Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
headphones
YusufOnSecurity.com

YusufOnSecurity.com

YusufOnSecurity.Com

This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!

bookmark
Share icon

All episodes

Best episodes

Top 10 YusufOnSecurity.com Episodes

Goodpods has curated a list of the 10 best YusufOnSecurity.com episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to YusufOnSecurity.com for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite YusufOnSecurity.com episode by adding your comments to the episode page.

YusufOnSecurity.com - 202 - Volt Typhoon

202 - Volt Typhoon

YusufOnSecurity.com

play

12/14/24 • 36 min

Enjoying the content? Let us know your feedback!

In this week's episode, we’re diving into a concerning and highly consequential topic: the Volt Typhoon espionage campaign—an advanced persistent threat that has sent shockwaves through the cybersecurity and telecommunications industries.
Volt Typhoon, a state-backed APT group, has been making headlines for its stealthy and highly sophisticated attacks on telecom networks. In this episode, we’ll dissect the technical details of this malware campaign, the vulnerabilities it exploited, and the regulatory loopholes that attackers took advantage of. We’ll also explore lessons the industry can learn to bolster defenses and, as always, bust a common cybersecurity myth along the way.
As always, we will break down all the jargon so that anyone can understand. Whatever you are doing, settle in or keep your eyes on the road, and let’s get started.
Before we get into the main topic, we will start with a recap of top trending security news this week...and that is:

  • The Last Patch Tuesday

https://msrc.microsoft.com: Microsoft - December 2024 Security Updates
- https://www.cisa.gov: CISA and Partners Release Joint Fact Sheet for Leaders on PRC-sponsored Volt Typhoon Cyber Activity
- https://www.cisco.com: China APT’s, Volt Typhoon, and what to do!
- https://www.fcc.gov: Communications Assistance for Law Enforcement Act

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

bookmark
plus icon
share episode

Enjoying the content? Let us know your feedback!

It is another week and another podcast shaw on YusufOnSecurity where we deep dive into the complex world of cybersecurity that concerns both professionals and anyone interested in how attackers continue to evolve their methods.
This week we will be covering advanced malware evasion techniques—strategies used by malicious software to avoid detection—and, crucially, the countermeasures that can help protect against these threats.
Before we get started, lets review a top trending piece of news this week....and that is:

  • SANS' Holiday Hack Challenge 2024 is Up

- https://www.sans.org: SANS' Holiday Hack Challenge 2024
- https://redcanary.com: Defense- Evasion Why Is It So Prominent How Can You Detect It?
- https://attack.mitre.org/tactics/TA0005/

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

bookmark
plus icon
share episode
YusufOnSecurity.com - 194 - Interview With Red Sift
play

10/19/24 • 33 min

Enjoying the content? Let us know your feedback!

This week's episode is an interview with Nadim Lahoud from Red Sift at GITEX the Global IT Expo that is held yearly in Dubai. It is the largest tech startup gathering in the world.
Redsift is a company that provides a cloud-based DMARC, DKIM and SPF configuration and management platform called OnDMARC. They also provide:
-Continuous certificate discovery and monitoring as well as
-Brand Trust through AI-driven brand impersonation discovery and monitoring.
Before we get into that we will recap the top trending security this week. That is:

  • FIDO Alliance Drafts New Protocol to Simplify Passkey Transfers Across Different Platforms

https://fidoalliance.org: Specifications Credential Exchange Specifications
- https://redsift.com: About Red Sift

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

bookmark
plus icon
share episode
YusufOnSecurity.com - 159 - The Hidden Risks of Default Configurations - Part 1
play

02/17/24 • 37 min

Enjoying the content? Let us know your feedback!

In today's interconnected world, default configurations are ubiquitous across various systems and devices, from routers to software applications. While convenient for initial setup, these default settings often harbor significant security risks that can leave systems vulnerable to exploitation by malicious actors. In this episode, we delve into the hidden dangers posed by default configurations, exploring real-world examples and discussing strategies to mitigate these risks effectively. Join us as we uncover the critical importance of securing systems against the perils of default settings.
Before that, lets recap on what is top of mind on the news front.

  • The toothbrush DDOS that never was
  • Your favorite browser might have a feature that defends your home network

https://www.forbes.com: Surprising 3 million hacked toothbrushes story goes viral is it true?
- https://chromestatus.com: Private Network Access
- https://owasp.org: Security Misconfiguration/

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

bookmark
plus icon
share episode
YusufOnSecurity.com - 145 - Indication of compromise best practice
play

11/11/23 • 51 min

Enjoying the content? Let us know your feedback!

Welcome back and thank you for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
I'm your your host Ibrahim Yusuf
In today's episode, we're shedding light on a critical yet often overlooked aspect of cybersecurity - Indications of Compromise, also known as IOCs. These vital pieces of forensic data can be the canary in the coal mine, alerting us to potential network intrusions before they wreak havoc on our systems.
We'll discuss what IOCs are, why they are essential, and how you can use them proactively to enhance your cybersecurity strategy.
But first, a quick look on what is top of mind in the security news this week.

  • NCSC releases more details designed to help organisations how to migrate to post-quantum crypto
  • The source of Okta breach....no price for guessing

https://www.ncsc.gov.uk: Next steps preparing for post quantum cryptography
- https://www.linkedin.com: Okta data breach lesson browser security
- https://www.scmagazine.com: Okta breach linked to workers personal google account
- https://www.attackiq.com: Pyramid of pain
- https://github.com/Cisco-Talos: IOCs
- https://sec.cloudapps.cisco.com: Indication Of Compromise Reference Guide

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

bookmark
plus icon
share episode
YusufOnSecurity.com - 129 - What is new in PCI DSS v4.0?
play

07/22/23 • 40 min

Enjoying the content? Let us know your feedback!

Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
This is another exciting episode of our cybersecurity podcast! Today, we've got a topic that's hot off the press—the newly released Payment Card Industry Data Security Standard version 4, or PCI DSS v4. If you're in the world of payments, data security, or simply curious about the latest in safeguarding your customers' sensitive information, this episode is a must-listen.
In this edition, we'll explore the key updates and changes in PCI DSS v4, the reasons behind its release, and what it means for businesses processing credit card transactions. From enhanced authentication measures to the latest encryption protocols, the new standard promises to fortify data protection and combat emerging cyber threats.
So, get ready to dive into the cutting-edge world of PCI DSS v4 as we unravel the advancements that'll shape the future of secure payment processing. Let's jump right in with the start of this week's top trending news.

  • Accidental VirusTotal upload is a valuable reminder to double check what you share
  • Microsoft allows logging access to all their license tiers like E3

https://support.virustotal.com:How it works
https://www.virustotal.com: Upload
https://www.bleepingcomputer.com: Stolen Microsoft key offered widespread access to Microsoft cloud services
https://www.bleepingcomputer.com: Microsoft expands access to cloud logging data for free after Exchange hacks
https://listings.pcisecuritystandards.org: PCI-DSS-v3-2-1 to v4-0 Summary of Changes

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

bookmark
plus icon
share episode

Enjoying the content? Let us know your feedback!

Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
Today, we continue with part 2 the critical aspect of cybersecurity: incident response best practices. Given the unforgiving threat landscape, organizations face an ever-increasing number of cyber threats. Whether it's a data breach, a malware attack, or a network intrusion, incidents can disrupt operations, compromise sensitive information, and damage reputation. That's why having an effective incident response strategy is crucial. In this episode, we'll explore the key principles and strategies behind incident response best practices. We'll discuss the steps organizations should take to prepare, detect, respond, and recover from security incidents.
But before that, we will recap other trending security news including:

https://www.sans.org/tools/: The Pyramid Of Pain
- https://support.microsoft.com:Microsoft edge secure network to protect your browsing
- https://www.theverge.com: Meta Instagram threads
- https://talosintelligence.com: Incident Response Plans
- https://www.sans.org: Incident Response Cycle
- https://www.cisco.co: Incident Response Services

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

bookmark
plus icon
share episode

Enjoying the content? Let us know your feedback!

Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
Today, we delve into a critical aspect of cybersecurity: incident response best practices. Given the unforgiving threat landscape, organizations face an ever-increasing number of cyber threats. Whether it's a data breach, a malware attack, or a network intrusion, incidents can disrupt operations, compromise sensitive information, and damage reputation. That's why having an effective incident response strategy is crucial. In this episode, we'll explore the key principles and strategies behind incident response best practices. We'll discuss the steps organizations should take to prepare, detect, respond, and recover from security incidents.
But before that, we will recap other trending security news including:
  • Microsoft Edge free built-in VPN
  • Meta's twitter alternative

https://www.sans.org/tools/: The Pyramid Of Pain
- https://support.microsoft.com:Microsoft edge secure network to protect your browsing
- https://www.theverge.com: Meta Instagram threads
- https://talosintelligence.com: Incident Response Plans
- https://www.sans.org: Incident Response Cycle
- https://www.cisco.co: Incident Response Services

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

bookmark
plus icon
share episode

Enjoying the content? Let us know your feedback!

Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
Today we dive deep into the key takeaways of the highly anticipated Version Data Breach Investigation Report.
In a world where data breaches have become all too common, understanding the intricacies and lessons from these incidents is more important than ever. The Verizon Data Breach Investigation Report (DBIR), compiled by a team of expert analysts, provides invaluable insights into the causes, impacts, and preventive measures surrounding a significant breach that rocked the tech industry.

  • Fortinet fixes critical REC vulnerability in FortiNAC
  • Vendor contractor account abuse

https://www.fortiguard.com: FortiNAC - Argument injection in XML interface on port tcp/5555- https://cve.report: CVE-2023-33299- https://blog.talosintelligence.com: Vendor contractor account abuse-https://www.verizon.com: DBIR

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

bookmark
plus icon
share episode
YusufOnSecurity.com - 204 - Recap of the best episodes of 2024
play

12/28/24 • 91 min

Enjoying the content? Let us know your feedback!

This final episode of 2024, we recap the best the most listened to episodes of the year. And this year we have a great four back to back of the greatest of them all.
Lets start with the first eisode 191 - Is The Browser The New Operating System? released on the 28th of September. Next is episode 172 - SSL VPN versus IPsec VPN - Part 1 and part 2 released 18th of May and 25 of May respectively.
And finally Episode 191 - APIs and Webhooks released on the the 5th October.
Enjoy and see you in the new year!

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

bookmark
plus icon
share episode

Show more best episodes

Toggle view more icon

FAQ

How many episodes does YusufOnSecurity.com have?

YusufOnSecurity.com currently has 204 episodes available.

What topics does YusufOnSecurity.com cover?

The podcast is about Security, Podcasts, Technology, Cyber Security and Virus.

What is the most popular episode on YusufOnSecurity.com?

The episode title '177 - The Importance Of Automation And Orchestration In Cyber Security - Part 2' is the most popular.

What is the average episode length on YusufOnSecurity.com?

The average episode length on YusufOnSecurity.com is 37 minutes.

How often are episodes of YusufOnSecurity.com released?

Episodes of YusufOnSecurity.com are typically released every 7 days.

When was the first episode of YusufOnSecurity.com?

The first episode of YusufOnSecurity.com was released on Feb 6, 2021.

Show more FAQ

Toggle view more icon

Comments