
CISO Insights: Voices in Cybersecurity
465 episodes — Page 7 of 10

Ep 1655th Gen Digital Battleground: Geopolitical Messaging in the AI Era
This episode explores how geopolitical actors, particularly Russia and China, precisely adapt their messaging in response to global events and for specific audiences. We'll delve into their sophisticated strategies, from opportunistically exploiting major events like the US elections and the Ukraine war to crafting diverse narratives tailored for platforms such as X, Telegram, and TikTok. Discover how artificial intelligence (AI) is increasingly prominent, accelerating content creation and amplification to reshape the landscape of information warfare. www.myprivacy.blog/navigating-the-digital-fog-how-geopolitical-actors-manipulate-information-in-the-ai-era breached.company/the-ghost-in-the-machine-unpacking-psyops-and-5th-gen-warfare-in-the-ai-era https://socmed.myprivacy.blog

Ep 164Invisible Hands, Tangible Damage: The Evolution of Cyber-Physical Attacks
Join us as we explore the alarming evolution of cyber-physical attacks, where digital breaches cause real-world damage and disrupt critical infrastructure. We dive into the "Cyber-Physical Six" – Stuxnet, BlackEnergy, Industroyer, Trisis, Industroyer 2, and Incontroller – which are the only known cyber-physical incidents to date, each representing a significant leap in threat capability. Discover how adversaries have advanced their sophistication, expanded their capabilities to target everything from energy grids to safety instrumented systems, and refined their attack vectors to infiltrate OT network. www.securitycareers.help/beyond-it-what-the-cyber-physical-six-teach-every-ciso-about-enterprise-security www.secureiotoffice.world/beyond-the-firewall-why-your-iot-office-needs-to-learn-from-industrial-cyber-attacks https://ssaephysicalsecurity.com/ https://socassessment.com

Ep 163The Forensic Files: Cyber Incidents Unpacked
Dive into the intricate world of digital forensics, the specialized field dedicated to uncovering and interpreting electronic evidence after a cyber incident. This podcast explores how forensic experts meticulously identify, collect, preserve, and analyze digital artifacts to understand attack methods, trace perpetrators, and inform every phase of the incident response lifecycle, from detection to recovery. Learn why digital forensics is crucial for mitigating damage, enhancing collaboration with law enforcement, and continuously strengthening your organization's cyber resilience against evolving threats. breached.company/the-unseen-battleground-an-in-depth-look-at-digital-forensics-in-the-age-of-cybercrime

Ep 162Cyberattack Attribution: Bridging Borders and Laws
The increasing complexity and state sponsorship of cyber threats are blurring the lines between cybercrime and cyberwarfare, creating significant challenges for attributing attacks and impacting diplomatic relations. This episode explores how international cooperation through stronger alliances, new legal frameworks, and global rapid response networks can enhance cyberattack attribution and response capabilities. We'll discuss the crucial role of information sharing, standardized practices like the NIST Cybersecurity Framework, and the potential for international sanctions in building a resilient global cyber defense capable of adapting to evolving threats. breached.company/navigating-the-new-cyber-landscape-why-proactive-incident-response-and-global-cooperation-are-your-strongest-defenses https://incidentresponse.tools

Ep 161Cyber Insurance 2025: Why Your Security Posture is Your Policy
Your cybersecurity posture is no longer just about protection; it's the cornerstone of obtaining effective cyber insurance coverage and managing rising costs in 2025. With threats becoming more sophisticated and regulatory landscapes shifting, insurers are scrutinizing security measures more closely than ever, often making basic safeguards prerequisites for coverage. Understanding key requirements and demonstrating a robust, proactive security program—from implementing controls like MFA and EDR to fostering a security culture—is essential for navigating the complex cyber insurance market and securing favorable terms, potentially even reducing premiums. https://cisomarketplace.com/blog/cyber-insurance-2025-why-your-security-posture-is-your-most-important-policy https://cyberinsurancecalc.com

Ep 160Insider Threats and the Monitoring Tightrope: Balancing Security and Trust in Hybrid Work
Hybrid and remote work arrangements, accelerated by recent events, have significantly increased the challenge of detecting and mitigating insider threats from trusted individuals like employees and contractors who have authorized access to organizational resources. Employee monitoring technologies, such as User Activity Monitoring (UAM) and User Behavior Analytics (UBA) software, are widely employed as tools to observe employee activities and identify potential threat indicators in these distributed environments. However, the reliance on such surveillance raises critical concerns regarding employee trust, privacy, legal compliance, and the accurate assessment of job performance, necessitating a delicate balance to maintain a positive working climate and avoid counterproductive outcomes www.securitycareers.help/insider-threats-and-the-monitoring-tightrope-balancing-security-and-trust-in-hybrid-workplaces

Ep 159Beyond the Deal: Unseen Cyber Risks in M&A
Mergers and acquisitions are complex processes often driven by financial, operational, and positioning goals. However, critical cybersecurity risks, stemming from overlooked areas like integrating divergent security cultures, unknown user practices, and complex data separation, frequently go undiscussed during negotiations. This neglected perspective reveals challenges that can lead to breaches, failed integrations, and significant post-deal costs, impacting the deal's value and success. www.securitycareers.help/m-a-cyber-blind-spots-navigating-the-unseen-risks-a-cisos-view

Ep 158Tabletop Tactics: Rehearsing for Cyber Threats
A tabletop exercise is a discussion-based simulation designed to help teams determine how to respond to a crisis. These exercises provide a safe environment to test and refine an organization's incident response plan and identify weaknesses in processes. By engaging key personnel in simulated scenarios, tabletop exercises allow for practicing decision-making, communication, and coordination before an actual unexpected event occurs. www.securitycareers.help/assessing-and-enhancing-organizational-security-and-risk-management

Ep 157Mitigating Evolving Cyber Threats: The Power of Preparedness and Continuous Management
Evolving cyber threats are a significant business risk that boards and executives must oversee, moving beyond simply protecting systems to building resilience. This episode explores how a focus on preparedness, including robust incident response plans and regular testing, combined with continuous management like ongoing monitoring and adapting strategies, is essential for organizations to navigate the dynamic threat landscape. We discuss how these combined efforts enable businesses to respond and recover quickly, ensuring operations continue even when faced with an attack. www.securitycareers.help/mitigating-evolving-cyber-threats-building-resilience-through-preparedness-and-continuous-management

