Bölümler
-
Enjoying the content? Let us know your feedback!
In this week's episode, we get into some detailed exploration of an up and coming malware. Looking at it closer, it is one of the most advanced post-exploitation code families shaping the cybersecurity landscape in 2025. Over the time we have together, we’ll unravel what this malware is, how it works, why it’s so dangerous, and most importantly what businesses can do to defend themselves. Along the way, we’ll break down technical terms and processes, to make the topic less complex as I need it to be accessible and engaging to everyone.
Microsoft Authenticator Now Warns To Export Passwords Before July Cut Off
Before we dive into our main topic, let’s take a quick look at a major tech update making headlines:-https://www.bleepingcomputer.com: Ransomware gangs increasingly use Skitnet post-exploitation malware
- https://otx.alienvault.com: Skitnet IOCs
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too. -
Enjoying the content? Let us know your feedback!
This week we are exploring what Content Delivery Networks —commonly known as CDNs— are and whether they protect modern businesses. We’ll dive deep into the mechanics of how CDNs work, the technologies behind them, and whether they defend organizations from threats or just deliver content at blazing speeds. Along the way, we’ll highlight two of the world’s leading CDN providers.
- https://en.wikipedia.org: Content Delivery Network
- https://www.cloudflare.com: What Is CDN?
- https://www.akamai.com: What Is CDN?
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too. -
Eksik bölüm mü var?
-
Enjoying the content? Let us know your feedback!
In this week's episode, we are looking at the latest Cisco Talos’ 2024 report.
In this comprehensive report, we will delve into the major cybersecurity trends and threats observed over the past year. Cisco Talos team, has compiled this report to provide valuable insights and guidance for organizations to enhance their security postures.
But before we get in to the main topic, I have one security news for you and that is:
- The European Union launches a new vulnerability Database - EUVD- https://euvd.enisa.europa.eu: EUVD
- https://euvd.enisa.europa.eu/faq: EUVD FAQ
- https://blog.talosintelligence.com: 2024 Year In Review Report
- https://www.forbes.com: Why Quantum Computers Will Work Alongside Classical Systems
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too. -
Enjoying the content? Let us know your feedback!
This is the part 2 of RSAC 2025 episode. If you have not listened to episode 1 (that episode 222), I would suggest you listen to episode 1 before you listen this episode.
Before you we get into part 2, lets review what has been happening last week on the news front.
- UK shares security tips after major retail cyberattacks- https://www.bleepingcomputer.com: UK NCSC Cyber Attack A Wake Up call
- https://www.ncsc.gov.uk:NCSC statement - Incident impacting retailers
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too. -
Enjoying the content? Let us know your feedback!
It was RSAC week and it would be remiss of me if I did not give you a highlight on what went on this year, 2025. After all, RSAC has a critical role in security. We will be reviewing the top key announcements from this year's event, including some exciting news from the major security players in the industry. Whether you're a cybersecurity professional, a tech enthusiast, or just curious about the latest in the world of cyber security, this episode is definitely for you. So, let's get started!
Microsoft makes All new Account Passwordless by default
Before we dive into the main segment, we will also add one more topic that I think is of major importance on top of everything else and that is from Microsoft.- https://techcommunity.microsoft.com: New User Experience
- https://www.rsaconference.com: RSA Conference 2025
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too. -
Enjoying the content? Let us know your feedback!
This week's episode looks at the FBI’s 2024 Annual Internet Crime Report -an analysis that not only highlights the scale of cybercrime but also reveals the evolving tactics of cybercriminals and the staggering financial impact on individuals and businesses alike. This of course relates to US but it is an indicative what might be happening elsewhere.
- https://www.ic3.gov: Federal Bureau Of Investigation - Internet Crime Report 2024
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too. -
Enjoying the content? Let us know your feedback!
