Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
| Episode | Date |
|---|---|
|
260 - From NTLM to Kerberos - Microsoft's Security Transformation Begins - Part 2
|
Jan 24, 2026 |
|
259 - From NTLM to Kerberos - Microsoft's Security Transformation Begins - Part 1
|
Jan 17, 2026 |
|
258 - React2Shell Mass Exploit and Instagram 17 million breach
|
Jan 10, 2026 |
|
257 - Jaguar Land Rover Cyberattack-How the Breach Disrupted Production and Exposed Sensitive Data
|
Jan 03, 2026 |
|
256 - The best of 2025
|
Dec 27, 2025 |
|
255 - Shadow AI-The Invisible Security Risk Already Inside Your Organization
|
Dec 20, 2025 |
|
254 - Infostealers-The Silent Malware Stealing Everything
|
Dec 13, 2025 |
|
253 - Shadow IT and SaaS Sprawl - The Hidden Security Risk in Your Organization
|
Dec 06, 2025 |
|
252 - Windows password security - What is under the hood?
|
Nov 29, 2025 |
|
251 - The Future of Security Operations- Are SIEM, XDR, and SOAR Converging or Moving Apart?
|
Nov 22, 2025 |
|
250 - PenTesting vs Red Teaming vs Vulnerability Assessment-Which One Do You Need?
|
Nov 15, 2025 |
|
249 - What Is Credential Stuffing? How Hackers Use Your Old Passwords Against You
|
Nov 08, 2025 |
|
248 - The Truth About Security Awareness Training- Why 95% of Programs Don't Work
|
Nov 01, 2025 |
|
247 - AI-Powered Browsers-The Privacy and Security Risks No One Talks About
|
Oct 25, 2025 |
|
246 - Is AI-Generated Code Safe-The Hidden Dangers of Vibe Coding
|
Oct 18, 2025 |
|
245 - 50 Documents Can Poison AI Models - CISA KEV Adds 12 Decade-Old Vulnerabilities and Salesforce Ransomware
|
Oct 11, 2025 |
|
244 - The Recent Cyberattacks on European Airports - A Wake-Up Call for Critical Infrastructure
|
Oct 04, 2025 |
|
243 - Are Web Application Firewalls (WAFs) Obsolete in 2025? Pros, Cons, and Future of Application Security - Part 2
|
Sep 27, 2025 |
|
242 - Are Web Application Firewalls (WAFs) Obsolete in 2025? Pros, Cons, and Future of Application Security - Part 1
|
Sep 20, 2025 |
|
241 - AI vs. Cybersecurity-How LLMs Are Reshaping the Defender-Attacker Battle
|
Sep 13, 2025 |
|
240 - The Great OAuth Heist: How Salesloft's Breach Exposed Major Cybersecurity Firms
|
Sep 06, 2025 |
|
239 - Volt Typhoon Report-How Critical Infrastructure Was Targeted and Compromised
|
Aug 30, 2025 |
|
238 - Patchwork and Transparency -Microsoft’s August Security Updates & Google's Project Zero Redefined
|
Aug 23, 2025 |
|
237 - Generative AI Security-How Companies Protect Against Attacks and Data Risks
|
Aug 16, 2025 |
|
236 - The Hidden Danger in Your Cloud-Why Misconfiguration Is the Real Vulnerability
|
Aug 09, 2025 |
|
235 - The Microsoft SharePoint vulnerability
|
Aug 02, 2025 |
|
234 - Protecting the Invisible-How to Secure Infrastructure without Agents
|
Jul 26, 2025 |
|
233 - CI-CD Pipelines and Associated Security Risks
|
Jul 19, 2025 |
|
232 - Catching up with security
|
Jul 12, 2025 |
|
231 - A Crash Course in Vendor Risk, Lessons from the CrowdStrike Outage
|
Jul 05, 2025 |
|
230 - Security Of iOT
|
Jun 28, 2025 |
|
229 - What is FIPS 140-3
|
Jun 21, 2025 |
|
228 - How the Emergence of AI-Powered Malware works
|
Jun 14, 2025 |
|
227 - Is UTM Still Relevant?
