Artwork

Contenido proporcionado por Cyber Crime Junkies. Host David Mauro.. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Cyber Crime Junkies. Host David Mauro. o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.
Player FM : aplicación de podcast
¡Desconecta con la aplicación Player FM !

Why Cyber Attacks are Not All Equal

33:01
 
Compartir
 

Manage episode 462630963 series 3559123
Contenido proporcionado por Cyber Crime Junkies. Host David Mauro.. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Cyber Crime Junkies. Host David Mauro. o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

Have you ever wondered why cyber attacks are not all equal? Why some of the most significant data breaches in history didn't lead to your personal information being sold on the dark web? When Data Breaches Are Really Espionage?
Why did the stolen data from breaches like Anthem, Starwood/Marriott, OPM, and Equifax vanish into the ether, while other breaches see data auctioned off to the highest bidder?
Let's delve into these mysteries, each a tale of intrigue and unseen adversaries.

Send us a text

Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

Capíttulos

1. Understanding the Dark Web and Data Valuation (00:00:00)

2. Introduction to Cybercrime and Data Breaches (00:03:29)

3. The Anatomy of Data Breaches (00:05:47)

4. Case Studies: Anthem and Marriott Breaches (00:09:34)

5. Exploring the OPM and Equifax Breaches (00:12:23)

6. The Role of State-Sponsored Actors (00:14:30)

7. How To Know If You Have Been Hacked (00:18:48)

8. Why Not All Cyber Attacks Are Equal (00:22:19)

9. Why Businesses Are Targeted In Cyber Attacks (00:26:02)

229 episodios

Artwork
iconCompartir
 
Manage episode 462630963 series 3559123
Contenido proporcionado por Cyber Crime Junkies. Host David Mauro.. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Cyber Crime Junkies. Host David Mauro. o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

Have you ever wondered why cyber attacks are not all equal? Why some of the most significant data breaches in history didn't lead to your personal information being sold on the dark web? When Data Breaches Are Really Espionage?
Why did the stolen data from breaches like Anthem, Starwood/Marriott, OPM, and Equifax vanish into the ether, while other breaches see data auctioned off to the highest bidder?
Let's delve into these mysteries, each a tale of intrigue and unseen adversaries.

Send us a text

Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

Capíttulos

1. Understanding the Dark Web and Data Valuation (00:00:00)

2. Introduction to Cybercrime and Data Breaches (00:03:29)

3. The Anatomy of Data Breaches (00:05:47)

4. Case Studies: Anthem and Marriott Breaches (00:09:34)

5. Exploring the OPM and Equifax Breaches (00:12:23)

6. The Role of State-Sponsored Actors (00:14:30)

7. How To Know If You Have Been Hacked (00:18:48)

8. Why Not All Cyber Attacks Are Equal (00:22:19)

9. Why Businesses Are Targeted In Cyber Attacks (00:26:02)

229 episodios

Todos los episodios

×
 
Loading …

Bienvenido a Player FM!

Player FM está escaneando la web en busca de podcasts de alta calidad para que los disfrutes en este momento. Es la mejor aplicación de podcast y funciona en Android, iPhone y la web. Regístrate para sincronizar suscripciones a través de dispositivos.

 

Guia de referencia rapida

Escucha este programa mientras exploras
Reproducir