
Audio is streamed directly from the publisher (traffic.libsyn.com) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.
Show Notes
SuperMicro supply chain hack used for counterintelligence for a decade
Egregor ransomware operators arrested in Ukraine
Scammers target US tax pros in ongoing IRS phishing attacks
Thanks to our episode sponsor, Kenna Security
Ready to shift gears to risk-based vulnerability management? Now's the time. Through Kenna Security's on-demand educational series Kenna Katalyst, you can learn the six steps needed to start your own risk-based vulnerability management program and make vulnerability management … well, more manageable. And you can earn 1 CPE credit through (ISC)². Learn more at kennasecurity.com/katalyst.
For the stories behind the headlines, head to CISOseries.com