Imagine visiting your favorite website-one you trust, one you’ve browsed a hundred times before-only to discover it’s become a silent gateway for cybercriminals. What if the real danger wasn’t in suspicious emails or obvious scams, but lurking in the very places you feel safest online? In today’s episode, we’ll unravel a cunning technique that preys on trust and routine, catching even the most vigilant users off guard. Stay tuned as we explore the origins, methods, and real-world impact of one of the most deceptive cyber threats in existence.
Lazarus hackers breach multiple organisation in a not so new attack method. We will find out what the technique is.
But before we get to the main topic, lets cover the top security news first- https://attack.mitre.org: Lazarus
- https://attack.mitre.org: Drive by compromise
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too. -
Enjoying the content? Let us know your feedback!
In this week's episode we are touching an intriguing topic. We're going to explore Agentic AI, a fascinating area within artificial intelligence that focuses on autonomous systems capable of making decisions and performing tasks without human intervention. We'll break it down for those new to cybersecurity, delve into some technical details, and use analogies to make it all clear
Microsoft defender will isolate undiscovered endpoing to block attacks
But we before we dive into the topic, lets recap the top security news this week:- https://learn.microsoft.com: Whatsbnew in Microsoft Defender Endpoint - Apri 2025
- https://en.wikipedia.org: Alan Turing
- https://www.nvidia.com: Agentic AI
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too. -
Enjoying the content? Let us know your feedback!
This week, we re going to explore what Fast Flux is, a sophisticated technique used by cybercriminals to evade detection and maintain their malicious activities. We'll break it down for those new to cybersecurity, delve into some technical details, and use analogies to make it all clear. So without further ado, grab your coffee, or keep your eyes on the road if you are driving, sit back, and let's get started!"
HellCat Ransomware- https://therecord.media: Schneider Electric Hackers Accessed Internal Project Tracking Platform
- https://www.infosecurity-magazine.com: Hellcat Ransomware Humiliation
- https://attack.mitre.org: Dynamic Resolution: Fast Flux DNS
- https://www.cisa.gov: Fasst Flux, A National Security Threat
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too. -
Enjoying the content? Let us know your feedback!
This week's episode is continuation of Troy Hunt's cautionary tale , the creator of HaveIBeenPwned. Despite being a renowned security expert, Troy recently fell victim to a sophisticated phishing attack through Mailchimp. We'll continue to break down what happened, how it happened, and what we can all learn from this incident. Stay tuned till the end where we bust our myth of the week!
Ubuntu Linux security bypasses
We will also look at this week's cyber security news which is- https://blog.qualys.com: Qualys TRU Discovers Three Bypasses of Ubuntu Unprivileged User Namespace Restrictions
- https://www.troyhunt.com: A sneaky phish just grabbed my Mailchimp mailing list
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too. -
Enjoying the content? Let us know your feedback!
In this week's episode we have a fascinating and cautionary tale about none other than Troy Hunt, the creator of HaveIBeenPwned. Despite being a renowned security expert, Troy recently fell victim to a sophisticated phishing attack through Mailchimp. We'll break down what happened, how it happened, and what we can all learn from this incident. Stay tuned till the end for tips on how to stay vigilant against phishing attacks and our myth of the week!
we will also look at the cyber security news. Here is what caught my attention this week.
- PSTools dll injection vulnerability- https://www.foto-video-it.de: Disclosure Sysinternals (You will need to translate to English if you are not a German speaker)
- https://learn.microsoft.com: PSTool
- https://www.troyhunt.com: A sneaky phish just grabbed my Mailchimp mailing list
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too. -
Enjoying the content? Let us know your feedback!
In this episode, we’ll look into a cybersecurity assessment method that mimics real-world attacks to test an organization's security defenses and response capabilities: Threat emulation. It is one of the strategies to keep you ahead of the game. Threat emulation aims to identify and mitigate security gaps before attackers exploit them, providing a more comprehensive evaluation than traditional assessments.
March Microsoft Patch Tuesday has landed!
