Daily Cyber Security News

Daily Cyber Security News

By: The Daily Dive

Language: en

Categories: News

Your daily update for cybersecurity news

Episodes

What Is Anomaly Detection in Cybersecurity
Jan 08, 2026

An overview of cybersecurity anomaly detection, focussing on overview

Duration: 00:03:00
Apple WebKit WebKit Zero Days & Crypto Wallet Breaches
Jan 05, 2026

This episode unpacks Apple WebKit zero day exploits bypassing Safari defenses, MacSync data stealer, supply chain compromise of Trust Wallet s Chrome extension, Telegram crypto crime vulnerabilities, and ZachXBT s cross chain wallet drains totaling over 100K.

Duration: 00:10:12
Adaptive Multi Factor Authentication Explained
Jan 01, 2026

An overview of cybersecurity Adaptive Multi Factor Authentication, focussing on Adaptive MFA Overview

Duration: 00:02:41
Stealka Malware Cyber Threat Roundup From Stealka to Trust Wallet
Dec 29, 2025

Kaspersky reveals Stealka stealer in pirated mods, warns of a 2025 financial crime surge, and details Evasive Panda DNS poisoning. We also cover the La Poste DDoS outage, Spotify s 300 TB library scrape, Telegram phishing and infra flaw, plus the Christmas day Trust Wallet Chrome extension supply chain hack.

Duration: 00:10:03
What Is Homomorphic Encryption
Dec 25, 2025

An overview of cybersecurity homomorphic encryption, focussing on homomorphic encryption overview

Duration: 00:03:04
Cisco AsyncOS SEG Cisco AsyncOS SEG Zero Day & Cyber News Roundup
Dec 22, 2025

Highlights include Amazon s keyboard lag impostor catch, AWS GuardDuty cryptomining and GRU edge campaigns, Kindle eBook and plugin flaws, plus a critical Cisco AsyncOS SEG zero day under active Chinese APT exploitation. Also covered Google Chrome patches and React2Shell abuse, Microsoft OAuth phishing and RC4 deprecation, and the 94 GB ShinyHunters Pornhub Premium data breach.

Duration: 00:06:26
What Is an Extension Supply Chain Attack
Dec 18, 2025

An overview of cybersecurity extension supply chain attack, focussing on overview of extension supply chain attacks

Duration: 00:03:23
Apple OS Platforms Critical Apple Patches Binance Hijack & Linux CVEs
Dec 15, 2025

Apple releases fixes for critical buffer overflows and zero days across macOS, iOS and other platforms. Binance s co CEO WeChat was hijacked to fuel a meme token pump and dump. Over 100 urgent Linux kernel CVEs demand immediate patching and reboots.

Duration: 00:07:38
What Is Attack Surface Discovery
Dec 11, 2025

An overview of cybersecurity Attack surface discovery, focussing on introduction attack surface

Duration: 00:02:30
React Framework 29.7Tbps DDoS, React RCE Outages & Ubuntu Fixes
Dec 08, 2025

Highlights Cloudflare s record 29.7 Tbps DDoS defense, an emergency React remote code exec flaw that brought down major sites, Telegram s hack and fortify cycle with a fresh zero day, and Ubuntu s sweeping kernel and toolchain patch blitz.

Duration: 00:07:19
What Is Deception Technology
Dec 04, 2025

An overview of cybersecurity Deception Technology, focussing on introduction to deception technology

Duration: 00:03:44
Multiple Platforms Rapid Fire Cybersecurity Briefing
Dec 01, 2025

Covers Android malware purge, Antigravity IDE exploit, OAuth and Chrome patch alerts, Mixpanel fallout, AI driven ransomware, Telegram phishing wave, and Upbit s 30M Solana wallet breach.

Duration: 00:09:24
Introduction to the MITRE ATT&CK Framework
Nov 27, 2025

An overview of cybersecurity MITRE ATT&CK Framework, focussing on framework overview

Duration: 00:02:19
Linux Kernel AI Espionage, Critical Kernel Vulns & Telegram
Nov 17, 2025

Anthropic disrupted the first large scale AI driven espionage campaign linked to a China backed group Linux admins race to patch dozens of critical kernel flaws across media, fs, networking and drivers Telegram scrambles to contain malware bots, data leaks and fake update scams.

