Securit13 Podcast
Первый украинский подкаст об информационной безопасности

Intro / Outro Frontline - Pillar

Ashley Madison Emails By Category

How to search through the leaked Ashley Madison data

Hackers Finally Post Stolen Ashley Madison Data

Hackers Dump More Ashley Madison Data

Aug 20 2015: New message and torrent!

Ashley Madison Hackers Speak Out: 'Nobody Was Watching'

I found my husband in the Ashley Madison leak

Как дрозды становятся дятлами

Oracle Deletes CSO’s Screed Against Hackers Who Report Bugs

Oracle CSO is right

My Personal Take On Mary Ann's Blog

No, You Really Can’t

Oracle blog. Those Who Can’t Do, Audit

Researchers find way to steal Windows Active Directory credentials from the Internet (SMB protocol)

EXCLUSIVE-Ex-employees: Russian antivirus firm faked malware to harm rivals Hacked! Credit Card information of 93,000 Customers Compromised

ICANN hacked, emails and passwords stolen

Tech Firm Ubiquiti Suffers $46M Cyberheist (8.1 вернули, 6.8 зарезервировано)

BitTorrent clients can be made to participate in high-volume DoS attacks

Domain Administrator in 17 seconds

Заклеивание веб-камеры или как мой муж сошел с ума

The Lifecycle of a Revolution (Keynote)

В Одеській ОДА виявили, що інформація з комп’ютерів йде в "ДНР"

Сайт Львівської обладміністрації зламали з території Криму



Loggly Main Dashboard

AWS CloudFormation

Understanding AWS Security

A lot of security topics  AWS videos are here:

Blog post about port knocking

Не вошедшее:

Empire is a pure PowerShell post-exploitation agent

cve-2015-???? poc ~ os x 10.10.5 kernel local privilege escalation

Share your terminal as a web application

Alibi routing software and data

Direct download: 41.mp3
Category:Technology -- posted at: 11:57am CET

Intro / Outro The Weeknd - Wicked Games

Hackers Can Disable a Sniper Rifle—Or Change Its Target

This Hacker’s Tiny Device Unlocks Cars And Opens Garages

This Gadget Hacks GM Cars to Locate, Unlock, and Start Them

Researchers Hacked a Model S, But Tesla’s Already Released a Patch

New vulnerability can put Android phones into permanent vegetative state

 Can they hear you now? Hacking Team & SS7

Researchers look sideways to crack SIM card AES-128 encryption

Derelict TrueCrypt Russia portal 'is command hub for Ukraine spying op’

Windows 10 is spying on you - at least that's what this developer thinks

Disable KeyLogger Windows 10

fix windows 10

Windows 10 updates to be automatic and mandatory for Home users

Researchers claim they’ve developed a better, faster Tor

950 million Android phones can be hijacked by malicious text messages

First Known Exploit of Apple DYLD_PRINT_TO_FILE Vulnerability Discovered in the Wild

Ashley Madison invites red-faced cheats to bolt stable door for free

Захист урядового порталу від Ddos-атак коштуватиме півмільйона

Mt.Gox Bitcoin Exchange CEO Arrested by Japanese Police

Chinese VPN Service as Attack Platform?


Thunderstrike 2” rootkit uses Thunderbolt accessories to infect Mac firmware

Exclusive: Visa application portal closed following SC Magazine investigation

Rapid7 Inc (NASDAQ:RPD)

What amateurs can learn from security pros about staying safe online

Телеком-регулятор проголосовал за лишение абонентов мобильной связи анонимности

Внимание! Крутое мошенничество с картами «ПриватБанка»!

Direct download: 40.mp3
Category:Technology -- posted at: 8:16am CET

Intro / Outro Hollywood Undead - Young

ВРУ рассмотрит законопроект о защите киберпространства

Предложения «ГО ИСАКА КИЕВ» к проекту закона Украины об основах кибербезопасности

Канадский опыт и

Hackers Remotely Kill a Jeep on the Highway—With Me in It

When Charlie Miller tells you to install an update for your Jeep, you really should go and install that update.

Patch Your Chrysler Now Against a Wireless Hacking Attack

Online Cheating Site AshleyMadison Hacked

#AshleyMadisonHack ... the website is now down

Paying $20 to delete your Ashley Madison profile was probably a bad idea


Firefox blacklists Flash player due to unpatched 0-day vulnerabilities

Adobe: We REALLY are taking Flash security seriously – honest

Third Hacking Team Flash Zero-Day Found

Project Zero. One Perfect Bug: Exploiting Type Confusion in Flash

RIPv1 Used in DDoS Reflection Attacks - AT&T ThreatTraq Bits (video)

Threat Advisory: RIPv1 Reflection DDoS (pdf)

