Podcast Episodes

Back to Search
No image available

Breaking down a a high-severity vulnerability in Kubernetes. [Research Saturday]


Season 8 Episode 325


Tomer Peled, a Security & Vulnerability Researcher from Akamai is sharing their work on "What a Cluster: Local Volumes Vulnerability in Kubernetes." This research focuses on a high-severity vulnerabi…


Published on 1 year, 8 months ago

No image available

Privacy, power, and the path forward.


Season 8 Episode 2045


Section 702 edges closer to a vote. CISA provides guidance on Sisense and Microsoft breaches. A major conservative think tank reports a breach. Obsolete D-Link devices are under active exploitation, …


Published on 1 year, 8 months ago

Cyber Talent Insights: Navigating the landscape for enterprise organizations. (Part 1 of 3) [Special Edition]

Cyber Talent Insights: Navigating the landscape for enterprise organizations. (Part 1 of 3) [Special Edition]


Season 9 Episode 60


Join us for this special three-part series where the N2K Cyber Talent Insights team guides you through effective strategies to develop your cybersecurity team, helping you stay ahead in the constant…


Published on 1 year, 8 months ago

No image available

Apple's worldwide warning on mercenary attacks.


Season 8 Episode 2044


Apple warns targeted users of mercenary spyware attacks. CISA expands its Malware Next-Gen service to the private sector. US Cyber Command chronicles their “hunt forward” operations. Taxi fleets leak…


Published on 1 year, 8 months ago

No image available

From deadlock to debate on a revised Section 702 bill.


Season 8 Episode 2043


The House moves forward on Section 702 reauthorization. Ukraine suspends a top cybersecurity official. A Wisconsin health coop suffers a data breach. Sophos uncovers a malicious backdoor. Fortinet is…


Published on 1 year, 8 months ago

No image available

Unraveling a healthcare ransomware web.


Season 8 Episode 2042


Change Healthcare gets hit with another ransom demand. A French football team warns fans of a cyberattack. The Home Depot breach is chalked up to a misconfigured SaaS application. The FCC looks to su…


Published on 1 year, 8 months ago

No image available

A possible breakthrough in data privacy legislation.


Season 8 Episode 2041


Might there be motion from Congress on data privacy legislation? Maryland passes a pair of privacy bills. A database allegedly from the EPA shows up on Russian cybercrime forums. HHS issues an alert …


Published on 1 year, 8 months ago

No image available

Encore: Selena Larson: The Green Goldfish and cyber threat intelligence. [Analyst] [Career Notes]


Season 1 Episode 10


Cyber threat intelligence analyst Selena Larson takes us on her career journey from being a journalist to making the switch to industrial security. As a child who wrote a book about a green goldfish …


Published on 1 year, 8 months ago

No image available

Leaking your AWS API keys, on purpose? [Research Saturday]


Season 8 Episode 324


Noah Pack, a SANS Internet Storm Center Intern, sits down to discuss research on "What happens when you accidentally leak your AWS API keys?" This research is a guest diary from Noah and shares a pro…


Published on 1 year, 8 months ago

No image available

Deciphering the Acuity cybersecurity incident.


Season 8 Episode 2040


Acuity downplays its recent breach. IcedID gives way to a new malware strain. Russia arrests alleged credit card thieves. Wiz uncovers security flaws in Hugging Face AI models. NERC and the E-ISAC re…


Published on 1 year, 8 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate