
YusufOnSecurity.com
YusufOnSecurity.Com
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
All episodes
Best episodes
Top 10 YusufOnSecurity.com Episodes
Goodpods has curated a list of the 10 best YusufOnSecurity.com episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to YusufOnSecurity.com for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite YusufOnSecurity.com episode by adding your comments to the episode page.

159 - The Hidden Risks of Default Configurations - Part 1
YusufOnSecurity.com
02/17/24 • 37 min
Enjoying the content? Let us know your feedback!
In today's interconnected world, default configurations are ubiquitous across various systems and devices, from routers to software applications. While convenient for initial setup, these default settings often harbor significant security risks that can leave systems vulnerable to exploitation by malicious actors. In this episode, we delve into the hidden dangers posed by default configurations, exploring real-world examples and discussing strategies to mitigate these risks effectively. Join us as we uncover the critical importance of securing systems against the perils of default settings.
Before that, lets recap on what is top of mind on the news front.
- The toothbrush DDOS that never was
- Your favorite browser might have a feature that defends your home network
https://www.forbes.com: Surprising 3 million hacked toothbrushes story goes viral is it true?
- https://chromestatus.com: Private Network Access
- https://owasp.org: Security Misconfiguration/
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

209 - DeepSeek
YusufOnSecurity.com
02/01/25 • 28 min
Enjoying the content? Let us know your feedback!
Today, we’ve got something really exciting for you. If you’ve been following the world of artificial intelligence lately, you’ve probably heard a lot about a new player in town: DeepSeek.
Now, let me tell you, DeepSeek is shaking things up. They’re doing something completely different that’s not only disrupting the AI space but could also be a game-changer in how we approach cost, performance, and security in the future of AI technology. So, grab a seat on a solid ground and buckle up—this week, we’re diving into how **DeepSeek** is leveling the playing field for AI vendors everywhere, cutting costs, and leveraging some really smart techniques that are turning heads in the industry.
And, of course, at the end of today’s episode, we’ll be busting a big cybersecurity myth that might surprise you. But first, let’s talk all things DeepSeek.
Before we dive into the main, we will also bring you update todate on the news front:
- Deepseek date breach. Yes they were hit already!
https://www.technologyreview.com: How DeepSeek
ripped up the AI playbook—and why everyone’s going to follow its lead
https://www.digitaltrends.com: Microsoft is letting anyone use ChatGPT’s $200 reasoning model for free
https://www.wiz.io: Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information, Including Chat History
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

205 - Vulnerability Scanners-The Heroes and Hidden Limits of Cybersecurity
YusufOnSecurity.com
01/04/25 • 28 min
Enjoying the content? Let us know your feedback!
Today, we’re tackling a fundamental yet often misunderstood tool in every cybersecurity professional's arsenal—vulnerability scanners. What role do they play in protecting our organizations? Where do they shine, and where do they fall short?
As always, we’ll cut through the jargon and break things down for everyone—from seasoned professionals to those just beginning their journey in cybersecurity. And stick around until the end for this week’s myth-busting segment, where we debunk a misconception about cyber security in general that many people still believe.
So grab your favorite beverage, get set, and let’s dive right in!
- Tenable Scanner Agent went offline globally
All that coming up next, in this week episode.
- https://docs.tenable.com: Tenable Nessus Agent 2025 Release Notes
- https://www.splunk.com: Vulnerability Scanners Primer
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

145 - Indication of compromise best practice
YusufOnSecurity.com
11/11/23 • 51 min
Enjoying the content? Let us know your feedback!
Welcome back and thank you for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
I'm your your host Ibrahim Yusuf
In today's episode, we're shedding light on a critical yet often overlooked aspect of cybersecurity - Indications of Compromise, also known as IOCs. These vital pieces of forensic data can be the canary in the coal mine, alerting us to potential network intrusions before they wreak havoc on our systems.
We'll discuss what IOCs are, why they are essential, and how you can use them proactively to enhance your cybersecurity strategy.
But first, a quick look on what is top of mind in the security news this week.
- NCSC releases more details designed to help organisations how to migrate to post-quantum crypto
- The source of Okta breach....no price for guessing
https://www.ncsc.gov.uk: Next steps preparing for post quantum cryptography
- https://www.linkedin.com: Okta data breach lesson browser security
- https://www.scmagazine.com: Okta breach linked to workers personal google account
- https://www.attackiq.com: Pyramid of pain
- https://github.com/Cisco-Talos: IOCs
- https://sec.cloudapps.cisco.com: Indication Of Compromise Reference Guide
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

