POPULARITY
Join host Joseph Whalen in Episode 28 of "Insights into Technology," as we explore the latest in cyber threats and innovations. Discover how Windows Defender was tricked by DefendNOT, an ingenious tool using an undocumented API to shut down vital security protections. We'll also dive into the recent Pwn2Own Berlin 2025 competition, where hackers walked away with over a million dollars after uncovering 28 zero-day vulnerabilities. Additionally, learn about the record-setting DDoS attack handled by Google's Project Shield and the evolving threat landscape with IoT devices. The episode also highlights the use of AI in enhancing phishing attempts targeting U.S. government officials and discusses Congress's move to diversify the cybersecurity workforce. Finally, we touch on cutting-edge developments in vulnerability management as we examine the proposed Likely Exploited Vulnerabilities (LEV) metric and its potential to reshape patch prioritization. Tune in for these topics and more on "Insights into Technology." Listen and subscribe for your weekly tech news essentials!
Join host Joseph Whalen in Episode 28 of "Insights into Technology," as we explore the latest in cyber threats and innovations. Discover how Windows Defender was tricked by DefendNOT, an ingenious tool using an undocumented API to shut down vital security protections. We'll also dive into the recent Pwn2Own Berlin 2025 competition, where hackers walked away with over a million dollars after uncovering 28 zero-day vulnerabilities. Additionally, learn about the record-setting DDoS attack handled by Google's Project Shield and the evolving threat landscape with IoT devices. The episode also highlights the use of AI in enhancing phishing attempts targeting U.S. government officials and discusses Congress's move to diversify the cybersecurity workforce. Finally, we touch on cutting-edge developments in vulnerability management as we examine the proposed Likely Exploited Vulnerabilities (LEV) metric and its potential to reshape patch prioritization. Tune in for these topics and more on "Insights into Technology." Listen and subscribe for your weekly tech news essentials!
In this episode of Cyber Security Today, host Jim Love covers several major cybersecurity incidents and vulnerabilities. Key stories include the compromise of Windows Defender and other Endpoint Detection and Response (EDR) systems, a data breach on X (formerly known as Twitter) exposing over 200 million user records, and a security flaw in several UK-based dating apps that led to the exposure of approximately 1.5 million private images. The discussion highlights how attackers are increasingly using legitimate software tools to bypass security measures, the implications of these breaches for users, and offers practical tips for maintaining robust cybersecurity. 00:00 Introduction to Today's Cyber Security News 00:29 Compromised Endpoint Detection and Response Systems 01:06 Bypassing Windows Defender: Methods and Implications 02:52 Ransomware Tactics and Legitimate Tool Exploits 04:20 Time Traveling Attacks and EDR Limitations 06:33 Massive Data Breach on X (Twitter) 08:30 UK Dating Apps Expose Private Images 10:47 Fraud Alerts and Scams 13:25 Conclusion and Final Thoughts
At ThreatLocker's Zero Trust World 2025 in Orlando, Kieran Human, Special Projects Engineer at ThreatLocker, showcased the practical dangers of everyday cybersecurity threats through engaging, hands-on labs. Attendees, ranging from CISOs to IT technicians, were offered the chance to experience real-world hacking scenarios using devices like the infamous “rubber ducky.”The Rubber Ducky ExperienceThe rubber ducky, which resembles a standard USB drive, acts as a keyboard when plugged into a computer, executing automated scripts. Human demonstrated how this device could disable Windows Defender, exfiltrate data, and execute scripts—highlighting how accessible hacking tools have become. Attendees left with both new knowledge and their own rubber ducky, reinforcing the event's educational impact.From Learning to DefenseThe lab sessions underscored the importance of understanding threats to effectively defend against them. Human emphasized that cybersecurity isn't just for seasoned professionals; even attendees with minimal experience learned how to execute data exfiltration and bypass security protocols within an hour. This revelation stressed the necessity of robust security measures, even for general IT professionals who may not specialize in cybersecurity.Mitigating Threats with ThreatLockerThreatLocker's solutions, including features like ring-fencing PowerShell and applying layered protections, were showcased as effective countermeasures. Human explained how ThreatLocker's tools could prevent malicious scripts from accessing the internet or sensitive folders, offering a tangible defense against the types of attacks demonstrated in the labs.Looking AheadLooking toward next year, Human hinted at more advanced demonstrations, potentially including ransomware scenarios. This forward-thinking approach aligns with ThreatLocker's commitment to preparing IT and security professionals for the evolving challenges they face.Why This MattersThe episode captures how ThreatLocker is not just educating but empowering IT and security professionals. By providing a controlled environment to experience cyberattacks firsthand, the event bridged the gap between theory and practice. Listen to the full episode for insights into how these experiences translate into actionable strategies for building stronger, more resilient cybersecurity defenses.Guest: Kieran Human, Special Projects Engineer at ThreatLocker | On LinkedIn: https://www.linkedin.com/in/kieran-human-5495ab170/Hosts:Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More
Scammers pose as Microsoft to trick you into calling fake support numbers. Here's how to protect yourself.
00:00 – 00:22 – Welcome Back Larry and Joe return for another engaging episode of Cybersecurity 101. 00:23 – 03:56 – AI and Voice Cloning Scams The hosts discuss the growing threat of AI-powered voice cloning scams targeting the elderly and provide practical tips for avoiding them. 03:57 – 06:08 – Modern Antivirus Solutions Joe explains why built-in tools like Windows Defender outperform legacy products like Norton and McAfee, saving users money and offering superior protection. Source: https://www.av-test.org/en/antivirus/home-windows/ 06:09 – 08:45 – Freezing Your Credit Joe highlights the importance of freezing credit with major bureaus to protect against identity theft, explaining how it eliminates the need for costly services like LifeLock. https://en.wikipedia.org/wiki/Credit_freeze 08:46 – 12:38 – Public Wi-Fi and VPNs A deep dive into the risks of using public Wi-Fi and the scenarios where VPNs can add an extra layer of protection, especially against hotspot impersonation attacks. 12:39 – 15:45 – Mentoring Future Cybersecurity Professionals Larry shares his experience mentoring newcomers to the field, emphasizing the importance of understanding networking basics and applying real-world skills. 15:46 – 18:45 – SOC Workflow and Tiered Roles Joe and Larry break down the structure of a Security Operations Center (SOC), explaining the roles of Tier 1 analysts, Tier 2 shift leaders, and Tier 3 specialists like threat hunters and detection engineers. 18:46 – 22:06 – Responding to Incidents Larry details a recent SOC case involving unusual sign-ins and blocked countries, showcasing the process of verifying legitimate activity. 22:07 – 28:06 – Human Insight vs. AI in Cybersecurity The hosts explore why human instincts remain irreplaceable in handling complex cybersecurity cases, even with advancements in AI. 28:07 – 30:56 – Planning a SOC Lab Joe and Larry brainstorm ideas for a future podcast episode, including building a lab to simulate incidents and share hands-on cybersecurity insights with listeners. 30:57 – Looking Ahead The hosts reflect on their cybersecurity journey and tease upcoming content, including mock incident labs and tutorials to show listeners the day-to-day realities of working in a SOC.
