goodlisten

Clip

Russian Hackers Target Fortune 500 Companies in SolarWinds Breach
listen on SpotifyListen on Youtube
30:30 - 33:20 (02:49)

In the SolarWinds cyber-attack, Russian hackers were able to access every email of every client from the Fortune 500 to several US government agencies. This was accomplished through known exploits and widely available passwords, proving the need for increased cybersecurity measures.

Similar Clips
A team spends time preparing for a network attack by learning about the network and pairing infrastructure with necessary exploits to attack targets such as servers, social media accounts, email addresses, bank accounts, and mobile accounts.
47:21 - 52:13 (04:52)
listen on Spotify
Network Security
Summary

A team spends time preparing for a network attack by learning about the network and pairing infrastructure with necessary exploits to attack targets such as servers, social media accounts, email addresses, bank accounts, and mobile accounts.

Chapter
Preparing for a Cyber Attack
Episode
Ep 50: Operation Glowing Symphony
Podcast
Darknet Diaries
Elon Musk, Jack Dorsey, and Vijaya Gadde discuss Big Tech censorship after revelations that the FBI helped flag content for Twitter to remove.
1:22:51 - 1:23:51 (01:00)
listen on SpotifyListen on Youtube
Censorship
Summary

Elon Musk, Jack Dorsey, and Vijaya Gadde discuss Big Tech censorship after revelations that the FBI helped flag content for Twitter to remove. While some were not surprised, the impact on free speech raises concerns about government control over platforms including Facebook and YouTube.

Chapter
Government PsyOps and Overzealous Liberals
Episode
E109: 2022 Bestie Awards Live from Twitter HQ
Podcast
All-In with Chamath, Jason, Sacks & Friedberg
Former NSA hackers developed reliable and easy-to-use tools for agencies, which they further enhanced using their fuzz farms and skills, to create seamless, click-and-shoot operations.
40:10 - 43:26 (03:16)
listen on Spotify
NSA Hackers
Summary

Former NSA hackers developed reliable and easy-to-use tools for agencies, which they further enhanced using their fuzz farms and skills, to create seamless, click-and-shoot operations. These tools are maintained in a catalog that can be checked when the hackers want to access a certain system.

Chapter
Cyber Espionage and North Korea
Episode
98: Zero Day Brokers
Podcast
Darknet Diaries
The CIA needed a specialized ship in order to recover a sunken Soviet submarine during the Cold War, and they turned to Howard Hughes and the Summa Corporation to design and build it from scratch.
16:29 - 17:05 (00:36)
listen on SpotifyListen on Youtube
CIA, Howard Hughes, Cold War, Summa Corporation
Summary

The CIA needed a specialized ship in order to recover a sunken Soviet submarine during the Cold War, and they turned to Howard Hughes and the Summa Corporation to design and build it from scratch.

Chapter
Howard Hughes' Secret Deep Sea Mining Ship
Episode
Selects: Project Azorian: The CIA's Super 70s Mission To Steal A Sunken Soviet Sub
Podcast
Stuff You Should Know
The Shadow Brokers, a group that published hacking tools stolen from the NSA, has gone quiet for over two years.
43:31 - 44:30 (00:59)
listen on Spotify
Hacking
Summary

The Shadow Brokers, a group that published hacking tools stolen from the NSA, has gone quiet for over two years. While it appears that Russia might be behind the group, no one knows for certain, and the hunt for the group's true identity and intentions continues.

Chapter
Possible Inexperienced Hacker Using Shadow Brokers' Hacks
Episode
53: Shadow Brokers
Podcast
Darknet Diaries