Duration: 00:08:08
What Is Shadow AI
Nov 13, 2025

An overview of cybersecurity Shadow AI, focussing on shadow ai overview

Duration: 00:03:18
Balancer batch swap DeFi Rounding Bug Drains 128M Cisco Patches, AI
Nov 10, 2025

This episode dissects Balancer v2 s 116 128M multi chain exploit via a tiny batch swap rounding bug, then shifts to Cisco s AI driven threat detection demo, urgent UCCX RCE and ASA FTD firewall patches, and the launch of Security Cloud Control.

Duration: 00:04:39
Introduction to Active Directory Security
Nov 06, 2025

An overview of cybersecurity Active Directory security, focussing on active directory security fundamentals

Duration: 00:03:14
VMware Tools CISA Urgent Patch for VMware Tools Zero Day
Nov 03, 2025

CISA has ordered U.S. agencies to immediately patch a VMware Tools zero day under active China linked exploitation, added critical WSUS and ICS flaws to its KEV list, and flagged live attacks on a Linux kernel bug. Meanwhile, Google enforces HTTPS defaults, Microsoft battles fresh zero days and AI powered phishing, and organizations scramble on encrypted DNS, BEC scams and AI defense strategies.

Duration: 00:12:52
Why classical crypto fails against quantum attacks
Oct 30, 2025

An overview of cybersecurity quantum safe cryptography, focussing on quantum threat

Duration: 00:02:51
WatchGuard Fireware WatchGuard Fireware VPN RCE Bug
Oct 29, 2025

An out of bounds write in the Fireware VPN module lets unauthenticated attackers gain remote code execution on Firebox appliances. Over 75K devices exposed apply the patch now.

Duration: 00:10:00
Introduction to BGP and Internet Routing
Oct 23, 2025

An overview of cybersecurity BGP hijacking, focussing on bgp basics

Duration: 00:02:57
Cisco SNMP Zero Disco Cisco SNMP Rootkit Exploit
Oct 20, 2025

A deep dive into Cisco s critical SNMP Zero Disco flaw CVE 2025 20352 used to deploy stealth Linux rootkits, plus high severity IOS ASA bugs under scrutiny. We also cover Google Workspace M365 phishing, Android 16 s defenses vs. the new Pixnapping timing attack, the EtherHiding crypto theft malware, and Telegram s upgraded 2FA and anti phishing shields.

Duration: 00:08:15
What Is Deepfake Social Engineering
Oct 16, 2025

An overview of cybersecurity deepfake social engineering, focussing on overview of deepfake social engineering

Duration: 00:03:19
Discord Zendesk Discord Zendesk Breach & Google Patches
Oct 13, 2025

Discord s age verification contractor Zendesk was compromised for 58 hours, exposing up to 70k ID images and user data in a high impact third party breach. Google rushed out emergency Chrome patches for critical WebAssembly and memory bugs, launched an AI only bug bounty for Gemini, and warned of Cl0p exploiting an Oracle EBS zero day CVE 2025 61882 .

Duration: 00:04:41
Why Quantum Computing Threatens Cryptography
Oct 09, 2025

An overview of cybersecurity quantum safe cryptography, focussing on quantum threats

Duration: 00:02:46
Cloud & OS Platforms AI Ransomware Defense, Encryption & Patches
Oct 06, 2025

Covers Google s new AI driven ransomware detection in Drive and upcoming Gmail end to end encryption, Telegram s account locks, malware alerts and anti phishing controls, plus Ubuntu s latest kernel and library security patches to harden Linux deployments.

Duration: 00:08:24
What Are Non Human Identities NHIs
Oct 04, 2025

An overview of cybersecurity Non Human Identities NHIs , focussing on Introduction to Non Human Identities

Duration: 00:03:46
What are over permissioned API keys
Sep 25, 2025

An overview of cybersecurity Over permissioned API Keys, focussing on over permissioned api keys

Duration: 00:02:53
macOS ChillyHell Backdoors, Zero Clicks, AI Phishing & Kernel Bugs
Sep 15, 2025

This episode covers Apple s ChillyHell backdoor and iCloud zero click spyware, Microsoft s AI phishing wave with Patch Tuesday fixes, critical Linux kernel flaws, the massive npm supply chain attack, and Telegram bot data leaks.