Before we dive into the main topic, lets glance what is happening on the security front:- https://msrc.microsoft.com: March 2025 Security Updates
- https://detect-respond.blogspot.com: Pyramid Of Pain
- https://www.atomicredteam.io: Atomic Read Team
- https://www.ecb.europa.eu/paym/cyber-resilience/tiber-eu/html/index.en.html
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too. -
Enjoying the content? Let us know your feedback!
In this episode, we’ll be exploring a particularly intriguing file types: polyglot files. These digital shapeshifters have become a powerful tool in the arsenal of cyber attackers, capable of bypassing security measures, confusing systems, and delivering malicious payloads in ways that are both creative and devastating.
UEFI Secure Boot bypass vulnerability
Over the next 20 to 30 minutes or so, we’ll break down what polyglot files are, how they work, and why they’re so dangerous. We’ll also examine some real-world examples where polyglot files were used in cyberattacks. We will reference the MITRE ATT&CK framework to understand how these techniques fit into the broader landscape of adversarial tactics. Finally, we’ll discuss mitigation strategies and close with a cybersecurity myth that needs busting
Before we dive into the main topic, lets glance what is happening on the security front:- https://en.wikipedia.org: Polyglot
- https://attack.mitre.org: Masquerading
- https://arxiv.org: Where the Polyglots Are: How Polyglot Files Enable Cyber Attack Chains and Methods for Detection & Disarmament
- https://medium.com: Polyglot Files A Hackers Best Friend
- https://www.bleepingcomputer.com: New polyglot malware hits aviation, satellite communication firms
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too. -
Enjoying the content? Let us know your feedback!
In today's episode, we're diving deep into Data Exfiltration; one of the most serious threats facing organizations today.
News: Caldera Vulnerability
We'll break down exactly what data exfiltration is, where it fits in the MITRE ATT&CK framework, the tools and techniques attackers use, and, most importantly, how organizations can defend themselves. We’ll also cover real-world examples, including publicly known cases that had major consequences.
So, whether you're a seasoned security professional or just starting out in the field, stick around as we unravel the methods attackers use and how to stop them.
First lets look at one of the trending security news this week, and that is:- https://github.com/mitre/caldera: Security Notice
- https://nvd.nist.gov: CVE-2025-27364
- https://medium.com: MITRE Caldera Security Advisory — Remote Code Execution (CVE-2025–27364)
- https://www.mitre.org: Caldera
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too. -
Enjoying the content? Let us know your feedback!
We are continuing with part 2 of "Behind the Login Screen - Understanding OS Authentication." If you missed our first episode, I highly recommend giving it a listen before diving into today's content. In part one, we started to explore the fascinating world of operating system authentications, focusing on Windows, Linux/Unix, and Mac OS. We discussed how hashes are used in authentication, the concept of salt in passwords, rainbow table attacks.
In today's episode, we'll build on that foundation and delve even deeper into the topic of OS authentication mechanisms. So again, if you haven't already, make sure to catch up on part one to get the full picture.
Now, let's get started with part two of our journey into the world of OS authentication! lets look at one of the trending security news this week, and that is:
- Newly discovered OpenSSH vulnerabilities.- https://blog.qualys.com: Qualys TRU Discovers Two Vulnerabilities in OpenSSH: CVE-2025-26465 & CVE-2025-26466
- https://learn.microsoft.com: Kerberos Authentication Overview
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too. -
Enjoying the content? Let us know your feedback!
In today's episode, we're going to explore the fascinating topic of operating systems authentications. We all use it but how many of us wondered how the behind the curtains machinery work. We'll be focusing on Windows, Linux/Unix, and Mac OS. We'll discuss how hashes are used in authentication, the concept of salt in passwords, rainbow table attacks and their countermeasures, the benefits of password-less authentication using hardware keys, password cracking, the shadow file in Unix/Linux, and the mechanics of how each OS protects passwords and how attackers try to circumvent these protections.
