This week’s episode looks at the FBI’s 2024 Annual Internet Crime Report -an analysis that not only highlights the scale of cybercrime but also reveals the evolving tactics of cybercriminals and the staggering financial impact on individuals...
Imagine visiting your favorite website-one you trust, one you’ve browsed a hundred times before-only to discover it’s become a silent gateway for cybercriminals. What if the real danger wasn’t in suspicious emails or obvious scams, but lurking in...
In this week’s episode we are touching an intriguing topic. We’re going to explore Agentic AI, a fascinating area within artificial intelligence that focuses on autonomous systems capable of making decisions and performing tasks without...
This week’s episode is continuation of Troy Hunt’s cautionary tale , the creator of HaveIBeenPwned. Despite being a renowned security expert, Troy recently fell victim to a sophisticated phishing attack through Mailchimp. We’ll...
In this week’s episode we have a fascinating and cautionary tale about none other than Troy Hunt, the creator of HaveIBeenPwned. Despite being a renowned security expert, Troy recently fell victim to a sophisticated phishing attack through...
In this episode, we’ll look into a cybersecurity assessment method that mimics real-world attacks to test an organization’s security defenses and response capabilities: Threat emulation. It is one of the strategies to keep you ahead of the...
In this episode, we’ll be exploring a particularly intriguing file types: polyglot files. These digital shapeshifters have become a powerful tool in the arsenal of cyber attackers, capable of bypassing security measures, confusing systems, and...
In today’s episode, we’re diving deep into Data Exfiltration; one of the most serious threats facing organizations today.We’ll break down exactly what data exfiltration is, where it fits in the MITRE ATT&CK framework, the tools...
We are continuing with part 2 of “Behind the Login Screen – Understanding OS Authentication.” If you missed our first episode, I highly recommend giving it a listen before diving into today’s content. In part one, we started...
In today’s episode, we’re going to explore the fascinating topic of operating systems authentications. We all use it but how many of us wondered how the behind the curtains machinery work. We’ll be focusing on Windows, Linux/Unix...