Trending Misterio
iVoox
Descargar app Subir
iVoox Podcast & radio
Descargar app gratis
Overkill Security
Overkill Security
Podcast

Overkill Security 6j3731

71
0

Because Nothing Says 'Security' Like a Dozen Firewalls and a Biometric Scannerhttps://t.me/+li0tDAgOYDNkZTBhhttps://boosty.to/overkill_security 6n303o

Because Nothing Says 'Security' Like a Dozen Firewalls and a Biometric Scannerhttps://t.me/+li0tDAgOYDNkZTBhhttps://boosty.to/overkill_security

71
0
Benefits and Drawbacks of NSA’s Advisory. The Double-Edged Sword
Benefits and Drawbacks of NSA’s Advisory. The Double-Edged Sword
This part discusses the benefits and potential drawbacks of advisories issued by agencies like CISA and NSA, highlighting the importance of balancing security measures with operational needs.
Internet y tecnología 8 meses
0
0
0
02:31
Mitigations to Strengthen Defense. The Cybersecurity Workout Plan
Mitigations to Strengthen Defense. The Cybersecurity Workout Plan
This part outlines various mitigations and best practices recommended by CISA to strengthen cloud security, including the use of multi-factor authentication and continuous monitoring.
Internet y tecnología 8 meses
0
0
0
04:08
Defense through Cybersecurity Fundamentals. The Basics Never Looked So Good
Defense through Cybersecurity Fundamentals. The Basics Never Looked So Good
This part emphasizes the importance of basic cybersecurity practices, such as regular audits, secure management, and timely patching, in defending against cloud attacks.
Internet y tecnología 9 meses
0
0
0
04:09
Sophistication of Cyber Actors. The James Bonds of the Digital Realm
Sophistication of Cyber Actors. The James Bonds of the Digital Realm
This part examines the sophistication and adaptability of cyber actors in their efforts to compromise cloud infrastructure.
Internet y tecnología 9 meses
0
0
0
03:05
Use of Service and Dormant s. Sleeping Giants
Use of Service and Dormant s. Sleeping Giants
This part explores the use of service and dormant s by cyber actors to gain access to cloud environments, highlighting the risks associated with these types of s.
Internet y tecnología 9 meses
0
0
0
03:14
Expansion of Targeting. The More, the Merrier
Expansion of Targeting. The More, the Merrier
This part discusses how cyber actors are expanding their targeting to include a broader range of cloud services and s, including service and dormant s.
Internet y tecnología 9 meses
0
0
0
03:28
Increased Importance of Initial Access. First Impressions Matter
Increased Importance of Initial Access. First Impressions Matter
This part emphasizes the critical role of initial access in cloud security, highlighting how cyber actors focus on gaining this initial foothold to launch further attacks.
Internet y tecnología 9 meses
0
0
0
03:27
Authentication as a Key Step. We Don't Need No Stinkin' s
Authentication as a Key Step. We Don't Need No Stinkin' s
This part explains how cyber actors use stolen access tokens and other authentication methods to by traditional -based security measures in cloud environments.
Internet y tecnología 9 meses
0
0
0
03:46
TTPs Details. The Cyber Magician's Handbook
TTPs Details. The Cyber Magician's Handbook
This part provides a detailed look at the tactics, techniques, and procedures (TTPs) used by cyber actors to gain initial access to cloud environments, including brute forcing, spraying, and token authentication.
Internet y tecnología 9 meses
0
0
0
08:59
Adaptation to Cloud Services. Chameleons of the Cyber World
Adaptation to Cloud Services. Chameleons of the Cyber World
This part details how cyber actors are adapting their tactics to exploit cloud services, blending in with legitimate traffic to evade detection.
Internet y tecnología 9 meses
0
0
0
02:57
Key Findings. The Art of Cloud Sneakery
Key Findings. The Art of Cloud Sneakery
This part presents key findings from recent advisories on how cyber actors are adapting their tactics to target cloud infrastructure, focusing on the stealthy methods they employ.
Internet y tecnología 9 meses
