This is Proof Point podcast where we decode digital success, one click at a time. We share key takeaways fueled by data and insights that your team can implement today to drive growth.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
…
continue reading
A cybersecurity podcast powered by Proofpoint
…
continue reading
Today’s cyber attacks target people, not technology. Protecting People is a podcast focused on the human side of cybersecurity. Each episode, you’ll learn how today’s threats really work, who’s being targeted by them, and what you can do to safeguard your people, data and systems.Get real-world insight and learn about the latest trends in social engineering, malware, threat protection, cloud security and more. Protecting People is cybersecurity for the rest of us.
…
continue reading
Join us on Proofpoint’s Insider Insight, the podcast where we delve deep into the intricate realm of Endpoint Data Loss Prevention (DLP) and Insider Threat Management (ITM). In each episode, we unravel the complexities of safeguarding your organization's sensitive information by adopting a people-centric approach to managing insider threats. From inadvertent mistakes to malicious intent, insider threats pose a significant risk to the confidentiality and integrity of your data. This podcast i ...
…
continue reading
Sam, Jerry, and Joe discuss their thoughts and draw from their combined experience of over 20 years in the Apple Consultants Network (ACN).
…
continue reading
Outbound is a weekly podcast illuminating the stories of sales professionals that have taken the path less traveled to build strong relationships that have led to soaring new heights and beautiful vistas. These are the stories of building relationships in sales that have led to great business outcomes.
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
Master B2B marketing by learning the MINDSETS, SKILLSETS and TOOLSETS that drive revenue-generating RESULTS. Each week, we discuss revenue-generating success stories with Masters of B2B Marketing and share insightful strategy, tangible tactics and actionable advice, utilizing the MSTR Framework to help you accelerate growth. Our goal is to be the podcast top B2B marketers listen to regularly for actionable insights. We want our audience to learn from the Master Marketers that have developed ...
…
continue reading
HeroCxo is the channel for wannabe CxO's. You'll you hear from executive leaders from all round the world and from all industries and backgrounds. We interview them candidly and honestly. We aim to engage, entertain, inform and inspire. Lets get you started on your journey to CxO.
…
continue reading
We love great marketing. Marketing meets your people in their problem, and guides them to a successful version of themselves. But B2B marketing is broken Fire Drill Forecasting, MQL Chasing Cyber Stalking Future Buyers Martech vendors and VCs have us focused on growth at ANY cost But only 5% of buyers are in a buying cycle. And it's a blood bath of competition. There's a war coming. And you're about to meet the Rebel Alliance. Welcome to Demand Wars. Where the best B2B marketers in the world ...
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Proofpoint, Google Workspace, and Mandrake Spyware.
4:40
4:40
Play later
Play later
Lists
Like
Liked
4:40
Welcome to The Daily Threat, your go-to source for critical cybersecurity news. In today’s episode, we dive into three alarming incidents that highlight the evolving tactics of cyber attackers and the vulnerabilities they exploit. Stories Covered: Proofpoint Email Routing Flaw Exploited: Attackers leveraged a significant flaw in Proofpoint’s email …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
HealthEquity data breach, CrowdStrike impact grows, Proofpoint exploit
8:07
8:07
Play later
Play later
Lists
Like
Liked
8:07
4.3 million impacted by HealthEquity data breach Microsoft admits CrowdStrike incident far greater than first reported Proofpoint exploit allows for millions of fake emails Huge thanks to our sponsor, Dropzone AI Imagine an analyst who never misses an alert. Dropzone AI autonomously investigates every alert and provides decision-ready reports, enha…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Chameleon malware reappears, Rhysida hospital attack, Blacksuit’s $500m tally
8:19
8:19
Play later
Play later
Lists
Like
Liked
8:19
Chameleon reappears targeting Canadian restaurant chain Rhysida claims attack on Bayhealth Hospital in Delaware BlackSuit/Royal achieves $500m in ransomware demands Huge thanks to our sponsor, Vanta Whether you’re starting or scaling your security program, Vanta helps you automate compliance across frameworks like SOC 2, ISO 27001, and more. With V…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Windows Exploit, Microsoft 365 Phishing Bypass, & Roundcube Vulnerabilities.
