YusufOnSecurity.com

By YusufOnSecurity.Com

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.


Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 0
Reviews: 0
Episodes: 260

Description

This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!


Episode Date
260 - From NTLM to Kerberos - Microsoft's Security Transformation Begins - Part 2
Jan 24, 2026
259 - From NTLM to Kerberos - Microsoft's Security Transformation Begins - Part 1
Jan 17, 2026
258 - React2Shell Mass Exploit and Instagram 17 million breach
Jan 10, 2026
257 - Jaguar Land Rover Cyberattack-How the Breach Disrupted Production and Exposed Sensitive Data
Jan 03, 2026
256 - The best of 2025
Dec 27, 2025
255 - Shadow AI-The Invisible Security Risk Already Inside Your Organization
Dec 20, 2025
254 - Infostealers-The Silent Malware Stealing Everything
Dec 13, 2025
253 - Shadow IT and SaaS Sprawl - The Hidden Security Risk in Your Organization
Dec 06, 2025
252 - Windows password security - What is under the hood?
Nov 29, 2025
251 - The Future of Security Operations- Are SIEM, XDR, and SOAR Converging or Moving Apart?
Nov 22, 2025
250 - PenTesting vs Red Teaming vs Vulnerability Assessment-Which One Do You Need?
Nov 15, 2025
249 - What Is Credential Stuffing? How Hackers Use Your Old Passwords Against You
Nov 08, 2025
248 - The Truth About Security Awareness Training- Why 95% of Programs Don't Work
Nov 01, 2025
247 - AI-Powered Browsers-The Privacy and Security Risks No One Talks About
Oct 25, 2025
246 - Is AI-Generated Code Safe-The Hidden Dangers of Vibe Coding
Oct 18, 2025
245 - 50 Documents Can Poison AI Models - CISA KEV Adds 12 Decade-Old Vulnerabilities and Salesforce Ransomware
Oct 11, 2025
244 - The Recent Cyberattacks on European Airports - A Wake-Up Call for Critical Infrastructure
Oct 04, 2025
243 - Are Web Application Firewalls (WAFs) Obsolete in 2025? Pros, Cons, and Future of Application Security - Part 2
Sep 27, 2025
242 - Are Web Application Firewalls (WAFs) Obsolete in 2025? Pros, Cons, and Future of Application Security - Part 1
Sep 20, 2025
241 - AI vs. Cybersecurity-How LLMs Are Reshaping the Defender-Attacker Battle
Sep 13, 2025
240 - The Great OAuth Heist: How Salesloft's Breach Exposed Major Cybersecurity Firms
Sep 06, 2025
239 - Volt Typhoon Report-How Critical Infrastructure Was Targeted and Compromised
Aug 30, 2025
238 - Patchwork and Transparency -Microsoft’s August Security Updates & Google's Project Zero Redefined
Aug 23, 2025
237 - Generative AI Security-How Companies Protect Against Attacks and Data Risks
Aug 16, 2025
236 - The Hidden Danger in Your Cloud-Why Misconfiguration Is the Real Vulnerability
Aug 09, 2025
235 - The Microsoft SharePoint vulnerability
Aug 02, 2025
234 - Protecting the Invisible-How to Secure Infrastructure without Agents
Jul 26, 2025
233 - CI-CD Pipelines and Associated Security Risks
Jul 19, 2025
232 - Catching up with security
Jul 12, 2025
231 - A Crash Course in Vendor Risk, Lessons from the CrowdStrike Outage
Jul 05, 2025
230 - Security Of iOT
Jun 28, 2025
229 - What is FIPS 140-3
Jun 21, 2025
228 - How the Emergence of AI-Powered Malware works
Jun 14, 2025
227 - Is UTM Still Relevant?
Jun 07, 2025
226 - Inside A Stealthy Malware Powering Modern Cyber Attacks
May 31, 2025
225 - What Is a Content Delivery Network—And Do They Really Protect Businesses?
