We are a discord community of cyber security enthusiasts. We host various "Ask Me Anythings" and put them here for people to enjoy any time they like. Discord: https://discord.gg/r4JxpJS
…
continue reading
Cybersec Podcasts
Cyber After Hours: The Podcast Where Real Cyber Pros Let Loose What’s It All About? Think of it as that relaxed, late-night bar conversation you have with a fellow cybersecurity pro—except now it’s on the record. Co-hosts (and longtime friends) Paul Marco and Evan Morgan bring decades of combined experience in cybersecurity, from hands-on operations to engineering and architecture. Unscripted & Authentic Every week, they draw a random cybersecurity topic from a “fishbowl” and dive right in. ...
…
continue reading
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
…
continue reading
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
…
continue reading
The Top Secret Podcast dives into the real life of a software founder, exploring the challenges, roadblocks, and distractions on the journey to building a breakout SaaS success. With candid conversations and irreverent insights, host Ned O'Leary peels back the curtain on the good, the bad, and the ugly of startup life. If you're curious about what it really takes, this is your backstage pass.
…
continue reading
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
…
continue reading
Crucial history everyone should know.
…
continue reading
Oketsa seeks to encourage easy, laid back office listening. The show mostly targets office executives, addressing their day to day challenges, equipping those entering the job market with “surviving the workplace” skills and helping those at home find work (addressing unemployment). The show has a monstrous task to educate and inform local audiences of the “gaan-an’s” in their backyard (reflecting South Africa to South Africans) and providing them with a glimpse of what is taking place in th ...
…
continue reading

1
Cybersecurity and Compliance: Allies or Adversaries
55:27
55:27
Play later
Play later
Lists
Like
Liked
55:27Ever feel like compliance and cybersecurity are two teammates who just can't get along? In this lively episode of Cyber After Hours—Cybersecurity and Compliance: Allies or Adversaries?—Paul, Evan, and special guest Carlos Bonet, Security & Compliance Sales Director at Microsoft, dive headfirst into the complex dance between staying compliant and ke…
…
continue reading

1
The Rise of Cybercrime as a Service and How to Combat It
50:34
50:34
Play later
Play later
Lists
Like
Liked
50:34Ever wonder why cybercrime feels like it has better customer service than your cable provider? You're not alone! In this episode of Cyber After Hours—The Rise of Cybercrime as a Service and How to Combat It—Paul and Evan are joined by their guest, Rob Davis, SVP and Head of Digital Identity Services at Citizens, share an eye-opening (and occasional…
…
continue reading

1
How to Secure Legacy Systems in a Modern World?
47:53
47:53
Play later
Play later
Lists
Like
Liked
47:53Ever wonder if those dusty legacy systems you’ve been ignoring are one breach away from disaster? In Episode 29 of Cyber After Hours—titled “How to Secure Legacy Systems in a Modern World?”—co-hosts Evan Morgan and Paul Marco dig into the tough questions around outdated tech. They talk about everything from finding the right work-life balance (and …
…
continue reading

1
Securing Remote Workforces: Lessons from the Pandemic
53:36
53:36
Play later
Play later
Lists
Like
Liked
53:36Ever felt like the pandemic was one massive, global disaster recovery test? You're not alone. In this episode of Cyber After Hours—Securing Remote Workforces: Lessons from the Pandemic—Paul and Evan are joined by their guest, John Vigeant, Chief Executive Officer (CEO) of Login VSI, to dive into how the world of cybersecurity (and office life itsel…
…
continue reading

1
Zero Trust: Buzzword or Best Practice?
1:05:48
1:05:48
Play later
Play later
Lists
Like
Liked
1:05:48Ever wonder if Zero Trust is the next big buzzword or if it actually holds the key to modern cybersecurity? In Episode 27 of Cyber After Hours—titled “Zero Trust: Buzzword or Best Practice?”—co-hosts Evan Morgan and Paul Marco kick things off with a friendly Star Wars vs. Star Trek debate before diving into the serious question of what it really ta…
…
continue reading