|
Jun 07, 2025 |
|
226 - Inside A Stealthy Malware Powering Modern Cyber Attacks
|
May 31, 2025 |
|
225 - What Is a Content Delivery Network—And Do They Really Protect Businesses?
|
May 24, 2025 |
|
224 - Cisco Talos Year 2024 In Review
|
May 17, 2025 |
|
223 - RSAC 2025 - Part 2
|
May 10, 2025 |
|
222 - RSAC 2025 - Part 1
|
May 03, 2025 |
|
221 - FBI’s 2024 Annual Internet Crime Report
|
Apr 26, 2025 |
|
220 - Watering Hole Attacks-The Hidden Danger of Trusted Spaces
|
Apr 19, 2025 |
|
219 - What Is Agentic AI?
|
Apr 12, 2025 |
|
218 - Fast Flux-The Cybercriminal's Hide and Seek
|
Apr 05, 2025 |
|
217 - Phishing the Expert-The Unexpected Cybersecurity Breach - Part 2
|
Mar 29, 2025 |
|
216 - Phishing The Expert-The Unexpected Cybersecurity Breach - Part 1
|
Mar 22, 2025 |
|
215 - Cyber Threat Emulation - Strategies for Staying Ahead Of Cyber Attacks
|
Mar 15, 2025 |
|
214 - What are polyglot files and how bad are they?
|
Mar 08, 2025 |
|
213 - Stealing Data in Plain Sight -How Cybercriminals Exfiltrate Your Secrets and How to Stop Them
|
Mar 01, 2025 |
|
212 - Behind the login Screen - Understanding OS Authentication - Part 2
|
Feb 22, 2025 |
|
211 - Behind the login Screen: Understanding OS Authentication - Part 2
|
Feb 15, 2025 |
|
210 - Adversarial Misuse of Generative AI
|
Feb 08, 2025 |
|
209 - DeepSeek
|
Feb 01, 2025 |
|
208 - Lets Encrypt on shortening certification lifetime to just 6 days!
|
Jan 25, 2025 |
|
207 - Microsoft Windows Actively Exploited Vulnerabilities
|
Jan 18, 2025 |
|
206 - Cybersecurity Resolutions for 2025 - Best Practices for Individuals and Organizations
|
Jan 11, 2025 |
|
205 - Vulnerability Scanners-The Heroes and Hidden Limits of Cybersecurity
|
Jan 04, 2025 |
|
204 - Recap of the best episodes of 2024
|
Dec 28, 2024 |
|
203 - Tips In Securing Your Organization - When the Security Team is Away
|
Dec 21, 2024 |
|
202 - Volt Typhoon
|
Dec 14, 2024 |
|
201 - Digital Breadcrumbs - Tracing the Hidden Trails for Evidence
|
Dec 07, 2024 |
|
200 - Incident Response Playbook- Turning Chaos into Control
|
Nov 30, 2024 |
|
199 - FBI-CISA-NSA's list of the most exploited vulnerabilities of 2023
|
Nov 23, 2024 |
|
198 - Browser Engines Security
|
Nov 16, 2024 |
|
197 - Advanced Malware evasion Techniques And Their Counter Measures
|
Nov 09, 2024 |
|
196 - What are Shared Fate Model and Trust Anchors?
|
Nov 02, 2024 |
|
195 - Top Common Password Attacks and How to Defend Against Them
|
Oct 26, 2024 |
|
194 - Interview With Red Sift
|
Oct 19, 2024 |
|
193 - Microsoft Windows Architecture
|
Oct 12, 2024 |
|
192 - APIs and Webhooks
|
Oct 05, 2024 |
|
191 - Is The Browser The New Operating System?
|
Sep 28, 2024 |
|
190 - DevSecOps
|
Sep 21, 2024 |
|
189 - The Risks of Rushing LLM Implementation and Sensitive Data Leakage on the Open Web
|
Sep 14, 2024 |
|
188 - Yubikey Vulnerability
|
Sep 07, 2024 |
|
187 - File Integrity Monitoring or EDR?