May 24, 2025
224 - Cisco Talos Year 2024 In Review
May 17, 2025
223 - RSAC 2025 - Part 2
May 10, 2025
222 - RSAC 2025 - Part 1
May 03, 2025
221 - FBI’s 2024 Annual Internet Crime Report
Apr 26, 2025
220 - Watering Hole Attacks-The Hidden Danger of Trusted Spaces
Apr 19, 2025
219 - What Is Agentic AI?
Apr 12, 2025
218 - Fast Flux-The Cybercriminal's Hide and Seek
Apr 05, 2025
217 - Phishing the Expert-The Unexpected Cybersecurity Breach - Part 2
Mar 29, 2025
216 - Phishing The Expert-The Unexpected Cybersecurity Breach - Part 1
Mar 22, 2025
215 - Cyber Threat Emulation - Strategies for Staying Ahead Of Cyber Attacks
Mar 15, 2025
214 - What are polyglot files and how bad are they?
Mar 08, 2025
213 - Stealing Data in Plain Sight -How Cybercriminals Exfiltrate Your Secrets and How to Stop Them
Mar 01, 2025
212 - Behind the login Screen - Understanding OS Authentication - Part 2
Feb 22, 2025
211 - Behind the login Screen: Understanding OS Authentication - Part 2
Feb 15, 2025
210 - Adversarial Misuse of Generative AI
Feb 08, 2025
209 - DeepSeek
Feb 01, 2025
208 - Lets Encrypt on shortening certification lifetime to just 6 days!
Jan 25, 2025
207 - Microsoft Windows Actively Exploited Vulnerabilities
Jan 18, 2025
206 - Cybersecurity Resolutions for 2025 - Best Practices for Individuals and Organizations
Jan 11, 2025
205 - Vulnerability Scanners-The Heroes and Hidden Limits of Cybersecurity
Jan 04, 2025
204 - Recap of the best episodes of 2024
Dec 28, 2024
203 - Tips In Securing Your Organization - When the Security Team is Away
Dec 21, 2024
202 - Volt Typhoon
Dec 14, 2024
201 - Digital Breadcrumbs - Tracing the Hidden Trails for Evidence
Dec 07, 2024
200 - Incident Response Playbook- Turning Chaos into Control
Nov 30, 2024
199 - FBI-CISA-NSA's list of the most exploited vulnerabilities of 2023
Nov 23, 2024
198 - Browser Engines Security
Nov 16, 2024
197 - Advanced Malware evasion Techniques And Their Counter Measures
Nov 09, 2024
196 - What are Shared Fate Model and Trust Anchors?
Nov 02, 2024
195 - Top Common Password Attacks and How to Defend Against Them
Oct 26, 2024
194 - Interview With Red Sift
Oct 19, 2024
193 - Microsoft Windows Architecture
Oct 12, 2024
192 - APIs and Webhooks
Oct 05, 2024
191 - Is The Browser The New Operating System?
Sep 28, 2024
190 - DevSecOps
Sep 21, 2024
189 - The Risks of Rushing LLM Implementation and Sensitive Data Leakage on the Open Web
Sep 14, 2024
188 - Yubikey Vulnerability
Sep 07, 2024
187 - File Integrity Monitoring or EDR?
