Play Video




Cyber Criminals Conquer Bank Security With Telegram-Powered Bots

Episode 14

Cybercriminals are using Telegram bots to steal one-time passwords and defrauding people through banks and online payment systems, including PayPal, Apple Pay and Google Pay
Every day Big Tech and Mass Media make it hard to find out what is going on with the internet. Honey Beez and Trip Elix have unique experiences to share in an unpaired podcast experience.

Join our community!!
Subscribe to the Insecurity Brief podcast now on every platform we can find

Follow us on Twitter


FamousSparrow: A suspicious hotel guest

ESET researchers have uncovered a new cyberespionage group targeting hotels, governments, and private companies worldwide. We have named this group FamousSparrow and we believe it has been active since at least 2019.

FBI and CISA: Hackers exploit a critical Zoho bug

The FBI, CISA and the Coast Guard (CGCYBER) warned today that state-backed persistent threat (APT) groups have been exploiting a critical bug in a Zoho system since early August 2021.

Cybercriminals going after one-time passwords with Telegram-powered bots

All the services Intel 471 has observed, which have only been in operation since June, either operate via a Telegram bot or provide support for customers via a Telegram channel. Two-factor authentication is one of the easiest ways for people to protect any online account. So, of course criminals are trying to circumvent that protection.


Trip's Books

Honey's Books

Subscribe to

insecurity Brief podcast
RadioPublic Podcasts
Pocket Casts Podcasts
Breaker Podcasts
Soundcloud Podcasts
IHeart Podcasts
Rss Feed
Subscribe via Email

About The Hosts

Honey Beez

Honey Beez is a retired computer hacker, chess addict, author, and mother. Honey is an American and a New Yorker.  She has written several Children’s books and chess books as well as creating an American chess opening called The Bee Defense.

Trip Elix

Trip Elix is an author, podcaster and video personality Over the last 30 years, he has worked as a security analyst and privately as a consultant, investigator, forensic technician and a skip tracer. He is the author of three books and gives talks on security and privacy.

You May Also Like

Copy & Paste Exploit
How To Tell If Your Device Has A Virus
Chinese Propaganda Targets Redefining Democracy Uses Bots To Spread Message