エピソード

  • T-Mobile Breached – How a 21-Year-Old Hacked One of America’s Largest Telecoms from His Bedroom
    2025/04/22

    One router. One testing server. One kid with internet access.

    In this episode of Cypher Tech Hacks, Alex Cipher unravels the wild story of how a 21-year-old hacker infiltrated T-Mobile’s internal systems, spent weeks undetected, and exfiltrated data on over 40 million customers — all without using a single line of malware.

    We break down:

    • How a misconfigured router opened the door
    • The path from dev environment to production databases
    • Why logging and segmentation failures made this attack so easy
    • And what it says about the state of security at major telecoms

    This breach wasn’t flashy. It was surgical. And the scary part? It could happen to almost any company still running on legacy infrastructure and lazy segmentation.

    If you’re building, managing, or securing anything — this is the episode you have to hear.

    Support the show

    続きを読む 一部表示
    7 分
  • The Tesla API Hack: How Hackers Took Over Cars Remotely
    2025/04/21

    In this episode of Cypher Tech Hacks, host Alex Cipher uncovers the real-life Tesla API hack that let attackers remotely access and control Teslas across 13 countries. It wasn’t a bug in Tesla’s system—it was a deadly combination of exposed tokens, careless third-party developers, and silent API abuse.

    Learn how one security researcher responsibly revealed the flaw, what steps hackers would take to exploit it, and most importantly—how you can prevent similar breaches in your own apps, devices, or digital life.

    This story is a wake-up call for anyone using smart tech or developing connected apps.

    Support the show

    続きを読む 一部表示
    6 分
  • How the Okta Breach Happened: Vendor Laptops, LAPSUS$, and a Global Identity Crisis
    2025/04/21

    Welcome to Cypher Tech Hacks—the podcast where cyber legends come to light. In this week’s episode, Alex Cipher exposes the inside story of the Okta security breach that shook the tech world. You’ll hear how one compromised contractor laptop became the ignition point for a massive identity and access management failure.

    We’ll break down:

    • What went wrong at Okta’s third-party vendor Sitel
    • How the LAPSUS$ gang bypassed security using social engineering
    • Why companies like Cloudflare were almost compromised
    • What you can do to harden identity systems and monitor vendors

    Whether you’re a red teamer, a security analyst, or a tech-savvy exec, this episode is packed with real-world lessons from a high-stakes breach.

    🎧 Subscribe for weekly deep dives into cybercrime, tech fraud, and digital deception.
    Visit CypherTechHacks.com for bonus content, transcripts, and toolkits.

    Support the show

    続きを読む 一部表示
    8 分
  • AI News – April 13–20, 2025: OpenAI's O3, Veo 2, Apple’s AI Moves, & Claude Gets Smarter
    2025/04/21

    In this week’s AI roundup — we’re breaking down the biggest updates from April 13 to April 20, 2025.

    🧠 OpenAI just launched O3 and O4-mini, two new multimodal models built to handle complex reasoning and visual input — even rough sketches.
    🎬 Google Veo 2 is now available for Gemini Advanced users — unlocking AI video generation for creators.
    ⚙️ OpenAI also introduced Flex Processing, giving developers cheaper processing for non-urgent tasks.
    🤖 Claude AI by Anthropic just went autonomous — it now reads your calendar, email, and even cites its own research.
    ⚖️ OpenAI is fighting back with a countersuit against Elon Musk.
    🍏 And Apple is using synthetic data to train AI privately — no user snooping required.

    This week’s episode gives you everything you need to stay ahead in the world of artificial intelligence.

    🔗 Subscribe now to Cypher Tech Hacks, and don’t miss future updates on AI, cybersecurity, and tech trends.

    Support the show

    続きを読む 一部表示
    3 分
  • The Great Twitter Heist – When Verified Accounts Became Crypto Bait
    2025/04/15

    On July 15th, 2020, the internet broke for a moment. Verified Twitter accounts from Elon Musk, Barack Obama, Apple, Kanye West, and more all posted the same message: “Send me Bitcoin, and I’ll double it.”

    It wasn’t a joke. It wasn’t a promo. It was a hack.

    In this episode of Cypher Tech Hacks, Alex Cipher takes you inside the wild story of how a crew of teenage hackers gained access to Twitter’s internal admin tools, hijacked high-profile accounts, and pulled off one of the most public crypto scams ever — all while flexing in underground forums and bragging to journalists.

    We’ll break down:

    • How they social engineered Twitter employees
    • What the “God Mode” admin panel looks like
    • Why internal tools are your riskiest assets
    • And how $118,000 in Bitcoin was just the beginning

    This is the blueprint for every insider threat nightmare — and the reason no platform, no matter how big, is untouchable.

    Support the show

    続きを読む 一部表示
    6 分
  • This Week’s AI News | April 6–12, 2025 | OpenAI vs Elon, Google’s Gemini, Siri Delayed & More
    2025/04/12

    In this episode of This Week’s AI News, Alex Cipher unpacks the most important stories in artificial intelligence from April 6–12, 2025.


    We cover OpenAI’s legal clash with Elon Musk and its record-breaking $40B funding round, Google’s powerful new Gemini models and TPUs, and Apple’s delay on the much-anticipated Siri overhaul. Plus: ChatGPT rolls into Volkswagen cars, President Trump signs a bold AI executive order, SUNY launches AI ethics departments, and Beijing postpones the world’s first humanoid robot half-marathon.


    And to cap it off, Netflix drops Black Mirror Season 7 — and it’s diving headfirst into the future of AI.


    Tune in for your weekly download on what’s happening at the intersection of tech, policy, and machine intelligence


    Support the show

    続きを読む 一部表示
    4 分
  • Spiders in the System – How Scattered Spider Breached the Big Leagues
    2025/04/08

    What happens when a group of Gen Z hackers picks up the phone — and takes down billion-dollar corporations without writing a single line of malware? In this episode of Cypher Tech Hacks, Alex Cipher unpacks the jaw-dropping story of Scattered Spider, a social engineering crew that breached MGM Resorts and Caesars Entertainment using nothing but charm, confidence, and a phone call.

    We break down the step-by-step playbook of how these attackers:

    • Used LinkedIn and open-source intel to pick their targets
    • Social engineered help desks into resetting multi-factor authentication
    • Hijacked employee phone numbers with SIM swaps
    • Escalated privileges and deployed remote access tools
    • Pulled off millions in ransom demands — and got paid

    You’ll learn how the hack worked, what made it so effective, and most importantly — how you can defend against similar attacks. Because sometimes, the weakest link isn’t the software — it’s the human answering the phone.

    If you’re in IT, security, or just love a good cyber-heist, you don’t want to miss this one.

    Support the show

    続きを読む 一部表示
    6 分
  • This Week in AI: Meta’s Llama 4, Amazon’s Nova Act, and the $600M Race to Cure Disease
    2025/04/08

    AI is moving fast—here’s what you need to know. In this episode, we break down the biggest AI developments of the week:

    • Meta launches its most advanced open-source AI models yet: Llama 4 Scout, Maverick, and the upcoming Behemoth.
    • Amazon debuts Nova Act, a powerful new AI agent that can take action across the web.
    • Microsoft’s Copilot gets smarter with memory and multi-step task automation.
    • Alphabet’s Isomorphic Labs secures $600 million to use AI in drug discovery.
    • The UK explores how AI can lighten the workload for teachers in real classrooms.

    From health tech to education to the future of personal AI assistants, this episode covers how artificial intelligence is changing everything—right now.

    Support the show

    続きを読む 一部表示
    3 分