Ep 156Cybersecurity Posture: Methodologies, Mindsets, and Maturity
This episode delves into the essential methodologies and services organizations use to assess their cybersecurity posture. We explore techniques like Enterprise Risk Assessments, Threat Analysis, Vulnerability Management and Assessment, and Penetration Testing. Learn how understanding attacker tactics and human behavior through methods like Social Engineering Assessments and Red/Blue/Purple Teaming can reveal critical weaknesses in your defenses. Discover how these assessments inform strategic planning, prioritize investments, and build a more mature and resilient security program, often guided by frameworks like the NIST Cybersecurity Framework (CSF). www.securitycareers.help/beyond-the-firewall-why-understanding-attackers-and-human-nature-is-key-to-a-cybersecurity-career

Ep 155Securing the AI Frontier: Unmasking LLM and RAG Vulnerabilities
Large language models present new security challenges, especially when they leverage external data sources through Retrieval Augmented Generation (RAG) architectures . This podcast explores the unique attack techniques that exploit these systems, including indirect prompt injection and RAG poisoning. We delve into how offensive testing methods like AI red teaming are crucial for identifying and addressing these critical vulnerabilities in the evolving AI landscape. www.securitycareers.help/navigating-the-ai-frontier-a-cisos-perspective-on-securing-generative-ai/ www.hackernoob.tips/the-new-frontier-how-were-bending-generative-ai-to-our-will

Ep 154Cyber Resilience in Finance: Planning, Responding, and Recovering
The financial sector is a frequent target for cyberattacks, facing a staggering rise in cases and significant costs from data breaches. Preparing for these threats requires understanding ransomware-as-a-service (RaaS), phishing, and other malicious activities, as well as implementing robust cybersecurity programs and incident response plans. This episode explores effective strategies for planning, detecting, analyzing, containing, and recovering from cyber incidents to build cyber resilience and maintain trust in a rapidly evolving digital marketplace breached.company/the-expanding-shadow-unpacking-the-multifaceted-financial-costs-of-cybersecurity-incidents https://finemydata.com/ https://databreachcostcalculator.com/ https://irmaturityassessment.com/ https://ircost.breached.company/ https://cyberinsurancecalc.com/

Ep 153The Threat Horizon: DIA 2025 Global Security
The 2025 Worldwide Threat Assessment by the Defense Intelligence Agency describes a rapidly changing global security environment where national security threats are expanding, fueled by advanced technology. It identifies key regional security flashpoints, including threats to the U.S. Homeland and Southern Border, China's assertiveness in the Indo-Pacific (especially regarding Taiwan and the South China Sea), Russia's actions in Ukraine and its global influence, and Iran and its proxy forces in the Middle East. The assessment highlights the growing cooperation among U.S. competitors and adversaries—specifically China, Russia, Iran, and North Korea—who are strengthening ties, supporting each other in conflicts, collaborating to evade sanctions, and leveraging technology to undermine the influence of the United States and its allies. breached.company/navigating-the-threat-horizon-key-regional-flashpoints-and-their-global-implications-in-2025

Ep 152The Great Digital Crackdown of 2025: Inside the Global Fight Against Cybercrime
2025 saw unprecedented international law enforcement efforts shatter major cybercrime networks like the LummaC2 infostealer, the Cracked and Nulled forums, the 8Base ransomware gang, and the Zservers bulletproof hosting service. These coordinated operations, involving over 20 nations and resulting in thousands of server seizures, disrupted criminal infrastructure and affected millions of potential victims globally. However, criminal organizations are adapting by quickly attempting to rebuild infrastructure and fragmenting into more numerous groups, presenting ongoing challenges for law enforcement's sustained efforts. https://breached.company/global-cybercrime-takedowns-in-2025-a-year-of-unprecedented-law-enforcement-action

Ep 151Navigating the AI Compliance Maze: Building Trustworthy Systems in a Regulated World
Artificial intelligence is rapidly transforming industries, but its increasing power necessitates robust governance and compliance. This episode delves into the evolving global regulatory landscape, exploring key frameworks like the EU AI Act and the NIST AI Risk Management Framework that aim to ensure AI systems are safe, transparent, and accountable. We'll discuss the practical steps organizations must take to build effective AI compliance programs, manage risks, and foster trust while leveraging the benefits of AI www.compliancehub.wiki/navigating-the-ai-regulatory-maze-a-compliance-blueprint-for-trustworthy-ai www.securitycareers.help/building-trust-in-the-age-of-autonomous-systems-a-cisos-perspective-on-ai-governance https://airiskassess.com/ https://risk.quantumsecurity.ai/ https://globalcompliancemap.com/

Ep 150AI & The SOC Analyst: From Alert Fatigue to Augmentation
Discover how Artificial Intelligence is reshaping the demanding world of the Security Operations Center, moving beyond the overwhelming volume of alerts and analyst burnout that plague traditional SOCs. We explore how AI automates routine tasks, enhances threat detection, and accelerates incident response, freeing up human analysts for higher-value activities like threat hunting and complex investigations. Learn why human expertise remains crucial for critical decision-making and oversight in this evolving, augmented security landscape. www.securitycareers.help/building-the-ai-driven-soc-a-cisos-blueprint-for-enhanced-security-and-efficiency www.cisomarketplace.services www.generatepolicy.com www.cyberagent.exchange

Ep 149Cloud Threat Deep Dive: Learning Resilience from Real-World Breaches
Explore the latest cloud security landscape by analyzing recent real-world breach cases from the CSA Top Threats Deep Dive. We dive into the technical details, business impacts, and contributing factors like misconfigurations, inadequate identity management, and supply chain weaknesses. Gain crucial insights and actionable takeaways to enhance your organization's cloud resilience and defend against top security risks. www.securitycareers.help/building-cloud-resilience-lessons-for-cisos-from-real-world-breaches www.hackernoob.tips/enhancing-cloud-resilience-actionable-lessons-for-cisos-from-real-world-incidents

Ep 148The Weakest Link: Navigating the Perilous Digital Supply Chain
In today's interconnected world, supply chains are increasingly vulnerable to sophisticated cyberattacks. This episode explores the primary threats impacting these vital networks, from exploiting trust relationships with third-party vendors to the dangers of malware and compromised software. We'll discuss the pervasive threat of ransomware attacks, like those involving the CL0P gang and the MOVEit vulnerability, and the significant risks of data breaches and theft. We'll also touch upon how social engineering and credential theft are used to infiltrate networks, the targeting of supplier-managed resources, and vulnerabilities in IoT and OT devices. Finally, we examine the rise of advanced and AI-powered attacks that are making it harder to detect and defend against these evolving threats. Understanding these risks is the first step in implementing effective cybersecurity supply chain risk management (C-SCRM) practices www.securitycareers.help/navigating-the-perilous-digital-supply-chain-key-cybersecurity-threats

Ep 147Bridging the Gap: Translating Cyber Risk for the Boardroom
Welcome to "Bridging the Gap: Translating Cyber Risk for the Boardroom." In today's complex digital landscape, Chief Information Security Officers (CISOs) face the crucial challenge of communicating intricate technical risks in a way that resonates with executive leaders and board members. This podcast explores how CISOs can effectively translate technical details into business terms that convey the potential impact of cybersecurity risks and the value of security investments. We'll delve into strategies for speaking the language of the business, using financial, economic, and operational terms to explain cyber risk. Learn how to quantify risks by focusing on the likelihood of cyber events and their potential severities or financial loss. Discover how to align cybersecurity strategies with the company's mission, strategic goals, and operational processes. Crucially, we examine the power of storytelling to make abstract risks tangible and compelling for your audience. Building strong relationships and fostering open communication with different departments and leadership levels is key to creating a collaborative environment where risk can be managed effectively. Tune in to learn how to become a more effective communicator, gain leadership buy-in, and ensure cybersecurity is viewed as a strategic enabler, not just a technical problem www.securitycareers.help/the-modern-ciso-bridging-the-technical-and-business-worlds-for-strategic-impact

Ep 146The Resilient CISO: Navigating Stress and Sustaining Security Leadership
The role of the Chief Information Security Officer (CISO) is more critical and demanding than ever, placing leaders in a persistent high-stress environment. This podcast delves into the unique pressures faced by CISOs and cybersecurity professionals, including the immense responsibility and potential for blame, resource constraints, excessive workload, and the relentless "always-on" nature of the job. We explore the significant mental health impacts, such as anxiety, burnout, and the psychological toll of managing data breaches, which can include feelings of violation and loss of control. More than just identifying the challenges, this podcast offers insights and strategies for building resilience and fostering well-being, drawing on experiences from security leaders. Learn how supportive organizational culture and leadership, prioritizing well-being, building strong teams, and effective stress management techniques are crucial for not only personal health but also for maintaining optimal professional performance and sustaining a vital career in cybersecurity leadership. Join us to understand how to thrive, not just survive, in the CISO's crucible. www.securitycareers.help/the-cisos-crucible-how-organizational-culture-and-leadership-shape-well-being-and-tenure www.cisomarketplace.services

Ep 145Converging Worlds: Securing IoT, OT, and Critical Infrastructure
The digital transformation journey in critical infrastructure organizations and other sectors like healthcare is increasingly connecting operational technology (OT) and integrating Internet of Things (IoT) devices. While this convergence of OT and IT creates efficiencies, it also introduces new vulnerabilities and expands the attack surface for cybersecurity threats. Cyber actors are actively exploiting internet-accessible OT assets against critical infrastructure, and these cyberattacks are growing in size, sophistication, and prevalence. Securing OT presents additional complexities compared to traditional IT security, partly due to differences in priorities (Availability, Integrity, Confidentiality in OT versus Confidentiality, Integrity, Availability in IT) and the mix of old and new technology used. Threats can range from insider risks and nation-state attacks to ransomware. In healthcare, integrating IoT devices offers benefits but exposes patients to unique cybersecurity threats, where compromising devices like implantable devices could cause harm The lines between physical security and cybersecurity have become blurred, as physical security systems are increasingly connected and cyber-physical systems bridge the digital and physical realms10. Siloed security functions, treating physical and cyber security separately, mean security leaders lack a holistic view of threats, creating blind spots and hindering rapid identification, prevention, mitigation, and response to complex threats. For example, an unsecured IoT device can serve as a backdoor into enterprise networks, allow unauthorized physical access, or disrupt operations by hijacking physical systems, as seen in the casino fish tank hack. Addressing these challenges requires a shift towards integrated security functions and a holistic approach that aligns physical and cybersecurity efforts. This includes unified risk assessments, enhancing visibility of unmanaged devices, implementing specific security measures like segmentation and hardening, employing robust authentication and secure design principles, establishing continuous monitoring, and developing comprehensive incident response plans, guided by frameworks such as the NIST Cybersecurity Framework, IEC 62443, and C2M2. Leveraging AI and machine learning can further enhance threat detection and anomaly detection. Ultimately, effective integrated security protects cyber-physical infrastructure and enhances resilience against hybrid threats. www.securitycareers.help/securing-the-converged-frontier-why-integrated-security-is-paramount-in-the-age-of-iot-and-ot www.secureiotoffice.world/securing-the-smart-office-why-integrated-security-is-no-longer-optional 25% off - ' LAUNCH ' https://securecheck.tools https://policyquest.diy

Ep 144Zero Trust for Critical Infrastructure: Securing the OT/ICS Backbone
Delve into the essential and intricate application of Zero Trust (ZT) principles within Operational Technology (OT) and Industrial Control Systems (ICS) environments. This episode explores the unique challenges of securing critical infrastructure, where safety, reliability, and availability are primary objectives, and legacy systems, unique protocols, and often unencrypted communications present distinct complexities compared to traditional IT security models. We'll discuss how the increasing convergence of IT and OT, driven by digital transformation, is reshaping the threat landscape and exposing previously isolated systems. Learn about the tailored roadmap for implementing Zero Trust in these vital sectors, employing a systematic five-step process: defining Protect Surfaces, mapping operational flows, building a Zero Trust Architecture (ZTA), creating policies, and ongoing monitoring and maintenance. Discover how established frameworks like the ISA/IEC 62443 Zone and Conduit Model and the SANS Top 5 Critical Controls for OT/ICS integrate with and are fortified by a Zero Trust approach to enhance security and resilience in the face of evolving threats. www.securitycareers.help/securing-the-industrial-heartbeat-why-zero-trust-is-imperative-and-different-for-ot-ics