1
Developing Cybersecurity Talent: Is Academia Keeping Up?
53:04
53:04
Play later
Play later
Lists
Like
Liked
53:04Ever wonder if universities are really prepping cybersecurity students for the real world—or just handing out degrees that look nice framed on a wall? In this lively episode of Cyber After Hours—Developing Cybersecurity Talent: Is Academia Keeping Up?—Evan and Paul (who, humorously, admits he has a chronic name-forgetting phobia) dive headfirst int…
…
continue reading

1
Cybersecurity Budgeting: Where to Spend, Where to Save
55:08
55:08
Play later
Play later
Lists
Like
Liked
55:08Ever wonder if you’re throwing money at cybersecurity or genuinely investing in it? In Episode 25 of Cyber After Hours—titled “Cybersecurity Budgeting: Where to Spend, Where to Save”—co-hosts Paul Marco and Evan Morgan dive into the nuts and bolts of smart spending. Fresh off their experiences at recent conferences, including some focused on K-12 e…
…
continue reading

1
Security in the DevOps Era: Balancing Speed and Safety
44:37
44:37
Play later
Play later
Lists
Like
Liked
44:37Ever feel like the faster you develop, the harder it gets to stay secure? You're not alone—and you're certainly not imagining things! In this episode of Cyber After Hours—Security in the DevOps Era: Balancing Speed and Safety—Paul and Evan are joined by Josh Dixon for a lively discussion that starts with relatable confessions about battling imposte…
…
continue reading
Ever wonder if hype cycles fuel genuine innovation or just add to the noise? In this lively Episode 23 of Cyber After Hours—titled “Do Hype Cycles Help or Hurt?”—Evan and Paul kick things off with some personal updates and practical productivity pointers (including a radical approach to inbox management) before tackling one of tech’s most debated t…
…
continue reading

1
Security Orchestration, Automation, and Response (SOAR): Hype or Necessity?
58:55
58:55
Play later
Play later
Lists
Like
Liked
58:55Ever wonder if Security Orchestration, Automation, and Response (SOAR) is truly essential—or just another buzzword in cybersecurity? In this episode of Cyber After Hours—SOAR: Hype or Necessity?—Paul and Evan sit down with Josh Lawson to unpack exactly that, starting with some amusing (and insightful) stories on workplace culture and how company dy…
…
continue reading

1
Why Endpoint Security is Your First Line of Defense
47:09
47:09
Play later
Play later
Lists
Like
Liked
47:09Ever wonder if endpoint security truly deserves the hype as your first line of defense—or is there more to the story? In this lively episode of Cyber After Hours—Endpoint Security: Is It Really the First Line of Defense?—Paul Marco and Evan Morgan kick things off by swapping stories about the unpredictable rollercoaster of entrepreneurship, proving…
…
continue reading

1
Data Privacy vs. Cybersecurity: Where Do They Intersect?
53:45
53:45
Play later
Play later
Lists
Like
Liked
53:45Ever feel numb when you hear about yet another data breach? You're not alone. In this episode of Cyber After Hours—Data Privacy vs. Cybersecurity: Where Do They Intersect?—Evan and Paul welcome Steve Ward, a seasoned cybersecurity leader turned venture capitalist, for an insightful (and surprisingly humorous) conversation on privacy, security, and …
…
continue reading

1
HN59 - Microsoft AI Discovers 20 Zero-Day Vulnerabilities in Bootloaders!
19:22
19:22
Play later
Play later
Lists
Like
Liked
19:22# Title * HN59 - Microsoft AI Discovers 20 Zero-Day Vulnerabilities in Bootloaders! ## Description 🔍 Microsoft’s AI Uncovers 20 Zero-Day Threats | CoffeeLoader Malware Gets Smarter In this episode of Exploit Brokers, Cipherceval dives into how Microsoft Security Copilot, powered by AI, discovered over 20 previously unknown vulnerabilities in popula…
…
continue reading

1
Cybersecurity Needs a Revolution, Not a Department of No
50:44
50:44
Play later
Play later
Lists
Like
Liked
50:44Ever felt like cybersecurity is always the team that says “no” to everything? Well, it’s time to change that narrative. In this episode of Cyber After Hours—How to Prevent Security From Becoming the "Department of No"—we start off sharing laughs about New York snowstorms and the funny ways different cultures react to weather surprises. But quickly,…
…
continue reading