Duration: 00:13:22
What is Threat Hunting
Sep 11, 2025

An overview of cybersecurity Threat hunting, focussing on threat hunting overview

Duration: 00:03:32
Drift OAuth tokens Supply Chain Breach Exposes OAuth Tokens
Sep 08, 2025

Unpack Cloudflare s mis issued 1.1.1.1 TLS certs, record 11.5 Tbps DDoS mitigation, Salesloft s Drift supply chain breach leaking hundreds of OAuth tokens, and Telegram s malware, DDoS sieges and Russian government clash.

Duration: 00:05:57
What are fileless threats
Sep 04, 2025

An overview of cybersecurity fileless threats, focussing on introduction to fileless threats

Duration: 00:02:50
Anthropic Claude AI Driven Phishing & RDP to TransUnion Breach
Sep 01, 2025

Cybercriminals weaponize Anthropic Claude for automated phishing, ransomware and real time data extortion. Google removes 77 malicious Play Store apps and patches a critical Chrome zero day. Microsoft RDP AD and Azure endpoints face new exploit waves. Telegram bots deliver spyware. A TransUnion breach exposes 4.4 M consumer records via a third party app flaw.

Duration: 00:13:33
What is Reverse Engineering
Aug 28, 2025

An overview of cybersecurity Reverse engineering, focussing on reverse engineering overview

Duration: 00:03:27
ImageIO Apple ImageIO Zero Click Zero Day Patched
Aug 25, 2025

Apple released emergency updates for a critical zero click zero day in its ImageIO framework exploited to siphon crypto. The episode also covers Google's AI driven scam lures, Microsoft s CVE 2025 29824 exploits, sweeping Linux kernel fixes and Telegram s new security shields.

Duration: 00:11:06
What Is Extended Detection and Response XDR
Aug 21, 2025

An overview of cybersecurity Extended Detection and Response XDR , focussing on xdr overview

Duration: 00:03:26
FortiSIEM Fortinet RCE & Global Cyber Updates
Aug 18, 2025

Unpack a pre auth FortiSIEM RCE in the wild, brute force SSL VPN sieges, Google and Microsoft s latest security wins and AI injection risks, a Telegram malware surge under Russian crackdowns, and an active WinRAR zero day backdoor campaign.

Duration: 00:11:34
What are Living off the Land attacks
Aug 14, 2025

An overview of cybersecurity Living off the Land LotL attacks, focussing on overview

Duration: 00:02:46
Gemini AI Calendar Promptware Attack in Google Calendar
Aug 11, 2025

A prompt injection bug in Google Calendar let attackers embed hidden commands in invites or emails to hijack Gemini AI agents and control smart home devices. Fully patched, it underscores the growing risk of AI promptware and the need to sanitize untrusted inputs.

Duration: 00:07:57
What is Behavioral Fingerprinting
Aug 07, 2025

An overview of cybersecurity Behavioral Fingerprinting, focussing on introduction

Duration: 00:02:30
Aeroflot IT Systems Aeroflot Breach, CISA Kit, Google & Telegram
Aug 04, 2025

Pro Ukraine hacktivists crippled Aeroflot servers, CISA released incident response and Zero Trust guidance, Google patched critical zero days and supply chain flaws, and Telegram rolled out new privacy defenses.

Duration: 00:11:00
Container Security Fundamentals
Jul 31, 2025

An overview of cybersecurity container security, focussing on container security fundamentals

Duration: 00:03:12
What are LLM jailbreak attacks
Jul 24, 2025

An overview of cybersecurity LLM jailbreak attacks, focussing on LLM jailbreak attacks overview

Duration: 00:02:52
BigONE hot wallet Supply Chain Heist to Zero Days Weekly Brief
Jul 21, 2025

This CyberScene episode unpacks the 27M BigONE supply chain crypto hack, Elmo's X account hijack, Google's rapid zero day fixes, and Telegram's Android malware blitz underscoring the critical role of third party controls, strong authentication, and AI driven defenses.

