PLAY PODCASTS
Daily Cyber Security News

Daily Cyber Security News

106 episodes — Page 1 of 3

What is Incident Response Planning

May 14, 20262 min

What is AI driven bot traffic

May 7, 20262 min

What Is Vulnerability Chaining

Apr 30, 20262 min

What is DFIR

Apr 23, 20263 min

What Is a Supply Chain Compromise

Apr 16, 20263 min

AI in Vulnerability Discovery An Introduction

Apr 9, 20263 min

Reconnaissance Mapping the Target

An overview of cybersecurity Cyber Kill Chain, focussing on reconnaissance

Apr 2, 20263 min

What Is AI Red Teaming

An overview of cybersecurity AI Red Teaming, focussing on introduction to ai red teaming

Mar 26, 20262 min

What Is Agentic AI

An overview of cybersecurity Agentic AI, focussing on Introduction to Agentic AI

Mar 19, 20263 min

What Is Insecure Deserialization

An overview of cybersecurity Insecure Deserialization, focussing on introduction to insecure deserialization

Mar 12, 20263 min

What is a Zero Click Attack

An overview of cybersecurity Zero click attack, focussing on zero click attack

Mar 5, 20262 min

What is a Dependency Confusion Attack

An overview of cybersecurity Dependency Confusion Attacks, focussing on dependency confusion overview

Feb 26, 20262 min

What is Threat Modeling

An overview of cybersecurity Threat Modeling in Cybersecurity, focussing on threat modeling overview

Feb 19, 20263 min

What is a Hardware Security Module HSM

An overview of cybersecurity Hardware Security Modules HSMs , focussing on introduction to hsms

Feb 12, 20262 min

What is Evil Twin WiFi

An overview of cybersecurity evil twin WiFi, focussing on evil twin WiFi overview

Jan 22, 20262 min

Multiple Platforms CyberGuard Highlights Breaches & Patches

Today s briefing spans Betterment s social engineering breach and crypto scams, Google s patched Fast Pair Bluetooth, browser, Windows and AI prompt injection flaws, RedVDS phishing takedown, plus Instagram password reset and Telegram IP proxy bugs.

Jan 19, 20267 min

What Is Browser in the Browser Phishing

An overview of cybersecurity browser in the browser phishing, focussing on browser in the browser phishing overview

Jan 15, 20262 min

Instagram API Insta Leak to Ledger Breach & 26M DeFi Heist

We unpack an old Instagram API bug that leaked 17M accounts, Telegram s new Detector404 AI for scam detection, Microsoft s anti spoofing policies with mandatory MFA, the Ledger Global e breach fueling crypto phishing, and Truebit s 26M DeFi exploit.

Jan 12, 202611 min

What Is Anomaly Detection in Cybersecurity

An overview of cybersecurity anomaly detection, focussing on overview

Jan 8, 20263 min

Apple WebKit WebKit Zero Days & Crypto Wallet Breaches

This episode unpacks Apple WebKit zero day exploits bypassing Safari defenses, MacSync data stealer, supply chain compromise of Trust Wallet s Chrome extension, Telegram crypto crime vulnerabilities, and ZachXBT s cross chain wallet drains totaling over 100K.

Jan 5, 202610 min

Adaptive Multi Factor Authentication Explained

An overview of cybersecurity Adaptive Multi Factor Authentication, focussing on Adaptive MFA Overview

Jan 1, 20262 min

Stealka Malware Cyber Threat Roundup From Stealka to Trust Wallet

Kaspersky reveals Stealka stealer in pirated mods, warns of a 2025 financial crime surge, and details Evasive Panda DNS poisoning. We also cover the La Poste DDoS outage, Spotify s 300 TB library scrape, Telegram phishing and infra flaw, plus the Christmas day Trust Wallet Chrome extension supply chain hack.

Dec 29, 202510 min

What Is Homomorphic Encryption

An overview of cybersecurity homomorphic encryption, focussing on homomorphic encryption overview

Dec 25, 20253 min

Cisco AsyncOS SEG Cisco AsyncOS SEG Zero Day & Cyber News Roundup

Highlights include Amazon s keyboard lag impostor catch, AWS GuardDuty cryptomining and GRU edge campaigns, Kindle eBook and plugin flaws, plus a critical Cisco AsyncOS SEG zero day under active Chinese APT exploitation. Also covered Google Chrome patches and React2Shell abuse, Microsoft OAuth phishing and RC4 deprecation, and the 94 GB ShinyHunters Pornhub Premium data breach.

Dec 22, 20256 min

What Is an Extension Supply Chain Attack

An overview of cybersecurity extension supply chain attack, focussing on overview of extension supply chain attacks

Dec 18, 20253 min

Apple OS Platforms Critical Apple Patches Binance Hijack & Linux CVEs

Apple releases fixes for critical buffer overflows and zero days across macOS, iOS and other platforms. Binance s co CEO WeChat was hijacked to fuel a meme token pump and dump. Over 100 urgent Linux kernel CVEs demand immediate patching and reboots.

Dec 15, 20257 min

What Is Attack Surface Discovery

An overview of cybersecurity Attack surface discovery, focussing on introduction attack surface

Dec 11, 20252 min

React Framework 29.7Tbps DDoS, React RCE Outages & Ubuntu Fixes

Highlights Cloudflare s record 29.7 Tbps DDoS defense, an emergency React remote code exec flaw that brought down major sites, Telegram s hack and fortify cycle with a fresh zero day, and Ubuntu s sweeping kernel and toolchain patch blitz.