|
Aug 31, 2024 |
|
186 - The New NIST Framework 2.0
|
Aug 24, 2024 |
|
185 - Cybersecurity Capability Maturity Model
|
Aug 17, 2024 |
|
184 - Why Hackers Target Stolen Credentials
|
Aug 10, 2024 |
|
183 - The Malware Information Sharing Platform
|
Aug 03, 2024 |
|
82 - Weighting The Risk Benefit Of Kernel Level Access By 3rd Party Apps
|
Jul 27, 2024 |
|
181 - The Crowdstrike IT Outage
|
Jul 20, 2024 |
|
180 - Unmasking Data Breaches - Understanding the Surge and Examining Recent Major Incidents - Part 2
|
Jul 13, 2024 |
|
179 -Unmasking Data Breaches - Understanding the Surge and Examining Recent Major Incidents - Part 1
|
Jul 06, 2024 |
|
178 - Trusted Relationship Attacks
|
Jun 29, 2024 |
|
177 - The Importance Of Automation And Orchestration In Cyber Security - Part 2
|
Jun 22, 2024 |
|
176 - The importance Of Automation And Orchestration In Cyber Security - Part 1
|
Jun 15, 2024 |
|
175 - The Dangers Of Remote Workers
|
Jun 08, 2024 |
|
174 - Digital Twin Technology And Its Application In Security
|
Jun 01, 2024 |
|
173 - SSL VPN versus IPsec VPN - Part 2
|
May 25, 2024 |
|
172 - SSL VPN versus IPsec VPN - Part 1
|
May 18, 2024 |
|
171 - Remote Browser Isolation
|
May 11, 2024 |
|
170 - eBPF - Part 2
|
May 04, 2024 |
|
169 - eBPF - Part 1
|
Apr 27, 2024 |
|
168 - Preparing for and responding to ransomeware attack - Part 2
|
Apr 20, 2024 |
|
167 - Preparing for and responding to ransomeware attack
|
Apr 13, 2024 |
|
166 - The SysInternal Utilities
|
Apr 06, 2024 |
|
165 - How AI is helping Incident Responders
|
Mar 30, 2024 |
|
164 - What Is Platform Approach To Security? - Part 2
|
Mar 23, 2024 |
|
163 - What Is Platform Approach To Security? - Part 1
|
Mar 16, 2024 |
|
162 - LEAP 2024 - Riyadh
|
Mar 09, 2024 |
|
161 - Qatar Web Summit
|
Mar 02, 2024 |
|
160 - The Hidden Risks of Default Configurations - Part 2
|
Feb 24, 2024 |
|
159 - The Hidden Risks of Default Configurations - Part 1
|
Feb 17, 2024 |
|
158 - Is quantum computing a threat to cryptography, really? - Part 2
|
Feb 10, 2024 |
|
157 - Is quantum computing a threat to cryptography, really? - Part 1
|
Feb 03, 2024 |
|
156 - The risks of exposing Web UI
|
Jan 27, 2024 |
|
155 - iVanti's widespread exploitation
|
Jan 20, 2024 |
|
154 - Exfil or DLP - Part 2
|
Jan 13, 2024 |
|
153 - Exfil or DLP - Part 1
|
Jan 06, 2024 |
|
152 - Recap of most popular episodes of 2023
|
Dec 30, 2023 |
|
151 - Cyber Security Review Of 2023
|
Dec 23, 2023 |
|
150 - Supply Chain Security
|
Dec 16, 2023 |
|
149 - Be cyber vigilant this holiday
|
Dec 09, 2023 |
|
148 - What is the Dark Web?
