エピソード

  • NotPetya: The Cyber Bomb That Masqueraded as Ransomware
    2025/05/14

    What if the ransomware locking your files was never meant to make money—but to wipe out everything you’ve built? In this explosive episode, Alex Cipher walks you through the devastating 2017 NotPetya attack. From its origins in Ukraine’s MeDoc software to its global ripple effect on companies like Maersk, FedEx, and Merck, this hack rewrote the rules of cyberwarfare. We’ll break down the exploits, the motives, and how to protect yourself from the next big cyber weapon.

    Support the show

    続きを読む 一部表示
    8 分
  • Inside Job: The Ubiquiti Hacker Who Tried to Save the Day—From Himself | Cypher Tech Hacks
    2025/05/07

    What if the hacker wasn’t on the outside—but right inside your team meetings? In this episode of Cypher Tech Hacks, Alex Cipher unpacks the jaw-dropping Ubiquiti breach where a trusted DevOps engineer hacked his own company, stole sensitive data, demanded a ransom, then tried to help investigate the very breach he caused. From exploiting cloud access to manipulating internal logs, this insider threat nearly walked away clean. Learn how he pulled it off, how investigators caught him, and the security lessons your team can’t afford to ignore.

    Support the show

    続きを読む 一部表示
    8 分
  • AI Weekly Insights: U.S. Deepfake Law, Google’s AI Search, AWS Nova Premier & Global AI Breakthroughs
    2025/05/03

    Welcome to AI Weekly Insights — your go-to podcast for the latest breakthroughs in artificial intelligence and machine learning! This episode covers the U.S. passing the landmark Take It Down Act to criminalize non-consensual deepfake content, Google’s powerful AI Mode in Search reshaping online queries, Amazon Web Services’ release of its most advanced AI model Nova Premier, India’s indigenous large language model revolution, and California’s cutting-edge AI system to fast-track wildfire recovery permits. Stay informed on the fast-evolving world of AI, cybersecurity, and tech innovation. Subscribe now and stay ahead of the curve!


    Support the show

    続きを読む 一部表示
    2 分
  • How Hackers Took Over School Smartboards to Launch Ransomware | CommBox Classroom Exploit Explained
    2025/04/29

    Welcome to Cypher Tech Hacks, the podcast where host Alex Cipher takes you inside the most shocking, real-world hacks in digital history.

    In today’s episode, we uncover The CommBox Classroom Exploit—a ransomware attack that started with smartboards in schools. Attackers used unsecured CommBox devices to infiltrate school networks, encrypt critical systems, and demand Bitcoin ransoms. But this wasn’t your average ransomware campaign. This hack revealed just how dangerous unsecured IoT devices can be when left exposed online.

    🎧 You’ll learn:

    • How hackers found vulnerable CommBox devices via Shodan
    • The exact method used to gain access and pivot through school networks
    • What could’ve prevented this attack
    • How Zero Trust, segmentation, and patching could save millions in recovery

    Subscribe now and learn how to outsmart even the most advanced digital threats. New episodes every week!

    Support the show

    続きを読む 一部表示
    5 分
  • This Week in AI: Microsoft Recall, Adobe Firefly 4, OpenAI Deep Research, Intel’s Big Move | April 2025
    2025/04/26

    This week’s AI developments are shaking up the tech world! Microsoft introduces Recall for Copilot+ PCs, Adobe unveils Firefly Image Model 4, and OpenAI expands its Deep Research tool to free users. Intel steps up to challenge Nvidia with new AI chip ambitions, while the White House launches a major AI education initiative. Plus, DeepMind’s updated geometry solver hits 84% accuracy, Google’s Veo 2 revolutionizes 4K video generation, and Meta announces the first-ever LlamaCon. Tune in for a fast, insightful recap of how AI is evolving right now — and where it’s headed next.


    Support the show

    続きを読む 一部表示
    4 分
  • T-Mobile Breached – How a 21-Year-Old Hacked One of America’s Largest Telecoms from His Bedroom
    2025/04/22

    One router. One testing server. One kid with internet access.

    In this episode of Cypher Tech Hacks, Alex Cipher unravels the wild story of how a 21-year-old hacker infiltrated T-Mobile’s internal systems, spent weeks undetected, and exfiltrated data on over 40 million customers — all without using a single line of malware.

    We break down:

    • How a misconfigured router opened the door
    • The path from dev environment to production databases
    • Why logging and segmentation failures made this attack so easy
    • And what it says about the state of security at major telecoms

    This breach wasn’t flashy. It was surgical. And the scary part? It could happen to almost any company still running on legacy infrastructure and lazy segmentation.

    If you’re building, managing, or securing anything — this is the episode you have to hear.

    Support the show

    続きを読む 一部表示
    7 分
  • The Tesla API Hack: How Hackers Took Over Cars Remotely
    2025/04/21

    In this episode of Cypher Tech Hacks, host Alex Cipher uncovers the real-life Tesla API hack that let attackers remotely access and control Teslas across 13 countries. It wasn’t a bug in Tesla’s system—it was a deadly combination of exposed tokens, careless third-party developers, and silent API abuse.

    Learn how one security researcher responsibly revealed the flaw, what steps hackers would take to exploit it, and most importantly—how you can prevent similar breaches in your own apps, devices, or digital life.

    This story is a wake-up call for anyone using smart tech or developing connected apps.

    Support the show

    続きを読む 一部表示
    6 分
  • How the Okta Breach Happened: Vendor Laptops, LAPSUS$, and a Global Identity Crisis
    2025/04/21

    Welcome to Cypher Tech Hacks—the podcast where cyber legends come to light. In this week’s episode, Alex Cipher exposes the inside story of the Okta security breach that shook the tech world. You’ll hear how one compromised contractor laptop became the ignition point for a massive identity and access management failure.

    We’ll break down:

    • What went wrong at Okta’s third-party vendor Sitel
    • How the LAPSUS$ gang bypassed security using social engineering
    • Why companies like Cloudflare were almost compromised
    • What you can do to harden identity systems and monitor vendors

    Whether you’re a red teamer, a security analyst, or a tech-savvy exec, this episode is packed with real-world lessons from a high-stakes breach.

    🎧 Subscribe for weekly deep dives into cybercrime, tech fraud, and digital deception.
    Visit CypherTechHacks.com for bonus content, transcripts, and toolkits.

    Support the show

    続きを読む 一部表示
    8 分