×
Mike Mimoso public
[search 0]
×
Best Mike Mimoso podcasts we could find (updated January 2020)
Best Mike Mimoso podcasts we could find
Updated January 2020
Join millions of Player FM users today to get news and insights whenever you like, even when you're offline. Podcast smarter with the free podcast app that refuses to compromise. Let's play!
Join the world's best podcast app to manage your favorite shows online and play them offline on our Android and iOS apps. It's free and easy!
More
show episodes
 
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
 
The Collective Intelligence Podcast, presented by Flashpoint and hosted by Editorial Director Mike Mimoso, features regular interviews with a diverse set of industry experts and Flashpoint analysts on the latest information security news and industry trends.
 
The latest in fraud, social engineering, security, identity, and privacy
 
Loading …
show series
 
This week's news wrap podcast breaks down the biggest Threatpost security stories of the week, including: Various proof-of-concept exploits being released for serious vulnerabilities this week - including for the recently-patched crypto-spoofing vulnerability found by the National Security Agency and reported to Microsoft. Multiple cable modems use…
 
A major Microsoft crypto-spoofing bug impacting Windows 10 made waves this Patch Tuesday, particularly as the flaw was found and reported by the U.S. National Security Agency (NSA). Microsoft's January Patch Tuesday security bulletin disclosed the "important"-severity vulnerability, which could allow an attacker to spoof a code-signing certificate,…
 
The California Consumer Privacy Act is being touted as one of the strongest privacy regulations in the U.S. enacted so far. However, though the CCPA was adopted on January 1, 2020, the act still has several loose ends and privacy loopholes that need to be fleshed out. At a high level ,the CCPA mandates strict requirements for companies to notify us…
 
It's New Year's Eve, the perfect day to reflect on the year's best episodes of the Collective Intelligence Podcast. It also happens to be the 50th episode, so thanks for subscribing, listening, and sharing the podcast so far. Enjoy the recap. Flashpoint's Allison Nixon on SIM swap fraud (1:04) Troy Hunt on changing behaviors around password reuse (…
 
In 2019, diversity in the cybersecurity was thrust to the forefront with recognition from both vendors and experts. The tech industry is facing challenges around diversity in general, but women are particularly underrepresented. And with an estimated 3.5 million jobs are expected to remain unfilledby 2021, infosec is certainly a lucrative space for…
 
In this sponsored podcast, Threatpost sits down with Arctic Wolf's Matt Duench to discuss the lessons learned from this year's top data breaches.By Mike Mimoso, Chris Brook
 
From data breaches and the ransomware epidemic, to new regulation and outcry around data privacy, 2019 has been a wild ride for the infosec community. Threatpost breaks down the top news stories, trends and topics for this year.By Mike Mimoso, Chris Brook
 
In a new report, "Holiday Season Cyber Heists" released Thursday morning, Carbon Black said that cybercrime activity tracked during 2019 is already setting the holiday shopping season for an upward trajectory in malware and ransomware attacks. From constantly-evolving malware like Kryptik, to island hopping attacks, holiday shoppers are the ones wh…
 
In this week's Threatpost news wrap, editors Tara Seals and Lindsey O'Donnell break down the top infosec news, including: Authorities cracked down on cybercrime group Evil Corp. with sanctions and charges against its leader, known for his lavish lifestyle. The developers behind a commodity remote-access tool (RAT) that allows full control of a vict…
 
The "identifiers" behind data collection - the ways that companies identify consumers who they're collecting the data from - has extended far beyond cookies prevalent in web browsers, privacy experts warn. Now, consumers and regulators struggling to understand who is collecting data, how that data is being shared and how it's being stored, must als…
 
Black Friday and Cyber Monday-related scams are nothing new - but researchers warn that this year, they are seeing an uptick in scams using more sophisticated methods to lure users to hand over their payment data. A research report released Tuesday by ZeroFOX uncovered some of the threats that attackers are using to tap into the Black Friday shoppi…
 
Threatpost news editors break down the top stories of the week, including: The Coalition Against Stalkerware launched this week, with the aim of offering a centralized location for helping victims of stalkerware, as well as defining what stalkerware is in the first place. Five U.S. Senators are demanding that Amazondisclose how it's securing Ring h…
 
Threatpost talks to researchers about a newly-disclosed, high-severity vulnerability in the Google Camera App, the camera built into Android smartphones, that could allow attackers to hijack Android cameras.By Mike Mimoso, Chris Brook
 
In this sponsored podcast, Threatpost podcast host Cody Hackett and Sam McLane, chief technical services officer with Arctic Wolf, discuss important considerations when building a multi-layered cybersecurity strategy and best practices when evaluating security vendors in a crowded landscape.By Mike Mimoso, Chris Brook
 
From insider threats, to Internet of Things (IoT) medical device security, ENFUSE 2019 broke down the top privacy and security issues that consumers are seeing today - and which regulatory efforts are being developed to address them.By Mike Mimoso, Chris Brook
 
Threatpost editors break down the top news stories for the week ended Nov. 8. The top stories of the week include: Despite trillions of dollars in breach fine payouts, each year the number of compromised companies and individuals with private data exposed rise - a Threatpost feature looks at why. The DoJ charged two former Twitter employeesfor alle…
 
Emotet, the infamous banking trojan that mysteriously disappeared over the summer, returned last monthdropping other banking trojans, information stealers, email harvesters, self-propagation mechanisms and ransomware. But since the malware returned from its hiatus, there was no clear novel technique or tactic that researchers observed - until event…
 
Flashpoint's Ian Gray and Max Aliapoulios discuss trends happening inside illicit underground online markets where everything from credit cards and personal information, to drugs and other physical goods, are sold. Ian and Max help characterize these markets, the impact of law enforcement and self-imposed shutdowns on the overall landscape, the eco…
 
Threatpost editors Tara Seals and Lindsey O'Donnell break down the top security news of this week, from data breaches to Advanced Persistent Threat (APT) activity. Top stories include: A Microsoft alert that APT group Fancy Bearhas targeted anti-doping authorities and sporting organizations around the world as the world begins to gear up for the To…
 
John Scott Railton, senior researcher at Citizen Lab, led the charge on the investigation into NSO Group and the alleged WhatsApp hack. The lawsuit by WhatsApp parent company Facebook into NSO Group, he said, is a "certified big deal" and will have widespread implications for commercial spyware companies in general.…
 
Threatpost editors break down the top news stories for the week ended Oct. 25. The biggest stories include: An unsecured NFC tag opening a door totrivial exploitation of robotsthat are used inside Japanese hotels. The FTC has bannedthe sale of three apps – marketed to monitor children and employees – unless the developers can prove that the apps wi…
 
Chris Cochran, threat intelligence lead at a media services company, shares his personal and professional journey to a career in information security and intelligence. Cochran, who co-hosts the secdevops.ai podcast, shares his unique career path, one that spans the military, public service, a startup, and now a major enterprise. He's an innovator i…
 
Researchers this week disclosed new ways that attackers can exploit Alexa and Google Home smart speakers to spy on users. The hacks, which rely on the abuse of "skills," or apps for voice assistants, allow bad actors to eavesdrop on users and trick them into telling them their passwords over the smart assistant devices. Threatpost discusses the new…
 
As it becomes more difficult and expensive to infiltrate environments via malware, cybercriminals may start turning in the future to a more viable and less costly alternative: Insider threats.By Mike Mimoso, Chris Brook
 
With so many malicious adversaries trying to penetrate companies' networks, companies are forgetting to watch out for a dangerous threat from within their own ranks -insider threats. Threatpost talks to Digital Guardian's Tim Bandos to learn more about the insider threat of departing employees - and what companies can do to protect data loss.…
 
In this sponsored podcast, Threatpost podcast host Cody Hackett talks to Chip Witt, head of product strategy at SpyCloud, about the account takeover risks posed by third parties. Your users’ login credentials are available for sale on the criminal underground -- and criminals know it. For the third year running, the 2019 Verizon Data Breach Report …
 
Researchers have uncovered a cybergang, using a new business email compromise (BEC) tactic, that has found success swindling funds from more than 500 organizations worldwide. The cybergang, dubbed Silent Starling, hijacks email accounts belonging to employees within a targeted company’s finance department, such as accounts receivable or procurement…
 
Google login Twitter login Classic login