Confessions of a CyberSpy Hunter

30th September 2019 | Training Confessions of a CyberSpy Hunter

This 20 minute Ted Talk discusses how a hidden cyberwar is being perpetrated for the past 2 decades online not with bullets and bombs but rather with bits and bytes.  This video outlines how the US government used a custom virus, called Stuxnet, to stop nuclear weapons development in Iran and the consequence of the release of that virus code to other government entities around the world. Then the video turns its focus on these silent wars being perpetrated all over the world by nation states intent on stealing weapons technology and intellectual property from research facilities and institutions and businesses alike.  Campaigns by China (suspected but not proven) and identified by intelligence agents as operation Aurora which broke into 20 top companies in the us, including Intel, Google and IBM.https://www.youtube.com/embed/YiUN35Ikdfw

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Top 10 Emerging AI-Based Threats Every Business Must Prepare For

Top 10 Emerging AI-Based Threats Every Business Must Prepare For

Artificial Intelligence (AI) is transforming productivity and efficiency, but it’s also arming cybercriminals...

Read more
Microsoft Rolling Out Token Protection: Practical Guidance for MSPs

Microsoft Rolling Out Token Protection: Practical Guidance for MSPs

Part 2 of Our Microsoft Entra Security Series In Part 1, we explored how Microsoft’s Token Protection...

Read more
Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

For years, organizations have relied on fake email phishing simulations to measure employee resilience to...

Read more