podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
Mohammed Sarker
Shows
Cyber94
Major Japanese Company Falls Victim to Devastating Ransomware Attack Affecting 700000 Customer Records
The Attack Japanese e-commerce giant Askul became the latest victim of a sophisticated ransomware attack that compromised over 700,000 customer and business partner records. The attack was carried out by the notorious Ransom House cybercriminal group in October 2024, causing massive operational disruptions that lasted for months. Double Extortion Tactics This incident showcases the evolving threat landscape where cybercriminals employ double extortion methods. Rather than simply encrypting files and demanding payment, the attackers first spent time quietly stealing over 1 terabyte of sensitive data before launching their encryption attack. This calculated approach leaves victims facing two devastating threats: pay the ransom to...
2025-12-18
04 min
Cyber94
Cyber Criminals Are Using AI to Steal Billions in Cargo Through Digital Deception
The New Face of Cargo TheftTraditional highway robbery is dead. In its place, a sophisticated new breed of cybercriminals is using artificial intelligence, deepfake technology, and social engineering to steal billions of dollars in freight without ever touching a truck. This podcast examines the alarming rise of cyber-enabled cargo theft and its devastating impact on the transportation industry.Staggering StatisticsThe numbers tell a shocking story. Over 700 cargo thefts occurred in just one quarter of 2025 across the US and Canada, with stolen goods valued at more than $111 million. Annually, these crimes cost the American economy up to $35 billion, representing a...
2025-12-17
04 min
Cyber94
Notorious Russian Hackers Return with Fundamentally Broken Ransomware That Anyone Can Defeat
The StoryCyberVolk, a pro-Russian hacktivist collective that disappeared for most of 2025, has made their comeback with an updated ransomware-as-a-service operation. Operating entirely through Telegram, they're offering their malicious tools to aspiring cybercriminals in what appears to be a sophisticated franchise model for digital extortion.The Critical FlawHowever, their new weapon called VolkLocker contains a devastating security blunder that renders it completely harmless. Cybersecurity researchers discovered that the encryption key needed to unlock victim files is hardcoded directly into the ransomware itself. This means anyone infected can recover their data for free...
2025-12-17
04 min
Cyber94
Cybersecurity Nightmare When 4.3 B Cybersecurity Nightmare When 4.3 Billion LinkedIn Profiles Were Left Wide Open
In November 2024, security researchers discovered one of the most terrifying data breaches in history. A massive 16.14 terabyte database containing 4.3 billion records was left completely unprotected on the internet, exposing detailed LinkedIn profiles and personal information of professionals worldwide. This cybersecurity nightmare reveals how easily our digital identities can become weapons against us.What Was ExposedThe leaked database contained a staggering amount of personal and professional information including full names, email addresses, phone numbers, employment histories, educational backgrounds, skills, location data, and even photographs. With over 732 million records containing profile photos and detailed...
2025-12-12
05 min
Cyber94
Banking Apps Under Attack How Hackers Turn Trusted Financial Tools Into Phone Hijacking Weapons
The Growing Threat of Banking MalwareA sophisticated new cybercrime campaign is targeting smartphone users by weaponizing the very apps they trust most. Security researchers have uncovered a dangerous operation where hackers take legitimate banking applications, inject malicious code, and redistribute them to unsuspecting victims.How the Attack WorksThe cybercriminal group known as GoldFactory has developed an alarming technique that goes far beyond typical phishing scams. Instead of creating obvious fake apps, they decompile real banking applications from legitimate financial institutions, embed their own malicious code, and repackage them to look identical...
2025-12-12
04 min
Cyber94
The Jaguar Land Rover Digital Siege That Brought Britain to Its Knees
The Cybersecurity Nightmare That Changed EverythingIn August 2025, what began as a quiet infiltration became the most devastating cyberattack in British history. Join Ben and Chloe as they unravel the chilling story of how sophisticated cybercriminals brought one of Britain's automotive giants to a complete standstill, triggering economic shockwaves that reached the highest levels of government.The Attack That Started It AllOn August 31st, 2025, digital intruders breached Jaguar Land Rover's systems. Within hours, the unthinkable happened. Production lines fell silent. Assembly workers were sent home indefinitely. What seemed like a temporary disruption...
