In this episode, we’ll look into a cybersecurity assessment method that mimics real-world attacks to test an organization’s security defenses and response capabilities: Threat emulation. It is one of the strategies to keep you ahead of the...
In this episode, we’ll be exploring a particularly intriguing file types: polyglot files. These digital shapeshifters have become a powerful tool in the arsenal of cyber attackers, capable of bypassing security measures, confusing systems, and...
In today’s episode, we’re diving deep into Data Exfiltration; one of the most serious threats facing organizations today.We’ll break down exactly what data exfiltration is, where it fits in the MITRE ATT&CK framework, the tools...
We are continuing with part 2 of “Behind the Login Screen – Understanding OS Authentication.” If you missed our first episode, I highly recommend giving it a listen before diving into today’s content. In part one, we started...
In today’s episode, we’re going to explore the fascinating topic of operating systems authentications. We all use it but how many of us wondered how the behind the curtains machinery work. We’ll be focusing on Windows, Linux/Unix...
Today, we’ve got something really exciting for you. If you’ve been following the world of artificial intelligence lately, you’ve probably heard a lot about a new player in town: DeepSeek.Now, let me tell you, DeepSeek is shaking things up. They’re...
In this episode we will detail the significant announcement from Let’s Encrypt – the trusted nonprofit Certificate Authority that has been at the forefront of making the web more secure. Let’s Encrypt has revealed its plans to drastically reduce the...
This episode is one for you system admins out there! Today we’re discussing three actively exploited vulnerabilities you absolutely need to know about—CVE-2025-21333, CVE-2025-21334, and CVE-2025-21335. These vulnerabilities have been making...
This is the podcast where we explore the ever-evolving world of cybersecurity and provide practical advice for staying ahead of threats. I’m your host, Yusuf, and today’s episode is all about starting the new year with a solid plan.We’re diving into...
Today, we’re tackling a fundamental yet often misunderstood tool in every cybersecurity professional’s arsenal—vulnerability scanners. What role do they play in protecting our organizations? Where do they shine, and where do they fall short?As...