|
Dec 02, 2023 |
|
147 - Web shells - Understanding Their Role in Cyber Attacks
|
Nov 25, 2023 |
|
146 - Symbolic Language in cyber security
|
Nov 18, 2023 |
|
145 - Indication of compromise best practice
|
Nov 11, 2023 |
|
144 - The New Common Vulnerability Scoring System
|
Nov 04, 2023 |
|
143 - Smart Homes - Discussion with Floris Grandvarlet EMEA Innovation and Sustainability CTO at Cisco
|
Oct 28, 2023 |
|
142 - Discussion With Eric Vedel Directory CISO Advisory at Cisco
|
Oct 21, 2023 |
|
141 - Threat Modeling - Part 2
|
Oct 14, 2023 |
|
140 - Threat Modeling - Part 1
|
Oct 07, 2023 |
|
139 - Initial Access - When the Rubber Hits the Road During the Attack Phases - Part 2
|
Sep 30, 2023 |
|
138 - Initial Access - When the Rubber Hits the Road During the Attack Phases
|
Sep 23, 2023 |
|
137 - Introduction to Cybersecurity - Part 2
|
Sep 16, 2023 |
|
136 - Introduction to Cybersecurity - Part 1
|
Sep 09, 2023 |
|
135 - Cybersecurity's Key - Choosing the Right Tools
|
Sep 02, 2023 |
|
134 - How does Generative AI help in Cybersecurity
|
Aug 26, 2023 |
|
133- Interview with Cohaesus Group - Part 2
|
Aug 19, 2023 |
|
132 - Interview with Cohaesus Group - Part 1
|
Aug 12, 2023 |
|
131 - How do ransomeware rollback features actually work?
|
Aug 05, 2023 |
|
130 - What is the difference between Incidence Response and Threat Hunting?
|
Jul 29, 2023 |
|
129 - What is new in PCI DSS v4.0?
|
Jul 22, 2023 |
|
128 - How to Achieve Cyber Resilience - Best Practices for Effective Incident Response - Part 2
|
Jul 15, 2023 |
|
127 - How to Achieve Cyber Resilience: Best Practices for Effective Incident Response - Part 1
|
Jul 08, 2023 |
|
126 - Unmasking cyber threats - The power of cyber threat intel
|
Jul 01, 2023 |
|
125 - Verizon Data breach Investigation Report - Key Takeaways
|
Jun 24, 2023 |
|
124 - Comparing data lake and data warehouse
|
Jun 17, 2023 |
|
123-Inside the Cyber Underworld - How Cybercriminals Join Forces for Profit - Part 2
|
Jun 10, 2023 |
|
122 - Inside the Cyber Underworld - How Cybercriminals Join Forces for Profit - Part 1
|
Jun 03, 2023 |
|
121 - The MITRE ATT&CK Navigator
|
May 27, 2023 |
|
120 - Demystifying Digital Certificates- Shedding Light on an Obscure yet Crucial Aspect of Online Security - Part 2
|
May 20, 2023 |
|
119 - Demystifying Digital Certificates- Shedding Light on an Obscure yet Crucial Aspect of Online Security - Part 1
|
May 13, 2023 |
|
118 - Sealed and delivered - Understanding How Email Protocols Keep You Secure - Part 2
|
May 06, 2023 |
|
117 - Sealed and delivered - Understanding How Email Protocols Keep You Secure - Part 1
|
Apr 29, 2023 |
|
116 - Classified Chaos - The Persistent Threat of Data Leaks - Part 2
|
Apr 22, 2023 |
|
115 - Classified Chaos: The Persistent Threat of Data Leaks - Part 1
|
Apr 15, 2023 |
|
114 - Ensuring Business Continuity Through Strong Security Measures
|
Apr 08, 2023 |
|
113 - Navigating Cloud Security: A Look at Public, Hybrid, and Private Cloud
|
Apr 01, 2023 |
|
112 - OAuth Protocol - Part 2
|
Mar 25, 2023 |
|
111 - OAuth Protocol - Part 1
|
Mar 18, 2023 |
|
110 - Know Your Enemy: Why Threat Intelligence Matters
|
Mar 11, 2023 |
|
109 - Finding malware in encrypted traffic
|
Mar 04, 2023 |
|
108 - Securing your home network
|
Feb 25, 2023 |
|
107 - Understanding CVSS Scoring System
|
Feb 18, 2023 |
|
106 - Optimise your last line of defense
|
Feb 11, 2023 |
|
105 - Be prepared for the next password manager breach
|
Feb 04, 2023 |
|
104 - What is NetFlow Protocol used for? - Part 2
|
Jan 28, 2023 |
|
103 - What is NetFlow Protocol used for? - Part 1
|
Jan 21, 2023 |
|
102 - OSQuery
|
Jan 14, 2023 |
|
101- Atomic Red Team
|
Jan 07, 2023 |
|
100 - The Best of 2022
|
Dec 31, 2022 |
|
99 - Revisiting the impactful major 2022 cybersecurity events
|
Dec 24, 2022 |
|
98 - Post-Compromise
|
Dec 17, 2022 |
|
97 - Privilege Escalation 101 and how to mitigate it
|
Dec 10, 2022 |
|
96 - Are containers more secure?