PumaKit Linux Rootkit, Windows Defender Flaw, and Android Malware Outbreak! In today's episode of Cybersecurity Today, host Jim Love delves into the discovery of the advanced Linux rootkit PumaKit, critical vulnerabilities in Microsoft's Windows Defender, a new multi-platform malware campaign downgrading browser security, and Germany's recent outbreak of pre-installed malware on 30,000 Android devices. We discuss the implications of these cybersecurity threats and the measures being taken to mitigate them. Stay informed and vigilant with our detailed analysis of these emerging cyber risks. 00:00 Introduction to Cybersecurity News 00:27 Advanced Linux Rootkit: PumaKit 01:59 Critical Windows Defender Vulnerability 03:42 Malware Downgrades Browser Security 05:08 Pre-installed Malware on Android Devices in Germany 07:02 Conclusion and Final Thoughts
The U.S. dismantles the Rydox criminal marketplace. File-sharing provider Cleo urges customers to immediately patch a critical vulnerability. A Japanese media giant reportedly paid nearly $3 million to a Russia-linked ransomware group. The largest Bitcoin ATM operator in the U.S. confirms a data breach. Microsoft quietly patches two potentially critical vulnerabilities. Researchers at Claroty describe a malware tool used by nation-state actors to target critical IoT and OT systems. Dell releases patches for a pair of critical vulnerabilities. A federal court indicts 14 North Korean nationals for a scheme funding North Korea's weapons programs. Texas accuses a data broker of sharing sensitive driving data without consent. Tim Starks, senior reporter at CyberScoop, joins Dave to explore the FCC's groundbreaking proposal to introduce cybersecurity rules linked to wiretapping laws. How the bots stole Christmas. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Tim Starks, senior reporter at CyberScoop, joins Dave to explore the FCC's groundbreaking proposal to introduce cybersecurity rules linked to wiretapping laws. Read more about it in Tim's article. Selected Reading Rydox Cybercrime Marketplace Disrupted, Administrators Arrested (SecurityWeek) Cleo urges customers to ‘immediately' apply new patch as researchers discover new malware (The Record) Japanese game and anime publisher reportedly pays $3 million ransom to Russia-linked hackers (The Record) Bitcoin ATM Giant Byte Federal Hit by Hackers, 58,000 Users Impacted (Hackread) Microsoft Patches Vulnerabilities in Windows Defender, Update Catalog (SecurityWeek) Researchers Discover Malware Used by Nation-Sates to Attack OT Systems (Infosecurity Magazine) Critical Dell Security Vulnerabilities Let Attackers Compromise Affected Systems (Cyber Security News) 14 North Korean IT Workers Charged, US to Offer $5 Million Rewards for Info (Cyber Security News) Texas adds data broker specializing in driver behavior to list of alleged privacy law violators (The Record) UK Shoppers Frustrated as Bots Snap Up Popular Christmas Gifts (Infosecurity Magazine) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Three Buddy Problem - Episode 20: We revisit the ‘hack-back' debate, the threshold for spying on adversaries, Palo Alto watching EDR bypass research to track threat actors, hot nuggets in Project Zero's Clem Lecinge's Hexacon talk, Apple's new iOS update rebooting iPhones in law enforcement custody, the mysterious GoblinRAT backdoor, and physical ‘meatspace' Bitcoin attacks and more details on North Korean cryptocurrency theft. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs) (SentinelLabs), Costin Raiu (https://twitter.com/craiu) (Art of Noh) and Ryan Naraine (https://twitter.com/ryanaraine) (SecurityWeek).
Dans l'actu des nouvelles technologies et de l'accessibilité cette semaine : Du côté des applications et du web Mise à jour de juillet de Jaws 2024. NVDA 2024.3beta1 est disponible pour les testeurs. Pour les utilisateurs de NVDA : avertissement Windows Defender - nouveau certificat de signature de code. Une nouvelle fonction bienvenue sur SNCF Connect. Sonar Vision : des trajets gratuits que l'on peut utiliser sans être abonné. Notre podcast Interview : SonarVision, une application de guidage piéton précise à 1 mètre. Application iOS Seeing Dogs. Application Android Birthday Manager. Le jeu audio iOS Hunting the ducks est disponible dans 22 nouvelles langues dont le Français. Le reste de l'actu Sonoristicks, des lunettes pour “relever les défis de l'accessibilité culturelle.”. Les Orbit Speak et Orbit Speak plus sont de sortie. Dotées de ChatGPT–4o, les lunettes connectées AirGo Vision veulent faire de l'ombre aux Ray-Ban de Meta Le coup de coeur de Sof Application FlowTunes pour iOS. Remerciements Cette semaine, nous remercions Bruno, Charles-Emmanuel, Murielle et Sebastian pour leurs infos ou leur dons. Si vous souhaitez vous aussi nous envoyer de l'info ou nous soutenir : Pour nous contactez ou nous envoyez des infos, passez par le formulaire de contact sur le site. Pour faire un don sur PayPal ou en cryptomonaie c'est à l'adresse : oxytude.org/don. Faites vos achats sur Amazon en passant par notre lien affilié oxytude.org/amazon., ça nous aide sans augmenter le prix de vos achats Pour animer cet épisode Pascale, Philippe et Sof.
Windows Defender yang dipakai pada perangkat lunak pada system keamanan Indonesia, disebut sangat tertinggal. Beda dengan system keamanan luar negeri yang jauh lebih aman dan canggih.
