Security Breach

By Eric Sorensen

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by Eric Sorensen

Category: Tech News

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast
    

Subscribers: 2
Reviews: 0
Episodes: 136

Description

A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.

Episode Date
You Think You Know Me
Jul 02, 2025
Avoiding the Ostrich Approach
Jun 20, 2025
'We've Made Our Own Prison'
Jun 02, 2025
Dark AI Speeding Hacker Evolution
May 16, 2025
Why Ransomware, Credential Theft and Phishing Schemes Persist
Apr 25, 2025
Unsecure Webcam Was All a Ransomware Group Needed
Apr 16, 2025
IABs, Dark Web Fueling Ransomware Surge
Mar 31, 2025
Manufacturing’s Internal Cyber Struggles
Mar 13, 2025
Observations of an Ethical Hacking Researcher
Feb 28, 2025
The Evolution of OT Vulnerabilities
Feb 13, 2025
The Legacy of AI in Cybersecurity
Jan 30, 2025
A Happy Ending to the Latest ICS Hack
Jan 16, 2025
The Biggest Hacks of 2024
Dec 27, 2024
Looking Back to Move Forward
Dec 12, 2024
AI Is Exposing Your Most Vulnerable Attack Surface
Dec 09, 2024
Minimizing Hacks by Focusing on Uptime
Nov 21, 2024
What Cybersecurity Can Learn from Tom Brady
Nov 15, 2024
Threat Landscape Update
Nov 08, 2024
The Little Things That Kill
Oct 31, 2024
Phishing Attack Defense 'Not Rocket Science'
Oct 24, 2024
Legacy Mindsets Are Helping Hackers Weaponize Networks
Oct 18, 2024
Using Force Multipliers to Protect Against Next-Gen Stuxnet
Oct 10, 2024
Never Let a Good Hack Go to Waste
Oct 03, 2024
Finding Your 'Creative Maliciousness'
Sep 26, 2024
Getting Past the Whack-A-Mole Approach
Sep 20, 2024
Inside the Growing Complexity of Ransomware Hacking Groups
Sep 11, 2024
Time to 'Rip off the Band-Aid' to Ensure Security
Sep 05, 2024
Combating the 20th Century Mafia with a Stronger Human Firewall
Aug 28, 2024
Tearing Down the 'Set It and Forget It' Mindset
Aug 22, 2024
Bridging the IT-OT Divide
Aug 15, 2024
'There's No Bulletproof Vest' in Cybersecurity
Aug 08, 2024
Are We Over-Connected?
Aug 02, 2024
The $25M 'Wake-Up Call' Supply Chain Hack
Jul 24, 2024
The Dollars and Sense of Cybersecurity
Jul 19, 2024
There's No 'Plant the Flag' Moment in Cybersecurity
Jul 11, 2024
'Nobody Should Get Ransomwared'
Jun 27, 2024
The Protection and Productivity of Zero Trust
Jun 20, 2024
OT's Legacy Tech Challenges
Jun 12, 2024
Shutting Down 'Spy Board' Threats
Jun 05, 2024
The OT Threat Landscape's Infectious Nature
May 30, 2024
Knowing How to Arm Yourself for Battle
May 20, 2024
Supply Chains Are a Hacker's Gateway
May 16, 2024
The Hacks!
May 08, 2024
Security Breach: Predictions That Landed
May 01, 2024
DMZs, Alarm Floods and Prepping for 'What If?'
Apr 24, 2024
Weaponizing Secure-By-Design
Apr 17, 2024
The Impacts of Over-Connectivity and Mobile Defeatism
Apr 10, 2024
Hackers Learn How to Attack You, From You
Apr 03, 2024
The Largest Attack Surface - People
Mar 28, 2024
Avoiding a 'Chicken Little' Cybersecurity Strategy
Mar 21, 2024
Cybersecurity's Greatest Weapon - Awareness
Mar 13, 2024
Chasing Cyber Ghosts
Mar 06, 2024
Missteps Creating 'An Internal Collection of Hackers'
Feb 28, 2024
Leveraging Threat Intelligence Data
Feb 22, 2024
The Hacker's Most Lucrative Attack
Feb 15, 2024
SBOMs, AI and the Crown Jewels
Feb 07, 2024
Tech Debt and the Unsexy Side of Cybersecurity
Jan 31, 2024
What Happens When a Torque Wrench Gets Hacked
Jan 25, 2024
AI, ChatGPT Fueling Surge in Ransomware
Jan 09, 2024
New Strategies for Old-School Hacks
Jan 09, 2024
Learning from the Dark Side
Dec 20, 2023
The Growing Impact of Hacktivists and State-Sponsored Groups
Dec 13, 2023
Vulnerability Data from 'The Wild'
Dec 07, 2023
Walking the Line
Dec 01, 2023
Breaking Down the Boeing Hack
Nov 21, 2023
Turning Up the Cat & Mouse Game
Nov 16, 2023
This is the Way ... to Beat Hackers
Nov 10, 2023
Criminal Organizations Know You
Nov 02, 2023
