Artwork

Content provided by Jerry Bell and Andrew Kalat. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jerry Bell and Andrew Kalat or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Defensive Security Podcast Episode 188

1:04:02
 
Share
 

Archived series ("HTTP Redirect" status)

Replaced by: Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

When? This feed was archived on July 25, 2018 13:27 (5+ y ago). Last successful fetch was on July 24, 2018 13:29 (5+ y ago)

Why? HTTP Redirect status. The feed permanently redirected to another series.

What now? If you were subscribed to this series when it was replaced, you will now be subscribed to the replacement series. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 177277788 series 1334193
Content provided by Jerry Bell and Andrew Kalat. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jerry Bell and Andrew Kalat or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

https://arstechnica.com/security/2017/04/purported-shadow-brokers-0days-were-in-fact-killed-by-mysterious-patch/

https://www.bleepingcomputer.com/news/security/former-sysadmin-accused-of-planting-time-bomb-in-companys-database/

http://www.computerworld.com/article/3189059/security/what-prevents-breaches-process-technology-or-people-one-answer-is-pc-and-one-is-right.html

http://www.csoonline.com/article/3187422/network-security/report-30-of-malware-is-zero-day-missed-by-legacy-antivirus.amp.html

How Hackers Hijacked a Bank’s Entire Online Operation

http://news.softpedia.com/news/two-laptops-with-hong-kong-s-3-7-million-voters-data-stolen-514346.shtml

Threat Brief: Credential Theft – The Keystone of the Shamoon 2 Attacks

  continue reading

207 episodes

Artwork
iconShare
 

Archived series ("HTTP Redirect" status)

Replaced by: Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

When? This feed was archived on July 25, 2018 13:27 (5+ y ago). Last successful fetch was on July 24, 2018 13:29 (5+ y ago)

Why? HTTP Redirect status. The feed permanently redirected to another series.

What now? If you were subscribed to this series when it was replaced, you will now be subscribed to the replacement series. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 177277788 series 1334193
Content provided by Jerry Bell and Andrew Kalat. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jerry Bell and Andrew Kalat or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

https://arstechnica.com/security/2017/04/purported-shadow-brokers-0days-were-in-fact-killed-by-mysterious-patch/

https://www.bleepingcomputer.com/news/security/former-sysadmin-accused-of-planting-time-bomb-in-companys-database/

http://www.computerworld.com/article/3189059/security/what-prevents-breaches-process-technology-or-people-one-answer-is-pc-and-one-is-right.html

http://www.csoonline.com/article/3187422/network-security/report-30-of-malware-is-zero-day-missed-by-legacy-antivirus.amp.html

How Hackers Hijacked a Bank’s Entire Online Operation

http://news.softpedia.com/news/two-laptops-with-hong-kong-s-3-7-million-voters-data-stolen-514346.shtml

Threat Brief: Credential Theft – The Keystone of the Shamoon 2 Attacks

  continue reading

207 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide