Épisodes

  • Remote Access Trojans: History, Dangers, and Defenses
    Jun 19 2025

    These sources comprehensively examine Remote Access Trojans (RATs), defining them as malware granting attackers extensive control over compromised systems, often disguised as legitimate software. They trace the evolution of RATs from early remote administration tools like Carbon Copy to modern, financially motivated variants such as Dridex and Emotet, highlighting their increased sophistication and cross-platform capabilities. The texts also distinguish between Indicators of Compromise (IOCs), Behavior (IOBs), and Attack (IOAs), explaining how these are used to detect and prevent RAT infections. Furthermore, the sources provide practical prevention strategies like using anti-malware, implementing least privilege, and adopting zero-trust security models, while also discussing the legality of creating RATs for educational or research purposes, emphasizing that malicious use is the unlawful act.


    Voir plus Voir moins
    19 min
  • Cybersecurity: Attacks, Strategies, and Tools
    Jun 16 2025

    This compilation of cybersecurity news highlights recent data breaches, such as the leak of 7.4 million Paraguayan citizen records, and vulnerabilities in widely used software, including privilege escalation flaws in Palo Alto Networks products and Discord invite link hijacking. It also discusses strategic approaches to cybersecurity, like building multi-cloud secrets management platforms and the often-overlooked importance of maintenance in detection engineering. Furthermore, the sources introduce new open-source tools designed for static code analysis and cloud privilege escalation, alongside miscellaneous security news, covering topics from evolving ransomware tactics to enhanced passkey management on Apple OSes and privacy concerns with menstrual tracking apps.


    Voir plus Voir moins
    21 min
  • The Isolated Browser: Web Threat Protection
    Jun 12 2025

    These sources primarily discuss Remote Browser Isolation (RBI), a cybersecurity technology designed to protect users from web-based threats by executing browsing activity in an isolated, remote environment. Several articles explain how RBI works, detailing the process of streaming visual output to the user's device while containing potential threats on a server. The texts highlight the benefits of RBI, such as protection against malware, phishing, and zero-day exploits, and its relevance across various industries like finance and healthcare. Challenges like latency and compatibility issues are also acknowledged. One source also features a Reddit discussion where users troubleshoot Microsoft Intune policies related to web threat protection, reflecting real-world implementation challenges in enterprise security management.


    Voir plus Voir moins
    27 min
  • The AI Job Seeker Deluge: Risks and Solutions
    Jun 12 2025

    These sources collectively highlight the increasing threat of AI-generated fake job applicants and the strategies organizations are adopting to combat this issue. Several articles discuss how generative AI enables fraudsters to create convincing fake resumes, profiles, and even conduct deepfake interviews, leading to significant risks like data theft and financial losses. Some sources emphasize the importance of collaboration between HR and IT departments and the implementation of robust vetting processes, including thorough background checks and the use of AI-powered document fraud detection tools. Additionally, one source explores the legal implications of using AI in hiring, particularly concerning potential biases and discrimination, while another illustrates the ongoing "arms race" between companies using AI for filtering and candidates using AI for mass applications, showcasing a growing tension in the digital recruitment landscape.

    Voir plus Voir moins
    17 min
  • AI Advancements: From Robotics to Longevity
    Jun 6 2025

    A comprehensive look into various advancements across the technology sector, highlighting the growing integration of AI in diverse applications. It covers innovations in robotics, such as Amazon's development of a "humanoid park" for testing delivery robots, and AI's role in search engines, exemplified by Google's "Search Live" feature for real-time conversations. Furthermore, the source touches upon futuristic technologies in healthcare, like DNA testing for embryo selection, and the expansion of drone delivery services by companies such as Walmart and Wing. Finally, it addresses the impact of AI in creative industries, with AMC Networks leveraging AI for marketing and pre-visualization, and showcases new developments in software and data management, including an iOS Screen Time API and an upgraded Gemini 2.5 Pro preview.


    Voir plus Voir moins
    12 min
  • Snowflake Cortex and AI Applications
    May 27 2025

    Snowflake's integration of AI and Machine Learning capabilities, highlighting how these advancements aim to simplify data analysis and potentially increase platform usage. They introduce Snowflake Cortex, a feature that allows users to leverage large language models within the platform for tasks like text generation, sentiment analysis, and extracting information using SQL commands. Additionally, one source details Snowflake Copilot, an AI-powered assistant for SQL querying designed to make interacting with data easier for both technical and non-technical users by understanding natural language and providing suggestions and error explanations. While the potential benefits for Snowflake are debated, with some emphasizing increased consumption and others focusing on the need for AI to provide clear value, the provided resources underscore Snowflake's commitment to enhancing its platform with AI features for various data-related tasks.


