🛡️ Bitdefender presents CYBERCRIME: From the Frontline—the podcast that takes you inside real-life cyberattacks. In this episode, we’re looking at 35 years of ransomware attacks. The code and targets were simple and small to start, but decades later, the attackers are faster, apply more leverage, and operate more like a business than ever before. 🔊 Topics covered in this episode include: ↪︎ The earliest days of ransomware attacks ↪︎ Ransomware’s evolution to double and...
All content for CYBERCRIME: From the Frontline is the property of Bitdefender and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
🛡️ Bitdefender presents CYBERCRIME: From the Frontline—the podcast that takes you inside real-life cyberattacks. In this episode, we’re looking at 35 years of ransomware attacks. The code and targets were simple and small to start, but decades later, the attackers are faster, apply more leverage, and operate more like a business than ever before. 🔊 Topics covered in this episode include: ↪︎ The earliest days of ransomware attacks ↪︎ Ransomware’s evolution to double and...
A Discussion with Network Chuck: AI, Virtual Machines, and the Secret to Creating Viral Tech Videos
CYBERCRIME: From the Frontline
58 minutes
3 months ago
A Discussion with Network Chuck: AI, Virtual Machines, and the Secret to Creating Viral Tech Videos
🛡️ Bitdefender presents CYBERCRIME: From the Frontline—the podcast that takes you inside real-life cyberattacks. In this episode, we are joined by Network Chuck, whose tech videos are watched by millions on YouTube. Here are just some of the topics we discussed with Network Chuck: ↪︎ The AI voice scam targeting his own family ↪︎ Hacking AI – and getting hacked by AI-created attacks ↪︎ The debate over AI and whether it’s making us smarter or dumber ↪︎ Certifications, CTFs, and p...
CYBERCRIME: From the Frontline
🛡️ Bitdefender presents CYBERCRIME: From the Frontline—the podcast that takes you inside real-life cyberattacks. In this episode, we’re looking at 35 years of ransomware attacks. The code and targets were simple and small to start, but decades later, the attackers are faster, apply more leverage, and operate more like a business than ever before. 🔊 Topics covered in this episode include: ↪︎ The earliest days of ransomware attacks ↪︎ Ransomware’s evolution to double and...