Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Cyber Crime Junkies

The Story Behind the Sony Data Breach 2014

14 Apr 2024

Description

Question? Text our Studio direct.This is the True Cyber Crime Story of “The Day the Lights Went Out at Sony Pictures” in 2014. Discussion about then events, what led to it, the formal findings and open questions remaining by experts. Hosts David Mauro and Mark Mosher explore their research with Special Guest, professional coach Rich Moore.SummaryThe conversation discusses the Sony Pictures cyberattack in 2014, exploring the various theories and implications of the breach. The hosts highlight the impact of the attack on Sony and the movie industry, as well as the broader implications for cybersecurity. They delve into the different theories surrounding the attack, including North Korea's involvement, insider activity, and stock manipulation. The conversation raises questions about the role of smaller organizations and the potential vulnerabilities they face. Overall, the discussion emphasizes the need for increased cybersecurity measures and awareness. The conversation explores different theories surrounding the Sony Pictures hack in 2014. The main theories discussed include: 1) North Korea as the sole perpetrator, 2) a disgruntled insider with connections to black hat hackers, 3) hacktivist groups like LulzSec and Anonymous, and 4) stock manipulation. The conversation highlights the inconsistencies and unanswered questions surrounding the official narrative that North Korea was solely responsible for the hack. The participants lean towards the theory that an insider with help from black hat hackers orchestrated the attack. They also discuss the possibility of stock manipulation and the involvement of hacktivist groups. The conversation concludes with the acknowledgment that there may be information that is not publicly available due to national security concerns.Chapters00:00 The Day the Lights Went Out at Sony Pictures13:55 The Lights Get Turned Out: Implications and Theories31:43 The Insider Threat: A Disgruntled Employee with Black Hat Connections43:12 National Security and UGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com   Support the show🔥New Special Offers! 🔥 Remove Your Private Data Online Risk Free Today. Try Optery Risk Free. Protect your privacy and remove your data from data brokers and more. 🔥No risk.🔥Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies 🔥Want to Try AI Translation, Audio Reader & Voice Cloning? Try Eleven Labs Today 🔥 Want Translator, Audio Reader or prefer a Custom AI Agent for your organization? Highest quality we found anywhere. You can try ELEVAN LABS here risk free: https://try.elevenlabs.io/gla58o32c6hq 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Dive Deeper: 🔗 Website: https://cybercrimejunkies.com Engage with us on Socials: ✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/ 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.