The award-winning WIRED UK Podcast with James Temperton and the rest of the team. Listen every week for the an informed and entertaining rundown of latest technology, science, business and culture news. New episodes every Friday.
…
continue reading
المحتوى المقدم من Exploit Brokers. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Exploit Brokers أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
HN41 - Chinese Hackers Hijack US Telecom Networks
MP3•منزل الحلقة
Manage episode 444513401 series 3144149
المحتوى المقدم من Exploit Brokers. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Exploit Brokers أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
In this eye-opening episode of Exploit Brokers, your host Lauro dives deep into the recent cyberattacks that have compromised major U.S. telecommunications networks. Chinese state-sponsored hackers, known as Salt Typhoon, have exploited a 30-year-old backdoor mandated by U.S. law, targeting giants like AT&T, Lumen (formerly CenturyLink), and Verizon. Drawing inspiration from Friedrich Nietzsche's quote: "He who fights with monsters should look to it that he himself does not become a monster... when you gaze long into the abyss, the abyss also gazes into you." We explore how attempts to control and monitor can sometimes backfire, creating vulnerabilities that malicious actors can exploit. If you find this content valuable, please like, subscribe, and hit the bell notification icon to stay updated. For our listeners on Spotify or Apple Podcasts, please leave a review and follow us—it greatly helps in reaching more people. Join the conversation and let's navigate the complexities of cybersecurity together! Relevant Hashtags: #Cybersecurity #ChineseHackers #VoltTyphoon #TelecomSecurity #InternetBackdoor #CALEA #DataBreach #CyberThreats #DigitalPrivacy #Encryption #LawfulSurveillance #TechNews #ExplorerBrokers #AT&T #Verizon #Lumen #TechCrunch #WallStreetJournal #Nietzsche #CyberWarfare #StayInformed 👍 Enjoyed the video? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Follow us on social media: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers ## Source 30-Year-Old backdoor hacked: https://techcrunch.com/2024/10/07/the-30-year-old-internet-backdoor-law-that-came-back-to-bite/
…
continue reading
55 حلقات
MP3•منزل الحلقة
Manage episode 444513401 series 3144149
المحتوى المقدم من Exploit Brokers. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Exploit Brokers أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
In this eye-opening episode of Exploit Brokers, your host Lauro dives deep into the recent cyberattacks that have compromised major U.S. telecommunications networks. Chinese state-sponsored hackers, known as Salt Typhoon, have exploited a 30-year-old backdoor mandated by U.S. law, targeting giants like AT&T, Lumen (formerly CenturyLink), and Verizon. Drawing inspiration from Friedrich Nietzsche's quote: "He who fights with monsters should look to it that he himself does not become a monster... when you gaze long into the abyss, the abyss also gazes into you." We explore how attempts to control and monitor can sometimes backfire, creating vulnerabilities that malicious actors can exploit. If you find this content valuable, please like, subscribe, and hit the bell notification icon to stay updated. For our listeners on Spotify or Apple Podcasts, please leave a review and follow us—it greatly helps in reaching more people. Join the conversation and let's navigate the complexities of cybersecurity together! Relevant Hashtags: #Cybersecurity #ChineseHackers #VoltTyphoon #TelecomSecurity #InternetBackdoor #CALEA #DataBreach #CyberThreats #DigitalPrivacy #Encryption #LawfulSurveillance #TechNews #ExplorerBrokers #AT&T #Verizon #Lumen #TechCrunch #WallStreetJournal #Nietzsche #CyberWarfare #StayInformed 👍 Enjoyed the video? Give it a like and share your thoughts in the comments below! 🔔 Don't forget to subscribe and hit the notification bell to stay updated on all things cybersecurity and tech. Listen to our podcast on: Apple Podcasts Spotify And wherever you get your podcasts! Follow us on social media: Newsletter: https://follow.exploitbrokers.com Twitter: @ExploitBrokers Medium: https://medium.com/@exploitbrokers TikTok: https://www.tiktok.com/@exploitbrokers ## Source 30-Year-Old backdoor hacked: https://techcrunch.com/2024/10/07/the-30-year-old-internet-backdoor-law-that-came-back-to-bite/
…
continue reading
55 حلقات
ทุกตอน
×مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.