Page de couverture de Decoded: The Cybersecurity Podcast

Decoded: The Cybersecurity Podcast

Decoded: The Cybersecurity Podcast

Auteur(s): Edward Henriquez
Écouter gratuitement

À propos de cet audio

This cybersecurity study guide presents a comprehensive overview of key cybersecurity concepts through short answer questions and essay prompts. Topics covered include data security measures like encryption and message digests, authentication methods and their vulnerabilities, disaster recovery and business continuity planning, risk management strategies, and malware types.Edward Henriquez
Épisodes
  • Remote Access Trojans: History, Dangers, and Defenses
    Jun 19 2025

    These sources comprehensively examine Remote Access Trojans (RATs), defining them as malware granting attackers extensive control over compromised systems, often disguised as legitimate software. They trace the evolution of RATs from early remote administration tools like Carbon Copy to modern, financially motivated variants such as Dridex and Emotet, highlighting their increased sophistication and cross-platform capabilities. The texts also distinguish between Indicators of Compromise (IOCs), Behavior (IOBs), and Attack (IOAs), explaining how these are used to detect and prevent RAT infections. Furthermore, the sources provide practical prevention strategies like using anti-malware, implementing least privilege, and adopting zero-trust security models, while also discussing the legality of creating RATs for educational or research purposes, emphasizing that malicious use is the unlawful act.


    Voir plus Voir moins
    19 min
  • Cybersecurity: Attacks, Strategies, and Tools
    Jun 16 2025

    This compilation of cybersecurity news highlights recent data breaches, such as the leak of 7.4 million Paraguayan citizen records, and vulnerabilities in widely used software, including privilege escalation flaws in Palo Alto Networks products and Discord invite link hijacking. It also discusses strategic approaches to cybersecurity, like building multi-cloud secrets management platforms and the often-overlooked importance of maintenance in detection engineering. Furthermore, the sources introduce new open-source tools designed for static code analysis and cloud privilege escalation, alongside miscellaneous security news, covering topics from evolving ransomware tactics to enhanced passkey management on Apple OSes and privacy concerns with menstrual tracking apps.


    Voir plus Voir moins
    21 min
  • The Isolated Browser: Web Threat Protection
    Jun 12 2025

    These sources primarily discuss Remote Browser Isolation (RBI), a cybersecurity technology designed to protect users from web-based threats by executing browsing activity in an isolated, remote environment. Several articles explain how RBI works, detailing the process of streaming visual output to the user's device while containing potential threats on a server. The texts highlight the benefits of RBI, such as protection against malware, phishing, and zero-day exploits, and its relevance across various industries like finance and healthcare. Challenges like latency and compatibility issues are also acknowledged. One source also features a Reddit discussion where users troubleshoot Microsoft Intune policies related to web threat protection, reflecting real-world implementation challenges in enterprise security management.


    Voir plus Voir moins
    27 min

Ce que les auditeurs disent de Decoded: The Cybersecurity Podcast

Moyenne des évaluations de clients

Évaluations – Cliquez sur les onglets pour changer la source des évaluations.