Duration: 00:09:25
What Is DNS Tunneling
Jul 17, 2025

An overview of cybersecurity DNS tunneling, focussing on dns tunneling overview

Duration: 00:02:41
GMX V1 GMX 40M Arbitrum Exploit & Weekly Cyber Brief
Jul 14, 2025

Highlights include GMX s 40M V1 Arbitrum exploit and white hat bounty, a major Linux kernel patch spree for DoS and privilege bugs, an AI driven Rubio deepfake scam, Microsoft s Patch Tuesday blitz, and Telegram malware scam threats.

Duration: 00:12:53
What is Ransomware as a Service
Jul 10, 2025

An overview of cybersecurity Ransomware as a Service RaaS , focussing on Ransomware as a Service RaaS overview

Duration: 00:03:35
Cisco UCM Cisco UCM Backdoor, Qantas Breach & Telegram
Jul 07, 2025

Covers Cisco s emergency patch for a hard coded SSH root backdoor in UCM CVE 2025 20309 , Qantas s vendor platform breach impacting six million customers, and Telegram s new malware alerts and bot compromise fallout.

Duration: 00:09:47
What are Side Channel Timing Attacks
Jul 03, 2025

An overview of cybersecurity Side Channel Timing Attack, focussing on side channel timing attacks

Duration: 00:03:16
Gmail MFA Bypass Phishing Bypass Exposes Gmail Accounts
Jun 30, 2025

A sophisticated phishing campaign sidesteps Gmail s MFA and exploits a username recovery flaw to harvest user phone numbers. Also explores Google s AI defenses, Android 16 network protections, Kaspersky s SparkKitty spyware, Telegram data leaks, and critical Ubuntu kernel patches.

Duration: 00:12:39
What Is Attack Surface Management
Jun 26, 2025

An overview of cybersecurity attack surface management, focussing on introduction to attack surface management

Duration: 00:02:51
CVE 2025 2783 Chrome Zero Day & Cloud PC Safeguards
Jun 23, 2025

This episode dissects Google s Chrome zero day CVE 2025 2783 exploited by TaxOff, Scattered Spider phishing, historic 16B credential breach, Microsoft s Cloud PC security defaults and passkey mandate, Iran s Nobitex exchange hack, Telegram data leaks and malware campaigns, plus Ubuntu s critical privilege escalation and RCE patches.

Duration: 00:11:41
Understanding Prompt Injection
Jun 19, 2025

An overview of cybersecurity Agentic AI vulnerabilities, focussing on prompt injection

Duration: 00:03:26
Apple iMessage Apple iMessage Zero Click & OAuth Malware Tricks
Jun 16, 2025

Episode covers Apple s iMessage zero click exploit patch that exposed Secure Enclave keys, Google OAuth consent flow abuse for stealthy malware delivery, Microsoft s zero click AI hack fix, Interpol s massive info stealer takedown, and Telegram s new anti scam defenses.

Duration: 00:13:04
What Is DNS over HTTPS DoH
Jun 12, 2025

An overview of cybersecurity DNS over HTTPS DoH , focussing on introduction to doh

Duration: 00:02:42
Coinbase KYC Data Coinbase Breach, FBI Alerts, Google & More
Jun 09, 2025

Dissecting Coinbase s 70K user KYC data leak and 400M response, the FBI s latest phishing, botnet BADBOX 2.0 and ransomware Play warnings, Google s emergency Chrome zero day patches and email safeguards, Microsoft s threat tracking patches, and Telegram malware privacy issues.

Duration: 00:15:40
What is SOAR
Jun 05, 2025

An overview of cybersecurity Security Orchestration, Automation, and Response SOAR , focussing on SOAR fundamentals

Duration: 00:04:07
ASUS routers ViciousTrap, Debian Patches & Telegram Threats
Jun 02, 2025

This episode delves into the ViciousTrap backdoor compromise of over 9,000 ASUS routers, the latest Debian security advisories including kernel and app patches, and emerging threats and defenses in the Telegram ecosystem.

