Daily Cyber Security News
By: The Daily Dive
Language: en
Categories: News
Your daily update for cybersecurity news
Episodes
What Is Anomaly Detection in Cybersecurity
Jan 08, 2026An overview of cybersecurity anomaly detection, focussing on overview
Duration: 00:03:00Apple WebKit WebKit Zero Days & Crypto Wallet Breaches
Jan 05, 2026This episode unpacks Apple WebKit zero day exploits bypassing Safari defenses, MacSync data stealer, supply chain compromise of Trust Wallet s Chrome extension, Telegram crypto crime vulnerabilities, and ZachXBT s cross chain wallet drains totaling over 100K.
Duration: 00:10:12Adaptive Multi Factor Authentication Explained
Jan 01, 2026An overview of cybersecurity Adaptive Multi Factor Authentication, focussing on Adaptive MFA Overview
Duration: 00:02:41Stealka Malware Cyber Threat Roundup From Stealka to Trust Wallet
Dec 29, 2025Kaspersky reveals Stealka stealer in pirated mods, warns of a 2025 financial crime surge, and details Evasive Panda DNS poisoning. We also cover the La Poste DDoS outage, Spotify s 300 TB library scrape, Telegram phishing and infra flaw, plus the Christmas day Trust Wallet Chrome extension supply chain hack.
Duration: 00:10:03What Is Homomorphic Encryption
Dec 25, 2025An overview of cybersecurity homomorphic encryption, focussing on homomorphic encryption overview
Duration: 00:03:04Cisco AsyncOS SEG Cisco AsyncOS SEG Zero Day & Cyber News Roundup
Dec 22, 2025Highlights include Amazon s keyboard lag impostor catch, AWS GuardDuty cryptomining and GRU edge campaigns, Kindle eBook and plugin flaws, plus a critical Cisco AsyncOS SEG zero day under active Chinese APT exploitation. Also covered Google Chrome patches and React2Shell abuse, Microsoft OAuth phishing and RC4 deprecation, and the 94 GB ShinyHunters Pornhub Premium data breach.
Duration: 00:06:26What Is an Extension Supply Chain Attack
Dec 18, 2025An overview of cybersecurity extension supply chain attack, focussing on overview of extension supply chain attacks
Duration: 00:03:23Apple OS Platforms Critical Apple Patches Binance Hijack & Linux CVEs
Dec 15, 2025Apple releases fixes for critical buffer overflows and zero days across macOS, iOS and other platforms. Binance s co CEO WeChat was hijacked to fuel a meme token pump and dump. Over 100 urgent Linux kernel CVEs demand immediate patching and reboots.
Duration: 00:07:38What Is Attack Surface Discovery
Dec 11, 2025An overview of cybersecurity Attack surface discovery, focussing on introduction attack surface
Duration: 00:02:30React Framework 29.7Tbps DDoS, React RCE Outages & Ubuntu Fixes
Dec 08, 2025Highlights Cloudflare s record 29.7 Tbps DDoS defense, an emergency React remote code exec flaw that brought down major sites, Telegram s hack and fortify cycle with a fresh zero day, and Ubuntu s sweeping kernel and toolchain patch blitz.
Duration: 00:07:19What Is Deception Technology
Dec 04, 2025An overview of cybersecurity Deception Technology, focussing on introduction to deception technology
Duration: 00:03:44Multiple Platforms Rapid Fire Cybersecurity Briefing
Dec 01, 2025Covers Android malware purge, Antigravity IDE exploit, OAuth and Chrome patch alerts, Mixpanel fallout, AI driven ransomware, Telegram phishing wave, and Upbit s 30M Solana wallet breach.
Duration: 00:09:24Introduction to the MITRE ATT&CK Framework
Nov 27, 2025An overview of cybersecurity MITRE ATT&CK Framework, focussing on framework overview
Duration: 00:02:19Linux Kernel AI Espionage, Critical Kernel Vulns & Telegram
Nov 17, 2025Anthropic disrupted the first large scale AI driven espionage campaign linked to a China backed group Linux admins race to patch dozens of critical kernel flaws across media, fs, networking and drivers Telegram scrambles to contain malware bots, data leaks and fake update scams.
