エピソード

  • Mazda Connect systems expose vulnerabilities, Partnership raises ethical concerns, AI enhances Chrome security features, D-Link devices lack security fixes,
    2024/11/11

    Video Episode: https://youtu.be/O_xw1Nkau8c

    In today’s episode, we discuss critical vulnerabilities affecting Mazda Connect infotainment systems that could allow hackers to install persistent malware and gain unauthorized control over vehicle networks. We also explore Anthropic’s controversial partnership with Palantir to process secret government data with its AI model, Claude, raising concerns about ethical implications and safety. Additionally, we cover Google’s AI-enhanced security features in Chrome, and the risks associated with deploying AI in sensitive applications, highlighted by D-Link’s refusal to patch critical flaws in outdated NAS devices that jeopardize security.

    Sources: 1. https://www.bleepingcomputer.com/news/security/unpatched-mazda-connect-bugs-let-hackers-install-persistent-malware/ 2. https://arstechnica.com/ai/2024/11/safe-ai-champ-anthropic-teams-up-with-defense-giant-palantir-in-new-deal/ 3. https://www.bleepingcomputer.com/news/google/google-says-enhanced-protection-feature-in-chrome-now-uses-ai/ 4. https://www.bleepingcomputer.com/news/security/d-link-wont-fix-critical-flaw-affecting-60-000-older-nas-devices/

    Music: https://youtu.be/B4gk5tWMvyY?si=q_JjohozMBH7XPNe

    Timestamps

    00:00 – Introduction

    01:14 – Mazda

    03:06 – Anthropic AI DoD

    05:00 – Google AI Safe Browsing

    06:32 – No DLink Patch

    1. What are today’s top cybersecurity news stories? 2. How can vulnerabilities in Mazda Connect systems be exploited by hackers? 3. What are the implications of Claude AI being used for government data processing? 4. What security issues are associated with D-Link NAS devices? 5. Why is Google incorporating AI into Chrome’s Enhanced Protection feature? 6. What are the risks of using AI in cybersecurity applications? 7. How does command injection vulnerability affect network-attached storage devices? 8. What criticisms are being made about Anthropic’s partnership with Palantir? 9. How do unpatched security flaws impact vehicle safety and operation? 10. What steps can users take to protect vulnerable network devices from exploitation?

    Mazda Connect, malware, vulnerability, hackers, Claude, Anthropic, Palantir, AWS, AI, Chrome, Enhanced protection, privacy, D-Link, NAS, vulnerability, command injection

    続きを読む 一部表示
    1分未満
  • Canada Shuts Down TikTok, Copyright Phishing Schemes, PyPI Fabrice Package – Cybersecurity News
    2024/11/08

    Video Episode: https://youtu.be/kobyMdrVQeg

    In today's episode, we discuss Canada's order to dissolve TikTok Technology Canada amid national security concerns regarding ByteDance's operations, highlighting the country's ongoing scrutiny of potential user data collection risks. We also explore the alarming rise of the SteelFox and Rhadamanthys malware campaigns, which exploit copyright scams and vulnerable drivers to compromise victims' data, as well as the dangerous "fabrice" package on PyPI designed to stealthily steal AWS credentials. Lastly, we cover a critical vulnerability in Cisco industrial wireless access points that could lead to total device compromise if exploited.

    Links to articles:1. https://www.bleepingcomputer.com/news/security/canada-orders-tiktok-to-shut-down-over-national-risk-concerns/2. https://thehackernews.com/2024/11/steelfox-and-rhadamanthys-malware-use.html3. https://thehackernews.com/2024/11/malicious-pypi-package-fabrice-found.html4. https://www.helpnetsecurity.com/2024/11/07/cve-2024-20418/

    Timestamps

    00:00 - Introduction

    01:04 - Canada shuts down tiktok

    02:36 - Phishing Copyright scams

    05:06 - PyPI Fabrice Malicious Package

    06:56 - Cisco Vulnerability

    1. What are today's top cybersecurity news stories?2. Why did Canada order TikTok to shut down?3. What national risks are associated with TikTok in Canada?4. How is the Rhadamanthys malware campaign targeting victims?5. What is the significance of the SteelFox malware discovery?6. How can developers protect themselves from malicious PyPI packages?7. What vulnerabilities have been fixed in Cisco's industrial wireless access points?8. How does the 'fabrice' package exploit developers' AWS credentials?9. What are the potential consequences of TikTok's shutdown in Canada?10. What security measures should users take when using mobile applications?