1
How Quantum Computers Will Change Cybersecurity Forever
50:28
50:28
Play later
Play later
Lists
Like
Liked
50:28What happens when AI meets quantum computing in the heart of your SOC? In this week’s episode of Cyber After Hours, we’re joined by Edward Wu, CEO of Dropzone AI, to explore just how fast the cybersecurity game is changing—and what it means for defenders trying to stay one step ahead. From the frozen roofs of Syracuse to palm-sized quantum machines…
…
continue reading

1
Cybersecurity Regulations Are Coming—What You Need To Know
52:03
52:03
Play later
Play later
Lists
Like
Liked
52:03Ever wonder what a candid bar-side chat can teach us about the future of cybersecurity regulation? In the latest episode of Cyber After Hours—“S1 E17: What’s Next for Cybersecurity Regulation?”—we look back at how this podcast began and share a key realization: it’s not just about cybersecurity or AI. It’s about perspective, and how understanding t…
…
continue reading
The Top Secret Podcast dives into the real life of a software founder, exploring the challenges, roadblocks, and distractions on the journey to building a breakout SaaS success. With candid conversations and irreverent insights, host Ned O'Leary peels back the curtain on the good, the bad, and the ugly of startup life. If you're curious about what …
…
continue reading
Ever wonder how someone juggling customer service, consulting, and sales can still find time for a debate on decaf coffee and cyber threats? In this episode of Cyber After Hours, we sit down with Eric Gerena—whose colorful career path gives him a refreshingly unique perspective on staying motivated and delivering real value to clients. From demysti…
…
continue reading

1
HN58 - Havoc in the Cloud: The Shocking Click Fix Exploit Revealed
24:22
24:22
Play later
Play later
Lists
Like
Liked
24:22Welcome to Exploit Brokers with your host Cipherceval! In this deep dive, we uncover a sophisticated cyber assault where hackers exploited Microsoft SharePoint to launch the Havoc C2 via a stealthy click fix attack. Learn how a single click can trigger malicious PowerShell commands, turning everyday corporate tools into gateways for cybercrime. In …
…
continue reading

1
The Future of Cybersecurity: 2025's Cutting-Edge Technologies
1:06:39
1:06:39
Play later
Play later
Lists
Like
Liked
1:06:39Ever wish strategic planning felt more like a celebration and less like a chore? In this episode, we pop the cork on what makes a planning session truly satisfying, from the thrill of crossing off to-do items to the power of hitting pause for some much-needed self-reflection. Get ready to raise a glass—because by the end of this conversation, you’l…
…
continue reading

1
HN57 - Unmasking SpyLoan: The Android Malware Preying on Loan Seekers
20:32
20:32
Play later
Play later
Lists
Like
Liked
20:32In this episode of Exploit Brokers, we dive into the dark world of cybercrime, exploring two alarming topics: a malicious Android loan app masquerading as a financial tool and Xerox printer vulnerabilities that could be leaking your credentials. Learn how loan sharks have moved from traditional methods to sophisticated digital predation, exploiting…
…
continue reading

1
Why Cyber Extortion Payments Should Be Illegal
1:10:29
1:10:29
Play later
Play later
Lists
Like
Liked
1:10:29Ever wonder what would happen if paying cyber ransom demands was flat-out illegal? In this lively new installment of Cyber After Hours—S1E14, “Should Governments Make It Illegal to Pay Cyber Extortion Demands?”—we explore exactly that. Our guest is Ross, a dynamic entrepreneur operating in stealth mode, who adds fresh perspective (and a few laughs)…
…
continue reading
Ever wonder how facial hair fundraisers and cybersecurity connect? In this lively episode of Cyber After Hours—S1E8 Patch Management: How to Handle Zero-Day Vulnerabilities—we kick off with humorous mustache mishaps (including one domestic faux pas!) before tackling the serious business of zero-day exploits. From waxing poetic about handlebar musta…
…
continue reading
AI: The Ultimate Hacker or Cybersecurity’s Best Ally? In this week’s episode of Cyber After Hours (S1E13 – The Role of AI in Offensive Cybersecurity), we crack open a few drinks and an even bigger debate: Is AI leveling the playing field in cyber, or tilting it in favor of the bad guys? AI-powered attacks are no longer some sci-fi concept. Generati…
…
continue reading