Duration: 00:08:08What Is Shadow AI
Nov 13, 2025An overview of cybersecurity Shadow AI, focussing on shadow ai overview
Duration: 00:03:18Balancer batch swap DeFi Rounding Bug Drains 128M Cisco Patches, AI
Nov 10, 2025This episode dissects Balancer v2 s 116 128M multi chain exploit via a tiny batch swap rounding bug, then shifts to Cisco s AI driven threat detection demo, urgent UCCX RCE and ASA FTD firewall patches, and the launch of Security Cloud Control.
Duration: 00:04:39Introduction to Active Directory Security
Nov 06, 2025An overview of cybersecurity Active Directory security, focussing on active directory security fundamentals
Duration: 00:03:14VMware Tools CISA Urgent Patch for VMware Tools Zero Day
Nov 03, 2025CISA has ordered U.S. agencies to immediately patch a VMware Tools zero day under active China linked exploitation, added critical WSUS and ICS flaws to its KEV list, and flagged live attacks on a Linux kernel bug. Meanwhile, Google enforces HTTPS defaults, Microsoft battles fresh zero days and AI powered phishing, and organizations scramble on encrypted DNS, BEC scams and AI defense strategies.
Duration: 00:12:52Why classical crypto fails against quantum attacks
Oct 30, 2025An overview of cybersecurity quantum safe cryptography, focussing on quantum threat
Duration: 00:02:51WatchGuard Fireware WatchGuard Fireware VPN RCE Bug
Oct 29, 2025An out of bounds write in the Fireware VPN module lets unauthenticated attackers gain remote code execution on Firebox appliances. Over 75K devices exposed apply the patch now.
Duration: 00:10:00Introduction to BGP and Internet Routing
Oct 23, 2025An overview of cybersecurity BGP hijacking, focussing on bgp basics
Duration: 00:02:57Cisco SNMP Zero Disco Cisco SNMP Rootkit Exploit
Oct 20, 2025A deep dive into Cisco s critical SNMP Zero Disco flaw CVE 2025 20352 used to deploy stealth Linux rootkits, plus high severity IOS ASA bugs under scrutiny. We also cover Google Workspace M365 phishing, Android 16 s defenses vs. the new Pixnapping timing attack, the EtherHiding crypto theft malware, and Telegram s upgraded 2FA and anti phishing shields.
Duration: 00:08:15What Is Deepfake Social Engineering
Oct 16, 2025An overview of cybersecurity deepfake social engineering, focussing on overview of deepfake social engineering
Duration: 00:03:19Discord Zendesk Discord Zendesk Breach & Google Patches
Oct 13, 2025Discord s age verification contractor Zendesk was compromised for 58 hours, exposing up to 70k ID images and user data in a high impact third party breach. Google rushed out emergency Chrome patches for critical WebAssembly and memory bugs, launched an AI only bug bounty for Gemini, and warned of Cl0p exploiting an Oracle EBS zero day CVE 2025 61882 .
Duration: 00:04:41Why Quantum Computing Threatens Cryptography
Oct 09, 2025An overview of cybersecurity quantum safe cryptography, focussing on quantum threats
Duration: 00:02:46Cloud & OS Platforms AI Ransomware Defense, Encryption & Patches
Oct 06, 2025Covers Google s new AI driven ransomware detection in Drive and upcoming Gmail end to end encryption, Telegram s account locks, malware alerts and anti phishing controls, plus Ubuntu s latest kernel and library security patches to harden Linux deployments.
Duration: 00:08:24What Are Non Human Identities NHIs
Oct 04, 2025An overview of cybersecurity Non Human Identities NHIs , focussing on Introduction to Non Human Identities
Duration: 00:03:46What are over permissioned API keys
Sep 25, 2025An overview of cybersecurity Over permissioned API Keys, focussing on over permissioned api keys
Duration: 00:02:53macOS ChillyHell Backdoors, Zero Clicks, AI Phishing & Kernel Bugs
Sep 15, 2025This episode covers Apple s ChillyHell backdoor and iCloud zero click spyware, Microsoft s AI phishing wave with Patch Tuesday fixes, critical Linux kernel flaws, the massive npm supply chain attack, and Telegram bot data leaks.