Ep 143Cyber Resilience Through Bundling: The Regulatory Challenge
Explore the emerging practice of bundling cyber insurance with security products and services, a strategy aimed at enhancing cyber resilience by incentivizing policyholders to adopt proactive security measures from the outset. This episode delves into the potential benefits, such as encouraging better cyber hygiene, aligning the long-term goals of insurers and policyholders to reduce incident frequency and impact, improving risk mitigation, providing deeper risk insights through real-time data, offering guidance on effective security controls, and making security more accessible and affordable for SMEs and SLTTs. We also examine the significant concerns and barriers preventing wider adoption. These include historical worries about insolvency, potential impairment of risk assessment and pricing, the risk of discriminatory practices in partnering with security vendors, and inherent conflicts of interest in business-to-business relationships between insurers and service providers. A major hurdle is the complex and varied regulatory landscape across different states, where differing interpretations of anti-inducement, anti-rebating, and anti-bundling laws create uncertainty and a "chilling effect" that hinders innovation and widespread implementation. Discover why navigating these concerns requires careful oversight and regulation to balance cybersecurity effectiveness with market choice www.securitycareers.help/a-cisos-guide-leveraging-cyber-insurance-for-enhanced-resilience-across-the-enterprise www.breached.company/beyond-the-breach-how-cyber-insurance-can-drive-proactive-cybersecurity https://securityandtechnology.org/blog/qa-the-strategic-potential-of-cyber-insurance/ Download PDF: https://securityandtechnology.org/virtual-library/report/enhancing-cyber-resilience-through-insurance/ Sponsor: https://cyberinsurancecalc.com

Ep 142Beyond the URL: Decoding Domain Intelligence Threats in 2024
In the ever-evolving digital landscape, security teams face the immense challenge of evaluating over a hundred million newly observed domains registered each year. This episode dives into how analytical methods are providing crucial insights into domain intelligence threats. We explore techniques like domain attribute analysis to identify patterns used by threat actors, risk scoring to quantify the likelihood of a domain being malicious, and DGA detection to uncover domains generated by automated systems used in malware and botnets. We also discuss the importance of keyword and topic analysis for identifying domains used in credential harvesting, malware delivery, and scams, and how analyzing new TLDs and likeness to high-profile events helps spot emerging threats and deceptive tactics like typosquatting. Furthermore, we touch upon analyzing webpage attributes to understand attack infrastructure and using anomaly detection to investigate spikes in domain registrations. Ultimately, building a shared knowledge base and fostering community collaboration by sharing insights and observed techniques is essential for strengthening our collective defenses against external threats and making the internet safer. This episode draws insights from an analysis comparing 106 million newly observed domains from 2024 against a large reference set of known malicious domains. breached.company/decoding-the-digital-deluge-how-domain-intelligence-informs-cybersecurity-defenses-in-2024 https://policyquest.diy -> Coupon 15% off -> 'podcast'

Ep 141US State Privacy Laws: Navigating the Expanding Consumer Rights Patchwork
Explore the complex and rapidly evolving landscape of US state data privacy laws, drawing on insights from recent legislative developments across states like California, Colorado, Connecticut, Delaware, Florida, Indiana, Iowa, Montana, Nebraska, New Hampshire, New Jersey, Oregon, Tennessee, and Texas, plus Washington's focused health data act. We break down the core consumer rights becoming standard nationwide – including the right to access, delete, correct, and opt out of data sales, targeted advertising, and certain profiling. Learn about the heightened focus on sensitive data, such as health information and data from children and teens, often requiring explicit opt-in consent. We discuss key differences like scope thresholds, variations in the definition of "sale", and the emergence of mandatory universal opt-out signals. Understand the differing enforcement approaches by state Attorneys General, the role of cure periods (and their sunsetting in many states), and the limited private rights of action. This episode helps untangle the intricate patchwork, highlights the practical implications for businesses implementing compliance systems, and touches on how consumer expectations and trust are shaped by these new regulations. www.compliancehub.wiki/navigating-the-patchwork-an-in-depth-look-at-u-s-state-comprehensive-privacy-laws/ https://globalcompliancemap.com/ https://generatepolicy.com/

Ep 140Beyond Encryption: Ransomware's New Game & Top Exploits of 2024
Tune in to explore the rapidly evolving cyber threat landscape of 2024 from Huntress 2025 global Cyber Threat Report, where attackers standardized sophisticated techniques across businesses of all sizes. We dissect the significant shifts in ransomware strategies, including the fragmentation of major groups following takedowns like LockBit, Dharma, Hive, and Phobos. Discover how agile affiliate networks like RansomHub and INC/Lynx emerged, offering high payouts and dominating the landscape. Learn about the pivot from traditional encryption to data theft and extortion as a cost-saving tactic due to improved defenses. We'll also break down the most impactful vulnerabilities exploited, including the critical ConnectWise ScreenConnect flaws (CVE-2024-1709 & CVE-2024-1708) that spurred a major campaign, the zero-day CrushFTP vulnerability (CVE-2024-4040), and the continued exploitation of the older ProxyShell Exchange vulnerability (CVE-2021-31207). Finally, we'll cover the pervasive use of abused tools like RATs, RMM software, malicious scripts, LOLBins, and sophisticated phishing techniques that defined attacker methodologies throughout the year. This episode provides crucial insights for defenders navigating this complex and challenging environment breached.company/navigating-the-new-frontier-key-cyber-threats-exploits-and-tools-of-2024

Ep 139The Accelerating Threat Landscape: Inside Modern Cybercrime
Delve into the complex and rapidly transforming world of cyber threats. This episode examines notorious ransomware groups like Black Basta, LockBit, BlackCat/ALPHV, Phobos/8Base, Medusa, and Clop, exploring their Ransomware-as-a-Service (RaaS) models and distinctive tactics, techniques, and procedures (TTPs). We also discuss state-sponsored cyber warfare, such as the activities of Iran's APT42 and its impact on critical infrastructure, hacking groups like Scattered Spider, and the individual hacker USDoD, as well as significant law enforcement disruptions like Operation Cronos against LockBit and the arrests of key figures behind Phobos and 8Base. We'll touch upon the emerging challenges of AI-enabled crime and the continuous escalation in the scale and sophistication of cyberattacks. breached.company/global-cybercrime-crackdown-major-law-enforcement-operations-of-2024-2025