Scareware blocker, now available in Microsoft Edge- https://blogs.windows.com: Stand Up To Scareware With Scareware Blocker
- https://learn.microsoft.com: Kerberos Authentication Overview
- https://www.microsoft.com: Scareware Blocker
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too. -
Enjoying the content? Let us know your feedback!
As AI-generated content becomes more advanced, the risk of adversarial misuse—where bad actors manipulate AI for malicious purposes—has skyrocketed. But what does this mean in practical terms? What risks do we face, and how one of the big players is addressing them? Stick around as we break Google’s Adversarial Misuse of Generative AI report, explain the key jargon, and bust a cybersecurity myth at the end of the show.
Microsoft has expanded its Windows 11 administrator protection tests
Before we get into the main topic, lets have a look at one important news update, and that is:- https://cloud.google.com: Adversarial Misuse of Generative AI
- https://deepmind.google: Mapping the misuse of generative AI
- https://learn.microsoft.com: User Account Control overview
- https://learn.microsoft.com: How User Account Control works
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too. -
Enjoying the content? Let us know your feedback!
Today, we’ve got something really exciting for you. If you’ve been following the world of artificial intelligence lately, you’ve probably heard a lot about a new player in town: DeepSeek.
Now, let me tell you, DeepSeek is shaking things up. They’re doing something completely different that’s not only disrupting the AI space but could also be a game-changer in how we approach cost, performance, and security in the future of AI technology. So, grab a seat on a solid ground and buckle up—this week, we’re diving into how **DeepSeek** is leveling the playing field for AI vendors everywhere, cutting costs, and leveraging some really smart techniques that are turning heads in the industry.
And, of course, at the end of today’s episode, we’ll be busting a big cybersecurity myth that might surprise you. But first, let’s talk all things DeepSeek.
Before we dive into the main, we will also bring you update todate on the news front:
- Deepseek date breach. Yes they were hit already!- https://www.technologyreview.com: How DeepSeek
ripped up the AI playbook—and why everyone’s going to follow its lead- https://www.digitaltrends.com: Microsoft is letting anyone use ChatGPT’s $200 reasoning model for free
- https://www.wiz.io: Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information, Including Chat History
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too. -
Enjoying the content? Let us know your feedback!
In this episode we will detail the significant announcement from Let’s Encrypt – the trusted nonprofit Certificate Authority that has been at the forefront of making the web more secure.
Let’s Encrypt has revealed its plans to drastically reduce the lifetime of its TLS certificates from 90 days to just 6 days. This decision, outlined in their 2024 annual report, is aimed at strengthening the security of online communications by minimizing the risks associated with compromised keys. But what does this mean for website owners, IT administrators, and the broader cybersecurity landscape? That’s what we’ll explore in detail today.
- https://community.letsencrypt.org: 2024 ISRG Annual Report
- https://www.malwarebytes.com: 7-zip bug could allow a bypass of a windows security feature update now
- https://digital.nhs.uk: Proof-of-Concept Exploit Released for CVE-2025-0411 in 7-ZipBe sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too. -
Enjoying the content? Let us know your feedback!
This episode is one for you system admins out there! Today we’re discussing three actively exploited vulnerabilities you absolutely need to know about—CVE-2025-21333, CVE-2025-21334, and CVE-2025-21335. These vulnerabilities have been making headlines, and understanding them could mean the difference between staying secure and falling victim to a breach.
Microsoft dropped the January Patch Tuesday and boy was it a whopper! We will dig into the details in more ways than one!
We’ll explore what these vulnerabilities are, how they’re being exploited, the adversaries leveraging them, and what organizations and individuals can do to protect themselves. And, as always, we’ll break down the jargon and bust a popular cybersecurity myth towards the end of the show.
Before we get into the main topic, lets recap the top security news this week- https://isc.sans.edu: Microsoft January 2025 Patch Tuesday
- https://www.theregister.com: Microsoft fixes under-attack privilege-escalation holes in Hyper-VBe sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too. - Daha fazla göster