CEOs Fired, Samsung Breached, and illegal Crypto Mining | Technado ep. 335
First up, the gang talks about the new Microsoft Loop features, and what Loop actually is useful for. Then we talk clustering and immediate changes made at OpenAI.
After the break, Daniel and Don break down the latest in security news. First, they cover ransomware gangs ratting on themselves to the SEC. Then, they break down a crypto mining rig stealing electricity. Finally, Don offers some insight on the data breach that Samsung just uncovered impacting hundreds of thousands of users!
Видео CEOs Fired, Samsung Breached, and illegal Crypto Mining | Technado ep. 335 канала ITPro
After the break, Daniel and Don break down the latest in security news. First, they cover ransomware gangs ratting on themselves to the SEC. Then, they break down a crypto mining rig stealing electricity. Finally, Don offers some insight on the data breach that Samsung just uncovered impacting hundreds of thousands of users!
Видео CEOs Fired, Samsung Breached, and illegal Crypto Mining | Technado ep. 335 канала ITPro
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Day 4 of 12 Days of IT Giveaway 2022 | Hard Drive ClockTechnado, Ep. 285: LastPass Breach UpdateThe Dangers of Legacy Systems | Between Two ServersSecurity breach exposes over one million DNA profilesOffice Hours with an Edutainer | ITProTVMarketers are tricking you with CNAME Cloaking - Brave Web Browser has a solution?All Things Cybersecurity with Heath Adams | ITProTV Webinar TeaserCisco Free Weekend | ITProTVSecurity Hack: Acknowledge, Respond, Train | New SH:ART Course from ITProTVPassword - ITPro.TV Gameshow SeriesTechnado Ep. 308: Microsoft is Reading Your Private FilesITProTV & CompTIA’s Road to ChannelCon: Right Networks gives their IT pros incentives for certsTechnado, Ep. 146: Sysadmin Today’s Paul JoynerTechnado, Ep. 218: OnDefend's Ben FinkeGranny has Free Windows Keys? | Technado Episode 313How You Should Be Securing Your NetworkHacker buys old Tesla parts on eBay and finds them full of user dataITProTV Webinar | How to Get Into ITITIL®4 Service Value ChainCertified Ethical Hacker (CEH) v11 Basic Cybersecurity Concepts | First 3 For FreeApple, Google, and Microsoft Want to Kill the Password