Duration: 00:07:54
Cetus DEX Cetus DEX 230M Hack & Cyber Highlights
May 26, 2025

A packed episode covering the 230M Cetus DEX oracle exploit, CISA s new advisories and ICS alerts, Coinbase s insider driven breach of 69K users, and Microsoft s Lumma stealer takedown and critical patches plus the heated DeFi centralization debate on Sui.

Duration: 00:00:05
What is a Zero Knowledge Proof
May 22, 2025

An overview of cybersecurity zero knowledge proof, focussing on zero knowledge proof basics

Duration: 00:02:37
Insider Threats Insider breach, Android hardening & ransomware
May 19, 2025

Explore Coinbase s bribed insider breach and 20M extortion, Google s Android 16 security enhancements and emergency Chrome Gmail fixes, and the DragonForce ransomware attack on Marks & Spencer exposing customer data. We unpack attack vectors, mitigation strategies, and lessons for preventing insider threats, hardening mobile browser platforms, and defending retail networks.

Duration: 00:07:43
What is Confidential Computing
May 15, 2025

An overview of cybersecurity confidential computing, focussing on confidential computing overview

Duration: 00:02:33
Cisco SD WAN Manager Cisco Phishing, LockBit Leak, Telegram Defenses
May 12, 2025

Cisco s Q1 phishing surge and critical IOS SD WAN patches, LockBit s dark web breach exposing 60k Bitcoin wallets, and Telegram s new anti scam malware security controls.

Duration: 00:09:30
Cisco IOS XE Cisco Patches, LockBit Leak & Telegram Scams
May 12, 2025

Covers Cisco s critical IOS XE and ASA patches, Talos AI threat research, the LockBit RaaS database leak exposing 60k BTC addresses and insider tools, and Telegram s malware scams and new defenses.

Duration: 00:08:16
What Is an SBOM
May 08, 2025

An overview of cybersecurity SBOM, focussing on introduction to sbom

Duration: 00:02:21
AirPlay Protocol AirBorne Apple s 23 AirPlay Vulnerabilities Exposed
May 05, 2025

Researchers at Oligo uncovered 23 flaws in Apple s AirPlay allowing unauthenticated code pushes to third party devices. While iOS 18.4 devices are patched, billions of accessories remain exposed. The episode also dives into Apple s mercenary spyware alerts, Telegram s new anti phishing suite, and the DragonForce ransomware breach at the UK Co op.

Duration: 00:05:59
AirPlay Devices AirBorne AirPlay Flaws, Spyware & Ransomware
May 05, 2025

A technical deep dive into Apple s mercenary spyware alerts and the 23 AirBorne AirPlay flaws risking zero click code execution, Telegram s new anti phishing filters and crypto upgrades, and the Co op s showdown with DragonForce ransomware.

Duration: 00:06:05
AirPlay AirBorne zero click RCE bugs
May 05, 2025

Oligo discovered 23 zero click, wormable remote code exec flaws in Apple s AirPlay protocol SDK. While iOS, macOS and first party devices are patched, millions of third party units remain vulnerable update firmware or disable AirPlay until fixes arrive.

Duration: 00:07:28
AirPlay SDK AirBorne Wormable Zero Click RCE in AirPlay
May 05, 2025

Podcast covers Apple s Pegasus alerts, critical AirPlay AirBorne zero click RCE, Telegram anti spam and phishing defenses, TikTok s 530M GDPR fine, and the Co op s data breach plus key mitigation steps.

Duration: 00:06:39
Introduction to Shift Left Security
May 01, 2025

An overview of cybersecurity Shift Left, focussing on shift left security overview

Duration: 00:02:08
Multiple Products Weekly Cybersecurity Headlines Deep Dive
Apr 28, 2025

This episode covers the FBI s 10M Salt Typhoon hunt and a record breaking 16.6B in internet crime losses Google s MiraclePtr zero day defenses, Android auto reboot, and News plugin CSRF Telegram s encryption upgrades and urgent Ubuntu kernel and package patches.