Patches, PLCs and Making it Harder for Hackers
Oct 26, 2023
Why AI is Your Biggest Threat and Most Powerful Ally
Oct 19, 2023
The Ransomware Roller Coaster
Oct 11, 2023
'There's A Train Wreck Coming'
Oct 04, 2023
'They're Hitting Everyone They Can'
Sep 29, 2023
How Hackers are Targeting Vehicles and Fleets
Sep 20, 2023
Doubling Down to Beat the Hackers
Sep 14, 2023
Inside the Summer's Biggest Industrial Hacks
Sep 07, 2023
Avoiding 'Shiny New Objects'
Aug 30, 2023
Knowing 'What is Good'
Aug 23, 2023
Security Breach: 'The Edge Always Goes to the Attacker'
Aug 18, 2023
Phishing Lessons and 'Shifting the Target'
Aug 10, 2023
The Growing Problem of 'Insecure by Design'
Aug 04, 2023
Cloud Apps are Elevating Malware Threats
Jul 25, 2023
AI - Use It or Lose!
Jul 13, 2023
The Best Way to Identify, Defeat Hackers
Jun 29, 2023
The Impressive and Terrifying Evolution of Ransomware Gangs
Jun 21, 2023
Humans, 'Promiscuous Devices' Creating More Threats
Jun 13, 2023
Enemies at the Gate
Jun 07, 2023
The Bad Guys Are Salivating Over Manufacturing
Jun 01, 2023
More than Security, Cyber Defense Is 'Life Safety'
May 25, 2023
Making Hackers Pay (Literally)
May 18, 2023
Hackers Want to Steal, Extort Competitive Advantages
May 10, 2023
An Unlikely Assist from Ransomware and the Looming Threats of AI
May 03, 2023
Trusting the Creative Hacker
Apr 24, 2023
The Cybercriminal's Favorite Pastime
Apr 07, 2023
Balancing The Light and Dark Forces of Technology
Mar 30, 2023
Thinking Like the Bad Guy
Mar 23, 2023
Breaking Down the Dole Foods Ransomware Attack
Mar 16, 2023
The Air Gap Lie and The Spectrum of Extortion
Mar 08, 2023
Latest Ransomware Attacks Educate, then Humiliate
Feb 27, 2023
Hiding, Not Running from Hackers
Feb 20, 2023
Hacker's Insight: 'How Can I Make Stuff Worse'
Feb 13, 2023
When Seeing the Attack Isn't Enough to Stop It
Feb 07, 2023
People Are Part of the Damage
Feb 01, 2023
Because Hackers are Working Harder
Jan 23, 2023
Our Cyber Defense Gets a D+
Jan 13, 2023
Protecting Against 'Dormant Footholds' and Knowing You're a Target
Dec 23, 2022
The Little Things Are Still Killing
Dec 21, 2022
Why the Good Guys are Losing
Dec 09, 2022
A Little Social Engineering Goes a Long Way
Nov 28, 2022
Embracing The Devil Inside to Stifle Hackers
Nov 22, 2022
No Place to Hide When You Have Money and Data
Nov 15, 2022
From Attacking ISIS to Industrial Controls - Is GhostSec a Hacktivist or Threat?
Nov 08, 2022
Darknet Diaries Host Lifts the Veil on Cyberattack Secrecy
Oct 27, 2022
The Hack You Helped Create
Oct 18, 2022
The Cloud is on Fire - Promise vs. Problem
Sep 20, 2022
When Cyber Gangs 'Get Loud' - Responding to Dynamite Panda, LockBit and Others
Aug 31, 2022
Lessons Learned from DarkSide and the Solar Winds Hack
Aug 30, 2022
The Growing (and Frightening) Complexity of Ransomware Groups
Jul 26, 2022
Breaking Down the Silos
Jul 19, 2022
Latest Tools of Choice for Hackers: Raspberry Robin and BlackCat
Jun 23, 2022
Preventing Ransomware Attacks Through Cyber Maintenance
May 19, 2022
Cyber Hygiene and Putin's Army of Criminal Hackers
May 19, 2022
Revisiting the JBS Ransomware Attack One Year Later
May 19, 2022
'The Bad Guys Are Smart, Too'
May 17, 2022
'The Industry's Attack Surface Has Exploded'
May 17, 2022
DDoS Attacks (Part 1): 'They're Super Easy and Free'
May 17, 2022
DDoS Attacks - (Part II): Preparation is Prevention
May 17, 2022
Why Phishing Schemes Continue to Flourish
May 16, 2022
'Hackers are Lazy. Scammers are Misfits.'
May 16, 2022
'Hackers Are Heartless Bastards'
May 16, 2022
Ransomware, Log4J and When — not if — You're Hacked
May 16, 2022
Don't Fear the Hacker — Drop Some S-BOMs
May 16, 2022
Know Your Enemy
May 16, 2022
There's a Lot of Reasons October Could Be Terrifying
May 16, 2022
The Dangerous Reality of Your Cybersecurity Blast Radius
May 16, 2022
Inside a Phishing Scheme
May 16, 2022