129 - What is new in PCI DSS v4.0?
YusufOnSecurity.com
07/22/23 • 40 min
Enjoying the content? Let us know your feedback!
Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
This is another exciting episode of our cybersecurity podcast! Today, we've got a topic that's hot off the press—the newly released Payment Card Industry Data Security Standard version 4, or PCI DSS v4. If you're in the world of payments, data security, or simply curious about the latest in safeguarding your customers' sensitive information, this episode is a must-listen.
In this edition, we'll explore the key updates and changes in PCI DSS v4, the reasons behind its release, and what it means for businesses processing credit card transactions. From enhanced authentication measures to the latest encryption protocols, the new standard promises to fortify data protection and combat emerging cyber threats.
So, get ready to dive into the cutting-edge world of PCI DSS v4 as we unravel the advancements that'll shape the future of secure payment processing. Let's jump right in with the start of this week's top trending news.
- Accidental VirusTotal upload is a valuable reminder to double check what you share
- Microsoft allows logging access to all their license tiers like E3
https://support.virustotal.com:How it works
https://www.virustotal.com: Upload
https://www.bleepingcomputer.com: Stolen Microsoft key offered widespread access to Microsoft cloud services
https://www.bleepingcomputer.com: Microsoft expands access to cloud logging data for free after Exchange hacks
https://listings.pcisecuritystandards.org: PCI-DSS-v3-2-1 to v4-0 Summary of Changes
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

128 - How to Achieve Cyber Resilience - Best Practices for Effective Incident Response - Part 2
YusufOnSecurity.com
07/15/23 • 44 min
Enjoying the content? Let us know your feedback!
Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
Today, we continue with part 2 the critical aspect of cybersecurity: incident response best practices. Given the unforgiving threat landscape, organizations face an ever-increasing number of cyber threats. Whether it's a data breach, a malware attack, or a network intrusion, incidents can disrupt operations, compromise sensitive information, and damage reputation. That's why having an effective incident response strategy is crucial. In this episode, we'll explore the key principles and strategies behind incident response best practices. We'll discuss the steps organizations should take to prepare, detect, respond, and recover from security incidents.
But before that, we will recap other trending security news including:
- https://the-decoder.com: ChatGPT with no ethical boundaries WormGPT fuels AI generated scams
- https://www.group-ib.com: Digital Risk Report 2023
https://www.sans.org/tools/: The Pyramid Of Pain
- https://support.microsoft.com:Microsoft edge secure network to protect your browsing
- https://www.theverge.com: Meta Instagram threads
- https://talosintelligence.com: Incident Response Plans
- https://www.sans.org: Incident Response Cycle
- https://www.cisco.co: Incident Response Services
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

125 - Verizon Data breach Investigation Report - Key Takeaways
YusufOnSecurity.com
06/24/23 • 32 min
Enjoying the content? Let us know your feedback!
Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
Today we dive deep into the key takeaways of the highly anticipated Version Data Breach Investigation Report.
In a world where data breaches have become all too common, understanding the intricacies and lessons from these incidents is more important than ever. The Verizon Data Breach Investigation Report (DBIR), compiled by a team of expert analysts, provides invaluable insights into the causes, impacts, and preventive measures surrounding a significant breach that rocked the tech industry.
- Fortinet fixes critical REC vulnerability in FortiNAC
- Vendor contractor account abuse
https://www.fortiguard.com: FortiNAC - Argument injection in XML interface on port tcp/5555- https://cve.report: CVE-2023-33299- https://blog.talosintelligence.com: Vendor contractor account abuse-https://www.verizon.com: DBIR
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

