This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
…
continue reading
1
Alwin of ITPodcast.club Interview
29:42
29:42
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
29:42
Today's episode is a little different. We have the opportunity to speak to the host of ITPodcast.Club, available on major podcasting platforms and who is in their last year of university. This episode is a bit longer around 30 minutes, but Alwin and I talk about a few topics including, paid and free learning resources, how we learn, entry level wor…
…
continue reading
1
Interviewing industry Professional Anyascii
1:42:50
1:42:50
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
1:42:50
Hello and welcome back to USB our Guest, Cyber Security tips. I’m Theo, here to help you break down cyber security news and hacks and how they affect you. However, today I am interviewing Anyaacii a Linux in HPC Administrator. We recorded the interview in an open discord voice channel with video while monitoring chat with Text-to-speech developed b…
…
continue reading
1
Interviewing Industry Professional Tech Penguin
1:13:58
1:13:58
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
1:13:58
Another interview! Yup! Today I am interviewing Tech Penguin who is a Senior Penetration Tester in the Netherlands. We recorded the interview in an open discord voice channel with video while monitoring chat with Text-to-speech developed by Security_Live. The Tech Penguin has 5 years experience as a penetration tester and a different entry to the C…
…
continue reading
1
Interviewing Managed Web Hosting CEO and CTO FullStackLive/The Monospace Mentor
1:11:48
1:11:48
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
1:11:48
Today I am interviewing The MonoSpace Mentor, CEO and CTO of their own managed web hosting business. We recorded the interview in an open discord voice channel with video while monitoring chat with Text-to-speech developed by Security_Live. The MonoSpace mentor has a wealth of life experience that I will attempt to draw on. From early beginnings, g…
…
continue reading
1
Interviewing with L3 System Administrator Tegora
1:50:47
1:50:47
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
1:50:47
Today I am interviewing Tegora, an L3 System Administrator & Senior Technical Leader with technical responsibilities for Networking/Linux/HPC. We recorded the interview in an open discord voice channel with video while monitoring chat with Text-to-speech developed by Security_Live. While this time I had his volume level closer to mine, the music wa…
…
continue reading
1
Interviewing Cyber Security Threat Analyst, Security Operations Lead and Lead Pentester, Zoogs
1:02:57
1:02:57
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
1:02:57
Hello and welcome back to USB our Guest, Cyber Security tips. I’m Theo, here to help you break down cyber security news and hacks and how they affect you. However, today I am interviewing Zoogs. He has been in the industry for a bit now and I wanted to pick his brain on a variety of topics. We decided to record this live on twitch with chat using t…
…
continue reading
1
Phishing Myself... Repeatedly or I'll click on that...
10:49
10:49
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
10:49
In this video Episode of USB our Guest, I Phish myself Repeatedly. Today I wanted to do something a little different and something I've wanted to do for a while. I'm getting phished, repeatedly. I'm going to show you multiple legitimate login screens next to spoofed login screens that actually steal credentials. We're gonna talk about when and wher…
…
continue reading
This episode cover the LastPass breach that occurred in August. Links to the LastPass blog and articles referenced in the show are below. You can also find me on twitch at https://www.twitch.tv/b7h30. [LastPass - Notice of Recent Security Incident](https://blog.lastpass.com/2022/08/notice-of-recent-security-incident/) [Explore how LastPass keeps yo…
…
continue reading
1
Russia / Ukraine Cyber War discussion with Stefan from Tech Hatters
27:57
27:57
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
27:57
I sit down with Stefan from the Tech Hatters Discord for a discussion on the Russia / Ukraine Cyber War. Stefan is a University student working in the industry. Please see all the links for all the articles we discussed below. Feel free to run all the links provided below through VirusTotal to ensure safe to click. I do not suggest using the 1920.i…
…
continue reading
Today’s episode covers the vulnerability affecting Java logging package, Log4j. This episode took a little longer to make than expected due to its complexity. Please see links below used to create the episode. TryHackMe’s Solar, exploiting log4j https://tryhackme.com/room/solar The Log4J Vulnerability Will Haunt the Internet for Years https://www.w…
…
continue reading