8:06
8:06
Play later
Play later
Lists
Like
Liked
8:06
In today’s episode of "The Daily Threat," we explore three major cybersecurity vulnerabilities that could impact businesses worldwide. We delve into a Windows Update exploit that allows attackers to manipulate the update process, a Microsoft 365 anti-phishing bypass using CSS, and critical flaws in Roundcube Webmail that enable hackers to execute r…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
McLaren hospitals disrupted, CrowdStrike improves processes, Ronin Network hacked
8:14
8:14
Play later
Play later
Lists
Like
Liked
8:14
McLaren hospitals disruption linked to INC ransomware attack CrowdStrike to give customers control over Falcon sensor updates Ronin Network hacked by "white hats" Huge thanks to our sponsor, Vanta When it comes to ensuring your company has top-notch security practices, things can get complicated, fast. Vanta automates compliance for SOC 2, ISO 2700…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Digital Fortresses: Your Guide to Online Security
30:17
30:17
Play later
Play later
Lists
Like
Liked
30:17
Paul Miller is the Web Development Project Coordinator at Proof Digital, a business growth-marketing agency that blends modern marketing tools with traditional sales funnel processes. As the go-to expert for web hosting and cyber security best practices at Proof Digital for over five years, he brings a wealth of knowledge to the agency’s projects. …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Android kernel zero-day, voter portal flaw, ransomware as terrorism
8:15
8:15
Play later
Play later
Lists
Like
Liked
8:15
Google patches Android kernel zero-day Researchers find flaws in Georgia voter portal Law would make ransomware a terrorist threat Huge thanks to our sponsor, Vanta Whether you’re starting or scaling your security program, Vanta helps you automate compliance across frameworks like SOC 2, ISO 27001, and more. With Vanta, you can streamline security …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
578: Tech Upgrades, MFA Madness and More!
1:00:49
1:00:49
Play later
Play later
Lists
Like
Liked
1:00:49
Topics: -Sam talks about his recent trip to Las Vegas to see Dead & Co at The Sphere -BackBlaze has increased the price of sending a hard drive to $279. -Jerry is running macOS Sequoia on his daily driver. -Each year, the path of how users upgrade is a hot button topic. -Sam likes Erase-install from Graham Pugh. -A minimum point release is a safe b…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Art of Frustrating Hackers: Diving Into the DEaTH Cycle with Randy Pargman
52:36
52:36
Play later
Play later
Lists
Like
Liked
52:36
Hello, Cyber Stars! In today's episode of the Discarded Podcast, hosts Selena Larson and Sarah Sabotka are joined by Randy Pargman, Director of Threat Detection at Proofpoint. Randy shares his extensive experience in cybersecurity, from working at the FBI and understanding law enforcement’s role in cyber defense, to endpoint detection and response,…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CrowdStrike strikes back against Delta, Keytronic loses millions to ransomware, Flaw in Apache OFBiz
8:42
8:42
Play later
Play later
Lists
Like
Liked
8:42
CrowdStrike strikes back against Delta’s claims of negligence Ransomware attack costs Keytronic $17 million Patch required for high-severity flaw in Apache OFBiz Huge thanks to our sponsor, Vanta When it comes to ensuring your company has top-notch security practices, things can get complicated, fast. Vanta automates compliance for SOC 2, ISO 27001…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Software update malware, investors sue CrowdStrike, cybercriminals in prisoner swap
7:51
7:51
Play later
Play later
Lists
Like
Liked
7:51
Hackers use ISP to send malware through software updates CrowdStrike sued by investors following update failure Historic prisoner swap includes cybercriminals returned to Russia Huge thanks to our sponsor, Vanta Whether you’re starting or scaling your security program, Vanta helps you automate compliance across frameworks like SOC 2, ISO 27001, and…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
FBI Warns of Crypto Scams, Cencora Data Breach, and Columbus Ransomware Attack!
