Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
headphones
YusufOnSecurity.com

YusufOnSecurity.com

YusufOnSecurity.Com

This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!

Share icon

All episodes

Best episodes

Top 10 YusufOnSecurity.com Episodes

Goodpods has curated a list of the 10 best YusufOnSecurity.com episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to YusufOnSecurity.com for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite YusufOnSecurity.com episode by adding your comments to the episode page.

YusufOnSecurity.com - 159 - The Hidden Risks of Default Configurations - Part 1
play

02/17/24 • 37 min

Enjoying the content? Let us know your feedback!

In today's interconnected world, default configurations are ubiquitous across various systems and devices, from routers to software applications. While convenient for initial setup, these default settings often harbor significant security risks that can leave systems vulnerable to exploitation by malicious actors. In this episode, we delve into the hidden dangers posed by default configurations, exploring real-world examples and discussing strategies to mitigate these risks effectively. Join us as we uncover the critical importance of securing systems against the perils of default settings.
Before that, lets recap on what is top of mind on the news front.

  • The toothbrush DDOS that never was
  • Your favorite browser might have a feature that defends your home network

https://www.forbes.com: Surprising 3 million hacked toothbrushes story goes viral is it true?
- https://chromestatus.com: Private Network Access
- https://owasp.org: Security Misconfiguration/

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

bookmark
plus icon
share episode
YusufOnSecurity.com - 209 - DeepSeek

209 - DeepSeek

YusufOnSecurity.com

play

02/01/25 • 28 min

Enjoying the content? Let us know your feedback!

Today, we’ve got something really exciting for you. If you’ve been following the world of artificial intelligence lately, you’ve probably heard a lot about a new player in town: DeepSeek.
Now, let me tell you, DeepSeek is shaking things up. They’re doing something completely different that’s not only disrupting the AI space but could also be a game-changer in how we approach cost, performance, and security in the future of AI technology. So, grab a seat on a solid ground and buckle up—this week, we’re diving into how **DeepSeek** is leveling the playing field for AI vendors everywhere, cutting costs, and leveraging some really smart techniques that are turning heads in the industry.
And, of course, at the end of today’s episode, we’ll be busting a big cybersecurity myth that might surprise you. But first, let’s talk all things DeepSeek.
Before we dive into the main, we will also bring you update todate on the news front:
- Deepseek date breach. Yes they were hit already!

https://www.technologyreview.com: How DeepSeek
ripped up the AI playbook—and why everyone’s going to follow its lead

https://www.digitaltrends.com: Microsoft is letting anyone use ChatGPT’s $200 reasoning model for free

https://www.wiz.io: Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information, Including Chat History

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

bookmark
plus icon
share episode

Enjoying the content? Let us know your feedback!

Today, we’re tackling a fundamental yet often misunderstood tool in every cybersecurity professional's arsenal—vulnerability scanners. What role do they play in protecting our organizations? Where do they shine, and where do they fall short?
As always, we’ll cut through the jargon and break things down for everyone—from seasoned professionals to those just beginning their journey in cybersecurity. And stick around until the end for this week’s myth-busting segment, where we debunk a misconception about cyber security in general that many people still believe.
So grab your favorite beverage, get set, and let’s dive right in!

  • Tenable Scanner Agent went offline globally

All that coming up next, in this week episode.
- https://docs.tenable.com: Tenable Nessus Agent 2025 Release Notes
- https://www.splunk.com: Vulnerability Scanners Primer

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

bookmark
plus icon
share episode
YusufOnSecurity.com - 145 - Indication of compromise best practice
play

11/11/23 • 51 min

Enjoying the content? Let us know your feedback!

Welcome back and thank you for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
I'm your your host Ibrahim Yusuf
In today's episode, we're shedding light on a critical yet often overlooked aspect of cybersecurity - Indications of Compromise, also known as IOCs. These vital pieces of forensic data can be the canary in the coal mine, alerting us to potential network intrusions before they wreak havoc on our systems.
We'll discuss what IOCs are, why they are essential, and how you can use them proactively to enhance your cybersecurity strategy.
But first, a quick look on what is top of mind in the security news this week.