|
Dec 03, 2022 |
|
95 - Benefits of RestAPI and why should you care?
|
Nov 26, 2022 |
|
94 - Is MSSP right for you?
|
Nov 19, 2022 |
|
93 - Why companies are breached even when they have MFA on?
|
Nov 12, 2022 |
|
92 - How to start your cyber security career?
|
Nov 05, 2022 |
|
91 - Continuous security validation
|
Oct 29, 2022 |
|
90 - Where do you start with Zero Trust?
|
Oct 22, 2022 |
|
89 - GITEX 2022 Dubai
|
Oct 15, 2022 |
|
88 - Insider treat, the danger within - Part 2
|
Oct 08, 2022 |
|
87 - Insider treat, the danger within - Part 1
|
Oct 01, 2022 |
|
86 - SIEM versus XDR - Who is the winner?
|
Sep 24, 2022 |
|
85 - Turning your network into a sensor
|
Sep 17, 2022 |
|
84 - Post-Exploitation used by cyber criminals - Part 2
|
Sep 10, 2022 |
|
83 - Post-Exploitation used by cyber criminals - Part 1
|
Sep 03, 2022 |
|
82 - Consultant and contractor control
|
Aug 27, 2022 |
|
81 - Critical! Know where you passwords are!
|
Aug 20, 2022 |
|
80 - How machine learning helps the cybersecurity industry - Part 2
|
Aug 13, 2022 |
|
79 - How machine learning helps the cybersecurity industry - Part 1
|
Aug 06, 2022 |
|
78 - Fileless Malware
|
Jul 30, 2022 |
|
77 - Tools and methodologies to apply to your defense strategy
|
Jul 23, 2022 |
|
76 - NIST’s Quantum-Resistant Algorithms
|
Jul 16, 2022 |
|
75 - Solution Approach to Security
|
Jul 09, 2022 |
|
74 - PowerShell Continued
|
Jul 02, 2022 |
|
73 - PowerShell - Use it wisely
|
Jun 27, 2022 |
|
72 - Beating cyber threats with an efficient security team
|
Jun 19, 2022 |
|
71 - HTML Smuggling attack
|
Jun 11, 2022 |
|
70 - Network Segmentation
|
Jun 04, 2022 |
|
69 - Key takeways in Verison 2022's Data Breach Investigations Report
|
May 28, 2022 |
|
68 - How to keep your email safe from prying eyes?
|
May 20, 2022 |
|
67 - Reducing your attack surface
|
May 14, 2022 |
|
66 - Security Assessment
|
May 07, 2022 |
|
65 - Top software errors leading to vulnerabilities
|
Apr 30, 2022 |
|
64 - What are the different types of vulnerabilities?
|
Apr 23, 2022 |
|
63 - How can everyday person protect themself from cyber attack?
|
Apr 16, 2022 |
|
62 - Digital Forensics 101 - Part 2
|
Apr 09, 2022 |
|
61 - Digital Forensics 101 - Part 1
|
Apr 02, 2022 |
|
60 - GISEC 2022 Dubai
|
Mar 26, 2022 |
|
59 - Secure Access
|
Mar 19, 2022 |
|
58 - iOT Security
|
Mar 12, 2022 |
|
57 - Concept of XDR
|
Mar 05, 2022 |
|
56 -Identity and authentication
|
Feb 26, 2022 |
|
55 -Lessons from the Irish Health Services Executive Hack - Part 2
|
Feb 19, 2022 |
|
54 - Lessons from the Irish Health Services Executive Hack - Part 1
|
Feb 12, 2022 |
|
53 - Common Vulnerability Scoring System (CVSS)
|
Feb 05, 2022 |
|
52 - Linux Malware Increased in 2021
|
Jan 29, 2022 |
|
51 - A new RAT campaign
|
Jan 23, 2022 |
|
50 - Apple Private Relay
|
Jan 15, 2022 |
|
49 - Mac Malware
|
Jan 09, 2022 |
|
48 - CIS Controls
|
Jan 01, 2022 |
|
47 - The best of 2021!