0
0
0
01:31
Cloud Tactics. Welcome to the Cloud Circus
Cloud Tactics. Welcome to the Cloud Circus
This part explores the evolving tactics and techniques used by cyber actors to gain initial access to cloud environments, emphasizing the dynamic nature of cloud security threats.
Internet y tecnología 9 meses
0
0
0
01:18
[Trailer] Cloud Attacks. The Comedy of Cloud Errors
[Trailer] Cloud Attacks. The Comedy of Cloud Errors
This part discusses the various methods cyber actors use to attack cloud services, highlighting the vulnerabilities and mistakes that can lead to successful breaches.
Internet y tecnología 9 meses
0
0
0
00:50
EdgeRouter on the Edge. When Default Settings Become Default Targets
EdgeRouter on the Edge. When Default Settings Become Default Targets
Discusses the risks associated with leaving default settings unchanged on Ubiquiti EdgeRouters, which can be easily exploited by attackers.
Internet y tecnología 9 meses
0
0
0
19:03
MITRE ATT&CK. Ubiquiti's Unofficial  Guide
MITRE ATT&CK. Ubiquiti's Unofficial Guide
Suggests that the tactics and techniques outlined in the MITRE ATT&CK framework are frequently applicable to Ubiquiti routers, indicating common vulnerabilities and attack vectors.
Internet y tecnología 9 meses
0
0
0
01:57
MASEPIE Malware. Because One Malware Isn't Enough
MASEPIE Malware. Because One Malware Isn't Enough
Highlights the presence of multiple malware threats targeting Ubiquiti routers, such as MASEPIE, underscoring the need for comprehensive security solutions.
Internet y tecnología 9 meses
0
0
0
02:22
Proxy and Tunnel. Ubiquiti's Unofficial Features
Proxy and Tunnel. Ubiquiti's Unofficial Features
Points to the unintended use of Ubiquiti routers for proxying and tunneling, which can be exploited by attackers to mask their activities.
Internet y tecnología 9 meses
0
0
0
01:43
CVE-2023-23397. The Exploit That Keeps on Exploiting
CVE-2023-23397. The Exploit That Keeps on Exploiting
Refers to a specific vulnerability (CVE-2023-23397) affecting Ubiquiti routers, which attackers can repeatedly exploit if not properly mitigated.
Internet y tecnología 9 meses
0
0
0
02:04
Making Credential Theft Easier Since... Always
Making Credential Theft Easier Since... Always
Suggests that Ubiquiti routers may have weaknesses that make it easier for attackers to steal credentials, highlighting the need for improved security measures.
Internet y tecnología 9 meses
0
0
0
01:59
Moobot Trojan. When Your Router Becomes a Botnet's Best Friend
Moobot Trojan. When Your Router Becomes a Botnet's Best Friend
Describes how Ubiquiti routers can be compromised by malware like the Moobot Trojan, which can turn them into part of a botnet, facilitating further malicious activities.
Internet y tecnología 9 meses
0
0
0
01:42
También te puede gustar Ver más
monos estocásticos
monos estocásticos monos estocásticos es un podcast sobre inteligencia artificial presentado por Antonio Ortiz (@antonello) y Matías S. Zavia (@matiass).  Sacamos un episodio nuevo cada jueves. Puedes seguirnos en YouTube, LinkedIn y X. Más enlaces en cuonda.com/monos-estocasticos/links Hacemos todo lo que los monos estocásticos saben hacer: coser secuencias de formas lingüísticas que hemos observado en nuestros vastos datos de entrenamiento según la información probabilística de cómo se combinan. Actualizado
Somos Eléctricos
Somos Eléctricos Podcast diario dedicado a difundir y a dar a conocer el mundo de los vehículos eléctricos. En estos podcasts te hablamos de las últimas novedades del sector además de compartir, debatir y opinar sobre distintos temas referentes a los coches eléctricos, energía sostenible y tecnología aplicada a los vehículos. Finalmente también usamos esta plataforma de podcast para resolver dudas o dar respuesta a las preguntas de nuestros oyentes. Actualizado
Red de Sospechosos Habituales
Red de Sospechosos Habituales Todos los capítulos de los podcasts asociados a la red Sospechosos Habituales unidos en este único feed Actualizado
Ir a Internet y tecnología