Kerri Shafer-Page from Arctic Wolf joins us to discuss their work on "Lost in the Fog: A New Ransomware Threat." Starting in early May, Arctic Wolf's Incident Response team investigated Fog ransomware attacks on US education and recreation sectors, where attackers exploited compromised VPN credentials to access systems, disable Windows Defender, encrypt files, and delete backups. Despite the uniformity in ransomware payloads and ransom notes, the organizational structure of the responsible groups remains unknown. The research can be found here: Lost in the Fog: A New Ransomware Threat Learn more about your ad choices. Visit megaphone.fm/adchoices
Kerri Shafer-Page from Arctic Wolf joins us to discuss their work on "Lost in the Fog: A New Ransomware Threat." Starting in early May, Arctic Wolf's Incident Response team investigated Fog ransomware attacks on US education and recreation sectors, where attackers exploited compromised VPN credentials to access systems, disable Windows Defender, encrypt files, and delete backups. Despite the uniformity in ransomware payloads and ransom notes, the organizational structure of the responsible groups remains unknown. The research can be found here: Lost in the Fog: A New Ransomware Threat Learn more about your ad choices. Visit megaphone.fm/adchoices
Section 702 gets another two years. MITRE suffers a breach through an Ivanti VPN. CrushFTP urges customers to patch an actively exploited flaw. SafeBreach researchers disclose vulnerabilities in Windows Defender that allow remote file deletion. Ukrainian soldiers see increased attention from data-stealing apps. GitHub's comments are being exploited to distribute malware. VW confirms legacy Chinese espionage and data breaches. CISA crowns winners of the President's Cup Cybersecurity Competition. Cecilia Marinier, Director, Innovation and Programs at RSA Conference, and Niloo Razi Howe, Senior Operating Partner at Energy Impact Partners & judge, review the top Innovation Sandbox contest finalists in anticipation of RSAC 2024. Targeting kids online puts perpetrators in the malware crosshairs. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest We have two guests today. Cecilia Marinier, Director, Innovation and Programs at RSA Conference, and Niloo Razi Howe, Senior Operating Partner at Energy Impact Partners & judge, review the top Innovation Sandbox contest finalists and what to look for on the innovation front at RSAC 2024. For 18 years, cybersecurity's boldest new innovators have competed in the RSAC Innovation Sandbox contest to put the spotlight on their potentially game-changing ideas. This year, 10 finalists will once again have three minutes to make their pitch to a panel of judges. Since the start of the contest, the Top 10 Finalists have collectively seen over 80 acquisitions and $13.5 billion in investments. Innovation Sandbox will take place on Monday, May 6th at 10:50am PT. Selected Reading Warrantless spying powers extended to 2026 with Biden's signature (The Record) MITRE breached by nation-state threat actor via Ivanti zero-days (Help Net Security) CrushFTP File Transfer Vulnerability Lets Attackers Download System Files (Infosecurity Magazine) Researchers Claim that Windows Defender Can Be Bypassed (GB Hackers) Ukrainian soldiers' apps increasingly targeted for spying, cyber agency warns (The Record) GitHub comments abused to push malware via Microsoft repo URLs (Bleeping Computer) Presumably Chinese industrial spies stole VW data on e-drive technology (Bleeping Computer) CISA declares winners of President's Cup cybersecurity competition, with Artificially Intelligent team leading (Industrial Cyber) Malware dev lures child exploiters into honeytrap to extort them (Bleeping Computer) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
In the fast-paced world of technology, your Windows device needs the ultimate defense against cyber threats. I've revamped the guide, diving deep into the realms of anti-virus protection, cybersecurity, and online privacy. Here's your roadmap to a digitally clean and secure future: Windows Defender vs. Norton vs. Malwarebytes: Uncover the strengths and limitations of each superhero in the battle against cyber villains. The War Against Malware: Arm yourself with knowledge on the latest malware trends and the tools to combat them effectively. Guarding Your Cyber Fortress: Explore the importance of cybersecurity and online privacy in an era where digital threats are omnipresent. Beyond the Basics: McAfee and Bloatware: Navigate the landscape of additional security options and understand the impact of unnecessary software on your system. Securing Your Digital Territory: Wi-Fi, Smart Home, and Routers: Extend your protection beyond your computer by fortifying your Wi-Fi, securing your smart home devices, and understanding router security. Bitcoin and Cybersecurity: Delve into the world of cryptocurrency and how to safeguard your digital assets in the age of Bitcoin. Cisco's Role in Digital Clean Up: Understand the significance of Cisco in ensuring the overall security and integrity of your digital ecosystem. Click through to embark on a journey towards digital cleanliness and fortify your defenses against cyber threats. Your computer's safety is our top priority, and together, we'll conquer the digital realm! Read the full guide HERE You can also catch Craig at the following stations and channels: With Jim Polito at 0836 on Tuesdays WTAG AM 580 - FM 94.9 Talk 1200 News Radio 920 & 104.7 FM WHJJ NewsRadio 560 WHYN WXTK Craigs Show Airs 0600 Saturday and Sunday With Jeff Katz 1630 - Tuesdays WRVA 96.1 FM, 1140 AM WGAN Matt Gagnon 0730 Wednesdays Craigs Show Airs 1700 Saturday WGIR 610 & News Radio 96.7 Chris Ryan 0730 Mondays Craigs Show Airs 1130 Saturday On the Internet: Tune-In (WGAN) Radio.com (WRVA) iHeartRadio (WGIR, WTAG, and other stations)
In the ever-evolving landscape of digital media, the illusion of ownership can be shattered with a single tactical move. Recently, the PlayStation community experienced a rude awakening when paid content was abruptly removed - and no refunds were given. This underscores a widespread issue: do you own the digital shows and movies you 'bought'? Topics Explored in the Article: Tactical Octopus Unveiled: Delve into the intricate tactics used in the digital realm that challenge the perception of ownership. IRS Alert: Explore the unexpected connection between the IRS and your digital movie purchases, revealing potential vulnerabilities. Cybersecurity Insights: Understand the broader landscape of cybersecurity and its impact on safeguarding your digital trove. Email Threats: Uncover the silent menace posed by email threats and how they can compromise your perceived ownership of digital content. Phishing Schemes Exposed: Navigate through the perilous waters of phishing schemes, shedding light on how they put your digital movies at risk. HaveIBeenPawned: Explore the eye-opening revelations from HaveIBeenPawned.com and how they relate to the security of your digital media. Troy Hunt's Take: Gain insights from Troy Hunt, a renowned expert, as he unveils the reality behind digital content ownership. Password Managers as Shields: Discover how password managers act as shields, protecting your digital movie collection from potential loss. Online Meetings Vulnerability: Zoom in on the vulnerability of digital media during online meetings, revealing potential risks. Antivirus and Antimalware: Explore the role of antivirus and antimalware tools in fortifying your digital ownership. Windows Defender: Assess the effectiveness of Windows Defender in securing your digital content within the Windows ecosystem. The digital world is full of surprises, and ensuring true ownership of your digital shows and movies requires a strategic approach. From cybersecurity insights to email threats and the role of password managers, this article unravels the layers of complexity surrounding digital ownership. Are you ready to secure what's rightfully yours? Read more on Lifehacker to stay informed and empowered in the digital age. You can also catch Craig at the following stations and channels: With Jim Polito at 0836 on Tuesdays WTAG AM 580 - FM 94.9 Talk 1200 News Radio 920 & 104.7 FM WHJJ NewsRadio 560 WHYN WXTK Craigs Show Airs 0600 Saturday and Sunday With Jeff Katz 1630 - Tuesdays WRVA 96.1 FM, 1140 AM WGAN Matt Gagnon 0730 Wednesdays Craigs Show Airs 1700 Saturday WGIR 610 & News Radio 96.7 Chris Ryan 0730 Mondays Craigs Show Airs 1130 Saturday On the Internet: Tune-In (WGAN) Radio.com (WRVA) iHeartRadio (WGIR, WTAG, and other stations)
CT Lottery App no longer works, My Chromebook Tabs are gone, My Bank app does not have 2FA what should I do? HO Insta-ink stops printer from working when you cancel insta-ink subscription, How do I configure OpenDNS on Frontier Fiber, How much should it cost to install a Firewall for my business? Windows Defender driver error issue Win 11, Adobe Acrobat Pro stopped working.
Ryan and Shannon discuss details of the recently publicized Windows Defender-Pretender Attack in this episode. Please LISTEN
Today I'm excited to share a featured interview with our new friend Mike Toole of Blumira. We talk about all things EDR, including: How does it differ from something like Windows Defender? What things do I need to keep in mind if I'm in the market for an EDR purchase? Is Mac EDR any good? How do attackers bypass EDR? Will AI create industructible malware, take over the human race and then use our bodies for batteries?