5:32
5:32
Play later
Play later
Lists
Like
Liked
5:32
Welcome to another episode of The Daily Threat, your trusted source for the latest in cybersecurity news. In today’s episode, we delve into three significant stories that highlight the evolving landscape of cyber threats. We’ll explore the details of these attacks, how the attackers infiltrated systems, the methods they used, and the risks these in…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Week in Review: CrowdStrike problems grow, record breaking ransom, Argentina’s Minority Report
25:13
25:13
Play later
Play later
Lists
Like
Liked
25:13
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Dennis Pickett, vp, CISO, Westat Thanks to our show sponsor, Dropzone AI Dropzone AI’s Analyst investigates alerts with unmatched speed and precision, providing clear, actionable reports. Experience the power of autonomous threat detecti…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cencora patient breach, OneDrive phishing campaign, Argentina’s crime predictions
7:08
7:08
Play later
Play later
Lists
Like
Liked
7:08
Cencora confirms patient data stolen in February cyberattack Phishing campaign targets OneDrive users Argentina will use AI to predict future crimes Huge thanks to our sponsor, Dropzone AI Picture an analyst who works tirelessly around the clock. Dropzone AI’s Analyst investigates every alert and provides comprehensive, actionable reports. Boost yo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Domain Hijacking, Compliance Risks, and Malware in Google Ads!
6:29
6:29
Play later
Play later
Lists
Like
Liked
6:29
Welcome to today’s episode of The Daily Threat, where we dive deep into the latest cybersecurity threats that could impact your business and personal security. In this episode, we cover three critical stories: Domain Name Security – Discover how cybercriminals are exploiting weak domain protections to hijack web traffic and steal sensitive informat…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Elections and DDoS, dating apps leak locations, Germany blames China
7:34
7:34
Play later
Play later
Lists
Like
Liked
7:34
DDoS attacks won’t impact US elections Dating apps leaked precise location data Germany formally blames China for 2021 cyberattack Huge thanks to our sponsor, Dropzone AI Think of Alex, your new team member who never takes a break. Dropzone AI’s Analyst investigates every alert and delivers detailed reports without playbooks or code. Experience Ale…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Delta's legal maneuver, Record-breaking ransom, Meta $1.4B settlement
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54
Delta enlists Microsoft's legal nemesis over CrowdStrike losses Dark Angels receives record-breaking ransom payment Meta to pay $1.4 billion biometric lawsuit Huge thanks to our sponsor, Dropzone AI Dropzone AI’s Analyst investigates alerts and responds to threats with unmatched speed and precision. No playbooks, no code required. Transform your SO…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
577: Positivity and Practical Tips: Navigating Tech Challenges with New Insights
55:08
55:08
Play later
Play later
Lists
Like
Liked
55:08
In this episode, the hosts of Command Control Power discuss a range of topics from VPN configuration issues with the Unifi system, to the advanced security features of iCloud. They dive into real-world tech troubleshooting experiences, including a detailed examination of the 'perfect data' scam through Microsoft 365 and the pros and cons of Apple's…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
OTP Risks, Acronis Default Password Exploit, and Malicious PyPi Package.
6:24
6:24
Play later
Play later
Lists
Like
Liked
6:24
Welcome back to "The Daily Threat," your trusted source for the latest in cybersecurity news and insights. In today’s episode, we cover three critical stories that highlight evolving cyber threats and the importance of staying vigilant. Story 1: We discuss why you should avoid using one-time passwords (OTPs) sent via text and the sophisticated meth…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
PyPi package targets MacOS, Columbus, Ohio suffers cyber incident, Windows July update problems
6:49
6:49
Play later
Play later
Lists
Like
Liked
6:49
Hackers exploiting PyPi package targets MacOS Columbus, Ohio suffers cyber incident Windows July updates come with some BitLocker and remote connectivity challenges Huge thanks to our sponsor, Dropzone AI Meet Dropzone AI, the analyst who never rests. Investigating every alert with unparalleled speed and precision, delivering clear, actionable repo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Global Tech Outage, ConfusedFunction Vulnerability & ICS Exploits
4:48
4:48
Play later
Play later
Lists
Like
Liked
4:48
