Cyber Security
The TikTok Ban Bill, Your Car is Spying on You, Signal’s Username Update
In episode 321, the hosts discuss how connected cars are sharing driving data with insurance companies, potentially leading to increased rates for drivers. They also talk about the anti-TikTok bill passed by ...
Insight Into the DDoS Attacks on the French Government
The attacks are ongoing as of this writing. Here are a few screenshots of data and some insight. I’ll make sure to keep it brief since you have seen this news in ...
The Rise of AI Worms in Cybersecurity
The swift advancement of generative AI systems like OpenAI’s ChatGPT and Google’s Gemini has brought about a new era of technological ease. A recent report from CyberArk illustrates the transformative impact of ...
Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware
In episode 320, Tom and Scott discuss the contentious issue of who is accountable when Facebook or Instagram accounts are hacked, discussing potential failings on both the user’s and Meta’s part. They ...
Why Edtech Industries Need Cybersecurity?
As educational technology (edtech) industries gets better, it changes the way how students learn. But now, keeping student information safe is a big worry. People like parents and teachers are really concerned, ...
Don’t Trust Your AI Girlfriend or Boyfriend, Exposing US Government Data Collection
In Episode 319, Tom and Kevin discuss the potential data privacy risks associated with having an AI ‘girlfriend’ or ‘boyfriend’ and why one should refrain from sharing their personal data with such ...
Cyber Threat Assessment
In the digital landscape, what you don’t know can hurt you. The unseen threats lurking in the shadows of your network, often called ‘blind spots’, can lead to significant business disruptions, regulatory ...
The-C2 Threat Intelligence Conference
A Guide to Fortifying Cyber Defence Following cyber security best practices is not enough. Excellence in the face of ever-evolving adversaries requires a proactive and strategic approach combined with a solid understanding ...
RMM as a Vulnerability Exploitation Vehicle
Remote Monitoring and Management (RMM) tools are used by a substantial percentage of Managed Service Providers (MSPs) and IT infrastructure professionals. The post RMM as a Vulnerability Exploitation Vehicle appeared first on ...
‘Get to Know Me’ Privacy Risks, Pros and Cons of Publicly Sharing Ring Doorbell Footage
In episode 318, we discuss the trending ‘get to know me’ posts on social media platforms like Instagram and the potential risks of sharing personal information publicly, particularly in light of potential ...