Rip out your Barracuda appliance because the bad actors are reading your mail, Malwarebytes my NOT be allowed to label rival's app as unwanted, Sudan…right… DDoS brings down M365, Nest cameras going off-line, Wifi calling, Cutting the cord, Windows Defender is off…got an email.
In this eye-opening podcast episode, we dive into the world of online safety and debunk the top myths that surround it. Join us as we separate fact from fiction and provide practical tips to enhance digital security. Key Points Discussed: The Role of Antivirus Software: Separating Fact from Fiction Discover why antivirus software isn't always necessary, as we delve into the capabilities of Windows Defender and its ability to provide adequate protection. Moving Beyond Caution: Preventing Hacking and Breaches Understand why being cautious alone isn't enough to prevent hacking and learn practical steps you can take to enhance your overall online security. Secure Websites: Debunking the Myth of Invincibility Gain a deeper understanding of even seemingly secure websites' vulnerabilities and how cybercriminals can exploit them. Identity Theft: Taking Action to Safeguard Your Information Realize that it's never too late to protect yourself against identity theft, and explore strategies to stay informed and safeguard your valuable personal data. Fraud Reimbursement: Unveiling the Bank's Responsibility Learn about the potential limitations of reimbursement by banks in fraud cases, emphasizing the need for proactive measures to mitigate risks. Online Banking Apps: Vulnerabilities and Countermeasures Explore the truth behind the security of online banking apps, understand that they are not immune to cyberattacks, and discover effective ways to secure your mobile banking experience. Password Strength: Beyond the Basics Recognize the importance of strong passwords, but also be aware of the exploitable vulnerabilities present in websites and apps that can compromise your data. Empowering Yourself: The Importance of Staying Informed Emphasize the significance of staying informed about the latest security measures, emerging threats, and best practices to enhance your online safety. Join us as we dive deep into these topics and gain access to expert insights provided by renowned cybersecurity expert Craig Peterson. Subscribe to our podcast to stay updated on the latest trends, valuable tips, and practical advice to strengthen your digital defenses. Related Article: Debunking the Top 10 Myths about Digital Data Security Protect yourself, stay informed, and subscribe to our podcast today to unlock the secrets of online safety and security! Note: This podcast episode is based on the insightful article by Craig Peterson. For further details and a comprehensive understanding, we encourage you to read the related article provided in the show notes. You can also catch Craig at the following stations and channels: With Jim Polito at 0836 Tuesdays WTAG AM 580 - FM 94.9 Talk 1200 News Radio 920 & 104.7 FM WHJJ NewsRadio 560 WHYN WXTK Craigs Show Airs 0600 Saturday and Sunday With Jeff Katz 1630 - Tuesdays WRVA 96.1 FM, 1140 AM WGAN Matt Gagnon 0730 Wednesdays Craigs Show Airs 1700 Saturday WGIR 610 & News Radio 96.7 Chris Ryan 0730 Mondays Craigs Show Airs 1130 Saturday On the Internet: Tune-In (WGAN) Radio.com (WRVA) iHeartRadio (WGIR, WTAG, and other stations)
Are you tired of browsing through endless options for anti-virus software? We've got you covered! In this episode, we're diving into the world of PC protection and revealing our top recommendations to keep your system safe from malware and viruses. Our first choice, and top pick, is Windows Defender. Not only does it offer exceptional protection against threats, but it comes at an unbeatable price—free! Enable it effortlessly and enjoy the peace of mind you get from knowing your system is safeguarded. Plus, lifetime updates and support are included at no additional cost. It's a win-win! If Windows Defender doesn't quite meet your requirements or you're looking for additional options, we've got you covered. Tune in as we explore other noteworthy choices, such as Bitdefender, Malwarebytes, and Cisco AMP for Endpoints. Each one has its own strengths, so you can choose the one that is right for you. To delve deeper into the topic, be sure to check out our related article on our website. There, you'll find further insights, comparisons, and additional information that will guide you in making the best decision for your PC's security. Access the article below for free, and unlock a wealth of knowledge to enhance your PC protection journey: Discover the Top Antivirus and Anti-malware Solutions for Total PC Protection! You can also catch Craig at the following stations and channels: With Jim Polito at 0836 Tuesdays WTAG AM 580 - FM 94.9 Talk 1200 News Radio 920 & 104.7 FM WHJJ NewsRadio 560 WHYN WXTK Craigs Show Airs 0600 Saturday and Sunday With Jeff Katz 1630 - Tuesdays WRVA 96.1 FM, 1140 AM WGAN Matt Gagnon 0730 Wednesdays Craigs Show Airs 1700 Saturday WGIR 610 & News Radio 96.7 Chris Ryan 0730 Mondays Craigs Show Airs 1130 Saturday On the Internet: Tune-In (WGAN) Radio.com (WRVA) iHeartRadio (WGIR, WTAG, and other stations)
In episode 73 of the We Hack Purple Podcast, host Tanya Janca talks to guest Amanda Crawley of 1Password! We talked about how developers need special tools to help them do their jobs, securely, then we chatted about several things that can help them, especially password managers! Developers are huge targets for malicious actors and Amanda shared TONS of ways devs can protect themselves, and their companies they work for:• Keep everything up to date - phones, computers, routers, all software (apple just released an update to fix actively exploited vulnerabilities!)• Use strong, unique passwords. Change passwords when: ◦ The respective service recommends a password change, or; ◦ The password has been shared with individuals who are no longer authorized to use the password, or; ◦ The password has been used for another service.• Use encryption• Follow your company's security policies• Don't disable your operating system's malware detection (Windows Defender, XProtect)• Vet your third party libraries and dependencies, and then keep an eye on them to make informed decisions about updating• Follow the principle of least privilege - people can't be compromised for things they don't have access to• Consider non-SMS based 2FA (google authenticator, 1Password, yubikey), but any MFA is better than none ◦ Something you know (pin, password) ◦ Something you have (token, hardware key) ◦ Something you are (biometrics)• Don't store user data locally (if you need it, delete immediately after you're done with it)Things you can do today!• Audit connected oauth apps (to social media platforms, github, etc)• Delete old accounts • Check haveibeenpwned.com• Check your router for firmware updates (I did this yesterday)Developer hack examples • https://thehackernews.com/2023/03/lastpass-hack-engineers-failure-to.html • https://www.upguard.com/blog/what-caused-the-uber-data-breach • https://en.wikipedia.org/wiki/2017_Equifax_data_breach • https://www.zdnet.com/article/anatomy-of-the-target-data-breach-missed-opportunities-and-lessons-learned/ • https://www.synopsys.com/blogs/software-security/heartbleed-bug/Links From Amanda: · https://1password.com/developers · https://1password.com/developer/student · https://education.github.com/pack · https://hashnode.com/hackathons/1passwordVery special thanks to our sponsor: Women's Society of Cyberjutsu! Women's Society of Cyberjutsu are hosting CYBERJUTSU CON 4.0 and the 10th Annual Cyberjutsu Awards on June 24, 2023!!! The con Con will consist of Hands-on Workshops, Capture The Flag (CTF) Competitions, Professional Headshots, RecruitingOpportunities, Celebration, and more. Participants will walk away with hands-on knowledge that can be applied immediately on the job. You can check out the event here:
Windows Defender blocking Valid Websites like Zoom, Hackers Behind 3CX attack started a week ago, UK Authorities set up fake sites to attract criminals and warn them that what they are doing is against the law, Virtual security in Win 11 info, 7 Year old Win 10 laptop, What should my son do? VoIP bandwidth what has to happen for that to work, Where does my file go when I delete it? How do I secure my phone?