1
HN56 - Massive Bug Puts Outlook Users at Risk | Kimsuky gets RDPWrapper
27:03
27:03
Play later
Play later
Lists
Like
Liked
27:03In today’s episode of Exploit Brokers, we dive deep into two major security threats making waves across the digital world. A critical Remote Code Execution (RCE) vulnerability in Microsoft Outlook is putting millions of users at risk, with hackers exploiting it through spear phishing emails and malicious links. Not only that, but we’re also uncover…
…
continue reading

1
What We Learned from the Worst Cyber Breaches
46:57
46:57
Play later
Play later
Lists
Like
Liked
46:57Ever wondered if there’s a secret “Swag Dark Web” out there for conference freebies? In this new episode of Cyber After Hours (S1E12: What Cyber Security Lessons Can We Learn From Recent Breaches?), we sit down with Omri—co-founder of DoControl and self-proclaimed swag connoisseur—for a lively journey from Israel’s buzzing startup scene to Miami’s …
…
continue reading

1
HN55 - Double Zipping Danger: The 7-Zip Exploit That Could Hack Your PC
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18Welcome back to Exploit Brokers! In today’s video, we dive deep into a critical 7‑Zip vulnerability that’s being exploited by Russian cybercriminals to bypass Windows’ security protections. If you’ve used 7‑Zip at all, you need to know how this flaw can let hackers sneak past the Mark-of-the-Web (MOTW) and deploy dangerous malware like Smoke Loader…
…
continue reading

1
CISO vs. CTO: The Battle for Your Security Budget
44:53
44:53
Play later
Play later
Lists
Like
Liked
44:53Ever wonder why identity and access management (IAM) can make or break your cybersecurity strategy? In this episode of Cyber After Hours, we sit down with Lance Peterman—an industry pro whose passion for mentoring the next generation radiates through every story he shares. Lance reveals how IAM, executed well, can be a game-changer in preventing br…
…
continue reading

1
HN54 - Cybersecurity Experts Reveal LAZARUS GROUP's Hidden Secrets
29:54
29:54
Play later
Play later
Lists
Like
Liked
29:54Lazarus Group’s Secret Admin Layer EXPOSED – Major Cybersecurity Discovery! 🔥💻 Security researchers have uncovered a hidden admin layer used by North Korea’s Lazarus Group to manage their Command and Control (C2) servers. This sophisticated network of VPNs and proxies allows them to execute cyberattacks worldwide—mainly targeting cryptocurrency dev…
…
continue reading

1
Hacking the Future: Network Security 2025
56:01
56:01
Play later
Play later
Lists
Like
Liked
56:01Ever wonder if a collared shirt can feel as comfy as your favorite tee while you’re unraveling the future of network security? That’s exactly how we kick off S1E10 – The Future of Network Security: SASE, SD-WAN, and Beyond. In this lively episode, we have a warm chat filled with humor, a little scotch, and a few laughs about our quest for the perfe…
…
continue reading

1
HN53 - AI’s Dirty Little Secret: Employees Leaking Data by Accident
24:46
24:46
Play later
Play later
Lists
Like
Liked
24:46In this episode, we’re uncovering the darker side of Generative AI and the emerging threats lurking behind everyday tools like ChatGPT and Copilot. Learn how sensitive information—ranging from customer data to employee benefits—can be leaked simply by typing it into a Gen AI prompt. We’ll also expose how cybercriminals are escalating their tactics,…
…
continue reading

1
Open Source vs. Proprietary Cyber Threat Intelligence: The Great Debate
50:09
50:09
Play later
Play later
Lists
Like
Liked
50:09Ever wonder how half-eaten pumpkin pie and dusty cybersecurity tools could possibly go together? In this spirited episode of Cyber After Hours—S1E9: The Future of Cyber Threat Intelligence: Open Source vs. Proprietary—we kick things off by raising a toast to our amazing listeners and swapping some hilarious post-Thanksgiving tales. Think family dra…
…
continue reading

