Powered by RND
PodcastsTecnologíaDecoded: The Cybersecurity Podcast

Decoded: The Cybersecurity Podcast

Edward Henriquez
Decoded: The Cybersecurity Podcast
Último episodio

Episodios disponibles

5 de 154
  • Microsoft May 2025 Patch Tuesday Update
    These sources collectively cover Microsoft's May 2025 Patch Tuesday, detailing the security updates released on May 13, 2025. Multiple articles highlight that these updates address a significant number of vulnerabilities, including several actively exploited zero-day flaws and others rated as critical. One source from Forbes specifically mentions a critical 10/10 cloud security vulnerability that has been confirmed and mitigated by Microsoft with no user action required, reflecting a move towards greater transparency in cloud vulnerability reporting. Another source from Netwrix Community notes that the May 13th updates can cause compatibility issues with certain Netwrix Threat Prevention agents on Windows Server versions, impacting the capture and blocking of specific authentication events. Finally, Microsoft's own support page lists the specific cumulative updates, like KB5058385 for Windows Server 2022 and KB5058411 for Windows 11 24H2, which contain these security fixes and some new features, such as AI-powered tools on Copilot+ PCs.Become a Patron:https://www.patreon.com/DecodedPodcastOther ways to contribute:https://buymeacoffee.com/decodedcybersecurityOn Instagram:Follow @decodedthecybersecuritypodcast to level up your cybersecurity skills
    --------  
    21:21
  • Cyber Threat Intelligence Resources and Trends
    These sources collectively discuss the evolving landscape of cyber threats, including the increasing complexity of attacks involving multiple threat actors and the challenges this presents for traditional analysis models. One source provides a comprehensive curated list of resources for threat intelligence, covering sources of information, analytical frameworks, and tools for investigating cyber threats. Another source explores the rise of zero-day exploits in 2024, noting a shift towards targeting enterprise security and networking products and highlighting the continued significant role of espionage actors. A third source introduces Immunity CANVAS, a commercial tool for penetration testing, breach simulation, and exploit development, emphasizing its utility for security professionals and researchers. The final source offers a national assessment of cyber threats, detailing the persistent dangers posed by state-sponsored actors and cybercriminals to critical infrastructure and national security.Become a Patron:https://www.patreon.com/DecodedPodcastOther ways to contribute:https://buymeacoffee.com/decodedcybersecurityOn Instagram:Follow @decodedthecybersecuritypodcast to level up your cybersecurity skills
    --------  
    22:15
  • Cybersecurity Attacks and Tactics
    InfoSec discusses several critical cybersecurity developments and strategies. It highlights the active exploitation of vulnerabilities in software like Langflow and WordPress plugins, and notes an increase in unsophisticated attacks targeting industrial control systems. The article also offers advice on securing cross-account access in cloud environments, provides resources for building effective security programs, and details techniques for detecting container escape vulnerabilities. Finally, it touches upon broader security issues such as the adoption of passkeys, potential risks associated with widely used open-source software, and law enforcement actions against cybercrime services.Become a Patron:https://www.patreon.com/DecodedPodcastOther ways to contribute:https://buymeacoffee.com/decodedcybersecurityOn Instagram:Follow @decodedthecybersecuritypodcast to level up your cybersecurity skills
    --------  
    14:00
  • LLMs in Cybersecurity
    These sources discuss the growing integration of Large Language Models (LLMs) into cybersecurity, exploring both their benefits and associated risks. They highlight how LLMs can enhance threat detection, automate security tasks, and improve various defensive strategies. Simultaneously, the texts address the significant security challenges introduced by LLMs, including vulnerabilities like prompt injection, training data poisoning, and the potential for misuse in generating malicious content. Several sources emphasize the importance of ethical considerations, transparency, and robustness in the development and deployment of LLMs for security applications. The need for ongoing research and adaptation to counter the evolving threat landscape powered by AI is a recurring theme.Become a Patron:https://www.patreon.com/DecodedPodcastOther ways to contribute:https://buymeacoffee.com/decodedcybersecurityOn Instagram:Follow @decodedthecybersecuritypodcast to level up your cybersecurity skills
    --------  
    11:46
  • InfoSec News and Vulnerability Reports
    This security-focused publication covers various recent cyberattacks and vulnerabilities, including breaches affecting Kelly Benefits and TeleMessage, along with a hack targeting an airline used for deportations. It also presents strategies and tactics like fuzzing and Kubernetes security policies. Furthermore, the source announces new security products and tools, such as a digital risk protection service and a DNS firewall. Finally, the text touches upon miscellaneous security news, including regulatory fines for TikTok and White House budget proposals for a cybersecurity agency.Become a Patron:https://www.patreon.com/DecodedPodcastOther ways to contribute:https://buymeacoffee.com/decodedcybersecurityOn Instagram:Follow @decodedthecybersecuritypodcast to level up your cybersecurity skills
    --------  
    13:37

Más podcasts de Tecnología

Acerca de Decoded: The Cybersecurity Podcast

This cybersecurity study guide presents a comprehensive overview of key cybersecurity concepts through short answer questions and essay prompts. Topics covered include data security measures like encryption and message digests, authentication methods and their vulnerabilities, disaster recovery and business continuity planning, risk management strategies, and malware types.
Sitio web del podcast

Escucha Decoded: The Cybersecurity Podcast, Cupertino, podcast sobre Apple y muchos más podcasts de todo el mundo con la aplicación de radio.es

Descarga la app gratuita: radio.es

  • Añadir radios y podcasts a favoritos
  • Transmisión por Wi-Fi y Bluetooth
  • Carplay & Android Auto compatible
  • Muchas otras funciones de la app

Decoded: The Cybersecurity Podcast: Podcasts del grupo

Aplicaciones
Redes sociales
v7.18.2 | © 2007-2025 radio.de GmbH
Generated: 5/15/2025 - 11:02:20 PM