2025-12-11
09 min
Cyber94
Holiday Scammers Are Using AI Voice Cloning to Steal Your Money This Season
The New Face of Holiday FraudThis holiday season brings unprecedented threats as cybercriminals weaponize artificial intelligence to create more convincing and dangerous scams than ever before. Join Ben and Chloe as they break down the alarming rise of AI-powered fraud targeting holiday shoppers and reveal the sophisticated tactics criminals are using to exploit our busiest spending season.What Makes These Scams So DangerousDiscover how scammers can now clone voices from just seconds of social media audio to impersonate your loved ones in emergency calls. Learn about the psychology behind these attacks...
2025-12-11
04 min
Cyber94
Cybercriminals Have Shifted From Espionage to Pure Financial Terrorism and the Results Are Devastating
The Digital Crime Wave That's Targeting Your CommunityIn this eye-opening episode, cybersecurity experts Ben and Chloe dive deep into the Microsoft Digital Defense Report's most alarming findings. The landscape of cyber threats has fundamentally changed, and the implications are terrifying for individuals, businesses, and entire communities.From Spies to Digital MobstersGone are the days when cyberattacks were primarily about stealing government secrets. Today's reality is far more sinister. Over 52% of all cyberattacks are now driven by pure financial gain through extortion and ransomware, while traditional espionage has dropped to just 4%. Cybercriminals...
2025-12-10
05 min
Cyber94
Microsoft Outlook Critical Security Flaw Puts Millions at Risk
Breaking Security AlertA critical remote code execution vulnerability has been discovered in Microsoft Outlook that could allow attackers to take complete control of your computer. This episode breaks down everything you need to know about CVE-2025-62562, a high-severity flaw that affects millions of users worldwide.What You'll LearnJoin Ben and Chloe as they discuss the technical details of this dangerous vulnerability in easy-to-understand terms. They explain how attackers can exploit a memory management weakness called "use-after-free" by sending specially crafted emails or attachments that execute malicious code when opened.
2025-12-10
03 min
Cyber94
AI Cybercrime Nightmare How Artificial Intelligence is Supercharging Digital Attacks and Rewriting the Rules of Crime
The Future of Crime is HereArtificial intelligence isn't just revolutionizing technology—it's transforming cybercrime into something far more dangerous than we've ever seen. This podcast explores the terrifying reality of AI-supercharged attacks that are happening right now, using real-world examples from Seattle's devastating ransomware incidents as a launching point into a much darker digital landscape.What We CoverJoin Ben and Chloe as they dissect how AI is fundamentally changing the cybercrime playbook. From the Rhysida ransomware attack that crippled Seattle's Port and exposed 90,000 people's personal data, to the Seattle Public Library's th...
2025-12-09
04 min
Cyber94
Tri-Century Eye Care Ransomware Attack Exposes 200,000 Patient Records in Major Healthcare Breach
The IncidentJoin Ben and Chloe as they dive deep into the alarming data breach at Tri-Century Eye Care, where the Pear ransomware group successfully infiltrated systems and compromised sensitive information belonging to approximately 200,000 patients and employees. This comprehensive analysis breaks down one of the most significant healthcare cybersecurity incidents of 2024.What Was CompromisedThe breach exposed a treasure trove of highly sensitive personal information including full names, dates of birth, Social Security numbers, comprehensive medical records, treatment histories, diagnostic information, health insurance details, payment information, and financial data. The attackers claimed to...
2025-12-09
03 min
Cyber94
United Health Cyber Nightmare Exposes 100 Million Americans in Largest Healthcare Data Breach
The Largest Healthcare Data Breach in HistoryIn February 2024, a catastrophic ransomware attack on Change Healthcare exposed the private medical and financial data of over 100 million Americans, making it the largest healthcare data breach ever recorded. This cybersecurity nightmare affected nearly one in three Americans and sent shockwaves through the entire healthcare system.What Was StolenThe stolen information represents a complete digital identity theft on an unprecedented scale. Criminals obtained Social Security numbers, driver's licenses, passport numbers, health insurance details, complete medical histories including diagnoses and medications, test results, treatment records, and...