    TikTok, national security, privacy, data security, Rhadamanthys, SteelFox, phishing, Check Point, fabrice, PyPI, typosquatting, AWS keys, Cisco, vulnerability, access points, HTTP,

    続きを読む 一部表示
    1分未満
  • Bengal Cat Enthusiasts Targeted in Australia, Google mandates MFA – Cybersecurity Newsno title
    2024/11/07

    Video Episode: https://youtu.be/SryXt8EZLBU

    In today’s episode, we explore the recent Gootloader campaign targeting Bengal cat enthusiasts in Australia, detailing how SEO poisoning has been utilized to distribute malicious payloads disguised as legitimate content. Additionally, we cover new Australian laws imposing hefty fines on banks and social media companies for failing to protect consumers from scams, alongside Germany’s draft legislation aimed at safeguarding security researchers. Finally, we discuss Google Cloud’s upcoming mandate for multifactor authentication (MFA) to further enhance user security.

    Sources: 1. https://news.sophos.com/en-us/2024/11/06/bengal-cat-lovers-in-australia-get-psspsspssd-in-google-driven-gootloader-campaign/ 2. https://www.theguardian.com/money/2024/nov/07/banks-and-social-media-companies-to-be-fined-over-scams-under-new-australian-laws-touted-as-strongest-in-world 3. https://www.bleepingcomputer.com/news/security/germany-drafts-law-to-protect-researchers-who-find-security-flaws/ 4. https://www.cybersecuritydive.com/news/google-cloud-mandate-multifactor-authentication/732141/

    1. What are today’s top cybersecurity news stories? 2. How is Gootloader using SEO poisoning in malware campaigns? 3. What are the new Australian laws against scams targeting social media and banks? 4. How is Germany protecting security researchers from legal repercussions? 5. What changes is Google Cloud implementing regarding multifactor authentication? 6. What threats do GootLoader and GootKit pose to cybersecurity? 7. How can users recognize SEO-poisoned websites? 8. What significant penalties are included in Australia’s anti-scam legislation? 9. What measures are being taken to keep security researchers safe in Germany? 10. How will the new MFA requirements affect Google Cloud users?

    GootLoader, SEO poisoning, Sophos X-Ops MDR, ransomware, anti-scam, Albanese, liability, accountability, Germany, cybersecurity, legal protection, ethical hacking, Google Cloud, multifactor authentication, cybersecurity, secure-by-design

    続きを読む 一部表示
    1分未満
  • Canada Man Arrested for SnowFlake Data Extortion, Synology and Android Vulns – Cybersecurity News
    2024/11/05

    Video Episode: https://youtu.be/yDNIBS8OBoE

    In today’s episode, we delve into the alarming rise of cybercrime as a 26-year-old Canadian, Alexander Moucka, is arrested for allegedly extorting over 160 companies using the Snowflake cloud data service. We also discuss the emergence of the Android banking malware “ToxicPanda,” designed to bypass security measures for fraudulent transactions, and Google’s urgent patching of two vulnerabilities threatening millions of Android users. Furthermore, we highlight Synology’s critical zero-click vulnerability impacting NAS devices, emphasizing the ongoing threats to data security.