OS X 10.10 DYLD_PRINT_TO_FILE Local Privilege Escalation Vulnerability


MS urges Skype users to change their passwords

Bye bye Darkode

How to Crack RC4 Encryption in WPA-TKIP and TLS

Free Tool Looks for HackingTeam Malware

Owners of OPM breached data tobe granted life time credit monitoring

Wow, another NSA leak: Network security code appears on GitHub (Анализ на хабре

Direct download: 39.mp3
Category:Technology -- posted at: 2:33pm CET

Intro / Outro Сен-тропе - у селові

Интервью с Василием Гузием о тонкостях поимки кибер преступников

В Украине арестовали пятерых хакеров, причастных к краже не менее 2 млн евро у крупнейших мировых банков

Депутаты дошли до интернета: законопроект о киберпространстве

MasterCard to trial pay-by-face for online purchasing

Spy Tech Company 'Hacking Team' Gets Hacked

Information related to the attacks on HackingTeam on July 6, 2015

Hacking Team Breach Shows a Global Spying Firm Run Amok

Hacking Team Asks Customers to Stop Using Its Software After Hack

The FBI Spent $775K on Hacking Team's Spy Tools Since 2011

UK police forces wanted to buy Hacking Team spyware

Adobe Flash exploit that was leaked by Hacking Team goes wild

Hacking Team leak, Flash 0day, exploit payloads and more

Days after Hacking Team breach, nobody fired, no customers lost

OPM shuts down background investigation portal because of vulnerability

433,000 Ford cars to be recalled because of software bug

Samsung announces fix for major Galaxy keyboard security flaw

Adventures in Automotive Networks and Control Units (pdf)

NSA can track everyone's phone calls again -- for a while

Your VPN Probably Isn’t Private


Critical OpenSSL bug allows attackers to impersonate any trusted server

The OpenSSL "CVE-2015-1793" certificate verification bug - what you need to know

Google unveils independent “fork” of OpenSSL called “BoringSSL”

В Україні через тиждень запускають захищений мобільний зв'язок

Система криптографически защищенной мобильной связи TACITUS

Meet the hackers who break into Microsoft and Apple to steal insider info

'Hackers' give orders to German missile battery

Украина вошла в рейтинг стран с наибольшим количеством DDoS-атак

David Cameron is going to try and ban encryption in Britain

7 things to do when your business is hacked

Kali Linux 2.0 Release Day Scheduled

Новий Голова Держспецзв’язку Леонід Євдоченко

Apple to introduce two-factor authentication option in iOS 9 and OS X El Capitan

Security-конференция dec0de в Одессе

Apple to introduce two-factor authentication option in iOS 9 and OS X El Capitan

Windows 10 will share your Wi-Fi key with your friends' friends

Cisco To Buy Cloud Security Company OpenDNS for $635M In Cash

US-CERT Alerts of Phishing Campaigns Targeting OPM Hack Victims

Information security news and discussion

Two keys to rule them all: Cisco warns of default SSH keys on appliances

Amazon Releases S2N TLS Crypto Implementation to Open Source


To determine HackingTeam infection

Direct download: 38.mp3
Category:general -- posted at: 11:19am CET

Intro / Outro Jam & Spoon Featuring Rea Garvey-Set Me Free

ВРУ рассмотрит законопроект о защите киберпространства

Министерство IT

В Украине арестовали пятерых хакеров, причастных к краже не менее 2 млн евро у крупнейших мировых банков

Operation Lotus Blossom

HP Releases Details, Exploit Code for Unpatched IE Flaws

Analysis and Exploitation of an ESET Vulnerability

IETF официально вывел из обихода протокол SSLv3

Hackers Exploit Zero-Day Magento Vulnerability to Steal Your Credit Cards

Secret Service agent who stole $820K from Silk Road pleads guilty

This Radio Bug Can Steal Laptop Crypto Keys, Fits Inside a Pita

Polish airline LOT was grounded after 'IT attack' took hold

Polish plane IT attack? Apparently not, just a simple DDoS

All Airlines Have the Security Hole That Grounded Polish Planes

Zero-Day Exploits for Stealing OS X and iOS Passwords

 CIA Backed Firm Finds Stolen Government Passwords Throughout Web

Роскомнадзор заблокировал страницу «архива интернета» за экстремизм

Drupal Fixes Critical OpenID Bug

Canada government websites taken down in cyber attack

US and British Spies Targeted Antivirus Companies

Adobe Releases Emergency Patch for Flash Zero-Day Vulnerability

Sony Hack: WikiLeaks Releases New Batch of 270,000 Documents


HP Security Research OSINT (OpenSource Intelligence) articles of interest

Crooks Use Hacked Routers to Aid Cyberheists

Transparently Routing Traffic Through Tor

Using Metasploit socks proxy auxilliary module over a Meterpretee session

Meterpreter Paranoid Mode

Encryption software for files in the cloud

Direct download: 37.mp3
Category:Technology -- posted at: 10:22am CET

Intro / Outro ЯрмаК - Вставай (TS Prod.)

Интервью с Алексеем Старовым о Tor-клиенте Astoria.