2025-12-08
04 min
Cyber94
React2Shell Critical Vulnerability Threatens Millions of Web Applications Worldwide
Breaking Cybersecurity AlertA devastating security flaw has been discovered in React Server Components, earning the highest possible severity rating of 10.0 and prompting immediate action from federal cybersecurity agencies. This critical vulnerability, dubbed React2Shell, affects millions of web applications and is already being actively exploited by sophisticated threat actors.What Makes This Vulnerability So DangerousReact2Shell represents a perfect storm of cybersecurity risks. The flaw allows completely unauthenticated attackers to execute arbitrary code on vulnerable servers through a technique called insecure deserialization. Think of it as a digital Trojan horse where...
2025-12-08
04 min
Cyber94
Brick storm The Chinese Cyber Nightmare That Haunted America for Eighteen Months
The Silent InvasionIn April 2024, Chinese-linked hackers quietly infiltrated a major company's network using sophisticated malware called Brickstorm. What makes this cyber attack truly terrifying is not just what they stole, but how long they remained completely undetected. For eighteen months, these digital intruders lived silently within critical infrastructure systems, mapping every vulnerability and positioning themselves for potential nationwide sabotage.Beyond Traditional EspionageThis isn't your typical data breach story. Join cybersecurity experts Ben and Chloe as they unpack the chilling details of how state-backed hackers have evolved from simple espionage to preparing...
2025-12-05
03 min
Cyber94
Russian Hackers Target NATO Research Sectors Using Advanced ClickFix Social Engineering Tactics
The ThreatRussian state-sponsored hackers from the Calisto group, also known as ColdRiver or Star Blizzard, have launched sophisticated cyber-espionage campaigns targeting NATO research sectors and international organizations. This podcast explores their latest attack methods and the serious implications for global security.Who's Behind the AttacksWestern intelligence agencies attribute Calisto directly to Russia's Federal Security Service FSB Center 18 for Information Security. Active since 2017, this group specializes in credential theft and intelligence gathering from entities supporting Ukraine, with operations that align closely with Russian strategic priorities.The ClickFix Technique Explained
2025-12-05
04 min
Cyber94
North Korea Executes the Largest Cryptocurrency Heist in History Through TraderTraitor Operation
The Digital Heist That Shook the WorldIn February 2025, the FBI confirmed what cybersecurity experts feared most: North Korea had successfully executed the largest cryptocurrency theft in history. The TraderTraitor operation netted $1.5 billion from the ByBit exchange, surpassing even Saddam Hussein's infamous $1 billion bank robbery before the 2003 Iraq War.Inside the TraderTraitor OperationThis podcast takes you deep into the mechanics of how state-sponsored North Korean hackers, operating under the notorious Lazarus Group, gained control of an ether wallet on the ByBit platform and systematically drained it of its contents. The sophisticated attack...
2025-12-04
05 min
Cyber94
Asus Confirms Major Ransomware Attack Hits Camera Technology Supply Chain
Breaking Cybersecurity NewsTaiwanese electronics giant Asus has confirmed a significant ransomware attack targeting their mobile phone camera technology supply chain. The breach, carried out by the Russian-linked Everest ransomware group, has compromised over one terabyte of sensitive data including image-processing source code and AI camera testing information.What HappenedThe attack specifically targeted one of Asus's suppliers rather than the company directly, affecting the image-processing source code for mobile phone cameras. Everest, a notorious ransomware gang, set a strict deadline demanding Asus respond to their blackmail demands by 11 PM Wednesday via the...
2025-12-04
04 min
Cyber94
Cybersecurity Nightmare: The Kering Luxury Brand Hack That Exposed Millions
The Breach That Shook Luxury FashionIn this gripping cybersecurity thriller, hosts Ben and Chloe uncover the shocking details of one of the most significant data breaches in luxury retail history. When hackers infiltrated Kering, the parent company behind Gucci, Balenciaga, and Alexander McQueen, they didn't just steal data they exposed the dark vulnerabilities of high-end consumer protection.What Was StolenThe notorious hacking group ShinyHunters made off with potentially millions of customer records, including full names, phone numbers, email addresses, and most disturbingly, detailed spending patterns. One leaked record showed a single...
2025-12-03
04 min
Cyber94
Major Universities Hit in Massive Oracle Cyberattack Campaign
Breaking Cybersecurity NewsThe University of Pennsylvania and University of Phoenix have joined a growing list of victims in one of the most significant cyberattacks of 2024. This podcast episode breaks down the Oracle E-Business Suite breach that has compromised over 100 organizations worldwide, including prestigious academic institutions and major corporations.What HappenedCybercriminals exploited zero-day vulnerabilities in Oracle's widely-used E-Business Suite software to infiltrate the core financial systems of universities and businesses. The attackers gained access to highly sensitive information including Social Security numbers, bank account details, birth dates, and personal contact information of...
