In this episode of CYBR.HAK.CAST, hosts Michael and Phil dive into the latest cybersecurity news and trends, including major cloud outages, the impact of automation and AI on security, and recent high-profile attacks. They discuss lessons learned from real-world incidents, the importance of securing IoT devices, and the evolving tactics of threat actors. Things Mentioned: · https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-network-devices-for-ad...
All content for CYBR.HAK.CAST is the property of CYBR.SEC.Media and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In this episode of CYBR.HAK.CAST, hosts Michael and Phil dive into the latest cybersecurity news and trends, including major cloud outages, the impact of automation and AI on security, and recent high-profile attacks. They discuss lessons learned from real-world incidents, the importance of securing IoT devices, and the evolving tactics of threat actors. Things Mentioned: · https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-network-devices-for-ad...
In this episode of CYBR.HAK.CAST, hosts Michael and Phil dive into the latest cybersecurity news and trends, including major cloud outages, the impact of automation and AI on security, and recent high-profile attacks. They discuss lessons learned from real-world incidents, the importance of securing IoT devices, and the evolving tactics of threat actors. Things Mentioned: · https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-network-devices-for-ad...
CYBR.HAK.CAST
In this episode of CYBR.HAK.CAST, hosts Michael and Phil dive into the latest cybersecurity news and trends, including major cloud outages, the impact of automation and AI on security, and recent high-profile attacks. They discuss lessons learned from real-world incidents, the importance of securing IoT devices, and the evolving tactics of threat actors. Things Mentioned: · https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-network-devices-for-ad...