  • NCSC releases more details designed to help organisations how to migrate to post-quantum crypto
  • The source of Okta breach....no price for guessing

https://www.ncsc.gov.uk: Next steps preparing for post quantum cryptography
- https://www.linkedin.com: Okta data breach lesson browser security
- https://www.scmagazine.com: Okta breach linked to workers personal google account
- https://www.attackiq.com: Pyramid of pain
- https://github.com/Cisco-Talos: IOCs
- https://sec.cloudapps.cisco.com: Indication Of Compromise Reference Guide

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

bookmark
plus icon
share episode
YusufOnSecurity.com - 129 - What is new in PCI DSS v4.0?
play

07/22/23 • 40 min

Enjoying the content? Let us know your feedback!

Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
This is another exciting episode of our cybersecurity podcast! Today, we've got a topic that's hot off the press—the newly released Payment Card Industry Data Security Standard version 4, or PCI DSS v4. If you're in the world of payments, data security, or simply curious about the latest in safeguarding your customers' sensitive information, this episode is a must-listen.
In this edition, we'll explore the key updates and changes in PCI DSS v4, the reasons behind its release, and what it means for businesses processing credit card transactions. From enhanced authentication measures to the latest encryption protocols, the new standard promises to fortify data protection and combat emerging cyber threats.
So, get ready to dive into the cutting-edge world of PCI DSS v4 as we unravel the advancements that'll shape the future of secure payment processing. Let's jump right in with the start of this week's top trending news.

  • Accidental VirusTotal upload is a valuable reminder to double check what you share
  • Microsoft allows logging access to all their license tiers like E3

https://support.virustotal.com:How it works
https://www.virustotal.com: Upload
https://www.bleepingcomputer.com: Stolen Microsoft key offered widespread access to Microsoft cloud services
https://www.bleepingcomputer.com: Microsoft expands access to cloud logging data for free after Exchange hacks
https://listings.pcisecuritystandards.org: PCI-DSS-v3-2-1 to v4-0 Summary of Changes

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

bookmark
plus icon
share episode

Enjoying the content? Let us know your feedback!

Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
Today, we continue with part 2 the critical aspect of cybersecurity: incident response best practices. Given the unforgiving threat landscape, organizations face an ever-increasing number of cyber threats. Whether it's a data breach, a malware attack, or a network intrusion, incidents can disrupt operations, compromise sensitive information, and damage reputation. That's why having an effective incident response strategy is crucial. In this episode, we'll explore the key principles and strategies behind incident response best practices. We'll discuss the steps organizations should take to prepare, detect, respond, and recover from security incidents.
But before that, we will recap other trending security news including:

https://www.sans.org/tools/: The Pyramid Of Pain
- https://support.microsoft.com:Microsoft edge secure network to protect your browsing
- https://www.theverge.com: Meta Instagram threads
- https://talosintelligence.com: Incident Response Plans
- https://www.sans.org: Incident Response Cycle
- https://www.cisco.co: Incident Response Services

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

bookmark
plus icon
share episode

Enjoying the content? Let us know your feedback!

Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
Today we dive deep into the key takeaways of the highly anticipated Version Data Breach Investigation Report.
In a world where data breaches have become all too common, understanding the intricacies and lessons from these incidents is more important than ever. The Verizon Data Breach Investigation Report (DBIR), compiled by a team of expert analysts, provides invaluable insights into the causes, impacts, and preventive measures surrounding a significant breach that rocked the tech industry.

  • Fortinet fixes critical REC vulnerability in FortiNAC
  • Vendor contractor account abuse

https://www.fortiguard.com: FortiNAC - Argument injection in XML interface on port tcp/5555- https://cve.report: CVE-2023-33299- https://blog.talosintelligence.com: Vendor contractor account abuse-https://www.verizon.com: DBIR

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

bookmark
plus icon
share episode

Enjoying the content? Let us know your feedback!

Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
In the second part of the podcast, we'll delve further into the different types of email security protocols and explore how they can be implemented to enhance the security of your email communications. We'll discuss the benefits of end-to-end encryption, which ensures that only the intended recipient can access the content of your emails, as well as the importance of authentication mechanisms. We'll also explore the role of digital signatures in verifying the authenticity and integrity of email messages. By the end of this episode, you'll have a better understanding of how to protect your sensitive information from cyber threats and ensure the confidentiality of your email communications.
If you have not listen to episode 1, I suggest you listen to the first before you listen to this episode.
In addition, we will recap other trending security news including:

  • Google rolls out passkey login for all accounts
  • Mirai-iot-botnet is exploiting-tp-link-router you need to patch it now

https://users.ece.cmu.edu: PGP intro
- https://www.cisco.com: S/MIME
- https://www.cisco.com: Registered envelope service
- https://security.googleblog.com: So long passwords thanks for all phish
- https://duo.com: Mirai botnet attackers exploit TP-Link bug

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

bookmark
plus icon
share episode
YusufOnSecurity.com - 103 - What is NetFlow Protocol used for? - Part 1
play

01/21/23 • 32 min

Enjoying the content? Let us know your feedback!

Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
This week, lets have look at one of those protocols that often under-used by analyst. It is a way to look at the data that traverse your network to pinpoint what might be lurking beneath the surface. We will cover this in two parts. This is part 1. More on that later.
In addition, we will recap other trending security news includes:

  • Microsoft is knocking on the door to see if you are sitting on an unsupported uninstalling
  • Old Cisco Routers susceptible to RCE attack

https://sec.cloudapps.cisco.com: Cisco Small Business RV016, RV042, RV042G, and RV082 Routers Vulnerabilities
- https://support.microsoft.com: Update for Office 2013 Office 2010 and Office 2007
- https://ipcisco.com: Netflow and Netflow Configuration

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

bookmark
plus icon
share episode
YusufOnSecurity.com - 202 - Volt Typhoon

202 - Volt Typhoon

YusufOnSecurity.com

play

12/14/24 • 36 min

Enjoying the content? Let us know your feedback!

In this week's episode, we’re diving into a concerning and highly consequential topic: the Volt Typhoon espionage campaign—an advanced persistent threat that has sent shockwaves through the cybersecurity and telecommunications industries.
Volt Typhoon, a state-backed APT group, has been making headlines for its stealthy and highly sophisticated attacks on telecom networks. In this episode, we’ll dissect the technical details of this malware campaign, the vulnerabilities it exploited, and the regulatory loopholes that attackers took advantage of. We’ll also explore lessons the industry can learn to bolster defenses and, as always, bust a common cybersecurity myth along the way.
As always, we will break down all the jargon so that anyone can understand. Whatever you are doing, settle in or keep your eyes on the road, and let’s get started.
Before we get into the main topic, we will start with a recap of top trending security news this week...and that is:

  • The Last Patch Tuesday

https://msrc.microsoft.com: Microsoft - December 2024 Security Updates
- https://www.cisa.gov: CISA and Partners Release Joint Fact Sheet for Leaders on PRC-sponsored Volt Typhoon Cyber Activity
- https://www.cisco.com: China APT’s, Volt Typhoon, and what to do!
- https://www.fcc.gov: Communications Assistance for Law Enforcement Act

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

bookmark
plus icon
share episode

Show more best episodes

Toggle view more icon

FAQ

How many episodes does YusufOnSecurity.com have?

YusufOnSecurity.com currently has 221 episodes available.

What topics does YusufOnSecurity.com cover?

The podcast is about Security, Podcasts, Technology, Cyber Security and Virus.

What is the most popular episode on YusufOnSecurity.com?

The episode title '177 - The Importance Of Automation And Orchestration In Cyber Security - Part 2' is the most popular.

What is the average episode length on YusufOnSecurity.com?

The average episode length on YusufOnSecurity.com is 37 minutes.

How often are episodes of YusufOnSecurity.com released?

Episodes of YusufOnSecurity.com are typically released every 7 days.

When was the first episode of YusufOnSecurity.com?

The first episode of YusufOnSecurity.com was released on Feb 6, 2021.

Show more FAQ

Toggle view more icon

Comments