    Voir plus Voir moins
    11 min
  • AI and Tech Trends
    May 27 2025

    Detailed Timeline

    July 2023: The SEC's cybersecurity incident disclosure requirements rule is implemented.

    Sometime before May 2025: Google Quantum AI researchers achieve algorithmic improvements that reduce the estimated qubits needed to crack RSA-2048 with a quantum computer.

    Sometime before May 27, 2025: Suspected InfoStealer malware data breach exposes over 184 million logins and passwords. Security researcher Jeremiah Fowler discovers the exposed database.

    Sometime before May 27, 2025: Jeremiah Fowler contacts the hosting provider regarding the exposed database.

    Sometime before May 27, 2025: The exposed database discovered by Jeremiah Fowler is removed.

    Sometime before May 27, 2025: Socket's threat research team discovers 60 malicious packages on NPM that collect host and network data.

    Sometime before May 27, 2025: Socket reports the malicious NPM packages for removal.

    Sometime before May 27, 2025: Researchers drop a Proof-of-Concept (PoC) for the Fortinet vulnerability CVE-2025-32756.

    Sometime before May 27, 2025: The Open MPIC project, an open-source tool to defend against BGP attacks on certificate validation, is developed and released.

    Sometime before May 27, 2025: Micah Lee develops and shares the TeleMessage Explorer, a new open-source research tool for journalists.

    Sometime before May 27, 2025: The Vibe coding company reports that using Claude 4 reduced syntax errors by 25% and sped up coding by 40%.

    Sometime before May 27, 2025: YouTube announces that its Content ID system has paid out $12 billion to rightsholders.

    Sometime in 2024: Over 90% of copyright claims on YouTube are monetized rather than removed.

    Sometime before May 27, 2025: Cybercriminals create deceptive AI-generated TikTok videos that spread Vidar and StealC malware.

    May 27, 2025: The TLDR Information Security newsletter is published, summarizing the events and discoveries mentioned in the source.

    By 2029 (Predicted): Experts predict that quantum computers will be able to break asymmetric cryptography.

    Ongoing: ThreatLocker offers the "100 Days to Secure Your Environment" tactical series.

    Ongoing: American banking groups, led by the ABA, advocate for the SEC to rescind cybersecurity incident disclosure requirements.

    Cast of Characters

    Jeremiah Fowler: A security researcher who discovered a publicly exposed, unencrypted, and password-less database containing over 184 million logins and passwords.

    Socket's threat research team: A team of researchers who discovered 60 malicious packages on NPM designed to collect sensitive host and network data.

    Researchers (Fortinet PoC): Unspecified researchers who developed and released a Proof-of-Concept (PoC) for the Fortinet vulnerability CVE-2025-32756.

    Micah Lee: A journalist who developed and shared the open-source tool TeleMessage Explorer to help journalists analyze leaked TeleMessage data.

    Prasanna Gautam, Eric Fernandez, & Sammy Tbeile: Individuals associated with the TLDR Information Security newsletter, likely contributing to its creation and distribution.

    ThreatLocker: A company offering a security series called "100 Days to Secure Your Environment."

    American banking groups (led by the ABA): Organizations advocating for the SEC to remove cybersecurity incident disclosure requirements.

    Google Quantum AI: A research group within Google that conducted research showing algorithmic improvements for cracking RSA-2048 with a quantum computer.

    Vibe coding company: A company that utilizes the Claude 4 AI in their coding tools and reported positive results.

    YouTube: A video sharing platform that uses the Content ID system for copyright management and revenue sharing.

    Cybercriminals (TikTok malware): Individuals or groups creating deceptive AI-generated TikTok videos to spread malware like Vidar and StealC.

    Voir plus Voir moins
    11 min
  • Tech, AI, and Robotics Advancements
    May 22 2025

    This compilation of articles from TLDR covers recent developments in the technology sector, featuring updates on major tech companies and innovative startups. Notable news includes OpenAI's acquisition of Jony Ive's company, io, and how his design expertise might impact OpenAI's future in consumer hardware. The articles also highlight advancements in robotics, with a focus on Tesla's Optimus project and the growth of a Colombian robotics firm, alongside insights into computational theory regarding the relationship between time and memory. Additional topics touch on software development practices, including mainframe modernization and monorepo management, and provide various quick links covering news on self-driving technology, smart glasses, digital advertising, and global tech trends.


    Become a Patron:

    https://www.patreon.com/DecodedPodcast


    Other ways to contribute:

    https://buymeacoffee.com/decodedcybersecurity


    On Instagram:

    Follow @decodedthecybersecuritypodcast to level up your cybersecurity skills

    Voir plus Voir moins
    9 min