Measuring and mitigating AS-level adversaries against Tor (pdf)

Center for Applied Internet Data Analysis

Связаться с Алексеем можно по e-mail

Direct download: 36.5.mp3
Category:Technology -- posted at: 7:03pm CET

Intro / Outro Андрій Хливнюк "Спи собі сама"

Kaspersky Finds New Nation-State Attack—In Its Own Network


Stuxnet spawn infected Kaspersky using stolen Foxconn digital certificates

China might be building vast database of federal worker info, experts say

TV5 Monde attack 'by Russia-based hackers'

Serious iOS bug lets hackers create fake login screens to steal Apple credentials

LastPass Security Notice

Tesla Motors начала платить за найденные уязвимости

Assume your GitHub account is hacked, users with weak crypto keys told

You Can Be Prosecuted for Clearing Your Browser History

Sourceforge Hijacks the Nmap Sourceforge Account

This Hacked Kids' Toy Opens Garage Doors in Seconds

Edward Snowden: “I should have come forward sooner.”

Сноуден обвинил Россию в нарушении неприкосновенности частной жизни

Украинец убедил нигерийского спамера выслать ему 600 долларов

Держспецзв’язку видала позитивний експертний висновок на Симетричний блоковий шифр AES

The Senate Finally Passes NSA Surveillance Reform

Интернет-вруны: В сети появился список кремлевских троллей и пропутинских организаций

У Бельгії комісія подала до суду на Facebook

Report: Hack of government employee records discovered by product demo

Технологический практикум «Облака без лишних слов»

Вебинары Positive Technologies: образовательная программа "Практическая безопасность"

Yahoo to face class action lawsuit over email spying claims

Facebook will encrypt the emails it sends to you with PGP

Microsoft Plans to Add Secure Shell (SSH) to Windows


Direct download: 36.mp3
Category:Technology -- posted at: 9:00pm CET

Intro/outro - Фантом 2 - Двоє

The Complete Guide for Hidden Services And Staying Anonymous

Risky Business #367 -- Tor Project lead Roger Dingledine

Astoria — Advanced Tor Client Designed to Avoid NSA Attacks

Anonymous peer-to-peer instant messaging

Top encryption researcher moves to Switzerland to escape government interference

HideMyAss story: How misbehaving at school made one man a multimillionaire

Russia warns Google, Twitter and Facebook on law violations

Президент РФ подписал указ о создании государственного сегмента интернета

Some notes about Wassenaar

Cisco Systems поставляла оборудование для Минобороны РФ, ФСБ и Роскомоса в обход санкций

Билеты на финал Лиги Европы от Приватбанка

The founder of the Silk Road drug marketplace has been sentenced to life in prison without parole

Aaron Swartz stood up for freedom and fairness

Верховный суд обязал банки возвращать клиентам украденные с карточек деньги

Активисты раскрыли способ "накрутки" голосов при отборе в общественный совет НАБ

NSA (doesn’t) shut down surveillance program

Senate blocks the bill: Senate blocks NSA surveillance reform bill

Китайцы придумали, как отслеживать людей в метро через акселерометры смартфонов

Official Kali Linux Docker Images

ООН причислил шифрование и анонимность в интернете к правам человека

Anatomy of a LOGJAM - another TLS vulnerability, and what to do about it

Infosec Hype Tracker

pcre -- multiple vulnerabilities

Malicious Minecraft apps affect 600,000 Android Users

Annoying bug causes iPhone Messages to crash

Hola VPN turns 10M users into exit nodes

These two Diablo III players stole virtual armor and gold — and got prosecuted IRL

Real-world, physical crypto-lockers

Security Firm Redefines APT: African Phishing Threat

Direct download: 35.mp3
Category:Technology -- posted at: 9:17am CET

Intro / outro - Christian Kane - LA Song

Интервью с Тарасом Бобало

Связаться с Тарасом можно с помощью email и skype madspeedy

Virtualized Environment Neglected Operations Manipulation (VENOM)

Heartbleed, eat your heart out: VENOM vuln poisons countless VMs

PCI DSS 3.1 (pdf)



Patch Tuesday Facelift End of an Era


Премьер-министр Сингапура написал решатель Судоку на C++ и выложил исходный код программы в открытый доступ

Super secretive malware wipes hard drive to prevent analysis 

WordPress Vulnerability Puts Millions of Websites At Risk

 Киевский трамвай наехал на Google-мобиль

Self-Driving Trucks Are Going to Hit Us Like a Human-Driven Truck

Security Product Liability Protections Emerge

France passes new surveillance law in wake of Charlie Hebdo attack

Microsoft Launches Visual Studio Code, A Free Cross-Platform Code Editor For OS X, Linux And Windows

Sublime Text

Mad Max: Fury Road

Goodbye! We'll be back!

Direct download: 34.mp3
Category:Technology -- posted at: 8:51am CET


Dai Davis

Jerry Gamblin

Kevin Williams

Leslie Forbes


Direct download: 44Con.mp3
Category:Technology -- posted at: 1:02am CET