EP005: Project Zero | HACKING GOOGLE

Zero days. They’re some of the world’s most dangerous exploits. And the race is on to find them before the attackers do.

Go behind the scenes with Project Zero, a specialized task force devoted to hunting zero day exploits across the internet – in software, hardware, in Google products and beyond. Their work makes them few friends, but finding zero days is essential to ensuring a safe and open internet.

EP004: Bug Hunters | HACKING GOOGLE

They’re high schoolers, lawyers, IT professionals, and hobbyists. And they’ve made millions hacking Google in their free time.

Over the last decade, Google’s Bug Hunter Program has rewarded thousands of people from 84 different countries over $35 million to hunt down over 12,000 bugs in Google products. Their motives vary – cash, clout, curiosity – but their mission is the same: find undiscovered vulnerabilities.

EP003: Red Team | HACKING GOOGLE

They have one job: hack Google from the inside.

Go behind the scenes with the Red Team, the elite hackers dedicated to attacking Google’s own network. They sneak into buildings, launch phishing campaigns, and distribute malware across the company. Countless crucial protections have been created in response to the Red Team’s relentless assault on Google’s products.

EP002: Detection and Response | HACKING GOOGLE

Meet the internet’s fire department, the elite team that answers the call when chaos ignites online.

When Google’s Detection and Response Team discovers an attacker, they have to be swift and precise. In 2021, they identified unusual network activity, dropped in, isolated the attacker, and booted them off the network – extinguishing a digital fire before it could cause any damage.

EP001: Threat Analysis Group | HACKING GOOGLE

Watchguards. Lookouts. Sentries. When faced with threats, there have always been those who look out to protect the rest. But who looks out for the threats lurking online?

Equipped with custom Google Search algorithms and a digital library of the most malicious exploits, the Threat Analysis Group has helped stop some of the most insidious and consequential threats to Google, its users, and the internet at large. Their deep understanding of attackers helps keep billions of users safe.

EP000: Operation Aurora | HACKING GOOGLE

What happens when a country attacks a company? In 2009, Google found out and cybersecurity was never the same again.

An inside look at the historic attack where Google’s network was breached by a foreign government trying to access the Gmail accounts of human rights activists. In the wake of the breach, Google revolutionized its approach to security – overhauling everything and developing highly specialized teams of elite experts to stay ahead of the ever-evolving threat landscape.

“It’s Worse Than We Thought” | Edward Snowden

https://youtu.be/0k9fE8PpIzs

NSO Group Technologies is an Israeli technology firm whose spyware called Pegasus enables the remote surveillance of smartphones.

In 2014, the surveillance firm Circles merged with the NSO Group. Circles is capable of identifying the location of a phone in seconds, anywhere in the world. It was identified that 25 countries across the world were customers of Circles. The firm has two systems. One operates by connecting to the purchasing country’s local telecommunications companies’ infrastructure. The other separate system, known as the “Circles Cloud”, is capable of interconnecting with telecommunications country across the globe. In December 2020, the Citizen Lab reported that Supreme Council on National Security (SCNS) of the United Arab Emirates was set to receive both these systems.

The Real Business of Blockchain

This video outlines 5 core elements of blockchain that support a ledger as well as the future of blockchain with artificial intelligence and integration with the Internet of Things.

  • Distribution
  • Encryption
  • Immutability
  • Tokenization
  • Decentralization