Duration: 00:13:22What is Threat Hunting
Sep 11, 2025An overview of cybersecurity Threat hunting, focussing on threat hunting overview
Duration: 00:03:32Drift OAuth tokens Supply Chain Breach Exposes OAuth Tokens
Sep 08, 2025Unpack Cloudflare s mis issued 1.1.1.1 TLS certs, record 11.5 Tbps DDoS mitigation, Salesloft s Drift supply chain breach leaking hundreds of OAuth tokens, and Telegram s malware, DDoS sieges and Russian government clash.
Duration: 00:05:57What are fileless threats
Sep 04, 2025An overview of cybersecurity fileless threats, focussing on introduction to fileless threats
Duration: 00:02:50Anthropic Claude AI Driven Phishing & RDP to TransUnion Breach
Sep 01, 2025Cybercriminals weaponize Anthropic Claude for automated phishing, ransomware and real time data extortion. Google removes 77 malicious Play Store apps and patches a critical Chrome zero day. Microsoft RDP AD and Azure endpoints face new exploit waves. Telegram bots deliver spyware. A TransUnion breach exposes 4.4 M consumer records via a third party app flaw.
Duration: 00:13:33What is Reverse Engineering
Aug 28, 2025An overview of cybersecurity Reverse engineering, focussing on reverse engineering overview
Duration: 00:03:27ImageIO Apple ImageIO Zero Click Zero Day Patched
Aug 25, 2025Apple released emergency updates for a critical zero click zero day in its ImageIO framework exploited to siphon crypto. The episode also covers Google's AI driven scam lures, Microsoft s CVE 2025 29824 exploits, sweeping Linux kernel fixes and Telegram s new security shields.
Duration: 00:11:06What Is Extended Detection and Response XDR
Aug 21, 2025An overview of cybersecurity Extended Detection and Response XDR , focussing on xdr overview
Duration: 00:03:26FortiSIEM Fortinet RCE & Global Cyber Updates
Aug 18, 2025Unpack a pre auth FortiSIEM RCE in the wild, brute force SSL VPN sieges, Google and Microsoft s latest security wins and AI injection risks, a Telegram malware surge under Russian crackdowns, and an active WinRAR zero day backdoor campaign.
Duration: 00:11:34What are Living off the Land attacks
Aug 14, 2025An overview of cybersecurity Living off the Land LotL attacks, focussing on overview
Duration: 00:02:46Gemini AI Calendar Promptware Attack in Google Calendar
Aug 11, 2025A prompt injection bug in Google Calendar let attackers embed hidden commands in invites or emails to hijack Gemini AI agents and control smart home devices. Fully patched, it underscores the growing risk of AI promptware and the need to sanitize untrusted inputs.
Duration: 00:07:57What is Behavioral Fingerprinting
Aug 07, 2025An overview of cybersecurity Behavioral Fingerprinting, focussing on introduction
Duration: 00:02:30Aeroflot IT Systems Aeroflot Breach, CISA Kit, Google & Telegram
Aug 04, 2025Pro Ukraine hacktivists crippled Aeroflot servers, CISA released incident response and Zero Trust guidance, Google patched critical zero days and supply chain flaws, and Telegram rolled out new privacy defenses.
Duration: 00:11:00Container Security Fundamentals
Jul 31, 2025An overview of cybersecurity container security, focussing on container security fundamentals
Duration: 00:03:12What are LLM jailbreak attacks
Jul 24, 2025An overview of cybersecurity LLM jailbreak attacks, focussing on LLM jailbreak attacks overview
Duration: 00:02:52BigONE hot wallet Supply Chain Heist to Zero Days Weekly Brief
Jul 21, 2025This CyberScene episode unpacks the 27M BigONE supply chain crypto hack, Elmo's X account hijack, Google's rapid zero day fixes, and Telegram's Android malware blitz underscoring the critical role of third party controls, strong authentication, and AI driven defenses.