118 - Sealed and delivered - Understanding How Email Protocols Keep You Secure - Part 2
YusufOnSecurity.com
05/06/23 • 44 min
Enjoying the content? Let us know your feedback!
Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
In the second part of the podcast, we'll delve further into the different types of email security protocols and explore how they can be implemented to enhance the security of your email communications. We'll discuss the benefits of end-to-end encryption, which ensures that only the intended recipient can access the content of your emails, as well as the importance of authentication mechanisms. We'll also explore the role of digital signatures in verifying the authenticity and integrity of email messages. By the end of this episode, you'll have a better understanding of how to protect your sensitive information from cyber threats and ensure the confidentiality of your email communications.
If you have not listen to episode 1, I suggest you listen to the first before you listen to this episode.
In addition, we will recap other trending security news including:
- Google rolls out passkey login for all accounts
- Mirai-iot-botnet is exploiting-tp-link-router you need to patch it now
https://users.ece.cmu.edu: PGP intro
- https://www.cisco.com: S/MIME
- https://www.cisco.com: Registered envelope service
- https://security.googleblog.com: So long passwords thanks for all phish
- https://duo.com: Mirai botnet attackers exploit TP-Link bug
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

103 - What is NetFlow Protocol used for? - Part 1
YusufOnSecurity.com
01/21/23 • 32 min
Enjoying the content? Let us know your feedback!
Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
This week, lets have look at one of those protocols that often under-used by analyst. It is a way to look at the data that traverse your network to pinpoint what might be lurking beneath the surface. We will cover this in two parts. This is part 1. More on that later.
In addition, we will recap other trending security news includes:
- Microsoft is knocking on the door to see if you are sitting on an unsupported uninstalling
- Old Cisco Routers susceptible to RCE attack
https://sec.cloudapps.cisco.com: Cisco Small Business RV016, RV042, RV042G, and RV082 Routers Vulnerabilities
- https://support.microsoft.com: Update for Office 2013 Office 2010 and Office 2007
- https://ipcisco.com: Netflow and Netflow Configuration
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

202 - Volt Typhoon
YusufOnSecurity.com
12/14/24 • 36 min
Enjoying the content? Let us know your feedback!
In this week's episode, we’re diving into a concerning and highly consequential topic: the Volt Typhoon espionage campaign—an advanced persistent threat that has sent shockwaves through the cybersecurity and telecommunications industries.
Volt Typhoon, a state-backed APT group, has been making headlines for its stealthy and highly sophisticated attacks on telecom networks. In this episode, we’ll dissect the technical details of this malware campaign, the vulnerabilities it exploited, and the regulatory loopholes that attackers took advantage of. We’ll also explore lessons the industry can learn to bolster defenses and, as always, bust a common cybersecurity myth along the way.
As always, we will break down all the jargon so that anyone can understand. Whatever you are doing, settle in or keep your eyes on the road, and let’s get started.
Before we get into the main topic, we will start with a recap of top trending security news this week...and that is:
- The Last Patch Tuesday
https://msrc.microsoft.com: Microsoft - December 2024 Security Updates
- https://www.cisa.gov: CISA and Partners Release Joint Fact Sheet for Leaders on PRC-sponsored Volt Typhoon Cyber Activity
- https://www.cisco.com: China APT’s, Volt Typhoon, and what to do!
- https://www.fcc.gov: Communications Assistance for Law Enforcement Act
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
Show more best episodes

Show more best episodes
FAQ
How many episodes does YusufOnSecurity.com have?
YusufOnSecurity.com currently has 221 episodes available.
What topics does YusufOnSecurity.com cover?
The podcast is about Security, Podcasts, Technology, Cyber Security and Virus.
What is the most popular episode on YusufOnSecurity.com?
The episode title '177 - The Importance Of Automation And Orchestration In Cyber Security - Part 2' is the most popular.
What is the average episode length on YusufOnSecurity.com?
The average episode length on YusufOnSecurity.com is 37 minutes.
How often are episodes of YusufOnSecurity.com released?
Episodes of YusufOnSecurity.com are typically released every 7 days.
When was the first episode of YusufOnSecurity.com?
The first episode of YusufOnSecurity.com was released on Feb 6, 2021.
Show more FAQ

Show more FAQ