2025-12-03
03 min
Cyber94
Cybersecurity Nightmare Stories The Big Five Attacks of 2025
The Digital Apocalypse is HereWelcome to the dark side of our hyperconnected world, where a few malicious keystrokes can bring entire nations to their knees. This gripping podcast episode takes you inside the five most devastating cyberattacks of 2025, revealing how digital criminals turned our greatest technological achievements into weapons of mass disruption.What You'll DiscoverJoin hosts Ben and Chloe as they unpack the chilling details of attacks that didn't just steal data but fundamentally changed how we think about digital security. From empty grocery store shelves to compromised government communications, these...
2025-12-02
06 min
Cyber94
ShadyPanda Malware Campaign Exposes Seven Year Browser Extension Attack on 4.3 Million Users
Major Cybersecurity Breach RevealedA sophisticated threat group called ShadyPanda has successfully compromised 4.3 million Chrome and Edge browser users through a methodical seven-year campaign targeting popular browser extensions. This attack represents one of the most patient and evolved approaches to browser-based cybercrime ever documented.How the Attack WorkedThe cybercriminals didn't rely on obvious scams or sketchy downloads. Instead, they weaponized legitimate applications that gained verified status from both Google and Microsoft. Popular extensions like Clean Master and WeTab New Tab Page operated normally for years, collecting genuine user reviews and building massive...
2025-12-02
04 min
Cyber94
Cybersecurity Nightmare Stories 2025s Biggest Breaches So Far
The Year Cybersecurity Became a Living NightmareWelcome to a chilling exploration of 2025's most devastating cyber attacks that have already shaken the digital world to its core. This podcast takes you inside the war rooms where hackers orchestrated some of the largest data breaches in history, affecting millions of lives and reshaping our understanding of digital vulnerability.What You'll DiscoverJoin hosts Ben and Chloe as they dissect five catastrophic cyber incidents that prove no sector is safe from digital predators. From grocery store shelves sitting empty across North America to government...
2025-12-01
06 min
Cyber94
December Threat Intelligence Report Breakdown
Join cybersecurity experts Ben and Chloe as they break down the latest cyber threats, data breaches, and security vulnerabilities affecting organizations worldwide. This week's episode dives deep into the most critical security incidents and emerging threats that every technology professional needs to know about.Major Data Breaches and AttacksThis episode covers several high-profile security incidents that made headlines this week. The hosts discuss the OpenAI data breach involving third-party analytics provider Mixpanel, which exposed API client metadata but fortunately left sensitive credentials untouched. They also examine the devastating Cl0p ransomware attack on Dartmouth...
2025-12-01
09 min
Cyber94
NotPetya The Cybersecurity Nightmare That Brought Down the World Podcast
The Day the World Stood StillOn June 27th, 2017, a devastating cyberattack swept across the globe in less than 24 hours, causing over $10 billion in damages and bringing multinational corporations to their knees. This is the story of NotPetya, one of the most destructive cyber incidents in history.What HappenedJoin cybersecurity experts Ben and Chloe as they unpack the terrifying details of how NotPetya masqueraded as ransomware but was actually a digital weapon of mass destruction. Unlike typical ransomware, NotPetya was designed not to make money, but to obliterate data permanently. Once it...
2025-11-30
07 min
Cyber94
Holiday Shopping Just Got Scarier as Hackers Deploy 18000 Fake Websites to Target Your Black Friday Deals
The Holiday Shopping Threat You Need to Know AboutAs millions of shoppers gear up for Black Friday and the holiday season, cybercriminals are launching their most sophisticated attack campaign ever. This episode reveals shocking new research from FortiGuard Labs exposing an unprecedented surge in malicious activity targeting online shoppers and e-commerce platforms.Staggering Numbers Behind the AttacksIn just three months, attackers have created over 18,000 fake holiday-themed websites using terms like Christmas, Black Friday, and Flash Sale. Another 19,000 domains were designed to impersonate major retail brands, with nearly 3,000 confirmed to be hosting...
