Category Archives: Podcast

Defensive Security Podcast Episode 177

Book recommendations: https://defensivesecurity.org/resources/recommended-books/

Slack channel: http://https://defensivesecurity.org/slack-channel/

http://arstechnica.com/information-technology/2016/11/kaspersky-accuses-microsoft-of-anticompetitive-bundling-of-antivirus-software/

https://nakedsecurity.sophos.com/2016/11/11/yahoo-staff-knew-they-were-breached-two-years-ago/

http://www.csoonline.com/article/3139311/security/412-million-friendfinder-accounts-exposed-by-hackers.html

Defensive Security Podcast Episode 176

Overconfidence is putting organizations at higher risk for attacks

http://arstechnica.com/security/2016/11/windows-zero-day-exploited-by-same-group-behind-dnc-hack/

http://www.bankinfosecurity.com/those-suing-anthem-seek-security-audit-documents-a-9498

https://it.slashdot.org/story/16/11/05/1744231/it-workers-facing-layoffs-jolted-by-ceos-message

Defensive Security Podcast Episode 175

http://www.securityweek.com/shadow-brokers-leaks-servers-allegedly-hacked-nsa

http://www.bankinfosecurity.com/online-ad-industry-threatened-by-security-issues-a-9488

http://m.elpasoinc.com/news/local_news/article_92e82ee0-9f84-11e6-b429-0b2b853bae0b.html?mode=jqm

http://researchcenter.paloaltonetworks.com/2016/10/unit42-psa-conference-invite-used-lure-operation-lotus-blossom-actors/

Defensive Security Podcast Episode 174

Serious Dirty Cow Linux Vulnerability Under Attack

http://news.softpedia.com/news/hackers-steal-research-and-user-data-from-japanese-nuclear-research-lab-509380.shtml

https://www.databreaches.net/rainbow-childrens-clinic-notifies-33368-patients-of-ransomware-attack/

https://krebsonsecurity.com/2016/10/hacked-cameras-dvrs-powered-todays-massive-internet-outage/

Defensive Security Podcast Episode 173

http://conferences.oreilly.com/security/network-data-security-ny/public/content/buy-one-get-one-discount

https://www.eventbrite.com/e/bsides-atlanta-2016-tickets-27895813128

http://www.cnbc.com/2016/10/14/british-banks-keep-cyber-attacks-under-wraps-to-protect-image.html

http://www.lexology.com/library/detail.aspx?g=f17c1e55-5768-4ea6-a7e6-d555c4052eef

https://www.nist.gov/news-events/news/2016/10/security-fatigue-can-cause-computer-users-feel-hopeless-and-act-recklessly

Defensive Security Podcast Episode 172

http://cybersecurity.oxfordjournals.org/content/early/2016/08/08/cybsec.tyw001

The psychological reasons behind risky password practices

http://www.nytimes.com/2016/09/29/technology/yahoo-data-breach-hacking.html?_r=0

http://www.databreachtoday.com/blogs/yahoo-breach-great-nation-state-cop-out-p-2260

Defensive Security Podcast Episode 171

http://www.csoonline.com/article/3119965/security/a-single-ransomware-network-has-pulled-in-121-million.html

https://www.sans.org/reading-room/whitepapers/dataprotection/data-breaches-prevention-practical-37267

http://www.bankinfosecurity.com/aligning-cyber-framework-organizations-strategy-goals-a-9401

http://arstechnica.com/security/2016/09/swift-fraudsters-detection-system-bangladesh-bank-heist/

http://www.bankinfosecurity.com/blogs/ransomware-victims-please-come-forward-p-2255

http://www.nytimes.com/2016/09/17/business/dealbook/wells-fargo-warned-workers-against-fake-accounts-but-they-needed-a-paycheck.html

Defensive Security Podcast Episode 170

http://news.softpedia.com/news/retiring-sysadmin-fakes-cyber-attack-to-get-away-with-data-theft-507992.shtml

https://oversight.house.gov/wp-content/uploads/2016/09/The-OPM-Data-Breach-How-the-Government-Jeopardized-Our-National-Security-for-More-than-a-Generation.pdf

http://money.cnn.com/2016/09/08/investing/wells-fargo-created-phony-accounts-bank-fees/index.html

http://spectrum.ieee.org/view-from-the-valley/computing/it/facebook-engineers-crash-data-centers-in-realworld-stress-test

http://www.bloomberg.com/news/articles/2016-09-08/cisco-s-network-bugs-are-front-and-center-in-bankruptcy-fight

Defensive Security Podcast Episode 169

http://www.csoonline.com/article/3110975/techology-business/how-do-you-measure-success-when-it-comes-to-stopping-phishing-attacks.html

http://www.databreachtoday.com/equation-group-hacking-tool-dump-5-lessons-a-9358

http://www.csoonline.com/article/3109982/security/attackers-dont-need-vulnerabilities-when-the-basics-work-just-as-well.html

http://www.securityweek.com/attacker-uses-virtual-machine-hide-malicious-activity

http://www.networkworld.com/article/3110653/security/imperva-application-layer-ddos-attacks-are-on-the-rise.html

http://arstechnica.com/security/2016/08/actively-exploited-ios-flaws-that-hijack-iphones-likely-spread-for-years/

Defensive Security Podcast Episode 168

https://nakedsecurity.sophos.com/2016/08/18/nists-new-password-rules-what-you-need-to-know/

http://www.extremetech.com/extreme/234031-your-guide-to-the-shadow-brokers-nsa-theft-which-puts-the-snowden-leaks-to-shame

http://phys.org/news/2016-08-people-software-percent.html

http://www.csoonline.com/article/3108025/cyber-attacks-espionage/cerber-ransomware-earns-2-3mil-with-0-3-response-rate.html