Welcome to The Daily Threat! In today’s episode, we cover three critical cybersecurity incidents that could impact businesses worldwide: Global Tech Outage and Insurance Claims: Discover how a recent global tech outage is affecting the insurance industry, with companies preparing for potential claims. Read more: https://www.wsj.com/articles/insurer…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Week in Review: CrowdStrike developments, LA court shutdown, MGM casino claims win
26:05
26:05
Play later
Play later
Lists
Like
Liked
26:05
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Jana Moore, CISO, Belron, also vice president, EmpoWer – Supporting women in infosec. Thanks to our show sponsor, Vanta When it comes to ensuring your company has top-notch security practices, things can get complicated, fast. Vanta auto…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Microsoft Defender exploited, assassin’s encryption frustration, NK elite hackers
7:56
7:56
Play later
Play later
Lists
Like
Liked
7:56
Hackers exploiting Microsoft Defender SmartScreen bug IT leaders note increase in severity of cyber-attacks, ransomware and BEC stand out, Trump shooting investigation revives the end-to-end encryption issue Huge thanks to our sponsor, Vanta Whether you’re starting or scaling your security program, Vanta helps you automate compliance across framewo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CrowdStrike details, Chrome keeps cookies, BreachForums leaked
7:22
7:22
Play later
Play later
Lists
Like
Liked
7:22
CrowdStrike dishes details Google scuttles third-party cookie deprecation BreachForums leaked on Telegram Huge thanks to our sponsor, Vanta When it comes to ensuring your company has top-notch security practices, things can get complicated, fast. Vanta automates compliance for SOC 2, ISO 27001, and more, saving you time and money. With Vanta, you c…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Hunt for Cyber Criminals: A Deep Dive with Wired's Andy Greenberg
55:37
55:37
Play later
Play later
Lists
Like
Liked
55:37
Hello, Cyber Stars! In today's episode of the Discarded Podcast, hosts Selena Larson and Pim Trouerbach are joined by Andy Greenberg, Senior Writer at WIRED. Known for his deep dives into the world of hacking, cybersecurity, and surveillance, Andy shares his journey of uncovering and telling compelling stories about the digital underworld. The conv…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Wiz deal crumbles, CrowdStrike aftermath, dYdX exchange hack
8:09
8:09
Play later
Play later
Lists
Like
Liked
8:09
Google’s $23 billion plan to buy Wiz falls apart U.S. government looking for answers amidst CrowdStrike aftermath dYdX exchange hacked in DNS hijack attack Thanks to our episode sponsor, Vanta Whether you’re starting or scaling your security program, Vanta helps you automate compliance across frameworks like SOC 2, ISO 27001, and more. With Vanta, …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Challenging Convention: The Case for Intrusive Leadership
49:00
49:00
Play later
Play later
Lists
Like
Liked
49:00
Marcus A. Canady is the Founder and CEO of the Canady Leadership Group, a consulting firm specializing in leadership development and coaching for first-line managers and senior executives. A 24-year veteran of the Coast Guard, experienced helicopter pilot, and respected thought leader, Marcus leverages his personal and military experiences to enhan…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Microsoft’s New Recovery Tool, Hacker Groups Exposed, and Ransomware Fragmentation
7:04
7:04
Play later
Play later
Lists
Like
Liked
7:04
Welcome to today’s episode of The Daily Threat! In this episode, we dive into some critical cybersecurity news stories. We’ll explore Microsoft’s newly released CrowdStrike Recovery Tool, the activities of the notorious Pineapple and Fluxroot hacker groups, and the alarming trend of ransomware groups fragmenting into smaller, more agile units. Stor…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
576: The Hunger Games: Call Center Edition - One Headset, One Rep, You vs. Everyone Else
41:52
41:52
Play later
Play later
Lists
Like
Liked
41:52
In this episode, the hosts grapple with a series of technical issues while trying to start their stream. Joe faces multiple frustrations with his Mac and browser configurations, expressing his exasperation with technology. The conversation shifts to broader grievances about poor customer service and systemic inefficiencies within major corporations…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CrowdStrike update, Russian criminals sanctioned, ransomware shuts down courts
8:46
8:46
Play later
Play later
Lists
Like
Liked
8:46
CrowdStrike says “significant number” back up and running Russian cyber criminals sanctioned for infrastructure attacks Ransomware attack shuts down largest trial court in U.S. Huge thanks to our sponsor, Vanta When it comes to ensuring your company has top-notch security practices, things can get complicated, fast. Vanta automates compliance for S…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Microsoft Outage, CISA Security Failures, & Russian Cybercriminals!
