show episodes
 
Mike 'Thomas Paine' Moore is a journalist and broadcaster and today serves as True Pundit's chief muckraker. He previously worked for the FBI, White House, DEA, among many other Intel agencies and private concerns. Moore is the recipient of the coveted Gerald Loeb Award for journalism and two-time Pulitzer Prize for Investigative reporting nominee. As a Certified Fraud Examiner, Moore previously headed anti-money laundering operations for Citi in Chicago, Los Angeles, Delaware and portions o ...
 
The OSINT Curious Project is a source of quality, actionable, Open Source Intelligence news, original blogs, instructional videos, and a bi-weekly webcast/podcast. Most of all, we want to inspire people to look outside of their OSINT-comfort zones and pursue their OSINT passions. We try to keep people curious about exploring web applications for bits of information or trying out new techniques to access important OSINT data. We are an OSINT-learning catalyst.
 
This is the Open Source Intelligence (OSINT) podcast. Here I will discuss news related to social media, data privacy, open source intelligence, investigative journalism as well as talk about tools and resources you can use to improve your research. You might also find interviews with people in the field that have unique insight and bring value to the show.
 
Social engineers and OSINT investigators always seem to have a great story. And you can hear many of those stories through their presentations at the Layer 8 Conference in Providence, RI in June. But not every story can fill a whole presentation and not all storytellers can get to the conference, which brings us here. This podcast will only be stories, told by the investigators themselves. No interviews, no slides, just stories. Some might be as short as five minutes, some may even go for 45 ...
 
CyberSpeaksLIVE is a weekly InfoSec podcast series hosted by Duncan McAlynn (@infosecwar) and his special guest co-hosts, where YOU get to participate in the discussions with full video and audio. Following the live recording, we add the audio-only stream into our podcast feed for our awesome subscribers. CyberSpeaksLIVE gives YOU, the InfoSec community, a voice that can be heard around the world! Follow us on Twitter for upcoming guests announcements and live recording invites, @cyberspeaks ...
 
The School of Security Studies harnesses the depth and breadth of expertise across War Studies and Defence Studies to produce world-leading research and teaching on issues of global security that develops new empirical knowledge, employs innovative theory, and addresses vital policy issues. The podcasts highlight the School's research and teaching activities as well as cover events the department organises for its students and the public. DISCLAIMER: Any information, statements or opinions c ...
 
We empower industry professionals with relevant real-world training to enhance their professional credentials and skill sets. We provide online courses & board certifications in the areas of Cyber Investigations, Intelligence, Counterintelligence, eCommerce Fraud, Loss Prevention, Digital & Mobile Forensics, Fraud Investigations, Cyber Crime, Human Trafficking, Deception Detection, Criminal Investigations, Leadership & more.
 
Welcome to Tac Ops, a podcast dedicated to information about militaries from around the world. Hosts Greg, founder of YouTube channel Covert Cabal, and Eric, US Navy Submariner Veteran and founder of r/Submarines subreddit, interview a wide array of guests with specific military knowledge.
 
Loading …
show series
 
This week I present a new secure communications comparison project which may help you identify the best private messenger products for email, text, voice, and video communications.Support for this show comes directly from sales of my books. More details can be found at https://inteltechniques.com/books.html.Listen to ALL episodes at https://intelte…
 
This week Katie Moussouris hangs out to talk about both the advantages as well as challenges in running bug bounty programs. My 3 main takeaways were when companies should choose a bounty as opposed to a pen test, where a company should be at operationally before launching a program and how companies should prepare before launching their bug bounty…
 
This week’s guest is Julia Bayer (@bayer_julia) Julia Bayer is an investigative journalist, innovation manager and trainer at Deutsche Welle. At DW´s Investigative unit she is diving deep online collecting publicly available sources to uncover the (in)visible using OSINT. Before that she researched and verified UGC for (breaking) news at DW´s Socia…
 
America’s NSA reviews twenty-five vulnerabilities under active exploitation by Chinese intelligence services. The UK’s NCSC accuses the GRU of more international cyberattacks. The US Justice Department brings its long-expected anti-trust suit against Google. Ben Yelin examines overly invasive company Zoom policies. Our guest is Jessica Gulick from …
 
Cold War Moscow was a place like no other. The eyes and ears of the Soviet secret police, the KGB, were everywhere; the only place that was really safe, one political prisoner would later write, was in your dreams... Professor Mike Gooman, Head of the Department of War Studies, and expert in the history of intelligence joins us for the first episod…
 
Updates on influence ops and campaign hacking show that the opposition has its troubles, too. TrickBot operators seem to have returned to business. Schools’ remote learning programs are providing attractive targets for cybercriminals. Iranian news outlets say ports were the targets of last week’s cyberattacks. David Dufour explains how phishing cam…
 