Dec 8, 20257 min

What Is Deception Technology

An overview of cybersecurity Deception Technology, focussing on introduction to deception technology

Dec 4, 20253 min

Multiple Platforms Rapid Fire Cybersecurity Briefing

Covers Android malware purge, Antigravity IDE exploit, OAuth and Chrome patch alerts, Mixpanel fallout, AI driven ransomware, Telegram phishing wave, and Upbit s 30M Solana wallet breach.

Dec 1, 20259 min

Introduction to the MITRE ATT&CK Framework

An overview of cybersecurity MITRE ATT&CK Framework, focussing on framework overview

Nov 27, 20252 min

Linux Kernel AI Espionage, Critical Kernel Vulns & Telegram

Anthropic disrupted the first large scale AI driven espionage campaign linked to a China backed group Linux admins race to patch dozens of critical kernel flaws across media, fs, networking and drivers Telegram scrambles to contain malware bots, data leaks and fake update scams.

Nov 17, 20258 min

What Is Shadow AI

An overview of cybersecurity Shadow AI, focussing on shadow ai overview

Nov 13, 20253 min

Balancer batch swap DeFi Rounding Bug Drains 128M Cisco Patches, AI

This episode dissects Balancer v2 s 116 128M multi chain exploit via a tiny batch swap rounding bug, then shifts to Cisco s AI driven threat detection demo, urgent UCCX RCE and ASA FTD firewall patches, and the launch of Security Cloud Control.

Nov 10, 20254 min

Introduction to Active Directory Security

An overview of cybersecurity Active Directory security, focussing on active directory security fundamentals

Nov 6, 20253 min

VMware Tools CISA Urgent Patch for VMware Tools Zero Day

CISA has ordered U.S. agencies to immediately patch a VMware Tools zero day under active China linked exploitation, added critical WSUS and ICS flaws to its KEV list, and flagged live attacks on a Linux kernel bug. Meanwhile, Google enforces HTTPS defaults, Microsoft battles fresh zero days and AI powered phishing, and organizations scramble on encrypted DNS, BEC scams and AI defense strategies.

Nov 3, 202512 min

Why classical crypto fails against quantum attacks

An overview of cybersecurity quantum safe cryptography, focussing on quantum threat

Oct 30, 20252 min

WatchGuard Fireware WatchGuard Fireware VPN RCE Bug

An out of bounds write in the Fireware VPN module lets unauthenticated attackers gain remote code execution on Firebox appliances. Over 75K devices exposed apply the patch now.

Oct 29, 202510 min

Introduction to BGP and Internet Routing

An overview of cybersecurity BGP hijacking, focussing on bgp basics

Oct 23, 20252 min

Cisco SNMP Zero Disco Cisco SNMP Rootkit Exploit

A deep dive into Cisco s critical SNMP Zero Disco flaw CVE 2025 20352 used to deploy stealth Linux rootkits, plus high severity IOS ASA bugs under scrutiny. We also cover Google Workspace M365 phishing, Android 16 s defenses vs. the new Pixnapping timing attack, the EtherHiding crypto theft malware, and Telegram s upgraded 2FA and anti phishing shields.

Oct 20, 20258 min

What Is Deepfake Social Engineering

An overview of cybersecurity deepfake social engineering, focussing on overview of deepfake social engineering

Oct 16, 20253 min

Discord Zendesk Discord Zendesk Breach & Google Patches

Discord s age verification contractor Zendesk was compromised for 58 hours, exposing up to 70k ID images and user data in a high impact third party breach. Google rushed out emergency Chrome patches for critical WebAssembly and memory bugs, launched an AI only bug bounty for Gemini, and warned of Cl0p exploiting an Oracle EBS zero day CVE 2025 61882 .

Oct 13, 20254 min

Why Quantum Computing Threatens Cryptography

An overview of cybersecurity quantum safe cryptography, focussing on quantum threats

Oct 9, 20252 min

Cloud & OS Platforms AI Ransomware Defense, Encryption & Patches

Covers Google s new AI driven ransomware detection in Drive and upcoming Gmail end to end encryption, Telegram s account locks, malware alerts and anti phishing controls, plus Ubuntu s latest kernel and library security patches to harden Linux deployments.

Oct 6, 20258 min

What Are Non Human Identities NHIs

An overview of cybersecurity Non Human Identities NHIs , focussing on Introduction to Non Human Identities

Oct 4, 20253 min

What are over permissioned API keys

An overview of cybersecurity Over permissioned API Keys, focussing on over permissioned api keys

Sep 25, 20252 min

macOS ChillyHell Backdoors, Zero Clicks, AI Phishing & Kernel Bugs

This episode covers Apple s ChillyHell backdoor and iCloud zero click spyware, Microsoft s AI phishing wave with Patch Tuesday fixes, critical Linux kernel flaws, the massive npm supply chain attack, and Telegram bot data leaks.

Sep 15, 202513 min

What is Threat Hunting

An overview of cybersecurity Threat hunting, focussing on threat hunting overview

Sep 11, 20253 min

Drift OAuth tokens Supply Chain Breach Exposes OAuth Tokens

Unpack Cloudflare s mis issued 1.1.1.1 TLS certs, record 11.5 Tbps DDoS mitigation, Salesloft s Drift supply chain breach leaking hundreds of OAuth tokens, and Telegram s malware, DDoS sieges and Russian government clash.

Sep 8, 20255 min

What are fileless threats

An overview of cybersecurity fileless threats, focussing on introduction to fileless threats

Sep 4, 20252 min