5:50
5:50
Play later
Play later
Lists
Like
Liked
5:50
Welcome to today’s episode of "The Daily Threat," where we delve into three significant stories shaping the cybersecurity landscape: Microsoft has reported a major service outage impacting users worldwide. This disruption has affected key services such as Office 365, Azure, and Teams. Learn more about the outage and its implications for businesses:…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CrowdStrike hits Cloud PCs, criminals exploit CrowdStrike fix, CISA rebuked
7:47
7:47
Play later
Play later
Lists
Like
Liked
7:47
Microsoft confirms CrowdStrike update also hit cloud Windows PCs Cybercriminals exploit CrowdStrike problem to distribute malware CISA adds some big names to its KEV catalog Huge thanks to our sponsor, Vanta Whether you’re starting or scaling your security program, Vanta helps you automate compliance across frameworks like SOC 2, ISO 27001, and mor…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Week in Review: Crowdstrike Microsoft outage, AT&T breach implications, CDK pays up
31:10
31:10
Play later
Play later
Lists
Like
Liked
31:10
Link to blog post – get exact one from https://cisoseries.com This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Adam Arellano, former vp, enterprise cybersecurity, PayPal Thanks to our show sponsor, Conveyor Why do teams choose Conveyor over the competition to automate answering security questionnaires? …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Windows outage, Fin7 sells malware, Synnovis blood shortage
7:40
7:40
Play later
Play later
Lists
Like
Liked
7:40
Windows outage worldwide UK national blood stocks suffer the effects of ransomware Security flaws in SAP AI Core cloud-based platform Thanks to today's episode sponsor, Conveyor It’s Friday and Conveyor hopes you don’t have a meaty security questionnaire waiting for you on the other side of this podcast. If you do, you should check them out. As the…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Critical Cybersecurity Breaches: Key Lessons & Best Practices
4:34
4:34
Play later
Play later
Lists
Like
Liked
4:34
Welcome to another episode of The Daily Threat, your trusted source for the latest in cybersecurity news and insights. In today’s episode, we delve into three significant stories that highlight the ever-present challenges in cybersecurity. 1. Data Breaches Highlight Lack of Basic Cyber Controls Read more on this story from the Wall Street Journal: …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
UK ransomware reporting, Project Oscar, ransoms spike
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44
UK mandatory ransomware reporting gets watered-down Google introduces AI agent to look for software bugs Critical infrastructure ransomware costs spike Thanks to today's episode sponsor, Conveyor Does the anticipation of the next monster security questionnaire wrecking your day ever make you feel like a balloon floating above a cactus field? If so,…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Stalkerware Breach Exposes Thousands | Microsoft Fixes Outlook Bug | Trello User Data Leak!
4:53
4:53
Play later
Play later
Lists
Like
Liked
4:53
Welcome to The Daily Threat, your go-to source for the latest in cybersecurity news. In today’s episode, we dive deep into three critical stories: Hacked, Leaked, Exposed: Why You Should Stop Using Stalkerware Apps Recently, a significant security breach has exposed the dangers of stalkerware apps. These invasive applications compromise user privac…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Rite Aid update, AT&T ransom laundered, Hacktivists leak Disney data
8:16
8:16
Play later
Play later
Lists
Like
Liked
8:16
Rite Aid says 'limited’ cybersecurity incident affected over 2 million people AT&T ransom laundered through mixers and gambling services Hacktivists leak Disney data to protect artist rights Thanks to today's episode sponsor, Conveyor Why do teams choose Conveyor over the competition to automate answering security questionnaires? A few reasons. One…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
HardBit 4.0 Ransomware, Sys01 Malware via Facebook Ads, and URL Exploit Tactics!
4:22
4:22
Play later
Play later
Lists
Like
Liked
4:22
In today’s episode of The Daily Threat, we cover three critical cybersecurity stories that are making waves in the digital world. First, we delve into the emergence of HardBit 4.0 ransomware, a new variant that employs advanced encryption techniques and demands hefty ransom payments. Learn how attackers are exploiting remote desktop protocols and p…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Best Of CCP - 224: Interview With Christopher Holmes of Rooted Consulting & HCS Technology Group
1:03:45
1:03:45
Play later
Play later
Lists
Like
Liked
1:03:45
Sam Valencia, Jerry Zigmont and Joe Saponare discuss working with Apple technology and clients. Drawn from their combined experience of over 20 years in the Apple Consultants Network, they discuss technical support issues both with the technology and working with clients.By Sam Valencia, Jerry Zigmont and Joe Saponare
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Wiz acquisition, AT&T paid hacker, Squarespace domain defaults
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54
Alphabet in talks to acquire Wiz AT&T allegedly paid hacker to delete data Details on Squarespace domain hacks Thanks to today's episode sponsor, Conveyor Does the mountain of security questionnaires in your inbox make you feel like you're in a rowboat trying to make it through a tsunami? If so, you should check out Conveyor. As the market leader i…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Google Acquires Wiz for $23B | Rite Aid Ransomware Breach | Essential Data Protection Tips!
