loader from loading.io

Episode 1241 - New Phishing Campaign Scares Users With A Countdown Clock

Security In Five Podcast

Release Date: 08/01/2022

Episode 1245 - Many Organizations Exposing Unnecessary Ports And Protocols, Learn To Scan Yourself show art Episode 1245 - Many Organizations Exposing Unnecessary Ports And Protocols, Learn To Scan Yourself

Security In Five Podcast

A recent study by a firm called ExtraHop revealed that over 60% of IT environments analyzed has SSH ports exposed. Additional research shows that many less than secure ports and protocols are left open, allowing more vectors for attackers to probe. This episode breaks down what those were and how you can get a handle on these in your environment. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email - 

info_outline
Episode 1244 - Top Malware Strains Of 2021 show art Episode 1244 - Top Malware Strains Of 2021

Security In Five Podcast

The Cybersecurity and Infrastructure Security Agency (CISA) released a report of the top malware strains of 2021. This episode talks about what reports like this are valuable to your continuing education as a cybersecurity professional. Source - Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email - 

info_outline
Episode 1243 - New Study Shows Office Macros Are Leading Ransomware Delivery Methods show art Episode 1243 - New Study Shows Office Macros Are Leading Ransomware Delivery Methods

Security In Five Podcast

New research shows that almost 90% of ransomware delivery is done through office macros. This ties into the move by Microsoft to block all macros by default in their Office products. This episode breaks it down. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email - 

info_outline
Epsiode 1242 - Thousands Of Apps Leaking API Details Proving Developers Are Bad At Security show art Epsiode 1242 - Thousands Of Apps Leaking API Details Proving Developers Are Bad At Security

Security In Five Podcast

Security researchers have discovered thousands of mobile apps that are leaking API keys. This episode talks about how this is more of a problem than this shows and why it's happening. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email - 

info_outline
Episode 1241 - New Phishing Campaign Scares Users With A Countdown Clock show art Episode 1241 - New Phishing Campaign Scares Users With A Countdown Clock

Security In Five Podcast

Phishing campaigns and attacks are constantly changing. A new credential stealing phishing campaign has been spotted in the wild. This episode talks about what it is and how you can help protect against it. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -   

info_outline
Episode 1240 - Security In Five Podcast Updates, I Joined The Cloud Security Alliance Of MN show art Episode 1240 - Security In Five Podcast Updates, I Joined The Cloud Security Alliance Of MN

Security In Five Podcast

This episode talks about some exciting news for the Security In Five and your host's new roles.  Cloud Security Alliance of MN - Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email - 

info_outline
Episode 1239 - NIST Releases New Implementation Guide For HIPAA show art Episode 1239 - NIST Releases New Implementation Guide For HIPAA

Security In Five Podcast

The HIPAA Security Rule is a supportive rule to HIPAA focused on more of the technical security aspects of the privacy rule. NIST released an updated draft of a guide to help people understand and implement controls for the security rule. Source - Be aware, be safe. *** Support the podcast with a cup of coffee *** - Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email - 

info_outline
Episode 1238 - Benefits Of Using A VPN show art Episode 1238 - Benefits Of Using A VPN

Security In Five Podcast

A Virtual Private Network (VPN) should be part of your personal security practice. This episode talks about the additional benefits you can get by regularly using one. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email - 

info_outline
Episode 1237 - How To Keep Yourself Safe And Secure If You Win The Lottery show art Episode 1237 - How To Keep Yourself Safe And Secure If You Win The Lottery

Security In Five Podcast

One of the biggest lottery jackpots is drawn tonight. This episode talks about some of the things you should do to protect your privacy if you win. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email - 

info_outline
Episode 1236 - The Top Brand Most Faked In Phishing Campaigns For 2022 show art Episode 1236 - The Top Brand Most Faked In Phishing Campaigns For 2022

Security In Five Podcast

Phishing attacks use commonly known companies and brands to help trick you into falling for them. This episode talks about a study that reveals the most used brand of 2022 for phishing attacks. Be aware, be safe. *** Support the podcast with a cup of coffee *** - Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email - 

info_outline
 
More Episodes

Phishing campaigns and attacks are constantly changing. A new credential stealing phishing campaign has been spotted in the wild. This episode talks about what it is and how you can help protect against it.

Be aware, be safe.

*** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five

or become a patron https://www.patreon.com/SecurityInFive

Don't forget to subscribe to the Security In Five Newsletter.

—————— Where you can find Security In Five ——————

Security In Five Reddit Channel r/SecurityInFive

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - [email protected]