    Sources: 1. https://krebsonsecurity.com/2024/11/canadian-man-arrested-in-snowflake-data-extortions/ 2. https://thehackernews.com/2024/11/new-android-banking-malware-toxicpanda.html 3. https://www.helpnetsecurity.com/2024/11/05/cve-2024-43093/ 4. https://thehackernews.com/2024/11/synology-urges-patch-for-critical-zero.html

    Timestamps

    00:00 – Introduction

    01:06 – Snowflake Canadian Arrested

    02:41 – Android ToxicPanda Banking Malware

    04:24 – Android Patches

    05:30 – Synology NAS Zero-Click

    1. What are today’s top cybersecurity news stories? 2. Who was arrested in connection with the Snowflake data extortions? 3. What is the ToxicPanda malware and how does it work? 4. What vulnerabilities were recently patched in Android by Google? 5. How are hackers exploiting vulnerabilities in Synology NAS devices? 6. What were the implications of the Snowflake data breach on major companies? 7. How does the Android banking malware ToxicPanda conduct fraud? 8. What security measures should companies implement to prevent data extortion? 9. What are the latest updates on the UNC5537 hacking group? 10. How do recent Android vulnerabilities affect user security?

    data theft, Snowflake, cybercrime, Alexander ‘Connor’ Moucka, ToxicPanda, malware, banking, android, Google, vulnerabilities, Qualcomm, spyware, RISK:STATION, Synology, vulnerability, Pwn2Own,

    # Intro

    A Canadian man has been arrested in a massive data theft operation, allegedly extorting over 160 companies using Snowflake’s cloud service and linking to notorious cybercriminal Alexander ‘Connor’ Moucka. With ties to extremist groups and millions made from ransom attempts, Moucka’s arrest unveils the destructive potential of cybercrime fueled by misconfigured security settings.

    How did hackers manage to compromise so many companies using Snowflake’s data service, and what role did lax security measures play in their success?

    ToxicPanda, a sinister new Android banking malware, has already compromised over 1,500 devices by bypassing advanced security measures to conduct fraudulent money transfers. Masquerading as popular apps and exploiting accessibility services, this threat marks a rare attack by Chinese cybercriminals on European and Latin American banking users, leaving a trail of financial havoc.

    How does ToxicPanda manage to bypass advanced banking security measures while targeting international users?

    In a crucial security update, Google has patched actively exploited vulnerabilities that could allow hackers to target Android users, with one flaw affecting Qualcomm chipsets and another in the Google Play framework potentially being used for cyber espionage. Join us as we uncover how these vulnerabilities could be leveraged in campaigns against journalists and activists around the globe.

    What kind of specialized spyware exploits are these vulnerabilities likely implicated in?

    Millions of Synology NAS devices are at risk due to a critical zero-click vulnerability, dubbed RISK:STATION, that allows attackers root-level access without user interaction, prompting an urgent patch release. Exploited during the Pwn2Own 2024 contest, this flaw underscores the critical need for users to update their devices to prevent potential data breaches and malware attacks.

    How does the zero-click nature of the RISK:STATION vulnerability provide such a significant threat to Synology NAS devices?

    続きを読む 一部表示
    1分未満
  • iPhone Spyware, Phish n Ships, WordPress Vulns, EmeraldWhale oh my. Cybersecurity News
    2024/11/01

    Video Episode: https://youtu.be/-fHd8wOJGHg

    In today’s episode, we discuss the recent surge in cyber threats, starting with the improved LightSpy spyware targeting iPhones, which enables heightened surveillance through 28 new plugins and destructive capabilities like device freezing. We also cover a critical vulnerability (CVE-2024-50550) in the LiteSpeed Cache WordPress plugin, allowing hackers to gain unauthorized admin access to over six million sites. Additionally, we examine the Phish n’ Ships campaign, which has affected over a thousand online stores, and the EmeraldWhale operation that has stolen more than 15,000 cloud credentials from exposed Git repositories, highlighting the ongoing challenges in mobile security, WordPress vulnerabilities, and credential theft.