Aug 31, 2024
186 - The New NIST Framework 2.0
Aug 24, 2024
185 - Cybersecurity Capability Maturity Model
Aug 17, 2024
184 - Why Hackers Target Stolen Credentials
Aug 10, 2024
183 - The Malware Information Sharing Platform
Aug 03, 2024
82 - Weighting The Risk Benefit Of Kernel Level Access By 3rd Party Apps
Jul 27, 2024
181 - The Crowdstrike IT Outage
Jul 20, 2024
180 - Unmasking Data Breaches - Understanding the Surge and Examining Recent Major Incidents - Part 2
Jul 13, 2024
179 -Unmasking Data Breaches - Understanding the Surge and Examining Recent Major Incidents - Part 1
Jul 06, 2024
178 - Trusted Relationship Attacks
Jun 29, 2024
177 - The Importance Of Automation And Orchestration In Cyber Security - Part 2
Jun 22, 2024
176 - The importance Of Automation And Orchestration In Cyber Security - Part 1
Jun 15, 2024
175 - The Dangers Of Remote Workers
Jun 08, 2024
174 - Digital Twin Technology And Its Application In Security
Jun 01, 2024
173 - SSL VPN versus IPsec VPN - Part 2
May 25, 2024
172 - SSL VPN versus IPsec VPN - Part 1
May 18, 2024
171 - Remote Browser Isolation
May 11, 2024
170 - eBPF - Part 2
May 04, 2024
169 - eBPF - Part 1
Apr 27, 2024
168 - Preparing for and responding to ransomeware attack - Part 2
Apr 20, 2024
167 - Preparing for and responding to ransomeware attack
Apr 13, 2024
166 - The SysInternal Utilities
Apr 06, 2024
165 - How AI is helping Incident Responders
Mar 30, 2024
164 - What Is Platform Approach To Security? - Part 2
Mar 23, 2024
163 - What Is Platform Approach To Security? - Part 1
Mar 16, 2024
162 - LEAP 2024 - Riyadh
Mar 09, 2024
161 - Qatar Web Summit
Mar 02, 2024
160 - The Hidden Risks of Default Configurations - Part 2
Feb 24, 2024
159 - The Hidden Risks of Default Configurations - Part 1
Feb 17, 2024
158 - Is quantum computing a threat to cryptography, really? - Part 2
Feb 10, 2024
157 - Is quantum computing a threat to cryptography, really? - Part 1
Feb 03, 2024
156 - The risks of exposing Web UI
Jan 27, 2024
155 - iVanti's widespread exploitation
Jan 20, 2024
154 - Exfil or DLP - Part 2
Jan 13, 2024
153 - Exfil or DLP - Part 1
Jan 06, 2024
152 - Recap of most popular episodes of 2023
Dec 30, 2023
151 - Cyber Security Review Of 2023
Dec 23, 2023
150 - Supply Chain Security
Dec 16, 2023
149 - Be cyber vigilant this holiday
Dec 09, 2023
148 - What is the Dark Web?
Dec 02, 2023
147 - Web shells - Understanding Their Role in Cyber Attacks
Nov 25, 2023
146 - Symbolic Language in cyber security
Nov 18, 2023
145 - Indication of compromise best practice
Nov 11, 2023
144 - The New Common Vulnerability Scoring System
Nov 04, 2023
143 - Smart Homes - Discussion with Floris Grandvarlet EMEA Innovation and Sustainability CTO at Cisco
Oct 28, 2023
142 - Discussion With Eric Vedel Directory CISO Advisory at Cisco
Oct 21, 2023
141 - Threat Modeling - Part 2
Oct 14, 2023
140 - Threat Modeling - Part 1
Oct 07, 2023
139 - Initial Access - When the Rubber Hits the Road During the Attack Phases - Part 2
Sep 30, 2023
138 - Initial Access - When the Rubber Hits the Road During the Attack Phases
Sep 23, 2023
137 - Introduction to Cybersecurity - Part 2
Sep 16, 2023
136 - Introduction to Cybersecurity - Part 1
Sep 09, 2023
135 - Cybersecurity's Key - Choosing the Right Tools
Sep 02, 2023
134 - How does Generative AI help in Cybersecurity
Aug 26, 2023
133- Interview with Cohaesus Group - Part 2
Aug 19, 2023
132 - Interview with Cohaesus Group - Part 1
Aug 12, 2023
131 - How do ransomeware rollback features actually work?
Aug 05, 2023
130 - What is the difference between Incidence Response and Threat Hunting?
Jul 29, 2023
129 - What is new in PCI DSS v4.0?
