Hacker And The Fed

The Dangers of Googling Phone Numbers, an Attack on a Security Platform, and Typo Squatting on US Military Domains

Jul 20, 2023
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 2min
2
The Importance of Interviewing Criminals
01:45 • 3min
3
The Importance of Being a Cynic
04:23 • 3min
4
Hacker and the Fed: The Official Website
07:19 • 2min
5
The Anti-Finniest Movement
09:04 • 2min
6
Delta Fake Contact Number on Google Maps
10:35 • 2min
7
Google Maps and Google Ads: A Coordinated Attack
12:13 • 3min
8
Google's Approach to Address Verification
15:02 • 2min
9
How to Change Telephone Numbers in a Business
17:01 • 2min
10
The Problem With Missing a Phone Number on Delta's Website
19:30 • 2min
11
JumpCloud Discloses Breach of State-Backed APT Hacking Group
21:16 • 2min
12
The APT Group's Targeted Attack
23:07 • 2min
13
JumpCloud Released IOCs to Protect Your Framework From Similar Attacks
25:30 • 3min
14
JumpCloud Releases IOCs
28:28 • 2min
15
The Difference Between a Security Conference and a Hacker Conference
30:03 • 2min
16
Delete Me: A Great Company to Work With
31:50 • 3min
17
Drada: G2's Highest Rated Cloud Compliance Software
34:21 • 2min
18
The Scary Things That Could Have Happened
35:57 • 3min
19
Breaking Into Foreign Governments on IRC
39:00 • 2min
20
How to Avoid Malvertizing Campaigns
41:03 • 2min
21
The Disassembled Features of Big Head Ransomware
43:27 • 2min
22
How to Stop a Ransomware Attack
45:08 • 2min
23
The History of Malware
46:41 • 3min
24
The Dark Web and the Norton Health Care Cyber Attack for Ransom
49:32 • 1min
25
The Norton Health Care Hack on the Dark Web
51:02 • 2min
26
The Risks of a Credit Freeze
53:01 • 3min
27
The Importance of Protecting Your Personal Information
56:27 • 2min
28
How to Stole Your Own PHI Information
58:19 • 2min
29
The Scary Case of Law Firms Being Hacked
01:00:29 • 3min
30
The LSU Cyber Security Clinic
01:03:17 • 2min
31
The Future of Cybersecurity
01:04:57 • 3min
32
Hacking Methodology
01:07:42 • 3min
33
How to Audit Web Servers in Puerto Rico
01:10:13 • 2min
34
How to Identify Potential Attack Labs in a Web Server
01:12:19 • 4min
35
How to Read an Encrypted Password File
01:16:45 • 2min
36
How to Identify and Defase Potential Issues
01:18:42 • 4min