|
Dec 25, 2021 |
|
46 - Apache Log4j Continues
|
Dec 18, 2021 |
|
45 - Critical Vulnerability in Apache Log4j
|
Dec 11, 2021 |
|
44 - Holiday best practice
|
Dec 04, 2021 |
|
43 - Passwordless future
|
Nov 27, 2021 |
|
42 - OWASP Top 10
|
Nov 20, 2021 |
|
41 - Endpoint security and the shift to remote work
|
Nov 13, 2021 |
|
40 - NIST Cybersecurity Framework
|
Nov 06, 2021 |
|
39 - What 80M Ransomware Analysis Revealed
|
Oct 31, 2021 |
|
38 - Modern Vulnerability Management
|
Oct 23, 2021 |
|
37 - What is FLOC?
|
Oct 16, 2021 |
|
36 - Cookies
|
Oct 09, 2021 |
|
35 - It Is Cyber Security Month!
|
Oct 02, 2021 |
|
34 - Office 365 Email Security - A Talk with ISGM
|
Sep 26, 2021 |
|
33 - Modern Security Operation Center - Part 2
|
Sep 18, 2021 |
|
32 - Modern Security Operation Center - Part 1
|
Sep 11, 2021 |
|
31 - Red Teaming
|
Sep 04, 2021 |
|
30 - MITRE Engenuity ATT&CK Evaluation
|
Aug 28, 2021 |
|
29 - Apple’s CSAM Detection System
|
Aug 21, 2021 |
|
28 - The BlackMatter Interview
|
Aug 15, 2021 |
|
27 - Interview With Information Security Media Group
|
Aug 07, 2021 |
|
26 - CyberChef
|
Jul 31, 2021 |
|
25 - Intrusion Analysis - Part 2
|
Jul 24, 2021 |
|
24 - Intrusion Analysis - Part 1
|
Jul 17, 2021 |
|
23 - Interview with CBA TV
|
Jul 13, 2021 |
|
22 - Is Internal Email Scan Necessary?
|
Jul 03, 2021 |
|
21 - Secure Access Service Edge (SASE)
|
Jun 26, 2021 |
|
20 - DLP - Part 2
|
Jun 19, 2021 |
|
19 - DLP - Part 1
|
Jun 11, 2021 |
|
18 - DNS Layer Security Part. 2
|
Jun 06, 2021 |
|
17 - DNS Layer Security Part. 1
|
May 29, 2021 |
|
16 - The Ransomware Task Force Recommendations
|
May 21, 2021 |
|
15 - PCI DSS
|
May 16, 2021 |
|
14 - Zero Trust
|
May 08, 2021 |
|
13 - What is Threat Hunting?
|
May 01, 2021 |
|
12 - The Changing Face Of Ransomware
|
Apr 27, 2021 |
|
11 - 2FA
|
Apr 17, 2021 |
|
10 - SMTP Authentication Protocols
|
Apr 10, 2021 |
|
09 - Dynamic Malware Analysis
|
Apr 05, 2021 |
|
08 - IR
|
Mar 27, 2021 |
|
07 - The MITRE ATT&CK Framework
|
Mar 24, 2021 |
|
06 - Hafnium
|
Mar 13, 2021 |
|
05 - Encrypting Your Data
|
Mar 07, 2021 |
|
04. Deception Attacks
|
Feb 28, 2021 |
|
03. The Last Line Of Defense
|
Feb 20, 2021 |
|
02. Your Adversary Is In, Now What?
|
Feb 13, 2021 |
|
01. Anatomy Of A Phishing Attack
|
Feb 06, 2021 |