Jul 22, 2023
128 - How to Achieve Cyber Resilience - Best Practices for Effective Incident Response - Part 2
Jul 15, 2023
127 - How to Achieve Cyber Resilience: Best Practices for Effective Incident Response - Part 1
Jul 08, 2023
126 - Unmasking cyber threats - The power of cyber threat intel
Jul 01, 2023
125 - Verizon Data breach Investigation Report - Key Takeaways
Jun 24, 2023
124 - Comparing data lake and data warehouse
Jun 17, 2023
123-Inside the Cyber Underworld - How Cybercriminals Join Forces for Profit - Part 2
Jun 10, 2023
122 - Inside the Cyber Underworld - How Cybercriminals Join Forces for Profit - Part 1
Jun 03, 2023
121 - The MITRE ATT&CK Navigator
May 27, 2023
120 - Demystifying Digital Certificates- Shedding Light on an Obscure yet Crucial Aspect of Online Security - Part 2
May 20, 2023
119 - Demystifying Digital Certificates- Shedding Light on an Obscure yet Crucial Aspect of Online Security - Part 1
May 13, 2023
118 - Sealed and delivered - Understanding How Email Protocols Keep You Secure - Part 2
May 06, 2023
117 - Sealed and delivered - Understanding How Email Protocols Keep You Secure - Part 1
Apr 29, 2023
116 - Classified Chaos - The Persistent Threat of Data Leaks - Part 2
Apr 22, 2023
115 - Classified Chaos: The Persistent Threat of Data Leaks - Part 1
Apr 15, 2023
114 - Ensuring Business Continuity Through Strong Security Measures
Apr 08, 2023
113 - Navigating Cloud Security: A Look at Public, Hybrid, and Private Cloud
Apr 01, 2023
112 - OAuth Protocol - Part 2
Mar 25, 2023
111 - OAuth Protocol - Part 1
Mar 18, 2023
110 - Know Your Enemy: Why Threat Intelligence Matters
Mar 11, 2023
109 - Finding malware in encrypted traffic
Mar 04, 2023
108 - Securing your home network
Feb 25, 2023
107 - Understanding CVSS Scoring System
Feb 18, 2023
106 - Optimise your last line of defense
Feb 11, 2023
105 - Be prepared for the next password manager breach
Feb 04, 2023
104 - What is NetFlow Protocol used for? - Part 2
Jan 28, 2023
103 - What is NetFlow Protocol used for? - Part 1
Jan 21, 2023
102 - OSQuery
Jan 14, 2023
101- Atomic Red Team
Jan 07, 2023
100 - The Best of 2022
Dec 31, 2022
99 - Revisiting the impactful major 2022 cybersecurity events
Dec 24, 2022
98 - Post-Compromise
Dec 17, 2022
97 - Privilege Escalation 101 and how to mitigate it
Dec 10, 2022
96 - Are containers more secure?
Dec 03, 2022
95 - Benefits of RestAPI and why should you care?
Nov 26, 2022
94 - Is MSSP right for you?
Nov 19, 2022
93 - Why companies are breached even when they have MFA on?
Nov 12, 2022
92 - How to start your cyber security career?
Nov 05, 2022
91 - Continuous security validation
Oct 29, 2022
90 - Where do you start with Zero Trust?
Oct 22, 2022
89 - GITEX 2022 Dubai
Oct 15, 2022
88 - Insider treat, the danger within - Part 2
Oct 08, 2022
87 - Insider treat, the danger within - Part 1
Oct 01, 2022
86 - SIEM versus XDR - Who is the winner?
Sep 24, 2022
85 - Turning your network into a sensor
Sep 17, 2022
84 - Post-Exploitation used by cyber criminals - Part 2
Sep 10, 2022
83 - Post-Exploitation used by cyber criminals - Part 1
Sep 03, 2022
82 - Consultant and contractor control
Aug 27, 2022
81 - Critical! Know where you passwords are!
Aug 20, 2022
80 - How machine learning helps the cybersecurity industry - Part 2
Aug 13, 2022
79 - How machine learning helps the cybersecurity industry - Part 1
Aug 06, 2022
78 - Fileless Malware
Jul 30, 2022
77 - Tools and methodologies to apply to your defense strategy
Jul 23, 2022
76 - NIST’s Quantum-Resistant Algorithms
Jul 16, 2022
75 - Solution Approach to Security
Jul 09, 2022
74 - PowerShell Continued
Jul 02, 2022
73 - PowerShell - Use it wisely
Jun 27, 2022
72 - Beating cyber threats with an efficient security team
Jun 19, 2022
71 - HTML Smuggling attack
Jun 11, 2022
70 - Network Segmentation
Jun 04, 2022
69 - Key takeways in Verison 2022's Data Breach Investigations Report
May 28, 2022
68 - How to keep your email safe from prying eyes?
