Episode 441 - The Most Common Phishing Attack An Infographic Review
Release Date: 03/04/2019
Security In Five Podcast
DuckDuckGo was in some hot water recently for being exposed that they weren't blocking all of Microsoft ad trackers. Since then they have changed their approach and will start blocking all of them. This episode talks about this. Source - Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
Twilio confirmed recently they were a victim of a SMS phishing attack. This attack led to customer data being accessed after a few employees were tricked into entering credentials into a hacker-controlled fake website. This epsiode talks about how it happened and the things you can do to slow down or prevent these types of attacks. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
Google has been served a class action lawsuit for a bait and switch type move with Google Workspace early adopters. This episode talks about what the lawsuit it and rants about it because your host is one of the early adopters. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
A recent study by a firm called ExtraHop revealed that over 60% of IT environments analyzed has SSH ports exposed. Additional research shows that many less than secure ports and protocols are left open, allowing more vectors for attackers to probe. This episode breaks down what those were and how you can get a handle on these in your environment. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
The Cybersecurity and Infrastructure Security Agency (CISA) released a report of the top malware strains of 2021. This episode talks about what reports like this are valuable to your continuing education as a cybersecurity professional. Source - Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
New research shows that almost 90% of ransomware delivery is done through office macros. This ties into the move by Microsoft to block all macros by default in their Office products. This episode breaks it down. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
Security researchers have discovered thousands of mobile apps that are leaking API keys. This episode talks about how this is more of a problem than this shows and why it's happening. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
Phishing campaigns and attacks are constantly changing. A new credential stealing phishing campaign has been spotted in the wild. This episode talks about what it is and how you can help protect against it. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
This episode talks about some exciting news for the Security In Five and your host's new roles. Cloud Security Alliance of MN - Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
The HIPAA Security Rule is a supportive rule to HIPAA focused on more of the technical security aspects of the privacy rule. NIST released an updated draft of a guide to help people understand and implement controls for the security rule. Source - Be aware, be safe. *** Support the podcast with a cup of coffee *** - Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlinePhishing is the most prevelant attack vector for hackers. This episode goes over the four main types of phishing attacks and talks about them in detail.
Source Infographic From Inspired eLearning
`
Be aware, be safe.
*** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five
Don't forget to subscribe to the Security In Five Newsletter.
—————— Where you can find Binary Blogger ——————
Security In Five Reddit Channel r/SecurityInFive
Security In Five Podcast Page - Podcast RSS
iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher
Email - [email protected]