Ep 138Cybersecurity Unpacked: Breaches, Billions, and AI's Double Edge
In this episode, we dive into the recent developments shaping the cybersecurity landscape as of May 2025. We discuss major incidents like the significant breach of the LockBit ransomware gang, which exposed sensitive data including negotiation messages and user credentials. We'll also explore the growing sophistication of financial cyberattacks, highlighted by the uncovering of the "industrial-scale" FreeDrain cryptocurrency phishing operation targeting digital wallets with sophisticated methods. The episode examines landmark legal actions, such as Meta's $168 million victory against spyware firm NSO Group, signaling a pushback against surveillance abuses. We explore the evolving role of AI, which offers speed in threat detection but also introduces risks from vulnerabilities in AI-generated code and "shadow AI". Finally, we look at how governments and corporations are responding with new initiatives to bolster defenses, including the UK's Cyber Resilience programs, CISA's advisories for critical infrastructure, and corporate innovations like HPE's Secure Gateway for small businesses and Microsoft's patching of critical cloud vulnerabilities. Join us as we unpack these challenges and responses in a dynamic digital world. www.compliancehub.wiki/cybersecurity-frontlines-recent-breaches-legal-battles-and-the-double-edged-sword-of-ai

Ep 137The Accelerating Adversary: Inside the 2025 Threat Landscape
Join us for a deep dive into the Global Threat Landscape Report 2025 by FortiGuard Labs. This episode explores the dramatic escalation in cyberattacks, revealing how adversaries are moving faster than ever, leveraging automation, commoditized tools, and AI to gain advantage. We'll shed light on the surge in automated reconnaissance, the evolving darknet ecosystem where credentials and corporate access are traded, and how AI is supercharging cybercrime through tools like FraudGPT and deepfakes. Discover the trends in exploitation volumes targeting exposed systems and IoT devices, the stealthy nature of post-exploitation tactics including lateral movement and C2, and the persistent challenges in securing cloud environments plagued by misconfigurations and identity compromise. We'll also break down the changing adversary landscape, from fragmented ransomware groups and the rise of RaaS on the darknet to the dangerous convergence of hacktivism and ransomware and the ongoing operations of state-sponsored actors. Finally, we'll discuss the critical need for organizations to shift from reactive defense to proactive Continuous Threat Exposure Management (CTEM) to counter this accelerating threat. breached.company/navigating-the-accelerating-threat-landscape-proactive-defense-in-the-era-of-adversary-acceleration

Ep 1362025 Cyber Attack Playbooks: Navigating the Future Threat Landscape
This podcast delves into the critical insights found within the 2025 Cybersecurity Attacks Playbooks, exploring the diverse and evolving threat landscape organizations face. We examine playbooks covering threats from AI-enhanced phishing and advanced ransomware to the complexities of supply chain compromises, zero-day exploits, and AI-powered malware. We also discuss emerging threats like deepfake social engineering, quantum computing vulnerabilities, and securing IoT devices. Each episode breaks down the essential stages outlined in the playbooks for specific attacks: Preparation to build foundational defenses, Detection to identify threat indicators, Analysis to understand the attack's scope and methods, Containment/Eradication tailored to the specific threat vector, and Recovery to restore operations and resilience. Gain a deeper understanding of modern attack vectors like credential stuffing, fileless malware, rogue access points, SQL injection, steganography-based data exfiltration, and cache poisoning, as well as network attacks like homograph attacks, Denial-of-Service (DoS), and watering hole attacks, and complex infiltrations like island hopping and Advanced Persistent Threats (APTs). Tune in to learn how the playbooks guide organizations through detection, response, and the vital Lessons Learned process to continuously improve their cybersecurity posture. www.securitycareers.help/navigating-the-2025-threat-landscape-preparing-for-and-responding-to-advanced-cyber-attacks

Ep 135Beyond the Scan: Unmasking Hidden Risks and Unfixed Flaws in the Age of AI
In this episode, we dive deep into the findings of the State of Pentesting Report 2025 to explore the real state of cybersecurity. Organizations may feel confident, but pentesting consistently reveals hidden, exploitable vulnerabilities that automated scanners miss. We'll uncover the most significant risks identified through human-led pentests, from common web and mobile application flaws like Server Security Misconfiguration and Missing Access Control to the rapidly emerging and uniquely challenging security issues in AI and Large Language Models (LLMs). Learn why AI/LLM tests have a significantly higher proportion of serious findings and the specific threats like Insecure Output Handling, Prompt Injection, and Unbounded Consumption. More critically, we'll address the disconnect between perceived security and reality by examining why less than half of all findings ever get resolved and how even serious vulnerabilities often remain open for months or years, far exceeding targeted SLAs. We'll explore the factors influencing this remediation struggle, including criticality, pentest type, organizational size, industry, and internal processes. Tune in to understand the critical need for a programmatic approach to offensive security and the challenges teams face in fixing what pentesters find. www.securitycareers.help/beyond-the-scan-the-hidden-reality-of-unfixed-security-risks-revealed-by-pentesting-data

Ep 134Building Cyber Warriors: The Evolving Cyber Professional
In the dynamic world of cybersecurity, professionals face constant challenges that demand adherence to strict ethical and legal guidelines. This episode delves into the key ethical and legal considerations, such as protecting individual privacy, ensuring robust data protection, maintaining confidentiality, and complying with relevant laws and regulations like GDPR and CCPA. We discuss responsible practices like vulnerability disclosure and the ethical use of cybersecurity tools. Given the ever-evolving landscape of cybersecurity threats and technologies, staying updated is not optional; it's an imperative for success. Join us as we explore why continuous education and professional development are essential strategies for cybersecurity professionals to navigate this complex terrain, adapt to emerging trends, maintain expertise, and uphold trust. https://cisomarketplace.services/careers www.securitycareers.help/building-cyber-warriors-the-imperative-of-the-evolving-cyber-professional