1
HN52 - 800K Volkswagen EVs Hacked! Massive Data Breach & Mirai Botnet Attack Explained
21:55
21:55
Play later
Play later
Lists
Like
Liked
21:55🔒🚗 Volkswagen’s Massive 800K EV Data Breach & Mirai Botnet Threats Explained | Exploit Brokers Welcome back to Exploit Brokers! In today’s episode, we dive deep into two major cybersecurity threats shaking the automotive and industrial sectors: Volkswagen’s 800,000 EV Data Breach Discover how a misconfigured Amazon cloud storage led to the exposure…
…
continue reading

1
Cyber Hygiene: Protect Yourself from Digital Disease
48:06
48:06
Play later
Play later
Lists
Like
Liked
48:06Ever catch yourself hoping technology could ride in like a knight in shining armor to battle digital threats? In the newest episode of Cyber After Hours—S1E7 Cyber Hygiene: The Overlooked Essentials—we dive headfirst into the wild world of AI-powered scam disruption, ethical dilemmas, and everyday security practices that can save you serious headac…
…
continue reading

1
HN51 - Chinese Hackers Breach U.S. Treasury AND 3M Fake GitHub Stars Exposed
23:16
23:16
Play later
Play later
Lists
Like
Liked
23:16In this episode, we dive deep into two explosive cybersecurity stories making headlines right now: a major breach at the U.S. Treasury Department allegedly carried out by Chinese state-sponsored hackers, and the discovery of over 3.1 million fake stars on GitHub used to boost malicious repositories. We’ll explore how third-party vendor BeyondTrust …
…
continue reading

1
Cybersecurity Isn't About Tech - It's About Strategy
50:29
50:29
Play later
Play later
Lists
Like
Liked
50:29Ever wonder how personal finance mishaps and big-picture cybersecurity planning might collide? In this lively episode of Cyber After Hours—S1E6 What Does It Mean to be Strategic in Cybersecurity?—we kick off with humorous stories about our own investment choices (spoiler alert: real estate beats crypto in our portfolios!) before diving into the ser…
…
continue reading

1
Why Cybersecurity is WAY More Complex Than You Think
30:39
30:39
Play later
Play later
Lists
Like
Liked
30:39Ever imagine pneumonia changing your favorite drink from bourbon to gin and tonic? That’s exactly how we kick off this episode of Cyber After Hours—S1E5: “What Makes Cybersecurity So Complex and How Do We Get Over It?”—by sharing personal stories and unexpected shifts in our day-to-day routines. The big question on our minds is why cybersecurity fe…
…
continue reading

1
HN50 - IoT Webcams Hacked & 900k+ Health Records Exposed
25:36
25:36
Play later
Play later
Lists
Like
Liked
25:36In this eye-opening episode, we uncover the disturbing reality of IoT webcam vulnerabilities and explore how hackers are leveraging outdated firmware and previously discovered but unpatched exploits to infiltrate personal devices. From prying eyes in your own home to the colossal health data breach exposing over 900,000 patient records, the digital…
…
continue reading
Remember when iPods were the hot new thing? Ever wonder why we still call these shows “podcasts” even though iPods are practically museum pieces? In this new episode of Cyber After Hours—S1E4 The Evolving Role of AI in Cyber Defense—we take a playful look at tech’s most enduring terminologies, like “firewall” and “port," and uncover how nautical, h…
…
continue reading

1
HN49 - Fortnite Refund Update: Millions Refunded + Lazarus Group’s Crypto Hacks Revealed
23:15
23:15
Play later
Play later
Lists
Like
Liked
23:15We’re diving into two major stories shaking up the gaming and cybersecurity worlds! First, we discuss the Fortnite Refund Update, where the FTC has forced Epic Games to refund millions due to their use of dark patterns. Find out if you’re eligible for a refund and how to claim it. Then, we shift gears to the Lazarus Group, North Korea’s infamous ha…
…
continue reading

1
The Good, the Bad, and the Ugly of Cyber Vendor Consolidation
33:39
33:39
Play later
Play later
Lists
Like
Liked
33:39Ever felt like you're paying a “convenience fee” just to access your own data in the cloud? In our new Cyber After Hours episode—S1E3: The Good, the Bad, and the Ugly of Cyber Vendor Consolidation—we dive into exactly that dilemma. We start off by sharing a personal story of how we challenged a ridiculous vendor charge and actually won. It’s a remi…
…
continue reading
Uncover the fascinating yet chilling story of Hydra Market, the dark web’s largest illicit empire. Learn how this $1.35 billion platform operated, from smuggling narcotics and laundering money to offering hacking services. We’ll explore how its leader was sentenced to life in prison, the innovative (and illegal) technologies they used, and the glob…
…
continue reading