Today's episode covers the recent Twitch hack. yikes. The entirety of Twitch has reportedly been leaked https://www.videogameschronicle.com/news/the-entirety-of-twitch-has-reportedly-been-leaked/ A Devastating Twitch Hack Sends Streamers Reeling - https://www.wired.com/story/devastating-twitch-hack-sends-streamers-reeling/ Twitch confirms it was ha…
…
continue reading
This episode is about the recent EA/Electronic Arts hack that occurred on June 6th. TL:DR/L - only download from Legit game retailers. Hackers Steal Wealth of Data from Game Giant EA - https://www.vice.com/en/article/wx5xpx/hackers-steal-data-electronic-arts-ea-fifa-source-code Hackers leak full EA data after failed extortion attempt - https://ther…
…
continue reading
Today’s episode is about the Ransomware attack that occurred on May 7th that forced Colonial Pipeline to shut down its operations. A Closer Look at the DarkSide Ransomware Gang - https://krebsonsecurity.com/2021/05/a-closer-look-at-the-darkside-ransomware-gang/#more-55529 Colonial Pipeline attack: Everything you need to know- https://www.zdnet.com/…
…
continue reading
Today’s episode covers the FBI’s Unprecedented helpful remote hacking of Hafnium infected servers. The FBI is remotely hacking hundreds of computers to protect them from Hafnium- https://www.theverge.com/2021/4/13/22382821/fbi-doj-hafnium-remote-access-removal-hack The FBI got a court order to delete backdoors from hacked Exchange servers- https://…
…
continue reading
Today's episode is about cheaters or modders getting infected with RAT’s or a Remote Access Trojans. Tech Republic - Malicious attack now targeting video gamers and modders https://www.techrepublic.com/article/malicious-attack-now-targeting-video-gamers-and-modders/ Cisco Talos - Cheating the cheater: How adversaries are using backdoored video game…
…
continue reading
Today’s episode covers RATs or Remote Access Trojans. There is a great article on DarkReading that gives an overview of what RATs do and I’ll include it in the show notes. In This episode we will cover What are RATs, how do they find their way on your computer, what they do when they find themselves on there and what you can do to protect your devi…
…
continue reading
Today’s episode covers the Microsoft Server Exchange Hack. So disclaimer here, this is a fairly technical hack. The purpose of this episode is to give you a high level overview of the hack, a timeline, who is responsible and what to do? Krebs on Security - At Least 30,000 U.S. Organizations Newly Hacked Via Holes in Microsoft’s Email Software - htt…
…
continue reading
Silver Sparrow as discovered by Red Canary RedCanary's silver sparrow discovery - https://redcanary.com/blog/clipping-silver-sparrows-wings/ Computer world - https://www.computerworld.com/article/3609611/30k-macs-infected-with-silver-sparrow-virus-m1-mac-ssd-health.html MITRE|ATT&CK - LaunchAgents - https://attack.mitre.org/techniques/T1543/001/ Cy…
…
continue reading
Hello and welcome back to USB our Guest Cyber Security tips. Today's episode is about CD Projekt Red's CyberPunk2077 Breach. Spoiler, they tell hackers 'no thank you' to ransom demands and restore from backup. Wired article https://www.wired.com/story/cd-projekt-red-ransomware-hack-cyberpunk-2077-source-code/ knowbe4 blog https://blog.knowbe4.com/c…
…
continue reading
Today's episode covers Zero Days. What are they, why you should know about them and what you should do when you hear about them.Recent Windows Zero day - https://www.darkreading.com/vulnerabilities---threats/microsoft-fixes-windows-zero-day-in-patch-tuesday-rollout/d/d-id/1340114FireEye Zero-Day definition - https://www.fireeye.com/current-threats/…
…
continue reading
Today's topic is Coronavirus Phishing Scams.https://www.consumer.ftc.gov/blog/2020/06/help-covid-19-contact-tracers-not-scammers https://www.irs.gov/coronavirus/economic-impact-payments https://www.consumer.ftc.gov/blog/2020/04/coronavirus-stimulus-payment-scams-what-you-need-know https://coronavirus.ohio.gov/wps/portal/gov/covid-19/covid-19-vaccin…
…
continue reading
This episode is about Software Updates and why they are important to install asap. Norton anti-virus article mentioned in the episode. https://us.norton.com/internetsecurity-how-to-the-importance-of-general-software-updates-and-patches.html WannaCrypt/WannaCry wiki-pedia entry https://en.wikipedia.org/wiki/WannaCry_ransomware_attack…
…
continue reading
This episode covers Shodan.io the search engine for the Internet of Things. Please see the website https://danielmiessler.com/study/shodan/ for the Shodan tutorial mentioned in the show. Support the podcast by shopping on Amazon through the following link amzn.to/34lCFzX
…
continue reading
Today's episode covers the website https://haveibeenpwned.com Troy hunt created haveibeenpwned.com with the simple idea that there should be place for you to find out if your credentials have been stolen. visit haveibeenpwned.com to easily search breaches with your email address or browse breaches