On this week's episode, Adam and Andy talk about Windows Defender Firewall. This often is overlooked, misconfigured, or part of legacy policies. With the start of a brand new year, it is a good time to take a look at your current firewall configurations and perhaps move them over to Intune as part of modern management. ------------------------------------------- Youtube Video Link: https://youtu.be/OhAdeQjjcj8 ------------------------------------------- Documentation: https://call4cloud.nl/2020/07/the-windows-firewall-rises/ https://learn.microsoft.com/en-us/mem/intune/protect/endpoint-security-firewall-rule-tool ------------------------------------------- Contact Us: Website: https://bluesecuritypod.com Twitter: https://twitter.com/bluesecuritypod Linkedin: https://www.linkedin.com/company/bluesecpod Youtube: https://www.youtube.com/c/BlueSecurityPodcast Twitch: https://www.twitch.tv/bluesecuritypod ------------------------------------------- Andy Jaw Mastodon: https://infosec.exchange/@ajawzero Twitter: https://twitter.com/ajawzero LinkedIn: https://www.linkedin.com/in/andyjaw/ Email: andy@bluesecuritypod.com ------------------------------------------- Adam Brewer Twitter: https://twitter.com/ajbrewer LinkedIn: https://www.linkedin.com/in/adamjbrewer/ Email: adam@bluesecuritypod.com --- Send in a voice message: https://anchor.fm/blue-security-podcast/message
The “Heliconia” hacking tool exploited vulnerabilities in Chrome, Windows Defender, and Firefox, according to company security researchers.
The “Heliconia” hacking tool exploited vulnerabilities in Chrome, Windows Defender, and Firefox, according to company security researchers.
Where have all the Raspberry Pis gone? The Technado team discusses the inventory issues and updates this week as well as Windows Defender coming to iOS and Android, Red Hat Enterprise Linux 8.7 launching, a Google Pixel lock screen bypass, and the LockBit ransomware arrest in Canada. Finally, they talk about how worried the US Army should be about Russian code in their iOS app.
Where have all the Raspberry Pis gone? The Technado team discusses the inventory issues and updates this week as well as Windows Defender coming to iOS and Android, Red Hat Enterprise Linux 8.7 launching, a Google Pixel lock screen bypass, and the LockBit ransomware arrest in Canada. Finally, they talk about how worried the US Army should be about Russian code in their iOS app.
Ransomware has evolved over time and has become a significant threat to organizations of all sizes, without sparing any industry, to fulfill its goal of capturing company assets and files. Whenever or wherever there is data, it will provide an opening for criminals to hold such sensitive information to ransom and then demand payment to release it. That makes it imperative for every organization to come up with a plan for preventing and responding to ransomware attacks. However, to fully understand the best way to be prepared for it, you must also know the evolution of ransomware to get the best results. The First Ransomware Attack (1989) Ransomware was first thought to have emerged with the “AIDS Trojan” attack. It was named after the WHO (World Health Organization) AIDS conference in 1989, where Joseph Popp, a biologist handed event participants 20,000 floppy disks that were infected. Once users boot up around 90 times, all the names from the user files become encrypted, and a message like the one below would appear and ask its victims to transfer $189 to Panama in the given PO Box. You could use online decryptor tools to remove the ransomware easily. The First Generation of Ransomware (2005-2009) There were no prominent developments in the ransomware field after that first event until 2005, which was the year ransomware reemerged, but this time it used a secure asymmetric encryption. These early ransomware attacks had two notable contenders, the “GPcode” and the “Archiveus” Trojan. The GPcode would attack windows operating systems with symmetric encryption in the beginning, but then after 2010, it started using RSA-1024 for encrypting documents with file extensions that were specific. The Archiveus Trojan used RSA, making it the first ransomware using it, and would encrypt all files in your folder titled “My Documents”. You could decrypt them with a password of thirty digits that the threat actor would provide after the ransom payment. Even though these encryption algorithms were effective, there was relatively simple code used in early ransomware, which meant that antivirus companies could analyze and identify them. It was in May 2006, when the password of Archiveus was cracked, as it was found to be in the virus's source code. It was the same with GPcode until it turned towards RSA, as you could recover files without needing a password, which led cyber-criminals to prefer phishing, hacking, and other threats. Cryptography Embraced Ransomware (2009-2013) The “Vundo” virus came into the limelight in 2009, which would encrypt computers and would sell decryptors. The virus would exploit browser plugin vulnerabilities written in Java, and would download itself if a user clicked on email attachments that seemed malicious. After installation, Vundo would suppress or attack antimalware programs like Malwarebytes and Windows Defender. A short time after that, in 2010, a new Trojan named “WinLock” emerged. The software was used by 10 hackers in Moscow to lock the computers of victims and display porn on it until they received $10 in rubles from the victims. The group didn't last long as they were arrested that same year in August, although they had managed to accumulate $16 million from the scheme. The software had been upgraded in 2011 and pretended to be a system of Windows Product Activation. The malware required a reinstallation of the software because of fraudulent usage and would then extort data from the victims. In 2012, the “Reveton” ransomware emerged as a scareware type displaying messages to victims and claimed that US law enforcement had detected the user watching pornography that was illegal. In some instances, it would turn on the camera of the user, implying that users had been recorded in the act, and would demand that victims pay money if they wished to avoid any prosecution. This ransomware had another variant for Mac users, which wasn't cryptographic. It consisted of nearly 150 iframes that were identical and ...
For the first time in a long time, security wasn't the main headline of the week. Instead, the crew talked about Starlink coming to a major cruise line, a new underwater datacenter launch, Windows Defender catching some false-positives, Apple overhauling their anti-malware, and Dell laptops literally falling apart. Finally, they tried to decipher how next-gen USB could get double the speed out of the same cables.
For the first time in a long time, security wasn't the main headline of the week. Instead, the crew talked about Starlink coming to a major cruise line, a new underwater datacenter launch, Windows Defender catching some false-positives, Apple overhauling their anti-malware, and Dell laptops literally falling apart. Finally, they tried to decipher how next-gen USB could get double the speed out of the same cables.