Duration: 00:09:25What Is DNS Tunneling
Jul 17, 2025An overview of cybersecurity DNS tunneling, focussing on dns tunneling overview
Duration: 00:02:41GMX V1 GMX 40M Arbitrum Exploit & Weekly Cyber Brief
Jul 14, 2025Highlights include GMX s 40M V1 Arbitrum exploit and white hat bounty, a major Linux kernel patch spree for DoS and privilege bugs, an AI driven Rubio deepfake scam, Microsoft s Patch Tuesday blitz, and Telegram malware scam threats.
Duration: 00:12:53What is Ransomware as a Service
Jul 10, 2025An overview of cybersecurity Ransomware as a Service RaaS , focussing on Ransomware as a Service RaaS overview
Duration: 00:03:35Cisco UCM Cisco UCM Backdoor, Qantas Breach & Telegram
Jul 07, 2025Covers Cisco s emergency patch for a hard coded SSH root backdoor in UCM CVE 2025 20309 , Qantas s vendor platform breach impacting six million customers, and Telegram s new malware alerts and bot compromise fallout.
Duration: 00:09:47What are Side Channel Timing Attacks
Jul 03, 2025An overview of cybersecurity Side Channel Timing Attack, focussing on side channel timing attacks
Duration: 00:03:16Gmail MFA Bypass Phishing Bypass Exposes Gmail Accounts
Jun 30, 2025A sophisticated phishing campaign sidesteps Gmail s MFA and exploits a username recovery flaw to harvest user phone numbers. Also explores Google s AI defenses, Android 16 network protections, Kaspersky s SparkKitty spyware, Telegram data leaks, and critical Ubuntu kernel patches.
Duration: 00:12:39What Is Attack Surface Management
Jun 26, 2025An overview of cybersecurity attack surface management, focussing on introduction to attack surface management
Duration: 00:02:51CVE 2025 2783 Chrome Zero Day & Cloud PC Safeguards
Jun 23, 2025This episode dissects Google s Chrome zero day CVE 2025 2783 exploited by TaxOff, Scattered Spider phishing, historic 16B credential breach, Microsoft s Cloud PC security defaults and passkey mandate, Iran s Nobitex exchange hack, Telegram data leaks and malware campaigns, plus Ubuntu s critical privilege escalation and RCE patches.
Duration: 00:11:41Understanding Prompt Injection
Jun 19, 2025An overview of cybersecurity Agentic AI vulnerabilities, focussing on prompt injection
Duration: 00:03:26Apple iMessage Apple iMessage Zero Click & OAuth Malware Tricks
Jun 16, 2025Episode covers Apple s iMessage zero click exploit patch that exposed Secure Enclave keys, Google OAuth consent flow abuse for stealthy malware delivery, Microsoft s zero click AI hack fix, Interpol s massive info stealer takedown, and Telegram s new anti scam defenses.
Duration: 00:13:04What Is DNS over HTTPS DoH
Jun 12, 2025An overview of cybersecurity DNS over HTTPS DoH , focussing on introduction to doh
Duration: 00:02:42Coinbase KYC Data Coinbase Breach, FBI Alerts, Google & More
Jun 09, 2025Dissecting Coinbase s 70K user KYC data leak and 400M response, the FBI s latest phishing, botnet BADBOX 2.0 and ransomware Play warnings, Google s emergency Chrome zero day patches and email safeguards, Microsoft s threat tracking patches, and Telegram malware privacy issues.
Duration: 00:15:40What is SOAR
Jun 05, 2025An overview of cybersecurity Security Orchestration, Automation, and Response SOAR , focussing on SOAR fundamentals
Duration: 00:04:07ASUS routers ViciousTrap, Debian Patches & Telegram Threats
Jun 02, 2025This episode delves into the ViciousTrap backdoor compromise of over 9,000 ASUS routers, the latest Debian security advisories including kernel and app patches, and emerging threats and defenses in the Telegram ecosystem.
