36 episodes

Welcome to the HackableYou Podcast!
Join us as we sit down, crack open a beer and delve into the topic of cyber security.
With insights into Cyber News, Threat Intelligence, Incident Response and general SOC shenanigans. We aim to inform, educate and entertain all of our listeners whether you are a CISO, Security Engineer/Analyst or are just curious on the topic.

All that is left for you to do now is sit back, follow or subscribe and enjoy the HackableYou Podcast!

HackableYou Podcast HackableYou

    • Technology
    • 5.0 • 4 Ratings

Welcome to the HackableYou Podcast!
Join us as we sit down, crack open a beer and delve into the topic of cyber security.
With insights into Cyber News, Threat Intelligence, Incident Response and general SOC shenanigans. We aim to inform, educate and entertain all of our listeners whether you are a CISO, Security Engineer/Analyst or are just curious on the topic.

All that is left for you to do now is sit back, follow or subscribe and enjoy the HackableYou Podcast!

    T-Mobile Breach, Docker Containers, Make a House a SOC

    T-Mobile Breach, Docker Containers, Make a House a SOC

    T-Mobile Breach, Docker Containers, Make a House a SOC
    In this episode, we dive into the recent T-Mobile breach exposing millions of customers' data. We look at recent arrests for hacker-for-hire actors who made money hacking your iCloud to steal sensitive images and lastly new ShinyGoblin APT using tactics we may have seen used by the Winti group before.
    The topic of the week we touch on the topic of containerization and Docker, the uses and security threats against the modern DevOps tech.
    In our exclusive segment, Secrets from The SOC, Alex and I explain how we have made our house a SOC during the pandemic and allow us to be productive as we move into a remote working model.

    • 41 min
    Accenture Ransomware, ALPHABAY is Back, Attack Simulation

    Accenture Ransomware, ALPHABAY is Back, Attack Simulation

    This episode brings you some great conversation on the week's cyber news. We report on the cyberattack against Accenture, holding them for ransom. New Phishing tactics are seen using morse-code to bypass security controls and the infamous ALPHABAY is back baby. With a new look and new rules which raise an eyebrow....

    The topic of the week looks into Attack Simulation and how you can use tools like Atomic RedTeam, CALDERA, and the Attack Range tool to test and verify your security control configuration against the modern attacks of today.

    As we mentioned in the Podcast, what do you think the 5th stage of ransomware might be? Let us know on info@hackableyou.com and we will read some out next time round! 

    Thanks for listening and supporting us so far! Share with a friend or colleague. 



    Ed, Alex and Will.

    HackableYou



    Atomic Red Team: https://github.com/redcanaryco/atomic-red-team

    MITRE Caldera: https://github.com/mitre/caldera

    Attack Rage (Splunk): https://github.com/splunk/attack_range

    • 38 min
    No More Ransom, USB Cyber Attacks, Old School vs. New School SOCs

    No More Ransom, USB Cyber Attacks, Old School vs. New School SOCs

    Hello and welcome back, it's great to have you here. 

    In this episode's Cyber News we cover Imperial Kitten/Tortoiseshell using fake Facebook profiles to masquerade as Aerobics instructors in order to exploit defence aerospace contractors, some positive news on the money saved via the No More Ransom movement and we also discuss how an infamous ransomware gang have been hit by ransomware themselves...

    In the topic of the week, we delve into the world of USB attacks and go over the 4 types of USB attacks with examples and discuss USB attack defences. 

    Lastly in Secrets from the SOC we go over what an Old School SOC would do and compare that to how a New School SOC operates. Which one are you working in?



    As always we would love to hear from you, please get in touch: info@hackableyou.com



    == TIMESTAMPS ==

    Cyber News: 02:24

    Topic of the Week: 14:34

    SFTS: 22:48

    • 35 min
    Kaseya Ransomware, Password Attacks, SOC and IR APIs

    Kaseya Ransomware, Password Attacks, SOC and IR APIs

    In this episode we look into cyber news including; Kaseya supply chain ransomware attacks, Chinese hackers exploiting another 0day in a Solarwinds solution, and the critical Microsoft patch dubbed "PrintNightmare".

    In our topic of the week, we dive into the realm of Password Attacks looking at both active and passive attacks as well as the defences.

    As always in our exclusive segment Secrets from the SOC, we provide you with some practical insight into some great APIs you can hook into to help your SOC investigations. 

    We would love to hear your feedback, please get in contact at info@hackableyou.com

    Enjoy this episode!!

    • 40 min
    NOBELIUM Microsoft Compromise, Code Signing Attacks, File Hashing

    NOBELIUM Microsoft Compromise, Code Signing Attacks, File Hashing

    NOBELIUM Microsoft Compromise, Code Signing Attacks, File Hashing

    You’re listening to the HackableYou Podcast.

    In this episode we report on Microsoft’s ongoing research into the Nobelium hacking group's activities, a data beach impacting Mercedes-Benz and more Web scraped LinkedIn data up for sale.

    The topic of the week touches on the subject of Code Signing, attacks, and countermeasures.

    Lastly, in Secrets from the SOC we discuss the use of file hashing and how you can use it in your role as a security analyst.

    Thanks for tuning in and we hope you enjoy!

    Timestamps:

    Cyber News: 2:50

    Topic: 17:21

    SFTS: 26:35

    Alert Logic Cloud Migration Webinar - https://tinyurl.com/WebinarCloudMigration

    • 35 min
    ANOM Arrests, Capture The Flag, Law Enforcement

    ANOM Arrests, Capture The Flag, Law Enforcement

    In this episode of the HackableYou Podcast, we highlight top cyber news including JBS Foods' ransom payment, TrickBot coder's 10-year jail sentence, and the FBI purpose-built encrypted device network deliberately created to catch criminals leading to tonnes of seized drugs and arrests.

    In Topic of The Week, we provide our top tips for a Capture The Flag exercise and how you can sharpen your approach to the mystery vulnerable boxes. 

    Lastly, in Secrets from The SOC, we give you sound advice on what to expect and how to work with Law Enforcement. 

    As always, we LOVE hearing from you, please get in touch and ask us questions or tell us stories at info@hackableyou.com

    • 35 min

Customer Reviews

5.0 out of 5
4 Ratings

4 Ratings

pete375 ,

Quantum computing

Given IBM have 18 quantum computers how far away are we from quantum computing have an impact on the cyber security world?

Top Podcasts In Technology

Listeners Also Subscribed To