Confessions of a CyberSpy Hunter

30th September 2019 | Training Confessions of a CyberSpy Hunter

This 20 minute Ted Talk discusses how a hidden cyberwar is being perpetrated for the past 2 decades online not with bullets and bombs but rather with bits and bytes.  This video outlines how the US government used a custom virus, called Stuxnet, to stop nuclear weapons development in Iran and the consequence of the release of that virus code to other government entities around the world. Then the video turns its focus on these silent wars being perpetrated all over the world by nation states intent on stealing weapons technology and intellectual property from research facilities and institutions and businesses alike.  Campaigns by China (suspected but not proven) and identified by intelligence agents as operation Aurora which broke into 20 top companies in the us, including Intel, Google and IBM.https://www.youtube.com/embed/YiUN35Ikdfw

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Cybercriminals Are Exploiting DocuSign with Customizable Phishing Templates

Cybercriminals Are Exploiting DocuSign with Customizable Phishing Templates

DocuSign has become one of the most trusted tools in modern business. Contracts, HR paperwork, NDAs, vendor...

Read more
PromptSpy: The Android Malware That Hired an AI Assistant

PromptSpy: The Android Malware That Hired an AI Assistant

And yes, Google's Gemini AI had no idea it was working for the bad guys. Malware has always followed a script....

Read more
Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware groups are not breaking in organizations the same way they did five years ago. The entry methods have...

Read more