May 20, 2022
67 - Reducing your attack surface
May 14, 2022
66 - Security Assessment
May 07, 2022
65 - Top software errors leading to vulnerabilities
Apr 30, 2022
64 - What are the different types of vulnerabilities?
Apr 23, 2022
63 - How can everyday person protect themself from cyber attack?
Apr 16, 2022
62 - Digital Forensics 101 - Part 2
Apr 09, 2022
61 - Digital Forensics 101 - Part 1
Apr 02, 2022
60 - GISEC 2022 Dubai
Mar 26, 2022
59 - Secure Access
Mar 19, 2022
58 - iOT Security
Mar 12, 2022
57 - Concept of XDR
Mar 05, 2022
56 -Identity and authentication
Feb 26, 2022
55 -Lessons from the Irish Health Services Executive Hack - Part 2
Feb 19, 2022
54 - Lessons from the Irish Health Services Executive Hack - Part 1
Feb 12, 2022
53 - Common Vulnerability Scoring System (CVSS)
Feb 05, 2022
52 - Linux Malware Increased in 2021
Jan 29, 2022
51 - A new RAT campaign
Jan 23, 2022
50 - Apple Private Relay
Jan 15, 2022
49 - Mac Malware
Jan 09, 2022
48 - CIS Controls
Jan 01, 2022
47 - The best of 2021!
Dec 25, 2021
46 - Apache Log4j Continues
Dec 18, 2021
45 - Critical Vulnerability in Apache Log4j
Dec 11, 2021
44 - Holiday best practice
Dec 04, 2021
43 - Passwordless future
Nov 27, 2021
42 - OWASP Top 10
Nov 20, 2021
41 - Endpoint security and the shift to remote work
Nov 13, 2021
40 - NIST Cybersecurity Framework
Nov 06, 2021
39 - What 80M Ransomware Analysis Revealed
Oct 31, 2021
38 - Modern Vulnerability Management
Oct 23, 2021
37 - What is FLOC?
Oct 16, 2021
36 - Cookies
Oct 09, 2021
35 - It Is Cyber Security Month!
Oct 02, 2021
34 - Office 365 Email Security - A Talk with ISGM
Sep 26, 2021
33 - Modern Security Operation Center - Part 2
Sep 18, 2021
32 - Modern Security Operation Center - Part 1
Sep 11, 2021
31 - Red Teaming
Sep 04, 2021
30 - MITRE Engenuity ATT&CK Evaluation
Aug 28, 2021
29 - Apple’s CSAM Detection System
Aug 21, 2021
28 - The BlackMatter Interview
Aug 15, 2021
27 - Interview With Information Security Media Group
Aug 07, 2021
26 - CyberChef
Jul 31, 2021
25 - Intrusion Analysis - Part 2
Jul 24, 2021
24 - Intrusion Analysis - Part 1
Jul 17, 2021
23 - Interview with CBA TV
Jul 13, 2021
22 - Is Internal Email Scan Necessary?
Jul 03, 2021
21 - Secure Access Service Edge (SASE)
Jun 26, 2021
20 - DLP - Part 2
Jun 19, 2021
19 - DLP - Part 1
Jun 11, 2021
18 - DNS Layer Security Part. 2
Jun 06, 2021
17 - DNS Layer Security Part. 1
May 29, 2021
16 - The Ransomware Task Force Recommendations
May 21, 2021
15 - PCI DSS
May 16, 2021
14 - Zero Trust
May 08, 2021
13 - What is Threat Hunting?
May 01, 2021
12 - The Changing Face Of Ransomware
Apr 27, 2021
11 - 2FA
Apr 17, 2021
10 - SMTP Authentication Protocols
Apr 10, 2021
09 - Dynamic Malware Analysis
Apr 05, 2021
08 - IR
Mar 27, 2021
07 - The MITRE ATT&CK Framework
Mar 24, 2021
06 - Hafnium
Mar 13, 2021
05 - Encrypting Your Data
Mar 07, 2021
04. Deception Attacks
Feb 28, 2021
03. The Last Line Of Defense
Feb 20, 2021
02. Your Adversary Is In, Now What?
Feb 13, 2021
01. Anatomy Of A Phishing Attack
Feb 06, 2021