

The Dangers of Googling Phone Numbers, an Attack on a Security Platform, and Typo Squatting on US Military Domains
Jul 20, 2023
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36
Introduction
00:00 • 2min
The Importance of Interviewing Criminals
01:45 • 3min
The Importance of Being a Cynic
04:23 • 3min
Hacker and the Fed: The Official Website
07:19 • 2min
The Anti-Finniest Movement
09:04 • 2min
Delta Fake Contact Number on Google Maps
10:35 • 2min
Google Maps and Google Ads: A Coordinated Attack
12:13 • 3min
Google's Approach to Address Verification
15:02 • 2min
How to Change Telephone Numbers in a Business
17:01 • 2min
The Problem With Missing a Phone Number on Delta's Website
19:30 • 2min
JumpCloud Discloses Breach of State-Backed APT Hacking Group
21:16 • 2min
The APT Group's Targeted Attack
23:07 • 2min
JumpCloud Released IOCs to Protect Your Framework From Similar Attacks
25:30 • 3min
JumpCloud Releases IOCs
28:28 • 2min
The Difference Between a Security Conference and a Hacker Conference
30:03 • 2min
Delete Me: A Great Company to Work With
31:50 • 3min
Drada: G2's Highest Rated Cloud Compliance Software
34:21 • 2min
The Scary Things That Could Have Happened
35:57 • 3min
Breaking Into Foreign Governments on IRC
39:00 • 2min
How to Avoid Malvertizing Campaigns
41:03 • 2min
The Disassembled Features of Big Head Ransomware
43:27 • 2min
How to Stop a Ransomware Attack
45:08 • 2min
The History of Malware
46:41 • 3min
The Dark Web and the Norton Health Care Cyber Attack for Ransom
49:32 • 1min
The Norton Health Care Hack on the Dark Web
51:02 • 2min
The Risks of a Credit Freeze
53:01 • 3min
The Importance of Protecting Your Personal Information
56:27 • 2min
How to Stole Your Own PHI Information
58:19 • 2min
The Scary Case of Law Firms Being Hacked
01:00:29 • 3min
The LSU Cyber Security Clinic
01:03:17 • 2min
The Future of Cybersecurity
01:04:57 • 3min
Hacking Methodology
01:07:42 • 3min
How to Audit Web Servers in Puerto Rico
01:10:13 • 2min
How to Identify Potential Attack Labs in a Web Server
01:12:19 • 4min
How to Read an Encrypted Password File
01:16:45 • 2min
How to Identify and Defase Potential Issues
01:18:42 • 4min