2025-11-30
07 min
Cyber94
Cyber Nightmare The LG Battery Heist
The Attack That Shook Global EnergyWhen one of the world's largest battery manufacturers falls victim to ransomware, the ripple effects extend far beyond corporate boardrooms. This episode explores the devastating cyberattack on LG Energy Solution by the notorious Akira ransomware gang, revealing how modern cybercriminals are targeting the backbone of our electric future.What HappenedIn a sophisticated digital heist, the Akira ransomware group infiltrated LG Energy Solution's overseas facility, stealing an unprecedented 1.7 terabytes of sensitive data. The stolen information includes corporate documents, employee databases containing personal details like addresses and banking...
2025-11-28
04 min
Cyber94
Major Financial Giants at Risk After SitusAMC Data Breach Exposes Critical Supply Chain Vulnerabilities
The Hidden Threat Behind Banking's Biggest NamesWhen hackers target major financial institutions like JPMorgan Chase, Morgan Stanley, and Citigroup, they don't always attack the banks directly. Sometimes they find a more vulnerable backdoor through trusted third-party vendors. Join Ben and Chloe as they unpack the SitusAMC data breach that has potentially exposed sensitive data from some of the biggest names in finance.What HappenedSitusAMC, a behind-the-scenes technology and consulting firm that provides critical services to major banks and mortgage lenders, suffered a significant data breach. The company handles the entire lifecycle...
2025-11-28
03 min
Cyber94
Healthcare Cyber Nightmares The 2025 Data Breach Crisis That Exposed 29 Million Lives
The Digital Healthcare ApocalypseIn the first half of 2025 alone, over 29 million Americans had their most private healthcare information stolen by cybercriminals. This isn't just another tech story about leaked passwords or email addresses. This is about the complete exposure of your medical secrets, Social Security numbers, diagnoses, and treatment records falling into the hands of sophisticated criminal organizations.Inside the Largest Healthcare Breaches in HistoryJoin Ben and Chloe as they dissect the terrifying reality of modern healthcare cybersecurity. From Yale New Haven Health System's 5.5 million patient records compromised to Episource's ransomware...
2025-11-27
06 min
Cyber94
Cox Enterprises Hit by Massive Oracle Data Breach Exposing Thousands of Personal Records
The Story Cox Enterprises, one of America's largest conglomerates, has become the latest victim in a devastating cyber attack that exposed personal data of nearly 9,500 individuals. The breach occurred through a zero-day vulnerability in Oracle's E-Business Suite, highlighting the growing threat of supply-chain attacks in our interconnected digital world.What Happened The attack took place in August but wasn't discovered until late September, giving cybercriminals weeks of undetected access to sensitive systems. While Cox refuses to publicly name the attackers, cybersecurity experts have identified the notorious Cl0p ransomware group as the perpetrators, who have already published st...
2025-11-27
03 min
Cyber94
Cyber Story: Wall Street's Biggest Nightmare How One Vendor Hack Exposed Every Major Bank Podcast
The Silent Heist That Shook Wall StreetIn November 2024, the unthinkable happened. JPMorgan Chase, Citi, Morgan Stanley, and dozens of other major banks found themselves scrambling not because their own systems were breached, but because hackers had found a side door through a company most people had never heard of.What HappenedOn November 12th, cybercriminals executed a sophisticated supply chain attack against SitusAMC, a critical technology vendor that processes real estate loans for thousands of financial institutions. Unlike flashy ransomware attacks, this was a silent, stealthy heist that went undetected...
2025-11-26
05 min
Cyber94
2025 Data Breach Recap: What Broke, Who Was Hit, and How to Fight Back Podcast
The Year Cybersecurity Changed Forever2025 marked a devastating turning point in cybersecurity, with attackers scaling their operations like never before. This podcast breaks down the most significant data breaches and cyberattacks that defined the year, revealing how criminals evolved from perfecting social engineering to building industrial-scale attack operations.Major Breaches That Shook IndustriesHealthcare bore the heaviest losses, with the Change Healthcare mega-breach affecting 192.7 million individuals in the largest single healthcare data breach in U.S. history. The financial sector learned painful lessons about third-party vulnerabilities when Allianz Life Insurance saw...