1
How to Build a Battle-Ready Cyber Incident Response Team
39:33
39:33
Play later
Play later
Lists
Like
Liked
39:33Ever been hit with unexpected costs that make you question whether profit outweighs protection? In this eye-opening new episode of Cyber After Hours—Incident Response: How to Build a Battle-Ready Team—we dive headfirst into a personal story that exposes one of cybersecurity’s biggest ethical dilemmas. Picture owning a security tool but still gettin…
…
continue reading

1
HN47 - Andrew Tate’s Platform Hacked by Activists + Russian Hackers Exploit Zero-Days
18:03
18:03
Play later
Play later
Lists
Like
Liked
18:03Andrew Tate's platform, formerly known as Hustler’s University, has been hacked, exposing the data of over 800,000 users. Meanwhile, Russian hackers have exploited critical zero-day vulnerabilities in Firefox and Windows, demonstrating the growing sophistication of cyberattacks. In this video, we’ll break down the Andrew Tate hack, the implications…
…
continue reading

1
How to Fix the Cybersecurity Skills Gap (and Why It Matters)
36:28
36:28
Play later
Play later
Lists
Like
Liked
36:28Ever get caught off guard by a cyber scam and wonder how you landed in the middle of it? In our very first episode of Cyber After Hours—S1E1: “Cybersecurity Skills Gap: The Role of Cross-Training and Mentorship”—we dive into all the hilarious missteps of starting a podcast, from battling those infuriating lip-smacking noises to hunting down the per…
…
continue reading

1
HN46 - Phobos’ $16M Haul & Helldown’s Secret Exploits – 2024’s Ransomware Crisis
27:53
27:53
Play later
Play later
Lists
Like
Liked
27:53In this episode, we dive deep into the world of ransomware with two of 2024's most talked-about threats: Phobos and Helldown. Learn how the Phobos ransomware operation managed to dominate 11% of the market, generating $16 million in ransom payments, and the shocking details of its admin’s extradition to the U.S. We also explore the rise of Helldown…
…
continue reading

1
HN45 - Malware Madness: How Remcos RAT and Human Error Fuel Cyber Threats
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15In today's episode, we dive deep into the fascinating yet troubling world of cybersecurity, exploring how even the most advanced antivirus software, firewalls, and endpoint security measures can fall short due to a single factor: human error. Despite the latest tech solutions, hackers continue to exploit one consistent vulnerability—users clicking …
…
continue reading

1
HN44 - Malicious Crack Tools & Malvertising Attack: How Hackers Steal Your Data
22:42
22:42
Play later
Play later
Lists
Like
Liked
22:42In today's episode, we’re diving into the hidden dangers of malicious installers, software cracks, and deceptive ads on Google. We'll explore recent stories, including the SteelFox malware that's hijacking Windows PCs, stealing credit card data, and mining cryptocurrency using vulnerable drivers. Plus, we’ll uncover a new wave of malvertising attac…
…
continue reading

1
HN43 - Dutch Police Take Down Major Information Stealers: Redline & Meta Stealer
10:45
10:45
Play later
Play later
Lists
Like
Liked
10:45In a significant international operation, Dutch police and global law enforcement partners have taken down two major information stealers: Redline and Meta Stealer. These dangerous malware operations targeted thousands of victims worldwide, stealing passwords, sensitive data, and more. This video explores how law enforcement agencies worked togethe…
…
continue reading

1
HN42 - Hackers Breach Internet Archive TWICE – How Safe is Your Data?
16:12
16:12
Play later
Play later
Lists
Like
Liked
16:12The Internet Archive has been breached… AGAIN! 🛑 This time, hackers managed to compromise sensitive user data not once, but twice, exploiting stolen GitLab and Zendesk tokens. In this episode of Exploit Brokers, we break down what went wrong, why access tokens are crucial for cybersecurity, and how this breach could have been prevented. 🚨 We’ll div…
…
continue reading