…
continue reading
Today's episode is about whaling. What is it and what can you do to thwart an attack. There is a great article on Rapid7's Blog on whaling. Find it here. https://www.rapid7.com/fundamentals/whaling-phishing-attacks/ . As mentioned at the end of the podcast, I wanted to try something a little different. For a chance to win a $10 Amazon Gift card, se…
…
continue reading
Today's Episode covers Backups. What are backups, why you should use them and how to do them. Find the PC mag article referenced in the podcast at https://www.pcmag.com/news/the-beginners-guide-to-pc-backup Find the Microsoft support article referenced in the podcast at https://support.microsoft.com/en-us/help/4027408/windows-10-backup-and-restore …
…
continue reading
Today's Episode covers Ransomware. What is it and how can you protect yourself from it. Find the knowbe4 article we referenced in the show at https://www.knowbe4.com/ransomware . Find the Sophos article I referenced at the end of the episode at https://news.sophos.com/en-us/2020/09/17/maze-attackers-adopt-ragnar-locker-virtual-machine-technique/ Su…
…
continue reading
We cover some password best practices in this flash briefing Support the podcast by shopping on Amazon through the following link amzn.to/34lCFzX
…
continue reading
Today's episode cover tips to keep you safe from a SMiShing attack. From the Norton Website. What is Smishing and how to protect yourself from an attack? https://us.norton.com/internetsecurity-emerging-threats-what-is-smishing.html
…
continue reading
In this episode we explain what exactly is spear phishing. KnowBe4 website https://www.knowbe4.com/spear-phishing/
…
continue reading
This episode is about Phishing and how to avoid being phished From the FTC website - How to Recognize and Avoid Phishing Scams https://www.consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams
…
continue reading
In this Flash Briefing we cover Virtual Private Networks or VPN's PC Mag - The Best VPN services for 2019 https://www.pcmag.com/roundup/296955/the-best-vpn-services
…
continue reading
In this episode we cover warnings and suggestions when using public Wi-Fi Norton website - The Risks of public Wi-Fi https://us.norton.com/internetsecurity-privacy-risks-of-public-wi-fi.html
…
continue reading
This Flash Briefing is about Utility Company Scam Calls. Federal Trade Commission website - Empower yourself against utility scams - by Lisa Lake https://www.consumer.ftc.gov/blog/2018/09/empower-yourself-against-utility-scams Federal Trade Commission Complaint Assistant https://www.ftccomplaintassistant.gov/#crnt&panel1-1…
…
continue reading
Tips to avoid being scammed by a SSA RoboCall Federal Trade Commission - Getting Calls from the SSA? https://www.consumer.ftc.gov/blog/2019/03/getting-calls-ssa
…
continue reading
Tips to help avoid being scammed by a Credit Card RoboCall. FCC robo-calls website https://www.fcc.gov/consumers/guides/stop-unwanted-robocalls-and-texts
…
continue reading
Today's tip is about the Hacking Humans podcast by Cyberwire with Dave Bitner and Joe Carrigan. Hacking Humans podcast by Cyberwire with Dave Bitner and Joe Carrigan https://thecyberwire.com/podcasts/hacking-humans.html CyberWire https://thecyberwire.com/podcasts/daily-podcast.html
…
continue reading
knowbe4 blog web address as referred to in this episode https://blog.knowbe4.com/
…
continue reading
In this episode we explain how to use the VirusTotal website to help protect your computer from viruses. Virus Total virustotal.com
…
continue reading
Two-Factor Authentication: What is it and why do I need it to stay safe online? https://blog.trendmicro.com/two-factor-authentication-what-is-it-and-why-do-i-need-it-to-stay-safe-online/ Google Authenticator Apple https://apps.apple.com/us/app/google-authenticator/id388497605 Microsoft Authenticator https://www.microsoft.com/en-us/account/authentic…
…
continue reading
THE 4 BEST PASSWORD MANAGERS TO SECURE YOUR DIGITAL LIFE https://www.wired.com/story/best-password-managers/ 1Password https://1password.com/ dashlane https://www.dashlane.com/ LastPass https://www.lastpass.com/hp Keep PassXC https://keepassxc.org/
…
continue reading
In this Flash Briefing we cover tips for creating secure passwords from the experts at knowbe4.com Use the website https://howsecureismypassword.net/ to check how strong your password is
…
continue reading
Never plug a USB flash drive into your computer that is not your own. Malicious Code could be saved on the flash drive and programmed to run keyloggers or backdoors when plugged in. Some of these devices appear to be USB flash drives but instead are microcontrollers designed to run files or control you computer without your permission. As a best pr…
…
continue reading