Powered by RND
PodcastsTecnologíaDecoded: The Cybersecurity Podcast

Decoded: The Cybersecurity Podcast

Edward Henriquez
Decoded: The Cybersecurity Podcast
Último episodio

Episodios disponibles

5 de 187
  • Chrome's Seventeen-Year Journey: Speed, Security, Stability, and Simplicity
    The article from AddyOsmani.com, titled "Google Chrome at 17 - A history of our browser," provides a comprehensive overview of Chrome's evolution since its 2008 launch, focusing on its core principles of speed, security, stability, and simplicity. The author, a Chrome team member, discusses the browser's origins with its multi-process architecture and V8 JavaScript engine, and details continuous efforts in performance optimization, including record-breaking Speedometer scores and improvements across devices. The text also highlights Chrome's robust security measures, such as sandboxing, Site Isolation, and AI-powered phishing detection, alongside its commitment to stability through fault isolation and memory management. Finally, it explores Chrome's ubiquitous presence from desktop to mobile and ChromeOS, its role in advancing the web platform through Project Fugu and PWAs, and the recent integration of AI features like Gemini for enhanced productivity and personalization.
    --------  
    20:37
  • September 2025 Windows Security Update Overview
    These sources primarily discuss Microsoft's September 2025 Patch Tuesday updates, highlighting the 81 vulnerabilities addressed, including two actively exploited zero-day flaws and ten critical issues. Several articles emphasize the importance of prompt patching for various Microsoft products like Windows, Office, and Azure, with one source noting the SMB protocol vulnerability (CVE-2025-55234) as a significant risk. The Reddit thread offers a community-driven perspective on deploying these patches, with system administrators sharing experiences and discussing common installation hang-ups, while another article points out that SAP had even more severe critical flaws than Microsoft this month. Microsoft's official message center provides detailed information on the security updates and ongoing changes like certificate-based authentication hardening, offering administrators crucial guidance and resources.
    --------  
    23:42
  • The GhostAction Supply Chain Attack
    The provided sources detail the GhostAction supply chain attack, a significant cybersecurity incident affecting GitHub projects. This attack involved malicious workflow files being committed to hundreds of repositories, stealing thousands of secrets such as npm, PyPI, and DockerHub tokens. GitGuardian researchers discovered and reported on the attack, identifying its widespread nature across various programming languages and projects. While the stolen secrets pose a risk for further malicious activity, proactive measures like revoking compromised tokens and commits are recommended for affected developers to mitigate the impact. The incident highlights the importance of robust security practices in open-source ecosystems.
    --------  
    19:49
  • Information Security: Attacks, Strategies, Tools
    A comprehensive overview of current cybersecurity issues, highlighting both active threats and proactive defense strategies. Several articles detail recent attacks, such as the exploitation of an Apache ActiveMQ flaw, the compromise of Microsoft logins through ADFS redirects, and the DripDropper malware, underscoring the constant evolution of attacker tactics. In response, the sources emphasize strategic shifts like adopting Detection-as-Code for robust security rule management and embracing cryptoagility for digital resilience against expiring certificates and emerging cryptographic vulnerabilities. Furthermore, the collection touches upon new security tools and initiatives, including Microsoft Entra Private Access for on-premises conditional access and the development of red-team tools, while also reporting on significant data breaches and the burgeoning market for zero-day exploits.
    --------  
    13:36
  • Noodlophile Stealer Evolves: Targeted Copyright Phishing Hits Enterprises
    This source is an in-depth security blog post from Morphisec, a cybersecurity company, detailing the evolution of the Noodlophile Stealer. It describes how this malware now employs sophisticated spear-phishing attacks disguised as copyright infringement notices, specifically targeting enterprises with a strong social media presence, especially on Facebook. The article explains the malware's delivery mechanisms, which exploit legitimate software vulnerabilities, its intermediate staging processes, and the enhanced obfuscation techniques it uses, including Telegram-based command-and-control. Finally, it outlines the Noodlophile Stealer's current data theft capabilities, focusing on browser-based information, and discusses its potential for future evolution, while also presenting Morphisec's solution to counter such threats.
    --------  
    14:58

Más podcasts de Tecnología

Acerca de Decoded: The Cybersecurity Podcast

This cybersecurity study guide presents a comprehensive overview of key cybersecurity concepts through short answer questions and essay prompts. Topics covered include data security measures like encryption and message digests, authentication methods and their vulnerabilities, disaster recovery and business continuity planning, risk management strategies, and malware types.
Sitio web del podcast

Escucha Decoded: The Cybersecurity Podcast, Applelianos y muchos más podcasts de todo el mundo con la aplicación de radio.es

Descarga la app gratuita: radio.es

  • Añadir radios y podcasts a favoritos
  • Transmisión por Wi-Fi y Bluetooth
  • Carplay & Android Auto compatible
  • Muchas otras funciones de la app

Decoded: The Cybersecurity Podcast: Podcasts del grupo

Aplicaciones
Redes sociales
v7.23.9 | © 2007-2025 radio.de GmbH
Generated: 9/17/2025 - 11:36:25 PM