Duration: 00:07:54Cetus DEX Cetus DEX 230M Hack & Cyber Highlights
May 26, 2025A packed episode covering the 230M Cetus DEX oracle exploit, CISA s new advisories and ICS alerts, Coinbase s insider driven breach of 69K users, and Microsoft s Lumma stealer takedown and critical patches plus the heated DeFi centralization debate on Sui.
Duration: 00:00:05What is a Zero Knowledge Proof
May 22, 2025An overview of cybersecurity zero knowledge proof, focussing on zero knowledge proof basics
Duration: 00:02:37Insider Threats Insider breach, Android hardening & ransomware
May 19, 2025Explore Coinbase s bribed insider breach and 20M extortion, Google s Android 16 security enhancements and emergency Chrome Gmail fixes, and the DragonForce ransomware attack on Marks & Spencer exposing customer data. We unpack attack vectors, mitigation strategies, and lessons for preventing insider threats, hardening mobile browser platforms, and defending retail networks.
Duration: 00:07:43What is Confidential Computing
May 15, 2025An overview of cybersecurity confidential computing, focussing on confidential computing overview
Duration: 00:02:33Cisco SD WAN Manager Cisco Phishing, LockBit Leak, Telegram Defenses
May 12, 2025Cisco s Q1 phishing surge and critical IOS SD WAN patches, LockBit s dark web breach exposing 60k Bitcoin wallets, and Telegram s new anti scam malware security controls.
Duration: 00:09:30Cisco IOS XE Cisco Patches, LockBit Leak & Telegram Scams
May 12, 2025Covers Cisco s critical IOS XE and ASA patches, Talos AI threat research, the LockBit RaaS database leak exposing 60k BTC addresses and insider tools, and Telegram s malware scams and new defenses.
Duration: 00:08:16What Is an SBOM
May 08, 2025An overview of cybersecurity SBOM, focussing on introduction to sbom
Duration: 00:02:21AirPlay Protocol AirBorne Apple s 23 AirPlay Vulnerabilities Exposed
May 05, 2025Researchers at Oligo uncovered 23 flaws in Apple s AirPlay allowing unauthenticated code pushes to third party devices. While iOS 18.4 devices are patched, billions of accessories remain exposed. The episode also dives into Apple s mercenary spyware alerts, Telegram s new anti phishing suite, and the DragonForce ransomware breach at the UK Co op.
Duration: 00:05:59AirPlay Devices AirBorne AirPlay Flaws, Spyware & Ransomware
May 05, 2025A technical deep dive into Apple s mercenary spyware alerts and the 23 AirBorne AirPlay flaws risking zero click code execution, Telegram s new anti phishing filters and crypto upgrades, and the Co op s showdown with DragonForce ransomware.
Duration: 00:06:05AirPlay AirBorne zero click RCE bugs
May 05, 2025Oligo discovered 23 zero click, wormable remote code exec flaws in Apple s AirPlay protocol SDK. While iOS, macOS and first party devices are patched, millions of third party units remain vulnerable update firmware or disable AirPlay until fixes arrive.
Duration: 00:07:28AirPlay SDK AirBorne Wormable Zero Click RCE in AirPlay
May 05, 2025Podcast covers Apple s Pegasus alerts, critical AirPlay AirBorne zero click RCE, Telegram anti spam and phishing defenses, TikTok s 530M GDPR fine, and the Co op s data breach plus key mitigation steps.
Duration: 00:06:39Introduction to Shift Left Security
May 01, 2025An overview of cybersecurity Shift Left, focussing on shift left security overview
Duration: 00:02:08Multiple Products Weekly Cybersecurity Headlines Deep Dive
Apr 28, 2025This episode covers the FBI s 10M Salt Typhoon hunt and a record breaking 16.6B in internet crime losses Google s MiraclePtr zero day defenses, Android auto reboot, and News plugin CSRF Telegram s encryption upgrades and urgent Ubuntu kernel and package patches.
