All Episodes
Displaying 41 - 60 of 222 in total
Episode 41: Open Ports, Default Credentials, and Supply Chain Risks (Domain 2)
Even the best-configured systems can fall victim to the most basic security oversights—like open ports and unchanged default passwords. In this episode, we focus on ho...
Episode 42: Human Vectors and Social Engineering (Part 1) (Domain 2)
People are often the weakest link in cybersecurity, and attackers exploit this through carefully crafted manipulation tactics known as social engineering. In this epis...
Episode 43: Human Vectors and Social Engineering (Part 2) (Domain 2)
While basic social engineering relies on message-based deception, more advanced techniques target identity, credibility, and digital presence through impersonation, pr...
Episode 44: Application-Level Vulnerabilities (Domain 2)
Applications serve as the user-facing layer of most digital environments, and they are frequently targeted by attackers exploiting poor coding practices and flawed des...
Episode 45: Operating System and Web-Based Vulnerabilities (Domain 2)
Operating systems and web applications form the backbone of IT infrastructure, and when left unpatched or misconfigured, they present rich targets for exploitation. In...
Episode 46: Hardware and Firmware Vulnerabilities (Domain 2)
Cybersecurity doesn’t stop at software—hardware and firmware vulnerabilities can offer attackers deep, long-term access to systems in ways that are difficult to detect...
Episode 47: Virtualization and Cloud-Specific Vulnerabilities (Domain 2)
Virtualization and cloud computing introduce powerful efficiencies—but they also open up new categories of vulnerabilities that traditional security models often fail ...
Episode 48: Supply Chain and Cryptographic Vulnerabilities (Domain 2)
Modern cybersecurity is deeply interconnected, and vulnerabilities in your vendors, partners, or third-party software can easily become vulnerabilities in your own env...
Episode 49: Misconfiguration and Mobile Device Vulnerabilities (Domain 2)
Misconfiguration is one of the most common and preventable causes of security breaches, and mobile devices amplify this risk due to their ubiquity and inconsistent man...
Episode 50: Understanding Zero-Day Vulnerabilities (Domain 2)
Zero-day vulnerabilities are software flaws that are unknown to the vendor and, critically, to defenders—giving attackers a window of opportunity to exploit systems wi...
Episode 51: Indicators of Malware Attacks (Domain 2)
Malware comes in many forms—ransomware, spyware, trojans, worms—and each leaves behind unique indicators that can help defenders detect infections early and respond ef...
Episode 52: Physical Security Attacks and Indicators (Domain 2)
While cybersecurity often focuses on virtual threats, physical attacks on facilities, hardware, and access points remain a serious and sometimes overlooked risk. In th...
Episode 53: Network-Based Indicators (Part 1) (Domain 2)
The network is often where the first signs of an attack emerge—if you know what to look for. In this episode, we examine key indicators of network-based threats, start...
Episode 54: Network-Based Indicators (Part 2) (Domain 2)
Continuing our focus on network-based threats, this episode explores wireless-specific attacks and credential replay tactics that compromise network integrity and user...
Episode 55: Application-Level Attack Indicators (Domain 2)
Applications are often targeted because they represent the gateway to sensitive data and services, and attackers leave behind subtle but detectable signs when they exp...
Episode 56: Cryptographic Attack Indicators (Domain 2)
Even strong encryption systems can be undermined by poor implementation, weak configurations, or direct cryptographic attacks—and recognizing the signs is vital. In th...
Episode 57: Password Attack Indicators (Domain 2)
Password attacks are among the most common initial access vectors, and recognizing their early indicators is key to stopping intrusions before they escalate. In this e...
Episode 58: General Indicators of Malicious Activity (Domain 2)
Not every security breach begins with a smoking gun—many start with subtle shifts in system behavior that point to something being off. This episode explores general i...
Episode 59: Segmentation and Access Control (Domain 2)
Network segmentation and access control are two of the most powerful tools for limiting the scope and impact of an attack, especially once a threat actor gains initial...
Episode 60: Application Allow Lists and Isolation (Domain 2)
Controlling what software is allowed to run—and isolating it when needed—is a fundamental principle of endpoint security. In this episode, we examine application allow...