Today, we’ve got something really exciting for you. If you’ve been following the world of artificial intelligence lately, you’ve probably heard a lot about a new player in town: DeepSeek.Now, let me tell you, DeepSeek is shaking things up. They’re...
In this episode we will detail the significant announcement from Let’s Encrypt – the trusted nonprofit Certificate Authority that has been at the forefront of making the web more secure. Let’s Encrypt has revealed its plans to drastically reduce the...
This episode is one for you system admins out there! Today we’re discussing three actively exploited vulnerabilities you absolutely need to know about—CVE-2025-21333, CVE-2025-21334, and CVE-2025-21335. These vulnerabilities have been making...
This is the podcast where we explore the ever-evolving world of cybersecurity and provide practical advice for staying ahead of threats. I’m your host, Yusuf, and today’s episode is all about starting the new year with a solid plan.We’re diving into...
Today, we’re tackling a fundamental yet often misunderstood tool in every cybersecurity professional’s arsenal—vulnerability scanners. What role do they play in protecting our organizations? Where do they shine, and where do they fall short?As...
This final episode of 2024, we recap the best the most listened to episodes of the year. And this year we have a great four back to back of the greatest of them all. Lets start with the first eisode 191 – Is The Browser The New Operating...
It is a topical episode we’re diving into a high-stakes challenge every organization faces: It is holiday season, how do you manage threats when most of the security team is off duty. Imagine a holiday season, a long weekend, or even an unexpected...
In this week’s episode, we’re diving into a concerning and highly consequential topic: the Volt Typhoon espionage campaign—an advanced persistent threat that has sent shockwaves through the cybersecurity and telecommunications industries.Volt...
This week episode, we dive into one of the most fascinating aspects of digital investigations: Windows forensic artifacts.It does not matter who you are: a security professional, an aspiring investigator, or simply curious about how experts uncover...
Today, we’re tackling a topic that every organization, big or small, absolutely must take seriously: Incident Response PlaybookImagine this: It’s 3 a.m., and your phone buzzes with an alert. A possible ransomware attack has been detected in your...