Ep 133The Iceberg Impact: Unpacking the Hidden Costs of Cyber Attacks
Join us as we delve into the complex and pervasive world of cyber risk, exploring the threats, vulnerabilities, and far-reaching consequences for organizations today. Drawing on insights from experts, we'll discuss how cyber attacks can lead to outcomes ranging from regulatory fines and reputational loss to the complete failure of a business. Go beyond the headlines of data breaches and understand the full "iceberg impact" of cyber losses, including significant uninsurable costs like reputational damage, loss of customers, stock devaluation, and devaluation of intellectual property that often exceed the direct financial costs. We'll explore how attacks threaten critical corporate data, intellectual property, and customer details, potentially causing financial loss and damage to market value, share price, and competitive advantage. The conversation will touch upon the challenges posed by mobile devices, social media, and supply chain vulnerabilities, and the critical need for organizations to accurately assess their cyber risk exposure, identify their "crown jewels" of critical data, and prepare for inevitable incidents through robust incident management and layered defenses. www.securitycareers.help/the-iceberg-impact-navigating-the-full-scope-of-cyber-risk-in-the-digital-age www.compliancehub.wiki/cyber-risk-through-a-compliance-lens-navigating-the-regulatory-landscape

Ep 132The MAESTRO Framework: Layering Up Against MAS Security Threats
Multi-Agent Systems (MAS), characterized by multiple autonomous agents coordinating to achieve shared goals, introduce additional complexity and expand the attack surface compared to single-agent systems. This episode delves into the unique security challenges presented by MAS, drawing on the OWASP Agentic Security Initiative's MAESTRO (Multi-Agent Environment, Security, Threat, Risk, and Outcome) framework. We explore how MAESTRO provides a layered and architectural methodology for structured threat modeling in MAS. The framework breaks down MAS security into seven distinct architectural layers, each with specific concerns, from the Foundation Model to the Agent Ecosystem. Crucially, we examine the cross-layer risks and emergent behaviors unique to MAS environments, highlighting how vulnerabilities don't just exist within layers but manifest through complex interactions between them. Furthermore, we discuss the key agentic factors—Non-Determinism, Autonomy, Agent Identity Management, and Agent-to-Agent Communication—that MAESTRO emphasizes as significantly contributing to these threat scenarios and amplifying risks across layers. Tune in to understand how applying MAESTRO helps uncover and mitigate these multifaceted security challenges in real-world MAS deployments, as detailed in the OWASP Multi-Agentic system Threat Modelling Guide. www.hackernoob.tips/navigating-the-labyrinth-structured-threat-modeling-in-multi-agent-systems-with-the-owasp-maestro-framework www.securitycareers.help/securing-the-autonomous-frontier-a-cisos-guide-to-protecting-multi-agent-systems-and-building-a-specialized-team

Ep 131Unmasking the Unseen: Building and Benefiting from Behavioral Threat Hunting
In today's complex threat landscape, adversaries are constantly evolving their tactics to evade traditional defenses. Behavioral threat hunting offers a proactive methodology to identify cyber threats that have infiltrated systems undetected and disrupt them before they cause significant damage, ultimately reducing attacker "dwell time". This episode delves into the fundamental requirements for establishing effective threat hunting capabilities, covering the crucial technological prerequisites like achieving sufficient visibility and storage for deep data analysis, and the necessity of a robust analysis platform. We also explore the essential personnel prerequisites, highlighting the need for skilled staffing, diverse team knowledge, and specific technical and analytical skill sets, while acknowledging the persistent challenge of skills shortages. Beyond tech and talent, we discuss the importance of foundational elements like emulation and validation, adopting a formal methodology such as the Threat Hunting Cycle, and utilizing centralized management and metrics tools to ensure consistent, repeatable, and valuable hunts. Finally, we uncover how effective threat hunting integrates with and enhances broader security operations and incident response, by improving security posture, closing visibility gaps, developing new automated detection capabilities from discovered unknown threats, and providing crucial documentation and support for incident response engagements. Join us as we explore how proactive hunting transforms security operations from reactive defense to strategic resilience. www.securitycareers.help/unmasking-the-unseen-why-behavioral-threat-hunting-is-essential-for-modern-security-operations

Ep 130Beyond the Prompt: Navigating the Threats to AI Agents
AI agents, programs designed to autonomously collect data and take actions toward specific objectives using LLMs and external tools, are rapidly becoming widespread in applications from customer service to finance. While built on LLMs, they introduce new risks by integrating tools like APIs and databases, significantly expanding their attack surface to include classic software vulnerabilities like SQL injection, remote code execution, and broken access control, in addition to inherent LLM risks like prompt injection. Our sources demonstrate that these vulnerabilities are largely framework-agnostic, stemming from insecure designs and misconfigurations rather than flaws in frameworks like CrewAI or AutoGen. Given the autonomous nature and expanded capabilities of agents, the potential impact of compromises escalates from data leakage to infrastructure takeover. This episode dives into the complex threats targeting AI agents and highlights why a layered, defense-in-depth strategy is essential, combining safeguards like Prompt Hardening, Content Filtering, Tool Input Sanitization, Tool Vulnerability Scanning, and Code Executor Sandboxing, because no single mitigation is sufficient to address the diverse attack vectors. www.securitycareers.help/securing-the-autonomous-frontier-layered-defenses-for-ai-agent-deployments/ https://www.hackernoob.tips/exploring-the-attack-surface-our-guide-to-ai-agent-exploitation/ https://vibehack.dev/ https://devsecops.vibehack.dev

Ep 129Space Under Pressure: Geopolitical Threats and the Evolving Cosmos (2025)
Drawing on open-source information and eight years of collected data, the CSIS Aerospace Security Project's 2025 Space Threat Assessment explores the key developments in foreign counterspace weapons and the evolving security landscape in Earth orbit. This assessment highlights how space is becoming a more dangerous place and is increasingly woven into both peacetime and wartime activities. The report categorizes counterspace weapons into four main types: kinetic, non-kinetic, electronic, and cyber operations. While the past year saw few headline-grabbing kinetic tests, concerns persist, notably regarding Russia's pursuit of a nuclear anti-satellite capability designed to target satellites orbiting Earth, which the United States and international partners remain concerned about. www.myprivacy.blog/space-threats-and-the-unseen-impact-a-privacy-perspective-on-the-2025-assessment www.compliancehub.wiki/navigating-the-orbital-minefield-compliance-challenges-in-the-2025-space-threat-landscape/

