15 episodes

A podcast that follows CheckPoint's Threat Intelligence Group analysts and researchers as they scour the internet for new threats and vulnerabilities.

Produced by PI Media LTD

CPradio PI Media

    • Technology
    • 5.0 • 4 Ratings

A podcast that follows CheckPoint's Threat Intelligence Group analysts and researchers as they scour the internet for new threats and vulnerabilities.

Produced by PI Media LTD

    [CPRadio] War on All Fronts: Rampant Kitten

    [CPRadio] War on All Fronts: Rampant Kitten

    A man goes on Dubai T.V to discuss national security in the Middle East. 1,000 miles north, a social activist uses Telegram to organize anti-government activity. 5,000 miles north, an immigrant applies for a driver's license in Sweden. None of these people know one another, but they're all about to fall victim to the same attack. An attack that changes the way we view one of the world's biggest powers.
     

    • 23 min
    [CPRadio] SIGRED: Hijacking Microsoft Windows Server

    [CPRadio] SIGRED: Hijacking Microsoft Windows Server

    DNS is the phone book of the internet--it's how your computer knows where to go to reach the website you want to visit. It's no stretch to say that, without functioning DNS, the internet as we know it could not exist. So imagine what would happen if you could completely compromise it..

    • 19 min
    [CPRadio] Alexa, What's Going On?

    [CPRadio] Alexa, What's Going On?

    Most people place their virtual assistants in their living room or bedroom. This makes it very easy to interact with cyberspace while you're laying around, watching T.V., or doing dishes. It also means that you're allowing a listening device into the most sensitive spaces in your home. What if somebody were able to take control of that device? To make commands on your behalf, interact with your personal data, and listen to you when you don't realize it?

     

    • 21 min
    [CPRadio] Instagram: The Problem With Open-Source

    [CPRadio] Instagram: The Problem With Open-Source

    When Gal Elbaz came across a modest GIF parser sitting in a remote corner of GitHub, he wasn't exactly looking for trouble. But he found it. What was so troublesome about this parser in particular? It wasn't popular, it was created by some unknown programmer, and it didn't have any extraordinary qualities. Except it was familiar. Gal had seen this code before...

    • 23 min
    [CPRadio] TikTok and the Cybersecurity Challenge

    [CPRadio] TikTok and the Cybersecurity Challenge

    Major tech companies understand that their brands are only as strong as they are safe to use, so they set bounties on vulnerabilities: hundreds of thousands of dollars, a million dollars, to any programmer who can find a hole in their sites. White hat hackers comb every line of code to try and earn the grand prize, and in return, the companies gain peace of mind knowing the smartest minds out there can’t break in.
    You might think, then: if so much money goes towards securing these platforms, they must be unbreakable. But you’d be surprised what’s out there.
    In the next few episodes of CPRadio, we're going to run through--step by step--how to hack some of the world's biggest apps. We begin, here, with Tik Tok.

    • 26 min
    [CPRadio] Operation Tripoli

    [CPRadio] Operation Tripoli

    In 2015, Khalifa Haftar--a fierce military general, known as "Libya's most potent warlord"--began an operation to take over the state of Libya. He led an insurgent army, slowly taking over the country's southern lands, headed straight for the capital of Tripoli. All the while, 'Khalifa Haftar' on Facebook was publishing updates about the war, even top-secret documents, to thousands of fans.
    Why was one of the world's most significant military leaders posting classified documents to Facebook? He wasn't, of course. But what was actually going on was just as strange.

    • 26 min

Customer Reviews

5.0 out of 5
4 Ratings

4 Ratings

Top Podcasts In Technology

Listeners Also Subscribed To