Duration: 00:09:19
What Is an Attack Graph
Apr 24, 2025

An overview of cybersecurity attack graphs, focussing on attack graphs overview

Duration: 00:03:09
What is Prompt Injection
Apr 24, 2025

An overview of cybersecurity LLM vulnerabilities, focussing on prompt injection

Duration: 00:03:33
KiloEx Oracle 7M KiloEx Cross Chain Oracle Exploit
Apr 21, 2025

A flawed access control in KiloEx s cross chain price oracle let attackers drain 7M across BNB Chain, Base and Taiko, forcing emergency patches and a 750K bounty to retrieve stolen funds.

Duration: 00:09:02
KiloEx oracle KiloEx 7M cross chain hack & recovery
Apr 21, 2025

Dive into Android 16 s auto restart safeguard, sophisticated Google OAuth phishing, 4chan s record breach, KiloEx s 7M cross chain oracle exploit & full recovery, and MITRE s CVE funding lifeline.

Duration: 00:07:44
What is Threat Research Automation
Apr 17, 2025

An overview of cybersecurity threat research automation, focussing on cybersecurity automation

Duration: 00:04:16
iOS, Android, Windows Vulnerabilities in Big Tech Security Updates
Apr 14, 2025

Explore key security challenges facing tech giants like Apple, Google, Microsoft, Telegram, and WhatsApp. Delve into vulnerabilities in iOS, Android, and Windows, and learn about critical security updates, privacy issues, and regulatory tensions. Understand the role of AI in enhancing cybersecurity measures and the importance of staying vigilant against evolving threats.

Duration: 00:08:38
Introduction to Lateral Movement Attacks
Apr 10, 2025

An overview of cybersecurity lateral movement attacks, focussing on lateral movement attacks

Duration: 00:03:33
Google Chrome Tech Giants vs. Cyber Threats A Dynamic Battle
Apr 07, 2025

Today's podcast explores cybersecurity strategies from Google, Microsoft, Oracle, Ivanti, and Ubuntu. Google addresses North Korean infiltration and enhances Chrome with new security patches. Microsoft tackles phishing threats with AI and passwordless solutions. Oracle faces scrutiny over data breaches. Ivanti patches critical VPN vulnerabilities. Ubuntu releases crucial security updates for Linux systems.

Duration: 00:08:12
Understanding Heap Based Overflow
Apr 03, 2025

An overview of cybersecurity heap based overflow vulnerability, focussing on heap based overflow vulnerability

Duration: 00:03:38
Google Chrome Exploring Zero Day Vulnerabilities in Chrome
Mar 31, 2025

The episode delves into critical zero day vulnerabilities affecting Google's Chrome browser, with a focus on Russian organizations and journalists. It discusses Google's quick patching efforts and acquisition of Wiz to enhance security measures.

Duration: 00:06:58
Introduction to Steganographic Malware
Mar 27, 2025

An overview of cybersecurity Steganographic malware, focussing on steganographic malware

Duration: 00:04:16
Apple OS Apple's Security Scrutiny Unveiled
Mar 24, 2025

Explore critical vulnerabilities impacting Apple OS, including iOS, macOS, iPadOS, and others. Learn about risks in AirDrop and Web Content Handler, phishing scams targeting Mac users, and Apple's response with security patches and encryption efforts.

Duration: 00:08:43
Understanding Adversarial Input
Mar 20, 2025

An overview of cybersecurity adversarial input, focussing on adversarial input

Duration: 00:03:00
Apple Products Apple's Security Overhaul Strategies
Mar 17, 2025

Exploration of Apple's response to zero day vulnerabilities, focusing on urgent updates for Safari, WebKit, and broader product security enhancements. The podcast delves into the integration of end to end encryption for RCS messages, challenges with malware targeting bank data, and other cybersecurity threats, including critiques on Apple's notification clarity and protection measures.

Duration: 00:09:04
Introduction to Hypervolumetric DDoS Attacks
Mar 13, 2025

An overview of cybersecurity hypervolumetric DDoS attacks, focussing on hypervolumetric DDoS attacks

Duration: 00:03:35
Bybit Massive Crypto Breach at Bybit
Mar 10, 2025

Bybit, a major crypto trading platform, suffered a historic 1.4 billion theft by North Korean hackers exploiting platform vulnerabilities. The incident underscores the need for robust cybersecurity in centralized exchanges.