Ep 128The Price of Protection: Budgeting for Essential Cyber Hygiene (CIS IG1)
This episode explores the costs associated with implementing essential cyber hygiene as outlined by the CIS Critical Security Controls Implementation Group 1 (IG1). We delve into the different approaches enterprises can take – utilizing on-premises tools, leveraging Cloud Service Providers (CSPs), or partnering with Managed Service Providers (MSPs). Drawing on the guide's research, we discuss the types of tools and policies needed for the 10 areas of cyber defense, explore budgeting considerations for different enterprise sizes, and highlight how IG1 Safeguards can provide significant protection against common threats for a relatively low cost. Learn how to make informed and prioritized decisions to secure your enterprise, whether through owned infrastructure, outsourced services, or a hybrid approach. www.securitycareers.help/the-price-of-protection-making-cis-ig1-cyber-hygiene-achievable-and-affordable https://baseline.compliancehub.wiki

Ep 127GTIG 2024 Zero-Days: Espionage, Enterprise, and the Shifting Landscape
Join us as we dive into Google Threat Intelligence Group's (GTIG) comprehensive analysis of zero-day exploitation in 2024. Drawing directly from the latest research, this episode explores the 75 zero-day vulnerabilities tracked in the wild. While the overall number saw a slight decrease from 2023, the analysis reveals a steady upward trend over the past four years. Discover the significant shift towards targeting enterprise-focused technologies, which jumped to 44% of tracked zero-days in 2024, up from 37% in 2023. We examine why security and networking products have become high-value targets, making up over 60% of enterprise exploitation, and the implications for defenders. Learn about the continued targeting of end-user platforms like desktop operating systems, especially Microsoft Windows, which saw an increase in exploitation, contrasting with decreased exploitation observed in browsers and mobile devices. We also break down who is driving this exploitation, with espionage actors (government-backed and commercial surveillance vendors) leading the charge, accounting for over 50% of attributed vulnerabilities. Hear about the persistent activity of PRC-backed groups targeting security technologies and the notable rise of North Korean actors mixing espionage and financial motives. Finally, we touch on the most frequently exploited vulnerability types and what vendors and defenders can do to counter these evolving threats. This episode provides a detailed look into the complex and changing world of zero-day exploitation in 2024, offering insights beyond just the numbers. breached.company/technical-brief-a-deep-dive-into-2024-zero-day-exploitation-trends

Ep 126Verizon DBIR 2025: Navigating Third-Party Risk and the Human Factor
Join us as we unpack the critical insights from the Verizon 2025 Data Breach Investigations Report. This episode dives deep into the report's most prominent themes, highlighting the ever-increasing involvement of third parties in data breaches and the persistent influence of the human element, which was involved in 60% of breaches this year. We explore the prevalent incident patterns including System Intrusion, often involving ransomware, Basic Web Application Attacks, largely driven by stolen credentials, and Social Engineering, where phishing and pretexting remain key techniques, now joined by emerging threats like prompt bombing. Drawing on data collected from November 1, 2023, to October 31, 2024, we discuss how attackers exploit vulnerabilities, how different industries and organizations of all sizes are targeted, and the importance of frameworks like VERIS for understanding the threat landscape. Tune in to gain actionable insights directly supported by the data and analysis from the DBIR sources. breached.company/navigating-the-modern-threat-landscape-key-insights-from-the-verizon-dbir-2025

Ep 125The State of EU Cybersecurity: Threats, Trends, and the Evolving Landscape
Explore the complex and widespread cybersecurity threat landscape currently facing the European Union. This episode delves into the findings of recent reports, highlighting how geopolitical tensions and the rapid pace of digitisation are fueling a surge in malicious cyber activity. We discuss the substantial threat level assessed for the EU, meaning direct targeting and serious disruptions are realistic possibilities [previous turn]. You'll learn about the most reported attacks, including Denial-of-Service (DoS/DDoS/RDoS) and ransomware, and how threats against data are also prevalent. We break down the key threat actors – from financially motivated cybercriminals and well-funded state-nexus groups focused on espionage and disruption, to increasingly unpredictable hacktivists driven by geopolitical events. Discover how threats are evolving, including the shift in ransomware tactics, the rise of hacker-for-hire services, the use of AI in creating fake content and misinformation, and the persistent danger posed by the exploitation of unpatched vulnerabilities and sophisticated supply chain attacks. We also look at which sectors are most targeted, including public administration and transport, and peer into the future to understand how emerging technologies like AI and quantum computing will shape the threat landscape towards 2030. www.compliancehub.wiki/understanding-the-evolving-cybersecurity-threat-landscape-in-the-eu-an-in-depth-analysis-for-compliance/ https://gdpriso.com/ https://baseline.compliancehub.wiki/

Ep 124Integrating Incident Response: A NIST SP 800-61r3 Guide to Cyber Risk Management
Incident response is a critical part of cybersecurity risk management and should be integrated across organizational operations. This episode explores the recommendations and considerations for incorporating cybersecurity incident response throughout an organization’s cybersecurity risk management activities, as described by the new NIST Special Publication (SP) 800-61 Revision 3. We'll discuss how NIST SP 800-61r3, a CSF 2.0 Community Profile, uses the NIST Cybersecurity Framework (CSF) 2.0 Functions to provide a common language and structure for these efforts. Learn how the Govern, Identify, and Protect functions support preparation activities, while the Detect, Respond, and Recover functions cover the incident response itself. We'll also highlight the crucial role of continuous improvement, feeding lessons learned back into the overall strategy. This guidance aims to help organizations prepare for incidents, reduce their number and impact, and improve the efficiency and effectiveness of detection, response, and recovery activities. This episode is intended for cybersecurity program leadership, cybersecurity personnel, and others responsible for handling cybersecurity incidents www.compliancehub.wiki/beyond-reaction-integrating-incident-response-into-your-cybersecurity-risk-management-strategy-with-nist-sp-800-61r3 https://irmaturityassessment.com https://cyberinsurancecalc.com

Ep 123Beyond the Blueprint: Learning Cyber Resilience Together
Achieving cyber resilience is a complex and dynamic journey with no one-size-fits-all solution. This episode explores how organizations can significantly improve their cyber resilience posture by leveraging the shared experiences, insights, and front-line practices of their peers and the wider ecosystem. Drawing on insights from the Cyber Resilience Compass initiative, we discuss why sharing what works in practice is essential for building collective knowledge in the field. You'll hear how participating in consultations and workshops, engaging in information-sharing networks like ISACs and CERTs, collaborating with external parties, and learning from real-world case studies can provide vital inspiration and direction. Discover how this collaborative approach helps organizations identify effective strategies, shape their resilience roadmaps, make well-informed decisions, and transition towards a more consistent and future-ready approach, ultimately enhancing the resilience of the entire ecosystem. breached.company/navigating-the-digital-storm-why-shared-experiences-are-your-compass-to-cyber-resilience