Duration: 00:09:19What Is an Attack Graph
Apr 24, 2025An overview of cybersecurity attack graphs, focussing on attack graphs overview
Duration: 00:03:09What is Prompt Injection
Apr 24, 2025An overview of cybersecurity LLM vulnerabilities, focussing on prompt injection
Duration: 00:03:33KiloEx Oracle 7M KiloEx Cross Chain Oracle Exploit
Apr 21, 2025A flawed access control in KiloEx s cross chain price oracle let attackers drain 7M across BNB Chain, Base and Taiko, forcing emergency patches and a 750K bounty to retrieve stolen funds.
Duration: 00:09:02KiloEx oracle KiloEx 7M cross chain hack & recovery
Apr 21, 2025Dive into Android 16 s auto restart safeguard, sophisticated Google OAuth phishing, 4chan s record breach, KiloEx s 7M cross chain oracle exploit & full recovery, and MITRE s CVE funding lifeline.
Duration: 00:07:44What is Threat Research Automation
Apr 17, 2025An overview of cybersecurity threat research automation, focussing on cybersecurity automation
Duration: 00:04:16iOS, Android, Windows Vulnerabilities in Big Tech Security Updates
Apr 14, 2025Explore key security challenges facing tech giants like Apple, Google, Microsoft, Telegram, and WhatsApp. Delve into vulnerabilities in iOS, Android, and Windows, and learn about critical security updates, privacy issues, and regulatory tensions. Understand the role of AI in enhancing cybersecurity measures and the importance of staying vigilant against evolving threats.
Duration: 00:08:38Introduction to Lateral Movement Attacks
Apr 10, 2025An overview of cybersecurity lateral movement attacks, focussing on lateral movement attacks
Duration: 00:03:33Google Chrome Tech Giants vs. Cyber Threats A Dynamic Battle
Apr 07, 2025Today's podcast explores cybersecurity strategies from Google, Microsoft, Oracle, Ivanti, and Ubuntu. Google addresses North Korean infiltration and enhances Chrome with new security patches. Microsoft tackles phishing threats with AI and passwordless solutions. Oracle faces scrutiny over data breaches. Ivanti patches critical VPN vulnerabilities. Ubuntu releases crucial security updates for Linux systems.
Duration: 00:08:12Understanding Heap Based Overflow
Apr 03, 2025An overview of cybersecurity heap based overflow vulnerability, focussing on heap based overflow vulnerability
Duration: 00:03:38Google Chrome Exploring Zero Day Vulnerabilities in Chrome
Mar 31, 2025The episode delves into critical zero day vulnerabilities affecting Google's Chrome browser, with a focus on Russian organizations and journalists. It discusses Google's quick patching efforts and acquisition of Wiz to enhance security measures.
Duration: 00:06:58Introduction to Steganographic Malware
Mar 27, 2025An overview of cybersecurity Steganographic malware, focussing on steganographic malware
Duration: 00:04:16Apple OS Apple's Security Scrutiny Unveiled
Mar 24, 2025Explore critical vulnerabilities impacting Apple OS, including iOS, macOS, iPadOS, and others. Learn about risks in AirDrop and Web Content Handler, phishing scams targeting Mac users, and Apple's response with security patches and encryption efforts.
Duration: 00:08:43Understanding Adversarial Input
Mar 20, 2025An overview of cybersecurity adversarial input, focussing on adversarial input
Duration: 00:03:00Apple Products Apple's Security Overhaul Strategies
Mar 17, 2025Exploration of Apple's response to zero day vulnerabilities, focusing on urgent updates for Safari, WebKit, and broader product security enhancements. The podcast delves into the integration of end to end encryption for RCS messages, challenges with malware targeting bank data, and other cybersecurity threats, including critiques on Apple's notification clarity and protection measures.
Duration: 00:09:04Introduction to Hypervolumetric DDoS Attacks
Mar 13, 2025An overview of cybersecurity hypervolumetric DDoS attacks, focussing on hypervolumetric DDoS attacks
Duration: 00:03:35Bybit Massive Crypto Breach at Bybit
Mar 10, 2025Bybit, a major crypto trading platform, suffered a historic 1.4 billion theft by North Korean hackers exploiting platform vulnerabilities. The incident underscores the need for robust cybersecurity in centralized exchanges.