In the Security News: when hackers are not behind and outage, when hackers are behind re-routing traffic, neat pseudo-keystroke loggers, when XSS leads to code excution, TLS inside, post-quantum encryption that doesn't hold up to pre-quantum computers, Lockbit loading Cobalt Strike using Windows Defender, we love authentication bypass, and impress your co-workers with my Linux command of the week, & more! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw750
Guy will go through some of his career choices that eventually led to 25 years in a long and fun career in information and cybersecurity. Infosec has been a fascinating and challenging field which anyone can learn through training and some of the excellent YouTube videos. Segment Resources: http://handlers.sans.org/gbruneau/ https://isc.sans.edu/handler_list.html#guy-bruneau In the Security News: when hackers are not behind and outage, when hackers are behind re-routing traffic, neat pseudo-keystroke loggers, when XSS leads to code excution, TLS inside, post-quantum encryption that doesn't hold up to pre-quantum computers, Lockbit loading Cobalt Strike using Windows Defender, we love authentication bypass, and impress your co-workers with my Linux command of the week, & more! Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/psw750
Guy will go through some of his career choices that eventually led to 25 years in a long and fun career in information and cybersecurity. Infosec has been a fascinating and challenging field which anyone can learn through training and some of the excellent YouTube videos. Segment Resources: http://handlers.sans.org/gbruneau/ https://isc.sans.edu/handler_list.html#guy-bruneau In the Security News: when hackers are not behind and outage, when hackers are behind re-routing traffic, neat pseudo-keystroke loggers, when XSS leads to code excution, TLS inside, post-quantum encryption that doesn't hold up to pre-quantum computers, Lockbit loading Cobalt Strike using Windows Defender, we love authentication bypass, and impress your co-workers with my Linux command of the week, & more! Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/psw750
Windows Defender, Microsoft Viva, GitHub Copilot Windows New Windows 11 Insider Build Brings OneDrive Information Microsoft Gets Ready to Roll Out Search Highlights on Windows 11 Xiaomi Launches its First Windows on ARM 2-in-1 PC Microsoft 365 & Cloud Microsoft launches Defender for Individuals for Microsoft 365 Personal and Family subscribers Microsoft's Viva Sales: A new companion app that works with many CRM systems (not only Microsoft's) Microsoft to curtail some of its facial recognition capabilities in the name of 'Responsible AI' From Nvidia to IKEA: Here's who's joining the Metaverse Standards Forum Dev GitHub Copilot, Microsoft's AI pair-programming service, is generally available The Directions on Microsoft Briefing | Directions on Microsoft Xbox Xbox Cloud Gaming to Get Mouse and Keyboard Support on PC Microsoft Warns About Supply Shortages for Xbox Controllers Far Cry 5 is Coming Soon to Xbox Game Pass Microsoft's Xbox App on PC Adds a Performance Indicator Tips and Picks Tip of the week: Learn about the new features in Windows 11 22H2 App pick of the week: Reading apps Enterprise pick 1 of the week: Microsoft's Secured Core comes to IoT devices Enterprise pick 2 of the week: Don't be fooled: Patch Tuesday isn't going away Beer pick of the week: Torch & Crown Rainbows Everywhere Hosts: Leo Laporte, Mary Jo Foley, and Paul Thurrott Download or subscribe to this show at https://twit.tv/shows/windows-weekly Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Check out Paul's blog at thurrott.com Check out Mary Jo's blog at AllAboutMicrosoft.com The Windows Weekly theme music is courtesy of Carl Franklin. Sponsors: hackerrank.com/WW newrelic.com/windows go.acronis.com/ww
Windows Defender, Microsoft Viva, GitHub Copilot Windows New Windows 11 Insider Build Brings OneDrive Information Microsoft Gets Ready to Roll Out Search Highlights on Windows 11 Xiaomi Launches its First Windows on ARM 2-in-1 PC Microsoft 365 & Cloud Microsoft launches Defender for Individuals for Microsoft 365 Personal and Family subscribers Microsoft's Viva Sales: A new companion app that works with many CRM systems (not only Microsoft's) Microsoft to curtail some of its facial recognition capabilities in the name of 'Responsible AI' From Nvidia to IKEA: Here's who's joining the Metaverse Standards Forum Dev GitHub Copilot, Microsoft's AI pair-programming service, is generally available The Directions on Microsoft Briefing | Directions on Microsoft Xbox Xbox Cloud Gaming to Get Mouse and Keyboard Support on PC Microsoft Warns About Supply Shortages for Xbox Controllers Far Cry 5 is Coming Soon to Xbox Game Pass Microsoft's Xbox App on PC Adds a Performance Indicator Tips and Picks Tip of the week: Learn about the new features in Windows 11 22H2 App pick of the week: Reading apps Enterprise pick 1 of the week: Microsoft's Secured Core comes to IoT devices Enterprise pick 2 of the week: Don't be fooled: Patch Tuesday isn't going away Beer pick of the week: Torch & Crown Rainbows Everywhere Hosts: Leo Laporte, Mary Jo Foley, and Paul Thurrott Download or subscribe to this show at https://twit.tv/shows/windows-weekly Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Check out Paul's blog at thurrott.com Check out Mary Jo's blog at AllAboutMicrosoft.com The Windows Weekly theme music is courtesy of Carl Franklin. Sponsors: hackerrank.com/WW newrelic.com/windows go.acronis.com/ww
Windows Defender, Microsoft Viva, GitHub Copilot Windows New Windows 11 Insider Build Brings OneDrive Information Microsoft Gets Ready to Roll Out Search Highlights on Windows 11 Xiaomi Launches its First Windows on ARM 2-in-1 PC Microsoft 365 & Cloud Microsoft launches Defender for Individuals for Microsoft 365 Personal and Family subscribers Microsoft's Viva Sales: A new companion app that works with many CRM systems (not only Microsoft's) Microsoft to curtail some of its facial recognition capabilities in the name of 'Responsible AI' From Nvidia to IKEA: Here's who's joining the Metaverse Standards Forum Dev GitHub Copilot, Microsoft's AI pair-programming service, is generally available The Directions on Microsoft Briefing | Directions on Microsoft Xbox Xbox Cloud Gaming to Get Mouse and Keyboard Support on PC Microsoft Warns About Supply Shortages for Xbox Controllers Far Cry 5 is Coming Soon to Xbox Game Pass Microsoft's Xbox App on PC Adds a Performance Indicator Tips and Picks Tip of the week: Learn about the new features in Windows 11 22H2 App pick of the week: Reading apps Enterprise pick 1 of the week: Microsoft's Secured Core comes to IoT devices Enterprise pick 2 of the week: Don't be fooled: Patch Tuesday isn't going away Beer pick of the week: Torch & Crown Rainbows Everywhere Hosts: Leo Laporte, Mary Jo Foley, and Paul Thurrott Download or subscribe to this show at https://twit.tv/shows/windows-weekly Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Check out Paul's blog at thurrott.com Check out Mary Jo's blog at AllAboutMicrosoft.com The Windows Weekly theme music is courtesy of Carl Franklin. Sponsors: hackerrank.com/WW newrelic.com/windows go.acronis.com/ww