Duration: 00:08:41
Understanding MITM
Mar 06, 2025

An overview of cybersecurity Man in the Middle Attack MITM , focussing on Man in the Middle Attack

Duration: 00:03:33
Apple iCloud Cybersecurity Shifts Apple to Linux Updates
Mar 03, 2025

Exploring the evolving cybersecurity landscape with Apple's data protection controversies, critical vulnerabilities in the Find My network, Microsoft's fight against AI driven cyber threats, Bybit's response to a massive crypto heist, and the need for prompt updates against Linux kernel vulnerabilities.

Duration: 00:06:58
Introduction to MITRE ATT&CK
Feb 27, 2025

An overview of cybersecurity MITRE ATT&CK, focussing on MITRE ATT&CK Framework

Duration: 00:03:56
Apple iCloud Tech Talk Diverse Cybersecurity Challenges
Feb 24, 2025

This podcast episode delves into pressing cybersecurity issues, including Apple's mandate to disable iCloud encryption in the UK, Microsoft's battle with malware targeting Xcode, and Google's push for AI driven defenses. The episode also explores emerging threats against Palo Alto Networks and hacking incidents affecting cryptocurrency exchange Bybit. These discussions highlight regulatory tensions, advances in security technology, and the importance of vigilance and timely updates in today's digital landscape.

Duration: 00:08:48
Introduction to Deep Packet Inspection
Feb 20, 2025

An overview of cybersecurity Deep Packet Inspection, focussing on deep packet inspection

Duration: 00:03:55
iOS and iPadOS Tackling Modern Cyber Threats
Feb 17, 2025

Explore how tech giants are addressing cybersecurity. Apple's urgent patches against zero day flaws, Google's AI driven defenses, Intel's vulnerability fixes, Microsoft's efforts against Russian cyber threats, and challenges in Musk's DOGE initiative underscore the need for vigilance in digital security.

Duration: 00:08:45
Introduction to Adaptive Attacks
Feb 13, 2025

An overview of cybersecurity Adaptive attacks, focussing on adaptive attacks

Duration: 00:03:37
Apple Ecosystem Apple's Security Challenges & Innovations
Feb 10, 2025

Explore Apple's response to security threats urgent updates for critical vulnerabilities, risks from the 'SparkCat' campaign and North Korean hackers, privacy debates with the UK government, and innovations like Advanced Data Protection and PCC.

Duration: 00:08:05
Introduction to Cybercrime Forums
Feb 06, 2025

An overview of cybersecurity cybercrime forums, focussing on cybercrime forums

Duration: 00:03:41
Apple Devices Apple's Cybersecurity Challenges
Feb 03, 2025

The episode discusses multiple security vulnerabilities and zero day exploits affecting Apple devices, focusing on recent updates for iPhone, iPad, and Mac systems to mitigate threats like side channel attacks on A and M series chips. It highlights Apple's updates for iOS and macOS Ventura to improve data protection and addresses speculative execution threats such as 'Son of Spectre.' The podcast emphasizes the importance of user updates to safeguard against these evolving cyber threats.

Duration: 00:09:07
What is OSINT
Jan 30, 2025

An overview of cybersecurity OSINT, focussing on Introduction to OSINT

Duration: 00:04:06
Cloudflare, Google Cybersecurity Updates Giants Tackle New Threats
Jan 27, 2025

In this podcast episode, we explore the recent cybersecurity developments from industry giants like Cloudflare and Google. Cloudflare has successfully mitigated the largest recorded DDoS attack and addressed critical vulnerabilities in its services, demonstrating an increase in the frequency and severity of DDoS attacks. Concurrently, Google is countering a malware campaign targeting Mac users through its ad network and addressing security loopholes in Android and Chrome. Additionally, Google is improving security features and handling ethical dilemmas regarding the use of its technology. Other tech leaders like IBM, Microsoft, and Oracle are also addressing various challenges from privilege escalation to phishing...

Duration: 00:09:32
Introduction to API Security
Jan 23, 2025

An overview of cybersecurity API security, focussing on API security

Duration: 00:03:27