Defensive Security Podcast Episode 195

http://securityaffairs.co/wordpress/60243/data-breach/dra-data-leak.html

https://www.wired.com/story/crash-override-malware/

https://threatpost.com/fin10-extorting-canadian-mining-companies-casinos/126382/

http://variety.com/2017/digital/features/netflix-orange-is-the-new-black-leak-dark-overlord-larson-studios-1202471400/amp/

https://arstechnica.com/information-technology/2017/06/32tb-of-windows-10-beta-builds-driver-source-code-leaked/

https://arstechnica.com/security/2017/06/5-weeks-after-wcry-outbreak-nsa-derived-worm-shuts-down-a-honda-factory/

Defensive Security Podcast Episode 194

https://hotforsecurity.bitdefender.com/blog/heartbleed-still-hurting-hard-uk-council-fined-100000-after-data-breach-18205.html

https://threatpost.com/ransomware-attack-hobbles-prestigious-university-college-london/126299/

http://www.securityweek.com/web-hosting-provider-pays-1-million-ransomware-attackers

https://infosec.engineering/improving-the-effectiveness-of-vulnerability-remediation-targeting/ 

Defensive Security Podcast Episode 193

http://www.csoonline.com/article/3198492/security/ceos-risky-behaviors-compromise-security.html

https://www.bleepingcomputer.com/news/security/ex-admin-deletes-all-customer-data-and-wipes-servers-of-dutch-hosting-provider

http://thehackernews.com/2017/06/intel-amt-firewall-bypass.html

http://thehackernews.com/2017/06/microsoft-powerpoint-malware.html

Defensive Security Podcast Episode 192

http://www.csoonline.com/article/3198496/compliance/sometimes-it-is-necessary-to-bend-the-rules-a-bit.html

http://www.securityweek.com/nature-vs-nurture-bad-cybersecurity-our-dna

http://gizmodo.com/top-defense-contractor-left-sensitive-pentagon-files-on-1795669632

https://nakedsecurity.sophos.com/2017/06/02/onelogin-warns-that-attacker-could-be-able-to-decrypt-data/

Defensive Security Podcast Episode 191

https://arstechnica.com/security/2017/05/windows-7-not-xp-was-the-reason-last-weeks-wcry-worm-spread-so-widely/

http://www.publictechnology.net/articles/news/nhs-cyber-attack-forces-week-long-council-email-block

https://www.washingtonpost.com/business/technology/nsa-officials-worried-about-the-day-its-potent-hacking-tool-would-get-loose-then-it-did/2017/05/16/50670b16-3978-11e7-a058-ddbb23c75d82_story.html

https://www.grahamcluley.com/companies-keeping-bitcoin-hand-case-ransomware-attacks/

http://www.eweek.com/security/zomato-docusign-breaches-reveal-common-security-risks

Defensive Security Podcast Episode 189

https://www.wsj.com/articles/cybersecurity-startup-tanium-exposed-california-hospitals-network-in-demos-without-permission-1492624287

95% of enterprise risk assessments find employees using TOR, private VPNs to bypass security, report says

http://www.csoonline.com/article/3191286/security/most-employees-willing-to-share-sensitive-information-survey-says.html

https://www.bleepingcomputer.com/news/security/over-36-000-computers-infected-with-nsas-doublepulsar-malware/

Defensive Security Podcast Episode 188

https://arstechnica.com/security/2017/04/purported-shadow-brokers-0days-were-in-fact-killed-by-mysterious-patch/

https://www.bleepingcomputer.com/news/security/former-sysadmin-accused-of-planting-time-bomb-in-companys-database/

http://www.computerworld.com/article/3189059/security/what-prevents-breaches-process-technology-or-people-one-answer-is-pc-and-one-is-right.html

http://www.csoonline.com/article/3187422/network-security/report-30-of-malware-is-zero-day-missed-by-legacy-antivirus.amp.html

How Hackers Hijacked a Bank’s Entire Online Operation

http://news.softpedia.com/news/two-laptops-with-hong-kong-s-3-7-million-voters-data-stolen-514346.shtml

Threat Brief: Credential Theft – The Keystone of the Shamoon 2 Attacks

Defensive Security Podcast Episode 187

http://www.itworld.com/article/3182431/security/some-https-inspection-tools-might-weaken-security.html

https://www.bleepingcomputer.com/news/legal/former-it-admin-accused-of-leaving-backdoor-account-accessing-it-700-times/

http://www.securityweek.com/what-cisos-can-learn-er-doctors

http://www.csoonline.com/article/3180762/data-breach/inside-the-russian-hack-of-yahoo-how-they-did-it.html

https://arstechnica.com/security/2017/03/microsofts-silence-over-unprecedented-patch-delay-doesnt-smell-right/

Defensive Security Podcast Episode 186

http://www.bankinfosecurity.com/emory-healthcare-database-breach-what-happened-a-9745

http://www.networkworld.com/article/3176718/security/dealing-with-overwhelming-volume-of-security-alerts.html#tk.rss_security

http://www.networkworld.com/article/3175030/security/trend-micro-report-ransomware-booming.html

https://www.helpnetsecurity.com/2017/03/02/yahoo-cookie-forging-incident/

http://www.darkreading.com/risk/new-cybersecurity-regulations-begin-today-for-ny-banks/d/d-id/1328295

http://www.pcworld.com/article/3179348/security/after-cia-leak-intel-security-releases-detection-tool-for-efi-rootkits.html
https://arstechnica.com/security/2017/03/wikileaks-publishes-what-it-says-is-trove-of-cia-hacking-tools/
http://www.csoonline.com/article/3177994/security/cia-false-flag-team-repurposed-shamoon-data-wiper-other-malware.html