Duration: 00:08:41Understanding MITM
Mar 06, 2025An overview of cybersecurity Man in the Middle Attack MITM , focussing on Man in the Middle Attack
Duration: 00:03:33Apple iCloud Cybersecurity Shifts Apple to Linux Updates
Mar 03, 2025Exploring the evolving cybersecurity landscape with Apple's data protection controversies, critical vulnerabilities in the Find My network, Microsoft's fight against AI driven cyber threats, Bybit's response to a massive crypto heist, and the need for prompt updates against Linux kernel vulnerabilities.
Duration: 00:06:58Introduction to MITRE ATT&CK
Feb 27, 2025An overview of cybersecurity MITRE ATT&CK, focussing on MITRE ATT&CK Framework
Duration: 00:03:56Apple iCloud Tech Talk Diverse Cybersecurity Challenges
Feb 24, 2025This podcast episode delves into pressing cybersecurity issues, including Apple's mandate to disable iCloud encryption in the UK, Microsoft's battle with malware targeting Xcode, and Google's push for AI driven defenses. The episode also explores emerging threats against Palo Alto Networks and hacking incidents affecting cryptocurrency exchange Bybit. These discussions highlight regulatory tensions, advances in security technology, and the importance of vigilance and timely updates in today's digital landscape.
Duration: 00:08:48Introduction to Deep Packet Inspection
Feb 20, 2025An overview of cybersecurity Deep Packet Inspection, focussing on deep packet inspection
Duration: 00:03:55iOS and iPadOS Tackling Modern Cyber Threats
Feb 17, 2025Explore how tech giants are addressing cybersecurity. Apple's urgent patches against zero day flaws, Google's AI driven defenses, Intel's vulnerability fixes, Microsoft's efforts against Russian cyber threats, and challenges in Musk's DOGE initiative underscore the need for vigilance in digital security.
Duration: 00:08:45Introduction to Adaptive Attacks
Feb 13, 2025An overview of cybersecurity Adaptive attacks, focussing on adaptive attacks
Duration: 00:03:37Apple Ecosystem Apple's Security Challenges & Innovations
Feb 10, 2025Explore Apple's response to security threats urgent updates for critical vulnerabilities, risks from the 'SparkCat' campaign and North Korean hackers, privacy debates with the UK government, and innovations like Advanced Data Protection and PCC.
Duration: 00:08:05Introduction to Cybercrime Forums
Feb 06, 2025An overview of cybersecurity cybercrime forums, focussing on cybercrime forums
Duration: 00:03:41Apple Devices Apple's Cybersecurity Challenges
Feb 03, 2025The episode discusses multiple security vulnerabilities and zero day exploits affecting Apple devices, focusing on recent updates for iPhone, iPad, and Mac systems to mitigate threats like side channel attacks on A and M series chips. It highlights Apple's updates for iOS and macOS Ventura to improve data protection and addresses speculative execution threats such as 'Son of Spectre.' The podcast emphasizes the importance of user updates to safeguard against these evolving cyber threats.
Duration: 00:09:07What is OSINT
Jan 30, 2025An overview of cybersecurity OSINT, focussing on Introduction to OSINT
Duration: 00:04:06Cloudflare, Google Cybersecurity Updates Giants Tackle New Threats
Jan 27, 2025In this podcast episode, we explore the recent cybersecurity developments from industry giants like Cloudflare and Google. Cloudflare has successfully mitigated the largest recorded DDoS attack and addressed critical vulnerabilities in its services, demonstrating an increase in the frequency and severity of DDoS attacks. Concurrently, Google is countering a malware campaign targeting Mac users through its ad network and addressing security loopholes in Android and Chrome. Additionally, Google is improving security features and handling ethical dilemmas regarding the use of its technology. Other tech leaders like IBM, Microsoft, and Oracle are also addressing various challenges from privilege escalation to phishing...
Duration: 00:09:32Introduction to API Security
Jan 23, 2025An overview of cybersecurity API security, focussing on API security
Duration: 00:03:27