2025-11-26
05 min
Cyber94
The Bybit Heist - North Korea's $1.5 Billion Cryptocurrency Nightmare
The Crime of the CenturyOn February 21, 2025, what appeared to be a routine cryptocurrency transfer turned into the largest digital heist in history. North Korean hackers executed a flawless supply chain attack, stealing $1.5 billion worth of Ethereum from Bybit, one of the world's leading crypto exchanges. This isn't just a story about stolen money – it's a chilling tale of state-sponsored cybercrime that threatens global security.How They Did ItJoin cybersecurity experts Ben and Chloe as they unpack the terrifying sophistication behind this attack. The hackers didn't break down digital doors – they manipulated the...
2025-11-25
07 min
Cyber94
JackFix Malware Uses Fake Windows Updates and Adult Site Clones to Deploy Eight Different Stealers Simultaneously
The New Threat LandscapeCybersecurity experts Ben and Chloe break down the sophisticated JackFix malware campaign that's revolutionizing how attackers compromise systems. This emerging threat combines fake adult websites with convincing Windows update screens to trick users into infecting their own computers.How the Attack WorksThe JackFix campaign starts by redirecting users to cloned adult websites through malvertising. Once on these fake sites, victims are suddenly presented with a full-screen, highly convincing Windows security update that hijacks their entire browser. The fake update screen mimics the infamous blue screen appearance and creates...
2025-11-25
06 min
Cyber94
Cybersecurity Nightmare as Akira Ransomware Expands to Target Nutanix Virtual Infrastructure Podcast
The Latest Cyber Threat EvolutionJoin cybersecurity experts Ben and Chloe as they break down the terrifying expansion of the Akira ransomware operation, which has now set its sights on Nutanix AHV virtual machine environments for the first time. This marks a dangerous evolution in ransomware tactics that puts entire enterprise infrastructures at risk.What Makes This Attack So DevastatingDiscover how Akira criminals have perfected a chilling attack chain that begins with exploiting critical SonicWall firewall vulnerabilities and culminates in the complete encryption of virtualized infrastructure. Learn why targeting hypervisors represents a...
2025-11-24
03 min
Cyber94
CISA Issues Emergency Warning as Government Agencies Fail to Properly Patch Critical Cisco Vulnerabilities Podcast
Critical Cybersecurity Alert DiscussionJoin Ben and Chloe as they dive deep into a developing cybersecurity crisis that has federal agencies scrambling. The US Cybersecurity and Infrastructure Security Agency has issued an unprecedented emergency warning about two actively exploited Cisco firewall vulnerabilities that continue to threaten government networks nationwide.What Went WrongIn this episode, we explore how federal agencies thought they had successfully patched critical security flaws in their Cisco firewall systems, only to discover they remained completely vulnerable to cyberattacks. The hosts break down the shocking revelation that organizations...
2025-11-24
03 min
Cyber94
Cyber Story - The 2020 SolarWinds Nightmare When Hackers Owned America Podcast
The Greatest Cyber Espionage Attack in US HistoryJoin Ben and Chloe as they uncover the chilling details of the 2020 SolarWinds breach, a sophisticated Russian cyber attack that penetrated the highest levels of the US government for nine months undetected. This isn't just another cybersecurity story - it's a digital nightmare that exposed the vulnerability of America's most secure networks.What HappenedIn March 2020, Russian state-sponsored hackers executed the perfect supply chain attack. Instead of targeting thousands of organizations individually, they compromised a single company - SolarWinds, a Texas-based software provider trusted by...
2025-11-24
07 min
Cyber94
Massive Supply Chain Hack Exposes Data from 200 Companies Through Single Security Breach Podcast
The Breach That Shook TechGoogle confirms that hackers have stolen Salesforce data from over 200 companies in a devastating supply chain attack. This podcast breaks down one of the most significant cybersecurity incidents of the year, where criminals exploited a single point of failure to access hundreds of organizations simultaneously.How It HappenedThe attack centered on Gainsight, a customer support platform that connects to other business systems. Instead of targeting each company individually, hackers found the master key that unlocked access to all of Gainsight's customers. The breach reveals how interconnected our...
2025-11-23
04 min
Cyber94
Five Americans Plead Guilty to Helping North Korean IT Workers Infiltrate US Companies in Massive Fraud Scheme
The Crime Five individuals have pleaded guilty to orchestrating a sophisticated fraud scheme that enabled North Korean IT workers to infiltrate over 130 American companies using stolen identities. This elaborate operation involved creating fake American personas, setting up laptop farms in US homes, and even having accomplices appear for drug tests on behalf of overseas workers.How It Worked The scheme operated through a network of facilitators who allowed North Korean operatives to use their US identities to secure high-paying remote IT positions. Once hired, company-issued laptops were shipped to American addresses where accomplices installed remote desktop software, en...