Ep 122EDPB 2024: Guarding EU Data Privacy in a Rapidly Changing Digital World
Join us as we delve into the European Data Protection Board's (EDPB) 2024 Annual Report to understand how they championed data protection in a year marked by significant technological and regulatory shifts. This episode will cover the key milestones and priorities outlined in the EDPB's 2024-2027 Strategy, designed to strengthen, modernise, and harmonise data protection across Europe www.compliancehub.wiki/edpb-2024-navigating-the-complexities-of-data-protection-in-a-rapidly-evolving-digital-landscape

Ep 121The 2024 IC3 Report: Unpacking Record Cybercrime Losses
Join us as we delve into the key findings of the FBI's 2024 Internet Crime Complaint Center (IC3) Annual Report. This year marks the 25th anniversary of IC3, which serves as the primary destination for the public to report cyber-enabled crime and fraud. The report reveals a staggering new record for losses reported to IC3, totaling $16.6 billion in 2024. This represents a 33 percent increase from 2023. We'll explore the most impactful crime types by reported loss, including Investment fraud ($6.57 billion), Business Email Compromise ($2.77 billion), and Tech Support scams ($1.46 billion), which are collectively responsible for the bulk of reported losses. A major factor contributing to these losses is the increasing use of cryptocurrency, which served as a descriptor in 149,686 complaints and was associated with $9.3 billion in losses in 2024, a 66% increase in losses. We'll also examine the significant impact on different age groups, noting that individuals over the age of 60 suffered the most losses ($4.885 billion) and submitted the most complaints (147,127). For this age group, Investment fraud ($1.834 billion) and Tech Support scams ($982 million) resulted in the highest reported losses, and cryptocurrency was referenced in 33,369 complaints with over $2.8 billion in losses. The episode will also touch upon the IC3's core functions including collection, analysis, public awareness, and referrals, its role in partnering with law enforcement and the private sector, and notable efforts like the IC3 Recovery Asset Team which assists in freezing funds for victims of fraudulent transactions, demonstrating a 66% success rate in 2024, and Operation Level Up, which successfully notified victims of cryptocurrency investment fraud, resulting in estimated savings breached.company/the-2024-ic3-report-record-cybercrime-losses-highlight-escalating-digital-threats

Ep 120The 2025 Cyber Crossroads: Balancing AI Innovation with IoT Security and Evolving Threats
Navigate the complex cybersecurity landscape of Q2 and Summer 2025 as we delve into the escalating convergence of AI-driven cyberattacks, the persistent vulnerabilities of the expanding Internet of Things (IoT), and the challenges of establishing robust security and governance frameworks. Based on recent Q1 2025 incident data and expert projections, this episode explores the weaponization of AI in phishing, malware, and social engineering, the continued exploitation of poorly secured IoT devices, and the evolving tactics of ransomware and state-sponsored actors. We'll also discuss the crucial need for proactive defense, AI-augmented security, and adaptation to a fragmenting global regulatory environment. breached.company/strategic-cybersecurity-outlook-ai-iot-and-threat-actor-convergence-in-q2-summer-2025

Ep 1192025 Q1 Cyber Shockwave: Ransomware Records, AI Threats, and the Regulatory Reckoning
The first four months of 2025 witnessed an alarming surge in global cybersecurity incidents, with ransomware attacks reaching unprecedented levels. Join us as we dissect the key trends, including the evolution of ransomware tactics like double extortion, the increasing sophistication of social engineering fueled by AI and deepfakes, and the persistent exploitation of software vulnerabilities. We'll delve into major incidents like the crippling attack on Change Healthcare and the record-breaking Bybit cryptocurrency theft, highlighting the most targeted sectors such as healthcare, education, government, and manufacturing. Finally, we'll examine how organizations, law enforcement, and the evolving global regulatory environment, with key legislation like the EU's NIS2 and DORA, are grappling with this escalating cyber threat. breached.company/global-cybersecurity-incident-review-january-april-2025

Ep 118Navigating Privacy Risks with the NIST Privacy Framework 1.1
This podcast delves into the NIST Privacy Framework 1.1, a voluntary tool developed to help organizations identify and manage privacy risk while fostering innovation and protecting individuals' privacy. We explore its three core components: Core, Organizational Profiles, and Tiers, and how they enable organizations to understand, assess, prioritize, and communicate their privacy activities. Learn how to use this framework to build customer trust, meet compliance obligations, and facilitate dialogue about privacy practices. www.compliancehub.wiki/navigating-the-complex-world-of-privacy-with-the-nist-privacy-framework-1-1

Ep 117Beyond the Firewall: The Offensive Cybersecurity Edge
Dive into the dynamic world of offensive cybersecurity with insights from leading experts and real-world scenarios. We explore the critical role of techniques like penetration testing, adversary simulation, and red team exercises in proactively identifying vulnerabilities and strengthening defenses against evolving cyber threats. Understand how adopting an adversarial mindset and employing continuous assessment methodologies are essential for navigating today's complex threat landscape and building a resilient security posture. www.securitycareers.help/dont-just-scan-test-choosing-the-right-penetration-testing-partner https://cisomarketplace.services https://generatepolicy.com

Ep 115AI on Trial: Decoding the Intersection of Artificial Intelligence and Harm
Explore the rapidly evolving landscape where artificial intelligence intersects with criminality and societal risks. Drawing on expert research, this podcast delves into the transformative potential of AI-enabled crime, from sophisticated financial fraud using deepfakes to the generation of child sexual abuse material, and the challenges this poses for law enforcement. We also examine the critical need for robust AI incident reporting mechanisms, as proposed with standardized key components for documenting AI-related harms and near misses. Join us as we unpack the threats, the defenses, and the policy reforms necessary to navigate this complex new frontier. breached.company/navigating-the-ai-frontier-confronting-ai-enabled-crime-through-robust-incident-reporting https://airiskassess.com https://cisomarketplace.services