Windows Defender, Microsoft Viva, GitHub Copilot Windows New Windows 11 Insider Build Brings OneDrive Information Microsoft Gets Ready to Roll Out Search Highlights on Windows 11 Xiaomi Launches its First Windows on ARM 2-in-1 PC Microsoft 365 & Cloud Microsoft launches Defender for Individuals for Microsoft 365 Personal and Family subscribers Microsoft's Viva Sales: A new companion app that works with many CRM systems (not only Microsoft's) Microsoft to curtail some of its facial recognition capabilities in the name of 'Responsible AI' From Nvidia to IKEA: Here's who's joining the Metaverse Standards Forum Dev GitHub Copilot, Microsoft's AI pair-programming service, is generally available The Directions on Microsoft Briefing | Directions on Microsoft Xbox Xbox Cloud Gaming to Get Mouse and Keyboard Support on PC Microsoft Warns About Supply Shortages for Xbox Controllers Far Cry 5 is Coming Soon to Xbox Game Pass Microsoft's Xbox App on PC Adds a Performance Indicator Tips and Picks Tip of the week: Learn about the new features in Windows 11 22H2 App pick of the week: Reading apps Enterprise pick 1 of the week: Microsoft's Secured Core comes to IoT devices Enterprise pick 2 of the week: Don't be fooled: Patch Tuesday isn't going away Beer pick of the week: Torch & Crown Rainbows Everywhere Hosts: Leo Laporte, Mary Jo Foley, and Paul Thurrott Download or subscribe to this show at https://twit.tv/shows/windows-weekly Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Check out Paul's blog at thurrott.com Check out Mary Jo's blog at AllAboutMicrosoft.com The Windows Weekly theme music is courtesy of Carl Franklin. Sponsors: hackerrank.com/WW newrelic.com/windows go.acronis.com/ww
Windows Defender, Microsoft Viva, GitHub Copilot Windows New Windows 11 Insider Build Brings OneDrive Information Microsoft Gets Ready to Roll Out Search Highlights on Windows 11 Xiaomi Launches its First Windows on ARM 2-in-1 PC Microsoft 365 & Cloud Microsoft launches Defender for Individuals for Microsoft 365 Personal and Family subscribers Microsoft's Viva Sales: A new companion app that works with many CRM systems (not only Microsoft's) Microsoft to curtail some of its facial recognition capabilities in the name of 'Responsible AI' From Nvidia to IKEA: Here's who's joining the Metaverse Standards Forum Dev GitHub Copilot, Microsoft's AI pair-programming service, is generally available The Directions on Microsoft Briefing | Directions on Microsoft Xbox Xbox Cloud Gaming to Get Mouse and Keyboard Support on PC Microsoft Warns About Supply Shortages for Xbox Controllers Far Cry 5 is Coming Soon to Xbox Game Pass Microsoft's Xbox App on PC Adds a Performance Indicator Tips and Picks Tip of the week: Learn about the new features in Windows 11 22H2 App pick of the week: Reading apps Enterprise pick 1 of the week: Microsoft's Secured Core comes to IoT devices Enterprise pick 2 of the week: Don't be fooled: Patch Tuesday isn't going away Beer pick of the week: Torch & Crown Rainbows Everywhere Hosts: Leo Laporte, Mary Jo Foley, and Paul Thurrott Download or subscribe to this show at https://twit.tv/shows/windows-weekly Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Check out Paul's blog at thurrott.com Check out Mary Jo's blog at AllAboutMicrosoft.com The Windows Weekly theme music is courtesy of Carl Franklin. Sponsors: hackerrank.com/WW newrelic.com/windows go.acronis.com/ww
This week, Adam and Andy talk about Windows Defender Exploit Guard. This is a set of protections built into Windows Server and 10/11 operating systems that provide additional device hardening rules. This conversation was spawned by the current Follina vulnerability (CVE-2022-30190) where an Attack Surface Reduction (ASR) rule can prevent the attack from happening. ASR rules are part of Window Defender Exploit Guard. Dive in to learn all about it! ------------------------------------------- Youtube Video Link: https://youtu.be/ldFWF9GuMZY ------------------------------------------- Documentation: https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/ https://www.bleepingcomputer.com/news/security/windows-msdt-zero-day-vulnerability-gets-free-unofficial-patch/ https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference?view=o365-worldwide https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/controlled-folders?view=o365-worldwide https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/exploit-protection?view=o365-worldwide https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/network-protection?view=o365-worldwide ------------------------------------------- Contact Us: Website: http://bluesecuritypod.com Twitter: https://twitter.com/bluesecuritypod Linkedin: https://www.linkedin.com/company/bluesecpod Youtube: https://www.youtube.com/c/BlueSecurityPodcast Instagram: https://www.instagram.com/bluesecuritypodcast/ Facebook: https://www.facebook.com/bluesecpod Twitch: https://www.twitch.tv/bluesecuritypod ------------------------------------------- Andy Jaw Twitter: https://twitter.com/ajawzero LinkedIn: https://www.linkedin.com/in/andyjaw/ Email: andy@bluesecuritypod.com ------------------------------------------- Adam Brewer Twitter: https://twitter.com/ajbrewer LinkedIn: https://www.linkedin.com/in/adamjbrewer/ Email: adam@bluesecuritypod.com --- Send in a voice message: https://anchor.fm/blue-security-podcast/message
Electric grid using Open Source software that was just hacked, US Govt grants $12M to develop cyberattack defense tools, Windows Defender sees Google updates as malicious, Latest Win 10 Updates prevents freezing, After Win 10 Update user can no longer write to Ext HD, I have Vista is it safe to use? NO!, No Audio after Win 10 Updates.
Windows 11 default browser, Microsoft Build 2022, Microsoft bribes Windows 11 Usage Stagnates in Latest AdDuplex Report Microsoft Graveyard - Killed by Microsoft Windows 11 to get soon a one-click default browser option Microsoft is adding a new driver-blocklist feature to Windows Defender on Windows 10 and 11 Microsoft Build 2022 developer conference: Coming May 24 to a screen near you Business Microsoft Accused of Violating the Foreign Corrupt Practices Act Again EU Aims to Open Up Big Tech's Walled Gardens with Digital Markets Act Xbox Microsoft Announces New Games with Gold for April Sony Revamps PlayStation Plus to Better Compete With Xbox Game Pass Microsoft Now Offers Refurbished Xbox Series X Consoles Online Microsoft's Cloud Gaming Division Aims to Bring Cloud-Native Games to Xbox Microsoft Flight Simulator World Update VIII Focuses on the Iberian Peninsula Halo TV Series Comes to Xbox Game Pass Ultimate With Free Paramount+ Trial Tips and Picks Tip of the week: Get a month of Paramount+ for free App pick of the week: OBS Studio Enterprise pick of the week: Azure Front Door revisited Enterprise pick No. 2 of the week: Get ahead of Microsoft product deprecations Beer pick of the week: Grimm Plink Hosts: Leo Laporte, Mary Jo Foley, and Paul Thurrott Download or subscribe to this show at https://twit.tv/shows/windows-weekly Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Check out Paul's blog at thurrott.com Check out Mary Jo's blog at AllAboutMicrosoft.com The Windows Weekly theme music is courtesy of Carl Franklin.