    References: 1. https://thehackernews.com/2024/10/new-lightspy-spyware-version-targets.html 2. https://www.bleepingcomputer.com/news/security/litespeed-cache-wordpress-plugin-bug-lets-hackers-get-admin-access/ 3. https://www.bleepingcomputer.com/news/security/over-a-thousand-online-shops-hacked-to-show-fake-product-listings/ 4. https://www.bleepingcomputer.com/news/security/hackers-steal-15-000-cloud-credentials-from-exposed-git-config-files/

    1. What are today’s top cybersecurity news stories? 2. How does the new version of LightSpy spyware target iPhones? 3. What vulnerabilities exist in the LiteSpeed Cache WordPress plugin? 4. What is the Phish n’ Ships phishing campaign about? 5. How did hackers steal 15,000 cloud credentials from Git config files? 6. What measures can be taken to secure iPhones against spyware? 7. What are the implications of the LiteSpeed Cache privilege elevation flaw? 8. What steps should consumers take to avoid falling for phishing scams? 9. How are hackers exploiting Git configuration files for data theft? 10. What are the latest trends in mobile cybersecurity threats?

    LightSpy, spyware, iOS, malware, LiteSpeed Cache, vulnerability, WordPress, exploitation, Satori, phishing, vulnerabilities, counterfeit, EmeraldWhale, Git, credentials, Sysdig,

    続きを読む 一部表示
    1分未満
  • Windows Downdate, SonicWall and Cisco VPN Attacks, Webflow Phishing – Cybersecurity News
    2024/10/29

    Video Episode: https://youtu.be/eXP0jiOQjFc

    In today’s episode, we explore the alarming rise of phishing campaigns exploiting Webflow to harvest sensitive login credentials from crypto wallets like Coinbase and MetaMask, alongside vulnerabilities in SonicWall VPNs linked to ransomware attacks. We also discuss a new technique allowing attackers to bypass Windows’ security features for kernel rootkits and a critical CVE affecting Cisco VPN services that can lead to denial-of-service attacks. Tune in for insights on how these attack methods are shaping the cybersecurity landscape and the challenges they present to organizations globally.

    References: 1. https://thehackernews.com/2024/10/cybercriminals-use-webflow-to-deceive.html 2. https://www.bleepingcomputer.com/news/security/new-windows-driver-signature-bypass-allows-kernel-rootkit-installs/ 3. https://www.bleepingcomputer.com/news/security/fog-ransomware-targets-sonicwall-vpns-to-breach-corporate-networks/ 4. https://www.cybersecuritydive.com/news/cisco-exploited-cve-vpn/731216/

    Timestamps

    00:00 – Introduction

    01:03 – Webflow Phishing

    02:06 – Windows Downgrade Updates

    03:29 – VPN Vulnerabilities

    1. What are today’s top cybersecurity news stories? 2. How are cybercriminals using Webflow for phishing attacks? 3. What is the new Windows Driver Signature bypass vulnerability? 4. How did Fog ransomware exploit SonicWall VPNs? 5. What is the CVE-2024-20481 vulnerability affecting Cisco VPNs? 6. Why have phishing attacks on crypto wallets increased recently? 7. What are the implications of the Windows Update takeover vulnerability? 8. How do ransomware operators breach corporate networks through VPNs? 9. What security measures can organizations take against VPN-related attacks? 10. What trends are emerging in cyberattacks against financial services?

    Webflow, phishing, credentials, scams, Windows Update, rootkits, vulnerabilities, Driver Signature Enforcement, Fog, Akira, SonicWall, ransomware, Cisco, VPN, vulnerability, denial of service,

    続きを読む 一部表示
    1分未満
  • AWS Credentials found in popular apps, Sharepoint vulnerability, Reboot your phone
    2024/10/24

    Video Episode: https://youtu.be/FPiwoFbhV7Y

    In today’s episode, we delve into recent cybersecurity developments recommended by the NSA for iPhone and Android users, emphasizing the significance of weekly device reboots to mitigate malware threats in 2024. We also explore the U.S. Cybersecurity and Infrastructure Security Agency’s new security proposals aimed at protecting sensitive data from hostile entities, along with the potential risks of hardcoded AWS and Azure credentials in popular mobile applications. Finally, we discuss the exploitation of a critical Microsoft SharePoint vulnerability (CVE-2024-38094) that could enable remote code execution, revealing the importance of prompt patching and security diligence.

