Hacker Public Radio

HPR3997: The Oh No! News.


Listen Later

The Oh No! news.
Oh No! News is Good
News.
TAGS: Oh No, News, Threat analysis, InfoSec, Google
Dynamic Search Ads
Threat analysis;
your attack surface.
Source: Former
NHS secretary found guilty of illegally accessing medical
records
A former NHS employee has been found guilty and fined for illegally
accessing the medical records of over 150 people.
Loretta Alborghetti, from Redditch, worked as a medical secretary
within the Ophthalmology department at Worcestershire Acute Hospitals
NHS Trust when she illegally accessed the records.
Supporting Source: Open
Street Map link to Redditch Worcestershire.
Source: NetSupport
RAT Infections on the Rise. Targeting Government and Business
Sectors
While NetSupport Manager started off as a legitimate remote
administration tool for technical assistance and support, malicious
actors have misappropriated the tool to their own advantage, using it as
a beachhead for subsequent attacks.
Source: Beware:
Malicious Google Ads Trick WinSCP Users into Installing
Malware
The threat actors are believed to leverage Google's Dynamic Search
Ads (DSAs), which automatically generates ads based on a site's content
to serve the malicious ads that take the victims to the infected
site.
Source: Trojanized
PyCharm Software Version Delivered via Google Search Ads.
Victims who clicked on the ad were taken to a hacked web page with a
link to download the application, which turned out to install over a
dozen different pieces of malware instead.
InfoSec; the language
of security.
Source: Why
Defenders Should Embrace a Hacker Mindset
Additional Information.
What is a "Data
Breach"? A data breach is a security violation, in which sensitive,
protected or confidential data is copied, transmitted, viewed, stolen,
altered or used by an individual unauthorized to do so.
What is "Malware"?
Malware (a portmanteau for
malicious software) is any software intentionally designed to cause
disruption to a computer, server, client, or computer network, leak
private information, gain unauthorized access to information or systems,
deprive access to information, or which unknowingly interferes with the
user's computer security and privacy.
What is a "Payload"?
In the context of a computer virus or worm, the payload is the portion
of the ma
...more
View all episodesView all episodes
Download on the App Store

Hacker Public RadioBy Hacker Public Radio

  • 4.2
  • 4.2
  • 4.2
  • 4.2
  • 4.2

4.2

34 ratings


More shows like Hacker Public Radio

View all
The Changelog: Software Development, Open Source by Changelog Media

The Changelog: Software Development, Open Source

289 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

373 Listeners

LINUX Unplugged by Jupiter Broadcasting

LINUX Unplugged

268 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

653 Listeners

Curious Cases by BBC Radio 4

Curious Cases

826 Listeners

The Strong Towns Podcast by Strong Towns

The Strong Towns Podcast

422 Listeners

Late Night Linux by The Late Night Linux Family

Late Night Linux

164 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,046 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

181 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

189 Listeners

TechCrunch Daily Crunch by TechCrunch

TechCrunch Daily Crunch

42 Listeners

Strict Scrutiny by Crooked Media

Strict Scrutiny

5,809 Listeners

2.5 Admins by The Late Night Linux Family

2.5 Admins

98 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

140 Listeners

What the Hack? by DeleteMe

What the Hack?

221 Listeners