Windows 11 default browser, Microsoft Build 2022, Microsoft bribes Windows 11 Usage Stagnates in Latest AdDuplex Report Microsoft Graveyard - Killed by Microsoft Windows 11 to get soon a one-click default browser option Microsoft is adding a new driver-blocklist feature to Windows Defender on Windows 10 and 11 Microsoft Build 2022 developer conference: Coming May 24 to a screen near you Business Microsoft Accused of Violating the Foreign Corrupt Practices Act Again EU Aims to Open Up Big Tech's Walled Gardens with Digital Markets Act Xbox Microsoft Announces New Games with Gold for April Sony Revamps PlayStation Plus to Better Compete With Xbox Game Pass Microsoft Now Offers Refurbished Xbox Series X Consoles Online Microsoft's Cloud Gaming Division Aims to Bring Cloud-Native Games to Xbox Microsoft Flight Simulator World Update VIII Focuses on the Iberian Peninsula Halo TV Series Comes to Xbox Game Pass Ultimate With Free Paramount+ Trial Tips and Picks Tip of the week: Get a month of Paramount+ for free App pick of the week: OBS Studio Enterprise pick of the week: Azure Front Door revisited Enterprise pick No. 2 of the week: Get ahead of Microsoft product deprecations Beer pick of the week: Grimm Plink Hosts: Leo Laporte, Mary Jo Foley, and Paul Thurrott Download or subscribe to this show at https://twit.tv/shows/windows-weekly Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Check out Paul's blog at thurrott.com Check out Mary Jo's blog at AllAboutMicrosoft.com The Windows Weekly theme music is courtesy of Carl Franklin.
Windows 11 default browser, Microsoft Build 2022, Microsoft bribes Windows 11 Usage Stagnates in Latest AdDuplex Report Microsoft Graveyard - Killed by Microsoft Windows 11 to get soon a one-click default browser option Microsoft is adding a new driver-blocklist feature to Windows Defender on Windows 10 and 11 Microsoft Build 2022 developer conference: Coming May 24 to a screen near you Business Microsoft Accused of Violating the Foreign Corrupt Practices Act Again EU Aims to Open Up Big Tech's Walled Gardens with Digital Markets Act Xbox Microsoft Announces New Games with Gold for April Sony Revamps PlayStation Plus to Better Compete With Xbox Game Pass Microsoft Now Offers Refurbished Xbox Series X Consoles Online Microsoft's Cloud Gaming Division Aims to Bring Cloud-Native Games to Xbox Microsoft Flight Simulator World Update VIII Focuses on the Iberian Peninsula Halo TV Series Comes to Xbox Game Pass Ultimate With Free Paramount+ Trial Tips and Picks Tip of the week: Get a month of Paramount+ for free App pick of the week: OBS Studio Enterprise pick of the week: Azure Front Door revisited Enterprise pick No. 2 of the week: Get ahead of Microsoft product deprecations Beer pick of the week: Grimm Plink Hosts: Leo Laporte, Mary Jo Foley, and Paul Thurrott Download or subscribe to this show at https://twit.tv/shows/windows-weekly Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Check out Paul's blog at thurrott.com Check out Mary Jo's blog at AllAboutMicrosoft.com The Windows Weekly theme music is courtesy of Carl Franklin.
Windows 11 default browser, Microsoft Build 2022, Microsoft bribes Windows 11 Usage Stagnates in Latest AdDuplex Report Microsoft Graveyard - Killed by Microsoft Windows 11 to get soon a one-click default browser option Microsoft is adding a new driver-blocklist feature to Windows Defender on Windows 10 and 11 Microsoft Build 2022 developer conference: Coming May 24 to a screen near you Business Microsoft Accused of Violating the Foreign Corrupt Practices Act Again EU Aims to Open Up Big Tech's Walled Gardens with Digital Markets Act Xbox Microsoft Announces New Games with Gold for April Sony Revamps PlayStation Plus to Better Compete With Xbox Game Pass Microsoft Now Offers Refurbished Xbox Series X Consoles Online Microsoft's Cloud Gaming Division Aims to Bring Cloud-Native Games to Xbox Microsoft Flight Simulator World Update VIII Focuses on the Iberian Peninsula Halo TV Series Comes to Xbox Game Pass Ultimate With Free Paramount+ Trial Tips and Picks Tip of the week: Get a month of Paramount+ for free App pick of the week: OBS Studio Enterprise pick of the week: Azure Front Door revisited Enterprise pick No. 2 of the week: Get ahead of Microsoft product deprecations Beer pick of the week: Grimm Plink Hosts: Leo Laporte, Mary Jo Foley, and Paul Thurrott Download or subscribe to this show at https://twit.tv/shows/windows-weekly Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Check out Paul's blog at thurrott.com Check out Mary Jo's blog at AllAboutMicrosoft.com The Windows Weekly theme music is courtesy of Carl Franklin.
Windows 11 default browser, Microsoft Build 2022, Microsoft bribes Windows 11 Usage Stagnates in Latest AdDuplex Report Microsoft Graveyard - Killed by Microsoft Windows 11 to get soon a one-click default browser option Microsoft is adding a new driver-blocklist feature to Windows Defender on Windows 10 and 11 Microsoft Build 2022 developer conference: Coming May 24 to a screen near you Business Microsoft Accused of Violating the Foreign Corrupt Practices Act Again EU Aims to Open Up Big Tech's Walled Gardens with Digital Markets Act Xbox Microsoft Announces New Games with Gold for April Sony Revamps PlayStation Plus to Better Compete With Xbox Game Pass Microsoft Now Offers Refurbished Xbox Series X Consoles Online Microsoft's Cloud Gaming Division Aims to Bring Cloud-Native Games to Xbox Microsoft Flight Simulator World Update VIII Focuses on the Iberian Peninsula Halo TV Series Comes to Xbox Game Pass Ultimate With Free Paramount+ Trial Tips and Picks Tip of the week: Get a month of Paramount+ for free App pick of the week: OBS Studio Enterprise pick of the week: Azure Front Door revisited Enterprise pick No. 2 of the week: Get ahead of Microsoft product deprecations Beer pick of the week: Grimm Plink Hosts: Leo Laporte, Mary Jo Foley, and Paul Thurrott Download or subscribe to this show at https://twit.tv/shows/windows-weekly Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Check out Paul's blog at thurrott.com Check out Mary Jo's blog at AllAboutMicrosoft.com The Windows Weekly theme music is courtesy of Carl Franklin.
Windows Defender tagging Microsoft Office updates as Malware, Germans telling their people to remove Kaspersky AV from their computers, NPM Developer adds a malicious code to cause problems with users in Russia, Justice Dept Police AI program not beng monitored for results or efficacy, Having issues with Public WiFi, Mouse not working when on mouse pad, My smart switch is following me, Why is my phone minimizing my apps on me? Thunderbird e-mail issue is it me or the mail service?
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Data Incident 2020 - Indicators of Compromise https://www.sans.org/blog/sans-data-incident-2020-indicators-of-compromise/ Large File Used to Obfuscate Malware https://isc.sans.edu/forums/diary/Definition+of+overkill+using+130+MB+executable+to+hide+24+kB+malware/26464/ Mac Malware Spreading via XCode https://documents.trendmicro.com/assets/pdf/XCSSET_Technical_Brief.pdf Citrix Broker Service Detected as Trojan by Windows Defender https://support.citrix.com/article/CTX279897