In this episode we’re diving into an important topic that concerns one of the most trusted hardware security tokens on the market—the YubiKey 5 series. We’ll discuss a recently discovered vulnerability affecting YubiKeys and go over what it means...
Today, we will look into two essential cybersecurity solutions: File Integrity Monitoring or FIM and Endpoint Detection and Response, commonly known as EDR.Both of these technologies are crucial for protecting systems, but they work in very...
In today episode we’re diving into something that’s been making waves in the cybersecurity community—NIST Cybersecurity Framework 2.0.The NIST Cybersecurity Framework has long been a cornerstone for building robust security practices, and with the...
In this week’s episode we will dig in exploring a critical framework that’s reshaping how organizations approach cybersecurity—especially in the energy sector—known as the Cybersecurity Capability Maturity Model. This is also refer to C2M2...
In this week’s episode, we’re unpacking a topic that’s crucial for anyone connected to the digital world: Why Hackers Target Stolen Credentials. From understanding the value behind those stolen usernames and passwords to exploring the dark web...
In this week’s episode, we’re diving into the Malware Information Sharing Platform, or MISP. We’ll explore how MISP helps organizations share and leverage threat intelligence, enhancing their defense against cyber threats. Stay...
In this week’s episode, we will dig into the risk benefit analysis of allowing kernel level access to third party application. We will look into the inherent risks this brings into the operating system and the benefit thereof.We will also...
This week’s episode needs very little introduction: The CrowdStrike IT Outage.We will delve into the unprecedented IT outage caused by a corrupt update from CrowdStrike, which led to widespread Blue Screen of Death (BSOD) errors on Windows...
180 -Unmasking Data Breaches – Understanding the Surge and Examining Recent Major Incidents – Part 2
As I said in part of this two part series episode, It’s easy to feel like nothing is secure these days, with constant reports of data breaches and exploits occurring everywhere you look. From major corporations to small businesses, no one...
179 -Unmasking Data Breaches – Understanding the Surge and Examining Recent Major Incidents – Part 1
It’s easy to feel like nothing is secure these days, with constant reports of data breaches and exploits occurring everywhere you look. From major corporations to small businesses, no one seems immune to these pervasive cyber threats. The...