2025-11-19
04 min
Cyber94
Salt Typhoon The Worst Telecommunications Hack in American History
The Cybersecurity Nightmare That Changed EverythingWhen the head of the Senate Intelligence Committee calls a cyberattack the worst telecommunications hack in American history, you know we're dealing with something unprecedented. Salt Typhoon, a sophisticated Chinese hacking operation, didn't just breach our networks—they colonized the very backbone of America's communications infrastructure.What Makes This Attack DifferentUnlike typical data breaches that grab headlines for a week, Salt Typhoon represents a fundamental shift in cyber warfare. Since 2022, these digital ghosts have maintained persistent access to major telecommunications companies including AT&T, Verizon, and Lu...
2025-11-19
04 min
Cyber94
Story - Colonial Pipeline Ransomware Attack How One Password Nearly Crippled America's Fuel Supply
The Cybersecurity Nightmare That Brought America to Its KneesIn May 2021, a single compromised password triggered one of the most devastating cyberattacks in U.S. history. The Colonial Pipeline ransomware attack didn't just affect a company's computers – it brought the entire East Coast fuel supply to a grinding halt, creating nationwide panic and forcing a presidential emergency declaration.What You'll DiscoverThis gripping podcast reveals how the DarkSide ransomware group infiltrated America's largest fuel pipeline system through a forgotten VPN account lacking basic security protections. You'll learn how hackers stole 100 gigabytes of sensitive da...
2025-11-18
06 min
Cyber94
Inside a Wild Bitcoin Heist Five Star Hotels Cash Stuffed Envelopes and Vanishing Funds
The SetupImagine being on the verge of landing a four million dollar deal that could completely transform your company. You're flying to Amsterdam, dining in five star hotels, meeting with representatives of a wealthy Monaco family who seem to have money to burn. Designer suits, Rolex watches, stories about wild parties in Marrakech. Everything seems legitimate until you realize the whole thing is an elaborate setup to steal over two hundred thousand dollars from you in the blink of an eye.A Sophisticated ScamThis is the true story of Kent Halliburton...
2025-11-18
04 min
Cyber94
DoorDash Suffers Another Major Data Breach as Social Engineering Attacks Target Food Delivery Giant
The Latest Security CrisisDoorDash has disclosed yet another significant data breach, marking the third major security incident for the food delivery platform. This October 2025 attack exposed sensitive customer information including names, email addresses, phone numbers, and delivery addresses through a sophisticated social engineering scheme that bypassed traditional cybersecurity defenses.How the Attack UnfoldedThe breach began when cybercriminals impersonated a trusted business partner and successfully deceived a DoorDash employee into providing access credentials to internal systems. This human-focused attack method demonstrates how even well-protected companies remain vulnerable when hackers target employees rather...
2025-11-16
03 min
Cyber94
How China Used Artificial Intelligence to Direct the First Fully Automated Cyber Attack Campaign
Breaking News in CybersecurityIn this critical episode of the Cyber94 podcast, our hosts dive deep into a groundbreaking cybersecurity revelation that marks a new era in digital warfare. Anthropic, the AI company behind Claude, has reported the first documented case of artificial intelligence being used to direct and orchestrate hacking campaigns in a largely automated fashion.What HappenedChinese government-linked hackers successfully weaponized AI technology to conduct sophisticated cyberattacks against approximately thirty global targets, including tech companies, financial institutions, chemical companies, and government agencies. This represents a fundamental shift...
2025-11-16
03 min
Cyber94
Chrome Extension Security Alert Fake Safery Wallet Steals Crypto Using Blockchain
In this critical episode of Cyber94, hosts Puck and Kore expose a sophisticated cryptocurrency theft scheme currently active on the Chrome Web Store. A malicious extension called Safery Ethereum Wallet is stealing users seed phrases using an ingenious technique that weaponizes blockchain transparency itself.What This Episode CoversThe fake Safery extension infiltrated Google official Chrome Web Store and why traditional security measures failed to detect it. We break down the revolutionary attack method that uses blockchain transactions to hide stolen data in plain sight, completely eliminating the need for suspicious command...
2025-11-16
05 min