6:51
6:51
Play later
Play later
Lists
Like
Liked
6:51
In today’s episode of "The Daily Threat," we cover three major cybersecurity stories: Google’s parent company, Alphabet, has made a significant move by acquiring cybersecurity startup Wiz for $23 billion. Learn more about this acquisition and its implications for cloud security. Read the full article here: https://www.reuters.com/markets/deals/goog…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Have you heard: Only Malware in the Building?
3:10
3:10
Play later
Play later
Lists
Like
Liked
3:10
Check out new episodes of Only Malware in the Building wherever you listen to podcasts: https://thecyberwire.com/podcasts/only-malware-in-the-buildingBy Proofpoint
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Rite Aid breach, AT&T breach implications, CDK paid ransom
7:35
7:35
Play later
Play later
Lists
Like
Liked
7:35
Rite Aid announces data breach following June cyberattack The personal security implications of the AT&T breach US offers support to prevent Paris Olympics cyber and disinformation attacks Thanks to today's episode sponsor, Conveyor Ever feel like completing security questionnaires has become your full-time side hustle you’re not even getting paid …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Google Enhances Security, Microsoft’s Email Controversy, and New Malware Threat: ViperSoftX
5:27
5:27
Play later
Play later
Lists
Like
Liked
5:27
Welcome back to The Daily Threat! In today’s episode, we dive into three major cybersecurity stories you need to know about. First, Google has enhanced its Advanced Protection Program by introducing passkey enrollment support. This new feature aims to provide high-risk users with an additional layer of security, making it significantly harder for a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Week in Review: AT&T breach, Security regulations attacked, 10 billion passwords stolen
20:29
20:29
Play later
Play later
Lists
Like
Liked
20:29
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Andrew Cannata, CISO, Primo Water Thanks to our show sponsor, Entro Security What are you doing to secure your company’s non-human identities? Vaults and scanners are helpful, but they don’t give the context for where your secrets are, h…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
PHP vulnerability exploit, Auto Parts breach, dark patterns report
7:09
7:09
Play later
Play later
Lists
Like
Liked
7:09
PHP vulnerability exploited, spreading malware and DDoS attacks Advance Auto Parts reveals damage from Snowflake breach FTC report reveals dark patterns used to trick consumers Thanks to today's episode sponsor, Entro Reclaim control over your Non-human identities! Entro enables security teams to manage and secure the lifecycle of non-human identit…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Australia targets foreign tech, banks sunset OTP, Veeam vulnerability exploited
7:06
7:06
Play later
Play later
Lists
Like
Liked
7:06
Australia targets government tech under foreign control Singapore banks replace OTP with digital tokens New group targets Veeam vulnerability Thanks to today's episode sponsor, Entro What are you doing to secure your company’s non-human identities? Vaults and scanners are helpful, but they don’t give the context for where your secrets are, how they…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Russian bot takedown, Burdensome cyber regs, Fujitsu data exposed
7:40
7:40
Play later
Play later
Lists
Like
Liked
7:40
US disrupts Russian AI-powered disinformation bot farm Senate takes aim at ‘overly burdensome’ cybersecurity regs Fujitsu confirms customer data exposed in cyberattack Thanks to today's episode sponsor, Entro Reclaim control over your Non-human identities! With Entro, security teams can now manage and secure the lifecycle of Non-human identities an…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Massive Data Breaches Exposed: 10 Billion Passwords, Florida Health Department, Neiman Marcus!
4:52
4:52
Play later
Play later
Lists
Like
Liked
4:52
Welcome to The Daily Threat! In today’s episode, we cover three significant data breaches that highlight the ongoing challenges in protecting sensitive information. 1. 10 Billion Passwords Leaked Our first story comes from Infosecurity Magazine. A massive leak of 10 billion passwords underscores the critical importance of strong, unique passwords. …
…
continue reading