a major payout. The hackers did not get what they had hoped for, and moved on to extorting victims. When that ended up fruitless, sensitive images and information were posted online and sent to friends and neighbors. Sources: https://pastebin.com/5wHSuFhn 2023-11-1307 minBite Sized Cyber CrimeBite Sized Cyber CrimeSolarWinds Sued by SEC Over Major HackVictims of cyberattacks are sometimes sued by customers when there is a breach of personal data, but very few have the United States government as a customer and very few data breaches involve Russian espionage. SolarWinds allegedly misled customers about security practices, and may be paying a hefty price for it.   Sources: https://pastebin.com/E57vhzMx 2023-11-0607 minBite Sized Cyber CrimeBite Sized Cyber CrimeThe Morris Worm: The First Felony CybercrimeOne of the earliest examples of malware was an experiment that simply got way too out of control and ended up leading to the first conviction under the Computer Fraud and Abuse Act. This is the history of the Morris Worm.   Sources: https://pastebin.com/CE04Zqqu 2023-10-3005 minBite Sized Cyber CrimeBite Sized Cyber CrimeTrigona Ransomware Group Wiped by HacktivistsRansomware gangs are a major threat to all organizations big or small, and rarely do we see them lose due to the situations they put people in. Last week, however, a major emerging threat was satisfyingly stomped out by a hacktivist group.   Sources: https://pastebin.com/TtpWPZ8w 2023-10-2306 minBite Sized Cyber CrimeBite Sized Cyber CrimeHigh Rated Curl Vuln Not as Bad as Initially AssumedWhen developers of curl announced a cycle cut short to fix a high severity vulnerability, administrators panicked. Although still bad, the vulnerability ended up only executable under pretty specific circumstances.   Sources: https://pastebin.com/90uQ94Xd 2023-10-1606 minBite Sized Cyber CrimeBite Sized Cyber CrimeTo Pay or Not to Pay? MGM vs Caesar’s on RansomwareRansomware can be handled in two different ways: Paying, or not paying. It's controversial which option is best. Two casinos had a ransomware incident and once paid while the other did not, let's compare. Sources: https://pastebin.com/t5uRyMWb 2023-10-0908 minBite Sized Cyber CrimeBite Sized Cyber CrimeLibwebp Vulnerability Present Just About EverywhereWhat was thought to be a Chrome bug turned out to be a much larger and much more serious vulnerability in a library used to render webp images that could allow code to be remotely executed on target systems.   Sources: https://pastebin.com/wD1tNxYH 2023-10-0205 minBite Sized Cyber CrimeBite Sized Cyber CrimeNew Stealthy Sandman Hackers Target Telco CompaniesHackers are constantly innovating and trying new things to break into systems, last week a new attacker was discovered that is writing malware in a rarely seen programming language using an even stranger compiler. Sources: https://pastebin.com/XNFmxJmS 2023-09-2507 minBite Sized Cyber CrimeBite Sized Cyber CrimeHack Makes MGM do Manual Payouts and Check-insThe MGM hack has been all over the news, but how did hackers compromise gambling machines, room keys, and even parking gates? It may have taken just one call. Sources: https://pastebin.com/AegCRD3z 2023-09-1808 minBite Sized Cyber CrimeBite Sized Cyber CrimeMicrosoft’s Series of Mistakes that Led to Cyber EspionageYou may have heard of a government email compromise suspected to be from China-based threat actors, but this week a series of unfortunate events revealed exactly how this attack unfolded. Sources: https://pastebin.com/Bxn7iQ5W 2023-09-1106 minBite Sized Cyber CrimeBite Sized Cyber CrimeForever 21 Breach Involves Employee SSNsForever 21 is a popular clothing brand for young adults, but recently it was also a popular target for a hacking group that infiltrated at least twice and stole sensitive data on employees.   Sources: https://pastebin.com/W8C2R3hF 2023-09-0405 minBite Sized Cyber CrimeBite Sized Cyber CrimeCanva’s 2019 Password Data BreachCanva is a graphic design app that makes it easy to make your own logos, including my podcast logo! However, they've also been the topic of a large data breach in 2019. Here's what happened.   Sources: https://pastebin.com/XFNEqE7B 2023-08-2806 minBite Sized Cyber CrimeBite Sized Cyber CrimeLinkedIn Accounts Hijacked in Password Attack CampaignLinkedIn is a professional networking and job hunting website used by professionals in all fields, with verification including corporate email information it's hard to impersonate people in a way that is realistic. That is why hacking existing accounts has become so lucrative, and a huge campaign in going on involving just that. Sources: https://pastebin.com/eYeahiEX 2023-08-2105 min