In episode 143 for October 19th 2020: Microsoft gets creative to help take down the TrickBot botnet, details on how attackers have been using VPN flaws to attack election support systems, and Zoom’s rollout of end-to-end encryption. ** Links mentioned on the show ** “The Social Dilemma” A Conversation about the Pros and Cons of Social Media https:/…
 
SPECIAL PAINE in the Morning -- From OCT. 9 -- Federal Judge Drops Massive Bomb on Clinton Foundation, Reveals IRS Cover Up — Judge Blows Roof Off Protection Racket in Moynihan & Doyle $2.5 BILLION Case Against Clinton’s Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Mike Moore
 
Senior VP of Cyber Operations at KnowBe4, Rosa Smothers, talks about her career as an early cybersecurity professional in what she describes as the Wild, Wild West to her path through government intelligence work. Rosa shares how she always knew she wanted to be involved with computers and how being a big Star Trek nerd and fan particularly of Spoc…
 
pAINE aFTER dARK -- Special Episode with a Special Guest Checking in on Saturday Night -- Bonus Sneak Peek from the Subscriber-Only platforms patreon.com/truepundit and subscribestar.com/truepundit Subscriber-Only Show. Join Now & Support Our Old-School Journalism Learn more about your ad choices. Visit megaphone.fm/adchoices…
 
Bitdefender researchers recently uncovered a sophisticated APT-style attack targeting an international architectural and video production company. The attack shows signs of industrial espionage, similar to another of Bitdefender’s recent investigations of the StrongPity APT group. The real-estate industry is highly competitive, and information exfi…
 
Ep 45 -- EXCLUSIVE: Paine Interviews Decorated Intel Agent Who Put Together a Hunt-and-Kill Squad to Bag Osama bin Laden in Iran: The Goal? "Bring bin Laden's Head Back in a Bag" and Grab $25 Million Reward -- Until the U.S. Govt. Threatened The Team Learn more about your ad choices. Visit megaphone.fm/adchoices…
 
Phishing through redirector domains. Content moderation, influence operations, and Section 230. A Twitter outage is due to an error, not an attack. QQAAZZ money-laundering gang members indicted. Johannes Ullrich tracks Mirai Bots going after Amanda backups. Our guest is Richard Hummel from Netscout with research on cybersecurity trends and forecast…
 
Ep. 45 -- EXCLUSIVE: Paine Interviews Decorated Intel Agent Who Put Together a Hunt-and-Kill Squad to Bag Osama bin Laden in Iran: The Goal? "Bring bin Laden's Head Back in a Bag" and Grab $25 Million Cash Reward -- Until the U.S. Govt. Threatened to Indict The Team Learn more about your ad choices. Visit megaphone.fm/adchoices…
 
Tehran says this week’s cyberattacks are under investigation. Silent Librarian returns to campus for academic year 2020-2021. Crooks are posing as nation-state hackers. Domestic disinformation reported in Guinea and Ghana. Disinformation, content moderation, and the difficulties presented by both. US Cyber Command’s forward engagement campaign. Mik…
 
Reports of cyberattacks against Iranian government and, possibly, economic targets, are circulating, but details are sparse. Norway accuses Russia of hacking parliamentary emails. A cybercriminal gang’s secret is volume. A social engineering campaign singles out victims with US IP addresses. Joe Carrigan on a million dollar REvil recruitment offer.…
 
Trickbot gets hit by both US Cyber Command and an industry team led by Microsoft. CISA and the FBI warn that an unnamed threat actor is chaining vulnerabilities, including Zerologon, to gain access to infrastructure and government targets. Ben Yelin shares his thoughts on the US House’s report on monopoly status for some of tech's biggest players. …
 
In this episode, Chris Hadnagy and Ryan MacDougall are joined by distinguished professor: Elizabeth Loftus. Listen in to understand the vulnerabilities in human memories and how they are sometimes exploited. Learn to defend against attacks on your memory and how this info can be applied in the information security industry. 00:01 – Introduction to …
 
Ben describes a decades-long global espionage campaign alleged to have been carried out by the CIA and NSA, Dave shares a story about the feds using cell phone location data for immigration enforcement, and later in the show our conversation with Drew Harwell from the Washington Post on his article on how Colleges are turning students’ phones into …
 
In episode 142 for October 12th 2020: My conversation about the pros and cons of the Netflix documentary “The Social Dilemma” with frequent guest, Kevin Johnson. The Social Dilemma is a popular documentary (dramamentary?) on Netflix about how social media is causing unintended harm to people and society. Several engineers and leaders that worked at…
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login