hacker

Man Accused of Snowflake Customer Data Breaches Arrested
A Canadian resident, Alexander “Connor” Moucka, was arrested by Canadian law enforcement at the request of the United States for allegedly stealing sensitive data of myriad corporations like AT&T and Santander Bank ...
Security Boulevard

Hackers Turn to AI as Hardware Attacks Surge
There has been a sharp increase in the perceived value of AI technologies in hacking, according to a report from Bugcrowd platform, which surveyed 1,300 ethical hackers and security researchers ...
Security Boulevard

SquareX at Hacker Summer Camp: Black Hat USA 2024 Day 1
Behind the scenes at one of the world’s largest cybersecurity conferencesThe Black Hat USA and DEF CON conferences, both held annually in Las Vegas, are collectively known as “Hacker Summer Camp.” This ...
Alyssa Miller: Charting the Course Through InfoSec and Aviation
Tom Eston | | Alyssa Miller, aviation, Business, career, CISO, Cloud, Cloud Security, conference, Cyber Security, Cybersecurity, Cybersecurity Industry, Data Privacy, Digital Privacy, Episodes, hacker, HR, Information Security, Infosec, jobs, Pilot, Podcast, Podcasts, Privacy, recruiting, security, technology, Weekly Edition
In this episode, special guest Alyssa Miller joins the hosts for an insightful and entertaining conversation covering a broad range of topics from social engineering anecdotes involving Kevin Johnson to Alyssa’s journey ...
Educating the Next Cybersecurity Generation with Tib3rius
Tom Eston | | Application Security, AppSec, Bug Bounties, bug bounty, Burp Suite, career, Content Creation, Cyber Security, Cybersecurity, cybersecurity career, Data Privacy, Digital Privacy, Episodes, hacker, Hacking, Information Security, Infosec, penetration tester, Penetration Testing, pentesting, Podcast, Podcasts, Privacy, security, TCM Security, technology, Tib3rius, training, Veracode, Web App Hacking, Web Application Hacking, web applications, Web Apps, Weekly Edition
In this episode we explore the remarkable journey of Tib3rius, a web application hacking expert and content creator. In this engaging conversation, we discuss: Tib3rius’ passion for community education and content creation ...

Meet Hackie-AI, The New Kid on the Block.
John P. Gormally, SR | | Artificial Intelligence, Cybersecurity, hacker, machine learning, Threat Intelligence
Meet Hackie-AI, The New Kid on the Block.2 min read·Just now--Seeing global hackers on Interpol, FBI, and Scotland Yard’s top ten list may soon become a thing of the past. Replacing the ...

Is that how it works? Hacking and scamming in popular TV shows
We like a good hacker story—and like the screens we watch them on, these stories come in wide array of shapes and sizes. ...

SaaS Attacks: Compromising an Organization without Touching the Network
Tom Eston | | Attack Framework, attacker, blue team, Cloud, Cloud Penetration Testing, cloud-based, Compromise, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, hacker, Hacking, Information Security, Infosec, lateral movement, Luke Jennings, MITRE ATT&CK, MITRE ATT&CK Framework, network, network attacks, Network penetration testing, Podcast, Podcasts, Privacy, Push Security, Red Team, SaaS, SaaS Application, SaaS Attacks, security, Software-as-a-Service, Special Editions, technology, Weekly Edition
In this episode Luke Jennings VP of Research & Development from Push Security joins us to discuss SaaS attacks and how its possible to compromise an organization without touching a single endpoint ...

NY Courts: Who is Liable When Cryptocurrency is Stolen?
One of the great things about the blockchain and cryptocurrency is the fact that it operates outside the commercial banking system. Unfortunately, this means that when cryptocurrency is stolen (or, more accurately, ...
Security Boulevard

Attacker ID’ed After Infecting Own Computer With Malware
A threat actor that goes by the name of “La_Citrix” inadvertently infected his own computer. Cyberthreat research firm sent his information on to law enforcement ...
Security Boulevard