با برنامه Player FM !
پادکست هایی که ارزش شنیدن دارند
حمایت شده

1 444- Eloping is Fun with Jenny Mac 1:06:22
184 - Why Hackers Target Stolen Credentials
Manage episode 434609743 series 2872461
Enjoying the content? Let us know your feedback!
In this week's episode, we’re unpacking a topic that’s crucial for anyone connected to the digital world: _Why Hackers Target Stolen Credentials_. From understanding the value behind those stolen usernames and passwords to exploring the dark web marketplaces where they’re traded, we’ll break it all down and look at what this means for your security.
Before we get into the topic, lets review this week's top trending security news:
- A UK IT provide faces hefty fines for ransomware breach
- https://ico.org.uk: Provisional decision to impose £6m fine on software provider following 2022 ransomware attack that disrupted NHS and social care services
- https://en.wikipedia.org: Credential Stuffing
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
245 قسمت
Manage episode 434609743 series 2872461
Enjoying the content? Let us know your feedback!
In this week's episode, we’re unpacking a topic that’s crucial for anyone connected to the digital world: _Why Hackers Target Stolen Credentials_. From understanding the value behind those stolen usernames and passwords to exploring the dark web marketplaces where they’re traded, we’ll break it all down and look at what this means for your security.
Before we get into the topic, lets review this week's top trending security news:
- A UK IT provide faces hefty fines for ransomware breach
- https://ico.org.uk: Provisional decision to impose £6m fine on software provider following 2022 ransomware attack that disrupted NHS and social care services
- https://en.wikipedia.org: Credential Stuffing
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
245 قسمت
همه قسمت ها
×1 245 - 50 Documents Can Poison AI Models - CISA KEV Adds 12 Decade-Old Vulnerabilities and Salesforce Ransomware 30:38
1 244 - The Recent Cyberattacks on European Airports - A Wake-Up Call for Critical Infrastructure 43:18
1 243 - Are Web Application Firewalls (WAFs) Obsolete in 2025? Pros, Cons, and Future of Application Security - Part 2 28:38
1 242 - Are Web Application Firewalls (WAFs) Obsolete in 2025? Pros, Cons, and Future of Application Security - Part 1 23:11
1 238 - Patchwork and Transparency -Microsoft’s August Security Updates & Google's Project Zero Redefined 15:21
1 213 - Stealing Data in Plain Sight -How Cybercriminals Exfiltrate Your Secrets and How to Stop Them 50:53
1 204 - Recap of the best episodes of 2024 1:31:38
1 180 - Unmasking Data Breaches - Understanding the Surge and Examining Recent Major Incidents - Part 2 35:32
1 179 -Unmasking Data Breaches - Understanding the Surge and Examining Recent Major Incidents - Part 1 28:43
1 152 - Recap of most popular episodes of 2023 1:42:39
1 143 - Smart Homes - Discussion with Floris Grandvarlet EMEA Innovation and Sustainability CTO at Cisco 29:45
به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.





























