• About
  • Disclaimer
  • Privacy Policy
  • Contact
Friday, June 6, 2025
Cyber Defense GO
  • Login
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
Cyber Defense Go
No Result
View All Result
Home Cyber Security

A crypto con alternate, and hovering ticket scams • Graham Cluley

Md Sazzad Hossain by Md Sazzad Hossain
0
A crypto con alternate, and hovering ticket scams • Graham Cluley
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter


Smashing Security podcast #405: A crypto con exchange, and soaring ticket scams

From shadowy Bitcoin exchanges to Interpol’s most needed, Alexander Vinnik was the alleged kingpin behind BTC-e, a $4bn crypto laundering empire. Be taught extra about him, and the way he grew to become a geopolitical pawn between the US, France, and Russia. Plus! Hear how concert-goers are being warned a few swathe of scams hitting stadiums and arenas world wide.

You might also like

Troy Hunt: Weekly Replace 454

Prime US cyber officers face divergent paths after Senate affirmation

Pakistan Arrests 21 in ‘Heartsender’ Malware Service – Krebs on Safety

All this and extra is mentioned within the newest version of the “Smashing Safety” podcast by cybersecurity veterans Graham Cluley and Carole Theriault.

PLUS! Don’t miss our featured interview with Cliff Crosland of Scanner.dev.

Warning: This podcast could comprise nuts, grownup themes, and impolite language.

Hosts:

Graham Cluley:

 @grahamcluley.com

 @[email protected]

Carole Theriault:

 @caroletheriault

Episode hyperlinks:

Sponsored by:

  • 1Password – Safe each app, gadget, and identification – even the unmanaged ones at 1password.com/smashing.
  • Scanner.dev supplies a brand new expertise providing quick search and menace detections for safety information in S3 serving to groups scale back the entire value of possession of their SIEM by as much as 90%. Attempt the interactive playground at scanner.dev/demo
  • Harmonic – Cease information leaks, not innovation. Zero-touch information safety for the GenAI period.

Assist the present:

You possibly can assist the podcast by telling your mates and colleagues about “Smashing Safety”, and leaving us a assessment on Apple Podcasts or Podchaser.

Turn out to be a Patreon supporter for ad-free episodes and our early-release feed!

Observe us:

Observe the present on Bluesky, or be part of us on the Smashing Safety subreddit, or go to our web site for extra episodes.

Thanks:

Theme tune: “Vinyl Reminiscences” by Mikael Manvelyan.
Assorted sound results: AudioBlocks.

Discovered this text attention-grabbing? Observe Graham Cluley on Bluesky or Mastodon to learn extra of the unique content material we put up.




Tags: CluleyconcryptoexchangeGrahamscamssoaringticket
Previous Post

Defend Property from Harsh Summer season Climate

Next Post

RingCentral Begins a New Chapter with RingCentral AI Receptionist – IT Connection

Md Sazzad Hossain

Md Sazzad Hossain

Related Posts

Troy Hunt: Weekly Replace 454
Cyber Security

Troy Hunt: Weekly Replace 454

by Md Sazzad Hossain
June 6, 2025
Prime US cyber officers face divergent paths after Senate affirmation
Cyber Security

Prime US cyber officers face divergent paths after Senate affirmation

by Md Sazzad Hossain
June 5, 2025
Pakistan Arrests 21 in ‘Heartsender’ Malware Service – Krebs on Safety
Cyber Security

Pakistan Arrests 21 in ‘Heartsender’ Malware Service – Krebs on Safety

by Md Sazzad Hossain
June 5, 2025
An AI makes use of blackmail to save lots of itself, and threats make AIs work higher • Graham Cluley
Cyber Security

An AI makes use of blackmail to save lots of itself, and threats make AIs work higher • Graham Cluley

by Md Sazzad Hossain
June 4, 2025
Faux DocuSign, Gitcode Websites Unfold NetSupport RAT through Multi-Stage PowerShell Assault
Cyber Security

Faux DocuSign, Gitcode Websites Unfold NetSupport RAT through Multi-Stage PowerShell Assault

by Md Sazzad Hossain
June 4, 2025
Next Post
RingCentral Begins a New Chapter with RingCentral AI Receptionist – IT Connection

RingCentral Begins a New Chapter with RingCentral AI Receptionist – IT Connection

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

The Crucial Function of Encryption

The Crucial Function of Encryption

March 8, 2025
What’s the Lifecycle of Family Mould?

What’s the Lifecycle of Family Mould?

January 30, 2025

Categories

  • Artificial Intelligence
  • Computer Networking
  • Cyber Security
  • Data Analysis
  • Disaster Restoration
  • Machine Learning

CyberDefenseGo

Welcome to CyberDefenseGo. We are a passionate team of technology enthusiasts, cybersecurity experts, and AI innovators dedicated to delivering high-quality, insightful content that helps individuals and organizations stay ahead of the ever-evolving digital landscape.

Recent

Enhancing LinkedIn Advert Methods with Knowledge Analytics

Enhancing LinkedIn Advert Methods with Knowledge Analytics

June 6, 2025
The Newest 6G Analysis from VIAVI and Companions at IEEE ICC 2025

The Newest 6G Analysis from VIAVI and Companions at IEEE ICC 2025

June 6, 2025

Search

No Result
View All Result

© 2025 CyberDefenseGo - All Rights Reserved

No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration

© 2025 CyberDefenseGo - All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In