    Sources: 1. https://www.forbes.com/sites/daveywinder/2024/10/23/nsa-tells-iphone-and-android-users-reboot-your-device-now/ 2. https://www.bleepingcomputer.com/news/google/google-to-let-businesses-create-curated-chrome-web-stores-for-extensions/ 3. https://www.bleepingcomputer.com/news/security/aws-azure-auth-keys-found-in-android-and-ios-apps-used-by-millions/ 4. https://thehackernews.com/2024/10/cisa-warns-of-active-exploitation-of.html

    Timestamps

    00:00 – Introduction

    01:01 – Reboot your phone

    02:49 – Google Enterprise Store

    04:02 – Hardcoded Credentials

    05:09 – Sharepoint Vulnerability

    1. What are today’s top cybersecurity news stories? 2. Why did the NSA advise smartphone users to reboot their devices? 3. What is the cybersecurity significance of the NSA’s reboot recommendation? 4. How are AWS and Azure credentials being exposed in mobile apps? 5. What recent vulnerabilities have been identified in Microsoft SharePoint? 6. How can regular device rebooting enhance smartphone security? 7. What are the new security proposals from CISA for sensitive data? 8. What is the latest news about Google’s Enterprise Web Store for Chrome extensions? 9. Why is turning off and on your smartphone recommended by security experts? 10. How does the exposure of hardcoded credentials in apps affect user security?

    NSA, iPhone, Android, malware, Enterprise Web Store, Chrome extensions, productivity, AI tools, cloud service, credentials, Symantec, vulnerabilities, CVE-2024-38094, Microsoft SharePoint, hackers, remote code execution,

    続きを読む 一部表示
    1分未満
  • Microsoft Phishing Honeypots, Cisco’s DevHub Paused, Roudcube Webmail Vulns – Cybersecurity News
    2024/10/22

    Video Episode: https://youtu.be/2YiTiU75inA

    In today’s episode, we discuss Microsoft’s innovative approach to fighting phishing attacks using fake Azure tenants as honeypots to gather intelligence on cybercriminals, as highlighted by Ross Bevington at BSides Exeter. We also cover Cisco’s DevHub portal being taken offline following the leak of non-public data by a hacker, while examining recent exploitation of the Roundcube webmail XSS vulnerability for credential theft. Finally, we delve into critical flaws identified in several end-to-end encrypted cloud storage platforms, including Sync and pCloud, raising concerns over user data security.

    Articles referenced: 1. https://www.bleepingcomputer.com/news/security/microsoft-creates-fake-azure-tenants-to-pull-phishers-into-honeypots/ 2. https://www.bleepingcomputer.com/news/security/cisco-takes-devhub-portal-offline-after-hacker-publishes-stolen-data/ 3. https://thehackernews.com/2024/10/hackers-exploit-roundcube-webmail-xss.html 4. https://www.bleepingcomputer.com/news/security/severe-flaws-in-e2ee-cloud-storage-platforms-used-by-millions/

    Timestamps

    00:00 – Introduction

    00:52 – Microsoft Phishing Honeypots

    02:51 – Webmail Roundcube XSS

    03:54 – CSP Vulns

    05:08 – Cisco’s DevHub portal taken offline

    1. What are today’s top cybersecurity news stories? 2. How is Microsoft using honeypots to combat phishing? 3. What happened with Cisco’s DevHub after a data leak? 4. What vulnerabilities have been discovered in Roundcube webmail? 5. What are the security issues found in E2EE cloud storage platforms? 6. How does Microsoft’s Deception Network gather threat intelligence? 7. What data was allegedly leaked from Cisco’s platform? 8. What is the significance of the Roundcube webmail XSS vulnerability? 9. Which platforms were found to have severe flaws in end-to-end encryption? 10. How does Microsoft’s approach to phishing differ from traditional methods?

    Azure, phishers, honeypot, cybercriminals, Cisco, DevHub, cyber, data leak, Roundcube, phishing, JavaScript, vulnerability, security, encryption, Sync, vulnerabilities,

    続きを読む 一部表示
    1分未満